pax_global_header00006660000000000000000000000064133016012250014503gustar00rootroot0000000000000052 comment=a9f8a101fd2c475b3dcffbcc76b86355d956a095 selinux-python-2.8/000077500000000000000000000000001330160122500143625ustar00rootroot00000000000000selinux-python-2.8/COPYING000066400000000000000000000431311330160122500154170ustar00rootroot00000000000000 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. Copyright (C) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. , 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. selinux-python-2.8/Makefile000066400000000000000000000002631330160122500160230ustar00rootroot00000000000000SUBDIRS = sepolicy audit2allow semanage sepolgen chcat all install relabel clean indent: @for subdir in $(SUBDIRS); do \ (cd $$subdir && $(MAKE) $@) || exit 1; \ done test: selinux-python-2.8/VERSION000066400000000000000000000000041330160122500154240ustar00rootroot000000000000002.8 selinux-python-2.8/audit2allow/000077500000000000000000000000001330160122500166115ustar00rootroot00000000000000selinux-python-2.8/audit2allow/.gitignore000066400000000000000000000000331330160122500205750ustar00rootroot00000000000000sepolgen-ifgen-attr-helper selinux-python-2.8/audit2allow/Makefile000066400000000000000000000022361330160122500202540ustar00rootroot00000000000000PYTHON ?= python # Installation directories. PREFIX ?= /usr BINDIR ?= $(PREFIX)/bin MANDIR ?= $(PREFIX)/share/man CFLAGS ?= -Werror -Wall -W # If no specific libsepol.a is specified, fall back on LDFLAGS search path # Otherwise, as $(LIBSEPOLA) already appears in the dependencies, there # is no need to define a value for LDLIBS_LIBSEPOLA ifeq ($(LIBSEPOLA),) LDLIBS_LIBSEPOLA := -l:libsepol.a endif all: audit2why sepolgen-ifgen-attr-helper sepolgen-ifgen-attr-helper: sepolgen-ifgen-attr-helper.o $(LIBSEPOLA) $(CC) $(LDFLAGS) -o $@ $^ $(LDLIBS_LIBSEPOLA) audit2why: ln -sf audit2allow audit2why test: all @$(PYTHON) test_audit2allow.py -v install: all -mkdir -p $(DESTDIR)$(BINDIR) install -m 755 audit2allow $(DESTDIR)$(BINDIR) (cd $(DESTDIR)$(BINDIR); ln -sf audit2allow audit2why) install -m 755 sepolgen-ifgen-attr-helper $(DESTDIR)$(BINDIR) install -m 755 sepolgen-ifgen $(DESTDIR)$(BINDIR) -mkdir -p $(DESTDIR)$(MANDIR)/man1 install -m 644 audit2allow.1 $(DESTDIR)$(MANDIR)/man1/ install -m 644 audit2why.1 $(DESTDIR)$(MANDIR)/man1/ clean: rm -f *~ *.o sepolgen-ifgen-attr-helper indent: ../../scripts/Lindent $(wildcard *.[ch]) relabel: ; selinux-python-2.8/audit2allow/audit2allow000066400000000000000000000346261330160122500207760ustar00rootroot00000000000000#! /usr/bin/python -Es # Authors: Karl MacMillan # Authors: Dan Walsh # # Copyright (C) 2006-2013 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import sys import os import sepolgen.audit as audit import sepolgen.policygen as policygen import sepolgen.interfaces as interfaces import sepolgen.output as output import sepolgen.objectmodel as objectmodel import sepolgen.defaults as defaults import sepolgen.module as module from sepolgen.sepolgeni18n import _ import selinux.audit2why as audit2why import locale try: locale.setlocale(locale.LC_ALL, '') except: pass class AuditToPolicy: VERSION = "%prog .1" SYSLOG = "/var/log/messages" def __init__(self): self.__options = None self.__parser = None self.__avs = None def __parse_options(self): from optparse import OptionParser parser = OptionParser(version=self.VERSION) parser.add_option("-b", "--boot", action="store_true", dest="boot", default=False, help="audit messages since last boot conflicts with -i") parser.add_option("-a", "--all", action="store_true", dest="audit", default=False, help="read input from audit log - conflicts with -i") parser.add_option("-p", "--policy", dest="policy", default=None, help="Policy file to use for analysis") parser.add_option("-d", "--dmesg", action="store_true", dest="dmesg", default=False, help="read input from dmesg - conflicts with --all and --input") parser.add_option("-i", "--input", dest="input", help="read input from - conflicts with -a") parser.add_option("-l", "--lastreload", action="store_true", dest="lastreload", default=False, help="read input only after the last reload") parser.add_option("-r", "--requires", action="store_true", dest="requires", default=False, help="generate require statements for rules") parser.add_option("-m", "--module", dest="module", help="set the module name - implies --requires") parser.add_option("-M", "--module-package", dest="module_package", help="generate a module package - conflicts with -o and -m") parser.add_option("-o", "--output", dest="output", help="append output to , conflicts with -M") parser.add_option("-D", "--dontaudit", action="store_true", dest="dontaudit", default=False, help="generate policy with dontaudit rules") parser.add_option("-R", "--reference", action="store_true", dest="refpolicy", default=True, help="generate refpolicy style output") parser.add_option("-N", "--noreference", action="store_false", dest="refpolicy", default=False, help="do not generate refpolicy style output") parser.add_option("-v", "--verbose", action="store_true", dest="verbose", default=False, help="explain generated output") parser.add_option("-e", "--explain", action="store_true", dest="explain_long", default=False, help="fully explain generated output") parser.add_option("-t", "--type", help="only process messages with a type that matches this regex", dest="type") parser.add_option("--perm-map", dest="perm_map", help="file name of perm map") parser.add_option("--interface-info", dest="interface_info", help="file name of interface information") parser.add_option("--debug", dest="debug", action="store_true", default=False, help="leave generated modules for -M") parser.add_option("-w", "--why", dest="audit2why", action="store_true", default=(os.path.basename(sys.argv[0]) == "audit2why"), help="Translates SELinux audit messages into a description of why the access was denied") options, args = parser.parse_args() # Make -d, -a, and -i conflict if options.audit is True or options.boot: if options.input is not None: sys.stderr.write("error: --all/--boot conflicts with --input\n") if options.dmesg is True: sys.stderr.write("error: --all/--boot conflicts with --dmesg\n") if options.input is not None and options.dmesg is True: sys.stderr.write("error: --input conflicts with --dmesg\n") # Turn on requires generation if a module name is given. Also verify # the module name. if options.module: name = options.module else: name = options.module_package if name: options.requires = True if not module.is_valid_name(name): sys.stderr.write('error: module names must begin with a letter, optionally followed by letters, numbers, "-", "_", "."\n') sys.exit(2) # Make -M and -o conflict if options.module_package: if options.output: sys.stderr.write("error: --module-package conflicts with --output\n") sys.exit(2) if options.module: sys.stderr.write("error: --module-package conflicts with --module\n") sys.exit(2) self.__options = options def __read_input(self): parser = audit.AuditParser(last_load_only=self.__options.lastreload) filename = None messages = None f = None # Figure out what input we want if self.__options.input is not None: filename = self.__options.input elif self.__options.dmesg: messages = audit.get_dmesg_msgs() elif self.__options.audit: try: messages = audit.get_audit_msgs() except OSError as e: sys.stderr.write('could not run ausearch - "%s"\n' % str(e)) sys.exit(1) elif self.__options.boot: try: messages = audit.get_audit_boot_msgs() except OSError as e: sys.stderr.write('could not run ausearch - "%s"\n' % str(e)) sys.exit(1) else: # This is the default if no input is specified f = sys.stdin # Get the input if filename is not None: try: f = open(filename) except IOError as e: sys.stderr.write('could not open file %s - "%s"\n' % (filename, str(e))) sys.exit(1) if f is not None: parser.parse_file(f) f.close() if messages is not None: parser.parse_string(messages) self.__parser = parser def __process_input(self): if self.__options.type: avcfilter = audit.AVCTypeFilter(self.__options.type) self.__avs = self.__parser.to_access(avcfilter) csfilter = audit.ComputeSidTypeFilter(self.__options.type) self.__role_types = self.__parser.to_role(csfilter) else: self.__avs = self.__parser.to_access() self.__role_types = self.__parser.to_role() def __load_interface_info(self): # Load interface info file if self.__options.interface_info: fn = self.__options.interface_info else: fn = defaults.interface_info() try: fd = open(fn) except: sys.stderr.write("could not open interface info [%s]\n" % fn) sys.exit(1) ifs = interfaces.InterfaceSet() ifs.from_file(fd) fd.close() # Also load perm maps if self.__options.perm_map: fn = self.__options.perm_map else: fn = defaults.perm_map() try: fd = open(fn) except: sys.stderr.write("could not open perm map [%s]\n" % fn) sys.exit(1) perm_maps = objectmodel.PermMappings() perm_maps.from_file(fd) return (ifs, perm_maps) def __output_modulepackage(self, writer, generator): generator.set_module_name(self.__options.module_package) filename = self.__options.module_package + ".te" packagename = self.__options.module_package + ".pp" try: fd = open(filename, "w") except IOError as e: sys.stderr.write("could not write output file: %s\n" % str(e)) sys.exit(1) writer.write(generator.get_module(), fd) fd.close() mc = module.ModuleCompiler() try: mc.create_module_package(filename, self.__options.refpolicy) except RuntimeError as e: print(e) sys.exit(1) sys.stdout.write(_("******************** IMPORTANT ***********************\n")) sys.stdout.write((_("To make this policy package active, execute:" + "\n\nsemodule -i %s\n\n") % packagename)) def __output_audit2why(self): import selinux import sepolicy for i in self.__parser.avc_msgs: rc = i.type data = i.data if rc >= 0: print("%s\n\tWas caused by:" % i.message) if rc == audit2why.ALLOW: print("\t\tUnknown - would be allowed by active policy") print("\t\tPossible mismatch between this policy and the one under which the audit message was generated.\n") print("\t\tPossible mismatch between current in-memory boolean settings vs. permanent ones.\n") continue if rc == audit2why.DONTAUDIT: print("\t\tUnknown - should be dontaudit'd by active policy") print("\t\tPossible mismatch between this policy and the one under which the audit message was generated.\n") print("\t\tPossible mismatch between current in-memory boolean settings vs. permanent ones.\n") continue if rc == audit2why.BOOLEAN: if len(data) > 1: print("\tOne of the following booleans was set incorrectly.") for b in data: print("\tDescription:\n\t%s\n" % sepolicy.boolean_desc(b[0])) print("\tAllow access by executing:\n\t# setsebool -P %s %d" % (b[0], b[1])) else: print("\tThe boolean %s was set incorrectly. " % (data[0][0])) print("\tDescription:\n\t%s\n" % sepolicy.boolean_desc(data[0][0])) print("\tAllow access by executing:\n\t# setsebool -P %s %d" % (data[0][0], data[0][1])) continue if rc == audit2why.TERULE: print("\t\tMissing type enforcement (TE) allow rule.\n") print("\t\tYou can use audit2allow to generate a loadable module to allow this access.\n") continue if rc == audit2why.CONSTRAINT: print() # !!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access.\n" print("#Constraint rule:") print("\n#\t" + data[0]) for reason in data[1:]: print("#\tPossible cause is the source %s and target %s are different.\n" % reason) if rc == audit2why.RBAC: print("\t\tMissing role allow rule.\n") print("\t\tAdd an allow rule for the role pair.\n") continue if rc == audit2why.BOUNDS: print("\t\tTypebounds violation.\n") print("\t\tAdd an allow rule for the parent type.\n") continue audit2why.finish() return def __output(self): if self.__options.audit2why: try: return self.__output_audit2why() except RuntimeError as e: print(e) sys.exit(1) g = policygen.PolicyGenerator() g.set_gen_dontaudit(self.__options.dontaudit) if self.__options.module: g.set_module_name(self.__options.module) # Interface generation if self.__options.refpolicy: ifs, perm_maps = self.__load_interface_info() g.set_gen_refpol(ifs, perm_maps) # Explanation if self.__options.verbose: g.set_gen_explain(policygen.SHORT_EXPLANATION) if self.__options.explain_long: g.set_gen_explain(policygen.LONG_EXPLANATION) # Requires if self.__options.requires: g.set_gen_requires(True) # Generate the policy g.add_access(self.__avs) g.add_role_types(self.__role_types) # Output writer = output.ModuleWriter() # Module package if self.__options.module_package: self.__output_modulepackage(writer, g) else: # File or stdout if self.__options.module: g.set_module_name(self.__options.module) if self.__options.output: fd = open(self.__options.output, "a") else: fd = sys.stdout writer.write(g.get_module(), fd) def main(self): try: self.__parse_options() if self.__options.policy: audit2why.init(self.__options.policy) else: audit2why.init() self.__read_input() self.__process_input() self.__output() except KeyboardInterrupt: sys.exit(0) except ValueError as e: print(e) sys.exit(1) except IOError as e: print(e) sys.exit(1) if __name__ == "__main__": app = AuditToPolicy() app.main() selinux-python-2.8/audit2allow/audit2allow.1000066400000000000000000000156301330160122500211270ustar00rootroot00000000000000.\" Hey, Emacs! This is an -*- nroff -*- source file. .\" Copyright (c) 2005 Manoj Srivastava .\" Copyright (c) 2010 Dan Walsh .\" .\" This is free documentation; you can redistribute it and/or .\" modify it under the terms of the GNU General Public License as .\" published by the Free Software Foundation; either version 2 of .\" the License, or (at your option) any later version. .\" .\" The GNU General Public License's references to "object code" .\" and "executables" are to be interpreted as the output of any .\" document formatting or typesetting system, including .\" intermediate and printed output. .\" .\" This manual is distributed in the hope that it will be useful, .\" but WITHOUT ANY WARRANTY; without even the implied warranty of .\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the .\" GNU General Public License for more details. .\" .\" You should have received a copy of the GNU General Public .\" License along with this manual; if not, write to the Free .\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, .\" USA. .\" .\" .TH AUDIT2ALLOW "1" "October 2010" "Security Enhanced Linux" NSA .SH NAME .BR audit2allow \- generate SELinux policy allow/dontaudit rules from logs of denied operations .BR audit2why \- translates SELinux audit messages into a description of why the access was denied (audit2allow \-w) .SH SYNOPSIS .B audit2allow .RI [ options "] " .SH OPTIONS .TP .B "\-a" | "\-\-all" Read input from audit and message log, conflicts with \-i .TP .B "\-b" | "\-\-boot" Read input from audit messages since last boot conflicts with \-i .TP .B "\-d" | "\-\-dmesg" Read input from output of .I /bin/dmesg. Note that all audit messages are not available via dmesg when auditd is running; use "ausearch \-m avc | audit2allow" or "\-a" instead. .TP .B "\-D" | "\-\-dontaudit" Generate dontaudit rules (Default: allow) .TP .B "\-h" | "\-\-help" Print a short usage message .TP .B "\-i " | "\-\-input " read input from .I .TP .B "\-l" | "\-\-lastreload" read input only after last policy reload .TP .B "\-m " | "\-\-module " Generate module/require output .TP .B "\-M " Generate loadable module package, conflicts with \-o .TP .B "\-p " | "\-\-policy " Policy file to use for analysis .TP .B "\-o " | "\-\-output " append output to .I .TP .B "\-r" | "\-\-requires" Generate require output syntax for loadable modules. .TP .B "\-N" | "\-\-noreference" Do not generate reference policy, traditional style allow rules. This is the default behavior. .TP .B "\-R" | "\-\-reference" Generate reference policy using installed macros. This attempts to match denials against interfaces and may be inaccurate. .TP .B "\-w" | "\-\-why" Translates SELinux audit messages into a description of why the access was denied .TP .B "\-v" | "\-\-verbose" Turn on verbose output .SH DESCRIPTION .PP This utility scans the logs for messages logged when the system denied permission for operations, and generates a snippet of policy rules which, if loaded into policy, might have allowed those operations to succeed. However, this utility only generates Type Enforcement (TE) allow rules. Certain permission denials may require other kinds of policy changes, e.g. adding an attribute to a type declaration to satisfy an existing constraint, adding a role allow rule, or modifying a constraint. The .BR audit2why (8) utility may be used to diagnose the reason when it is unclear. .PP Care must be exercised while acting on the output of this utility to ensure that the operations being permitted do not pose a security threat. Often it is better to define new domains and/or types, or make other structural changes to narrowly allow an optimal set of operations to succeed, as opposed to blindly implementing the sometimes broad changes recommended by this utility. Certain permission denials are not fatal to the application, in which case it may be preferable to simply suppress logging of the denial via a 'dontaudit' rule rather than an 'allow' rule. .PP .SH EXAMPLE .nf .B NOTE: These examples are for systems using the audit package. If you do .B not use the audit package, the AVC messages will be in /var/log/messages. .B Please substitute /var/log/messages for /var/log/audit/audit.log in the .B examples. .PP .B Using audit2allow to generate module policy $ cat /var/log/audit/audit.log | audit2allow \-m local > local.te $ cat local.te module local 1.0; require { class file { getattr open read }; type myapp_t; type etc_t; }; allow myapp_t etc_t:file { getattr open read }; .B Using audit2allow to generate module policy using reference policy $ cat /var/log/audit/audit.log | audit2allow \-R \-m local > local.te $ cat local.te policy_module(local, 1.0) gen_require(` type myapp_t; type etc_t; }; files_read_etc_files(myapp_t) .B Building module policy using Makefile # SELinux provides a policy devel environment under # /usr/share/selinux/devel including all of the shipped # interface files. # You can create a te file and compile it by executing $ make \-f /usr/share/selinux/devel/Makefile local.pp # This make command will compile a local.te file in the current # directory. If you did not specify a "pp" file, the make file # will compile all "te" files in the current directory. After # you compile your te file into a "pp" file, you need to install # it using the semodule command. $ semodule \-i local.pp .B Building module policy manually # Compile the module $ checkmodule \-M \-m \-o local.mod local.te # Create the package $ semodule_package \-o local.pp \-m local.mod # Load the module into the kernel $ semodule \-i local.pp .B Using audit2allow to generate and build module policy $ cat /var/log/audit/audit.log | audit2allow \-M local Generating type enforcement file: local.te Compiling policy: checkmodule \-M \-m \-o local.mod local.te Building package: semodule_package \-o local.pp \-m local.mod ******************** IMPORTANT *********************** In order to load this newly created policy package into the kernel, you are required to execute semodule \-i local.pp .B Using audit2allow to generate monolithic (non\-module) policy $ cd /etc/selinux/$SELINUXTYPE/src/policy $ cat /var/log/audit/audit.log | audit2allow >> domains/misc/local.te $ cat domains/misc/local.te allow cupsd_config_t unconfined_t:fifo_file { getattr ioctl }; $ make load .fi .PP .SH AUTHOR This manual page was written by .I Manoj Srivastava , for the Debian GNU/Linux system. It was updated by Dan Walsh .PP The .B audit2allow utility has contributions from several people, including .I Justin R. Smith and .I Yuichi Nakamura. and .I Dan Walsh selinux-python-2.8/audit2allow/audit2why000077700000000000000000000000001330160122500226212audit2allowustar00rootroot00000000000000selinux-python-2.8/audit2allow/audit2why.1000066400000000000000000000000271330160122500206120ustar00rootroot00000000000000.so man1/audit2allow.1 selinux-python-2.8/audit2allow/sepolgen-ifgen000066400000000000000000000110531330160122500214360ustar00rootroot00000000000000#! /usr/bin/python -Es # # Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # # Parse interfaces and output extracted information about them # suitable for policy generation. By default writes the output # to the default location (obtained from sepolgen.defaults), but # will output to another file provided as an argument: # sepolgen-ifgen [headers] [output-filename] import sys import os import tempfile import subprocess import selinux import sepolgen.refparser as refparser import sepolgen.defaults as defaults import sepolgen.interfaces as interfaces VERSION = "%prog .1" ATTR_HELPER = "/usr/bin/sepolgen-ifgen-attr-helper" def parse_options(): from optparse import OptionParser parser = OptionParser(version=VERSION) parser.add_option("-o", "--output", dest="output", default=defaults.interface_info(), help="filename to store output") parser.add_option("-i", "--interfaces", dest="headers", default=defaults.headers(), help="location of the interface header files") parser.add_option("-a", "--attribute_info", dest="attribute_info") parser.add_option("-p", "--policy", dest="policy_path") parser.add_option("-v", "--verbose", action="store_true", default=False, help="print debuging output") parser.add_option("-d", "--debug", action="store_true", default=False, help="extra debugging output") parser.add_option("--no_attrs", action="store_true", default=False, help="do not retrieve attribute access from kernel policy") options, args = parser.parse_args() return options def get_policy(): p = selinux.selinux_current_policy_path() if p and os.path.exists(p): return p i = selinux.security_policyvers() p = selinux.selinux_binary_policy_path() + "." + str(i) while i > 0 and not os.path.exists(p): i = i - 1 p = selinux.selinux_binary_policy_path() + "." + str(i) if i > 0: return p return None def get_attrs(policy_path): try: if not policy_path: policy_path = get_policy() if not policy_path: sys.stderr.write("No installed policy to check\n") return None outfile = tempfile.NamedTemporaryFile() except IOError as e: sys.stderr.write("could not open attribute output file\n") return None except OSError: # SELinux Disabled Machine return None fd = open("/dev/null", "w") ret = subprocess.Popen([ATTR_HELPER, policy_path, outfile.name], stdout=fd).wait() fd.close() if ret != 0: sys.stderr.write("could not run attribute helper") return None attrs = interfaces.AttributeSet() try: attrs.from_file(outfile) except: print("error parsing attribute info") return None return attrs def main(): options = parse_options() # Open the output first to generate errors before parsing try: f = open(options.output, "w") except IOError as e: sys.stderr.write("could not open output file [%s]\n" % options.output) return 1 if options.verbose: log = sys.stdout else: log = None # Get the attibutes from the binary attrs = None if not options.no_attrs: attrs = get_attrs(options.policy_path) if attrs is None: return 1 # Parse the headers try: headers = refparser.parse_headers(options.headers, output=log, debug=options.debug) except ValueError as e: print("error parsing headers") print(str(e)) return 1 if_set = interfaces.InterfaceSet(output=log) if_set.add_headers(headers, attributes=attrs) if_set.to_file(f) f.close() if refparser.success: return 0 else: return 1 if __name__ == "__main__": sys.exit(main()) selinux-python-2.8/audit2allow/sepolgen-ifgen-attr-helper.c000066400000000000000000000117301330160122500241060ustar00rootroot00000000000000/* Authors: Frank Mayer * and Karl MacMillan * * Copyright (C) 2003,2010 Tresys Technology, LLC * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation, version 2. * * Adapted from dispol.c. * * This program is used by sepolgen-ifgen to get the access for all of * the attributes in the policy so that it can resolve the * typeattribute statements in the interfaces. * * It outputs the attribute access in a similar format to what sepolgen * uses to store interface vectors: * [Attribute sandbox_x_domain] * sandbox_x_domain,samba_var_t,file,ioctl,read,getattr,lock,open * sandbox_x_domain,samba_var_t,dir,getattr,search,open * sandbox_x_domain,initrc_var_run_t,file,ioctl,read,getattr,lock,open * */ #include #include #include #include #include #include #include #include #include struct val_to_name { unsigned int val; char *name; }; static int perm_name(hashtab_key_t key, hashtab_datum_t datum, void *data) { struct val_to_name *v = data; perm_datum_t *perdatum; perdatum = (perm_datum_t *) datum; if (v->val == perdatum->s.value) { v->name = key; return 1; } return 0; } int render_access_mask(uint32_t av, avtab_key_t *key, policydb_t *policydbp, FILE *fp) { struct val_to_name v; class_datum_t *cladatum; char *perm = NULL; unsigned int i; int rc; uint32_t tclass = key->target_class; cladatum = policydbp->class_val_to_struct[tclass - 1]; for (i = 0; i < cladatum->permissions.nprim; i++) { if (av & (1 << i)) { v.val = i + 1; rc = hashtab_map(cladatum->permissions.table, perm_name, &v); if (!rc && cladatum->comdatum) { rc = hashtab_map(cladatum->comdatum-> permissions.table, perm_name, &v); } if (rc) perm = v.name; if (perm) { fprintf(fp, ",%s", perm); } } } return 0; } static int render_key(avtab_key_t *key, policydb_t *p, FILE *fp) { char *stype, *ttype, *tclass; stype = p->p_type_val_to_name[key->source_type - 1]; ttype = p->p_type_val_to_name[key->target_type - 1]; tclass = p->p_class_val_to_name[key->target_class - 1]; if (stype && ttype) { fprintf(fp, "%s,%s,%s", stype, ttype, tclass); } else { fprintf(stderr, "error rendering key\n"); exit(1); } return 0; } struct callback_data { uint32_t attr; policydb_t *policy; FILE *fp; }; int output_avrule(avtab_key_t *key, avtab_datum_t *datum, void *args) { struct callback_data *cb_data = (struct callback_data *)args; if (key->source_type != cb_data->attr) return 0; if (!(key->specified & AVTAB_AV && key->specified & AVTAB_ALLOWED)) return 0; render_key(key, cb_data->policy, cb_data->fp); render_access_mask(datum->data, key, cb_data->policy, cb_data->fp); fprintf(cb_data->fp, "\n"); return 0; } static int attribute_callback(hashtab_key_t key, hashtab_datum_t datum, void *datap) { struct callback_data *cb_data = (struct callback_data *)datap; type_datum_t *t = (type_datum_t *)datum; if (t->flavor == TYPE_ATTRIB) { fprintf(cb_data->fp, "[Attribute %s]\n", key); cb_data->attr = t->s.value; if (avtab_map(&cb_data->policy->te_avtab, output_avrule, cb_data) < 0) return -1; if (avtab_map(&cb_data->policy->te_cond_avtab, output_avrule, cb_data) < 0) return -1; } return 0; } static policydb_t *load_policy(const char *filename) { policydb_t *policydb; struct policy_file pf; FILE *fp; int ret; fp = fopen(filename, "r"); if (fp == NULL) { fprintf(stderr, "Can't open '%s': %s\n", filename, strerror(errno)); return NULL; } policy_file_init(&pf); pf.type = PF_USE_STDIO; pf.fp = fp; policydb = malloc(sizeof(policydb_t)); if (policydb == NULL) { fprintf(stderr, "Out of memory!\n"); return NULL; } if (policydb_init(policydb)) { fprintf(stderr, "Out of memory!\n"); free(policydb); return NULL; } ret = policydb_read(policydb, &pf, 1); if (ret) { fprintf(stderr, "error(s) encountered while parsing configuration\n"); free(policydb); return NULL; } fclose(fp); return policydb; } void usage(char *progname) { printf("usage: %s policy_file out_file\n", progname); } int main(int argc, char **argv) { policydb_t *p; struct callback_data cb_data; FILE *fp; if (argc != 3) { usage(argv[0]); return -1; } /* Open the policy. */ p = load_policy(argv[1]); if (p == NULL) return -1; /* Open the output policy. */ fp = fopen(argv[2], "w"); if (fp == NULL) { fprintf(stderr, "error opening output file\n"); policydb_destroy(p); free(p); return -1; } /* Find all of the attributes and output their access. */ cb_data.policy = p; cb_data.fp = fp; if (hashtab_map(p->p_types.table, attribute_callback, &cb_data)) { printf("error finding attributes\n"); } policydb_destroy(p); free(p); fclose(fp); return 0; } selinux-python-2.8/audit2allow/test.log000066400000000000000000000232341330160122500202770ustar00rootroot00000000000000node=bill.example.com type=AVC_PATH msg=audit(1166045975.667:1128): path="/usr/lib/libGL.so.1.2" type=AVC msg=audit(1166045975.667:1129): avc: denied { write } for comm=local dev=dm-0 name=root.lock pid=10581 scontext=system_u:system_r:postfix_local_t:s0 tclass=file tcontext=system_u:object_r:mail_spool_t:s0 node=bob.example.com type=PATH msg=audit(1166111074.191:74): item=0 name="/etc/auto.net" inode=16483485 dev=fd:00 mode=0100755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:automount_lock_t:s0 type=CWD msg=audit(1166111074.191:74): cwd="/" node=bob.example.com type=SYSCALL msg=audit(1166111074.191:74): arch=40000003 syscall=33 success=no exit=-13 a0=92c5288 a1=1 a2=154d50 a3=92c5120 items=1 ppid=13935 pid=13944 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null) node=bob.example.com type=AVC msg=audit(1166111074.191:74): avc: denied { execute } for pid=13944 comm="automount" name="auto.net" dev=dm-0 ino=16483485 scontext=system_u:system_r:automount_t:s0 tcontext=system_u:object_r:automount_lock_t:s0 tclass=file node=james.example.com type=SYSCALL msg=audit(1165963069.244:851): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=james.example.com type=AVC msg=audit(1165963069.244:851): avc: denied { name_bind } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null) node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pid=21134 comm="smbd" src=81 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=no exit=-13 a0=8493cd8 a1=cc3 a2=3282ec a3=bf992a04 items=0 ppid=24423 pid=24427 auid=3267 uid=0 gid=0 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vsftpd" exe="/usr/sbin/vsftpd" subj=system_u:system_r:ftpd_t:s0 key=(null) node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { search } for pid=24427 comm="vsftpd" name="home" dev=dm-0 ino=9338881 scontext=system_u:system_r:ftpd_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir node=tom.example.com type=SYSCALL msg=audit(1165963069.244:852): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=tom.example.com type=AVC msg=audit(1165963069.244:852): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=dan.example.com type=AVC_PATH msg=audit(1166017682.366:877): path="/var/www/html/index.html" node=dan.example.com type=SYSCALL msg=audit(1166017682.366:877): arch=40000003 syscall=196 success=no exit=-13 a0=96226a8 a1=bf88b01c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23768 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=dan.example.com type=AVC msg=audit(1166017682.366:877): avc: denied { execute_no_trans } for pid=23768 comm="httpd" name="index.html" dev=dm-0 ino=7996439 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:mysqld_port_t:s0 tclass=tcp_socket node=judy.example.com type=SYSCALL msg=audit(1165963069.244:853): arch=40000003 syscall=102 success=no exit=-13 a0=2 a1=bf96a830 a2=b5b1e8 a3=9e58ac0 items=0 ppid=21133 pid=21134 auid=3267 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts10 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=judy.example.com type=AVC msg=audit(1165963069.244:853): avc: denied { name_connect } for pid=21134 comm="httpd" src=81 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:reserved_port_t:s0 tclass=tcp_socket node=patty.example.com type=AVC_PATH msg=audit(1166036885.378:1097): path="/var/www/cgi-bin" node=patty.example.com type=SYSCALL msg=audit(1166036885.378:1097): arch=40000003 syscall=196 success=no exit=-13 a0=9624f38 a1=bf88b11c a2=31fff4 a3=2008171 items=0 ppid=23762 pid=23770 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:httpd_t:s0 key=(null) node=patty.example.com type=AVC msg=audit(1166036885.378:1097): avc: denied { execute } for pid=23770 comm="httpd" name="cgi-bin" dev=dm-0 ino=7995597 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:httpd_sys_script_exec_t:s0 tclass=file node=sam.example.com type=SYSCALL msg=audit(1166038880.318:1103): arch=40000003 syscall=5 success=no exit=-13 a0=bf96f068 a1=18800 a2=0 a3=bf973110 items=0 ppid=23765 pid=12387 auid=3267 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="sealert.cgi" exe="/usr/bin/perl" subj=system_u:system_r:httpd_sys_script_t:s0 key=(null) node=sam.example.com type=AVC msg=audit(1166038880.318:1103): avc: denied { write } for pid=12387 comm="sealert.cgi" name="sealert-upload" dev=dm-0 ino=8093724 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file node=holycross.devel.redhat.com type=AVC_PATH msg=audit(1166027294.395:952): path="/home/devel/dwalsh/public_html" node=holycross.devel.redhat.com type=SYSCALL msg=audit(1166027294.395:952): arch=40000003 syscall=196 success=yes exit=0 a0=8495230 a1=849c830 a2=874ff4 a3=328d28 items=0 ppid=7234 pid=7236 auid=3267 uid=3267 gid=3267 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vsftpd" exe="/usr/sbin/vsftpd" subj=system_u:system_r:ftpd_t:s0 key=(null) node=holycross.devel.redhat.com type=AVC msg=audit(1166027294.395:952): avc: denied { getattr } for pid=7236 comm="vsftpd" name="public_html" dev=dm-0 ino=9601649 scontext=system_u:system_r:ftpd_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file host=dhcppc2 type=AVC msg=audit(1216729188.853:241): avc: denied { read } for pid=14066 comm="qemu-kvm" name="HelpdeskRHEL4-RHEL4.x86_64" dev=tmpfs ino=333 scontext=system_u:system_r:qemu_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file host=dhcppc2 type=SYSCALL msg=audit(1216729188.853:241): arch=c000003e syscall=2 success=no exit=-13 a0=7fff6f654680 a1=0 a2=1a4 a3=3342f67a70 items=0 ppid=2953 pid=14066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="qemu-kvm" exe="/usr/bin/qemu-kvm" subj=system_u:system_r:qemu_t:s0 key=(null) node=mallorn.farre.nom type=AVC msg=audit(1228276291.360:466): avc: denied { execute } for pid=13015 comm="npviewer.bin" path="/opt/real/RealPlayer/mozilla/nphelix.so" dev=dm-0 ino=2850912 scontext=unconfined_u:unconfined_r:nsplugin_t:s0 tcontext=unconfined_u:object_r:usr_t:s0 tclass=file node=mallorn.farre.nom type=SYSCALL msg=audit(1228276291.360:466): arch=40000003 syscall=192 success=no exit=-13 a0=0 a1=9eec a2=5 a3=802 items=0 ppid=13014 pid=13015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=63 comm="npviewer.bin" exe="/usr/lib/nspluginwrapper/npviewer.bin" subj=unconfined_u:unconfined_r:nsplugin_t:s0 key=(null) node=mary.example.com type=SYSCALL msg=audit(1166023021.373:910): arch=40000003 syscall=12 success=no exit=-13 a0=8493cd8 a1=cc3 a2=3282ec a3=bf992a04 items=0 ppid=24423 pid=24427 auid=3267 uid=0 gid=0 euid=3267 suid=3267 fsuid=3267 egid=3267 sgid=3267 fsgid=3267 tty=(none) comm="vssmbd" exe="/usr/sbin/vssmbd" subj=system_u:system_r:smbd_t:s0 key=(null) node=mary.example.com type=AVC msg=audit(1166023021.373:910): avc: denied { read } for pid=24427 comm="vssmbd" name="home" dev=dm-0 ino=9338881 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:ssh_home_t:s0 tclass=file node=lilly.example.com type=AVC_PATH msg=audit(1164783469.561:109): path="/linuxtest/LVT/lvt/log.current" node=lilly.example.com type=SYSCALL msg=audit(1164783469.561:109): arch=14 syscall=11 success=yes exit=0 a0=10120520 a1=10120a78 a2=10120970 a3=118 items=0 ppid=8310 pid=8311 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="smbd" exe="/usr/sbin/smbd" subj=root:system_r:smbd_t:s0 key=(null) node=lilly.example.com type=AVC msg=audit(1164783469.561:109): avc: denied { append } for pid=8311 comm="smbd" name="log.current" dev=dm-0 ino=130930 scontext=root:system_r:smbd_t:s0 tcontext=root:object_r:default_t:s0 tclass=dir selinux-python-2.8/audit2allow/test_audit2allow.py000066400000000000000000000031511330160122500224510ustar00rootroot00000000000000import unittest import os import shutil from tempfile import mkdtemp from subprocess import Popen, PIPE class Audit2allowTests(unittest.TestCase): def assertDenied(self, err): self.assertTrue('Permission denied' in err, '"Permission denied" not found in %r' % err) def assertNotFound(self, err): self.assertTrue('not found' in err, '"not found" not found in %r' % err) def assertFailure(self, status): self.assertTrue(status != 0, '"Succeeded when it should have failed') def assertSuccess(self, cmd, status, err): self.assertTrue(status == 0, '"%s should have succeeded for this test %r' % (cmd, err)) def test_sepolgen_ifgen(self): "Verify sepolgen-ifgen works" p = Popen(['sudo', 'sepolgen-ifgen'], stdout=PIPE) out, err = p.communicate() if err: print(out, err) self.assertSuccess("sepolgen-ifgen", p.returncode, err) def test_audit2allow(self): "Verify audit2allow works" p = Popen(['python', './audit2allow', "-i", "test.log"], stdout=PIPE) out, err = p.communicate() if err: print(out, err) self.assertSuccess("audit2allow", p.returncode, err) def test_audit2why(self): "Verify audit2why works" p = Popen(['python', './audit2why', "-i", "test.log"], stdout=PIPE) out, err = p.communicate() if err: print(out, err) self.assertSuccess("audit2why", p.returncode, err) if __name__ == "__main__": unittest.main() selinux-python-2.8/chcat/000077500000000000000000000000001330160122500154445ustar00rootroot00000000000000selinux-python-2.8/chcat/Makefile000066400000000000000000000005011330160122500171000ustar00rootroot00000000000000# Installation directories. PREFIX ?= /usr BINDIR ?= $(PREFIX)/bin MANDIR ?= $(PREFIX)/share/man .PHONY: all all: chcat install: all -mkdir -p $(DESTDIR)$(BINDIR) install -m 755 chcat $(DESTDIR)$(BINDIR) -mkdir -p $(DESTDIR)$(MANDIR)/man8 install -m 644 chcat.8 $(DESTDIR)$(MANDIR)/man8/ clean: indent: relabel: selinux-python-2.8/chcat/chcat000077500000000000000000000325151330160122500164620ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2005 Red Hat # see file 'COPYING' for use and warranty information # # chcat is a script that allows you modify the Security label on a file # #` Author: Daniel Walsh # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # try: from subprocess import getstatusoutput except ImportError: from commands import getstatusoutput import sys import os import pwd import string import getopt import selinux import seobject PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode def errorExit(error): sys.stderr.write("%s: " % sys.argv[0]) sys.stderr.write("%s\n" % error) sys.stderr.flush() sys.exit(1) def verify_users(users): for u in users: try: pwd.getpwnam(u) except KeyError: error("User %s does not exist" % u) def chcat_user_add(newcat, users): errors = 0 logins = seobject.loginRecords() seusers = logins.get_all() add_ind = 0 verify_users(users) for u in users: if u in seusers.keys(): user = seusers[u] else: add_ind = 1 user = seusers["__default__"] serange = user[1].split("-") cats = [] top = ["s0"] if len(serange) > 1: top = serange[1].split(":") if len(top) > 1: cats.append(top[1]) cats = expandCats(cats) for i in newcat[1:]: if i not in cats: cats.append(i) if len(cats) > 0: new_serange = "%s-%s:%s" % (serange[0], top[0], ",".join(cats)) else: new_serange = "%s-%s" % (serange[0], top[0]) if add_ind: cmd = "semanage login -a -r %s -s %s %s" % (new_serange, user[0], u) else: cmd = "semanage login -m -r %s -s %s %s" % (new_serange, user[0], u) rc = getstatusoutput(cmd) if rc[0] != 0: print(rc[1]) errors += 1 return errors def chcat_add(orig, newcat, objects, login_ind): if len(newcat) == 1: raise ValueError(_("Requires at least one category")) if login_ind == 1: return chcat_user_add(newcat, objects) errors = 0 sensitivity = newcat[0] cat = newcat[1] cmd = 'chcon -l %s' % sensitivity for f in objects: (rc, c) = selinux.getfilecon(f) con = c.split(":")[3:] clist = translate(con) if sensitivity != clist[0]: print(_("Can not modify sensitivity levels using '+' on %s") % f) if len(clist) > 1: if cat in clist[1:]: print(_("%s is already in %s") % (f, orig)) continue clist.append(cat) cats = clist[1:] cats.sort() cat_string = cats[0] for c in cats[1:]: cat_string = "%s,%s" % (cat_string, c) else: cat_string = cat cmd = 'chcon -l %s:%s %s' % (sensitivity, cat_string, f) rc = getstatusoutput(cmd) if rc[0] != 0: print(rc[1]) errors += 1 return errors def chcat_user_remove(newcat, users): errors = 0 logins = seobject.loginRecords() seusers = logins.get_all() add_ind = 0 verify_users(users) for u in users: if u in seusers.keys(): user = seusers[u] else: add_ind = 1 user = seusers["__default__"] serange = user[1].split("-") cats = [] top = ["s0"] if len(serange) > 1: top = serange[1].split(":") if len(top) > 1: cats.append(top[1]) cats = expandCats(cats) for i in newcat[1:]: if i in cats: cats.remove(i) if len(cats) > 0: new_serange = "%s-%s:%s" % (serange[0], top[0], ",".join(cats)) else: new_serange = "%s-%s" % (serange[0], top[0]) if add_ind: cmd = "semanage login -a -r %s -s %s %s" % (new_serange, user[0], u) else: cmd = "semanage login -m -r %s -s %s %s" % (new_serange, user[0], u) rc = getstatusoutput(cmd) if rc[0] != 0: print(rc[1]) errors += 1 return errors def chcat_remove(orig, newcat, objects, login_ind): if len(newcat) == 1: raise ValueError(_("Requires at least one category")) if login_ind == 1: return chcat_user_remove(newcat, objects) errors = 0 sensitivity = newcat[0] cat = newcat[1] for f in objects: (rc, c) = selinux.getfilecon(f) con = c.split(":")[3:] clist = translate(con) if sensitivity != clist[0]: print(_("Can not modify sensitivity levels using '+' on %s") % f) continue if len(clist) > 1: if cat not in clist[1:]: print(_("%s is not in %s") % (f, orig)) continue clist.remove(cat) if len(clist) > 1: cat = clist[1] for c in clist[2:]: cat = "%s,%s" % (cat, c) else: cat = "" else: print(_("%s is not in %s") % (f, orig)) continue if len(cat) == 0: cmd = 'chcon -l %s %s' % (sensitivity, f) else: cmd = 'chcon -l %s:%s %s' % (sensitivity, cat, f) rc = getstatusoutput(cmd) if rc[0] != 0: print(rc[1]) errors += 1 return errors def chcat_user_replace(newcat, users): errors = 0 logins = seobject.loginRecords() seusers = logins.get_all() add_ind = 0 verify_users(users) for u in users: if u in seusers.keys(): user = seusers[u] else: add_ind = 1 user = seusers["__default__"] serange = user[1].split("-") new_serange = "%s-%s:%s" % (serange[0], newcat[0], string.join(newcat[1:], ",")) if new_serange[-1:] == ":": new_serange = new_serange[:-1] if add_ind: cmd = "semanage login -a -r %s -s %s %s" % (new_serange, user[0], u) else: cmd = "semanage login -m -r %s -s %s %s" % (new_serange, user[0], u) rc = getstatusoutput(cmd) if rc[0] != 0: print(rc[1]) errors += 1 return errors def chcat_replace(newcat, objects, login_ind): if login_ind == 1: return chcat_user_replace(newcat, objects) errors = 0 if len(newcat) == 1: sensitivity = newcat[0] cmd = 'chcon -l %s ' % newcat[0] else: sensitivity = newcat[0] cmd = 'chcon -l %s:%s' % (sensitivity, newcat[1]) for cat in newcat[2:]: cmd = '%s,%s' % (cmd, cat) for f in objects: cmd = "%s %s" % (cmd, f) rc = getstatusoutput(cmd) if rc[0] != 0: print(rc[1]) errors += 1 return errors def check_replace(cats): plus_ind = 0 replace_ind = 0 for c in cats: if len(c) > 0 and (c[0] == "+" or c[0] == "-"): if replace_ind: raise ValueError(_("Can not combine +/- with other types of categories")) plus_ind = 1 else: replace_ind = 1 if plus_ind: raise ValueError(_("Can not combine +/- with other types of categories")) return replace_ind def isSensitivity(sensitivity): if sensitivity[0] == "s" and sensitivity[1:].isdigit() and int(sensitivity[1:]) in range(0, 16): return 1 else: return 0 def expandCats(cats): newcats = [] for c in cats: for i in c.split(","): if i.find(".") != -1: j = i.split(".") for k in range(int(j[0][1:]), int(j[1][1:]) + 1): x = ("c%d" % k) if x not in newcats: newcats.append(x) else: if i not in newcats: newcats.append(i) if len(newcats) > 25: return cats return newcats def translate(cats): newcat = [] if len(cats) == 0: newcat.append("s0") return newcat for c in cats: (rc, raw) = selinux.selinux_trans_to_raw_context("a:b:c:%s" % c) rlist = raw.split(":")[3:] tlist = [] if isSensitivity(rlist[0]) == 0: tlist.append("s0") for i in expandCats(rlist): tlist.append(i) else: tlist.append(rlist[0]) for i in expandCats(rlist[1:]): tlist.append(i) if len(newcat) == 0: newcat.append(tlist[0]) else: if newcat[0] != tlist[0]: raise ValueError(_("Can not have multiple sensitivities")) for i in tlist[1:]: newcat.append(i) return newcat def usage(): print(_("Usage %s CATEGORY File ...") % sys.argv[0]) print(_("Usage %s -l CATEGORY user ...") % sys.argv[0]) print(_("Usage %s [[+|-]CATEGORY],...] File ...") % sys.argv[0]) print(_("Usage %s -l [[+|-]CATEGORY],...] user ...") % sys.argv[0]) print(_("Usage %s -d File ...") % sys.argv[0]) print(_("Usage %s -l -d user ...") % sys.argv[0]) print(_("Usage %s -L") % sys.argv[0]) print(_("Usage %s -L -l user") % sys.argv[0]) print(_("Use -- to end option list. For example")) print(_("chcat -- -CompanyConfidential /docs/businessplan.odt")) print(_("chcat -l +CompanyConfidential juser")) sys.exit(1) def listcats(): fd = open(selinux.selinux_translations_path()) for l in fd.read().split("\n"): if l.startswith("#"): continue if l.find("=") != -1: rec = l.split("=") print("%-30s %s" % tuple(rec)) fd.close() return 0 def listusercats(users): if len(users) == 0: try: users.append(os.getlogin()) except: users.append(pwd.getpwuid(os.getuid()).pw_name) verify_users(users) for u in users: cats = seobject.translate(selinux.getseuserbyname(u)[2]) cats = cats.split("-") if len(cats) > 1 and cats[1] != "s0": print("%s: %s" % (u, cats[1])) else: print("%s: %s" % (u, cats[0])) def error(msg): print("%s: %s" % (sys.argv[0], msg)) sys.exit(1) if __name__ == '__main__': if selinux.is_selinux_mls_enabled() != 1: error("Requires a mls enabled system") if selinux.is_selinux_enabled() != 1: error("Requires an SELinux enabled system") delete_ind = 0 list_ind = 0 login_ind = 0 try: gopts, cmds = getopt.getopt(sys.argv[1:], 'dhlL', ['list', 'login', 'help', 'delete']) for o, a in gopts: if o == "-h" or o == "--help": usage() if o == "-d" or o == "--delete": delete_ind = 1 if o == "-L" or o == "--list": list_ind = 1 if o == "-l" or o == "--login": login_ind = 1 if list_ind == 0 and len(cmds) < 1: usage() except getopt.error as error: errorExit(_("Options Error %s ") % error.msg) except ValueError as e: usage() if delete_ind: sys.exit(chcat_replace(["s0"], cmds, login_ind)) if list_ind: if login_ind: sys.exit(listusercats(cmds)) else: if len(cmds) > 0: usage() sys.exit(listcats()) if len(cmds) < 2: usage() set_ind = 0 cats = cmds[0].split(",") mod_ind = 0 errors = 0 objects = cmds[1:] try: if check_replace(cats): errors = chcat_replace(translate(cats), objects, login_ind) else: for c in cats: l = [] l.append(c[1:]) if len(c) > 0 and c[0] == "+": errors += chcat_add(c[1:], translate(l), objects, login_ind) continue if len(c) > 0 and c[0] == "-": errors += chcat_remove(c[1:], translate(l), objects, login_ind) continue except ValueError as e: error(e) except OSError as e: error(e) sys.exit(errors) selinux-python-2.8/chcat/chcat.8000066400000000000000000000022521330160122500166200ustar00rootroot00000000000000.TH CHCAT "8" "September 2005" "chcat" "User Commands" .SH NAME chcat \- change file SELinux security category .SH SYNOPSIS .B chcat \fIcategory file\fR... .br .B chcat -l \fIcategory user\fR... .br .B chcat \fI[[+|-]category...] file\fR... .br .B chcat -l \fI[[+|-]category...] user\fR... .br .B chcat [\fI-d\fR] \fIfile\fR... .br .B chcat -l [\fI-d\fR] \fIuser\fR... .br .B chcat \fI-L\fR [ \-l ] [ user ... ] .br .SH DESCRIPTION .PP Change/Remove the security \fIcategory\fR for each \fIfile\fR or \fIuser\fR. .PP Use +/- to add/remove categories from a \fIfile\fR or \fIuser\fR. .PP .B Note: When removing a category you must specify '\-\-' on the command line before using the \-Category syntax. This tells the command that you have finished entering options and are now specifying a category name instead. .TP \fB\-d\fR delete the category from each FILE/USER. .TP \fB\-L\fR list available categories. .TP \fB\-l\fR Tells chcat to operate on users instead of files. .SH "SEE ALSO" .TP chcon(1), selinux(8), semanage(8) .PP .br When operating on files this script wraps the chcon command. .SH "FILES" /etc/selinux/{SELINUXTYPE}/setrans.conf .br /etc/selinux/{SELINUXTYPE}/seusers selinux-python-2.8/semanage/000077500000000000000000000000001330160122500161425ustar00rootroot00000000000000selinux-python-2.8/semanage/Makefile000066400000000000000000000016431330160122500176060ustar00rootroot00000000000000PYTHON ?= python # Installation directories. PREFIX ?= /usr SBINDIR ?= $(PREFIX)/sbin MANDIR = $(PREFIX)/share/man PYTHONLIBDIR ?= $(shell $(PYTHON) -c "from distutils.sysconfig import *; print(get_python_lib(prefix='$(PREFIX)'))") PACKAGEDIR ?= $(PYTHONLIBDIR) BASHCOMPLETIONDIR ?= $(PREFIX)/share/bash-completion/completions TARGETS=semanage BASHCOMPLETIONS=semanage-bash-completion.sh all: $(TARGETS) install: all [ -d $(DESTDIR)$(MANDIR)/man8 ] || mkdir -p $(DESTDIR)$(MANDIR)/man8 -mkdir -p $(DESTDIR)$(SBINDIR) install -m 755 semanage $(DESTDIR)$(SBINDIR) install -m 644 *.8 $(DESTDIR)$(MANDIR)/man8 test -d $(DESTDIR)/$(PACKAGEDIR) || install -m 755 -d $(DESTDIR)/$(PACKAGEDIR) install -m 755 seobject.py $(DESTDIR)/$(PACKAGEDIR) -mkdir -p $(DESTDIR)$(BASHCOMPLETIONDIR) install -m 644 $(BASHCOMPLETIONS) $(DESTDIR)$(BASHCOMPLETIONDIR)/semanage test: @$(PYTHON) test-semanage.py -a clean: indent: relabel: selinux-python-2.8/semanage/semanage000066400000000000000000001175621330160122500176610ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2012-2013 Red Hat # AUTHOR: Miroslav Grepl # AUTHOR: David Quigley # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import traceback import argparse import seobject import sys PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode # define custom usages for selected main actions usage_login = "semanage login [-h] [-n] [-N] [-S STORE] [" usage_login_dict = {' --add': ('-s SEUSER', '-r RANGE', 'LOGIN',), ' --modify': ('-s SEUSER', '-r RANGE', 'LOGIN',), ' --delete': ('LOGIN',), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_fcontext = "semanage fcontext [-h] [-n] [-N] [-S STORE] [" usage_fcontext_dict = {' --add': ('(', '-t TYPE', '-f FTYPE', '-r RANGE', '-s SEUSER', '|', '-e EQUAL', ')', 'FILE_SPEC',), ' --delete': ('(', '-t TYPE', '-f FTYPE', '|', '-e EQUAL', ')', 'FILE_SPEC',), ' --modify': ('(', '-t TYPE', '-f FTYPE', '-r RANGE', '-s SEUSER', '|', '-e EQUAL', ')', 'FILE_SPEC',), ' --list': ('[-C]',), ' --extract': ('',), ' --deleteall': ('',)} usage_user = "semanage user [-h] [-n] [-N] [-S STORE] [" usage_user_dict = {' --add': ('(', '-L LEVEL', '-R ROLES', '-r RANGE', '-s SEUSER', 'selinux_name'')'), ' --delete': ('selinux_name',), ' --modify': ('(', '-L LEVEL', '-R ROLES', '-r RANGE', '-s SEUSER', 'selinux_name', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_port = "semanage port [-h] [-n] [-N] [-S STORE] [" usage_port_dict = {' --add': ('-t TYPE', '-p PROTOCOL', '-r RANGE', '(', 'port_name', '|', 'port_range', ')'), ' --modify': ('-t TYPE', '-p PROTOCOL', '-r RANGE', '(', 'port_name', '|', 'port_range', ')'), ' --delete': ('-p PROTOCOL', '(', 'port_name', '|', 'port_range', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_ibpkey = "semanage ibpkey [-h] [-n] [-N] [-s STORE] [" usage_ibpkey_dict = {' --add': ('-t TYPE', '-x SUBNET_PREFIX', '-r RANGE', '(', 'ibpkey_name', '|', 'pkey_range', ')'), ' --modify': ('-t TYPE', '-x SUBNET_PREFIX', '-r RANGE', '(', 'ibpkey_name', '|', 'pkey_range', ')'), ' --delete': ('-x SUBNET_PREFIX', '(', 'ibpkey_name', '|', 'pkey_range', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_ibendport = "semanage ibendport [-h] [-n] [-N] [-s STORE] [" usage_ibendport_dict = {' --add': ('-t TYPE', '-z IBDEV_NAME', '-r RANGE', '(', 'port', ')'), ' --modify': ('-t TYPE', '-z IBDEV_NAME', '-r RANGE', '(', 'port', ')'), ' --delete': ('-z IBDEV_NAME', '-r RANGE''(', 'port', ')'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_node = "semanage node [-h] [-n] [-N] [-S STORE] [" usage_node_dict = {' --add': ('-M NETMASK', '-p PROTOCOL', '-t TYPE', '-r RANGE', 'node'), ' --modify': ('-M NETMASK', '-p PROTOCOL', '-t TYPE', '-r RANGE', 'node'), ' --delete': ('-M NETMASK', '-p PROTOCOL', 'node'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_interface = "semanage interface [-h] [-n] [-N] [-S STORE] [" usage_interface_dict = {' --add': ('-t TYPE', '-r RANGE', 'interface'), ' --modify': ('-t TYPE', '-r RANGE', 'interface'), ' --delete': ('interface',), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} usage_boolean = "semanage boolean [-h] [-n] [-N] [-S STORE] [" usage_boolean_dict = {' --modify': ('(', '--on', '|', '--off', ')', 'boolean'), ' --list': ('-C',), ' --extract': ('',), ' --deleteall': ('',)} import sepolicy class CheckRole(argparse.Action): def __call__(self, parser, namespace, value, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] roles = sepolicy.get_all_roles() for v in value.split(): if v not in roles: raise ValueError("%s must be an SELinux role:\nValid roles: %s" % (v, ", ".join(roles))) newval.append(v) setattr(namespace, self.dest, newval) class seParser(argparse.ArgumentParser): def error(self, message): if len(sys.argv) == 2: self.print_help() else: self.print_usage() self.exit(2, ('%s: error: %s\n') % (self.prog, message)) class SetExportFile(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): if values: if values is not "-": try: sys.stdout = open(values, 'w') except: sys.stderr.write(traceback.format_exc()) sys.exit(1) setattr(namespace, self.dest, values) class SetImportFile(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): if values and values is not "-": try: sys.stdin = open(values, 'r') except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) setattr(namespace, self.dest, values) # define dictonary for seobject OBEJCTS object_dict = { 'login': seobject.loginRecords, 'user': seobject.seluserRecords, 'port': seobject.portRecords, 'module': seobject.moduleRecords, 'interface': seobject.interfaceRecords, 'node': seobject.nodeRecords, 'fcontext': seobject.fcontextRecords, 'boolean': seobject.booleanRecords, 'permissive': seobject.permissiveRecords, 'dontaudit': seobject.dontauditClass, 'ibpkey': seobject.ibpkeyRecords, 'ibendport': seobject.ibendportRecords } def generate_custom_usage(usage_text, usage_dict): # generate custom usage from given text and dictonary sorted_keys = [] for i in usage_dict.keys(): sorted_keys.append(i) sorted_keys.sort() for k in sorted_keys: usage_text += "%s %s |" % (k, (" ".join(usage_dict[k]))) usage_text = usage_text[:-1] + "]" usage_text = _(usage_text) return usage_text def handle_opts(args, dict, target_key): # handle conflict and required options for given dictonary # {action:[conflict_opts,require_opts]} # first we need to catch conflicts for k in args.__dict__.keys(): try: if k in dict[target_key][0] and args.__dict__[k]: print("%s option can not be used with --%s" % (target_key, k)) sys.exit(2) except KeyError: continue for k in args.__dict__.keys(): try: if k in dict[target_key][1] and not args.__dict__[k]: print("%s option is needed for %s" % (k, target_key)) sys.exit(2) except KeyError: continue def handleLogin(args): # {action:[conflict_opts,require_opts]} login_args = {'list': [('login', 'seuser'), ('')], 'add': [('locallist'), ('seuser', 'login')], 'modify': [('locallist'), ('login')], 'delete': [('locallist'), ('login')], 'extract': [('locallist', 'login', 'seuser'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, login_args, args.action) OBJECT = object_dict['login'](args) if args.action is "add": OBJECT.add(args.login, args.seuser, args.range) if args.action is "modify": OBJECT.modify(args.login, args.seuser, args.range) if args.action is "delete": OBJECT.delete(args.login) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("login %s" % (str(i))) def parser_add_store(parser, name): parser.add_argument('-S', '--store', default='', help=_("Select an alternate SELinux Policy Store to manage")) def parser_add_priority(parser, name): parser.add_argument('-P', '--priority', type=int, default=400, help=_("Select a priority for module operations")) def parser_add_noheading(parser, name): parser.add_argument('-n', '--noheading', action='store_false', default=True, help=_("Do not print heading when listing %s object types") % name) def parser_add_noreload(parser, name): parser.add_argument('-N', '--noreload', action='store_true', default=False, help=_('Do not reload policy after commit')) def parser_add_locallist(parser, name): parser.add_argument('-C', '--locallist', action='store_true', default=False, help=_("List %s local customizations") % name) def parser_add_add(parser, name): parser.add_argument('-a', '--add', dest='action', action='store_const', const='add', help=_("Add a record of the %s object type") % name) def parser_add_type(parser, name): parser.add_argument('-t', '--type', help=_('SELinux Type for the object')) def parser_add_level(parser, name): parser.add_argument('-L', '--level', default='s0', help=_('Default SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only)')) def parser_add_range(parser, name): parser.add_argument('-r', '--range', default="s0", help=_(''' MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. ''')) def parser_add_proto(parser, name): parser.add_argument('-p', '--proto', help=_(''' Protocol for the specified port (tcp|udp) or internet protocol version for the specified node (ipv4|ipv6). ''')) def parser_add_subnet_prefix(parser, name): parser.add_argument('-x', '--subnet_prefix', help=_(''' Subnet prefix for the specified infiniband ibpkey. ''')) def parser_add_ibdev_name(parser, name): parser.add_argument('-z', '--ibdev_name', help=_(''' Name for the specified infiniband end port. ''')) def parser_add_modify(parser, name): parser.add_argument('-m', '--modify', dest='action', action='store_const', const='modify', help=_("Modify a record of the %s object type") % name) def parser_add_list(parser, name): parser.add_argument('-l', '--list', dest='action', action='store_const', const='list', help=_("List records of the %s object type") % name) def parser_add_delete(parser, name): parser.add_argument('-d', '--delete', dest='action', action='store_const', const='delete', help=_("Delete a record of the %s object type") % name) def parser_add_extract(parser, name): parser.add_argument('-E', '--extract', dest='action', action='store_const', const='extract', help=_("Extract customizable commands, for use within a transaction")) def parser_add_deleteall(parser, name): parser.add_argument('-D', '--deleteall', dest='action', action='store_const', const='deleteall', help=_('Remove all %s objects local customizations') % name) def parser_add_seuser(parser, name): parser.add_argument('-s', '--seuser', default="", help=_("SELinux user name")) def setupLoginParser(subparsers): generated_usage = generate_custom_usage(usage_login, usage_login_dict) loginParser = subparsers.add_parser('login', usage=generated_usage, help=_("Manage login mappings between linux users and SELinux confined users")) parser_add_locallist(loginParser, "login") parser_add_noheading(loginParser, "login") parser_add_noreload(loginParser, "login") parser_add_store(loginParser, "login") parser_add_range(loginParser, "login") login_action = loginParser.add_mutually_exclusive_group(required=True) parser_add_add(login_action, "login") parser_add_delete(login_action, "login") parser_add_modify(login_action, "login") parser_add_list(login_action, "login") parser_add_extract(login_action, "login") parser_add_deleteall(login_action, "login") parser_add_seuser(loginParser, "login") loginParser.add_argument('login', nargs='?', default=None, help=_("login_name | %%groupname")) loginParser.set_defaults(func=handleLogin) def handleFcontext(args): fcontext_args = {'list': [('equal', 'ftype', 'seuser', 'type'), ('')], 'add': [('locallist'), ('type', 'file_spec')], 'modify': [('locallist'), ('type', 'file_spec')], 'delete': [('locallist'), ('file_spec')], 'extract': [('locallist', 'equal', 'ftype', 'seuser', 'type'), ('')], 'deleteall': [('locallist'), ('')]} # we can not use mutually for equal because we can define some actions together with equal fcontext_equal_args = {'equal': [('list', 'locallist', 'type', 'ftype', 'seuser', 'deleteall', 'extract'), ()]} if args.action and args.equal: handle_opts(args, fcontext_equal_args, "equal") else: handle_opts(args, fcontext_args, args.action) OBJECT = object_dict['fcontext'](args) if args.action is "add": if args.equal: OBJECT.add_equal(args.file_spec, args.equal) else: OBJECT.add(args.file_spec, args.type, args.ftype, args.range, args.seuser) if args.action is "modify": if args.equal: OBJECT.add_equal(args.file_spec, args.equal) else: OBJECT.modify(args.file_spec, args.type, args.ftype, args.range, args.seuser) if args.action is "delete": if args.equal: OBJECT.delete(args.file_spec, args.equal) else: OBJECT.delete(args.file_spec, args.ftype) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("fcontext %s" % str(i)) def setupFcontextParser(subparsers): ftype_help = ''' File Type. This is used with fcontext. Requires a file type as shown in the mode field by ls, e.g. use d to match only directories or f to match only regular files. The following file type options can be passed: f (regular file),d (directory),c (character device), b (block device),s (socket),l (symbolic link),p (named pipe) If you do not specify a file type, the file type will default to "all files". ''' generate_usage = generate_custom_usage(usage_fcontext, usage_fcontext_dict) fcontextParser = subparsers.add_parser('fcontext', usage=generate_usage, help=_("Manage file context mapping definitions")) parser_add_locallist(fcontextParser, "fcontext") parser_add_noheading(fcontextParser, "fcontext") parser_add_noreload(fcontextParser, "fcontext") parser_add_store(fcontextParser, "fcontext") fcontext_action = fcontextParser.add_mutually_exclusive_group(required=True) parser_add_add(fcontext_action, "fcontext") parser_add_delete(fcontext_action, "fcontext") parser_add_modify(fcontext_action, "fcontext") parser_add_list(fcontext_action, "fcontext") parser_add_extract(fcontext_action, "fcontext") parser_add_deleteall(fcontext_action, "fcontext") fcontextParser.add_argument('-e', '--equal', help=_('''Substitute target path with sourcepath when generating default label. This is used with fcontext. Requires source and target path arguments. The context labeling for the target subtree is made equivalent to that defined for the source.''')) fcontextParser.add_argument('-f', '--ftype', default="", choices=["a", "f", "d", "c", "b", "s", "l", "p"], help=_(ftype_help)) parser_add_seuser(fcontextParser, "fcontext") parser_add_type(fcontextParser, "fcontext") parser_add_range(fcontextParser, "fcontext") fcontextParser.add_argument('file_spec', nargs='?', default=None, help=_('file_spec')) fcontextParser.set_defaults(func=handleFcontext) def handleUser(args): user_args = {'list': [('selinux_name', 'seuser', 'roles'), ('')], 'add': [('locallist'), ('roles', 'selinux_name')], 'modify': [('locallist'), ('selinux_name')], 'delete': [('locallist'), ('selinux_name')], 'extract': [('locallist', 'selinux_name', 'seuser', 'role'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, user_args, args.action) OBJECT = object_dict['user'](args) if args.action is "add": OBJECT.add(args.selinux_name, args.roles, args.level, args.range, args.prefix) if args.action is "modify": OBJECT.modify(args.selinux_name, args.roles, args.level, args.range, args.prefix) if args.action is "delete": OBJECT.delete(args.selinux_name) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("user %s" % str(i)) def setupUserParser(subparsers): generated_usage = generate_custom_usage(usage_user, usage_user_dict) userParser = subparsers.add_parser('user', usage=generated_usage, help=_('Manage SELinux confined users (Roles and levels for an SELinux user)')) parser_add_locallist(userParser, "user") parser_add_noheading(userParser, "user") parser_add_noreload(userParser, "user") parser_add_store(userParser, "user") user_action = userParser.add_mutually_exclusive_group(required=True) parser_add_add(user_action, "user") parser_add_delete(user_action, "user") parser_add_modify(user_action, "user") parser_add_list(user_action, "user") parser_add_extract(user_action, "user") parser_add_deleteall(user_action, "user") parser_add_level(userParser, "user") parser_add_range(userParser, "user") userParser.add_argument('-R', '--roles', default=[], action=CheckRole, help=_(''' SELinux Roles. You must enclose multiple roles within quotes, separate by spaces. Or specify -R multiple times. ''')) userParser.add_argument('-P', '--prefix', default="user", help=argparse.SUPPRESS) userParser.add_argument('selinux_name', nargs='?', default=None, help=_('selinux_name')) userParser.set_defaults(func=handleUser) def handlePort(args): port_args = {'list': [('port', 'type', 'proto'), ('')], 'add': [('locallist'), ('type', 'port', 'proto')], 'modify': [('localist'), ('port', 'proto')], 'delete': [('locallist'), ('port', 'proto')], 'extract': [('locallist', 'port', 'type', 'proto'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, port_args, args.action) OBJECT = object_dict['port'](args) if args.action is "add": OBJECT.add(args.port, args.proto, args.range, args.type) if args.action is "modify": OBJECT.modify(args.port, args.proto, args.range, args.type) if args.action is "delete": OBJECT.delete(args.port, args.proto) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("port %s" % str(i)) def setupPortParser(subparsers): generated_usage = generate_custom_usage(usage_port, usage_port_dict) portParser = subparsers.add_parser('port', usage=generated_usage, help=_('Manage network port type definitions')) parser_add_locallist(portParser, "port") parser_add_noheading(portParser, "port") parser_add_noreload(portParser, "port") parser_add_store(portParser, "port") port_action = portParser.add_mutually_exclusive_group(required=True) parser_add_add(port_action, "port") parser_add_delete(port_action, "port") parser_add_modify(port_action, "port") parser_add_list(port_action, "port") parser_add_extract(port_action, "port") parser_add_deleteall(port_action, "port") parser_add_type(portParser, "port") parser_add_range(portParser, "port") parser_add_proto(portParser, "port") portParser.add_argument('port', nargs='?', default=None, help=_('port | port_range')) portParser.set_defaults(func=handlePort) def handlePkey(args): ibpkey_args = {'list': [('ibpkey', 'type', 'subnet_prefix'), ('')], 'add': [('locallist'), ('type', 'ibpkey', 'subnet_prefix')], 'modify': [('localist'), ('ibpkey', 'subnet_prefix')], 'delete': [('locallist'), ('ibpkey', 'subnet_prefix')], 'extract': [('locallist', 'ibpkey', 'type', 'subnet prefix'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, ibpkey_args, args.action) OBJECT = object_dict['ibpkey'](args) if args.action is "add": OBJECT.add(args.ibpkey, args.subnet_prefix, args.range, args.type) if args.action is "modify": OBJECT.modify(args.ibpkey, args.subnet_prefix, args.range, args.type) if args.action is "delete": OBJECT.delete(args.ibpkey, args.subnet_prefix) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("ibpkey %s" % str(i)) def setupPkeyParser(subparsers): generated_usage = generate_custom_usage(usage_ibpkey, usage_ibpkey_dict) ibpkeyParser = subparsers.add_parser('ibpkey', usage=generated_usage, help=_('Manage infiniband ibpkey type definitions')) parser_add_locallist(ibpkeyParser, "ibpkey") parser_add_noheading(ibpkeyParser, "ibpkey") parser_add_noreload(ibpkeyParser, "ibpkey") parser_add_store(ibpkeyParser, "ibpkey") ibpkey_action = ibpkeyParser.add_mutually_exclusive_group(required=True) parser_add_add(ibpkey_action, "ibpkey") parser_add_delete(ibpkey_action, "ibpkey") parser_add_modify(ibpkey_action, "ibpkey") parser_add_list(ibpkey_action, "ibpkey") parser_add_extract(ibpkey_action, "ibpkey") parser_add_deleteall(ibpkey_action, "ibpkey") parser_add_type(ibpkeyParser, "ibpkey") parser_add_range(ibpkeyParser, "ibpkey") parser_add_subnet_prefix(ibpkeyParser, "ibpkey") ibpkeyParser.add_argument('ibpkey', nargs='?', default=None, help=_('pkey | pkey_range')) ibpkeyParser.set_defaults(func=handlePkey) def handleIbendport(args): ibendport_args = {'list': [('ibendport', 'type', 'ibdev_name'), ('')], 'add': [('locallist'), ('type', 'ibendport', 'ibdev_name'), ('')], 'modify': [('localist'), ('ibendport', 'ibdev_name')], 'delete': [('locallist'), ('ibendport', 'ibdev_name')], 'extract': [('locallist', 'ibendport', 'type', 'ibdev_name'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, ibendport_args, args.action) OBJECT = object_dict['ibendport'](args) if args.action is "add": OBJECT.add(args.ibendport, args.ibdev_name, args.range, args.type) if args.action is "modify": OBJECT.modify(args.ibendport, args.ibdev_name, args.range, args.type) if args.action is "delete": OBJECT.delete(args.ibendport, args.ibdev_name) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("ibendport %s" % str(i)) def setupIbendportParser(subparsers): generated_usage = generate_custom_usage(usage_ibendport, usage_ibendport_dict) ibendportParser = subparsers.add_parser('ibendport', usage=generated_usage, help=_('Manage infiniband end port type definitions')) parser_add_locallist(ibendportParser, "ibendport") parser_add_noheading(ibendportParser, "ibendport") parser_add_noreload(ibendportParser, "ibendport") parser_add_store(ibendportParser, "ibendport") ibendport_action = ibendportParser.add_mutually_exclusive_group(required=True) parser_add_add(ibendport_action, "ibendport") parser_add_delete(ibendport_action, "ibendport") parser_add_modify(ibendport_action, "ibendport") parser_add_list(ibendport_action, "ibendport") parser_add_extract(ibendport_action, "ibendport") parser_add_deleteall(ibendport_action, "ibendport") parser_add_type(ibendportParser, "ibendport") parser_add_range(ibendportParser, "ibendport") parser_add_ibdev_name(ibendportParser, "ibendport") ibendportParser.add_argument('ibendport', nargs='?', default=None, help=_('ibendport')) ibendportParser.set_defaults(func=handleIbendport) def handleInterface(args): interface_args = {'list': [('interface'), ('')], 'add': [('locallist'), ('type', 'interface')], 'modify': [('locallist'), ('type', 'interface')], 'delete': [('locallist'), ('interface')], 'extract': [('locallist', 'interface', 'type'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, interface_args, args.action) OBJECT = object_dict['interface'](args) if args.action is "add": OBJECT.add(args.interface, args.range, args.type) if args.action is "modify": OBJECT.modify(args.interface, args.range, args.type) if args.action is "delete": OBJECT.delete(args.interface) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("interface %s" % str(i)) def setupInterfaceParser(subparsers): generated_usage = generate_custom_usage(usage_interface, usage_interface_dict) interfaceParser = subparsers.add_parser('interface', usage=generated_usage, help=_('Manage network interface type definitions')) parser_add_locallist(interfaceParser, "interface") parser_add_noheading(interfaceParser, "interface") parser_add_noreload(interfaceParser, "interface") parser_add_store(interfaceParser, "interface") parser_add_type(interfaceParser, "interface") parser_add_range(interfaceParser, "interface") interface_action = interfaceParser.add_mutually_exclusive_group(required=True) parser_add_add(interface_action, "interface") parser_add_delete(interface_action, "interface") parser_add_modify(interface_action, "interface") parser_add_list(interface_action, "interface") parser_add_extract(interface_action, "interface") parser_add_deleteall(interface_action, "interface") interfaceParser.add_argument('interface', nargs='?', default=None, help=_('interface_spec')) interfaceParser.set_defaults(func=handleInterface) def handleModule(args): OBJECT = seobject.moduleRecords(args) if args.action == "add": OBJECT.add(args.module_name, args.priority) if args.action == "enable": OBJECT.set_enabled(args.module_name, True) if args.action == "disable": OBJECT.set_enabled(args.module_name, False) if args.action == "remove": OBJECT.delete(args.module_name, args.priority) if args.action is "deleteall": OBJECT.deleteall() if args.action == "list": OBJECT.list(args.noheading, args.locallist) if args.action is "extract": for i in OBJECT.customized(): print("module %s" % str(i)) def setupModuleParser(subparsers): moduleParser = subparsers.add_parser('module', help=_('Manage SELinux policy modules')) parser_add_noheading(moduleParser, "module") parser_add_noreload(moduleParser, "module") parser_add_store(moduleParser, "module") parser_add_locallist(moduleParser, "module") parser_add_priority(moduleParser, "module") mgroup = moduleParser.add_mutually_exclusive_group(required=True) parser_add_add(mgroup, "module") parser_add_list(mgroup, "module") parser_add_extract(mgroup, "module") parser_add_deleteall(mgroup, "module") mgroup.add_argument('-r', '--remove', dest='action', action='store_const', const='remove', help=_("Remove a module")) mgroup.add_argument('-d', '--disable', dest='action', action='store_const', const='disable', help=_("Disable a module")) mgroup.add_argument('-e', '--enable', dest='action', action='store_const', const='enable', help=_("Enable a module")) moduleParser.add_argument('module_name', nargs='?', default=None, help=_('Name of the module to act on')) moduleParser.set_defaults(func=handleModule) def handleNode(args): node_args = {'list': [('node', 'type', 'proto', 'netmask'), ('')], 'add': [('locallist'), ('type', 'node', 'proto', 'netmask')], 'modify': [('locallist'), ('node', 'netmask', 'proto')], 'delete': [('locallist'), ('node', 'netmask', 'prototype')], 'extract': [('locallist', 'node', 'type', 'proto', 'netmask'), ('')], 'deleteall': [('locallist'), ('')]} handle_opts(args, node_args, args.action) OBJECT = object_dict['node'](args) if args.action is "add": OBJECT.add(args.node, args.netmask, args.proto, args.range, args.type) if args.action is "modify": OBJECT.modify(args.node, args.netmask, args.proto, args.range, args.type) if args.action is "delete": OBJECT.delete(args.node, args.netmask, args.proto) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("node %s" % str(i)) def setupNodeParser(subparsers): generated_usage = generate_custom_usage(usage_node, usage_node_dict) nodeParser = subparsers.add_parser('node', usage=generated_usage, help=_('Manage network node type definitions')) parser_add_locallist(nodeParser, "node") parser_add_noheading(nodeParser, "node") parser_add_noreload(nodeParser, "node") parser_add_store(nodeParser, "node") node_action = nodeParser.add_mutually_exclusive_group(required=True) parser_add_add(node_action, "node") parser_add_delete(node_action, "node") parser_add_modify(node_action, "node") parser_add_list(node_action, "node") parser_add_extract(node_action, "node") parser_add_deleteall(node_action, "node") nodeParser.add_argument('-M', '--netmask', help=_('Network Mask')) parser_add_type(nodeParser, "node") parser_add_range(nodeParser, "node") parser_add_proto(nodeParser, "node") nodeParser.add_argument('node', nargs='?', default=None, help=_('node')) nodeParser.set_defaults(func=handleNode) def handleBoolean(args): boolean_args = {'list': [('state', 'boolean'), ('')], 'modify': [('localist'), ('boolean', 'state')], 'extract': [('locallist', 'state', 'boolean'), ('')], 'deleteall': [('locallist'), ('')], 'state': [('locallist', 'list', 'extract', 'deleteall'), ('modify')]} handle_opts(args, boolean_args, args.action) OBJECT = object_dict['boolean'](args) if args.action is "modify": if args.boolean: OBJECT.modify(args.boolean, args.state, False) if args.action is "list": OBJECT.list(args.noheading, args.locallist) if args.action is "deleteall": OBJECT.deleteall() if args.action is "extract": for i in OBJECT.customized(): print("boolean %s" % str(i)) def setupBooleanParser(subparsers): generated_usage = generate_custom_usage(usage_boolean, usage_boolean_dict) booleanParser = subparsers.add_parser('boolean', usage=generated_usage, help=_('Manage booleans to selectively enable functionality')) parser_add_locallist(booleanParser, "boolean") parser_add_noheading(booleanParser, "boolean") parser_add_noreload(booleanParser, "boolean") parser_add_store(booleanParser, "boolean") booleanParser.add_argument('boolean', nargs="?", default=None, help=_('boolean')) boolean_action = booleanParser.add_mutually_exclusive_group(required=True) #add_add(boolean_action) parser_add_modify(boolean_action, "boolean") parser_add_list(boolean_action, "boolean") parser_add_extract(boolean_action, "boolean") parser_add_deleteall(boolean_action, "boolean") booleanGroup = booleanParser.add_mutually_exclusive_group(required=False) booleanGroup.add_argument('-1', '--on', dest='state', action='store_const', const='on', help=_('Enable the boolean')) booleanGroup.add_argument('-0', '--off', dest='state', action='store_const', const='off', help=_('Disable the boolean')) booleanParser.set_defaults(func=handleBoolean) def handlePermissive(args): OBJECT = object_dict['permissive'](args) if args.action is "list": OBJECT.list(args.noheading) elif args.type is not None: if args.action is "add": OBJECT.add(args.type) if args.action is "delete": OBJECT.delete(args.type) else: args.parser.print_usage(sys.stderr) sys.stderr.write(_('semanage permissive: error: the following argument is required: type\n')) sys.exit(1) def setupPermissiveParser(subparsers): permissiveParser = subparsers.add_parser('permissive', help=_('Manage process type enforcement mode')) pgroup = permissiveParser.add_mutually_exclusive_group(required=True) parser_add_add(pgroup, "permissive") parser_add_delete(pgroup, "permissive") parser_add_list(pgroup, "permissive") #TODO: probably should be also added => need to implement own option handling #parser_add_deleteall(pgroup) parser_add_noheading(permissiveParser, "permissive") parser_add_noreload(permissiveParser, "permissive") parser_add_store(permissiveParser, "permissive") permissiveParser.add_argument('type', nargs='?', default=None, help=_('type')) permissiveParser.set_defaults(func=handlePermissive) permissiveParser.set_defaults(parser=permissiveParser) def handleDontaudit(args): OBJECT = object_dict['dontaudit'](args) OBJECT.toggle(args.action) def setupDontauditParser(subparsers): dontauditParser = subparsers.add_parser('dontaudit', help=_('Disable/Enable dontaudit rules in policy')) parser_add_noreload(dontauditParser, "dontaudit") parser_add_store(dontauditParser, "dontaudit") dontauditParser.add_argument('action', choices=["on", "off"]) dontauditParser.set_defaults(func=handleDontaudit) def handleExport(args): manageditems = ["boolean", "login", "interface", "user", "port", "node", "fcontext", "module"] for i in manageditems: print("%s -D" % i) for i in manageditems: OBJECT = object_dict[i](args) for c in OBJECT.customized(): print("%s %s" % (i, str(c))) sys.exit(0) def setupExportParser(subparsers): exportParser = subparsers.add_parser('export', help=_('Output local customizations')) parser_add_store(exportParser, "export") exportParser.add_argument('-f', '--output_file', dest='output_file', action=SetExportFile, help=_('Output file')) exportParser.set_defaults(func=handleExport) import re def mkargv(line): dquote = "\"" squote = "\'" l = line.split() ret = [] i = 0 while i < len(l): cnt = len(re.findall(dquote, l[i])) if cnt > 1: ret.append(l[i].strip(dquote)) i = i + 1 continue if cnt == 1: quote = [l[i].strip(dquote)] i = i + 1 while i < len(l) and dquote not in l[i]: quote.append(l[i]) i = i + 1 quote.append(l[i].strip(dquote)) ret.append(" ".join(quote)) i = i + 1 continue cnt = len(re.findall(squote, l[i])) if cnt > 1: ret.append(l[i].strip(squote)) i = i + 1 continue if cnt == 1: quote = [l[i].strip(squote)] i = i + 1 while i < len(l) and squote not in l[i]: quote.append(l[i]) i = i + 1 quote.append(l[i].strip(squote)) ret.append(" ".join(quote)) i = i + 1 continue ret.append(l[i]) i = i + 1 return ret def handleImport(args): trans = seobject.semanageRecords(args) trans.start() for l in sys.stdin.readlines(): if len(l.strip()) == 0: continue try: commandParser = createCommandParser() args = commandParser.parse_args(mkargv(l)) args.func(args) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: sys.exit(0) trans.finish() def setupImportParser(subparsers): importParser = subparsers.add_parser('import', help=_('Import local customizations')) parser_add_noreload(importParser, "import") parser_add_store(importParser, "import") importParser.add_argument('-f', '--input_file', dest='input_file', action=SetImportFile, help=_('Input file')) importParser.set_defaults(func=handleImport) def createCommandParser(): commandParser = seParser(prog='semanage', formatter_class=argparse.ArgumentDefaultsHelpFormatter, description='''semanage is used to configure certain elements of SELinux policy with-out requiring modification to or recompilation from policy source.''') #To add a new subcommand define the parser for it in a function above and call it here. subparsers = commandParser.add_subparsers(dest='subcommand') subparsers.required = True setupImportParser(subparsers) setupExportParser(subparsers) setupLoginParser(subparsers) setupUserParser(subparsers) setupPortParser(subparsers) setupPkeyParser(subparsers) setupIbendportParser(subparsers) setupInterfaceParser(subparsers) setupModuleParser(subparsers) setupNodeParser(subparsers) setupFcontextParser(subparsers) setupBooleanParser(subparsers) setupPermissiveParser(subparsers) setupDontauditParser(subparsers) return commandParser def make_io_args(args): # import/export backward compability args_origin = ["-S", "-o", "-i", "targeted", "minimum", "mls"] args_file = [] args_ie = [] args_subcommand = [] for i in args: if i == "-o": args_subcommand = ["export"] continue if i == "-i": args_subcommand = ["import"] continue if i not in args_origin: args_file = ["-f", i] continue args_ie.append(i) return args_subcommand + args_ie + args_file def make_args(sys_args): args = [] if "-o" in sys_args[1:] or "-i" in sys_args[1:]: args = make_io_args(sys_args[1:]) else: args = sys_args[1:] return args def do_parser(): try: commandParser = createCommandParser() args = commandParser.parse_args(make_args(sys.argv)) args.func(args) sys.exit(0) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: sys.exit(0) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[0])) sys.exit(1) except KeyError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[0])) sys.exit(1) except OSError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[1])) sys.exit(1) except RuntimeError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, e.args[0])) sys.exit(1) if __name__ == '__main__': do_parser() selinux-python-2.8/semanage/semanage-bash-completion.sh000066400000000000000000000146521330160122500233500ustar00rootroot00000000000000# This file is part of systemd. # # Copyright 2011-2013 Dan Walsh # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # systemd is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with systemd; If not, see . __contains_word () { local word=$1; shift for w in $*; do [[ $w = $word ]] && return 0; done return 1 } ALL_OPTS='-l --list -S -o -n --noheading -h --help' MANAGED_OPTS='-a --add -m --modify -d --delete -D --deleteall -C --locallist ' __get_all_stores () { dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1 } __get_all_ftypes () { echo '-- -d -c -b -s -l -p' } __get_all_users () { seinfo -u 2> /dev/null | tail -n +3 } __get_all_types () { seinfo -t 2> /dev/null | tail -n +3 } __get_all_port_types () { seinfo -aport_type -x 2>/dev/null | tail -n +2 } __get_all_domains () { seinfo -adomain -x 2>/dev/null | tail -n +2 } __get_all_node_types () { seinfo -anode_type -x 2>/dev/null | tail -n +2 } __get_all_file_types () { seinfo -afile_type -x 2>/dev/null | tail -n +2 } __get_all_roles () { seinfo -r 2> /dev/null | tail -n +3 } __get_all_stores () { dir -1 -F /etc/selinux/ | grep '/' | cut -d'/' -f 1 } __get_import_opts () { echo '$ALL_OPTS --f --input_file' ; } __get_export_opts () { echo '$ALL_OPTS --f --output_file' ; } __get_boolean_opts () { echo '$ALL_OPTS --on -off -1 -0' ; } __get_user_opts () { echo '$ALL_OPTS $MANAGED_OPTS -L --level -r --range -R --role '; } __get_login_opts () { echo '$ALL_OPTS $MANAGED_OPTS -s --seuser -r --range'; } __get_port_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type -r --range -p --proto'; } __get_interface_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type '; } __get_node_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type -M --mask -p --proto'; } __get_fcontext_opts () { echo '$ALL_OPTS $MANAGED_OPTS -t --type -e --equal -f --ftype '; } __get_module_opts () { echo '$ALL_OPTS $MANAGED_OPTS --enable --disable '; } __get_dontaudit_opts () { echo '-S on off' ; } __get_permissive_opts () { echo '$ALL_OPTS -a --add -d --delete' ; } _semanage () { local command=${COMP_WORDS[1]} local cur=${COMP_WORDS[COMP_CWORD]} prev=${COMP_WORDS[COMP_CWORD-1]} local verb comps local -A VERBS=( [BOOLEAN]='boolean' [DONTAUDIT]='dontaudit' [EXPORT]='export' [FCONTEXT]='fcontext' [IMPORT]='import' [INTERFACE]='interface' [LOGIN]='login' [MODULE]='module' [NODE]='node' [PERMISSIVE]='permissive' [PORT]='port' [USER]='user' ) if [ "$prev" = "-a" -a "$command" = "permissive" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domains ) " -- "$cur") ) return 0 fi if [ "$verb" = "" -a "$prev" = "semanage" ]; then comps="${VERBS[*]}" elif [ "$verb" = "" -a "$prev" = "-S" -o "$prev" = "--store" ]; then COMPREPLY=( $(compgen -W "$( __get_all_stores ) " -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-p" -o "$prev" = "--proto" ]; then COMPREPLY=( $(compgen -W "tcp udp" -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-R" -o "$prev" = "-r" -o "$prev" = "--role" ]; then if [ "$command" != "user" -o "$prev" != "-r" ]; then COMPREPLY=( $(compgen -W "$( __get_all_roles ) " -- "$cur") ) return 0 else return 0 fi elif [ "$verb" = "" -a "$prev" = "-s" -o "$prev" = "--seuser" ]; then COMPREPLY=( $(compgen -W "$( __get_all_users ) " -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-f" -o "$prev" = "--ftype" ]; then COMPREPLY=( $(compgen -W "$( __get_all_ftypes ) " -- "$cur") ) return 0 elif [ "$verb" = "" -a "$prev" = "-t" -o "$prev" = "--types" ]; then if [ "$command" = "port" ]; then COMPREPLY=( $(compgen -W "$( __get_all_port_types ) " -- "$cur") ) return 0 fi if [ "$command" = "fcontext" ]; then COMPREPLY=( $(compgen -W "$( __get_all_file_types ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W "$( __get_all_types ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[LOGIN]} ; then COMPREPLY=( $(compgen -W "$( __get_login_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[USER]} ; then COMPREPLY=( $(compgen -W "$( __get_user_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[PORT]} ; then COMPREPLY=( $(compgen -W "$( __get_port_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[INTERFACE]} ; then COMPREPLY=( $(compgen -W "$( __get_interface_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[MODULE]} ; then COMPREPLY=( $(compgen -W "$( __get_module_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[NODE]} ; then COMPREPLY=( $(compgen -W "$( __get_node_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[FCONTEXT]} ; then COMPREPLY=( $(compgen -W "$( __get_fcontext_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[BOOLEAN]} ; then COMPREPLY=( $(compgen -W "$( __get_boolean_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[PERMISSIVE]} ; then COMPREPLY=( $(compgen -W "$( __get_permissive_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[DONTAUDIT]} ; then COMPREPLY=( $(compgen -W "$( __get_dontaudit_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[IMPORT]} ; then COMPREPLY=( $(compgen -W "$( __get_import_opts ) " -- "$cur") ) return 0 elif __contains_word "$command" ${VERBS[EXPORT]} ; then COMPREPLY=( $(compgen -W "$( __get_export_opts ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W "$comps" -- "$cur") ) return 0 } complete -F _semanage semanage selinux-python-2.8/semanage/semanage-boolean.8000066400000000000000000000032401330160122500214270ustar00rootroot00000000000000.TH "semanage-boolean" "8" "20130617" "" "" .SH "NAME" semanage\-boolean \- SELinux Policy Management boolean tool .SH "SYNOPSIS" .B semanage boolean [\-h] [\-n] [\-N] [\-S STORE] [ \-\-extract | \-\-deleteall | \-\-list [\-C] | \-\-modify ( \-\-on | \-\-off ) boolean ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage boolean command controls the settings of booleans in SELinux policy. booleans are if\-then\-else rules written in SELinux Policy. They can be used to customize the way that SELinux Policy rules effect a confined domain. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-1, \-\-on Enable the boolean .TP .I \-0, \-\-off Disable the boolean .SH EXAMPLE .nf Turn on the apache can send mail boolan # semanage boolean \-m \-\-on httpd_can_sendmail List customized booleans # semanage boolean \-l \-C .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR setsebool (8), .BR getsebool (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-dontaudit.8000066400000000000000000000023011330160122500220000ustar00rootroot00000000000000.TH "semanage-dontaudit" "8" "20130617" "" "" .SH "NAME" .B semanage\-dontaudit \- SELinux Policy Management dontaudit tool .SH "SYNOPSIS" .B semanage dontaudit [\-h] [\-S STORE] [\-N] {on,off} .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage dontaudit toggles whether or not dontaudit rules will be in the policy. Policy writers use dontaudit rules to cause confined applications to use alternative paths. Dontaudit rules are denied but not reported in the logs. Some times dontaudit rules can cause bugs in applications but policy writers will not realize it since the AVC is not audited. Turning off dontaudit rules with this command to see if the kernel is blocking an access. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-N, \-\-noreload Do not reload the policy after commit .SH EXAMPLE .nf Turn off dontaudit rules # semanage dontaudit off .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-export.8000066400000000000000000000021671330160122500213400ustar00rootroot00000000000000.TH "semanage-export" "8" "20130617" "" "" .SH "NAME" .B semanage\-export \- SELinux Policy Management import tool .SH "SYNOPSIS" .B semanage export [\-h] [\-S STORE] [\-f OUTPUT_FILE] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a whole group of semanage commands within a file and apply them to a machine in a single transaction. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-f OUTPUT_FILE, \-\-output_file OUTPUT_FILE Output file .SH EXAMPLE .nf Import semanage modifications from another machine # semanage export \-f semanage.mods # scp semanage.mod remotemachine: # ssh remotemachine # semanage import \-f semanage.mods .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semanage-import (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-fcontext.8000066400000000000000000000063721330160122500216530ustar00rootroot00000000000000.TH "semanage-fcontext" "8" "20130617" "" "" .SH "NAME" semanage\-fcontext \- SELinux Policy Management file context tool .SH "SYNOPSIS" .B semanage fcontext [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) | \-\-delete ( \-t TYPE \-f FTYPE | \-e EQUAL ) FILE_SPEC ) | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-t TYPE \-f FTYPE \-r RANGE \-s SEUSER | \-e EQUAL ) FILE_SPEC ) ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage fcontext is used to manage the default file system labeling on an SELinux system. This command maps file paths using regular expressions to SELinux labels. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-C, \-\-locallist List local customizations .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-e EQUAL, \-\-equal EQUAL Substitute target path with sourcepath when generating default label. This is used with fcontext. Requires source and target path arguments. The context labeling for the target subtree is made equivalent to that defined for the source. .TP .I \-f [{a,f,d,c,b,s,l,p}], \-\-ftype [{a,f,d,c,b,s,l,p}] File Type. This is used with fcontext. Requires a file type as shown in the mode field by ls, e.g. use 'd' to match only directories or 'f' to match only regular files. The following file type options can be passed: f (regular file),d (directory),c (character device), b (block device),s (socket),l (symbolic link),p (named pipe). If you do not specify a file type, the file type will default to "all files". .TP .I \-s SEUSER, \-\-seuser SEUSER SELinux user name .TP .I \-t TYPE, \-\-type TYPE SELinux Type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .SH EXAMPLE .nf .I remember to run restorecon after you set the file context Add file-context for everything under /web # semanage fcontext \-a \-t httpd_sys_content_t "/web(/.*)?" # restorecon \-R \-v /web Substitute /home1 with /home when setting file context # semanage fcontext \-a \-e /home /home1 # restorecon \-R \-v /home1 For home directories under top level directory, for example /disk6/home, execute the following commands. # semanage fcontext \-a \-t home_root_t "/disk6" # semanage fcontext \-a \-e /home /disk6/home # restorecon \-R \-v /disk6 .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-ibendport.8000066400000000000000000000040401330160122500217750ustar00rootroot00000000000000.TH "semanage-ibendport" "8" "20170508" "" "" .SH "NAME" .B semanage\-ibendport \- SELinux Policy Management ibendport mapping tool .SH "SYNOPSIS" .B semanage ibendport [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-z IBDEV_NAME \-r RANGE port | \-\-delete \-z IBDEV_NAME port | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-z IBDEV_NAME \-r RANGE port ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibendport controls the ibendport number to ibendport type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-z IBDEV_NAME, \-\-ibdev_name IBDEV_NAME The name of the infiniband device for the port to be labeled. (ex. mlx5_0) .SH EXAMPLE .nf List all ibendport definitions # semanage ibendport \-l Label mlx4_0 port 2. # semanage ibendport \-a \-t allowed_ibendport_t \-z mlx4_0 2 .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Jurgens selinux-python-2.8/semanage/semanage-ibpkey.8000066400000000000000000000041721330160122500213000ustar00rootroot00000000000000.TH "semanage-ibpkey" "8" "20170508" "" "" .SH "NAME" .B semanage\-ibpkey \- SELinux Policy Management ibpkey mapping tool .SH "SYNOPSIS" .B semanage ibpkey [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range | \-\-delete \-x SUBNET_PREFIX ibpkey_name | ibpkey_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-x SUBNET_PREFIX \-r RANGE ibpkey_name | ibpkey_range ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage ibpkey controls the ibpkey number to ibpkey type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-x SUBNET_PREFIX, \-\-subnet_prefix SUBNET_PREFIX Subnet prefix for the specified pkey or range of pkeys. .SH EXAMPLE .nf List all ibpkey definitions # semanage ibpkey \-l Label pkey 0x8FFF (limited membership default pkey) as a default pkey type # semanage ibpkey \-a \-t default_ibpkey_t \-x fe80:: 0x8FFF .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Jurgens selinux-python-2.8/semanage/semanage-import.8000066400000000000000000000021271330160122500213250ustar00rootroot00000000000000.TH "semanage-import" "8" "20130617" "" "" .SH "NAME" .B semanage\-import \- SELinux Policy Management import tool .SH "SYNOPSIS" .B semanage import [\-h] [\-N] [\-S STORE] [\-f INPUT_FILE] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a whole group of semanage commands within a file and apply them to a machine in a single transaction. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-f INPUT_FILE, \-\-input_file INPUT_FILE Input file .SH EXAMPLE .nf Import semanage modifications from another machine # semanage import \-f semanage.mods .SH "SEE ALSO" .B selinux (8), .B semanage (8), .B semanage-export (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-interface.8000066400000000000000000000034261330160122500217560ustar00rootroot00000000000000.TH "semanage-interface" "8" "20130617" "" "" .SH "NAME" .B semanage\-interface \- SELinux Policy Management network interface tool .SH "SYNOPSIS" .B semanage interface [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-r RANGE interface | \-\-delete interface | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-r RANGE interface ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage interface controls the labels assigned to network interfaces. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .SH EXAMPLE .nf list all interface definitions # semanage interface \-l .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-login.8000066400000000000000000000044511330160122500211250ustar00rootroot00000000000000.TH "semanage-login" "8" "20130617" "" "" .SH "NAME" .B semanage\-login \- SELinux Policy Management linux user to SELinux User mapping tool .SH "SYNOPSIS" .B semanage login [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-s SEUSER \-r RANGE LOGIN | \-\-delete LOGIN | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-s SEUSER \-r RANGE LOGIN ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage login controls the mapping between a Linux User and the SELinux User. It can be used to turn on confined users. For example you could define that a particular user or group of users will login to a system as the user_u user. Prefix the group name with a '%' sign to indicate a group name. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-C, \-\-locallist List local customizations .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-s SEUSER, \-\-seuser SEUSER SELinux user name .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .SH EXAMPLE .nf Modify the default user on the system to the guest_u user # semanage login \-m \-s guest_u __default__ Assign gijoe user on an MLS machine a range and to the staff_u user # semanage login \-a \-s staff_u \-rSystemLow-Secret gijoe Assign all users in the engineering group to the staff_u user # semanage login \-a \-s staff_u %engineering .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semanage-user (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-module.8000066400000000000000000000027771330160122500213130ustar00rootroot00000000000000.TH "semanage-module" "8" "20130617" "" "" .SH "NAME" .B semanage\-module \- SELinux Policy Management module mapping tool .SH "SYNOPSIS" .B semanage module [\-h] [\-n] [\-N] [\-S STORE] (\-a | \-r | \-e | \-d | \-\-extract | \-\-list [\-C] | \-\-deleteall) [module_name] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage module installs, removes, disables SELinux Policy modules. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-a, \-\-add Install specified module .TP .I \-r, \-\-remove Remove specified module .TP .I \-d \-\-disable Disable specified module .TP .I \-e \-\-enable Enable specified module .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-l, \-\-list List records of the specified object type .TP .I \-C, \-\-locallist List local customizations .SH EXAMPLE .nf List all modules # semanage module \-l Disable unconfined module # semanage module \-\-disable unconfined Install custom apache policy module # semanage module \-a myapache .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semodule (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-node.8000066400000000000000000000034761330160122500207500ustar00rootroot00000000000000.TH "semanage-node" "8" "20130617" "" "" .SH "NAME" .B semanage\-node \- SELinux Policy Management node mapping tool .SH "SYNOPSIS" .B semanage node [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node | \-\-delete \-M NETMASK \-p PROTOCOL node | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-M NETMASK \-p PROTOCOL \-t TYPE \-r RANGE node ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage controls the ipaddress to node type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-M NETMASK, \-\-netmask NETMASK Network Mask .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-p PROTO, \-\-proto PROTO Protocol for the specified port (tcp|udp) or internet protocol version for the specified node (ipv4|ipv6). selinux-python-2.8/semanage/semanage-permissive.8000066400000000000000000000023321330160122500221770ustar00rootroot00000000000000.TH "semanage-permissive" "8" "20130617" "" "" .SH "NAME" .B semanage\-permissive \- SELinux Policy Management permissive mapping tool .SH "SYNOPSIS" .B semanage permissive [\-h] (\-a | \-d | \-l) [\-n] [\-N] [\-S STORE] [type] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage permissive adds or removes a SELinux Policy permissive module. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload the policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .SH EXAMPLE .nf List all permissive modules # semanage permissive \-l Make httpd_t (Web Server) a permissive domain # semanage permissive \-a httpd_t .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-port.8000066400000000000000000000042101330160122500207720ustar00rootroot00000000000000.TH "semanage-port" "8" "20130617" "" "" .SH "NAME" .B semanage\-port \- SELinux Policy Management port mapping tool .SH "SYNOPSIS" .B semanage port [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range | \-\-delete \-p PROTOCOL port_name | port_range | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify \-t TYPE \-p PROTOCOL \-r RANGE port_name | port_range ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage port controls the port number to port type definitions. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-t TYPE, \-\-type TYPE SELinux type for the object .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-p PROTO, \-\-proto PROTO Protocol for the specified port (tcp|udp) or internet protocol version for the specified node (ipv4|ipv6). .SH EXAMPLE .nf List all port definitions # semanage port \-l Allow Apache to listen on tcp port 81 # semanage port \-a \-t http_port_t \-p tcp 81 Allow sshd to listen on tcp port 8991 # semanage port \-a \-t ssh_port_t \-p tcp 8991 .SH "SEE ALSO" .BR selinux (8), .BR semanage (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage-user.8000066400000000000000000000043731330160122500207760ustar00rootroot00000000000000.TH "semanage-user" "8" "20130617" "" "" .SH "NAME" .B semanage\-user \- SELinux Policy Management SELinux User mapping tool .SH "SYNOPSIS" .B semanage user [\-h] [\-n] [\-N] [\-S STORE] [ \-\-add ( \-L LEVEL \-R ROLES \-r RANGE \-s SEUSER selinux_name) | \-\-delete selinux_name | \-\-deleteall | \-\-extract | \-\-list [\-C] | \-\-modify ( \-L LEVEL \-R ROLES \-r RANGE \-s SEUSER selinux_name ) ] .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage user controls the mapping between an SELinux User and the roles and MLS/MCS levels. .SH "OPTIONS" .TP .I \-h, \-\-help show this help message and exit .TP .I \-n, \-\-noheading Do not print heading when listing the specified object type .TP .I \-N, \-\-noreload Do not reload policy after commit .TP .I \-S STORE, \-\-store STORE Select an alternate SELinux Policy Store to manage .TP .I \-C, \-\-locallist List local customizations .TP .I \-a, \-\-add Add a record of the specified object type .TP .I \-d, \-\-delete Delete a record of the specified object type .TP .I \-m, \-\-modify Modify a record of the specified object type .TP .I \-l, \-\-list List records of the specified object type .TP .I \-E, \-\-extract Extract customizable commands, for use within a transaction .TP .I \-D, \-\-deleteall Remove all local customizations .TP .I \-L LEVEL, \-\-level LEVEL Default SELinux Level for SELinux user, s0 Default. (MLS/MCS Systems only) .TP .I \-r RANGE, \-\-range RANGE MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login mapping defaults to the SELinux user record range. SELinux Range for SELinux user defaults to s0. .TP .I \-R [ROLES], \-\-roles [ROLES] SELinux Roles. You must enclose multiple roles within quotes, separate by spaces. Or specify \-R multiple times. .SH EXAMPLE .nf List SELinux users # semanage user \-l Modify groups for staff_u user # semanage user \-m \-R "system_r unconfined_r staff_r" staff_u Add level for TopSecret Users # semanage user \-a \-R "staff_r" \-rs0\-TopSecret topsecret_u .SH "SEE ALSO" .BR selinux (8), .BR semanage (8), .BR semanage\-login (8) .SH "AUTHOR" This man page was written by Daniel Walsh selinux-python-2.8/semanage/semanage.8000066400000000000000000000053061330160122500200170ustar00rootroot00000000000000.TH "semanage" "8" "20100223" "" "" .SH "NAME" semanage \- SELinux Policy Management tool .SH "SYNOPSIS" .B semanage {import,export,login,user,port,interface,module,node,fcontext,boolean,permissive,dontaudit,ibpkey,ibendport} ... .B positional arguments: .B import Import local customizations .B export Output local customizations .B login Manage login mappings between linux users and SELinux confined users .B user Manage SELinux confined users (Roles and levels for an SELinux user) .B port Manage network port type definitions .B interface Manage network interface type definitions .B module Manage SELinux policy modules .B node Manage network node type definitions .B fcontext Manage file context mapping definitions .B boolean Manage booleans to selectively enable functionality .B permissive Manage process type enforcement mode .B dontaudit Disable/Enable dontaudit rules in policy .B ibpkey Manage infiniband pkey type definitions .B ibendport Manage infiniband end port type definitions .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. This includes the mapping from Linux usernames to SELinux user identities (which controls the initial security context assigned to Linux users when they login and bounds their authorized role set) as well as security context mappings for various kinds of objects, such as network ports, interfaces, infiniband pkeys and endports, and nodes (hosts) as well as the file context mapping. See the EXAMPLES section below for some examples of common usage. Note that the semanage login command deals with the mapping from Linux usernames (logins) to SELinux user identities, while the semanage user command deals with the mapping from SELinux user identities to authorized role sets. In most cases, only the former mapping needs to be adjusted by the administrator; the latter is principally defined by the base policy and usually does not require modification. .SH "OPTIONS" .TP .I \-h, \-\-help List help information .SH "SEE ALSO" .BR selinux (8), .BR semanage-boolean (8), .BR semanage-dontaudit (8), .BR semanage-export (8), .BR semanage-fcontext (8), .BR semanage-import (8), .BR semanage-interface (8), .BR semanage-login (8), .BR semanage-module (8), .BR semanage-node (8), .BR semanage-permissive (8), .BR semanage-port (8), .BR semanage-user (8) .BR semanage-ibkey (8), .BR semanage-ibendport (8), .SH "AUTHOR" This man page was written by Daniel Walsh .br and Russell Coker . .br Examples by Thomas Bleher . usage: semanage [\-h] selinux-python-2.8/semanage/seobject.py000066400000000000000000003124341330160122500203210ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2005-2013 Red Hat # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import pwd import grp import selinux import os import re import sys import stat import socket from semanage import * PROGNAME = "policycoreutils" import sepolicy import setools from IPy import IP try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode import syslog file_types = {} file_types[""] = SEMANAGE_FCONTEXT_ALL file_types["all files"] = SEMANAGE_FCONTEXT_ALL file_types["a"] = SEMANAGE_FCONTEXT_ALL file_types["regular file"] = SEMANAGE_FCONTEXT_REG file_types["--"] = SEMANAGE_FCONTEXT_REG file_types["f"] = SEMANAGE_FCONTEXT_REG file_types["-d"] = SEMANAGE_FCONTEXT_DIR file_types["directory"] = SEMANAGE_FCONTEXT_DIR file_types["d"] = SEMANAGE_FCONTEXT_DIR file_types["-c"] = SEMANAGE_FCONTEXT_CHAR file_types["character device"] = SEMANAGE_FCONTEXT_CHAR file_types["c"] = SEMANAGE_FCONTEXT_CHAR file_types["-b"] = SEMANAGE_FCONTEXT_BLOCK file_types["block device"] = SEMANAGE_FCONTEXT_BLOCK file_types["b"] = SEMANAGE_FCONTEXT_BLOCK file_types["-s"] = SEMANAGE_FCONTEXT_SOCK file_types["socket"] = SEMANAGE_FCONTEXT_SOCK file_types["s"] = SEMANAGE_FCONTEXT_SOCK file_types["-l"] = SEMANAGE_FCONTEXT_LINK file_types["l"] = SEMANAGE_FCONTEXT_LINK file_types["symbolic link"] = SEMANAGE_FCONTEXT_LINK file_types["p"] = SEMANAGE_FCONTEXT_PIPE file_types["-p"] = SEMANAGE_FCONTEXT_PIPE file_types["named pipe"] = SEMANAGE_FCONTEXT_PIPE file_type_str_to_option = {"all files": "a", "regular file": "f", "directory": "d", "character device": "c", "block device": "b", "socket": "s", "symbolic link": "l", "named pipe": "p"} ftype_to_audit = {"": "any", "a" : "any", "b": "block", "c": "char", "d": "dir", "f": "file", "l": "symlink", "p": "pipe", "s": "socket"} try: import audit class logger: def __init__(self): self.audit_fd = audit.audit_open() self.log_list = [] self.log_change_list = [] def log(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): sep = "-" if sename != oldsename: msg += sep + "sename" sep = "," if serole != oldserole: msg += sep + "role" sep = "," if serange != oldserange: msg += sep + "range" sep = "," self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_ASSIGN, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""]) def log_remove(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): self.log_list.append([self.audit_fd, audit.AUDIT_ROLE_REMOVE, sys.argv[0], str(msg), name, 0, sename, serole, serange, oldsename, oldserole, oldserange, "", "", ""]) def log_change(self, msg): self.log_change_list.append([self.audit_fd, audit.AUDIT_USER_MAC_CONFIG_CHANGE, str(msg), "semanage", "", "", ""]) def commit(self, success): for l in self.log_list: audit.audit_log_semanage_message(*(l + [success])) for l in self.log_change_list: audit.audit_log_user_comm_message(*(l + [success])) self.log_list = [] self.log_change_list = [] except: class logger: def __init__(self): self.log_list = [] def log(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): message = " %s name=%s" % (msg, name) if sename != "": message += " sename=" + sename if oldsename != "": message += " oldsename=" + oldsename if serole != "": message += " role=" + serole if oldserole != "": message += " old_role=" + oldserole if serange != "" and serange is not None: message += " MLSRange=" + serange if oldserange != "" and oldserange is not None: message += " old_MLSRange=" + oldserange self.log_list.append(message) def log_remove(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): self.log(msg, name, sename, serole, serange, oldsename, oldserole, oldserange) def log_change(self, msg): self.log_list.append(" %s" % msg) def commit(self, success): if success == 1: message = "Successful: " else: message = "Failed: " for l in self.log_list: syslog.syslog(syslog.LOG_INFO, message + l) class nulllogger: def log(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): pass def log_remove(self, msg, name="", sename="", serole="", serange="", oldsename="", oldserole="", oldserange=""): pass def log_change(self, msg): pass def commit(self, success): pass def validate_level(raw): sensitivity = "s[0-9]*" category = "c[0-9]*" cat_range = category + r"(\." + category + ")?" categories = cat_range + r"(\," + cat_range + ")*" reg = sensitivity + "(-" + sensitivity + ")?" + "(:" + categories + ")?" return re.search("^" + reg + "$", raw) def translate(raw, prepend=1): filler = "a:b:c:" if prepend == 1: context = "%s%s" % (filler, raw) else: context = raw (rc, trans) = selinux.selinux_raw_to_trans_context(context) if rc != 0: return raw if prepend: trans = trans[len(filler):] if trans == "": return raw else: return trans def untranslate(trans, prepend=1): filler = "a:b:c:" if prepend == 1: context = "%s%s" % (filler, trans) else: context = trans (rc, raw) = selinux.selinux_trans_to_raw_context(context) if rc != 0: return trans if prepend: raw = raw[len(filler):] if raw == "": return trans else: return raw class semanageRecords: transaction = False handle = None store = None args = None def __init__(self, args = None): global handle if args: # legacy code - args was store originally if type(args) == str: self.store = args else: self.args = args self.noreload = getattr(args, "noreload", False) if not self.store: self.store = getattr(args, "store", "") self.sh = self.get_handle(self.store) rc, localstore = selinux.selinux_getpolicytype() if self.store == "" or self.store == localstore: self.mylog = logger() else: self.mylog = nulllogger() def set_reload(self, load): self.noreload = not load def get_handle(self, store): global is_mls_enabled if semanageRecords.handle: return semanageRecords.handle handle = semanage_handle_create() if not handle: raise ValueError(_("Could not create semanage handle")) if not semanageRecords.transaction and store != "": semanage_select_store(handle, store, SEMANAGE_CON_DIRECT) semanageRecords.store = store if not semanage_is_managed(handle): semanage_handle_destroy(handle) raise ValueError(_("SELinux policy is not managed or store cannot be accessed.")) rc = semanage_access_check(handle) if rc < SEMANAGE_CAN_READ: semanage_handle_destroy(handle) raise ValueError(_("Cannot read policy store.")) rc = semanage_connect(handle) if rc < 0: semanage_handle_destroy(handle) raise ValueError(_("Could not establish semanage connection")) is_mls_enabled = semanage_mls_enabled(handle) if is_mls_enabled < 0: semanage_handle_destroy(handle) raise ValueError(_("Could not test MLS enabled status")) semanageRecords.handle = handle return semanageRecords.handle def deleteall(self): raise ValueError(_("Not yet implemented")) def start(self): if semanageRecords.transaction: raise ValueError(_("Semanage transaction already in progress")) self.begin() semanageRecords.transaction = True def begin(self): if semanageRecords.transaction: return rc = semanage_begin_transaction(self.sh) if rc < 0: raise ValueError(_("Could not start semanage transaction")) def customized(self): raise ValueError(_("Not yet implemented")) def commit(self): if semanageRecords.transaction: return if self.noreload: semanage_set_reload(self.sh, 0) rc = semanage_commit(self.sh) if rc < 0: self.mylog.commit(0) raise ValueError(_("Could not commit semanage transaction")) self.mylog.commit(1) def finish(self): if not semanageRecords.transaction: raise ValueError(_("Semanage transaction not in progress")) semanageRecords.transaction = False self.commit() class moduleRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def get_all(self): l = [] (rc, mlist, number) = semanage_module_list_all(self.sh) if rc < 0: raise ValueError(_("Could not list SELinux modules")) for i in range(number): mod = semanage_module_list_nth(mlist, i) rc, name = semanage_module_info_get_name(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module name")) rc, enabled = semanage_module_info_get_enabled(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module enabled")) rc, priority = semanage_module_info_get_priority(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module priority")) rc, lang_ext = semanage_module_info_get_lang_ext(self.sh, mod) if rc < 0: raise ValueError(_("Could not get module lang_ext")) l.append((name, enabled, priority, lang_ext)) # sort the list so they are in name order, but with higher priorities coming first l.sort(key=lambda t: t[3], reverse=True) l.sort(key=lambda t: t[0]) return l def customized(self): all = self.get_all() if len(all) == 0: return return ["-d %s" % x[0] for x in [t for t in all if t[1] == 0]] def list(self, heading=1, locallist=0): all = self.get_all() if len(all) == 0: return if heading: print("\n%-25s %-9s %s\n" % (_("Module Name"), _("Priority"), _("Language"))) for t in all: if t[1] == 0: disabled = _("Disabled") else: if locallist: continue disabled = "" print("%-25s %-9s %-5s %s" % (t[0], t[2], t[3], disabled)) def add(self, file, priority): if not os.path.exists(file): raise ValueError(_("Module does not exist: %s ") % file) rc = semanage_set_default_priority(self.sh, priority) if rc < 0: raise ValueError(_("Invalid priority %d (needs to be between 1 and 999)") % priority) rc = semanage_module_install_file(self.sh, file) if rc >= 0: self.commit() def set_enabled(self, module, enable): for m in module.split(): rc, key = semanage_module_key_create(self.sh) if rc < 0: raise ValueError(_("Could not create module key")) rc = semanage_module_key_set_name(self.sh, key, m) if rc < 0: raise ValueError(_("Could not set module key name")) rc = semanage_module_set_enabled(self.sh, key, enable) if rc < 0: if enable: raise ValueError(_("Could not enable module %s") % m) else: raise ValueError(_("Could not disable module %s") % m) self.commit() def delete(self, module, priority): rc = semanage_set_default_priority(self.sh, priority) if rc < 0: raise ValueError(_("Invalid priority %d (needs to be between 1 and 999)") % priority) for m in module.split(): rc = semanage_module_remove(self.sh, m) if rc < 0 and rc != -2: raise ValueError(_("Could not remove module %s (remove failed)") % m) self.commit() def deleteall(self): l = [x[0] for x in [t for t in self.get_all() if t[1] == 0]] for m in l: self.set_enabled(m, True) class dontauditClass(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def toggle(self, dontaudit): if dontaudit not in ["on", "off"]: raise ValueError(_("dontaudit requires either 'on' or 'off'")) self.begin() semanage_set_disable_dontaudit(self.sh, dontaudit == "off") self.commit() class permissiveRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def get_all(self): l = [] (rc, mlist, number) = semanage_module_list(self.sh) if rc < 0: raise ValueError(_("Could not list SELinux modules")) for i in range(number): mod = semanage_module_list_nth(mlist, i) name = semanage_module_get_name(mod) if name and name.startswith("permissive_"): l.append(name.split("permissive_")[1]) return l def list(self, heading=1, locallist=0): all = [y["name"] for y in [x for x in sepolicy.info(sepolicy.TYPE) if x["permissive"]]] if len(all) == 0: return if heading: print("\n%-25s\n" % (_("Builtin Permissive Types"))) customized = self.get_all() for t in all: if t not in customized: print(t) if len(customized) == 0: return if heading: print("\n%-25s\n" % (_("Customized Permissive Types"))) for t in customized: print(t) def add(self, type): try: import sepolgen.module as module except ImportError: raise ValueError(_("The sepolgen python module is required to setup permissive domains.\nIn some distributions it is included in the policycoreutils-devel package.\n# yum install policycoreutils-devel\nOr similar for your distro.")) name = "permissive_%s" % type modtxt = "(typepermissive %s)" % type rc = semanage_module_install(self.sh, modtxt, len(modtxt), name, "cil") if rc >= 0: self.commit() if rc < 0: raise ValueError(_("Could not set permissive domain %s (module installation failed)") % name) def delete(self, name): for n in name.split(): rc = semanage_module_remove(self.sh, "permissive_%s" % n) if rc < 0: raise ValueError(_("Could not remove permissive domain %s (remove failed)") % name) self.commit() def deleteall(self): l = self.get_all() if len(l) > 0: all = " ".join(l) self.delete(all) class loginRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) self.oldsename = None self.oldserange = None self.sename = None self.serange = None def __add(self, name, sename, serange): rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name) if sename == "": sename = "user_u" userrec = seluserRecords(self.args) range, (rc, oldserole) = userrec.get(self.oldsename) range, (rc, serole) = userrec.get(sename) if is_mls_enabled == 1: if serange != "": serange = untranslate(serange) else: serange = range (rc, k) = semanage_seuser_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_seuser_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if exists: raise ValueError(_("Login mapping for %s is already defined") % name) if name[0] == '%': try: grp.getgrnam(name[1:]) except: raise ValueError(_("Linux Group %s does not exist") % name[1:]) else: try: pwd.getpwnam(name) except: raise ValueError(_("Linux User %s does not exist") % name) (rc, u) = semanage_seuser_create(self.sh) if rc < 0: raise ValueError(_("Could not create login mapping for %s") % name) rc = semanage_seuser_set_name(self.sh, u, name) if rc < 0: raise ValueError(_("Could not set name for %s") % name) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_seuser_set_mlsrange(self.sh, u, serange) if rc < 0: raise ValueError(_("Could not set MLS range for %s") % name) rc = semanage_seuser_set_sename(self.sh, u, sename) if rc < 0: raise ValueError(_("Could not set SELinux user for %s") % name) rc = semanage_seuser_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not add login mapping for %s") % name) semanage_seuser_key_free(k) semanage_seuser_free(u) self.mylog.log("login", name, sename=sename, serange=serange, serole=",".join(serole), oldserole=",".join(oldserole), oldsename=self.oldsename, oldserange=self.oldserange) def add(self, name, sename, serange): try: self.begin() self.__add(name, sename, serange) self.commit() except ValueError as error: self.mylog.commit(0) raise error def __modify(self, name, sename="", serange=""): rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name) if sename == "" and serange == "": raise ValueError(_("Requires seuser or serange")) userrec = seluserRecords(self.args) range, (rc, oldserole) = userrec.get(self.oldsename) if sename != "": range, (rc, serole) = userrec.get(sename) else: serole = oldserole if serange != "": self.serange = serange else: self.serange = range (rc, k) = semanage_seuser_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_seuser_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if not exists: raise ValueError(_("Login mapping for %s is not defined") % name) (rc, u) = semanage_seuser_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query seuser for %s") % name) self.oldserange = semanage_seuser_get_mlsrange(u) self.oldsename = semanage_seuser_get_sename(u) if (is_mls_enabled == 1) and (serange != ""): semanage_seuser_set_mlsrange(self.sh, u, untranslate(serange)) if sename != "": semanage_seuser_set_sename(self.sh, u, sename) self.sename = sename else: self.sename = self.oldsename rc = semanage_seuser_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not modify login mapping for %s") % name) semanage_seuser_key_free(k) semanage_seuser_free(u) self.mylog.log("login", name, sename=self.sename, serange=self.serange, serole=",".join(serole), oldserole=",".join(oldserole), oldsename=self.oldsename, oldserange=self.oldserange) def modify(self, name, sename="", serange=""): try: self.begin() self.__modify(name, sename, serange) self.commit() except ValueError as error: self.mylog.commit(0) raise error def __delete(self, name): rec, self.oldsename, self.oldserange = selinux.getseuserbyname(name) userrec = seluserRecords(self.args) range, (rc, oldserole) = userrec.get(self.oldsename) (rc, k) = semanage_seuser_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_seuser_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if not exists: raise ValueError(_("Login mapping for %s is not defined") % name) (rc, exists) = semanage_seuser_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if login mapping for %s is defined") % name) if not exists: raise ValueError(_("Login mapping for %s is defined in policy, cannot be deleted") % name) rc = semanage_seuser_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete login mapping for %s") % name) semanage_seuser_key_free(k) rec, self.sename, self.serange = selinux.getseuserbyname("__default__") range, (rc, serole) = userrec.get(self.sename) self.mylog.log_remove("login", name, sename=self.sename, serange=self.serange, serole=",".join(serole), oldserole=",".join(oldserole), oldsename=self.oldsename, oldserange=self.oldserange) def delete(self, name): try: self.begin() self.__delete(name) self.commit() except ValueError as error: self.mylog.commit(0) raise error def deleteall(self): (rc, ulist) = semanage_seuser_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list login mappings")) try: self.begin() for u in ulist: self.__delete(semanage_seuser_get_name(u)) self.commit() except ValueError as error: self.mylog.commit(0) raise error def get_all_logins(self): ddict = {} self.logins_path = selinux.selinux_policy_root() + "/logins" for path, dirs, files in os.walk(self.logins_path): if path == self.logins_path: for name in files: try: fd = open(path + "/" + name) rec = fd.read().rstrip().split(":") fd.close() ddict[name] = (rec[1], rec[2], rec[0]) except IndexError: pass return ddict def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ulist) = semanage_seuser_list_local(self.sh) else: (rc, self.ulist) = semanage_seuser_list(self.sh) if rc < 0: raise ValueError(_("Could not list login mappings")) for u in self.ulist: name = semanage_seuser_get_name(u) ddict[name] = (semanage_seuser_get_sename(u), semanage_seuser_get_mlsrange(u), "*") return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): l.append("-a -s %s -r '%s' %s" % (ddict[k][0], ddict[k][1], k)) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) ldict = self.get_all_logins() lkeys = sorted(ldict.keys()) keys = sorted(ddict.keys()) if len(keys) == 0 and len(lkeys) == 0: return if is_mls_enabled == 1: if heading: print("\n%-20s %-20s %-20s %s\n" % (_("Login Name"), _("SELinux User"), _("MLS/MCS Range"), _("Service"))) for k in keys: u = ddict[k] print("%-20s %-20s %-20s %s" % (k, u[0], translate(u[1]), u[2])) if len(lkeys): print("\nLocal customization in %s" % self.logins_path) for k in lkeys: u = ldict[k] print("%-20s %-20s %-20s %s" % (k, u[0], translate(u[1]), u[2])) else: if heading: print("\n%-25s %-25s\n" % (_("Login Name"), _("SELinux User"))) for k in keys: print("%-25s %-25s" % (k, ddict[k][0])) class seluserRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def get(self, name): (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) (rc, u) = semanage_user_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query user for %s") % name) serange = semanage_user_get_mlsrange(u) serole = semanage_user_get_roles(self.sh, u) semanage_user_key_free(k) semanage_user_free(u) return serange, serole def __add(self, name, roles, selevel, serange, prefix): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if selevel == "": selevel = "s0" else: selevel = untranslate(selevel) if len(roles) < 1: raise ValueError(_("You must add at least one role for %s") % name) (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if exists: raise ValueError(_("SELinux user %s is already defined") % name) (rc, u) = semanage_user_create(self.sh) if rc < 0: raise ValueError(_("Could not create SELinux user for %s") % name) rc = semanage_user_set_name(self.sh, u, name) if rc < 0: raise ValueError(_("Could not set name for %s") % name) for r in roles: rc = semanage_user_add_role(self.sh, u, r) if rc < 0: raise ValueError(_("Could not add role %s for %s") % (r, name)) if is_mls_enabled == 1: rc = semanage_user_set_mlsrange(self.sh, u, serange) if rc < 0: raise ValueError(_("Could not set MLS range for %s") % name) rc = semanage_user_set_mlslevel(self.sh, u, selevel) if rc < 0: raise ValueError(_("Could not set MLS level for %s") % name) rc = semanage_user_set_prefix(self.sh, u, prefix) if rc < 0: raise ValueError(_("Could not add prefix %s for %s") % (r, prefix)) (rc, key) = semanage_user_key_extract(self.sh, u) if rc < 0: raise ValueError(_("Could not extract key for %s") % name) rc = semanage_user_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not add SELinux user %s") % name) semanage_user_key_free(k) semanage_user_free(u) self.mylog.log("seuser", sename=name, serole=",".join(roles), serange=serange) def add(self, name, roles, selevel, serange, prefix): try: self.begin() self.__add(name, roles, selevel, serange, prefix) self.commit() except ValueError as error: self.mylog.commit(0) raise error def __modify(self, name, roles=[], selevel="", serange="", prefix=""): oldserole = "" oldserange = "" newroles = " ".join(roles) if prefix == "" and len(roles) == 0 and serange == "" and selevel == "": if is_mls_enabled == 1: raise ValueError(_("Requires prefix, roles, level or range")) else: raise ValueError(_("Requires prefix or roles")) (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if not exists: raise ValueError(_("SELinux user %s is not defined") % name) (rc, u) = semanage_user_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query user for %s") % name) oldserange = semanage_user_get_mlsrange(u) (rc, rlist) = semanage_user_get_roles(self.sh, u) if rc >= 0: oldserole = " ".join(rlist) if (is_mls_enabled == 1) and (serange != ""): semanage_user_set_mlsrange(self.sh, u, untranslate(serange)) if (is_mls_enabled == 1) and (selevel != ""): semanage_user_set_mlslevel(self.sh, u, untranslate(selevel)) if prefix != "": semanage_user_set_prefix(self.sh, u, prefix) if len(roles) != 0: for r in rlist: if r not in roles: semanage_user_del_role(u, r) for r in roles: if r not in rlist: semanage_user_add_role(self.sh, u, r) rc = semanage_user_modify_local(self.sh, k, u) if rc < 0: raise ValueError(_("Could not modify SELinux user %s") % name) semanage_user_key_free(k) semanage_user_free(u) role = ",".join(newroles.split()) oldserole = ",".join(oldserole.split()) self.mylog.log("seuser", sename=name, oldsename=name, serole=role, serange=serange, oldserole=oldserole, oldserange=oldserange) def modify(self, name, roles=[], selevel="", serange="", prefix=""): try: self.begin() self.__modify(name, roles, selevel, serange, prefix) self.commit() except ValueError as error: self.mylog.commit(0) raise error def __delete(self, name): (rc, k) = semanage_user_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_user_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if not exists: raise ValueError(_("SELinux user %s is not defined") % name) (rc, exists) = semanage_user_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if SELinux user %s is defined") % name) if not exists: raise ValueError(_("SELinux user %s is defined in policy, cannot be deleted") % name) (rc, u) = semanage_user_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query user for %s") % name) oldserange = semanage_user_get_mlsrange(u) (rc, rlist) = semanage_user_get_roles(self.sh, u) oldserole = ",".join(rlist) rc = semanage_user_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete SELinux user %s") % name) semanage_user_key_free(k) semanage_user_free(u) self.mylog.log_remove("seuser", oldsename=name, oldserange=oldserange, oldserole=oldserole) def delete(self, name): try: self.begin() self.__delete(name) self.commit() except ValueError as error: self.mylog.commit(0) raise error def deleteall(self): (rc, ulist) = semanage_user_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list login mappings")) try: self.begin() for u in ulist: self.__delete(semanage_user_get_name(u)) self.commit() except ValueError as error: self.mylog.commit(0) raise error def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ulist) = semanage_user_list_local(self.sh) else: (rc, self.ulist) = semanage_user_list(self.sh) if rc < 0: raise ValueError(_("Could not list SELinux users")) for u in self.ulist: name = semanage_user_get_name(u) (rc, rlist) = semanage_user_get_roles(self.sh, u) if rc < 0: raise ValueError(_("Could not list roles for user %s") % name) roles = " ".join(rlist) ddict[semanage_user_get_name(u)] = (semanage_user_get_prefix(u), semanage_user_get_mlslevel(u), semanage_user_get_mlsrange(u), roles) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): l.append("-a -L %s -r %s -R '%s' %s" % (ddict[k][1], ddict[k][2], ddict[k][3], k)) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if is_mls_enabled == 1: if heading: print("\n%-15s %-10s %-10s %-30s" % ("", _("Labeling"), _("MLS/"), _("MLS/"))) print("%-15s %-10s %-10s %-30s %s\n" % (_("SELinux User"), _("Prefix"), _("MCS Level"), _("MCS Range"), _("SELinux Roles"))) for k in keys: print("%-15s %-10s %-10s %-30s %s" % (k, ddict[k][0], translate(ddict[k][1]), translate(ddict[k][2]), ddict[k][3])) else: if heading: print("%-15s %s\n" % (_("SELinux User"), _("SELinux Roles"))) for k in keys: print("%-15s %s" % (k, ddict[k][3])) class portRecords(semanageRecords): try: valid_types = list(list(sepolicy.info(sepolicy.ATTRIBUTE, "port_type"))[0]["types"]) except RuntimeError: valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) def __genkey(self, port, proto): if proto == "tcp": proto_d = SEMANAGE_PROTO_TCP else: if proto == "udp": proto_d = SEMANAGE_PROTO_UDP else: raise ValueError(_("Protocol udp or tcp is required")) if port == "": raise ValueError(_("Port is required")) ports = port.split("-") if len(ports) == 1: high = low = int(ports[0]) else: low = int(ports[0]) high = int(ports[1]) if high > 65535: raise ValueError(_("Invalid Port")) (rc, k) = semanage_port_key_create(self.sh, low, high, proto_d) if rc < 0: raise ValueError(_("Could not create a key for %s/%s") % (proto, port)) return (k, proto_d, low, high) def __add(self, port, proto, serange, type): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if type == "": raise ValueError(_("Type is required")) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a port type") % type) (k, proto_d, low, high) = self.__genkey(port, proto) (rc, exists) = semanage_port_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if exists: raise ValueError(_("Port %s/%s already defined") % (proto, port)) (rc, p) = semanage_port_create(self.sh) if rc < 0: raise ValueError(_("Could not create port for %s/%s") % (proto, port)) semanage_port_set_proto(p, proto_d) semanage_port_set_range(p, low, high) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s/%s") % (proto, port)) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in port context for %s/%s") % (proto, port)) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in port context for %s/%s") % (proto, port)) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in port context for %s/%s") % (proto, port)) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in port context for %s/%s") % (proto, port)) rc = semanage_port_set_con(self.sh, p, con) if rc < 0: raise ValueError(_("Could not set port context for %s/%s") % (proto, port)) rc = semanage_port_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not add port %s/%s") % (proto, port)) semanage_context_free(con) semanage_port_key_free(k) semanage_port_free(p) self.mylog.log_change("resrc=port op=add lport=%s proto=%s tcontext=%s:%s:%s:%s" % (port, socket.getprotobyname(proto), "system_u", "object_r", type, serange)) def add(self, port, proto, serange, type): self.begin() self.__add(port, proto, serange, type) self.commit() def __modify(self, port, proto, serange, setype): if serange == "" and setype == "": if is_mls_enabled == 1: raise ValueError(_("Requires setype or serange")) else: raise ValueError(_("Requires setype")) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a port type") % setype) (k, proto_d, low, high) = self.__genkey(port, proto) (rc, exists) = semanage_port_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if not exists: raise ValueError(_("Port %s/%s is not defined") % (proto, port)) (rc, p) = semanage_port_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query port %s/%s") % (proto, port)) con = semanage_port_get_con(p) if is_mls_enabled == 1: if serange == "": serange = "s0" else: semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_port_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not modify port %s/%s") % (proto, port)) semanage_port_key_free(k) semanage_port_free(p) self.mylog.log_change("resrc=port op=modify lport=%s proto=%s tcontext=%s:%s:%s:%s" % (port, socket.getprotobyname(proto), "system_u", "object_r", setype, serange)) def modify(self, port, proto, serange, setype): self.begin() self.__modify(port, proto, serange, setype) self.commit() def deleteall(self): (rc, plist) = semanage_port_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the ports")) self.begin() for port in plist: proto = semanage_port_get_proto(port) proto_str = semanage_port_get_proto_str(proto) low = semanage_port_get_low(port) high = semanage_port_get_high(port) port_str = "%s-%s" % (low, high) (k, proto_d, low, high) = self.__genkey(port_str, proto_str) if rc < 0: raise ValueError(_("Could not create a key for %s") % port_str) rc = semanage_port_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the port %s") % port_str) semanage_port_key_free(k) if low == high: port_str = low self.mylog.log_change("resrc=port op=delete lport=%s proto=%s" % (port_str, socket.getprotobyname(proto_str))) self.commit() def __delete(self, port, proto): (k, proto_d, low, high) = self.__genkey(port, proto) (rc, exists) = semanage_port_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if not exists: raise ValueError(_("Port %s/%s is not defined") % (proto, port)) (rc, exists) = semanage_port_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if port %s/%s is defined") % (proto, port)) if not exists: raise ValueError(_("Port %s/%s is defined in policy, cannot be deleted") % (proto, port)) rc = semanage_port_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete port %s/%s") % (proto, port)) semanage_port_key_free(k) self.mylog.log_change("resrc=port op=delete lport=%s proto=%s" % (port, socket.getprotobyname(proto))) def delete(self, port, proto): self.begin() self.__delete(port, proto) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_port_list_local(self.sh) else: (rc, self.plist) = semanage_port_list(self.sh) if rc < 0: raise ValueError(_("Could not list ports")) for port in self.plist: con = semanage_port_get_con(port) ctype = semanage_context_get_type(con) level = semanage_context_get_mls(con) proto = semanage_port_get_proto(port) proto_str = semanage_port_get_proto_str(proto) low = semanage_port_get_low(port) high = semanage_port_get_high(port) ddict[(low, high, proto_str)] = (ctype, level) return ddict def get_all_by_type(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_port_list_local(self.sh) else: (rc, self.plist) = semanage_port_list(self.sh) if rc < 0: raise ValueError(_("Could not list ports")) for port in self.plist: con = semanage_port_get_con(port) ctype = semanage_context_get_type(con) proto = semanage_port_get_proto(port) proto_str = semanage_port_get_proto_str(proto) low = semanage_port_get_low(port) high = semanage_port_get_high(port) if (ctype, proto_str) not in ddict.keys(): ddict[(ctype, proto_str)] = [] if low == high: ddict[(ctype, proto_str)].append("%d" % low) else: ddict[(ctype, proto_str)].append("%d-%d" % (low, high)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if k[0] == k[1]: l.append("-a -t %s -p %s %s" % (ddict[k][0], k[2], k[0])) else: l.append("-a -t %s -p %s %s-%s" % (ddict[k][0], k[2], k[0], k[1])) return l def list(self, heading=1, locallist=0): ddict = self.get_all_by_type(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if heading: print("%-30s %-8s %s\n" % (_("SELinux Port Type"), _("Proto"), _("Port Number"))) for i in keys: rec = "%-30s %-8s " % i rec += "%s" % ddict[i][0] for p in ddict[i][1:]: rec += ", %s" % p print(rec) class ibpkeyRecords(semanageRecords): try: q = setools.TypeQuery(setools.SELinuxPolicy(sepolicy.get_installed_policy()), attrs=["ibpkey_type"]) valid_types = sorted(str(t) for t in q.results()) except: valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) def __genkey(self, pkey, subnet_prefix): if subnet_prefix == "": raise ValueError(_("Subnet Prefix is required")) pkeys = pkey.split("-") if len(pkeys) == 1: high = low = int(pkeys[0], 0) else: low = int(pkeys[0], 0) high = int(pkeys[1], 0) if high > 65535: raise ValueError(_("Invalid Pkey")) (rc, k) = semanage_ibpkey_key_create(self.sh, subnet_prefix, low, high) if rc < 0: raise ValueError(_("Could not create a key for %s/%s") % (subnet_prefix, pkey)) return (k, subnet_prefix, low, high) def __add(self, pkey, subnet_prefix, serange, type): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if type == "": raise ValueError(_("Type is required")) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a ibpkey type") % type) (k, subnet_prefix, low, high) = self.__genkey(pkey, subnet_prefix) (rc, exists) = semanage_ibpkey_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if exists: raise ValueError(_("ibpkey %s/%s already defined") % (subnet_prefix, pkey)) (rc, p) = semanage_ibpkey_create(self.sh) if rc < 0: raise ValueError(_("Could not create ibpkey for %s/%s") % (subnet_prefix, pkey)) semanage_ibpkey_set_subnet_prefix(self.sh, p, subnet_prefix) semanage_ibpkey_set_range(p, low, high) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in ibpkey context for %s/%s") % (subnet_prefix, pkey)) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_ibpkey_set_con(self.sh, p, con) if rc < 0: raise ValueError(_("Could not set ibpkey context for %s/%s") % (subnet_prefix, pkey)) rc = semanage_ibpkey_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not add ibpkey %s/%s") % (subnet_prefix, pkey)) semanage_context_free(con) semanage_ibpkey_key_free(k) semanage_ibpkey_free(p) def add(self, pkey, subnet_prefix, serange, type): self.begin() self.__add(pkey, subnet_prefix, serange, type) self.commit() def __modify(self, pkey, subnet_prefix, serange, setype): if serange == "" and setype == "": if is_mls_enabled == 1: raise ValueError(_("Requires setype or serange")) else: raise ValueError(_("Requires setype")) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a ibpkey type") % setype) (k, subnet_prefix, low, high) = self.__genkey(pkey, subnet_prefix) (rc, exists) = semanage_ibpkey_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if not exists: raise ValueError(_("ibpkey %s/%s is not defined") % (subnet_prefix, pkey)) (rc, p) = semanage_ibpkey_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query ibpkey %s/%s") % (subnet_prefix, pkey)) con = semanage_ibpkey_get_con(p) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_ibpkey_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not modify ibpkey %s/%s") % (subnet_prefix, pkey)) semanage_ibpkey_key_free(k) semanage_ibpkey_free(p) def modify(self, pkey, subnet_prefix, serange, setype): self.begin() self.__modify(pkey, subnet_prefix, serange, setype) self.commit() def deleteall(self): (rc, plist) = semanage_ibpkey_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the ibpkeys")) self.begin() for ibpkey in plist: (rc, subnet_prefix) = semanage_ibpkey_get_subnet_prefix(self.sh, ibpkey) low = semanage_ibpkey_get_low(ibpkey) high = semanage_ibpkey_get_high(ibpkey) pkey_str = "%s-%s" % (low, high) (k, subnet_prefix, low, high) = self.__genkey(pkey_str, subnet_prefix) if rc < 0: raise ValueError(_("Could not create a key for %s") % pkey_str) rc = semanage_ibpkey_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the ibpkey %s") % pkey_str) semanage_ibpkey_key_free(k) self.commit() def __delete(self, pkey, subnet_prefix): (k, subnet_prefix, low, high) = self.__genkey(pkey, subnet_prefix) (rc, exists) = semanage_ibpkey_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if not exists: raise ValueError(_("ibpkey %s/%s is not defined") % (subnet_prefix, pkey)) (rc, exists) = semanage_ibpkey_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibpkey %s/%s is defined") % (subnet_prefix, pkey)) if not exists: raise ValueError(_("ibpkey %s/%s is defined in policy, cannot be deleted") % (subnet_prefix, pkey)) rc = semanage_ibpkey_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete ibpkey %s/%s") % (subnet_prefix, pkey)) semanage_ibpkey_key_free(k) def delete(self, pkey, subnet_prefix): self.begin() self.__delete(pkey, subnet_prefix) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibpkey_list_local(self.sh) else: (rc, self.plist) = semanage_ibpkey_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibpkeys")) for ibpkey in self.plist: con = semanage_ibpkey_get_con(ibpkey) ctype = semanage_context_get_type(con) if ctype == "reserved_ibpkey_t": continue level = semanage_context_get_mls(con) (rc, subnet_prefix) = semanage_ibpkey_get_subnet_prefix(self.sh, ibpkey) low = semanage_ibpkey_get_low(ibpkey) high = semanage_ibpkey_get_high(ibpkey) ddict[(low, high, subnet_prefix)] = (ctype, level) return ddict def get_all_by_type(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibpkey_list_local(self.sh) else: (rc, self.plist) = semanage_ibpkey_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibpkeys")) for ibpkey in self.plist: con = semanage_ibpkey_get_con(ibpkey) ctype = semanage_context_get_type(con) (rc, subnet_prefix) = semanage_ibpkey_get_subnet_prefix(self.sh, ibpkey) low = semanage_ibpkey_get_low(ibpkey) high = semanage_ibpkey_get_high(ibpkey) if (ctype, subnet_prefix) not in ddict.keys(): ddict[(ctype, subnet_prefix)] = [] if low == high: ddict[(ctype, subnet_prefix)].append("0x%x" % low) else: ddict[(ctype, subnet_prefix)].append("0x%x-0x%x" % (low, high)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if k[0] == k[1]: l.append("-a -t %s -x %s %s" % (ddict[k][0], k[2], k[0])) else: l.append("-a -t %s -x %s %s-%s" % (ddict[k][0], k[2], k[0], k[1])) return l def list(self, heading=1, locallist=0): ddict = self.get_all_by_type(locallist) keys = ddict.keys() if len(keys) == 0: return if heading: print("%-30s %-18s %s\n" % (_("SELinux IB Pkey Type"), _("Subnet_Prefix"), _("Pkey Number"))) for i in sorted(keys): rec = "%-30s %-18s " % i rec += "%s" % ddict[i][0] for p in ddict[i][1:]: rec += ", %s" % p print(rec) class ibendportRecords(semanageRecords): try: q = setools.TypeQuery(setools.SELinuxPolicy(sepolicy.get_installed_policy()), attrs=["ibendport_type"]) valid_types = set(str(t) for t in q.results()) except: valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) def __genkey(self, ibendport, ibdev_name): if ibdev_name == "": raise ValueError(_("IB device name is required")) port = int(ibendport) if port > 255 or port < 1: raise ValueError(_("Invalid Port Number")) (rc, k) = semanage_ibendport_key_create(self.sh, ibdev_name, port) if rc < 0: raise ValueError(_("Could not create a key for ibendport %s/%s") % (ibdev_name, ibendport)) return (k, ibdev_name, port) def __add(self, ibendport, ibdev_name, serange, type): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if type == "": raise ValueError(_("Type is required")) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be an ibendport type") % type) (k, ibendport, port) = self.__genkey(ibendport, ibdev_name) (rc, exists) = semanage_ibendport_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, port)) if exists: raise ValueError(_("ibendport %s/%s already defined") % (ibdev_name, port)) (rc, p) = semanage_ibendport_create(self.sh) if rc < 0: raise ValueError(_("Could not create ibendport for %s/%s") % (ibdev_name, port)) semanage_ibendport_set_ibdev_name(self.sh, p, ibdev_name) semanage_ibendport_set_port(p, port) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s/%s") % (ibdev_name, port)) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in ibendport context for %s/%s") % (ibdev_name, port)) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_ibendport_set_con(self.sh, p, con) if rc < 0: raise ValueError(_("Could not set ibendport context for %s/%s") % (ibdev_name, port)) rc = semanage_ibendport_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not add ibendport %s/%s") % (ibdev_name, port)) semanage_context_free(con) semanage_ibendport_key_free(k) semanage_ibendport_free(p) def add(self, ibendport, ibdev_name, serange, type): self.begin() self.__add(ibendport, ibdev_name, serange, type) self.commit() def __modify(self, ibendport, ibdev_name, serange, setype): if serange == "" and setype == "": if is_mls_enabled == 1: raise ValueError(_("Requires setype or serange")) else: raise ValueError(_("Requires setype")) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be an ibendport type") % setype) (k, ibdev_name, port) = self.__genkey(ibendport, ibdev_name) (rc, exists) = semanage_ibendport_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, ibendport)) if not exists: raise ValueError(_("ibendport %s/%s is not defined") % (ibdev_name, ibendport)) (rc, p) = semanage_ibendport_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query ibendport %s/%s") % (ibdev_name, ibendport)) con = semanage_ibendport_get_con(p) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_ibendport_modify_local(self.sh, k, p) if rc < 0: raise ValueError(_("Could not modify ibendport %s/%s") % (ibdev_name, ibendport)) semanage_ibendport_key_free(k) semanage_ibendport_free(p) def modify(self, ibendport, ibdev_name, serange, setype): self.begin() self.__modify(ibendport, ibdev_name, serange, setype) self.commit() def deleteall(self): (rc, plist) = semanage_ibendport_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the ibendports")) self.begin() for ibendport in plist: (rc, ibdev_name) = semanage_ibendport_get_ibdev_name(self.sh, ibendport) port = semanage_ibendport_get_port(ibendport) (k, ibdev_name, port) = self.__genkey(str(port), ibdev_name) if rc < 0: raise ValueError(_("Could not create a key for %s/%d") % (ibdevname, port)) rc = semanage_ibendport_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the ibendport %s/%d") % (ibdev_name, port)) semanage_ibendport_key_free(k) self.commit() def __delete(self, ibendport, ibdev_name): (k, ibdev_name, port) = self.__genkey(ibendport, ibdev_name) (rc, exists) = semanage_ibendport_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, ibendport)) if not exists: raise ValueError(_("ibendport %s/%s is not defined") % (ibdev_name, ibendport)) (rc, exists) = semanage_ibendport_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if ibendport %s/%s is defined") % (ibdev_name, ibendport)) if not exists: raise ValueError(_("ibendport %s/%s is defined in policy, cannot be deleted") % (ibdev_name, ibendport)) rc = semanage_ibendport_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete ibendport %s/%s") % (ibdev_name, ibendport)) semanage_ibendport_key_free(k) def delete(self, ibendport, ibdev_name): self.begin() self.__delete(ibendport, ibdev_name) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibendport_list_local(self.sh) else: (rc, self.plist) = semanage_ibendport_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibendports")) for ibendport in self.plist: con = semanage_ibendport_get_con(ibendport) ctype = semanage_context_get_type(con) if ctype == "reserved_ibendport_t": continue level = semanage_context_get_mls(con) (rc, ibdev_name) = semanage_ibendport_get_ibdev_name(self.sh, ibendport) port = semanage_ibendport_get_port(ibendport) ddict[(port, ibdev_name)] = (ctype, level) return ddict def get_all_by_type(self, locallist=0): ddict = {} if locallist: (rc, self.plist) = semanage_ibendport_list_local(self.sh) else: (rc, self.plist) = semanage_ibendport_list(self.sh) if rc < 0: raise ValueError(_("Could not list ibendports")) for ibendport in self.plist: con = semanage_ibendport_get_con(ibendport) ctype = semanage_context_get_type(con) (rc, ibdev_name) = semanage_ibendport_get_ibdev_name(self.sh, ibendport) port = semanage_ibendport_get_port(ibendport) if (ctype, ibdev_name) not in ddict.keys(): ddict[(ctype, ibdev_name)] = [] ddict[(ctype, ibdev_name)].append("0x%x" % port) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): l.append("-a -t %s -r %s -z %s %s" % (ddict[k][0], ddict[k][1], k[1], k[0])) return l def list(self, heading=1, locallist=0): ddict = self.get_all_by_type(locallist) keys = ddict.keys() if len(keys) == 0: return if heading: print("%-30s %-18s %s\n" % (_("SELinux IB End Port Type"), _("IB Device Name"), _("Port Number"))) for i in sorted(keys): rec = "%-30s %-18s " % i rec += "%s" % ddict[i][0] for p in ddict[i][1:]: rec += ", %s" % p print(rec) class nodeRecords(semanageRecords): try: valid_types = list(list(sepolicy.info(sepolicy.ATTRIBUTE, "node_type"))[0]["types"]) except RuntimeError: valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) self.protocol = ["ipv4", "ipv6"] def validate(self, addr, mask, protocol): newaddr = addr newmask = mask newprotocol = "" if addr == "": raise ValueError(_("Node Address is required")) # verify valid comination if len(mask) == 0 or mask[0] == "/": i = IP(addr + mask) newaddr = i.strNormal(0) newmask = str(i.netmask()) if newmask == "0.0.0.0" and i.version() == 6: newmask = "::" protocol = "ipv%d" % i.version() try: newprotocol = self.protocol.index(protocol) except: raise ValueError(_("Unknown or missing protocol")) return newaddr, newmask, newprotocol def __add(self, addr, mask, proto, serange, ctype): addr, mask, proto = self.validate(addr, mask, proto) if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if ctype == "": raise ValueError(_("SELinux node type is required")) if ctype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a node type") % ctype) (rc, k) = semanage_node_key_create(self.sh, addr, mask, proto) if rc < 0: raise ValueError(_("Could not create key for %s") % addr) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) (rc, exists) = semanage_node_exists(self.sh, k) if exists: raise ValueError(_("Addr %s already defined") % addr) (rc, node) = semanage_node_create(self.sh) if rc < 0: raise ValueError(_("Could not create addr for %s") % addr) semanage_node_set_proto(node, proto) rc = semanage_node_set_addr(self.sh, node, proto, addr) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s") % addr) rc = semanage_node_set_mask(self.sh, node, proto, mask) if rc < 0: raise ValueError(_("Could not set mask for %s") % addr) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in addr context for %s") % addr) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in addr context for %s") % addr) rc = semanage_context_set_type(self.sh, con, ctype) if rc < 0: raise ValueError(_("Could not set type in addr context for %s") % addr) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in addr context for %s") % addr) rc = semanage_node_set_con(self.sh, node, con) if rc < 0: raise ValueError(_("Could not set addr context for %s") % addr) rc = semanage_node_modify_local(self.sh, k, node) if rc < 0: raise ValueError(_("Could not add addr %s") % addr) semanage_context_free(con) semanage_node_key_free(k) semanage_node_free(node) self.mylog.log_change("resrc=node op=add laddr=%s netmask=%s proto=%s tcontext=%s:%s:%s:%s" % (addr, mask, socket.getprotobyname(self.protocol[proto]), "system_u", "object_r", ctype, serange)) def add(self, addr, mask, proto, serange, ctype): self.begin() self.__add(addr, mask, proto, serange, ctype) self.commit() def __modify(self, addr, mask, proto, serange, setype): addr, mask, proto = self.validate(addr, mask, proto) if serange == "" and setype == "": raise ValueError(_("Requires setype or serange")) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a node type") % setype) (rc, k) = semanage_node_key_create(self.sh, addr, mask, proto) if rc < 0: raise ValueError(_("Could not create key for %s") % addr) (rc, exists) = semanage_node_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) if not exists: raise ValueError(_("Addr %s is not defined") % addr) (rc, node) = semanage_node_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query addr %s") % addr) con = semanage_node_get_con(node) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_node_modify_local(self.sh, k, node) if rc < 0: raise ValueError(_("Could not modify addr %s") % addr) semanage_node_key_free(k) semanage_node_free(node) self.mylog.log_change("resrc=node op=modify laddr=%s netmask=%s proto=%s tcontext=%s:%s:%s:%s" % (addr, mask, socket.getprotobyname(self.protocol[proto]), "system_u", "object_r", setype, serange)) def modify(self, addr, mask, proto, serange, setype): self.begin() self.__modify(addr, mask, proto, serange, setype) self.commit() def __delete(self, addr, mask, proto): addr, mask, proto = self.validate(addr, mask, proto) (rc, k) = semanage_node_key_create(self.sh, addr, mask, proto) if rc < 0: raise ValueError(_("Could not create key for %s") % addr) (rc, exists) = semanage_node_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) if not exists: raise ValueError(_("Addr %s is not defined") % addr) (rc, exists) = semanage_node_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if addr %s is defined") % addr) if not exists: raise ValueError(_("Addr %s is defined in policy, cannot be deleted") % addr) rc = semanage_node_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete addr %s") % addr) semanage_node_key_free(k) self.mylog.log_change("resrc=node op=delete laddr=%s netmask=%s proto=%s" % (addr, mask, socket.getprotobyname(self.protocol[proto]))) def delete(self, addr, mask, proto): self.begin() self.__delete(addr, mask, proto) self.commit() def deleteall(self): (rc, nlist) = semanage_node_list_local(self.sh) if rc < 0: raise ValueError(_("Could not deleteall node mappings")) self.begin() for node in nlist: self.__delete(semanage_node_get_addr(self.sh, node)[1], semanage_node_get_mask(self.sh, node)[1], self.protocol[semanage_node_get_proto(node)]) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ilist) = semanage_node_list_local(self.sh) else: (rc, self.ilist) = semanage_node_list(self.sh) if rc < 0: raise ValueError(_("Could not list addrs")) for node in self.ilist: con = semanage_node_get_con(node) addr = semanage_node_get_addr(self.sh, node) mask = semanage_node_get_mask(self.sh, node) proto = self.protocol[semanage_node_get_proto(node)] ddict[(addr[1], mask[1], proto)] = (semanage_context_get_user(con), semanage_context_get_role(con), semanage_context_get_type(con), semanage_context_get_mls(con)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): l.append("-a -M %s -p %s -t %s %s" % (k[1], k[2], ddict[k][2], k[0])) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if heading: print("%-18s %-18s %-5s %-5s\n" % ("IP Address", "Netmask", "Protocol", "Context")) if is_mls_enabled: for k in keys: val = '' for fields in k: val = val + '\t' + str(fields) print("%-18s %-18s %-5s %s:%s:%s:%s " % (k[0], k[1], k[2], ddict[k][0], ddict[k][1], ddict[k][2], translate(ddict[k][3], False))) else: for k in keys: print("%-18s %-18s %-5s %s:%s:%s " % (k[0], k[1], k[2], ddict[k][0], ddict[k][1], ddict[k][2])) class interfaceRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) def __add(self, interface, serange, ctype): if is_mls_enabled == 1: if serange == "": serange = "s0" else: serange = untranslate(serange) if ctype == "": raise ValueError(_("SELinux Type is required")) (rc, k) = semanage_iface_key_create(self.sh, interface) if rc < 0: raise ValueError(_("Could not create key for %s") % interface) (rc, exists) = semanage_iface_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if exists: raise ValueError(_("Interface %s already defined") % interface) (rc, iface) = semanage_iface_create(self.sh) if rc < 0: raise ValueError(_("Could not create interface for %s") % interface) rc = semanage_iface_set_name(self.sh, iface, interface) (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s") % interface) rc = semanage_context_set_user(self.sh, con, "system_u") if rc < 0: raise ValueError(_("Could not set user in interface context for %s") % interface) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in interface context for %s") % interface) rc = semanage_context_set_type(self.sh, con, ctype) if rc < 0: raise ValueError(_("Could not set type in interface context for %s") % interface) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in interface context for %s") % interface) rc = semanage_iface_set_ifcon(self.sh, iface, con) if rc < 0: raise ValueError(_("Could not set interface context for %s") % interface) rc = semanage_iface_set_msgcon(self.sh, iface, con) if rc < 0: raise ValueError(_("Could not set message context for %s") % interface) rc = semanage_iface_modify_local(self.sh, k, iface) if rc < 0: raise ValueError(_("Could not add interface %s") % interface) semanage_context_free(con) semanage_iface_key_free(k) semanage_iface_free(iface) self.mylog.log_change("resrc=interface op=add netif=%s tcontext=%s:%s:%s:%s" % (interface, "system_u", "object_r", ctype, serange)) def add(self, interface, serange, ctype): self.begin() self.__add(interface, serange, ctype) self.commit() def __modify(self, interface, serange, setype): if serange == "" and setype == "": raise ValueError(_("Requires setype or serange")) (rc, k) = semanage_iface_key_create(self.sh, interface) if rc < 0: raise ValueError(_("Could not create key for %s") % interface) (rc, exists) = semanage_iface_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if not exists: raise ValueError(_("Interface %s is not defined") % interface) (rc, iface) = semanage_iface_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query interface %s") % interface) con = semanage_iface_get_ifcon(iface) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_iface_modify_local(self.sh, k, iface) if rc < 0: raise ValueError(_("Could not modify interface %s") % interface) semanage_iface_key_free(k) semanage_iface_free(iface) self.mylog.log_change("resrc=interface op=modify netif=%s tcontext=%s:%s:%s:%s" % (interface, "system_u", "object_r", setype, serange)) def modify(self, interface, serange, setype): self.begin() self.__modify(interface, serange, setype) self.commit() def __delete(self, interface): (rc, k) = semanage_iface_key_create(self.sh, interface) if rc < 0: raise ValueError(_("Could not create key for %s") % interface) (rc, exists) = semanage_iface_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if not exists: raise ValueError(_("Interface %s is not defined") % interface) (rc, exists) = semanage_iface_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if interface %s is defined") % interface) if not exists: raise ValueError(_("Interface %s is defined in policy, cannot be deleted") % interface) rc = semanage_iface_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete interface %s") % interface) semanage_iface_key_free(k) self.mylog.log_change("resrc=interface op=delete netif=%s" % interface) def delete(self, interface): self.begin() self.__delete(interface) self.commit() def deleteall(self): (rc, ulist) = semanage_iface_list_local(self.sh) if rc < 0: raise ValueError(_("Could not delete all interface mappings")) self.begin() for i in ulist: self.__delete(semanage_iface_get_name(i)) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.ilist) = semanage_iface_list_local(self.sh) else: (rc, self.ilist) = semanage_iface_list(self.sh) if rc < 0: raise ValueError(_("Could not list interfaces")) for interface in self.ilist: con = semanage_iface_get_ifcon(interface) ddict[semanage_iface_get_name(interface)] = (semanage_context_get_user(con), semanage_context_get_role(con), semanage_context_get_type(con), semanage_context_get_mls(con)) return ddict def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): l.append("-a -t %s %s" % (ddict[k][2], k)) return l def list(self, heading=1, locallist=0): ddict = self.get_all(locallist) if len(ddict) == 0: return keys = sorted(ddict.keys()) if heading: print("%-30s %s\n" % (_("SELinux Interface"), _("Context"))) if is_mls_enabled: for k in keys: print("%-30s %s:%s:%s:%s " % (k, ddict[k][0], ddict[k][1], ddict[k][2], translate(ddict[k][3], False))) else: for k in keys: print("%-30s %s:%s:%s " % (k, ddict[k][0], ddict[k][1], ddict[k][2])) class fcontextRecords(semanageRecords): try: valid_types = list(list(sepolicy.info(sepolicy.ATTRIBUTE, "file_type"))[0]["types"]) valid_types += list(list(sepolicy.info(sepolicy.ATTRIBUTE, "device_node"))[0]["types"]) valid_types.append("<>") except RuntimeError: valid_types = [] def __init__(self, args = None): semanageRecords.__init__(self, args) self.equiv = {} self.equiv_dist = {} self.equal_ind = False try: fd = open(selinux.selinux_file_context_subs_path(), "r") for i in fd.readlines(): i = i.strip() if len(i) == 0: continue if i.startswith("#"): continue target, substitute = i.split() self.equiv[target] = substitute fd.close() except IOError: pass try: fd = open(selinux.selinux_file_context_subs_dist_path(), "r") for i in fd.readlines(): i = i.strip() if len(i) == 0: continue if i.startswith("#"): continue target, substitute = i.split() self.equiv_dist[target] = substitute fd.close() except IOError: pass def commit(self): if self.equal_ind: subs_file = selinux.selinux_file_context_subs_path() tmpfile = "%s.tmp" % subs_file fd = open(tmpfile, "w") for target in self.equiv.keys(): fd.write("%s %s\n" % (target, self.equiv[target])) fd.close() try: os.chmod(tmpfile, os.stat(subs_file)[stat.ST_MODE]) except: pass os.rename(tmpfile, subs_file) self.equal_ind = False semanageRecords.commit(self) def add_equal(self, target, substitute): self.begin() if target != "/" and target[-1] == "/": raise ValueError(_("Target %s is not valid. Target is not allowed to end with '/'") % target) if substitute != "/" and substitute[-1] == "/": raise ValueError(_("Substiture %s is not valid. Substitute is not allowed to end with '/'") % substitute) if target in self.equiv.keys(): raise ValueError(_("Equivalence class for %s already exists") % target) self.validate(target) for fdict in (self.equiv, self.equiv_dist): for i in fdict: if i.startswith(target + "/"): raise ValueError(_("File spec %s conflicts with equivalency rule '%s %s'") % (target, i, fdict[i])) self.mylog.log_change("resrc=fcontext op=add-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0), audit.audit_encode_nv_string("tglob", substitute, 0))) self.equiv[target] = substitute self.equal_ind = True self.commit() def modify_equal(self, target, substitute): self.begin() if target not in self.equiv.keys(): raise ValueError(_("Equivalence class for %s does not exist") % target) self.equiv[target] = substitute self.equal_ind = True self.mylog.log_change("resrc=fcontext op=modify-equal %s %s" % (audit.audit_encode_nv_string("sglob", target, 0), audit.audit_encode_nv_string("tglob", substitute, 0))) self.commit() def createcon(self, target, seuser="system_u"): (rc, con) = semanage_context_create(self.sh) if rc < 0: raise ValueError(_("Could not create context for %s") % target) if seuser == "": seuser = "system_u" rc = semanage_context_set_user(self.sh, con, seuser) if rc < 0: raise ValueError(_("Could not set user in file context for %s") % target) rc = semanage_context_set_role(self.sh, con, "object_r") if rc < 0: raise ValueError(_("Could not set role in file context for %s") % target) if is_mls_enabled == 1: rc = semanage_context_set_mls(self.sh, con, "s0") if rc < 0: raise ValueError(_("Could not set mls fields in file context for %s") % target) return con def validate(self, target): if target == "" or target.find("\n") >= 0: raise ValueError(_("Invalid file specification")) if target.find(" ") != -1: raise ValueError(_("File specification can not include spaces")) for fdict in (self.equiv, self.equiv_dist): for i in fdict: if target.startswith(i + "/"): t = re.sub(i, fdict[i], target) raise ValueError(_("File spec %s conflicts with equivalency rule '%s %s'; Try adding '%s' instead") % (target, i, fdict[i], t)) def __add(self, target, type, ftype="", serange="", seuser="system_u"): self.validate(target) if is_mls_enabled == 1: serange = untranslate(serange) if type == "": raise ValueError(_("SELinux Type is required")) if type not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a file or device type") % type) (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype]) if rc < 0: raise ValueError(_("Could not create key for %s") % target) (rc, exists) = semanage_fcontext_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if not exists: (rc, exists) = semanage_fcontext_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if exists: raise ValueError(_("File context for %s already defined") % target) (rc, fcontext) = semanage_fcontext_create(self.sh) if rc < 0: raise ValueError(_("Could not create file context for %s") % target) rc = semanage_fcontext_set_expr(self.sh, fcontext, target) if type != "<>": con = self.createcon(target, seuser) rc = semanage_context_set_type(self.sh, con, type) if rc < 0: raise ValueError(_("Could not set type in file context for %s") % target) if (is_mls_enabled == 1) and (serange != ""): rc = semanage_context_set_mls(self.sh, con, serange) if rc < 0: raise ValueError(_("Could not set mls fields in file context for %s") % target) rc = semanage_fcontext_set_con(self.sh, fcontext, con) if rc < 0: raise ValueError(_("Could not set file context for %s") % target) semanage_fcontext_set_type(fcontext, file_types[ftype]) rc = semanage_fcontext_modify_local(self.sh, k, fcontext) if rc < 0: raise ValueError(_("Could not add file context for %s") % target) if type != "<>": semanage_context_free(con) semanage_fcontext_key_free(k) semanage_fcontext_free(fcontext) if not seuser: seuser = "system_u" self.mylog.log_change("resrc=fcontext op=add %s ftype=%s tcontext=%s:%s:%s:%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[ftype], seuser, "object_r", type, serange)) def add(self, target, type, ftype="", serange="", seuser="system_u"): self.begin() self.__add(target, type, ftype, serange, seuser) self.commit() def __modify(self, target, setype, ftype, serange, seuser): if serange == "" and setype == "" and seuser == "": raise ValueError(_("Requires setype, serange or seuser")) if setype and setype not in self.valid_types: raise ValueError(_("Type %s is invalid, must be a file or device type") % setype) self.validate(target) (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype]) if rc < 0: raise ValueError(_("Could not create a key for %s") % target) (rc, exists) = semanage_fcontext_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if not exists: (rc, exists) = semanage_fcontext_exists_local(self.sh, k) if not exists: raise ValueError(_("File context for %s is not defined") % target) try: (rc, fcontext) = semanage_fcontext_query_local(self.sh, k) except OSError: try: (rc, fcontext) = semanage_fcontext_query(self.sh, k) except OSError: raise ValueError(_("Could not query file context for %s") % target) if setype != "<>": con = semanage_fcontext_get_con(fcontext) if con is None: con = self.createcon(target) if (is_mls_enabled == 1) and (serange != ""): semanage_context_set_mls(self.sh, con, untranslate(serange)) if seuser != "": semanage_context_set_user(self.sh, con, seuser) if setype != "": semanage_context_set_type(self.sh, con, setype) rc = semanage_fcontext_set_con(self.sh, fcontext, con) if rc < 0: raise ValueError(_("Could not set file context for %s") % target) else: rc = semanage_fcontext_set_con(self.sh, fcontext, None) if rc < 0: raise ValueError(_("Could not set file context for %s") % target) rc = semanage_fcontext_modify_local(self.sh, k, fcontext) if rc < 0: raise ValueError(_("Could not modify file context for %s") % target) semanage_fcontext_key_free(k) semanage_fcontext_free(fcontext) if not seuser: seuser = "system_u" self.mylog.log_change("resrc=fcontext op=modify %s ftype=%s tcontext=%s:%s:%s:%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[ftype], seuser, "object_r", setype, serange)) def modify(self, target, setype, ftype, serange, seuser): self.begin() self.__modify(target, setype, ftype, serange, seuser) self.commit() def deleteall(self): (rc, flist) = semanage_fcontext_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list the file contexts")) self.begin() for fcontext in flist: target = semanage_fcontext_get_expr(fcontext) ftype = semanage_fcontext_get_type(fcontext) ftype_str = semanage_fcontext_get_type_str(ftype) (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype_str]) if rc < 0: raise ValueError(_("Could not create a key for %s") % target) rc = semanage_fcontext_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete the file context %s") % target) semanage_fcontext_key_free(k) self.mylog.log_change("resrc=fcontext op=delete %s ftype=%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[file_type_str_to_option[ftype_str]])) self.equiv = {} self.equal_ind = True self.commit() def __delete(self, target, ftype): if target in self.equiv.keys(): self.equiv.pop(target) self.equal_ind = True self.mylog.log_change("resrc=fcontext op=delete-equal %s" % (audit.audit_encode_nv_string("tglob", target, 0))) return (rc, k) = semanage_fcontext_key_create(self.sh, target, file_types[ftype]) if rc < 0: raise ValueError(_("Could not create a key for %s") % target) (rc, exists) = semanage_fcontext_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if not exists: (rc, exists) = semanage_fcontext_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if file context for %s is defined") % target) if exists: raise ValueError(_("File context for %s is defined in policy, cannot be deleted") % target) else: raise ValueError(_("File context for %s is not defined") % target) rc = semanage_fcontext_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete file context for %s") % target) semanage_fcontext_key_free(k) self.mylog.log_change("resrc=fcontext op=delete %s ftype=%s" % (audit.audit_encode_nv_string("tglob", target, 0), ftype_to_audit[ftype])) def delete(self, target, ftype): self.begin() self.__delete(target, ftype) self.commit() def get_all(self, locallist=0): if locallist: (rc, self.flist) = semanage_fcontext_list_local(self.sh) else: (rc, self.flist) = semanage_fcontext_list(self.sh) if rc < 0: raise ValueError(_("Could not list file contexts")) (rc, fchomedirs) = semanage_fcontext_list_homedirs(self.sh) if rc < 0: raise ValueError(_("Could not list file contexts for home directories")) (rc, fclocal) = semanage_fcontext_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list local file contexts")) self.flist += fchomedirs self.flist += fclocal ddict = {} for fcontext in self.flist: expr = semanage_fcontext_get_expr(fcontext) ftype = semanage_fcontext_get_type(fcontext) ftype_str = semanage_fcontext_get_type_str(ftype) con = semanage_fcontext_get_con(fcontext) if con: ddict[(expr, ftype_str)] = (semanage_context_get_user(con), semanage_context_get_role(con), semanage_context_get_type(con), semanage_context_get_mls(con)) else: ddict[(expr, ftype_str)] = con return ddict def customized(self): l = [] fcon_dict = self.get_all(True) for k in sorted(fcon_dict.keys()): if fcon_dict[k]: l.append("-a -f %s -t %s '%s'" % (file_type_str_to_option[k[1]], fcon_dict[k][2], k[0])) if len(self.equiv): for target in self.equiv.keys(): l.append("-a -e %s %s" % (self.equiv[target], target)) return l def list(self, heading=1, locallist=0): fcon_dict = self.get_all(locallist) if len(fcon_dict) != 0: if heading: print("%-50s %-18s %s\n" % (_("SELinux fcontext"), _("type"), _("Context"))) for k in sorted(fcon_dict.keys()): if fcon_dict[k]: if is_mls_enabled: print("%-50s %-18s %s:%s:%s:%s " % (k[0], k[1], fcon_dict[k][0], fcon_dict[k][1], fcon_dict[k][2], translate(fcon_dict[k][3], False))) else: print("%-50s %-18s %s:%s:%s " % (k[0], k[1], fcon_dict[k][0], fcon_dict[k][1], fcon_dict[k][2])) else: print("%-50s %-18s <>" % (k[0], k[1])) if len(self.equiv_dist): if not locallist: if heading: print(_("\nSELinux Distribution fcontext Equivalence \n")) for target in self.equiv_dist.keys(): print("%s = %s" % (target, self.equiv_dist[target])) if len(self.equiv): if heading: print(_("\nSELinux Local fcontext Equivalence \n")) for target in self.equiv.keys(): print("%s = %s" % (target, self.equiv[target])) class booleanRecords(semanageRecords): def __init__(self, args = None): semanageRecords.__init__(self, args) self.dict = {} self.dict["TRUE"] = 1 self.dict["FALSE"] = 0 self.dict["ON"] = 1 self.dict["OFF"] = 0 self.dict["1"] = 1 self.dict["0"] = 0 try: rc, self.current_booleans = selinux.security_get_boolean_names() rc, ptype = selinux.selinux_getpolicytype() except: self.current_booleans = [] ptype = None if self.store == "" or self.store == ptype: self.modify_local = True else: self.modify_local = False def __mod(self, name, value): name = selinux.selinux_boolean_sub(name) (rc, k) = semanage_bool_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_bool_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if boolean %s is defined") % name) if not exists: raise ValueError(_("Boolean %s is not defined") % name) (rc, b) = semanage_bool_query(self.sh, k) if rc < 0: raise ValueError(_("Could not query file context %s") % name) if value.upper() in self.dict: semanage_bool_set_value(b, self.dict[value.upper()]) else: raise ValueError(_("You must specify one of the following values: %s") % ", ".join(self.dict.keys())) if self.modify_local and name in self.current_booleans: rc = semanage_bool_set_active(self.sh, k, b) if rc < 0: raise ValueError(_("Could not set active value of boolean %s") % name) rc = semanage_bool_modify_local(self.sh, k, b) if rc < 0: raise ValueError(_("Could not modify boolean %s") % name) semanage_bool_key_free(k) semanage_bool_free(b) def modify(self, name, value=None, use_file=False): self.begin() if use_file: fd = open(name) for b in fd.read().split("\n"): b = b.strip() if len(b) == 0: continue try: boolname, val = b.split("=") except ValueError: raise ValueError(_("Bad format %s: Record %s" % (name, b))) self.__mod(boolname.strip(), val.strip()) fd.close() else: self.__mod(name, value) self.commit() def __delete(self, name): name = selinux.selinux_boolean_sub(name) (rc, k) = semanage_bool_key_create(self.sh, name) if rc < 0: raise ValueError(_("Could not create a key for %s") % name) (rc, exists) = semanage_bool_exists(self.sh, k) if rc < 0: raise ValueError(_("Could not check if boolean %s is defined") % name) if not exists: raise ValueError(_("Boolean %s is not defined") % name) (rc, exists) = semanage_bool_exists_local(self.sh, k) if rc < 0: raise ValueError(_("Could not check if boolean %s is defined") % name) if not exists: raise ValueError(_("Boolean %s is defined in policy, cannot be deleted") % name) rc = semanage_bool_del_local(self.sh, k) if rc < 0: raise ValueError(_("Could not delete boolean %s") % name) semanage_bool_key_free(k) def delete(self, name): self.begin() self.__delete(name) self.commit() def deleteall(self): (rc, self.blist) = semanage_bool_list_local(self.sh) if rc < 0: raise ValueError(_("Could not list booleans")) self.begin() for boolean in self.blist: name = semanage_bool_get_name(boolean) self.__delete(name) self.commit() def get_all(self, locallist=0): ddict = {} if locallist: (rc, self.blist) = semanage_bool_list_local(self.sh) else: (rc, self.blist) = semanage_bool_list(self.sh) if rc < 0: raise ValueError(_("Could not list booleans")) for boolean in self.blist: value = [] name = semanage_bool_get_name(boolean) value.append(semanage_bool_get_value(boolean)) if self.modify_local and boolean in self.current_booleans: value.append(selinux.security_get_boolean_pending(name)) value.append(selinux.security_get_boolean_active(name)) else: value.append(value[0]) value.append(value[0]) ddict[name] = value return ddict def get_desc(self, name): name = selinux.selinux_boolean_sub(name) return sepolicy.boolean_desc(name) def get_category(self, name): name = selinux.selinux_boolean_sub(name) return sepolicy.boolean_category(name) def customized(self): l = [] ddict = self.get_all(True) for k in sorted(ddict.keys()): if ddict[k]: l.append("-m -%s %s" % (ddict[k][2], k)) return l def list(self, heading=True, locallist=False, use_file=False): on_off = (_("off"), _("on")) if use_file: ddict = self.get_all(locallist) for k in sorted(ddict.keys()): if ddict[k]: print("%s=%s" % (k, ddict[k][2])) return ddict = self.get_all(locallist) if len(ddict) == 0: return if heading: print("%-30s %s %s %s\n" % (_("SELinux boolean"), _("State"), _("Default"), _("Description"))) for k in sorted(ddict.keys()): if ddict[k]: print("%-30s (%-5s,%5s) %s" % (k, on_off[selinux.security_get_boolean_active(k)], on_off[ddict[k][2]], self.get_desc(k))) selinux-python-2.8/semanage/test-semanage.py000066400000000000000000000303171330160122500212550ustar00rootroot00000000000000import unittest import sys from subprocess import Popen, PIPE import argparse object_list = ['login', 'user', 'port', 'module', 'interface', 'node', 'fcontext', 'boolean', 'permissive', "dontaudit"] class SemanageTests(unittest.TestCase): def assertDenied(self, err): self.assertTrue('Permission denied' in err, '"Permission denied" not found in %r' % err) def assertNotFound(self, err): self.assertTrue('not found' in err, '"not found" not found in %r' % err) def assertFailure(self, status): self.assertTrue(status != 0, '"semanage succeeded when it should have failed') def assertSuccess(self, status, err): self.assertTrue(status == 0, '"semanage should have succeeded for this test %r' % err) def test_extract(self): for object in object_list: if object in ["dontaudit", "module", "permissive"]: continue "Verify semanage %s -E" % object p = Popen(['semanage', object, '-E'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_input_output(self): print("Verify semanage export -f /tmp/out") p = Popen(['semanage', "export", '-f', '/tmp/out'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage export -S targeted -f -") p = Popen(["semanage", "export", "-S", "targeted", "-f", "-"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage -S targeted -o -") p = Popen(["semanage", "-S", "targeted", "-o", "-"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage import -f /tmp/out") p = Popen(['semanage', "import", '-f', '/tmp/out'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage import -S targeted -f /tmp/out") p = Popen(["semanage", "import", "-S", "targeted", "-f", "/tmp/out"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage -S targeted -i /tmp/out") p = Popen(["semanage", "-S", "targeted", "-i", "/tmp/out"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_list(self): for object in object_list: if object in ["dontaudit"]: continue "Verify semanage %s -l" % object p = Popen(['semanage', object, '-l'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_list_c(self): for object in object_list: if object in ["module", "permissive", "dontaudit"]: continue print("Verify semanage %s -l" % object) p = Popen(['semanage', object, '-lC'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_fcontext(self): p = Popen(["semanage", "fcontext", "-d", "/ha-web(/.*)?"], stderr=PIPE) out, err = p.communicate() print("Verify semanage fcontext -a") p = Popen(["semanage", "fcontext", "-a", "-t", "httpd_sys_content_t", "/ha-web(/.*)?"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -m") p = Popen(["semanage", "fcontext", "-m", "-t", "default_t", "/ha-web(/.*)?"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -d") p = Popen(["semanage", "fcontext", "-d", "/ha-web(/.*)?"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_fcontext_e(self): p = Popen(["semanage", "fcontext", "-d", "/myhome"], stderr=PIPE) out, err = p.communicate() p = Popen(["semanage", "fcontext", "-d", "/myhome1"], stderr=PIPE) out, err = p.communicate() print("Verify semanage fcontext -a -e") p = Popen(["semanage", "fcontext", "-a", "-e", "/home", "/myhome"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -m -e") p = Popen(["semanage", "fcontext", "-a", "-e", "/home", "/myhome1"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage fcontext -d -e") p = Popen(["semanage", "fcontext", "-d", "/myhome1"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_port(self): # Cleanup p = Popen(["semanage", "port", "-d", "-p", "tcp", "55"], stdout=PIPE, stderr=PIPE) out, err = p.communicate() # test print("Verify semanage port -a") p = Popen(["semanage", "port", "-a", "-t", "ssh_port_t", "-p", "tcp", "55"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage port -m") p = Popen(["semanage", "port", "-m", "-t", "http_port_t", "-p", "tcp", "55"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage port -d") p = Popen(["semanage", "port", "-d", "-p", "tcp", "55"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_login(self): # Cleanup p = Popen(["userdel", "-f", "-r", "testlogin"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() p = Popen(["semanage", "user", "-d", "testuser_u"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() p = Popen(["semanage", "login", "-d", "testlogin"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() #test print("Verify semanage user -a") p = Popen(["semanage", "user", "-a", "-R", "staff_r", "-r", "s0-s0:c0.c1023", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify useradd ") p = Popen(["useradd", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -a") p = Popen(["semanage", "login", "-a", "-s", "testuser_u", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -m -r") p = Popen(["semanage", "login", "-m", "-r", "s0-s0:c1", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -m -s") p = Popen(["semanage", "login", "-m", "-s", "staff_u", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -m -s -r") p = Popen(["semanage", "login", "-m", "-s", "testuser_u", "-r", "s0", "testlogin"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage login -d") p = Popen(["semanage", "login", "-d", "testlogin"], stdout=PIPE) out, err = p.communicate() print("Verify userdel ") p = Popen(["userdel", "-f", "-r", "testlogin"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -d") p = Popen(["semanage", "user", "-d", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_user(self): # Cleanup p = Popen(["semanage", "user", "-d", "testuser_u"], stderr=PIPE, stdout=PIPE) out, err = p.communicate() # test print("Verify semanage user -a") p = Popen(["semanage", "user", "-a", "-R", "staff_r", "-r", "s0-s0:c0.c1023", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -m -R") p = Popen(["semanage", "user", "-m", "-R", "sysadm_r unconfined_r", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -m -r") p = Popen(["semanage", "user", "-m", "-r", "s0-s0:c1", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage user -d") p = Popen(["semanage", "user", "-d", "testuser_u"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_boolean(self): import selinux boolean_status = {0: "--off", 1: "--on"} boolean_state = selinux.security_get_boolean_active("httpd_anon_write") # Test print("Verify semanage boolean -m %s httpd_anon_write" % boolean_status[not boolean_state]) p = Popen(["semanage", "boolean", "-m", boolean_status[(not boolean_state)], "httpd_anon_write"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) print("Verify semanage boolean -m %s httpd_anon_write" % boolean_status[boolean_state]) p = Popen(["semanage", "boolean", "-m", boolean_status[boolean_state], "httpd_anon_write"], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def semanage_suite(): semanage_suite = unittest.TestSuite() semanage_suite.addTest(unittest.makeSuite(SemanageTests)) return semanage_suite def semanage_custom_suite(test_list): suiteSemanage = unittest.TestSuite() for t in test_list: suiteSemanage.addTest(SemanageTests(t)) return suiteSemanage def semanage_run_test(suite): unittest.TextTestRunner(verbosity=2).run(suite) class CheckTest(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: if v not in semanage_test_list: raise ValueError("%s must be an unit test.\nValid tests: %s" % (v, ", ".join(semanage_test_list))) newval.append(v) setattr(namespace, self.dest, newval) def semanage_args(args): if args.list: print("You can run the following tests:") for i in semanage_test_list: print(i) if args.all: semanage_run_test(semanage_suite()) if args.test: semanage_run_test(semanage_custom_suite(args.test)) def gen_semanage_test_args(parser): group = parser.add_mutually_exclusive_group(required=True) group.add_argument('-a', "--all", dest="all", default=False, action="store_true", help=("Run all semanage unit tests")) group.add_argument('-l', "--list", dest="list", default=False, action="store_true", help=("List all semanage unit tests")) group.add_argument('-t', "--test", dest="test", default=[], action=CheckTest, nargs="*", help=("Run selected semanage unit test(s)")) group.set_defaults(func=semanage_args) if __name__ == "__main__": import selinux semanage_test_list = [x for x in dir(SemanageTests) if x.startswith("test_")] if selinux.is_selinux_enabled() and selinux.security_getenforce() == 1: parser = argparse.ArgumentParser(description='Semanage unit test script') gen_semanage_test_args(parser) try: args = parser.parse_args() args.func(args) sys.exit(0) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: sys.exit(0) else: print("SELinux must be in enforcing mode for this test") selinux-python-2.8/sepolgen/000077500000000000000000000000001330160122500161765ustar00rootroot00000000000000selinux-python-2.8/sepolgen/COPYING000066400000000000000000000431311330160122500172330ustar00rootroot00000000000000 GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. Copyright (C) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. , 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License. selinux-python-2.8/sepolgen/HACKING000066400000000000000000000064601330160122500171730ustar00rootroot00000000000000Code Overview ============= The source for Sepolgen is divided into the python library (sepolgen) and tools (e.g., audit2allow). The library is structured to give flexibility to the application using it - it avoids assumptions and close coupling of components where possible. The audit2allow application demonstrates how to hook the components together. There is a test suite in the test subdirectory. The run-tests.py script will run all of the tests. The library is is divided into several functional areas: Reference Policy Representation (sepolgen.refpolicy) ------------------------------------------------------------- Objects for representing policies and the reference policy interfaces. Includes basic components (security contexts, allow rules, etc.) and reference policy specific components (interfaces, modules, etc.). This representation can be used as output from the parser to represent the reference policy interfaces. It can also be used to generate policy by building up the relevent data structures and then outputting them. See sepolgen.policygen and sepolgen.output for information on how this can be done. Access (sepolgen.access, sepolgen.interfaces, sepolgen.matching) ------------------------------------------------------------- Objects and algorithms for representing access and sets of access in an abstract way and searching that access. The basic concept is that of an access vector (source type, target type, object class, and permissions). These can be grouped into sets without overlapping access. Access vectors and access vector sets can be matched against other access vectors - this forms the backbone of how we turn audit messages into interface calls. The highest-level form of access represented in interfaces - which includes algorithms to turn the raw output of the parser into access vector sets representing the access allowed by each interface. Parsing (sepolgen.refparser) ------------------------------------------------------------- Parser for reference policy "headers" - i.e., /usr/share/selinux/devel/include. This uses the LGPL parsing library [PLY](http://www.dabeaz.com/ply/) which is included in the source distribution in the files lex.py and yacc.py. It may be necessary to switch to a more powerful parsing library in the future, but for now this is fast and easy. Audit Messages (sepolgen.audit) ------------------------------------------------------------- Infrastructure for parsing SELinux related messages as produced by the audit system. This is not a general purpose audit parsing library - it is only meant to capture SELinux messages - primarily access vector cache (AVC) messages and policy load messages. Policy Generation (sepolgen.policygen and sepolgen.output) ------------------------------------------------------------- Infrastructure for generating policy based on required access. This deliberately only loosely coupled to the audit parsing to allow required accesses to be feed in from anywhere. Object Model (sepolgen.objectmodel) ------------------------------------------------------------- Information about the SELinux object classes. This is semantic information about the object classes - including information flow. It is separated to keep the core from being concerned about the details of the object classes. [selist]: http://www.nsa.gov/research/selinux/info/list.cfm selinux-python-2.8/sepolgen/Makefile000066400000000000000000000002701330160122500176350ustar00rootroot00000000000000all: ; install: $(MAKE) -C src $@ relabel: ; clean: $(MAKE) -C src $@ $(MAKE) -C tests $@ rm -f *~ *.pyc rm -f parser.out parsetab.py indent: ; test: $(MAKE) -C tests $@ selinux-python-2.8/sepolgen/VERSION000066400000000000000000000000041330160122500172400ustar00rootroot000000000000002.6 selinux-python-2.8/sepolgen/src/000077500000000000000000000000001330160122500167655ustar00rootroot00000000000000selinux-python-2.8/sepolgen/src/Makefile000066400000000000000000000003051330160122500204230ustar00rootroot00000000000000all: ; install: $(MAKE) -C sepolgen $@ $(MAKE) -C share $@ relabel: ; clean: $(MAKE) -C sepolgen $@ $(MAKE) -C share $@ rm -f *~ *.pyc rm -f parser.out parsetab.py indent: ; test: ; selinux-python-2.8/sepolgen/src/sepolgen/000077500000000000000000000000001330160122500206015ustar00rootroot00000000000000selinux-python-2.8/sepolgen/src/sepolgen/Makefile000066400000000000000000000005531330160122500222440ustar00rootroot00000000000000PREFIX ?= /usr PYTHON ?= python PYTHONLIBDIR ?= $(shell $(PYTHON) -c "from distutils.sysconfig import *; print(get_python_lib(prefix='$(PREFIX)'))") PACKAGEDIR ?= /$(PYTHONLIBDIR)/sepolgen all: install: all -mkdir -p $(DESTDIR)$(PACKAGEDIR) install -m 644 *.py $(DESTDIR)$(PACKAGEDIR) clean: rm -f parser.out parsetab.py rm -f *~ *.pyc rm -rf __pycache__ selinux-python-2.8/sepolgen/src/sepolgen/__init__.py000066400000000000000000000000001330160122500227000ustar00rootroot00000000000000selinux-python-2.8/sepolgen/src/sepolgen/access.py000066400000000000000000000265671330160122500224340ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes representing basic access. SELinux - at the most basic level - represents access as the 4-tuple subject (type or context), target (type or context), object class, permission. The policy language elaborates this basic access to faciliate more concise rules (e.g., allow rules can have multiple source or target types - see refpolicy for more information). This module has objects for representing the most basic access (AccessVector) and sets of that access (AccessVectorSet). These objects are used in Madison in a variety of ways, but they are the fundamental representation of access. """ from . import refpolicy from . import util from selinux import audit2why def is_idparam(id): """Determine if an id is a paramater in the form $N, where N is an integer. Returns: True if the id is a paramater False if the id is not a paramater """ if len(id) > 1 and id[0] == '$': try: int(id[1:]) except ValueError: return False return True else: return False class AccessVector(util.Comparison): """ An access vector is the basic unit of access in SELinux. Access vectors are the most basic representation of access within SELinux. It represents the access a source type has to a target type in terms of an object class and a set of permissions. Access vectors are distinct from AVRules in that they can only store a single source type, target type, and object class. The simplicity of AccessVectors makes them useful for storing access in a form that is easy to search and compare. The source, target, and object are stored as string. No checking done to verify that the strings are valid SELinux identifiers. Identifiers in the form $N (where N is an integer) are reserved as interface parameters and are treated as wild cards in many circumstances. Properties: .src_type - The source type allowed access. [String or None] .tgt_type - The target type to which access is allowed. [String or None] .obj_class - The object class to which access is allowed. [String or None] .perms - The permissions allowed to the object class. [IdSet] .audit_msgs - The audit messages that generated this access vector [List of strings] """ def __init__(self, init_list=None): if init_list: self.from_list(init_list) else: self.src_type = None self.tgt_type = None self.obj_class = None self.perms = refpolicy.IdSet() self.audit_msgs = [] self.type = audit2why.TERULE self.data = [] # when implementing __eq__ also __hash__ is needed on py2 # if object is muttable __hash__ should be None self.__hash__ = None # The direction of the information flow represented by this # access vector - used for matching self.info_flow_dir = None def from_list(self, list): """Initialize an access vector from a list. Initialize an access vector from a list treating the list as positional arguments - i.e., 0 = src_type, 1 = tgt_type, etc. All of the list elements 3 and greater are treated as perms. For example, the list ['foo_t', 'bar_t', 'file', 'read', 'write'] would create an access vector list with the source type 'foo_t', target type 'bar_t', object class 'file', and permissions 'read' and 'write'. This format is useful for very simple storage to strings or disc (see to_list) and for initializing access vectors. """ if len(list) < 4: raise ValueError("List must contain at least four elements %s" % str(list)) self.src_type = list[0] self.tgt_type = list[1] self.obj_class = list[2] self.perms = refpolicy.IdSet(list[3:]) def to_list(self): """ Convert an access vector to a list. Convert an access vector to a list treating the list as positional values. See from_list for more information on how an access vector is represented in a list. """ l = [self.src_type, self.tgt_type, self.obj_class] l.extend(sorted(self.perms)) return l def __str__(self): return self.to_string() def to_string(self): return "allow %s %s:%s %s;" % (self.src_type, self.tgt_type, self.obj_class, self.perms.to_space_str()) def _compare(self, other, method): try: x = list(self.perms) a = (self.src_type, self.tgt_type, self.obj_class, x) y = list(other.perms) x.sort() y.sort() b = (other.src_type, other.tgt_type, other.obj_class, y) return method(a, b) except (AttributeError, TypeError): # trying to compare to foreign type return NotImplemented def avrule_to_access_vectors(avrule): """Convert an avrule into a list of access vectors. AccessVectors and AVRules are similary, but differ in that an AVRule can more than one source type, target type, and object class. This function expands a single avrule into a list of one or more AccessVectors representing the access defined in the AVRule. """ if isinstance(avrule, AccessVector): return [avrule] a = [] for src_type in avrule.src_types: for tgt_type in avrule.tgt_types: for obj_class in avrule.obj_classes: access = AccessVector() access.src_type = src_type access.tgt_type = tgt_type access.obj_class = obj_class access.perms = avrule.perms.copy() a.append(access) return a class AccessVectorSet: """A non-overlapping set of access vectors. An AccessVectorSet is designed to store one or more access vectors that are non-overlapping. Access can be added to the set incrementally and access vectors will be added or merged as necessary. For example, adding the following access vectors using add_av: allow $1 etc_t : read; allow $1 etc_t : write; allow $1 var_log_t : read; Would result in an access vector set with the access vectors: allow $1 etc_t : { read write}; allow $1 var_log_t : read; """ def __init__(self): """Initialize an access vector set. """ self.src = {} # The information flow direction of this access vector # set - see objectmodel.py for more information. This # stored here to speed up searching - see matching.py. self.info_dir = None def __iter__(self): """Iterate over all of the unique access vectors in the set.""" for tgts in self.src.values(): for objs in tgts.values(): for av in objs.values(): yield av def __len__(self): """Return the number of unique access vectors in the set. Because of the inernal representation of the access vector set, __len__ is not a constant time operation. Worst case is O(N) where N is the number of unique access vectors, but the common case is probably better. """ l = 0 for tgts in self.src.values(): for objs in tgts.values(): l += len(objs) return l def to_list(self): """Return the unique access vectors in the set as a list. The format of the returned list is a set of nested lists, each access vector represented by a list. This format is designed to be simply serializable to a file. For example, consider an access vector set with the following access vectors: allow $1 user_t : file read; allow $1 etc_t : file { read write}; to_list would return the following: [[$1, user_t, file, read] [$1, etc_t, file, read, write]] See AccessVector.to_list for more information. """ l = [] for av in self: l.append(av.to_list()) return l def from_list(self, l): """Add access vectors stored in a list. See to list for more information on the list format that this method accepts. This will add all of the access from the list. Any existing access vectors in the set will be retained. """ for av in l: self.add_av(AccessVector(av)) def add(self, src_type, tgt_type, obj_class, perms, audit_msg=None, avc_type=audit2why.TERULE, data=[]): """Add an access vector to the set. """ tgt = self.src.setdefault(src_type, { }) cls = tgt.setdefault(tgt_type, { }) if (obj_class, avc_type) in cls: access = cls[obj_class, avc_type] else: access = AccessVector() access.src_type = src_type access.tgt_type = tgt_type access.obj_class = obj_class access.data = data access.type = avc_type cls[obj_class, avc_type] = access access.perms.update(perms) if audit_msg: access.audit_msgs.append(audit_msg) def add_av(self, av, audit_msg=None): """Add an access vector to the set.""" self.add(av.src_type, av.tgt_type, av.obj_class, av.perms) def avs_extract_types(avs): types = refpolicy.IdSet() for av in avs: types.add(av.src_type) types.add(av.tgt_type) return types def avs_extract_obj_perms(avs): perms = { } for av in avs: if av.obj_class in perms: s = perms[av.obj_class] else: s = refpolicy.IdSet() perms[av.obj_class] = s s.update(av.perms) return perms class RoleTypeSet: """A non-overlapping set of role type statements. This clas allows the incremental addition of role type statements and maintains a non-overlapping list of statements. """ def __init__(self): """Initialize an access vector set.""" self.role_types = {} def __iter__(self): """Iterate over all of the unique role allows statements in the set.""" for role_type in self.role_types.values(): yield role_type def __len__(self): """Return the unique number of role allow statements.""" return len(self.role_types.keys()) def add(self, role, type): if role in self.role_types: role_type = self.role_types[role] else: role_type = refpolicy.RoleType() role_type.role = role self.role_types[role] = role_type role_type.types.add(type) selinux-python-2.8/sepolgen/src/sepolgen/audit.py000066400000000000000000000521721330160122500222700ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import re import sys from . import refpolicy from . import access from . import util # Convenience functions def get_audit_boot_msgs(): """Obtain all of the avc and policy load messages from the audit log. This function uses ausearch and requires that the current process have sufficient rights to run ausearch. Returns: string contain all of the audit messages returned by ausearch. """ import subprocess import time fd=open("/proc/uptime", "r") off=float(fd.read().split()[0]) fd.close s = time.localtime(time.time() - off) bootdate = time.strftime("%x", s) boottime = time.strftime("%X", s) output = subprocess.Popen(["/sbin/ausearch", "-m", "AVC,USER_AVC,MAC_POLICY_LOAD,DAEMON_START,SELINUX_ERR", "-ts", bootdate, boottime], stdout=subprocess.PIPE).communicate()[0] if util.PY3: output = util.decode_input(output) return output def get_audit_msgs(): """Obtain all of the avc and policy load messages from the audit log. This function uses ausearch and requires that the current process have sufficient rights to run ausearch. Returns: string contain all of the audit messages returned by ausearch. """ import subprocess output = subprocess.Popen(["/sbin/ausearch", "-m", "AVC,USER_AVC,MAC_POLICY_LOAD,DAEMON_START,SELINUX_ERR"], stdout=subprocess.PIPE).communicate()[0] if util.PY3: output = util.decode_input(output) return output def get_dmesg_msgs(): """Obtain all of the avc and policy load messages from /bin/dmesg. Returns: string contain all of the audit messages returned by dmesg. """ import subprocess output = subprocess.Popen(["/bin/dmesg"], stdout=subprocess.PIPE).communicate()[0] if util.PY3: output = util.decode_input(output) return output # Classes representing audit messages class AuditMessage: """Base class for all objects representing audit messages. AuditMessage is a base class for all audit messages and only provides storage for the raw message (as a string) and a parsing function that does nothing. """ def __init__(self, message): self.message = message self.header = "" def from_split_string(self, recs): """Parse a string that has been split into records by space into an audit message. This method should be overridden by subclasses. Error reporting should be done by raise ValueError exceptions. """ for msg in recs: fields = msg.split("=") if len(fields) != 2: if msg[:6] == "audit(": self.header = msg return else: continue if fields[0] == "msg": self.header = fields[1] return class InvalidMessage(AuditMessage): """Class representing invalid audit messages. This is used to differentiate between audit messages that aren't recognized (that should return None from the audit message parser) and a message that is recognized but is malformed in some way. """ def __init__(self, message): AuditMessage.__init__(self, message) class PathMessage(AuditMessage): """Class representing a path message""" def __init__(self, message): AuditMessage.__init__(self, message) self.path = "" def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) for msg in recs: fields = msg.split("=") if len(fields) != 2: continue if fields[0] == "path": self.path = fields[1][1:-1] return import selinux.audit2why as audit2why avcdict = {} class AVCMessage(AuditMessage): """AVC message representing an access denial or granted message. This is a very basic class and does not represent all possible fields in an avc message. Currently the fields are: scontext - context for the source (process) that generated the message tcontext - context for the target tclass - object class for the target (only one) comm - the process name exe - the on-disc binary path - the path of the target access - list of accesses that were allowed or denied denial - boolean indicating whether this was a denial (True) or granted (False) message. An example audit message generated from the audit daemon looks like (line breaks added): 'type=AVC msg=audit(1155568085.407:10877): avc: denied { search } for pid=677 comm="python" name="modules" dev=dm-0 ino=13716388 scontext=user_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir' An example audit message stored in syslog (not processed by the audit daemon - line breaks added): 'Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file """ def __init__(self, message): AuditMessage.__init__(self, message) self.scontext = refpolicy.SecurityContext() self.tcontext = refpolicy.SecurityContext() self.tclass = "" self.comm = "" self.exe = "" self.path = "" self.name = "" self.accesses = [] self.denial = True self.type = audit2why.TERULE def __parse_access(self, recs, start): # This is kind of sucky - the access that is in a space separated # list like '{ read write }'. This doesn't fit particularly well with splitting # the string on spaces. This function takes the list of recs and a starting # position one beyond the open brace. It then adds the accesses until it finds # the close brace or the end of the list (which is an error if reached without # seeing a close brace). found_close = False i = start if i == (len(recs) - 1): raise ValueError("AVC message in invalid format [%s]\n" % self.message) while i < len(recs): if recs[i] == "}": found_close = True break self.accesses.append(recs[i]) i = i + 1 if not found_close: raise ValueError("AVC message in invalid format [%s]\n" % self.message) return i + 1 def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) # FUTURE - fully parse avc messages and store all possible fields # Required fields found_src = False found_tgt = False found_class = False found_access = False for i in range(len(recs)): if recs[i] == "{": i = self.__parse_access(recs, i + 1) found_access = True continue elif recs[i] == "granted": self.denial = False fields = recs[i].split("=") if len(fields) != 2: continue if fields[0] == "scontext": self.scontext = refpolicy.SecurityContext(fields[1]) found_src = True elif fields[0] == "tcontext": self.tcontext = refpolicy.SecurityContext(fields[1]) found_tgt = True elif fields[0] == "tclass": self.tclass = fields[1] found_class = True elif fields[0] == "comm": self.comm = fields[1][1:-1] elif fields[0] == "exe": self.exe = fields[1][1:-1] elif fields[0] == "name": self.name = fields[1][1:-1] if not found_src or not found_tgt or not found_class or not found_access: raise ValueError("AVC message in invalid format [%s]\n" % self.message) self.analyze() def analyze(self): tcontext = self.tcontext.to_string() scontext = self.scontext.to_string() access_tuple = tuple( self.accesses) self.data = [] if (scontext, tcontext, self.tclass, access_tuple) in avcdict.keys(): self.type, self.data = avcdict[(scontext, tcontext, self.tclass, access_tuple)] else: self.type, self.data = audit2why.analyze(scontext, tcontext, self.tclass, self.accesses); if self.type == audit2why.NOPOLICY: self.type = audit2why.TERULE if self.type == audit2why.BADTCON: raise ValueError("Invalid Target Context %s\n" % tcontext) if self.type == audit2why.BADSCON: raise ValueError("Invalid Source Context %s\n" % scontext) if self.type == audit2why.BADSCON: raise ValueError("Invalid Type Class %s\n" % self.tclass) if self.type == audit2why.BADPERM: raise ValueError("Invalid permission %s\n" % " ".join(self.accesses)) if self.type == audit2why.BADCOMPUTE: raise ValueError("Error during access vector computation") if self.type == audit2why.CONSTRAINT: self.data = [ self.data ] if self.scontext.user != self.tcontext.user: self.data.append(("user (%s)" % self.scontext.user, 'user (%s)' % self.tcontext.user)) if self.scontext.role != self.tcontext.role and self.tcontext.role != "object_r": self.data.append(("role (%s)" % self.scontext.role, 'role (%s)' % self.tcontext.role)) if self.scontext.level != self.tcontext.level: self.data.append(("level (%s)" % self.scontext.level, 'level (%s)' % self.tcontext.level)) avcdict[(scontext, tcontext, self.tclass, access_tuple)] = (self.type, self.data) class PolicyLoadMessage(AuditMessage): """Audit message indicating that the policy was reloaded.""" def __init__(self, message): AuditMessage.__init__(self, message) class DaemonStartMessage(AuditMessage): """Audit message indicating that a daemon was started.""" def __init__(self, message): AuditMessage.__init__(self, message) self.auditd = False def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) if "auditd" in recs: self.auditd = True class ComputeSidMessage(AuditMessage): """Audit message indicating that a sid was not valid. Compute sid messages are generated on attempting to create a security context that is not valid. Security contexts are invalid if the role is not authorized for the user or the type is not authorized for the role. This class does not store all of the fields from the compute sid message - just the type and role. """ def __init__(self, message): AuditMessage.__init__(self, message) self.invalid_context = refpolicy.SecurityContext() self.scontext = refpolicy.SecurityContext() self.tcontext = refpolicy.SecurityContext() self.tclass = "" def from_split_string(self, recs): AuditMessage.from_split_string(self, recs) if len(recs) < 10: raise ValueError("Split string does not represent a valid compute sid message") try: self.invalid_context = refpolicy.SecurityContext(recs[5]) self.scontext = refpolicy.SecurityContext(recs[7].split("=")[1]) self.tcontext = refpolicy.SecurityContext(recs[8].split("=")[1]) self.tclass = recs[9].split("=")[1] except: raise ValueError("Split string does not represent a valid compute sid message") def output(self): return "role %s types %s;\n" % (self.role, self.type) # Parser for audit messages class AuditParser: """Parser for audit messages. This class parses audit messages and stores them according to their message type. This is not a general purpose audit message parser - it only extracts selinux related messages. Each audit messages are stored in one of four lists: avc_msgs - avc denial or granted messages. Messages are stored in AVCMessage objects. comput_sid_messages - invalid sid messages. Messages are stored in ComputSidMessage objects. invalid_msgs - selinux related messages that are not valid. Messages are stored in InvalidMessageObjects. policy_load_messages - policy load messages. Messages are stored in PolicyLoadMessage objects. These lists will be reset when a policy load message is seen if AuditParser.last_load_only is set to true. It is assumed that messages are fed to the parser in chronological order - time stamps are not parsed. """ def __init__(self, last_load_only=False): self.__initialize() self.last_load_only = last_load_only def __initialize(self): self.avc_msgs = [] self.compute_sid_msgs = [] self.invalid_msgs = [] self.policy_load_msgs = [] self.path_msgs = [] self.by_header = { } self.check_input_file = False # Low-level parsing function - tries to determine if this audit # message is an SELinux related message and then parses it into # the appropriate AuditMessage subclass. This function deliberately # does not impose policy (e.g., on policy load message) or store # messages to make as simple and reusable as possible. # # Return values: # None - no recognized audit message found in this line # # InvalidMessage - a recognized but invalid message was found. # # AuditMessage (or subclass) - object representing a parsed # and valid audit message. def __parse_line(self, line): # strip("\x1c\x1d\x1e\x85") is only needed for python2 # since str.split() in python3 already does this rec = [x.strip("\x1c\x1d\x1e\x85") for x in line.split()] for i in rec: found = False if i == "avc:" or i == "message=avc:" or i == "msg='avc:": msg = AVCMessage(line) found = True elif i == "security_compute_sid:": msg = ComputeSidMessage(line) found = True elif i == "type=MAC_POLICY_LOAD" or i == "type=1403": msg = PolicyLoadMessage(line) found = True elif i == "type=AVC_PATH": msg = PathMessage(line) found = True elif i == "type=DAEMON_START": msg = DaemonStartMessage(list) found = True if found: self.check_input_file = True try: msg.from_split_string(rec) except ValueError: msg = InvalidMessage(line) return msg return None # Higher-level parse function - take a line, parse it into an # AuditMessage object, and store it in the appropriate list. # This function will optionally reset all of the lists when # it sees a load policy message depending on the value of # self.last_load_only. def __parse(self, line): msg = self.__parse_line(line) if msg is None: return # Append to the correct list if isinstance(msg, PolicyLoadMessage): if self.last_load_only: self.__initialize() elif isinstance(msg, DaemonStartMessage): # We initialize every time the auditd is started. This # is less than ideal, but unfortunately it is the only # way to catch reboots since the initial policy load # by init is not stored in the audit log. if msg.auditd and self.last_load_only: self.__initialize() self.policy_load_msgs.append(msg) elif isinstance(msg, AVCMessage): self.avc_msgs.append(msg) elif isinstance(msg, ComputeSidMessage): self.compute_sid_msgs.append(msg) elif isinstance(msg, InvalidMessage): self.invalid_msgs.append(msg) elif isinstance(msg, PathMessage): self.path_msgs.append(msg) # Group by audit header if msg.header != "": if msg.header in self.by_header: self.by_header[msg.header].append(msg) else: self.by_header[msg.header] = [msg] # Post processing will add additional information from AVC messages # from related messages - only works on messages generated by # the audit system. def __post_process(self): for value in self.by_header.values(): avc = [] path = None for msg in value: if isinstance(msg, PathMessage): path = msg elif isinstance(msg, AVCMessage): avc.append(msg) if len(avc) > 0 and path: for a in avc: a.path = path.path def parse_file(self, input): """Parse the contents of a file object. This method can be called multiple times (along with parse_string).""" line = input.readline() while line: self.__parse(line) line = input.readline() if not self.check_input_file: sys.stderr.write("Nothing to do\n") sys.exit(0) self.__post_process() def parse_string(self, input): """Parse a string containing audit messages - messages should be separated by new lines. This method can be called multiple times (along with parse_file).""" lines = input.split('\n') for l in lines: self.__parse(l) self.__post_process() def to_role(self, role_filter=None): """Return RoleAllowSet statements matching the specified filter Filter out types that match the filer, or all roles Params: role_filter - [optional] Filter object used to filter the output. Returns: Access vector set representing the denied access in the audit logs parsed by this object. """ role_types = access.RoleTypeSet() for cs in self.compute_sid_msgs: if not role_filter or role_filter.filter(cs): role_types.add(cs.invalid_context.role, cs.invalid_context.type) return role_types def to_access(self, avc_filter=None, only_denials=True): """Convert the audit logs access into a an access vector set. Convert the audit logs into an access vector set, optionally filtering the restults with the passed in filter object. Filter objects are object instances with a .filter method that takes and access vector and returns True if the message should be included in the final output and False otherwise. Params: avc_filter - [optional] Filter object used to filter the output. Returns: Access vector set representing the denied access in the audit logs parsed by this object. """ av_set = access.AccessVectorSet() for avc in self.avc_msgs: if avc.denial != True and only_denials: continue if avc_filter: if avc_filter.filter(avc): av_set.add(avc.scontext.type, avc.tcontext.type, avc.tclass, avc.accesses, avc, avc_type=avc.type, data=avc.data) else: av_set.add(avc.scontext.type, avc.tcontext.type, avc.tclass, avc.accesses, avc, avc_type=avc.type, data=avc.data) return av_set class AVCTypeFilter: def __init__(self, regex): self.regex = re.compile(regex) def filter(self, avc): if self.regex.match(avc.scontext.type): return True if self.regex.match(avc.tcontext.type): return True return False class ComputeSidTypeFilter: def __init__(self, regex): self.regex = re.compile(regex) def filter(self, avc): if self.regex.match(avc.invalid_context.type): return True if self.regex.match(avc.scontext.type): return True if self.regex.match(avc.tcontext.type): return True return False selinux-python-2.8/sepolgen/src/sepolgen/classperms.py000066400000000000000000000054021330160122500233300ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import sys tokens = ('DEFINE', 'NAME', 'TICK', 'SQUOTE', 'OBRACE', 'CBRACE', 'SEMI', 'OPAREN', 'CPAREN', 'COMMA') reserved = { 'define' : 'DEFINE' } t_TICK = r'\`' t_SQUOTE = r'\'' t_OBRACE = r'\{' t_CBRACE = r'\}' t_SEMI = r'\;' t_OPAREN = r'\(' t_CPAREN = r'\)' t_COMMA = r'\,' t_ignore = " \t\n" def t_NAME(t): r'[a-zA-Z_][a-zA-Z0-9_]*' t.type = reserved.get(t.value,'NAME') return t def t_error(t): print("Illegal character '%s'" % t.value[0]) t.skip(1) from . import lex lex.lex() def p_statements(p): '''statements : define_stmt | define_stmt statements ''' if len(p) == 2: p[0] = [p[1]] else: p[0] = [p[1]] + [p[2]] def p_define_stmt(p): # This sucks - corresponds to 'define(`foo',`{ read write }') '''define_stmt : DEFINE OPAREN TICK NAME SQUOTE COMMA TICK list SQUOTE CPAREN ''' p[0] = [p[4], p[8]] def p_list(p): '''list : NAME | OBRACE names CBRACE ''' if p[1] == "{": p[0] = p[2] else: p[0] = [p[1]] def p_names(p): '''names : NAME | NAME names ''' if len(p) == 2: p[0] = [p[1]] else: p[0] = [p[1]] + p[2] def p_error(p): print("Syntax error on line %d %s [type=%s]" % (p.lineno, p.value, p.type)) from . import yacc yacc.yacc() f = open("all_perms.spt") txt = f.read() f.close() #lex.input(txt) #while 1: # tok = lex.token() # if not tok: # break # print tok test = "define(`foo',`{ read write append }')" test2 = """define(`all_filesystem_perms',`{ mount remount unmount getattr relabelfrom relabelto transition associate quotamod quotaget }') define(`all_security_perms',`{ compute_av compute_create compute_member check_context load_policy compute_relabel compute_user setenforce setbool setsecparam setcheckreqprot }') """ result = yacc.parse(txt) print(result) selinux-python-2.8/sepolgen/src/sepolgen/defaults.py000066400000000000000000000053001330160122500227600ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import os import re # Select the correct location for the development files based on a # path variable (optionally read from a configuration file) class PathChoooser(object): def __init__(self, pathname): self.config = dict() if not os.path.exists(pathname): self.config_pathname = "(defaults)" self.config["SELINUX_DEVEL_PATH"] = "/usr/share/selinux/default:/usr/share/selinux/mls:/usr/share/selinux/devel" return self.config_pathname = pathname ignore = re.compile(r"^\s*(?:#.+)?$") consider = re.compile(r"^\s*(\w+)\s*=\s*(.+?)\s*$") for lineno, line in enumerate(open(pathname)): if ignore.match(line): continue mo = consider.match(line) if not mo: raise ValueError("%s:%d: line is not in key = value format" % (pathname, lineno+1)) self.config[mo.group(1)] = mo.group(2) # We're only exporting one useful function, so why not be a function def __call__(self, testfilename, pathset="SELINUX_DEVEL_PATH"): paths = self.config.get(pathset, None) if paths is None: raise ValueError("%s was not in %s" % (pathset, self.config_pathname)) paths = paths.split(":") for p in paths: target = os.path.join(p, testfilename) if os.path.exists(target): return target return os.path.join(paths[0], testfilename) """ Various default settings, including file and directory locations. """ def data_dir(): return "/var/lib/sepolgen" def perm_map(): return data_dir() + "/perm_map" def interface_info(): return data_dir() + "/interface_info" def attribute_info(): return data_dir() + "/attribute_info" def refpolicy_makefile(): chooser = PathChoooser("/etc/selinux/sepolgen.conf") return chooser("Makefile") def headers(): chooser = PathChoooser("/etc/selinux/sepolgen.conf") return chooser("include") selinux-python-2.8/sepolgen/src/sepolgen/interfaces.py000066400000000000000000000403301330160122500232760ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes for representing and manipulating interfaces. """ import copy import itertools from . import access from . import refpolicy from . import objectmodel from . import matching from .sepolgeni18n import _ class Param: """ Object representing a paramater for an interface. """ def __init__(self): self.__name = "" self.type = refpolicy.SRC_TYPE self.obj_classes = refpolicy.IdSet() self.required = True def set_name(self, name): if not access.is_idparam(name): raise ValueError("Name [%s] is not a param" % name) self.__name = name def get_name(self): return self.__name name = property(get_name, set_name) num = property(fget=lambda self: int(self.name[1:])) def __repr__(self): return "" % \ (self.name, refpolicy.field_to_str[self.type], " ".join(self.obj_classes)) # Helper for extract perms def __param_insert(name, type, av, params): ret = 0 if name in params: p = params[name] # The entries are identical - we're done if type == p.type: return # Hanldle implicitly typed objects (like process) if (type == refpolicy.SRC_TYPE or type == refpolicy.TGT_TYPE) and \ (p.type == refpolicy.TGT_TYPE or p.type == refpolicy.SRC_TYPE): #print name, refpolicy.field_to_str[p.type] # If the object is not implicitly typed, tell the # caller there is a likely conflict. ret = 1 if av: avobjs = [av.obj_class] else: avobjs = [] for obj in itertools.chain(p.obj_classes, avobjs): if obj in objectmodel.implicitly_typed_objects: ret = 0 break # "Promote" to a SRC_TYPE as this is the likely usage. # We do this even if the above test fails on purpose # as there is really no sane way to resolve the conflict # here. The caller can take other actions if needed. p.type = refpolicy.SRC_TYPE else: # There is some conflict - no way to resolve it really # so we just leave the first entry and tell the caller # there was a conflict. ret = 1 else: p = Param() p.name = name p.type = type params[p.name] = p if av: p.obj_classes.add(av.obj_class) return ret def av_extract_params(av, params): """Extract the paramaters from an access vector. Extract the paramaters (in the form $N) from an access vector, storing them as Param objects in a dictionary. Some attempt is made at resolving conflicts with other entries in the dict, but if an unresolvable conflict is found it is reported to the caller. The goal here is to figure out how interface paramaters are actually used in the interface - e.g., that $1 is a domain used as a SRC_TYPE. In general an interface will look like this: interface(`foo', ` allow $1 foo : file read; ') This is simple to figure out - $1 is a SRC_TYPE. A few interfaces are more complex, for example: interface(`foo_trans',` domain_auto_trans($1,fingerd_exec_t,fingerd_t) allow $1 fingerd_t:fd use; allow fingerd_t $1:fd use; allow fingerd_t $1:fifo_file rw_file_perms; allow fingerd_t $1:process sigchld; ') Here the usage seems ambigious, but it is not. $1 is still domain and therefore should be returned as a SRC_TYPE. Returns: 0 - success 1 - conflict found """ ret = 0 found_src = False if access.is_idparam(av.src_type): if __param_insert(av.src_type, refpolicy.SRC_TYPE, av, params) == 1: ret = 1 if access.is_idparam(av.tgt_type): if __param_insert(av.tgt_type, refpolicy.TGT_TYPE, av, params) == 1: ret = 1 if access.is_idparam(av.obj_class): if __param_insert(av.obj_class, refpolicy.OBJ_CLASS, av, params) == 1: ret = 1 for perm in av.perms: if access.is_idparam(perm): if __param_insert(perm, PERM) == 1: ret = 1 return ret def role_extract_params(role, params): if access.is_idparam(role.role): return __param_insert(role.role, refpolicy.ROLE, None, params) def type_rule_extract_params(rule, params): def extract_from_set(set, type): ret = 0 for x in set: if access.is_idparam(x): if __param_insert(x, type, None, params): ret = 1 return ret ret = 0 if extract_from_set(rule.src_types, refpolicy.SRC_TYPE): ret = 1 if extract_from_set(rule.tgt_types, refpolicy.TGT_TYPE): ret = 1 if extract_from_set(rule.obj_classes, refpolicy.OBJ_CLASS): ret = 1 if access.is_idparam(rule.dest_type): if __param_insert(rule.dest_type, refpolicy.DEST_TYPE, None, params): ret = 1 return ret def ifcall_extract_params(ifcall, params): ret = 0 for arg in ifcall.args: if access.is_idparam(arg): # Assume interface arguments are source types. Fairly safe # assumption for most interfaces if __param_insert(arg, refpolicy.SRC_TYPE, None, params): ret = 1 return ret class AttributeVector: def __init__(self): self.name = "" self.access = access.AccessVectorSet() def add_av(self, av): self.access.add_av(av) class AttributeSet: def __init__(self): self.attributes = { } def add_attr(self, attr): self.attributes[attr.name] = attr def from_file(self, fd): def parse_attr(line): fields = line[1:-1].split() if len(fields) != 2 or fields[0] != "Attribute": raise SyntaxError("Syntax error Attribute statement %s" % line) a = AttributeVector() a.name = fields[1] return a a = None for line in fd: line = line[:-1] if line[0] == "[": if a: self.add_attr(a) a = parse_attr(line) elif a: l = line.split(",") av = access.AccessVector(l) a.add_av(av) if a: self.add_attr(a) class InterfaceVector: def __init__(self, interface=None, attributes={}): # Enabled is a loose concept currently - we are essentially # not enabling interfaces that we can't handle currently. # See InterfaceVector.add_ifv for more information. self.enabled = True self.name = "" # The access that is enabled by this interface - eventually # this will include indirect access from typeattribute # statements. self.access = access.AccessVectorSet() # Paramaters are stored in a dictionary (key: param name # value: Param object). self.params = { } if interface: self.from_interface(interface, attributes) self.expanded = False def from_interface(self, interface, attributes={}): self.name = interface.name # Add allow rules for avrule in interface.avrules(): if avrule.rule_type != refpolicy.AVRule.ALLOW: continue # Handle some policy bugs if "dontaudit" in interface.name: #print "allow rule in interface: %s" % interface continue avs = access.avrule_to_access_vectors(avrule) for av in avs: self.add_av(av) # Add typeattribute access if attributes: for typeattribute in interface.typeattributes(): for attr in typeattribute.attributes: if attr not in attributes.attributes: # print "missing attribute " + attr continue attr_vec = attributes.attributes[attr] for a in attr_vec.access: av = copy.copy(a) if av.src_type == attr_vec.name: av.src_type = typeattribute.type if av.tgt_type == attr_vec.name: av.tgt_type = typeattribute.type self.add_av(av) # Extract paramaters from roles for role in interface.roles(): if role_extract_params(role, self.params): pass #print "found conflicting role param %s for interface %s" % \ # (role.name, interface.name) # Extract paramaters from type rules for rule in interface.typerules(): if type_rule_extract_params(rule, self.params): pass #print "found conflicting params in rule %s in interface %s" % \ # (str(rule), interface.name) for ifcall in interface.interface_calls(): if ifcall_extract_params(ifcall, self.params): pass #print "found conflicting params in ifcall %s in interface %s" % \ # (str(ifcall), interface.name) def add_av(self, av): if av_extract_params(av, self.params) == 1: pass #print "found conflicting perms [%s]" % str(av) self.access.add_av(av) def to_string(self): s = [] s.append("[InterfaceVector %s]" % self.name) for av in self.access: s.append(str(av)) return "\n".join(s) def __str__(self): return self.__repr__() def __repr__(self): return "" % (self.name, self.enabled) class InterfaceSet: def __init__(self, output=None): self.interfaces = { } self.tgt_type_map = { } self.tgt_type_all = [] self.output = output def o(self, str): if self.output: self.output.write(str + "\n") def to_file(self, fd): for iv in sorted(self.interfaces.values(), key=lambda x: x.name): fd.write("[InterfaceVector %s " % iv.name) for param in sorted(iv.params.values(), key=lambda x: x.name): fd.write("%s:%s " % (param.name, refpolicy.field_to_str[param.type])) fd.write("]\n") avl = sorted(iv.access.to_list()) for av in avl: fd.write(",".join(av)) fd.write("\n") def from_file(self, fd): def parse_ifv(line): fields = line[1:-1].split() if len(fields) < 2 or fields[0] != "InterfaceVector": raise SyntaxError("Syntax error InterfaceVector statement %s" % line) ifv = InterfaceVector() ifv.name = fields[1] if len(fields) == 2: return for field in fields[2:]: p = field.split(":") if len(p) != 2: raise SyntaxError("Invalid param in InterfaceVector statement %s" % line) param = Param() param.name = p[0] param.type = refpolicy.str_to_field[p[1]] ifv.params[param.name] = param return ifv ifv = None for line in fd: line = line[:-1] if line[0] == "[": if ifv: self.add_ifv(ifv) ifv = parse_ifv(line) elif ifv: l = line.split(",") av = access.AccessVector(l) ifv.add_av(av) if ifv: self.add_ifv(ifv) self.index() def add_ifv(self, ifv): self.interfaces[ifv.name] = ifv def index(self): for ifv in self.interfaces.values(): tgt_types = set() for av in ifv.access: if access.is_idparam(av.tgt_type): self.tgt_type_all.append(ifv) tgt_types = set() break tgt_types.add(av.tgt_type) for type in tgt_types: l = self.tgt_type_map.setdefault(type, []) l.append(ifv) def add(self, interface, attributes={}): ifv = InterfaceVector(interface, attributes) self.add_ifv(ifv) def add_headers(self, headers, output=None, attributes={}): for i in itertools.chain(headers.interfaces(), headers.templates()): self.add(i, attributes) self.expand_ifcalls(headers) self.index() def map_param(self, id, ifcall): if access.is_idparam(id): num = int(id[1:]) if num > len(ifcall.args): # Tell caller to drop this because it must have # been generated from an optional param. return None else: arg = ifcall.args[num - 1] if isinstance(arg, list): return arg else: return [arg] else: return [id] def map_add_av(self, ifv, av, ifcall): src_types = self.map_param(av.src_type, ifcall) if src_types is None: return tgt_types = self.map_param(av.tgt_type, ifcall) if tgt_types is None: return obj_classes = self.map_param(av.obj_class, ifcall) if obj_classes is None: return new_perms = refpolicy.IdSet() for perm in av.perms: p = self.map_param(perm, ifcall) if p is None: continue else: new_perms.update(p) if len(new_perms) == 0: return for src_type in src_types: for tgt_type in tgt_types: for obj_class in obj_classes: ifv.access.add(src_type, tgt_type, obj_class, new_perms) def do_expand_ifcalls(self, interface, if_by_name): # Descend an interface call tree adding the access # from each interface. This is a depth first walk # of the tree. stack = [(interface, None)] ifv = self.interfaces[interface.name] ifv.expanded = True while len(stack) > 0: cur, cur_ifcall = stack.pop(-1) cur_ifv = self.interfaces[cur.name] if cur != interface: for av in cur_ifv.access: self.map_add_av(ifv, av, cur_ifcall) # If we have already fully expanded this interface # there is no reason to descend further. if cur_ifv.expanded: continue for ifcall in cur.interface_calls(): if ifcall.ifname == interface.name: self.o(_("Found circular interface class")) return try: newif = if_by_name[ifcall.ifname] except KeyError: self.o(_("Missing interface definition for %s" % ifcall.ifname)) continue stack.append((newif, ifcall)) def expand_ifcalls(self, headers): # Create a map of interface names to interfaces - # this mirrors the interface vector map we already # have. if_by_name = { } for i in itertools.chain(headers.interfaces(), headers.templates()): if_by_name[i.name] = i for interface in itertools.chain(headers.interfaces(), headers.templates()): self.do_expand_ifcalls(interface, if_by_name) selinux-python-2.8/sepolgen/src/sepolgen/lex.py000066400000000000000000001015651330160122500217530ustar00rootroot00000000000000#----------------------------------------------------------------------------- # ply: lex.py # # Author: David M. Beazley (dave@dabeaz.com) # # Copyright (C) 2001-2006, David M. Beazley # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # # See the file COPYING for a complete copy of the LGPL. #----------------------------------------------------------------------------- __version__ = "2.2" import re, sys, types from . import util import collections # Regular expression used to match valid token names _is_identifier = re.compile(r'^[a-zA-Z0-9_]+$') # Available instance types. This is used when parsers are defined by a class. # In Python3 the InstanceType and ObjectType are no more, they've passed, ceased # to be, they are ex-classes along with old-style classes try: _INSTANCETYPE = (types.InstanceType, types.ObjectType) except AttributeError: _INSTANCETYPE = object # Exception thrown when invalid token encountered and no default error # handler is defined. class LexError(Exception): def __init__(self,message,s): self.args = (message,) self.text = s # Token class class LexToken(object): def __str__(self): return "LexToken(%s,%r,%d,%d)" % (self.type,self.value,self.lineno,self.lexpos) def __repr__(self): return str(self) def skip(self,n): self.lexer.skip(n) # ----------------------------------------------------------------------------- # Lexer class # # This class encapsulates all of the methods and data associated with a lexer. # # input() - Store a new string in the lexer # token() - Get the next token # ----------------------------------------------------------------------------- class Lexer: def __init__(self): self.lexre = None # Master regular expression. This is a list of # tuples (re,findex) where re is a compiled # regular expression and findex is a list # mapping regex group numbers to rules self.lexretext = None # Current regular expression strings self.lexstatere = {} # Dictionary mapping lexer states to master regexs self.lexstateretext = {} # Dictionary mapping lexer states to regex strings self.lexstate = "INITIAL" # Current lexer state self.lexstatestack = [] # Stack of lexer states self.lexstateinfo = None # State information self.lexstateignore = {} # Dictionary of ignored characters for each state self.lexstateerrorf = {} # Dictionary of error functions for each state self.lexreflags = 0 # Optional re compile flags self.lexdata = None # Actual input data (as a string) self.lexpos = 0 # Current position in input text self.lexlen = 0 # Length of the input text self.lexerrorf = None # Error rule (if any) self.lextokens = None # List of valid tokens self.lexignore = "" # Ignored characters self.lexliterals = "" # Literal characters that can be passed through self.lexmodule = None # Module self.lineno = 1 # Current line number self.lexdebug = 0 # Debugging mode self.lexoptimize = 0 # Optimized mode def clone(self,object=None): c = Lexer() c.lexstatere = self.lexstatere c.lexstateinfo = self.lexstateinfo c.lexstateretext = self.lexstateretext c.lexstate = self.lexstate c.lexstatestack = self.lexstatestack c.lexstateignore = self.lexstateignore c.lexstateerrorf = self.lexstateerrorf c.lexreflags = self.lexreflags c.lexdata = self.lexdata c.lexpos = self.lexpos c.lexlen = self.lexlen c.lextokens = self.lextokens c.lexdebug = self.lexdebug c.lineno = self.lineno c.lexoptimize = self.lexoptimize c.lexliterals = self.lexliterals c.lexmodule = self.lexmodule # If the object parameter has been supplied, it means we are attaching the # lexer to a new object. In this case, we have to rebind all methods in # the lexstatere and lexstateerrorf tables. if object: newtab = { } for key, ritem in self.lexstatere.items(): newre = [] for cre, findex in ritem: newfindex = [] for f in findex: if not f or not f[0]: newfindex.append(f) continue newfindex.append((getattr(object,f[0].__name__),f[1])) newre.append((cre,newfindex)) newtab[key] = newre c.lexstatere = newtab c.lexstateerrorf = { } for key, ef in self.lexstateerrorf.items(): c.lexstateerrorf[key] = getattr(object,ef.__name__) c.lexmodule = object # Set up other attributes c.begin(c.lexstate) return c # ------------------------------------------------------------ # writetab() - Write lexer information to a table file # ------------------------------------------------------------ def writetab(self,tabfile): tf = open(tabfile+".py","w") tf.write("# %s.py. This file automatically created by PLY (version %s). Don't edit!\n" % (tabfile,__version__)) tf.write("_lextokens = %s\n" % repr(self.lextokens)) tf.write("_lexreflags = %s\n" % repr(self.lexreflags)) tf.write("_lexliterals = %s\n" % repr(self.lexliterals)) tf.write("_lexstateinfo = %s\n" % repr(self.lexstateinfo)) tabre = { } for key, lre in self.lexstatere.items(): titem = [] for i in range(len(lre)): titem.append((self.lexstateretext[key][i],_funcs_to_names(lre[i][1]))) tabre[key] = titem tf.write("_lexstatere = %s\n" % repr(tabre)) tf.write("_lexstateignore = %s\n" % repr(self.lexstateignore)) taberr = { } for key, ef in self.lexstateerrorf.items(): if ef: taberr[key] = ef.__name__ else: taberr[key] = None tf.write("_lexstateerrorf = %s\n" % repr(taberr)) tf.close() # ------------------------------------------------------------ # readtab() - Read lexer information from a tab file # ------------------------------------------------------------ def readtab(self,tabfile,fdict): exec("import %s as lextab" % tabfile) self.lextokens = lextab._lextokens self.lexreflags = lextab._lexreflags self.lexliterals = lextab._lexliterals self.lexstateinfo = lextab._lexstateinfo self.lexstateignore = lextab._lexstateignore self.lexstatere = { } self.lexstateretext = { } for key,lre in lextab._lexstatere.items(): titem = [] txtitem = [] for i in range(len(lre)): titem.append((re.compile(lre[i][0],lextab._lexreflags),_names_to_funcs(lre[i][1],fdict))) txtitem.append(lre[i][0]) self.lexstatere[key] = titem self.lexstateretext[key] = txtitem self.lexstateerrorf = { } for key,ef in lextab._lexstateerrorf.items(): self.lexstateerrorf[key] = fdict[ef] self.begin('INITIAL') # ------------------------------------------------------------ # input() - Push a new string into the lexer # ------------------------------------------------------------ def input(self,s): if not (isinstance(s,util.bytes_type) or isinstance(s, util.string_type)): raise ValueError("Expected a string") self.lexdata = s self.lexpos = 0 self.lexlen = len(s) # ------------------------------------------------------------ # begin() - Changes the lexing state # ------------------------------------------------------------ def begin(self,state): if state not in self.lexstatere: raise ValueError("Undefined state") self.lexre = self.lexstatere[state] self.lexretext = self.lexstateretext[state] self.lexignore = self.lexstateignore.get(state,"") self.lexerrorf = self.lexstateerrorf.get(state,None) self.lexstate = state # ------------------------------------------------------------ # push_state() - Changes the lexing state and saves old on stack # ------------------------------------------------------------ def push_state(self,state): self.lexstatestack.append(self.lexstate) self.begin(state) # ------------------------------------------------------------ # pop_state() - Restores the previous state # ------------------------------------------------------------ def pop_state(self): self.begin(self.lexstatestack.pop()) # ------------------------------------------------------------ # current_state() - Returns the current lexing state # ------------------------------------------------------------ def current_state(self): return self.lexstate # ------------------------------------------------------------ # skip() - Skip ahead n characters # ------------------------------------------------------------ def skip(self,n): self.lexpos += n # ------------------------------------------------------------ # token() - Return the next token from the Lexer # # Note: This function has been carefully implemented to be as fast # as possible. Don't make changes unless you really know what # you are doing # ------------------------------------------------------------ def token(self): # Make local copies of frequently referenced attributes lexpos = self.lexpos lexlen = self.lexlen lexignore = self.lexignore lexdata = self.lexdata while lexpos < lexlen: # This code provides some short-circuit code for whitespace, tabs, and other ignored characters if lexdata[lexpos] in lexignore: lexpos += 1 continue # Look for a regular expression match for lexre,lexindexfunc in self.lexre: m = lexre.match(lexdata,lexpos) if not m: continue # Set last match in lexer so that rules can access it if they want self.lexmatch = m # Create a token for return tok = LexToken() tok.value = m.group() tok.lineno = self.lineno tok.lexpos = lexpos tok.lexer = self lexpos = m.end() i = m.lastindex func,tok.type = lexindexfunc[i] self.lexpos = lexpos if not func: # If no token type was set, it's an ignored token if tok.type: return tok break # if func not callable, it means it's an ignored token if not isinstance(func, collections.Callable): break # If token is processed by a function, call it newtok = func(tok) # Every function must return a token, if nothing, we just move to next token if not newtok: lexpos = self.lexpos # This is here in case user has updated lexpos. break # Verify type of the token. If not in the token map, raise an error if not self.lexoptimize: if newtok.type not in self.lextokens: raise LexError("%s:%d: Rule '%s' returned an unknown token type '%s'" % ( func.__code__.co_filename, func.__code__.co_firstlineno, func.__name__, newtok.type),lexdata[lexpos:]) return newtok else: # No match, see if in literals if lexdata[lexpos] in self.lexliterals: tok = LexToken() tok.value = lexdata[lexpos] tok.lineno = self.lineno tok.lexer = self tok.type = tok.value tok.lexpos = lexpos self.lexpos = lexpos + 1 return tok # No match. Call t_error() if defined. if self.lexerrorf: tok = LexToken() tok.value = self.lexdata[lexpos:] tok.lineno = self.lineno tok.type = "error" tok.lexer = self tok.lexpos = lexpos self.lexpos = lexpos newtok = self.lexerrorf(tok) if lexpos == self.lexpos: # Error method didn't change text position at all. This is an error. raise LexError("Scanning error. Illegal character '%s'" % (lexdata[lexpos]), lexdata[lexpos:]) lexpos = self.lexpos if not newtok: continue return newtok self.lexpos = lexpos raise LexError("Illegal character '%s' at index %d" % (lexdata[lexpos],lexpos), lexdata[lexpos:]) self.lexpos = lexpos + 1 if self.lexdata is None: raise RuntimeError("No input string given with input()") return None # ----------------------------------------------------------------------------- # _validate_file() # # This checks to see if there are duplicated t_rulename() functions or strings # in the parser input file. This is done using a simple regular expression # match on each line in the filename. # ----------------------------------------------------------------------------- def _validate_file(filename): import os.path base,ext = os.path.splitext(filename) if ext != '.py': return 1 # No idea what the file is. Return OK try: f = open(filename) lines = f.readlines() f.close() except IOError: return 1 # Oh well fre = re.compile(r'\s*def\s+(t_[a-zA-Z_0-9]*)\(') sre = re.compile(r'\s*(t_[a-zA-Z_0-9]*)\s*=') counthash = { } linen = 1 noerror = 1 for l in lines: m = fre.match(l) if not m: m = sre.match(l) if m: name = m.group(1) prev = counthash.get(name) if not prev: counthash[name] = linen else: print("%s:%d: Rule %s redefined. Previously defined on line %d" % (filename,linen,name,prev)) noerror = 0 linen += 1 return noerror # ----------------------------------------------------------------------------- # _funcs_to_names() # # Given a list of regular expression functions, this converts it to a list # suitable for output to a table file # ----------------------------------------------------------------------------- def _funcs_to_names(funclist): result = [] for f in funclist: if f and f[0]: result.append((f[0].__name__,f[1])) else: result.append(f) return result # ----------------------------------------------------------------------------- # _names_to_funcs() # # Given a list of regular expression function names, this converts it back to # functions. # ----------------------------------------------------------------------------- def _names_to_funcs(namelist,fdict): result = [] for n in namelist: if n and n[0]: result.append((fdict[n[0]],n[1])) else: result.append(n) return result # ----------------------------------------------------------------------------- # _form_master_re() # # This function takes a list of all of the regex components and attempts to # form the master regular expression. Given limitations in the Python re # module, it may be necessary to break the master regex into separate expressions. # ----------------------------------------------------------------------------- def _form_master_re(relist,reflags,ldict): if not relist: return [] regex = "|".join(relist) try: lexre = re.compile(regex,re.VERBOSE | reflags) # Build the index to function map for the matching engine lexindexfunc = [ None ] * (max(lexre.groupindex.values())+1) for f,i in lexre.groupindex.items(): handle = ldict.get(f,None) if type(handle) in (types.FunctionType, types.MethodType): lexindexfunc[i] = (handle,handle.__name__[2:]) elif handle is not None: # If rule was specified as a string, we build an anonymous # callback function to carry out the action if f.find("ignore_") > 0: lexindexfunc[i] = (None,None) print("IGNORE", f) else: lexindexfunc[i] = (None, f[2:]) return [(lexre,lexindexfunc)],[regex] except Exception as e: m = int(len(relist)/2) if m == 0: m = 1 llist, lre = _form_master_re(relist[:m],reflags,ldict) rlist, rre = _form_master_re(relist[m:],reflags,ldict) return llist+rlist, lre+rre # ----------------------------------------------------------------------------- # def _statetoken(s,names) # # Given a declaration name s of the form "t_" and a dictionary whose keys are # state names, this function returns a tuple (states,tokenname) where states # is a tuple of state names and tokenname is the name of the token. For example, # calling this with s = "t_foo_bar_SPAM" might return (('foo','bar'),'SPAM') # ----------------------------------------------------------------------------- def _statetoken(s,names): nonstate = 1 parts = s.split("_") for i in range(1,len(parts)): if parts[i] not in names and parts[i] != 'ANY': break if i > 1: states = tuple(parts[1:i]) else: states = ('INITIAL',) if 'ANY' in states: states = tuple(names.keys()) tokenname = "_".join(parts[i:]) return (states,tokenname) # ----------------------------------------------------------------------------- # lex(module) # # Build all of the regular expression rules from definitions in the supplied module # ----------------------------------------------------------------------------- def lex(module=None,object=None,debug=0,optimize=0,lextab="lextab",reflags=0,nowarn=0): global lexer ldict = None stateinfo = { 'INITIAL' : 'inclusive'} error = 0 files = { } lexobj = Lexer() lexobj.lexdebug = debug lexobj.lexoptimize = optimize global token,input if nowarn: warn = 0 else: warn = 1 if object: module = object if module: # User supplied a module object. if isinstance(module, types.ModuleType): ldict = module.__dict__ elif isinstance(module, _INSTANCETYPE): _items = [(k,getattr(module,k)) for k in dir(module)] ldict = { } for (i,v) in _items: ldict[i] = v else: raise ValueError("Expected a module or instance") lexobj.lexmodule = module else: # No module given. We might be able to get information from the caller. try: raise RuntimeError except RuntimeError: e,b,t = sys.exc_info() f = t.tb_frame f = f.f_back # Walk out to our calling function ldict = f.f_globals # Grab its globals dictionary if optimize and lextab: try: lexobj.readtab(lextab,ldict) token = lexobj.token input = lexobj.input lexer = lexobj return lexobj except ImportError: pass # Get the tokens, states, and literals variables (if any) if (module and isinstance(module,_INSTANCETYPE)): tokens = getattr(module,"tokens",None) states = getattr(module,"states",None) literals = getattr(module,"literals","") else: tokens = ldict.get("tokens",None) states = ldict.get("states",None) literals = ldict.get("literals","") if not tokens: raise SyntaxError("lex: module does not define 'tokens'") if not (isinstance(tokens,list) or isinstance(tokens,tuple)): raise SyntaxError("lex: tokens must be a list or tuple.") # Build a dictionary of valid token names lexobj.lextokens = { } if not optimize: for n in tokens: if not _is_identifier.match(n): print("lex: Bad token name '%s'" % n) error = 1 if warn and n in lexobj.lextokens: print("lex: Warning. Token '%s' multiply defined." % n) lexobj.lextokens[n] = None else: for n in tokens: lexobj.lextokens[n] = None if debug: print("lex: tokens = '%s'" % list(lexobj.lextokens.keys())) try: for c in literals: if not (isinstance(c,util.bytes_type) or isinstance(c, util.string_type)) or len(c) > 1: print("lex: Invalid literal %s. Must be a single character" % repr(c)) error = 1 continue except TypeError: print("lex: Invalid literals specification. literals must be a sequence of characters.") error = 1 lexobj.lexliterals = literals # Build statemap if states: if not (isinstance(states,tuple) or isinstance(states,list)): print("lex: states must be defined as a tuple or list.") error = 1 else: for s in states: if not isinstance(s,tuple) or len(s) != 2: print("lex: invalid state specifier %s. Must be a tuple (statename,'exclusive|inclusive')" % repr(s)) error = 1 continue name, statetype = s if isinstance(name, util.string_type): original_name = name name = util.encode_input(name) if not isinstance(name,util.bytes_type) or len(original_name) != len(name): print("lex: state name %s must be a byte string" % repr(original_name)) error = 1 continue if not (statetype == 'inclusive' or statetype == 'exclusive'): print("lex: state type for state %s must be 'inclusive' or 'exclusive'" % name) error = 1 continue if name in stateinfo: print("lex: state '%s' already defined." % name) error = 1 continue stateinfo[name] = statetype # Get a list of symbols with the t_ or s_ prefix tsymbols = [f for f in ldict.keys() if f[:2] == 't_' ] # Now build up a list of functions and a list of strings funcsym = { } # Symbols defined as functions strsym = { } # Symbols defined as strings toknames = { } # Mapping of symbols to token names for s in stateinfo.keys(): funcsym[s] = [] strsym[s] = [] ignore = { } # Ignore strings by state errorf = { } # Error functions by state if len(tsymbols) == 0: raise SyntaxError("lex: no rules of the form t_rulename are defined.") for f in tsymbols: t = ldict[f] states, tokname = _statetoken(f,stateinfo) toknames[f] = tokname if isinstance(t, collections.Callable): for s in states: funcsym[s].append((f,t)) elif (isinstance(t, util.bytes_type) or isinstance(t,util.string_type)): for s in states: strsym[s].append((f,t)) else: print("lex: %s not defined as a function or string" % f) error = 1 # Sort the functions by line number for f in funcsym.values(): f.sort(key=lambda x: x[1].__code__.co_firstlineno) # Sort the strings by regular expression length for s in strsym.values(): s.sort(key=lambda x: len(x[1])) regexs = { } # Build the master regular expressions for state in stateinfo.keys(): regex_list = [] # Add rules defined by functions first for fname, f in funcsym[state]: line = f.__code__.co_firstlineno file = f.__code__.co_filename files[file] = None tokname = toknames[fname] ismethod = isinstance(f, types.MethodType) if not optimize: nargs = f.__code__.co_argcount if ismethod: reqargs = 2 else: reqargs = 1 if nargs > reqargs: print("%s:%d: Rule '%s' has too many arguments." % (file,line,f.__name__)) error = 1 continue if nargs < reqargs: print("%s:%d: Rule '%s' requires an argument." % (file,line,f.__name__)) error = 1 continue if tokname == 'ignore': print("%s:%d: Rule '%s' must be defined as a string." % (file,line,f.__name__)) error = 1 continue if tokname == 'error': errorf[state] = f continue if f.__doc__: if not optimize: try: c = re.compile("(?P<%s>%s)" % (f.__name__,f.__doc__), re.VERBOSE | reflags) if c.match(""): print("%s:%d: Regular expression for rule '%s' matches empty string." % (file,line,f.__name__)) error = 1 continue except re.error as e: print("%s:%d: Invalid regular expression for rule '%s'. %s" % (file,line,f.__name__,e)) if '#' in f.__doc__: print("%s:%d. Make sure '#' in rule '%s' is escaped with '\\#'." % (file,line, f.__name__)) error = 1 continue if debug: print("lex: Adding rule %s -> '%s' (state '%s')" % (f.__name__,f.__doc__, state)) # Okay. The regular expression seemed okay. Let's append it to the master regular # expression we're building regex_list.append("(?P<%s>%s)" % (f.__name__,f.__doc__)) else: print("%s:%d: No regular expression defined for rule '%s'" % (file,line,f.__name__)) # Now add all of the simple rules for name,r in strsym[state]: tokname = toknames[name] if tokname == 'ignore': ignore[state] = r continue if not optimize: if tokname == 'error': raise SyntaxError("lex: Rule '%s' must be defined as a function" % name) error = 1 continue if tokname not in lexobj.lextokens and tokname.find("ignore_") < 0: print("lex: Rule '%s' defined for an unspecified token %s." % (name,tokname)) error = 1 continue try: c = re.compile("(?P<%s>%s)" % (name,r),re.VERBOSE | reflags) if (c.match("")): print("lex: Regular expression for rule '%s' matches empty string." % name) error = 1 continue except re.error as e: print("lex: Invalid regular expression for rule '%s'. %s" % (name,e)) if '#' in r: print("lex: Make sure '#' in rule '%s' is escaped with '\\#'." % name) error = 1 continue if debug: print("lex: Adding rule %s -> '%s' (state '%s')" % (name,r,state)) regex_list.append("(?P<%s>%s)" % (name,r)) if not regex_list: print("lex: No rules defined for state '%s'" % state) error = 1 regexs[state] = regex_list if not optimize: for f in files.keys(): if not _validate_file(f): error = 1 if error: raise SyntaxError("lex: Unable to build lexer.") # From this point forward, we're reasonably confident that we can build the lexer. # No more errors will be generated, but there might be some warning messages. # Build the master regular expressions for state in regexs.keys(): lexre, re_text = _form_master_re(regexs[state],reflags,ldict) lexobj.lexstatere[state] = lexre lexobj.lexstateretext[state] = re_text if debug: for i in range(len(re_text)): print("lex: state '%s'. regex[%d] = '%s'" % (state, i, re_text[i])) # For inclusive states, we need to add the INITIAL state for state,type in stateinfo.items(): if state != "INITIAL" and type == 'inclusive': lexobj.lexstatere[state].extend(lexobj.lexstatere['INITIAL']) lexobj.lexstateretext[state].extend(lexobj.lexstateretext['INITIAL']) lexobj.lexstateinfo = stateinfo lexobj.lexre = lexobj.lexstatere["INITIAL"] lexobj.lexretext = lexobj.lexstateretext["INITIAL"] # Set up ignore variables lexobj.lexstateignore = ignore lexobj.lexignore = lexobj.lexstateignore.get("INITIAL","") # Set up error functions lexobj.lexstateerrorf = errorf lexobj.lexerrorf = errorf.get("INITIAL",None) if warn and not lexobj.lexerrorf: print("lex: Warning. no t_error rule is defined.") # Check state information for ignore and error rules for s,stype in stateinfo.items(): if stype == 'exclusive': if warn and s not in errorf: print("lex: Warning. no error rule is defined for exclusive state '%s'" % s) if warn and s not in ignore and lexobj.lexignore: print("lex: Warning. no ignore rule is defined for exclusive state '%s'" % s) elif stype == 'inclusive': if s not in errorf: errorf[s] = errorf.get("INITIAL",None) if s not in ignore: ignore[s] = ignore.get("INITIAL","") # Create global versions of the token() and input() functions token = lexobj.token input = lexobj.input lexer = lexobj # If in optimize mode, we write the lextab if lextab and optimize: lexobj.writetab(lextab) return lexobj # ----------------------------------------------------------------------------- # runmain() # # This runs the lexer as a main program # ----------------------------------------------------------------------------- def runmain(lexer=None,data=None): if not data: try: filename = sys.argv[1] f = open(filename) data = f.read() f.close() except IndexError: print("Reading from standard input (type EOF to end):") data = sys.stdin.read() if lexer: _input = lexer.input else: _input = input _input(data) if lexer: _token = lexer.token else: _token = token while 1: tok = _token() if not tok: break print("(%s,%r,%d,%d)" % (tok.type, tok.value, tok.lineno,tok.lexpos)) # ----------------------------------------------------------------------------- # @TOKEN(regex) # # This decorator function can be used to set the regex expression on a function # when its docstring might need to be set in an alternative way # ----------------------------------------------------------------------------- def TOKEN(r): def set_doc(f): f.__doc__ = r return f return set_doc # Alternative spelling of the TOKEN decorator Token = TOKEN selinux-python-2.8/sepolgen/src/sepolgen/matching.py000066400000000000000000000207201330160122500227460ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes and algorithms for matching requested access to access vectors. """ import itertools from . import access from . import objectmodel from . import util class Match(util.Comparison): def __init__(self, interface=None, dist=0): self.interface = interface self.dist = dist self.info_dir_change = False # when implementing __eq__ also __hash__ is needed on py2 # if object is muttable __hash__ should be None self.__hash__ = None def _compare(self, other, method): try: a = (self.dist, self.info_dir_change) b = (other.dist, other.info_dir_change) return method(a, b) except (AttributeError, TypeError): # trying to compare to foreign type return NotImplemented class MatchList: DEFAULT_THRESHOLD = 150 def __init__(self): # Match objects that pass the threshold self.children = [] # Match objects over the threshold self.bastards = [] self.threshold = self.DEFAULT_THRESHOLD self.allow_info_dir_change = False self.av = None def best(self): if len(self.children): return self.children[0] if len(self.bastards): return self.bastards[0] return None def __len__(self): # Only return the length of the matches so # that this can be used to test if there is # a match. return len(self.children) + len(self.bastards) def __iter__(self): return iter(self.children) def all(self): return itertools.chain(self.children, self.bastards) def append(self, match): if match.dist <= self.threshold: if not match.info_dir_change or self.allow_info_dir_change: self.children.append(match) else: self.bastards.append(match) else: self.bastards.append(match) def sort(self): self.children.sort() self.bastards.sort() class AccessMatcher: def __init__(self, perm_maps=None): self.type_penalty = 10 self.obj_penalty = 10 if perm_maps: self.perm_maps = perm_maps else: self.perm_maps = objectmodel.PermMappings() # We want a change in the information flow direction # to be a strong penalty - stronger than access to # a few unrelated types. self.info_dir_penalty = 100 def type_distance(self, a, b): if a == b or access.is_idparam(b): return 0 else: return -self.type_penalty def perm_distance(self, av_req, av_prov): # First check that we have enough perms diff = av_req.perms.difference(av_prov.perms) if len(diff) != 0: total = self.perm_maps.getdefault_distance(av_req.obj_class, diff) return -total else: diff = av_prov.perms.difference(av_req.perms) return self.perm_maps.getdefault_distance(av_req.obj_class, diff) def av_distance(self, req, prov): """Determine the 'distance' between 2 access vectors. This function is used to find an access vector that matches a 'required' access. To do this we comput a signed numeric value that indicates how close the req access is to the 'provided' access vector. The closer the value is to 0 the closer the match, with 0 being an exact match. A value over 0 indicates that the prov access vector provides more access than the req (in practice, this means that the source type, target type, and object class is the same and the perms in prov is a superset of those in req. A value under 0 indicates that the prov access less - or unrelated - access to the req access. A different type or object class will result in a very low value. The values other than 0 should only be interpreted relative to one another - they have no exact meaning and are likely to change. Params: req - [AccessVector] The access that is required. This is the access being matched. prov - [AccessVector] The access provided. This is the potential match that is being evaluated for req. Returns: 0 : Exact match between the acess vectors. < 0 : The prov av does not provide all of the access in req. A smaller value indicates that the access is further. > 0 : The prov av provides more access than req. The larger the value the more access over req. """ # FUTURE - this is _very_ expensive and probably needs some # thorough performance work. This version is meant to give # meaningful results relatively simply. dist = 0 # Get the difference between the types. The addition is safe # here because type_distance only returns 0 or negative. dist += self.type_distance(req.src_type, prov.src_type) dist += self.type_distance(req.tgt_type, prov.tgt_type) # Object class distance if req.obj_class != prov.obj_class and not access.is_idparam(prov.obj_class): dist -= self.obj_penalty # Permission distance # If this av doesn't have a matching source type, target type, and object class # count all of the permissions against it. Otherwise determine the perm # distance and dir. if dist < 0: pdist = self.perm_maps.getdefault_distance(prov.obj_class, prov.perms) else: pdist = self.perm_distance(req, prov) # Combine the perm and other distance if dist < 0: if pdist < 0: return dist + pdist else: return dist - pdist elif dist >= 0: if pdist < 0: return pdist - dist else: return dist + pdist def av_set_match(self, av_set, av): """ """ dist = None # Get the distance for each access vector for x in av_set: tmp = self.av_distance(av, x) if dist is None: dist = tmp elif tmp >= 0: if dist >= 0: dist += tmp else: dist = tmp + -dist else: if dist < 0: dist += tmp else: dist -= tmp # Penalize for information flow - we want to prevent the # addition of a write if the requested is read none. We are # much less concerned about the reverse. av_dir = self.perm_maps.getdefault_direction(av.obj_class, av.perms) if av_set.info_dir is None: av_set.info_dir = objectmodel.FLOW_NONE for x in av_set: av_set.info_dir = av_set.info_dir | \ self.perm_maps.getdefault_direction(x.obj_class, x.perms) if (av_dir & objectmodel.FLOW_WRITE == 0) and (av_set.info_dir & objectmodel.FLOW_WRITE): if dist < 0: dist -= self.info_dir_penalty else: dist += self.info_dir_penalty return dist def search_ifs(self, ifset, av, match_list): match_list.av = av for iv in itertools.chain(ifset.tgt_type_all, ifset.tgt_type_map.get(av.tgt_type, [])): if not iv.enabled: #print "iv %s not enabled" % iv.name continue dist = self.av_set_match(iv.access, av) if dist >= 0: m = Match(iv, dist) match_list.append(m) match_list.sort() selinux-python-2.8/sepolgen/src/sepolgen/module.py000066400000000000000000000161671330160122500224530ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Utilities for dealing with the compilation of modules and creation of module tress. """ import re import tempfile try: from subprocess import getstatusoutput except ImportError: from commands import getstatusoutput import os import os.path import shutil import selinux from . import defaults def is_valid_name(modname): """Check that a module name is valid. """ m = re.findall(r"[^a-zA-Z0-9_\-\.]", modname) if len(m) == 0 and modname[0].isalpha(): return True else: return False class ModuleTree: def __init__(self, modname): self.modname = modname self.dirname = None def dir_name(self): return self.dirname def te_name(self): return self.dirname + "/" + self.modname + ".te" def fc_name(self): return self.dirname + "/" + self.modname + ".fc" def if_name(self): return self.dirname + "/" + self.modname + ".if" def package_name(self): return self.dirname + "/" + self.modname + ".pp" def makefile_name(self): return self.dirname + "/Makefile" def create(self, parent_dirname, makefile_include=None): self.dirname = parent_dirname + "/" + self.modname os.mkdir(self.dirname) fd = open(self.makefile_name(), "w") if makefile_include: fd.write("include " + makefile_include) else: fd.write("include " + defaults.refpolicy_makefile()) fd.close() # Create empty files for the standard refpolicy # module files open(self.te_name(), "w").close() open(self.fc_name(), "w").close() open(self.if_name(), "w").close() def modname_from_sourcename(sourcename): return os.path.splitext(os.path.split(sourcename)[1])[0] class ModuleCompiler: """ModuleCompiler eases running of the module compiler. The ModuleCompiler class encapsulates running the commandline module compiler (checkmodule) and module packager (semodule_package). You are likely interested in the create_module_package method. Several options are controlled via paramaters (only effects the non-refpol builds): .mls [boolean] Generate an MLS module (by passed -M to checkmodule). True to generate an MLS module, false otherwise. .module [boolean] Generate a module instead of a base module. True to generate a module, false to generate a base. .checkmodule [string] Fully qualified path to the module compiler. Default is /usr/bin/checkmodule. .semodule_package [string] Fully qualified path to the module packager. Defaults to /usr/bin/semodule_package. .output [file object] File object used to write verbose output of the compililation and packaging process. """ def __init__(self, output=None): """Create a ModuleCompiler instance, optionally with an output file object for verbose output of the compilation process. """ self.mls = selinux.is_selinux_mls_enabled() self.module = True self.checkmodule = "/usr/bin/checkmodule" self.semodule_package = "/usr/bin/semodule_package" self.output = output self.last_output = "" self.refpol_makefile = defaults.refpolicy_makefile() self.make = "/usr/bin/make" def o(self, str): if self.output: self.output.write(str + "\n") self.last_output = str def run(self, command): self.o(command) rc, output = getstatusoutput(command) self.o(output) return rc def gen_filenames(self, sourcename): """Generate the module and policy package filenames from a source file name. The source file must be in the form of "foo.te". This will generate "foo.mod" and "foo.pp". Returns a tuple with (modname, policypackage). """ splitname = sourcename.split(".") if len(splitname) < 2: raise RuntimeError("invalid sourcefile name %s (must end in .te)", sourcename) # Handle other periods in the filename correctly basename = ".".join(splitname[0:-1]) modname = basename + ".mod" packagename = basename + ".pp" return (modname, packagename) def create_module_package(self, sourcename, refpolicy=True): """Create a module package saved in a packagename from a sourcename. The create_module_package creates a module package saved in a file named sourcename (.pp is the standard extension) from a source file (.te is the standard extension). The source file should contain SELinux policy statements appropriate for a base or non-base module (depending on the setting of .module). Only file names are accepted, not open file objects or descriptors because the command line SELinux tools are used. On error a RuntimeError will be raised with a descriptive error message. """ if refpolicy: self.refpol_build(sourcename) else: modname, packagename = self.gen_filenames(sourcename) self.compile(sourcename, modname) self.package(modname, packagename) os.unlink(modname) def refpol_build(self, sourcename): # Compile command = self.make + " -f " + self.refpol_makefile rc = self.run(command) # Raise an error if the process failed if rc != 0: raise RuntimeError("compilation failed:\n%s" % self.last_output) def compile(self, sourcename, modname): s = [self.checkmodule] if self.mls: s.append("-M") if self.module: s.append("-m") s.append("-o") s.append(modname) s.append(sourcename) rc = self.run(" ".join(s)) if rc != 0: raise RuntimeError("compilation failed:\n%s" % self.last_output) def package(self, modname, packagename): s = [self.semodule_package] s.append("-o") s.append(packagename) s.append("-m") s.append(modname) rc = self.run(" ".join(s)) if rc != 0: raise RuntimeError("packaging failed [%s]" % self.last_output) selinux-python-2.8/sepolgen/src/sepolgen/objectmodel.py000066400000000000000000000145661330160122500234560ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ This module provides knowledge object classes and permissions. It should be used to keep this knowledge from leaking into the more generic parts of the policy generation. """ # Objects that can be implicitly typed - these objects do # not _have_ to be implicitly typed (e.g., sockets can be # explicitly labeled), but they often are. # # File is in this list for /proc/self # # This list is useful when dealing with rules that have a # type (or param) used as both a subject and object. For # example: # # allow httpd_t httpd_t : socket read; # # This rule makes sense because the socket was (presumably) created # by a process with the type httpd_t. implicitly_typed_objects = ["socket", "fd", "process", "file", "lnk_file", "fifo_file", "dbus", "capability", "unix_stream_socket"] #:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # #Information Flow # # All of the permissions in SELinux can be described in terms of # information flow. For example, a read of a file is a flow of # information from that file to the process reading. Viewing # permissions in these terms can be used to model a varity of # security properties. # # Here we have some infrastructure for understanding permissions # in terms of information flow # #:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # Information flow deals with information either flowing from a subject # to and object ("write") or to a subject from an object ("read"). Read # or write is described from the subject point-of-view. It is also possible # for a permission to represent both a read and write (though the flow is # typical asymettric in terms of bandwidth). It is also possible for # permission to not flow information (meaning that the result is pure # side-effect). # # The following constants are for representing the directionality # of information flow. FLOW_NONE = 0 FLOW_READ = 1 FLOW_WRITE = 2 FLOW_BOTH = FLOW_READ | FLOW_WRITE # These are used by the parser and for nice disply of the directions str_to_dir = { "n" : FLOW_NONE, "r" : FLOW_READ, "w" : FLOW_WRITE, "b" : FLOW_BOTH } dir_to_str = { FLOW_NONE : "n", FLOW_READ : "r", FLOW_WRITE : "w", FLOW_BOTH : "b" } class PermMap: """A mapping between a permission and its information flow properties. PermMap represents the information flow properties of a single permission including the direction (read, write, etc.) and an abstract representation of the bandwidth of the flow (weight). """ def __init__(self, perm, dir, weight): self.perm = perm self.dir = dir self.weight = weight def __repr__(self): return "" % (self.perm, dir_to_str[self.dir], self.weight) class PermMappings: """The information flow properties of a set of object classes and permissions. PermMappings maps one or more classes and permissions to their PermMap objects describing their information flow charecteristics. """ def __init__(self): self.classes = { } self.default_weight = 5 self.default_dir = FLOW_BOTH def from_file(self, fd): """Read the permission mappings from a file. This reads the format used by Apol in the setools suite. """ # This parsing is deliberitely picky and bails at the least error. It # is assumed that the permission map file will be shipped as part # of sepolgen and not user modified, so this is a reasonable design # choice. If user supplied permission mappings are needed the parser # should be made a little more robust and give better error messages. cur = None for line in fd: fields = line.split() if len(fields) == 0 or len(fields) == 1 or fields[0] == "#": continue if fields[0] == "class": c = fields[1] if c in self.classes: raise ValueError("duplicate class in perm map") self.classes[c] = { } cur = self.classes[c] else: if len(fields) != 3: raise ValueError("error in object classs permissions") if cur is None: raise ValueError("permission outside of class") pm = PermMap(fields[0], str_to_dir[fields[1]], int(fields[2])) cur[pm.perm] = pm def get(self, obj, perm): """Get the permission map for the object permission. Returns: PermMap representing the permission Raises: KeyError if the object or permission is not defined """ return self.classes[obj][perm] def getdefault(self, obj, perm): """Get the permission map for the object permission or a default. getdefault is the same as get except that a default PermMap is returned if the object class or permission is not defined. The default is FLOW_BOTH with a weight of 5. """ try: pm = self.classes[obj][perm] except KeyError: return PermMap(perm, self.default_dir, self.default_weight) return pm def getdefault_direction(self, obj, perms): dir = FLOW_NONE for perm in perms: pm = self.getdefault(obj, perm) dir = dir | pm.dir return dir def getdefault_distance(self, obj, perms): total = 0 for perm in perms: pm = self.getdefault(obj, perm) total += pm.weight return total selinux-python-2.8/sepolgen/src/sepolgen/output.py000066400000000000000000000120101330160122500225050ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ Classes and functions for the output of reference policy modules. This module takes a refpolicy.Module object and formats it for output using the ModuleWriter object. By separating the output in this way the other parts of Madison can focus solely on generating policy. This keeps the semantic / syntactic issues cleanly separated from the formatting issues. """ from . import refpolicy from . import util if util.PY3: from .util import cmp class ModuleWriter: def __init__(self): self.fd = None self.module = None self.sort = True self.requires = True def write(self, module, fd): self.module = module if self.sort: sort_filter(self.module) # FIXME - make this handle nesting for node, depth in refpolicy.walktree(self.module, showdepth=True): fd.write("%s\n" % str(node)) # Helper functions for sort_filter - this is all done old school # C style rather than with polymorphic methods because this sorting # is specific to output. It is not necessarily the comparison you # want generally. # Compare two IdSets - we could probably do something clever # with different here, but this works. def id_set_cmp(x, y): xl = util.set_to_list(x) xl.sort() yl = util.set_to_list(y) yl.sort() if len(xl) != len(yl): return cmp(xl[0], yl[0]) for v in zip(xl, yl): if v[0] != v[1]: return cmp(v[0], v[1]) return 0 # Compare two avrules def avrule_cmp(a, b): ret = id_set_cmp(a.src_types, b.src_types) if ret is not 0: return ret ret = id_set_cmp(a.tgt_types, b.tgt_types) if ret is not 0: return ret ret = id_set_cmp(a.obj_classes, b.obj_classes) if ret is not 0: return ret # At this point, who cares - just return something return cmp(len(a.perms), len(b.perms)) # Compare two interface calls def ifcall_cmp(a, b): if a.args[0] != b.args[0]: return cmp(a.args[0], b.args[0]) return cmp(a.ifname, b.ifname) # Compare an two avrules or interface calls def rule_cmp(a, b): if isinstance(a, refpolicy.InterfaceCall): if isinstance(b, refpolicy.InterfaceCall): return ifcall_cmp(a, b) else: return id_set_cmp([a.args[0]], b.src_types) else: if isinstance(b, refpolicy.AVRule): return avrule_cmp(a,b) else: return id_set_cmp(a.src_types, [b.args[0]]) def role_type_cmp(a, b): return cmp(a.role, b.role) def sort_filter(module): """Sort and group the output for readability. """ def sort_node(node): c = [] # Module statement for mod in node.module_declarations(): c.append(mod) c.append(refpolicy.Comment()) # Requires for require in node.requires(): c.append(require) c.append(refpolicy.Comment()) # Rules # # We are going to group output by source type (which # we assume is the first argument for interfaces). rules = [] rules.extend(node.avrules()) rules.extend(node.interface_calls()) rules.sort(key=util.cmp_to_key(rule_cmp)) cur = None sep_rules = [] for rule in rules: if isinstance(rule, refpolicy.InterfaceCall): x = rule.args[0] else: x = util.first(rule.src_types) if cur != x: if cur: sep_rules.append(refpolicy.Comment()) cur = x comment = refpolicy.Comment() comment.lines.append("============= %s ==============" % cur) sep_rules.append(comment) sep_rules.append(rule) c.extend(sep_rules) ras = [] ras.extend(node.role_types()) ras.sort(key=util.cmp_to_key(role_type_cmp)) if len(ras): comment = refpolicy.Comment() comment.lines.append("============= ROLES ==============") c.append(comment) c.extend(ras) # Everything else for child in node.children: if child not in c: c.append(child) node.children = c for node in module.nodes(): sort_node(node) selinux-python-2.8/sepolgen/src/sepolgen/policygen.py000066400000000000000000000344311330160122500231510ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # """ classes and algorithms for the generation of SELinux policy. """ import itertools import textwrap import selinux.audit2why as audit2why try: from setools import * except: pass from . import refpolicy from . import objectmodel from . import access from . import interfaces from . import matching from . import util # Constants for the level of explanation from the generation # routines NO_EXPLANATION = 0 SHORT_EXPLANATION = 1 LONG_EXPLANATION = 2 class PolicyGenerator: """Generate a reference policy module from access vectors. PolicyGenerator generates a new reference policy module or updates an existing module based on requested access in the form of access vectors. It generates allow rules and optionally module require statements and reference policy interfaces. By default only allow rules are generated. The methods .set_gen_refpol and .set_gen_requires turns on interface generation and requires generation respectively. PolicyGenerator can also optionally add comments explaining why a particular access was allowed based on the audit messages that generated the access. The access vectors passed in must have the .audit_msgs field set correctly and .explain set to SHORT|LONG_EXPLANATION to enable this feature. The module created by PolicyGenerator can be passed to output.ModuleWriter to output a text representation. """ def __init__(self, module=None): """Initialize a PolicyGenerator with an optional existing module. If the module paramater is not None then access will be added to the passed in module. Otherwise a new reference policy module will be created. """ self.ifgen = None self.explain = NO_EXPLANATION self.gen_requires = False if module: self.module = module else: self.module = refpolicy.Module() self.dontaudit = False self.domains = None def set_gen_refpol(self, if_set=None, perm_maps=None): """Set whether reference policy interfaces are generated. To turn on interface generation pass in an interface set to use for interface generation. To turn off interface generation pass in None. If interface generation is enabled requires generation will also be enabled. """ if if_set: self.ifgen = InterfaceGenerator(if_set, perm_maps) self.gen_requires = True else: self.ifgen = None self.__set_module_style() def set_gen_requires(self, status=True): """Set whether module requires are generated. Passing in true will turn on requires generation and False will disable generation. If requires generation is disabled interface generation will also be disabled and can only be re-enabled via .set_gen_refpol. """ self.gen_requires = status def set_gen_explain(self, explain=SHORT_EXPLANATION): """Set whether access is explained. """ self.explain = explain def set_gen_dontaudit(self, dontaudit): self.dontaudit = dontaudit def __set_module_style(self): if self.ifgen: refpolicy = True else: refpolicy = False for mod in self.module.module_declarations(): mod.refpolicy = refpolicy def set_module_name(self, name, version="1.0"): """Set the name of the module and optionally the version. """ # find an existing module declaration m = None for mod in self.module.module_declarations(): m = mod if not m: m = refpolicy.ModuleDeclaration() self.module.children.insert(0, m) m.name = name m.version = version if self.ifgen: m.refpolicy = True else: m.refpolicy = False def get_module(self): # Generate the requires if self.gen_requires: gen_requires(self.module) """Return the generated module""" return self.module def __add_allow_rules(self, avs): for av in avs: rule = refpolicy.AVRule(av) if self.dontaudit: rule.rule_type = rule.DONTAUDIT rule.comment = "" if self.explain: rule.comment = str(refpolicy.Comment(explain_access(av, verbosity=self.explain))) if av.type == audit2why.ALLOW: rule.comment += "\n#!!!! This avc is allowed in the current policy" if av.type == audit2why.DONTAUDIT: rule.comment += "\n#!!!! This avc has a dontaudit rule in the current policy" if av.type == audit2why.BOOLEAN: if len(av.data) > 1: rule.comment += "\n#!!!! This avc can be allowed using one of the these booleans:\n# %s" % ", ".join([x[0] for x in av.data]) else: rule.comment += "\n#!!!! This avc can be allowed using the boolean '%s'" % av.data[0][0] if av.type == audit2why.CONSTRAINT: rule.comment += "\n#!!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access." rule.comment += "\n#Constraint rule: " rule.comment += "\n#\t" + av.data[0] for reason in av.data[1:]: rule.comment += "\n#\tPossible cause is the source %s and target %s are different." % reason try: if ( av.type == audit2why.TERULE and "write" in av.perms and ( "dir" in av.obj_class or "open" in av.perms )): if not self.domains: self.domains = seinfo(ATTRIBUTE, name="domain")[0]["types"] types=[] for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: if i not in self.domains: types.append(i) if len(types) == 1: rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following type:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) elif len(types) >= 1: rule.comment += "\n#!!!! The source type '%s' can write to a '%s' of the following types:\n# %s\n" % ( av.src_type, av.obj_class, ", ".join(types)) except: pass self.module.children.append(rule) def add_access(self, av_set): """Add the access from the access vector set to this module. """ # Use the interface generator to split the access # into raw allow rules and interfaces. After this # a will contain a list of access that should be # used as raw allow rules and the interfaces will # be added to the module. if self.ifgen: raw_allow, ifcalls = self.ifgen.gen(av_set, self.explain) self.module.children.extend(ifcalls) else: raw_allow = av_set # Generate the raw allow rules from the filtered list self.__add_allow_rules(raw_allow) def add_role_types(self, role_type_set): for role_type in role_type_set: self.module.children.append(role_type) def explain_access(av, ml=None, verbosity=SHORT_EXPLANATION): """Explain why a policy statement was generated. Return a string containing a text explanation of why a policy statement was generated. The string is commented and wrapped and can be directly inserted into a policy. Params: av - access vector representing the access. Should have .audit_msgs set appropriately. verbosity - the amount of explanation provided. Should be set to NO_EXPLANATION, SHORT_EXPLANATION, or LONG_EXPLANATION. Returns: list of strings - strings explaining the access or an empty string if verbosity=NO_EXPLANATION or there is not sufficient information to provide an explanation. """ s = [] def explain_interfaces(): if not ml: return s.append(" Interface options:") for match in ml.all(): ifcall = call_interface(match.interface, ml.av) s.append(' %s # [%d]' % (ifcall.to_string(), match.dist)) # Format the raw audit data to explain why the # access was requested - either long or short. if verbosity == LONG_EXPLANATION: for msg in av.audit_msgs: s.append(' %s' % msg.header) s.append(' scontext="%s" tcontext="%s"' % (str(msg.scontext), str(msg.tcontext))) s.append(' class="%s" perms="%s"' % (msg.tclass, refpolicy.list_to_space_str(msg.accesses))) s.append(' comm="%s" exe="%s" path="%s"' % (msg.comm, msg.exe, msg.path)) s.extend(textwrap.wrap('message="' + msg.message + '"', 80, initial_indent=" ", subsequent_indent=" ")) explain_interfaces() elif verbosity: s.append(' src="%s" tgt="%s" class="%s", perms="%s"' % (av.src_type, av.tgt_type, av.obj_class, av.perms.to_space_str())) # For the short display we are only going to use the additional information # from the first audit message. For the vast majority of cases this info # will always be the same anyway. if len(av.audit_msgs) > 0: msg = av.audit_msgs[0] s.append(' comm="%s" exe="%s" path="%s"' % (msg.comm, msg.exe, msg.path)) explain_interfaces() return s def call_interface(interface, av): params = [] args = [] params.extend(interface.params.values()) params.sort(key=lambda param: param.num, reverse=True) ifcall = refpolicy.InterfaceCall() ifcall.ifname = interface.name for i in range(len(params)): if params[i].type == refpolicy.SRC_TYPE: ifcall.args.append(av.src_type) elif params[i].type == refpolicy.TGT_TYPE: ifcall.args.append(av.tgt_type) elif params[i].type == refpolicy.OBJ_CLASS: ifcall.args.append(av.obj_class) else: print(params[i].type) assert(0) assert(len(ifcall.args) > 0) return ifcall class InterfaceGenerator: def __init__(self, ifs, perm_maps=None): self.ifs = ifs self.hack_check_ifs(ifs) self.matcher = matching.AccessMatcher(perm_maps) self.calls = [] def hack_check_ifs(self, ifs): # FIXME: Disable interfaces we can't call - this is a hack. # Because we don't handle roles, multiple paramaters, etc., # etc., we must make certain we can actually use a returned # interface. for x in ifs.interfaces.values(): params = [] params.extend(x.params.values()) params.sort(key=lambda param: param.num, reverse=True) for i in range(len(params)): # Check that the paramater position matches # the number (e.g., $1 is the first arg). This # will fail if the parser missed something. if (i + 1) != params[i].num: x.enabled = False break # Check that we can handle the param type (currently excludes # roles. if params[i].type not in [refpolicy.SRC_TYPE, refpolicy.TGT_TYPE, refpolicy.OBJ_CLASS]: x.enabled = False break def gen(self, avs, verbosity): raw_av = self.match(avs) ifcalls = [] for ml in self.calls: ifcall = call_interface(ml.best().interface, ml.av) if verbosity: ifcall.comment = refpolicy.Comment(explain_access(ml.av, ml, verbosity)) ifcalls.append((ifcall, ml)) d = [] for ifcall, ifs in ifcalls: found = False for o_ifcall in d: if o_ifcall.matches(ifcall): if o_ifcall.comment and ifcall.comment: o_ifcall.comment.merge(ifcall.comment) found = True if not found: d.append(ifcall) return (raw_av, d) def match(self, avs): raw_av = [] for av in avs: ans = matching.MatchList() self.matcher.search_ifs(self.ifs, av, ans) if len(ans): self.calls.append(ans) else: raw_av.append(av) return raw_av def gen_requires(module): """Add require statements to the module. """ def collect_requires(node): r = refpolicy.Require() for avrule in node.avrules(): r.types.update(avrule.src_types) r.types.update(avrule.tgt_types) for obj in avrule.obj_classes: r.add_obj_class(obj, avrule.perms) for ifcall in node.interface_calls(): for arg in ifcall.args: # FIXME - handle non-type arguments when we # can actually figure those out. r.types.add(arg) for role_type in node.role_types(): r.roles.add(role_type.role) r.types.update(role_type.types) r.types.discard("self") node.children.insert(0, r) # FUTURE - this is untested on modules with any sort of # nesting for node in module.nodes(): collect_requires(node) selinux-python-2.8/sepolgen/src/sepolgen/refparser.py000066400000000000000000000743171330160122500231600ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006-2007 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # # OVERVIEW # # # This is a parser for the refpolicy policy "language" - i.e., the # normal SELinux policy language plus the refpolicy style M4 macro # constructs on top of that base language. This parser is primarily # aimed at parsing the policy headers in order to create an abstract # policy representation suitable for generating policy. # # Both the lexer and parser are included in this file. The are implemented # using the Ply library (included with sepolgen). import sys import os import re import traceback from . import access from . import defaults from . import lex from . import refpolicy from . import yacc # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # # lexer # # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: tokens = ( # basic tokens, punctuation 'TICK', 'SQUOTE', 'OBRACE', 'CBRACE', 'SEMI', 'COLON', 'OPAREN', 'CPAREN', 'COMMA', 'MINUS', 'TILDE', 'ASTERISK', 'AMP', 'BAR', 'EXPL', 'EQUAL', 'FILENAME', 'IDENTIFIER', 'NUMBER', 'PATH', 'IPV6_ADDR', # reserved words # module 'MODULE', 'POLICY_MODULE', 'REQUIRE', # flask 'SID', 'GENFSCON', 'FS_USE_XATTR', 'FS_USE_TRANS', 'FS_USE_TASK', 'PORTCON', 'NODECON', 'NETIFCON', 'PIRQCON', 'IOMEMCON', 'IOPORTCON', 'PCIDEVICECON', 'DEVICETREECON', # object classes 'CLASS', # types and attributes 'TYPEATTRIBUTE', 'ROLEATTRIBUTE', 'TYPE', 'ATTRIBUTE', 'ATTRIBUTE_ROLE', 'ALIAS', 'TYPEALIAS', # conditional policy 'BOOL', 'TRUE', 'FALSE', 'IF', 'ELSE', # users and roles 'ROLE', 'TYPES', # rules 'ALLOW', 'DONTAUDIT', 'AUDITALLOW', 'NEVERALLOW', 'PERMISSIVE', 'TYPEBOUNDS', 'TYPE_TRANSITION', 'TYPE_CHANGE', 'TYPE_MEMBER', 'RANGE_TRANSITION', 'ROLE_TRANSITION', # refpolicy keywords 'OPT_POLICY', 'INTERFACE', 'TUNABLE_POLICY', 'GEN_REQ', 'TEMPLATE', 'GEN_CONTEXT', # m4 'IFELSE', 'IFDEF', 'IFNDEF', 'DEFINE' ) # All reserved keywords - see t_IDENTIFIER for how these are matched in # the lexer. reserved = { # module 'module' : 'MODULE', 'policy_module' : 'POLICY_MODULE', 'require' : 'REQUIRE', # flask 'sid' : 'SID', 'genfscon' : 'GENFSCON', 'fs_use_xattr' : 'FS_USE_XATTR', 'fs_use_trans' : 'FS_USE_TRANS', 'fs_use_task' : 'FS_USE_TASK', 'portcon' : 'PORTCON', 'nodecon' : 'NODECON', 'netifcon' : 'NETIFCON', 'pirqcon' : 'PIRQCON', 'iomemcon' : 'IOMEMCON', 'ioportcon' : 'IOPORTCON', 'pcidevicecon' : 'PCIDEVICECON', 'devicetreecon' : 'DEVICETREECON', # object classes 'class' : 'CLASS', # types and attributes 'typeattribute' : 'TYPEATTRIBUTE', 'roleattribute' : 'ROLEATTRIBUTE', 'type' : 'TYPE', 'attribute' : 'ATTRIBUTE', 'attribute_role' : 'ATTRIBUTE_ROLE', 'alias' : 'ALIAS', 'typealias' : 'TYPEALIAS', # conditional policy 'bool' : 'BOOL', 'true' : 'TRUE', 'false' : 'FALSE', 'if' : 'IF', 'else' : 'ELSE', # users and roles 'role' : 'ROLE', 'types' : 'TYPES', # rules 'allow' : 'ALLOW', 'dontaudit' : 'DONTAUDIT', 'auditallow' : 'AUDITALLOW', 'neverallow' : 'NEVERALLOW', 'permissive' : 'PERMISSIVE', 'typebounds' : 'TYPEBOUNDS', 'type_transition' : 'TYPE_TRANSITION', 'type_change' : 'TYPE_CHANGE', 'type_member' : 'TYPE_MEMBER', 'range_transition' : 'RANGE_TRANSITION', 'role_transition' : 'ROLE_TRANSITION', # refpolicy keywords 'optional_policy' : 'OPT_POLICY', 'interface' : 'INTERFACE', 'tunable_policy' : 'TUNABLE_POLICY', 'gen_require' : 'GEN_REQ', 'template' : 'TEMPLATE', 'gen_context' : 'GEN_CONTEXT', # M4 'ifelse' : 'IFELSE', 'ifndef' : 'IFNDEF', 'ifdef' : 'IFDEF', 'define' : 'DEFINE' } # The ply lexer allows definition of tokens in 2 ways: regular expressions # or functions. # Simple regex tokens t_TICK = r'\`' t_SQUOTE = r'\'' t_OBRACE = r'\{' t_CBRACE = r'\}' # This will handle spurios extra ';' via the + t_SEMI = r'\;+' t_COLON = r'\:' t_OPAREN = r'\(' t_CPAREN = r'\)' t_COMMA = r'\,' t_MINUS = r'\-' t_TILDE = r'\~' t_ASTERISK = r'\*' t_AMP = r'\&' t_BAR = r'\|' t_EXPL = r'\!' t_EQUAL = r'\=' t_NUMBER = r'[0-9\.]+' t_PATH = r'/[a-zA-Z0-9)_\.\*/\$]*' #t_IPV6_ADDR = r'[a-fA-F0-9]{0,4}:[a-fA-F0-9]{0,4}:([a-fA-F0-9]{0,4}:)*' # Ignore whitespace - this is a special token for ply that more efficiently # ignores uninteresting tokens. t_ignore = " \t" # More complex tokens def t_IPV6_ADDR(t): r'[a-fA-F0-9]{0,4}:[a-fA-F0-9]{0,4}:([a-fA-F0-9]|:)*' # This is a function simply to force it sooner into # the regex list return t def t_m4comment(t): r'dnl.*\n' # Ignore all comments t.lexer.lineno += 1 def t_refpolicywarn1(t): r'define.*refpolicywarn\(.*\n' # Ignore refpolicywarn statements - they sometimes # contain text that we can't parse. t.skip(1) def t_refpolicywarn(t): r'refpolicywarn\(.*\n' # Ignore refpolicywarn statements - they sometimes # contain text that we can't parse. t.lexer.lineno += 1 def t_IDENTIFIER(t): r'[a-zA-Z_\$][a-zA-Z0-9_\-\+\.\$\*~]*' # Handle any keywords t.type = reserved.get(t.value,'IDENTIFIER') return t def t_FILENAME(t): r'\"[a-zA-Z0-9_\-\+\.\$\*~ :]+\"' # Handle any keywords t.type = reserved.get(t.value,'FILENAME') return t def t_comment(t): r'\#.*\n' # Ignore all comments t.lexer.lineno += 1 def t_error(t): print("Illegal character '%s'" % t.value[0]) t.skip(1) def t_newline(t): r'\n+' t.lexer.lineno += len(t.value) # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # # Parser # # ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: # Global data used during parsing - making it global is easier than # passing the state through the parsing functions. # m is the top-level data structure (stands for modules). m = None # error is either None (indicating no error) or a string error message. error = None parse_file = "" # spt is the support macros (e.g., obj/perm sets) - it is an instance of # refpolicy.SupportMacros and should always be present during parsing # though it may not contain any macros. spt = None success = True # utilities def collect(stmts, parent, val=None): if stmts is None: return for s in stmts: if s is None: continue s.parent = parent if val is not None: parent.children.insert(0, (val, s)) else: parent.children.insert(0, s) def expand(ids, s): for id in ids: if spt.has_key(id): s.update(spt.by_name(id)) else: s.add(id) # Top-level non-terminal def p_statements(p): '''statements : statement | statements statement | empty ''' if len(p) == 2 and p[1]: m.children.append(p[1]) elif len(p) > 2 and p[2]: m.children.append(p[2]) def p_statement(p): '''statement : interface | template | obj_perm_set | policy | policy_module_stmt | module_stmt ''' p[0] = p[1] def p_empty(p): 'empty :' pass # # Reference policy language constructs # # This is for the policy module statement (e.g., policy_module(foo,1.2.0)). # We have a separate terminal for either the basic language module statement # and interface calls to make it easier to identifier. def p_policy_module_stmt(p): 'policy_module_stmt : POLICY_MODULE OPAREN IDENTIFIER COMMA NUMBER CPAREN' m = refpolicy.ModuleDeclaration() m.name = p[3] m.version = p[5] m.refpolicy = True p[0] = m def p_interface(p): '''interface : INTERFACE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' x = refpolicy.Interface(p[4]) collect(p[8], x) p[0] = x def p_template(p): '''template : TEMPLATE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN | DEFINE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' x = refpolicy.Template(p[4]) collect(p[8], x) p[0] = x def p_define(p): '''define : DEFINE OPAREN TICK IDENTIFIER SQUOTE CPAREN''' # This is for defining single M4 values (to be used later in ifdef statements). # Example: define(`sulogin_no_pam'). We don't currently do anything with these # but we should in the future when we correctly resolve ifdef statements. p[0] = None def p_interface_stmts(p): '''interface_stmts : policy | interface_stmts policy | empty ''' if len(p) == 2 and p[1]: p[0] = p[1] elif len(p) > 2: if not p[1]: if p[2]: p[0] = p[2] elif not p[2]: p[0] = p[1] else: p[0] = p[1] + p[2] def p_optional_policy(p): '''optional_policy : OPT_POLICY OPAREN TICK interface_stmts SQUOTE CPAREN | OPT_POLICY OPAREN TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' o = refpolicy.OptionalPolicy() collect(p[4], o, val=True) if len(p) > 7: collect(p[8], o, val=False) p[0] = [o] def p_tunable_policy(p): '''tunable_policy : TUNABLE_POLICY OPAREN TICK cond_expr SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN | TUNABLE_POLICY OPAREN TICK cond_expr SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN ''' x = refpolicy.TunablePolicy() x.cond_expr = p[4] collect(p[8], x, val=True) if len(p) > 11: collect(p[12], x, val=False) p[0] = [x] def p_ifelse(p): '''ifelse : IFELSE OPAREN TICK IDENTIFIER SQUOTE COMMA COMMA TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFELSE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFELSE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi ''' # x = refpolicy.IfDef(p[4]) # v = True # collect(p[8], x, val=v) # if len(p) > 12: # collect(p[12], x, val=False) # p[0] = [x] pass def p_ifdef(p): '''ifdef : IFDEF OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFNDEF OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi | IFDEF OPAREN TICK IDENTIFIER SQUOTE COMMA TICK interface_stmts SQUOTE COMMA TICK interface_stmts SQUOTE CPAREN optional_semi ''' x = refpolicy.IfDef(p[4]) if p[1] == 'ifdef': v = True else: v = False collect(p[8], x, val=v) if len(p) > 12: collect(p[12], x, val=False) p[0] = [x] def p_interface_call(p): '''interface_call : IDENTIFIER OPAREN interface_call_param_list CPAREN | IDENTIFIER OPAREN CPAREN | IDENTIFIER OPAREN interface_call_param_list CPAREN SEMI''' # Allow spurious semi-colons at the end of interface calls i = refpolicy.InterfaceCall(ifname=p[1]) if len(p) > 4: i.args.extend(p[3]) p[0] = i def p_interface_call_param(p): '''interface_call_param : IDENTIFIER | IDENTIFIER MINUS IDENTIFIER | nested_id_set | TRUE | FALSE | FILENAME ''' # Intentionally let single identifiers pass through # List means set, non-list identifier if len(p) == 2: p[0] = p[1] else: p[0] = [p[1], "-" + p[3]] def p_interface_call_param_list(p): '''interface_call_param_list : interface_call_param | interface_call_param_list COMMA interface_call_param ''' if len(p) == 2: p[0] = [p[1]] else: p[0] = p[1] + [p[3]] def p_obj_perm_set(p): 'obj_perm_set : DEFINE OPAREN TICK IDENTIFIER SQUOTE COMMA TICK names SQUOTE CPAREN' s = refpolicy.ObjPermSet(p[4]) s.perms = p[8] p[0] = s # # Basic SELinux policy language # def p_policy(p): '''policy : policy_stmt | optional_policy | tunable_policy | ifdef | ifelse | conditional ''' p[0] = p[1] def p_policy_stmt(p): '''policy_stmt : gen_require | avrule_def | typerule_def | typebound_def | typeattribute_def | roleattribute_def | interface_call | role_def | role_allow | permissive | type_def | typealias_def | attribute_def | attribute_role_def | range_transition_def | role_transition_def | bool | define | initial_sid | genfscon | fs_use | portcon | nodecon | netifcon | pirqcon | iomemcon | ioportcon | pcidevicecon | devicetreecon ''' if p[1]: p[0] = [p[1]] def p_module_stmt(p): 'module_stmt : MODULE IDENTIFIER NUMBER SEMI' m = refpolicy.ModuleDeclaration() m.name = p[2] m.version = p[3] m.refpolicy = False p[0] = m def p_gen_require(p): '''gen_require : GEN_REQ OPAREN TICK requires SQUOTE CPAREN | REQUIRE OBRACE requires CBRACE''' # We ignore the require statements - they are redundant data from our point-of-view. # Checkmodule will verify them later anyway so we just assume that they match what # is in the rest of the interface. pass def p_requires(p): '''requires : require | requires require | ifdef | requires ifdef ''' pass def p_require(p): '''require : TYPE comma_list SEMI | ROLE comma_list SEMI | ATTRIBUTE comma_list SEMI | ATTRIBUTE_ROLE comma_list SEMI | CLASS comma_list SEMI | BOOL comma_list SEMI ''' pass def p_security_context(p): '''security_context : IDENTIFIER COLON IDENTIFIER COLON IDENTIFIER | IDENTIFIER COLON IDENTIFIER COLON IDENTIFIER COLON mls_range_def''' # This will likely need some updates to handle complex levels s = refpolicy.SecurityContext() s.user = p[1] s.role = p[3] s.type = p[5] if len(p) > 6: s.level = p[7] p[0] = s def p_gen_context(p): '''gen_context : GEN_CONTEXT OPAREN security_context COMMA mls_range_def CPAREN ''' # We actually store gen_context statements in a SecurityContext # object - it knows how to output either a bare context or a # gen_context statement. s = p[3] s.level = p[5] p[0] = s def p_context(p): '''context : security_context | gen_context ''' p[0] = p[1] def p_initial_sid(p): '''initial_sid : SID IDENTIFIER context''' s = refpolicy.InitialSid() s.name = p[2] s.context = p[3] p[0] = s def p_genfscon(p): '''genfscon : GENFSCON IDENTIFIER PATH context''' g = refpolicy.GenfsCon() g.filesystem = p[2] g.path = p[3] g.context = p[4] p[0] = g def p_fs_use(p): '''fs_use : FS_USE_XATTR IDENTIFIER context SEMI | FS_USE_TASK IDENTIFIER context SEMI | FS_USE_TRANS IDENTIFIER context SEMI ''' f = refpolicy.FilesystemUse() if p[1] == "fs_use_xattr": f.type = refpolicy.FilesystemUse.XATTR elif p[1] == "fs_use_task": f.type = refpolicy.FilesystemUse.TASK elif p[1] == "fs_use_trans": f.type = refpolicy.FilesystemUse.TRANS f.filesystem = p[2] f.context = p[3] p[0] = f def p_portcon(p): '''portcon : PORTCON IDENTIFIER NUMBER context | PORTCON IDENTIFIER NUMBER MINUS NUMBER context''' c = refpolicy.PortCon() c.port_type = p[2] if len(p) == 5: c.port_number = p[3] c.context = p[4] else: c.port_number = p[3] + "-" + p[4] c.context = p[5] p[0] = c def p_nodecon(p): '''nodecon : NODECON NUMBER NUMBER context | NODECON IPV6_ADDR IPV6_ADDR context ''' n = refpolicy.NodeCon() n.start = p[2] n.end = p[3] n.context = p[4] p[0] = n def p_netifcon(p): 'netifcon : NETIFCON IDENTIFIER context context' n = refpolicy.NetifCon() n.interface = p[2] n.interface_context = p[3] n.packet_context = p[4] p[0] = n def p_pirqcon(p): 'pirqcon : PIRQCON NUMBER context' c = refpolicy.PirqCon() c.pirq_number = p[2] c.context = p[3] p[0] = c def p_iomemcon(p): '''iomemcon : IOMEMCON NUMBER context | IOMEMCON NUMBER MINUS NUMBER context''' c = refpolicy.IomemCon() if len(p) == 4: c.device_mem = p[2] c.context = p[3] else: c.device_mem = p[2] + "-" + p[3] c.context = p[4] p[0] = c def p_ioportcon(p): '''ioportcon : IOPORTCON NUMBER context | IOPORTCON NUMBER MINUS NUMBER context''' c = refpolicy.IoportCon() if len(p) == 4: c.ioport = p[2] c.context = p[3] else: c.ioport = p[2] + "-" + p[3] c.context = p[4] p[0] = c def p_pcidevicecon(p): 'pcidevicecon : PCIDEVICECON NUMBER context' c = refpolicy.PciDeviceCon() c.device = p[2] c.context = p[3] p[0] = c def p_devicetreecon(p): 'devicetreecon : DEVICETREECON NUMBER context' c = refpolicy.DevicetTeeCon() c.path = p[2] c.context = p[3] p[0] = c def p_mls_range_def(p): '''mls_range_def : mls_level_def MINUS mls_level_def | mls_level_def ''' p[0] = p[1] if len(p) > 2: p[0] = p[0] + "-" + p[3] def p_mls_level_def(p): '''mls_level_def : IDENTIFIER COLON comma_list | IDENTIFIER ''' p[0] = p[1] if len(p) > 2: p[0] = p[0] + ":" + ",".join(p[3]) def p_type_def(p): '''type_def : TYPE IDENTIFIER COMMA comma_list SEMI | TYPE IDENTIFIER SEMI | TYPE IDENTIFIER ALIAS names SEMI | TYPE IDENTIFIER ALIAS names COMMA comma_list SEMI ''' t = refpolicy.Type(p[2]) if len(p) == 6: if p[3] == ',': t.attributes.update(p[4]) else: t.aliases = p[4] elif len(p) > 4: t.aliases = p[4] if len(p) == 8: t.attributes.update(p[6]) p[0] = t def p_attribute_def(p): 'attribute_def : ATTRIBUTE IDENTIFIER SEMI' a = refpolicy.Attribute(p[2]) p[0] = a def p_attribute_role_def(p): 'attribute_role_def : ATTRIBUTE_ROLE IDENTIFIER SEMI' a = refpolicy.Attribute_Role(p[2]) p[0] = a def p_typealias_def(p): 'typealias_def : TYPEALIAS IDENTIFIER ALIAS names SEMI' t = refpolicy.TypeAlias() t.type = p[2] t.aliases = p[4] p[0] = t def p_role_def(p): '''role_def : ROLE IDENTIFIER TYPES comma_list SEMI | ROLE IDENTIFIER SEMI''' r = refpolicy.Role() r.role = p[2] if len(p) > 4: r.types.update(p[4]) p[0] = r def p_role_allow(p): 'role_allow : ALLOW names names SEMI' r = refpolicy.RoleAllow() r.src_roles = p[2] r.tgt_roles = p[3] p[0] = r def p_permissive(p): 'permissive : PERMISSIVE names SEMI' t.skip(1) def p_avrule_def(p): '''avrule_def : ALLOW names names COLON names names SEMI | DONTAUDIT names names COLON names names SEMI | AUDITALLOW names names COLON names names SEMI | NEVERALLOW names names COLON names names SEMI ''' a = refpolicy.AVRule() if p[1] == 'dontaudit': a.rule_type = refpolicy.AVRule.DONTAUDIT elif p[1] == 'auditallow': a.rule_type = refpolicy.AVRule.AUDITALLOW elif p[1] == 'neverallow': a.rule_type = refpolicy.AVRule.NEVERALLOW a.src_types = p[2] a.tgt_types = p[3] a.obj_classes = p[5] a.perms = p[6] p[0] = a def p_typerule_def(p): '''typerule_def : TYPE_TRANSITION names names COLON names IDENTIFIER SEMI | TYPE_TRANSITION names names COLON names IDENTIFIER FILENAME SEMI | TYPE_TRANSITION names names COLON names IDENTIFIER IDENTIFIER SEMI | TYPE_CHANGE names names COLON names IDENTIFIER SEMI | TYPE_MEMBER names names COLON names IDENTIFIER SEMI ''' t = refpolicy.TypeRule() if p[1] == 'type_change': t.rule_type = refpolicy.TypeRule.TYPE_CHANGE elif p[1] == 'type_member': t.rule_type = refpolicy.TypeRule.TYPE_MEMBER t.src_types = p[2] t.tgt_types = p[3] t.obj_classes = p[5] t.dest_type = p[6] t.file_name = p[7] p[0] = t def p_typebound_def(p): '''typebound_def : TYPEBOUNDS IDENTIFIER comma_list SEMI''' t = refpolicy.TypeBound() t.type = p[2] t.tgt_types.update(p[3]) p[0] = t def p_bool(p): '''bool : BOOL IDENTIFIER TRUE SEMI | BOOL IDENTIFIER FALSE SEMI''' b = refpolicy.Bool() b.name = p[2] if p[3] == "true": b.state = True else: b.state = False p[0] = b def p_conditional(p): ''' conditional : IF OPAREN cond_expr CPAREN OBRACE interface_stmts CBRACE | IF OPAREN cond_expr CPAREN OBRACE interface_stmts CBRACE ELSE OBRACE interface_stmts CBRACE ''' c = refpolicy.Conditional() c.cond_expr = p[3] collect(p[6], c, val=True) if len(p) > 8: collect(p[10], c, val=False) p[0] = [c] def p_typeattribute_def(p): '''typeattribute_def : TYPEATTRIBUTE IDENTIFIER comma_list SEMI''' t = refpolicy.TypeAttribute() t.type = p[2] t.attributes.update(p[3]) p[0] = t def p_roleattribute_def(p): '''roleattribute_def : ROLEATTRIBUTE IDENTIFIER comma_list SEMI''' t = refpolicy.RoleAttribute() t.role = p[2] t.roleattributes.update(p[3]) p[0] = t def p_range_transition_def(p): '''range_transition_def : RANGE_TRANSITION names names COLON names mls_range_def SEMI | RANGE_TRANSITION names names names SEMI''' pass def p_role_transition_def(p): '''role_transition_def : ROLE_TRANSITION names names names SEMI''' pass def p_cond_expr(p): '''cond_expr : IDENTIFIER | EXPL cond_expr | cond_expr AMP AMP cond_expr | cond_expr BAR BAR cond_expr | cond_expr EQUAL EQUAL cond_expr | cond_expr EXPL EQUAL cond_expr ''' l = len(p) if l == 2: p[0] = [p[1]] elif l == 3: p[0] = [p[1]] + p[2] else: p[0] = p[1] + [p[2] + p[3]] + p[4] # # Basic terminals # # Identifiers and lists of identifiers. These must # be handled somewhat gracefully. Names returns an IdSet and care must # be taken that this is _assigned_ to an object to correctly update # all of the flags (as opposed to using update). The other terminals # return list - this is to preserve ordering if it is important for # parsing (for example, interface_call must retain the ordering). Other # times the list should be used to update an IdSet. def p_names(p): '''names : identifier | nested_id_set | asterisk | TILDE identifier | TILDE nested_id_set | IDENTIFIER MINUS IDENTIFIER ''' s = refpolicy.IdSet() if len(p) < 3: expand(p[1], s) elif len(p) == 3: expand(p[2], s) s.compliment = True else: expand([p[1]]) s.add("-" + p[3]) p[0] = s def p_identifier(p): 'identifier : IDENTIFIER' p[0] = [p[1]] def p_asterisk(p): 'asterisk : ASTERISK' p[0] = [p[1]] def p_nested_id_set(p): '''nested_id_set : OBRACE nested_id_list CBRACE ''' p[0] = p[2] def p_nested_id_list(p): '''nested_id_list : nested_id_element | nested_id_list nested_id_element ''' if len(p) == 2: p[0] = p[1] else: p[0] = p[1] + p[2] def p_nested_id_element(p): '''nested_id_element : identifier | MINUS IDENTIFIER | nested_id_set ''' if len(p) == 2: p[0] = p[1] else: # For now just leave the '-' str = "-" + p[2] p[0] = [str] def p_comma_list(p): '''comma_list : nested_id_list | comma_list COMMA nested_id_list ''' if len(p) > 2: p[1] = p[1] + p[3] p[0] = p[1] def p_optional_semi(p): '''optional_semi : SEMI | empty''' pass # # Interface to the parser # def p_error(tok): global error, parse_file, success, parser error = "%s: Syntax error on line %d %s [type=%s]" % (parse_file, tok.lineno, tok.value, tok.type) print(error) success = False def prep_spt(spt): if not spt: return { } map = {} for x in spt: map[x.name] = x parser = None lexer = None def create_globals(module, support, debug): global parser, lexer, m, spt if not parser: lexer = lex.lex() parser = yacc.yacc(method="LALR", debug=debug, write_tables=0) if module is not None: m = module else: m = refpolicy.Module() if not support: spt = refpolicy.SupportMacros() else: spt = support def parse(text, module=None, support=None, debug=False): create_globals(module, support, debug) global error, parser, lexer, success lexer.lineno = 1 success = True try: parser.parse(text, debug=debug, lexer=lexer) except Exception as e: parser = None lexer = None error = "internal parser error: %s" % str(e) + "\n" + traceback.format_exc() if not success: # force the parser and lexer to be rebuilt - we have some problems otherwise parser = None msg = 'could not parse text: "%s"' % error raise ValueError(msg) return m def list_headers(root): modules = [] support_macros = None for dirpath, dirnames, filenames in os.walk(root): for name in filenames: modname = os.path.splitext(name) filename = os.path.join(dirpath, name) if modname[1] == '.spt': if name == "obj_perm_sets.spt": support_macros = filename elif len(re.findall("patterns", modname[0])): modules.append((modname[0], filename)) elif modname[1] == '.if': modules.append((modname[0], filename)) return (modules, support_macros) def parse_headers(root, output=None, expand=True, debug=False): from . import util headers = refpolicy.Headers() modules = [] support_macros = None if os.path.isfile(root): name = os.path.split(root)[1] if name == '': raise ValueError("Invalid file name %s" % root) modname = os.path.splitext(name) modules.append((modname[0], root)) all_modules, support_macros = list_headers(defaults.headers()) else: modules, support_macros = list_headers(root) if expand and not support_macros: raise ValueError("could not find support macros (obj_perm_sets.spt)") def o(msg): if output: output.write(msg) def parse_file(f, module, spt=None): global parse_file if debug: o("parsing file %s\n" % f) try: fd = open(f) txt = fd.read() fd.close() parse_file = f parse(txt, module, spt, debug) except IOError as e: return except ValueError as e: raise ValueError("error parsing file %s: %s" % (f, str(e))) spt = None if support_macros: o("Parsing support macros (%s): " % support_macros) spt = refpolicy.SupportMacros() parse_file(support_macros, spt) headers.children.append(spt) # FIXME: Total hack - add in can_exec rather than parse the insanity # of misc_macros. We are just going to pretend that this is an interface # to make the expansion work correctly. can_exec = refpolicy.Interface("can_exec") av = access.AccessVector(["$1","$2","file","execute_no_trans","open", "read", "getattr","lock","execute","ioctl"]) can_exec.children.append(refpolicy.AVRule(av)) headers.children.append(can_exec) o("done.\n") if output and not debug: status = util.ConsoleProgressBar(sys.stdout, steps=len(modules)) status.start("Parsing interface files") failures = [] for x in modules: m = refpolicy.Module() m.name = x[0] try: if expand: parse_file(x[1], m, spt) else: parse_file(x[1], m) except ValueError as e: o(str(e) + "\n") failures.append(x[1]) continue headers.children.append(m) if output and not debug: status.step() if len(failures): o("failed to parse some headers: %s" % ", ".join(failures)) return headers selinux-python-2.8/sepolgen/src/sepolgen/refpolicy.py000066400000000000000000000664721330160122500231660ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import string import selinux # OVERVIEW # # This file contains objects and functions used to represent the reference # policy (including the headers, M4 macros, and policy language statements). # # This representation is very different from the semantic representation # used in libsepol. Instead, it is a more typical abstract representation # used by the first stage of compilers. It is basically a parse tree. # # This choice is intentional as it allows us to handle the unprocessed # M4 statements - including the $1 style arguments - and to more easily generate # the data structures that we need for policy generation. # # Constans for referring to fields SRC_TYPE = 0 TGT_TYPE = 1 OBJ_CLASS = 2 PERMS = 3 ROLE = 4 DEST_TYPE = 5 # String represenations of the above constants field_to_str = ["source", "target", "object", "permission", "role", "destination" ] str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS, "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE } # Base Classes class PolicyBase: def __init__(self, parent=None): self.parent = None self.comment = None class Node(PolicyBase): """Base class objects produced from parsing the reference policy. The Node class is used as the base class for any non-leaf object produced by parsing the reference policy. This object should contain a reference to its parent (or None for a top-level object) and 0 or more children. The general idea here is to have a very simple tree structure. Children are not separated out by type. Instead the tree structure represents fairly closely the real structure of the policy statements. The object should be iterable - by default over all children but subclasses are free to provide additional iterators over a subset of their childre (see Interface for example). """ def __init__(self, parent=None): PolicyBase.__init__(self, parent) self.children = [] def __iter__(self): return iter(self.children) # Not all of the iterators will return something on all Nodes, but # they won't explode either. Putting them here is just easier. # Top level nodes def nodes(self): return filter(lambda x: isinstance(x, Node), walktree(self)) def modules(self): return filter(lambda x: isinstance(x, Module), walktree(self)) def interfaces(self): return filter(lambda x: isinstance(x, Interface), walktree(self)) def templates(self): return filter(lambda x: isinstance(x, Template), walktree(self)) def support_macros(self): return filter(lambda x: isinstance(x, SupportMacros), walktree(self)) # Common policy statements def module_declarations(self): return filter(lambda x: isinstance(x, ModuleDeclaration), walktree(self)) def interface_calls(self): return filter(lambda x: isinstance(x, InterfaceCall), walktree(self)) def avrules(self): return filter(lambda x: isinstance(x, AVRule), walktree(self)) def typerules(self): return filter(lambda x: isinstance(x, TypeRule), walktree(self)) def typebounds(self): return filter(lambda x: isinstance(x, TypeBound), walktree(self)) def typeattributes(self): """Iterate over all of the TypeAttribute children of this Interface.""" return filter(lambda x: isinstance(x, TypeAttribute), walktree(self)) def roleattributes(self): """Iterate over all of the RoleAttribute children of this Interface.""" return filter(lambda x: isinstance(x, RoleAttribute), walktree(self)) def requires(self): return filter(lambda x: isinstance(x, Require), walktree(self)) def roles(self): return filter(lambda x: isinstance(x, Role), walktree(self)) def role_allows(self): return filter(lambda x: isinstance(x, RoleAllow), walktree(self)) def role_types(self): return filter(lambda x: isinstance(x, RoleType), walktree(self)) def __str__(self): if self.comment: return str(self.comment) + "\n" + self.to_string() else: return self.to_string() def __repr__(self): return "<%s(%s)>" % (self.__class__.__name__, self.to_string()) def to_string(self): return "" class Leaf(PolicyBase): def __init__(self, parent=None): PolicyBase.__init__(self, parent) def __str__(self): if self.comment: return str(self.comment) + "\n" + self.to_string() else: return self.to_string() def __repr__(self): return "<%s(%s)>" % (self.__class__.__name__, self.to_string()) def to_string(self): return "" # Utility functions def walktree(node, depthfirst=True, showdepth=False, type=None): """Iterate over a Node and its Children. The walktree function iterates over a tree containing Nodes and leaf objects. The iteration can perform a depth first or a breadth first traversal of the tree (controlled by the depthfirst paramater. The passed in node will be returned. This function will only work correctly for trees - arbitrary graphs will likely cause infinite looping. """ # We control depth first / versus breadth first by # how we pop items off of the node stack. if depthfirst: index = -1 else: index = 0 stack = [(node, 0)] while len(stack) > 0: cur, depth = stack.pop(index) if showdepth: yield cur, depth else: yield cur # If the node is not a Node instance it must # be a leaf - so no need to add it to the stack if isinstance(cur, Node): items = [] i = len(cur.children) - 1 while i >= 0: if type is None or isinstance(cur.children[i], type): items.append((cur.children[i], depth + 1)) i -= 1 stack.extend(items) def walknode(node, type=None): """Iterate over the direct children of a Node. The walktree function iterates over the children of a Node. Unlike walktree it does note return the passed in node or the children of any Node objects (that is, it does not go beyond the current level in the tree). """ for x in node: if type is None or isinstance(x, type): yield x def list_to_space_str(s, cont=('{', '}')): """Convert a set (or any sequence type) into a string representation formatted to match SELinux space separated list conventions. For example the list ['read', 'write'] would be converted into: '{ read write }' """ l = len(s) str = "" if l < 1: raise ValueError("cannot convert 0 len set to string") str = " ".join(s) if l == 1: return str else: return cont[0] + " " + str + " " + cont[1] def list_to_comma_str(s): l = len(s) if l < 1: raise ValueError("cannot conver 0 len set to comma string") return ", ".join(s) # Basic SELinux types class IdSet(set): def __init__(self, list=None): if list: set.__init__(self, list) else: set.__init__(self) self.compliment = False def to_space_str(self): return list_to_space_str(sorted(self)) def to_comma_str(self): return list_to_comma_str(sorted(self)) class SecurityContext(Leaf): """An SELinux security context with optional MCS / MLS fields.""" def __init__(self, context=None, parent=None): """Create a SecurityContext object, optionally from a string. Parameters: [context] - string representing a security context. Same format as a string passed to the from_string method. """ Leaf.__init__(self, parent) self.user = "" self.role = "" self.type = "" self.level = None if context is not None: self.from_string(context) def from_string(self, context): """Parse a string representing a context into a SecurityContext. The string should be in the standard format - e.g., 'user:role:type:level'. Raises ValueError if the string is not parsable as a security context. """ # try to translate the context string to raw form raw = selinux.selinux_trans_to_raw_context(context) if raw[0] == 0: context = raw[1] fields = context.split(":") if len(fields) < 3: raise ValueError("context string [%s] not in a valid format" % context) self.user = fields[0] self.role = fields[1] self.type = fields[2] if len(fields) > 3: # FUTURE - normalize level fields to allow more comparisons to succeed. self.level = ':'.join(fields[3:]) else: self.level = None def __eq__(self, other): """Compare two SecurityContext objects - all fields must be exactly the the same for the comparison to work. It is possible for the level fields to be semantically the same yet syntactically different - in this case this function will return false. """ return self.user == other.user and \ self.role == other.role and \ self.type == other.type and \ self.level == other.level def to_string(self, default_level=None): """Return a string representing this security context. By default, the string will contiain a MCS / MLS level potentially from the default which is passed in if none was set. Arguments: default_level - the default level to use if self.level is an empty string. Returns: A string represening the security context in the form 'user:role:type:level'. """ fields = [self.user, self.role, self.type] if self.level is None: if default_level is None: if selinux.is_selinux_mls_enabled() == 1: fields.append("s0") else: fields.append(default_level) else: fields.append(self.level) return ":".join(fields) class ObjectClass(Leaf): """SELinux object class and permissions. This class is a basic representation of an SELinux object class - it does not represent separate common permissions - just the union of the common and class specific permissions. It is meant to be convenient for policy generation. """ def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name self.perms = IdSet() # Basic statements class TypeAttribute(Leaf): """SElinux typeattribute statement. This class represents a typeattribute statement. """ def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = "" self.attributes = IdSet() def to_string(self): return "typeattribute %s %s;" % (self.type, self.attributes.to_comma_str()) class RoleAttribute(Leaf): """SElinux roleattribute statement. This class represents a roleattribute statement. """ def __init__(self, parent=None): Leaf.__init__(self, parent) self.role = "" self.roleattributes = IdSet() def to_string(self): return "roleattribute %s %s;" % (self.role, self.roleattributes.to_comma_str()) class Role(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.role = "" self.types = IdSet() def to_string(self): s = "" for t in self.types: s += "role %s types %s;\n" % (self.role, t) return s class Type(Leaf): def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name self.attributes = IdSet() self.aliases = IdSet() def to_string(self): s = "type %s" % self.name if len(self.aliases) > 0: s = s + "alias %s" % self.aliases.to_space_str() if len(self.attributes) > 0: s = s + ", %s" % self.attributes.to_comma_str() return s + ";" class TypeAlias(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = "" self.aliases = IdSet() def to_string(self): return "typealias %s alias %s;" % (self.type, self.aliases.to_space_str()) class Attribute(Leaf): def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name def to_string(self): return "attribute %s;" % self.name class Attribute_Role(Leaf): def __init__(self, name="", parent=None): Leaf.__init__(self, parent) self.name = name def to_string(self): return "attribute_role %s;" % self.name # Classes representing rules class AVRule(Leaf): """SELinux access vector (AV) rule. The AVRule class represents all varieties of AV rules including allow, dontaudit, and auditallow (indicated by the flags self.ALLOW, self.DONTAUDIT, and self.AUDITALLOW respectively). The source and target types, object classes, and perms are all represented by sets containing strings. Sets are used to make it simple to add strings repeatedly while avoiding duplicates. No checking is done to make certain that the symbols are valid or consistent (e.g., perms that don't match the object classes). It is even possible to put invalid types like '$1' into the rules to allow storage of the reference policy interfaces. """ ALLOW = 0 DONTAUDIT = 1 AUDITALLOW = 2 NEVERALLOW = 3 def __init__(self, av=None, parent=None): Leaf.__init__(self, parent) self.src_types = IdSet() self.tgt_types = IdSet() self.obj_classes = IdSet() self.perms = IdSet() self.rule_type = self.ALLOW if av: self.from_av(av) def __rule_type_str(self): if self.rule_type == self.ALLOW: return "allow" elif self.rule_type == self.DONTAUDIT: return "dontaudit" else: return "auditallow" def from_av(self, av): """Add the access from an access vector to this allow rule. """ self.src_types.add(av.src_type) if av.src_type == av.tgt_type: self.tgt_types.add("self") else: self.tgt_types.add(av.tgt_type) self.obj_classes.add(av.obj_class) self.perms.update(av.perms) def to_string(self): """Return a string representation of the rule that is a valid policy language representation (assuming that the types, object class, etc. are valie). """ return "%s %s %s:%s %s;" % (self.__rule_type_str(), self.src_types.to_space_str(), self.tgt_types.to_space_str(), self.obj_classes.to_space_str(), self.perms.to_space_str()) class TypeRule(Leaf): """SELinux type rules. This class is very similar to the AVRule class, but is for representing the type rules (type_trans, type_change, and type_member). The major difference is the lack of perms and only and sing destination type. """ TYPE_TRANSITION = 0 TYPE_CHANGE = 1 TYPE_MEMBER = 2 def __init__(self, parent=None): Leaf.__init__(self, parent) self.src_types = IdSet() self.tgt_types = IdSet() self.obj_classes = IdSet() self.dest_type = "" self.rule_type = self.TYPE_TRANSITION def __rule_type_str(self): if self.rule_type == self.TYPE_TRANSITION: return "type_transition" elif self.rule_type == self.TYPE_CHANGE: return "type_change" else: return "type_member" def to_string(self): return "%s %s %s:%s %s;" % (self.__rule_type_str(), self.src_types.to_space_str(), self.tgt_types.to_space_str(), self.obj_classes.to_space_str(), self.dest_type) class TypeBound(Leaf): """SElinux typebound statement. This class represents a typebound statement. """ def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = "" self.tgt_types = IdSet() def to_string(self): return "typebounds %s %s;" % (self.type, self.tgt_types.to_comma_str()) class RoleAllow(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.src_roles = IdSet() self.tgt_roles = IdSet() def to_string(self): return "allow %s %s;" % (self.src_roles.to_comma_str(), self.tgt_roles.to_comma_str()) class RoleType(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.role = "" self.types = IdSet() def to_string(self): s = "" for t in self.types: s += "role %s types %s;\n" % (self.role, t) return s class ModuleDeclaration(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.name = "" self.version = "" self.refpolicy = False def to_string(self): if self.refpolicy: return "policy_module(%s, %s)" % (self.name, self.version) else: return "module %s %s;" % (self.name, self.version) class Conditional(Node): def __init__(self, parent=None): Node.__init__(self, parent) self.cond_expr = [] def to_string(self): return "[If %s]" % list_to_space_str(self.cond_expr, cont=("", "")) class Bool(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.name = "" self.state = False def to_string(self): s = "bool %s " % self.name if s.state: return s + "true" else: return s + "false" class InitialSid(Leaf): def __init(self, parent=None): Leaf.__init__(self, parent) self.name = "" self.context = None def to_string(self): return "sid %s %s" % (self.name, str(self.context)) class GenfsCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.filesystem = "" self.path = "" self.context = None def to_string(self): return "genfscon %s %s %s" % (self.filesystem, self.path, str(self.context)) class FilesystemUse(Leaf): XATTR = 1 TRANS = 2 TASK = 3 def __init__(self, parent=None): Leaf.__init__(self, parent) self.type = self.XATTR self.filesystem = "" self.context = None def to_string(self): s = "" if self.type == XATTR: s = "fs_use_xattr " elif self.type == TRANS: s = "fs_use_trans " elif self.type == TASK: s = "fs_use_task " return "%s %s %s;" % (s, self.filesystem, str(self.context)) class PortCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.port_type = "" self.port_number = "" self.context = None def to_string(self): return "portcon %s %s %s" % (self.port_type, self.port_number, str(self.context)) class NodeCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.start = "" self.end = "" self.context = None def to_string(self): return "nodecon %s %s %s" % (self.start, self.end, str(self.context)) class NetifCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.interface = "" self.interface_context = None self.packet_context = None def to_string(self): return "netifcon %s %s %s" % (self.interface, str(self.interface_context), str(self.packet_context)) class PirqCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.pirq_number = "" self.context = None def to_string(self): return "pirqcon %s %s" % (self.pirq_number, str(self.context)) class IomemCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.device_mem = "" self.context = None def to_string(self): return "iomemcon %s %s" % (self.device_mem, str(self.context)) class IoportCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.ioport = "" self.context = None def to_string(self): return "ioportcon %s %s" % (self.ioport, str(self.context)) class PciDeviceCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.device = "" self.context = None def to_string(self): return "pcidevicecon %s %s" % (self.device, str(self.context)) class DeviceTreeCon(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.path = "" self.context = None def to_string(self): return "devicetreecon %s %s" % (self.path, str(self.context)) # Reference policy specific types def print_tree(head): for node, depth in walktree(head, showdepth=True): s = "" for i in range(depth): s = s + "\t" print(s + str(node)) class Headers(Node): def __init__(self, parent=None): Node.__init__(self, parent) def to_string(self): return "[Headers]" class Module(Node): def __init__(self, parent=None): Node.__init__(self, parent) def to_string(self): return "" class Interface(Node): """A reference policy interface definition. This class represents a reference policy interface definition. """ def __init__(self, name="", parent=None): Node.__init__(self, parent) self.name = name def to_string(self): return "[Interface name: %s]" % self.name class TunablePolicy(Node): def __init__(self, parent=None): Node.__init__(self, parent) self.cond_expr = [] def to_string(self): return "[Tunable Policy %s]" % list_to_space_str(self.cond_expr, cont=("", "")) class Template(Node): def __init__(self, name="", parent=None): Node.__init__(self, parent) self.name = name def to_string(self): return "[Template name: %s]" % self.name class IfDef(Node): def __init__(self, name="", parent=None): Node.__init__(self, parent) self.name = name def to_string(self): return "[Ifdef name: %s]" % self.name class InterfaceCall(Leaf): def __init__(self, ifname="", parent=None): Leaf.__init__(self, parent) self.ifname = ifname self.args = [] self.comments = [] def matches(self, other): if self.ifname != other.ifname: return False if len(self.args) != len(other.args): return False for a,b in zip(self.args, other.args): if a != b: return False return True def to_string(self): s = "%s(" % self.ifname i = 0 for a in self.args: if isinstance(a, list): str = list_to_space_str(a) else: str = a if i != 0: s = s + ", %s" % str else: s = s + str i += 1 return s + ")" class OptionalPolicy(Node): def __init__(self, parent=None): Node.__init__(self, parent) def to_string(self): return "[Optional Policy]" class SupportMacros(Node): def __init__(self, parent=None): Node.__init__(self, parent) self.map = None def to_string(self): return "[Support Macros]" def __expand_perm(self, perm): # Recursive expansion - the assumption is that these # are ordered correctly so that no macro is used before # it is defined s = set() if perm in self.map: for p in self.by_name(perm): s.update(self.__expand_perm(p)) else: s.add(perm) return s def __gen_map(self): self.map = {} for x in self: exp_perms = set() for perm in x.perms: exp_perms.update(self.__expand_perm(perm)) self.map[x.name] = exp_perms def by_name(self, name): if not self.map: self.__gen_map() return self.map[name] def has_key(self, name): if not self.map: self.__gen_map() return name in self.map class Require(Leaf): def __init__(self, parent=None): Leaf.__init__(self, parent) self.types = IdSet() self.obj_classes = { } self.roles = IdSet() self.data = IdSet() self.users = IdSet() def add_obj_class(self, obj_class, perms): p = self.obj_classes.setdefault(obj_class, IdSet()) p.update(perms) def to_string(self): s = [] s.append("require {") for type in self.types: s.append("\ttype %s;" % type) for obj_class, perms in self.obj_classes.items(): s.append("\tclass %s %s;" % (obj_class, perms.to_space_str())) for role in self.roles: s.append("\trole %s;" % role) for bool in self.data: s.append("\tbool %s;" % bool) for user in self.users: s.append("\tuser %s;" % user) s.append("}") # Handle empty requires if len(s) == 2: return "" return "\n".join(s) class ObjPermSet: def __init__(self, name): self.name = name self.perms = set() def to_string(self): return "define(`%s', `%s')" % (self.name, self.perms.to_space_str()) class ClassMap: def __init__(self, obj_class, perms): self.obj_class = obj_class self.perms = perms def to_string(self): return self.obj_class + ": " + self.perms class Comment: def __init__(self, l=None): if l: self.lines = l else: self.lines = [] def to_string(self): # If there are no lines, treat this as a spacer between # policy statements and return a new line. if len(self.lines) == 0: return "" else: out = [] for line in self.lines: out.append("#" + line) return "\n".join(out) def merge(self, other): if len(other.lines): for line in other.lines: if line != "": self.lines.append(line) def __str__(self): return self.to_string() selinux-python-2.8/sepolgen/src/sepolgen/sepolgeni18n.py000066400000000000000000000016201330160122500234660ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # try: import gettext t = gettext.translation( 'yumex' ) _ = t.gettext except: def _(str): return str selinux-python-2.8/sepolgen/src/sepolgen/util.py000066400000000000000000000126431330160122500221360ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import locale import sys PY3 = sys.version_info[0] == 3 if PY3: bytes_type=bytes string_type=str else: bytes_type=str string_type=unicode class ConsoleProgressBar: def __init__(self, out, steps=100, indicator='#'): self.blocks = 0 self.current = 0 self.steps = steps self.indicator = indicator self.out = out self.done = False def start(self, message=None): self.done = False if message: self.out.write('\n%s:\n' % message) self.out.write('%--10---20---30---40---50---60---70---80---90--100\n') def step(self, n=1): self.current += n old = self.blocks self.blocks = int(round(self.current / float(self.steps) * 100) / 2) if self.blocks > 50: self.blocks = 50 new = self.blocks - old self.out.write(self.indicator * new) self.out.flush() if self.blocks == 50 and not self.done: self.done = True self.out.write("\n") def set_to_list(s): l = [] l.extend(s) return l def first(s, sorted=False): """ Return the first element of a set. It sometimes useful to return the first element from a set but, because sets are not indexable, this is rather hard. This function will return the first element from a set. If sorted is True, then the set will first be sorted (making this an expensive operation). Otherwise a random element will be returned (as sets are not ordered). """ if not len(s): raise IndexError("empty containter") if sorted: l = set_to_list(s) l.sort() return l[0] else: for x in s: return x def encode_input(text): import locale """Encode given text via preferred system encoding""" # locale will often find out the correct encoding encoding = locale.getpreferredencoding() try: encoded_text = text.encode(encoding) except UnicodeError: # if it fails to find correct encoding then ascii is used # which may lead to UnicodeError if `text` contains non ascii signs # utf-8 is our guess to fix the situation encoded_text = text.encode('utf-8') return encoded_text def decode_input(text): import locale """Decode given text via preferred system encoding""" # locale will often find out the correct encoding encoding = locale.getpreferredencoding() try: decoded_text = text.decode(encoding) except UnicodeError: # if it fails to find correct encoding then ascii is used # which may lead to UnicodeError if `text` contains non ascii signs # utf-8 is our guess to fix the situation decoded_text = text.decode('utf-8') return decoded_text class Comparison(): """Class used when implementing rich comparison. Inherit from this class if you want to have a rich comparison withing the class, afterwards implement _compare function within your class.""" def _compare(self, other, method): raise NotImplemented def __eq__(self, other): return self._compare(other, lambda a, b: a == b) def __lt__(self, other): return self._compare(other, lambda a, b: a < b) def __le__(self, other): return self._compare(other, lambda a, b: a <= b) def __ge__(self, other): return self._compare(other, lambda a, b: a >= b) def __gt__(self, other): return self._compare(other, lambda a, b: a > b) def __ne__(self, other): return self._compare(other, lambda a, b: a != b) if sys.version_info < (2,7): # cmp_to_key function is missing in python2.6 def cmp_to_key(mycmp): 'Convert a cmp= function into a key= function' class K: def __init__(self, obj, *args): self.obj = obj def __lt__(self, other): return mycmp(self.obj, other.obj) < 0 def __gt__(self, other): return mycmp(self.obj, other.obj) > 0 def __eq__(self, other): return mycmp(self.obj, other.obj) == 0 def __le__(self, other): return mycmp(self.obj, other.obj) <= 0 def __ge__(self, other): return mycmp(self.obj, other.obj) >= 0 def __ne__(self, other): return mycmp(self.obj, other.obj) != 0 return K else: from functools import cmp_to_key def cmp(first, second): return (first > second) - (second > first) if __name__ == "__main__": import sys import time p = ConsoleProgressBar(sys.stdout, steps=999) p.start("computing pi") for i in range(999): p.step() time.sleep(0.001) selinux-python-2.8/sepolgen/src/sepolgen/yacc.py000066400000000000000000002400471330160122500221010ustar00rootroot00000000000000#----------------------------------------------------------------------------- # ply: yacc.py # # Author(s): David M. Beazley (dave@dabeaz.com) # # Copyright (C) 2001-2006, David M. Beazley # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # # See the file COPYING for a complete copy of the LGPL. # # # This implements an LR parser that is constructed from grammar rules defined # as Python functions. The grammer is specified by supplying the BNF inside # Python documentation strings. The inspiration for this technique was borrowed # from John Aycock's Spark parsing system. PLY might be viewed as cross between # Spark and the GNU bison utility. # # The current implementation is only somewhat object-oriented. The # LR parser itself is defined in terms of an object (which allows multiple # parsers to co-exist). However, most of the variables used during table # construction are defined in terms of global variables. Users shouldn't # notice unless they are trying to define multiple parsers at the same # time using threads (in which case they should have their head examined). # # This implementation supports both SLR and LALR(1) parsing. LALR(1) # support was originally implemented by Elias Ioup (ezioup@alumni.uchicago.edu), # using the algorithm found in Aho, Sethi, and Ullman "Compilers: Principles, # Techniques, and Tools" (The Dragon Book). LALR(1) has since been replaced # by the more efficient DeRemer and Pennello algorithm. # # :::::::: WARNING ::::::: # # Construction of LR parsing tables is fairly complicated and expensive. # To make this module run fast, a *LOT* of work has been put into # optimization---often at the expensive of readability and what might # consider to be good Python "coding style." Modify the code at your # own risk! # ---------------------------------------------------------------------------- __version__ = "2.2" #----------------------------------------------------------------------------- # === User configurable parameters === # # Change these to modify the default behavior of yacc (if you wish) #----------------------------------------------------------------------------- yaccdebug = 1 # Debugging mode. If set, yacc generates a # a 'parser.out' file in the current directory debug_file = 'parser.out' # Default name of the debugging file tab_module = 'parsetab' # Default name of the table module default_lr = 'LALR' # Default LR table generation method error_count = 3 # Number of symbols that must be shifted to leave recovery mode import re, types, sys, hashlib, os.path try: from cStringIO import StringIO except ImportError: from io import StringIO from . import util # Exception raised for yacc-related errors class YaccError(Exception): pass #----------------------------------------------------------------------------- # === LR Parsing Engine === # # The following classes are used for the LR parser itself. These are not # used during table construction and are independent of the actual LR # table generation algorithm #----------------------------------------------------------------------------- # This class is used to hold non-terminal grammar symbols during parsing. # It normally has the following attributes set: # .type = Grammar symbol type # .value = Symbol value # .lineno = Starting line number # .endlineno = Ending line number (optional, set automatically) # .lexpos = Starting lex position # .endlexpos = Ending lex position (optional, set automatically) class YaccSymbol: def __str__(self): return self.type def __repr__(self): return str(self) # This class is a wrapper around the objects actually passed to each # grammar rule. Index lookup and assignment actually assign the # .value attribute of the underlying YaccSymbol object. # The lineno() method returns the line number of a given # item (or 0 if not defined). The linespan() method returns # a tuple of (startline,endline) representing the range of lines # for a symbol. The lexspan() method returns a tuple (lexpos,endlexpos) # representing the range of positional information for a symbol. class YaccProduction: def __init__(self,s,stack=None): self.slice = s self.pbstack = [] self.stack = stack def __getitem__(self,n): if type(n) == int: if n >= 0: return self.slice[n].value else: return self.stack[n].value else: return [s.value for s in self.slice[n.start:n.stop:n.step]] def __setitem__(self,n,v): self.slice[n].value = v def __len__(self): return len(self.slice) def lineno(self,n): return getattr(self.slice[n],"lineno",0) def linespan(self,n): startline = getattr(self.slice[n],"lineno",0) endline = getattr(self.slice[n],"endlineno",startline) return startline,endline def lexpos(self,n): return getattr(self.slice[n],"lexpos",0) def lexspan(self,n): startpos = getattr(self.slice[n],"lexpos",0) endpos = getattr(self.slice[n],"endlexpos",startpos) return startpos,endpos def pushback(self,n): if n <= 0: raise ValueError("Expected a positive value") if n > (len(self.slice)-1): raise ValueError("Can't push %d tokens. Only %d are available." % (n,len(self.slice)-1)) for i in range(0,n): self.pbstack.append(self.slice[-i-1]) # The LR Parsing engine. This is defined as a class so that multiple parsers # can exist in the same process. A user never instantiates this directly. # Instead, the global yacc() function should be used to create a suitable Parser # object. class Parser: def __init__(self,magic=None): # This is a hack to keep users from trying to instantiate a Parser # object directly. if magic != "xyzzy": raise YaccError("Can't instantiate Parser. Use yacc() instead.") # Reset internal state self.productions = None # List of productions self.errorfunc = None # Error handling function self.action = { } # LR Action table self.goto = { } # LR goto table self.require = { } # Attribute require table self.method = "Unknown LR" # Table construction method used def errok(self): self.errorcount = 0 def restart(self): del self.statestack[:] del self.symstack[:] sym = YaccSymbol() sym.type = '$end' self.symstack.append(sym) self.statestack.append(0) def parse(self,input=None,lexer=None,debug=0): lookahead = None # Current lookahead symbol lookaheadstack = [ ] # Stack of lookahead symbols actions = self.action # Local reference to action table goto = self.goto # Local reference to goto table prod = self.productions # Local reference to production list pslice = YaccProduction(None) # Production object passed to grammar rules pslice.parser = self # Parser object self.errorcount = 0 # Used during error recovery # If no lexer was given, we will try to use the lex module if not lexer: from . import lex lexer = lex.lexer pslice.lexer = lexer # If input was supplied, pass to lexer if input: lexer.input(input) # Tokenize function get_token = lexer.token statestack = [ ] # Stack of parsing states self.statestack = statestack symstack = [ ] # Stack of grammar symbols self.symstack = symstack pslice.stack = symstack # Put in the production errtoken = None # Err token # The start state is assumed to be (0,$end) statestack.append(0) sym = YaccSymbol() sym.type = '$end' symstack.append(sym) while 1: # Get the next symbol on the input. If a lookahead symbol # is already set, we just use that. Otherwise, we'll pull # the next token off of the lookaheadstack or from the lexer if debug > 1: print('state', statestack[-1]) if not lookahead: if not lookaheadstack: lookahead = get_token() # Get the next token else: lookahead = lookaheadstack.pop() if not lookahead: lookahead = YaccSymbol() lookahead.type = '$end' if debug: errorlead = ("%s . %s" % (" ".join([xx.type for xx in symstack][1:]), str(lookahead))).lstrip() # Check the action table s = statestack[-1] ltype = lookahead.type t = actions.get((s,ltype),None) if debug > 1: print('action', t) if t is not None: if t > 0: # shift a symbol on the stack if ltype == '$end': # Error, end of input sys.stderr.write("yacc: Parse error. EOF\n") return statestack.append(t) if debug > 1: sys.stderr.write("%-60s shift state %s\n" % (errorlead, t)) symstack.append(lookahead) lookahead = None # Decrease error count on successful shift if self.errorcount > 0: self.errorcount -= 1 continue if t < 0: # reduce a symbol on the stack, emit a production p = prod[-t] pname = p.name plen = p.len # Get production function sym = YaccSymbol() sym.type = pname # Production name sym.value = None if debug > 1: sys.stderr.write("%-60s reduce %d\n" % (errorlead, -t)) if plen: targ = symstack[-plen-1:] targ[0] = sym try: sym.lineno = targ[1].lineno sym.endlineno = getattr(targ[-1],"endlineno",targ[-1].lineno) sym.lexpos = targ[1].lexpos sym.endlexpos = getattr(targ[-1],"endlexpos",targ[-1].lexpos) except AttributeError: sym.lineno = 0 del symstack[-plen:] del statestack[-plen:] else: sym.lineno = 0 targ = [ sym ] pslice.slice = targ pslice.pbstack = [] # Call the grammar rule with our special slice object p.func(pslice) # If there was a pushback, put that on the stack if pslice.pbstack: lookaheadstack.append(lookahead) for _t in pslice.pbstack: lookaheadstack.append(_t) lookahead = None symstack.append(sym) statestack.append(goto[statestack[-1],pname]) continue if t == 0: n = symstack[-1] return getattr(n,"value",None) sys.stderr.write(errorlead, "\n") if t == None: if debug: sys.stderr.write(errorlead + "\n") # We have some kind of parsing error here. To handle # this, we are going to push the current token onto # the tokenstack and replace it with an 'error' token. # If there are any synchronization rules, they may # catch it. # # In addition to pushing the error token, we call call # the user defined p_error() function if this is the # first syntax error. This function is only called if # errorcount == 0. if not self.errorcount: self.errorcount = error_count errtoken = lookahead if errtoken.type == '$end': errtoken = None # End of file! if self.errorfunc: global errok,token,restart errok = self.errok # Set some special functions available in error recovery token = get_token restart = self.restart tok = self.errorfunc(errtoken) del errok, token, restart # Delete special functions if not self.errorcount: # User must have done some kind of panic # mode recovery on their own. The # returned token is the next lookahead lookahead = tok errtoken = None continue else: if errtoken: if hasattr(errtoken,"lineno"): lineno = lookahead.lineno else: lineno = 0 if lineno: sys.stderr.write("yacc: Syntax error at line %d, token=%s\n" % (lineno, errtoken.type)) else: sys.stderr.write("yacc: Syntax error, token=%s" % errtoken.type) else: sys.stderr.write("yacc: Parse error in input. EOF\n") return else: self.errorcount = error_count # case 1: the statestack only has 1 entry on it. If we're in this state, the # entire parse has been rolled back and we're completely hosed. The token is # discarded and we just keep going. if len(statestack) <= 1 and lookahead.type != '$end': lookahead = None errtoken = None # Nuke the pushback stack del lookaheadstack[:] continue # case 2: the statestack has a couple of entries on it, but we're # at the end of the file. nuke the top entry and generate an error token # Start nuking entries on the stack if lookahead.type == '$end': # Whoa. We're really hosed here. Bail out return if lookahead.type != 'error': sym = symstack[-1] if sym.type == 'error': # Hmmm. Error is on top of stack, we'll just nuke input # symbol and continue lookahead = None continue t = YaccSymbol() t.type = 'error' if hasattr(lookahead,"lineno"): t.lineno = lookahead.lineno t.value = lookahead lookaheadstack.append(lookahead) lookahead = t else: symstack.pop() statestack.pop() continue # Call an error function here raise RuntimeError("yacc: internal parser error!!!\n") # ----------------------------------------------------------------------------- # === Parser Construction === # # The following functions and variables are used to implement the yacc() function # itself. This is pretty hairy stuff involving lots of error checking, # construction of LR items, kernels, and so forth. Although a lot of # this work is done using global variables, the resulting Parser object # is completely self contained--meaning that it is safe to repeatedly # call yacc() with different grammars in the same application. # ----------------------------------------------------------------------------- # ----------------------------------------------------------------------------- # validate_file() # # This function checks to see if there are duplicated p_rulename() functions # in the parser module file. Without this function, it is really easy for # users to make mistakes by cutting and pasting code fragments (and it's a real # bugger to try and figure out why the resulting parser doesn't work). Therefore, # we just do a little regular expression pattern matching of def statements # to try and detect duplicates. # ----------------------------------------------------------------------------- def validate_file(filename): base,ext = os.path.splitext(filename) if ext != '.py': return 1 # No idea. Assume it's okay. try: f = open(filename) lines = f.readlines() f.close() except IOError: return 1 # Oh well # Match def p_funcname( fre = re.compile(r'\s*def\s+(p_[a-zA-Z_0-9]*)\(') counthash = { } linen = 1 noerror = 1 for l in lines: m = fre.match(l) if m: name = m.group(1) prev = counthash.get(name) if not prev: counthash[name] = linen else: sys.stderr.write("%s:%d: Function %s redefined. Previously defined on line %d\n" % (filename,linen,name,prev)) noerror = 0 linen += 1 return noerror # This function looks for functions that might be grammar rules, but which don't have the proper p_suffix. def validate_dict(d): for n,v in d.items(): if n[0:2] == 'p_' and type(v) in (types.FunctionType, types.MethodType): continue if n[0:2] == 't_': continue if n[0:2] == 'p_': sys.stderr.write("yacc: Warning. '%s' not defined as a function\n" % n) if 1 and isinstance(v,types.FunctionType) and v.__code__.co_argcount == 1: try: doc = v.__doc__.split(" ") if doc[1] == ':': sys.stderr.write("%s:%d: Warning. Possible grammar rule '%s' defined without p_ prefix.\n" % (v.__code__.co_filename, v.__code__.co_firstlineno,n)) except Exception: pass # ----------------------------------------------------------------------------- # === GRAMMAR FUNCTIONS === # # The following global variables and functions are used to store, manipulate, # and verify the grammar rules specified by the user. # ----------------------------------------------------------------------------- # Initialize all of the global variables used during grammar construction def initialize_vars(): global Productions, Prodnames, Prodmap, Terminals global Nonterminals, First, Follow, Precedence, LRitems global Errorfunc, Signature, Requires Productions = [None] # A list of all of the productions. The first # entry is always reserved for the purpose of # building an augmented grammar Prodnames = { } # A dictionary mapping the names of nonterminals to a list of all # productions of that nonterminal. Prodmap = { } # A dictionary that is only used to detect duplicate # productions. Terminals = { } # A dictionary mapping the names of terminal symbols to a # list of the rules where they are used. Nonterminals = { } # A dictionary mapping names of nonterminals to a list # of rule numbers where they are used. First = { } # A dictionary of precomputed FIRST(x) symbols Follow = { } # A dictionary of precomputed FOLLOW(x) symbols Precedence = { } # Precedence rules for each terminal. Contains tuples of the # form ('right',level) or ('nonassoc', level) or ('left',level) LRitems = [ ] # A list of all LR items for the grammar. These are the # productions with the "dot" like E -> E . PLUS E Errorfunc = None # User defined error handler Signature = hashlib.sha256() # Digital signature of the grammar rules, precedence # and other information. Used to determined when a # parsing table needs to be regenerated. Requires = { } # Requires list # File objects used when creating the parser.out debugging file global _vf, _vfc _vf = StringIO() _vfc = StringIO() # ----------------------------------------------------------------------------- # class Production: # # This class stores the raw information about a single production or grammar rule. # It has a few required attributes: # # name - Name of the production (nonterminal) # prod - A list of symbols making up its production # number - Production number. # # In addition, a few additional attributes are used to help with debugging or # optimization of table generation. # # file - File where production action is defined. # lineno - Line number where action is defined # func - Action function # prec - Precedence level # lr_next - Next LR item. Example, if we are ' E -> E . PLUS E' # then lr_next refers to 'E -> E PLUS . E' # lr_index - LR item index (location of the ".") in the prod list. # lookaheads - LALR lookahead symbols for this item # len - Length of the production (number of symbols on right hand side) # ----------------------------------------------------------------------------- class Production: def __init__(self,**kw): for k,v in kw.items(): setattr(self,k,v) self.lr_index = -1 self.lr0_added = 0 # Flag indicating whether or not added to LR0 closure self.lr1_added = 0 # Flag indicating whether or not added to LR1 self.usyms = [ ] self.lookaheads = { } self.lk_added = { } self.setnumbers = [ ] def __str__(self): if self.prod: s = "%s -> %s" % (self.name," ".join(self.prod)) else: s = "%s -> " % self.name return s def __repr__(self): return str(self) # Compute lr_items from the production def lr_item(self,n): if n > len(self.prod): return None p = Production() p.name = self.name p.prod = list(self.prod) p.number = self.number p.lr_index = n p.lookaheads = { } p.setnumbers = self.setnumbers p.prod.insert(n,".") p.prod = tuple(p.prod) p.len = len(p.prod) p.usyms = self.usyms # Precompute list of productions immediately following try: p.lrafter = Prodnames[p.prod[n+1]] except (IndexError,KeyError) as e: p.lrafter = [] try: p.lrbefore = p.prod[n-1] except IndexError: p.lrbefore = None return p class MiniProduction: pass # regex matching identifiers _is_identifier = re.compile(r'^[a-zA-Z0-9_-~]+$') # ----------------------------------------------------------------------------- # add_production() # # Given an action function, this function assembles a production rule. # The production rule is assumed to be found in the function's docstring. # This rule has the general syntax: # # name1 ::= production1 # | production2 # | production3 # ... # | productionn # name2 ::= production1 # | production2 # ... # ----------------------------------------------------------------------------- def add_production(f,file,line,prodname,syms): if prodname in Terminals: sys.stderr.write("%s:%d: Illegal rule name '%s'. Already defined as a token.\n" % (file,line,prodname)) return -1 if prodname == 'error': sys.stderr.write("%s:%d: Illegal rule name '%s'. error is a reserved word.\n" % (file,line,prodname)) return -1 if not _is_identifier.match(prodname): sys.stderr.write("%s:%d: Illegal rule name '%s'\n" % (file,line,prodname)) return -1 for x in range(len(syms)): s = syms[x] if s[0] in "'\"": try: c = eval(s) if (len(c) > 1): sys.stderr.write("%s:%d: Literal token %s in rule '%s' may only be a single character\n" % (file,line,s, prodname)) return -1 if c not in Terminals: Terminals[c] = [] syms[x] = c continue except SyntaxError: pass if not _is_identifier.match(s) and s != '%prec': sys.stderr.write("%s:%d: Illegal name '%s' in rule '%s'\n" % (file,line,s, prodname)) return -1 # See if the rule is already in the rulemap map = "%s -> %s" % (prodname,syms) if map in Prodmap: m = Prodmap[map] sys.stderr.write("%s:%d: Duplicate rule %s.\n" % (file,line, m)) sys.stderr.write("%s:%d: Previous definition at %s:%d\n" % (file,line, m.file, m.line)) return -1 p = Production() p.name = prodname p.prod = syms p.file = file p.line = line p.func = f p.number = len(Productions) Productions.append(p) Prodmap[map] = p if prodname not in Nonterminals: Nonterminals[prodname] = [ ] # Add all terminals to Terminals i = 0 while i < len(p.prod): t = p.prod[i] if t == '%prec': try: precname = p.prod[i+1] except IndexError: sys.stderr.write("%s:%d: Syntax error. Nothing follows %%prec.\n" % (p.file,p.line)) return -1 prec = Precedence.get(precname,None) if not prec: sys.stderr.write("%s:%d: Nothing known about the precedence of '%s'\n" % (p.file,p.line,precname)) return -1 else: p.prec = prec del p.prod[i] del p.prod[i] continue if t in Terminals: Terminals[t].append(p.number) # Is a terminal. We'll assign a precedence to p based on this if not hasattr(p,"prec"): p.prec = Precedence.get(t,('right',0)) else: if t not in Nonterminals: Nonterminals[t] = [ ] Nonterminals[t].append(p.number) i += 1 if not hasattr(p,"prec"): p.prec = ('right',0) # Set final length of productions p.len = len(p.prod) p.prod = tuple(p.prod) # Calculate unique syms in the production p.usyms = [ ] for s in p.prod: if s not in p.usyms: p.usyms.append(s) # Add to the global productions list try: Prodnames[p.name].append(p) except KeyError: Prodnames[p.name] = [ p ] return 0 # Given a raw rule function, this function rips out its doc string # and adds rules to the grammar def add_function(f): line = f.__code__.co_firstlineno file = f.__code__.co_filename error = 0 if isinstance(f,types.MethodType): reqdargs = 2 else: reqdargs = 1 if f.__code__.co_argcount > reqdargs: sys.stderr.write("%s:%d: Rule '%s' has too many arguments.\n" % (file,line,f.__name__)) return -1 if f.__code__.co_argcount < reqdargs: sys.stderr.write("%s:%d: Rule '%s' requires an argument.\n" % (file,line,f.__name__)) return -1 if f.__doc__: # Split the doc string into lines pstrings = f.__doc__.splitlines() lastp = None dline = line for ps in pstrings: dline += 1 p = ps.split() if not p: continue try: if p[0] == '|': # This is a continuation of a previous rule if not lastp: sys.stderr.write("%s:%d: Misplaced '|'.\n" % (file,dline)) return -1 prodname = lastp if len(p) > 1: syms = p[1:] else: syms = [ ] else: prodname = p[0] lastp = prodname assign = p[1] if len(p) > 2: syms = p[2:] else: syms = [ ] if assign != ':' and assign != '::=': sys.stderr.write("%s:%d: Syntax error. Expected ':'\n" % (file,dline)) return -1 e = add_production(f,file,dline,prodname,syms) error += e except Exception: sys.stderr.write("%s:%d: Syntax error in rule '%s'\n" % (file,dline,ps)) error -= 1 else: sys.stderr.write("%s:%d: No documentation string specified in function '%s'\n" % (file,line,f.__name__)) return error # Cycle checking code (Michael Dyck) def compute_reachable(): ''' Find each symbol that can be reached from the start symbol. Print a warning for any nonterminals that can't be reached. (Unused terminals have already had their warning.) ''' Reachable = { } for s in list(Terminals.keys()) + list(Nonterminals.keys()): Reachable[s] = 0 mark_reachable_from( Productions[0].prod[0], Reachable ) for s in Nonterminals.keys(): if not Reachable[s]: sys.stderr.write("yacc: Symbol '%s' is unreachable.\n" % s) def mark_reachable_from(s, Reachable): ''' Mark all symbols that are reachable from symbol s. ''' if Reachable[s]: # We've already reached symbol s. return Reachable[s] = 1 for p in Prodnames.get(s,[]): for r in p.prod: mark_reachable_from(r, Reachable) # ----------------------------------------------------------------------------- # compute_terminates() # # This function looks at the various parsing rules and tries to detect # infinite recursion cycles (grammar rules where there is no possible way # to derive a string of only terminals). # ----------------------------------------------------------------------------- def compute_terminates(): ''' Raise an error for any symbols that don't terminate. ''' Terminates = {} # Terminals: for t in Terminals.keys(): Terminates[t] = 1 Terminates['$end'] = 1 # Nonterminals: # Initialize to false: for n in Nonterminals.keys(): Terminates[n] = 0 # Then propagate termination until no change: while 1: some_change = 0 for (n,pl) in Prodnames.items(): # Nonterminal n terminates iff any of its productions terminates. for p in pl: # Production p terminates iff all of its rhs symbols terminate. for s in p.prod: if not Terminates[s]: # The symbol s does not terminate, # so production p does not terminate. p_terminates = 0 break else: # didn't break from the loop, # so every symbol s terminates # so production p terminates. p_terminates = 1 if p_terminates: # symbol n terminates! if not Terminates[n]: Terminates[n] = 1 some_change = 1 # Don't need to consider any more productions for this n. break if not some_change: break some_error = 0 for (s,terminates) in Terminates.items(): if not terminates: if s not in Prodnames and s not in Terminals and s != 'error': # s is used-but-not-defined, and we've already warned of that, # so it would be overkill to say that it's also non-terminating. pass else: sys.stderr.write("yacc: Infinite recursion detected for symbol '%s'.\n" % s) some_error = 1 return some_error # ----------------------------------------------------------------------------- # verify_productions() # # This function examines all of the supplied rules to see if they seem valid. # ----------------------------------------------------------------------------- def verify_productions(cycle_check=1): error = 0 for p in Productions: if not p: continue for s in p.prod: if s not in Prodnames and s not in Terminals and s != 'error': sys.stderr.write("%s:%d: Symbol '%s' used, but not defined as a token or a rule.\n" % (p.file,p.line,s)) error = 1 continue unused_tok = 0 # Now verify all of the tokens if yaccdebug: _vf.write("Unused terminals:\n\n") for s,v in Terminals.items(): if s != 'error' and not v: sys.stderr.write("yacc: Warning. Token '%s' defined, but not used.\n" % s) if yaccdebug: _vf.write(" %s\n"% s) unused_tok += 1 # Print out all of the productions if yaccdebug: _vf.write("\nGrammar\n\n") for i in range(1,len(Productions)): _vf.write("Rule %-5d %s\n" % (i, Productions[i])) unused_prod = 0 # Verify the use of all productions for s,v in Nonterminals.items(): if not v: p = Prodnames[s][0] sys.stderr.write("%s:%d: Warning. Rule '%s' defined, but not used.\n" % (p.file,p.line, s)) unused_prod += 1 if unused_tok == 1: sys.stderr.write("yacc: Warning. There is 1 unused token.\n") if unused_tok > 1: sys.stderr.write("yacc: Warning. There are %d unused tokens.\n" % unused_tok) if unused_prod == 1: sys.stderr.write("yacc: Warning. There is 1 unused rule.\n") if unused_prod > 1: sys.stderr.write("yacc: Warning. There are %d unused rules.\n" % unused_prod) if yaccdebug: _vf.write("\nTerminals, with rules where they appear\n\n") ks = list(Terminals.keys()) ks.sort() for k in ks: _vf.write("%-20s : %s\n" % (k, " ".join([str(s) for s in Terminals[k]]))) _vf.write("\nNonterminals, with rules where they appear\n\n") ks = list(Nonterminals.keys()) ks.sort() for k in ks: _vf.write("%-20s : %s\n" % (k, " ".join([str(s) for s in Nonterminals[k]]))) if (cycle_check): compute_reachable() error += compute_terminates() # error += check_cycles() return error # ----------------------------------------------------------------------------- # build_lritems() # # This function walks the list of productions and builds a complete set of the # LR items. The LR items are stored in two ways: First, they are uniquely # numbered and placed in the list _lritems. Second, a linked list of LR items # is built for each production. For example: # # E -> E PLUS E # # Creates the list # # [E -> . E PLUS E, E -> E . PLUS E, E -> E PLUS . E, E -> E PLUS E . ] # ----------------------------------------------------------------------------- def build_lritems(): for p in Productions: lastlri = p lri = p.lr_item(0) i = 0 while 1: lri = p.lr_item(i) lastlri.lr_next = lri if not lri: break lri.lr_num = len(LRitems) LRitems.append(lri) lastlri = lri i += 1 # In order for the rest of the parser generator to work, we need to # guarantee that no more lritems are generated. Therefore, we nuke # the p.lr_item method. (Only used in debugging) # Production.lr_item = None # ----------------------------------------------------------------------------- # add_precedence() # # Given a list of precedence rules, add to the precedence table. # ----------------------------------------------------------------------------- def add_precedence(plist): plevel = 0 error = 0 for p in plist: plevel += 1 try: prec = p[0] terms = p[1:] if prec != 'left' and prec != 'right' and prec != 'nonassoc': sys.stderr.write("yacc: Invalid precedence '%s'\n" % prec) return -1 for t in terms: if t in Precedence: sys.stderr.write("yacc: Precedence already specified for terminal '%s'\n" % t) error += 1 continue Precedence[t] = (prec,plevel) except: sys.stderr.write("yacc: Invalid precedence table.\n") error += 1 return error # ----------------------------------------------------------------------------- # augment_grammar() # # Compute the augmented grammar. This is just a rule S' -> start where start # is the starting symbol. # ----------------------------------------------------------------------------- def augment_grammar(start=None): if not start: start = Productions[1].name Productions[0] = Production(name="S'",prod=[start],number=0,len=1,prec=('right',0),func=None) Productions[0].usyms = [ start ] Nonterminals[start].append(0) # ------------------------------------------------------------------------- # first() # # Compute the value of FIRST1(beta) where beta is a tuple of symbols. # # During execution of compute_first1, the result may be incomplete. # Afterward (e.g., when called from compute_follow()), it will be complete. # ------------------------------------------------------------------------- def first(beta): # We are computing First(x1,x2,x3,...,xn) result = [ ] for x in beta: x_produces_empty = 0 # Add all the non- symbols of First[x] to the result. for f in First[x]: if f == '': x_produces_empty = 1 else: if f not in result: result.append(f) if x_produces_empty: # We have to consider the next x in beta, # i.e. stay in the loop. pass else: # We don't have to consider any further symbols in beta. break else: # There was no 'break' from the loop, # so x_produces_empty was true for all x in beta, # so beta produces empty as well. result.append('') return result # FOLLOW(x) # Given a non-terminal. This function computes the set of all symbols # that might follow it. Dragon book, p. 189. def compute_follow(start=None): # Add '$end' to the follow list of the start symbol for k in Nonterminals.keys(): Follow[k] = [ ] if not start: start = Productions[1].name Follow[start] = [ '$end' ] while 1: didadd = 0 for p in Productions[1:]: # Here is the production set for i in range(len(p.prod)): B = p.prod[i] if B in Nonterminals: # Okay. We got a non-terminal in a production fst = first(p.prod[i+1:]) hasempty = 0 for f in fst: if f != '' and f not in Follow[B]: Follow[B].append(f) didadd = 1 if f == '': hasempty = 1 if hasempty or i == (len(p.prod)-1): # Add elements of follow(a) to follow(b) for f in Follow[p.name]: if f not in Follow[B]: Follow[B].append(f) didadd = 1 if not didadd: break if 0 and yaccdebug: _vf.write('\nFollow:\n') for k in Nonterminals.keys(): _vf.write("%-20s : %s\n" % (k, " ".join([str(s) for s in Follow[k]]))) # ------------------------------------------------------------------------- # compute_first1() # # Compute the value of FIRST1(X) for all symbols # ------------------------------------------------------------------------- def compute_first1(): # Terminals: for t in Terminals.keys(): First[t] = [t] First['$end'] = ['$end'] First['#'] = ['#'] # what's this for? # Nonterminals: # Initialize to the empty set: for n in Nonterminals.keys(): First[n] = [] # Then propagate symbols until no change: while 1: some_change = 0 for n in Nonterminals.keys(): for p in Prodnames[n]: for f in first(p.prod): if f not in First[n]: First[n].append( f ) some_change = 1 if not some_change: break if 0 and yaccdebug: _vf.write('\nFirst:\n') for k in Nonterminals.keys(): _vf.write("%-20s : %s\n" % (k, " ".join([str(s) for s in First[k]]))) # ----------------------------------------------------------------------------- # === SLR Generation === # # The following functions are used to construct SLR (Simple LR) parsing tables # as described on p.221-229 of the dragon book. # ----------------------------------------------------------------------------- # Global variables for the LR parsing engine def lr_init_vars(): global _lr_action, _lr_goto, _lr_method global _lr_goto_cache, _lr0_cidhash _lr_action = { } # Action table _lr_goto = { } # Goto table _lr_method = "Unknown" # LR method used _lr_goto_cache = { } _lr0_cidhash = { } # Compute the LR(0) closure operation on I, where I is a set of LR(0) items. # prodlist is a list of productions. _add_count = 0 # Counter used to detect cycles def lr0_closure(I): global _add_count _add_count += 1 prodlist = Productions # Add everything in I to J J = I[:] didadd = 1 while didadd: didadd = 0 for j in J: for x in j.lrafter: if x.lr0_added == _add_count: continue # Add B --> .G to J J.append(x.lr_next) x.lr0_added = _add_count didadd = 1 return J # Compute the LR(0) goto function goto(I,X) where I is a set # of LR(0) items and X is a grammar symbol. This function is written # in a way that guarantees uniqueness of the generated goto sets # (i.e. the same goto set will never be returned as two different Python # objects). With uniqueness, we can later do fast set comparisons using # id(obj) instead of element-wise comparison. def lr0_goto(I,x): # First we look for a previously cached entry g = _lr_goto_cache.get((id(I),x),None) if g: return g # Now we generate the goto set in a way that guarantees uniqueness # of the result s = _lr_goto_cache.get(x,None) if not s: s = { } _lr_goto_cache[x] = s gs = [ ] for p in I: n = p.lr_next if n and n.lrbefore == x: s1 = s.get(id(n),None) if not s1: s1 = { } s[id(n)] = s1 gs.append(n) s = s1 g = s.get('$end',None) if not g: if gs: g = lr0_closure(gs) s['$end'] = g else: s['$end'] = gs _lr_goto_cache[(id(I),x)] = g return g _lr0_cidhash = { } # Compute the LR(0) sets of item function def lr0_items(): C = [ lr0_closure([Productions[0].lr_next]) ] i = 0 for I in C: _lr0_cidhash[id(I)] = i i += 1 # Loop over the items in C and each grammar symbols i = 0 while i < len(C): I = C[i] i += 1 # Collect all of the symbols that could possibly be in the goto(I,X) sets asyms = { } for ii in I: for s in ii.usyms: asyms[s] = None for x in asyms.keys(): g = lr0_goto(I,x) if not g: continue if id(g) in _lr0_cidhash: continue _lr0_cidhash[id(g)] = len(C) C.append(g) return C # ----------------------------------------------------------------------------- # ==== LALR(1) Parsing ==== # # LALR(1) parsing is almost exactly the same as SLR except that instead of # relying upon Follow() sets when performing reductions, a more selective # lookahead set that incorporates the state of the LR(0) machine is utilized. # Thus, we mainly just have to focus on calculating the lookahead sets. # # The method used here is due to DeRemer and Pennelo (1982). # # DeRemer, F. L., and T. J. Pennelo: "Efficient Computation of LALR(1) # Lookahead Sets", ACM Transactions on Programming Languages and Systems, # Vol. 4, No. 4, Oct. 1982, pp. 615-649 # # Further details can also be found in: # # J. Tremblay and P. Sorenson, "The Theory and Practice of Compiler Writing", # McGraw-Hill Book Company, (1985). # # Note: This implementation is a complete replacement of the LALR(1) # implementation in PLY-1.x releases. That version was based on # a less efficient algorithm and it had bugs in its implementation. # ----------------------------------------------------------------------------- # ----------------------------------------------------------------------------- # compute_nullable_nonterminals() # # Creates a dictionary containing all of the non-terminals that might produce # an empty production. # ----------------------------------------------------------------------------- def compute_nullable_nonterminals(): nullable = {} num_nullable = 0 while 1: for p in Productions[1:]: if p.len == 0: nullable[p.name] = 1 continue for t in p.prod: if t not in nullable: break else: nullable[p.name] = 1 if len(nullable) == num_nullable: break num_nullable = len(nullable) return nullable # ----------------------------------------------------------------------------- # find_nonterminal_trans(C) # # Given a set of LR(0) items, this functions finds all of the non-terminal # transitions. These are transitions in which a dot appears immediately before # a non-terminal. Returns a list of tuples of the form (state,N) where state # is the state number and N is the nonterminal symbol. # # The input C is the set of LR(0) items. # ----------------------------------------------------------------------------- def find_nonterminal_transitions(C): trans = [] for state in range(len(C)): for p in C[state]: if p.lr_index < p.len - 1: t = (state,p.prod[p.lr_index+1]) if t[1] in Nonterminals: if t not in trans: trans.append(t) state = state + 1 return trans # ----------------------------------------------------------------------------- # dr_relation() # # Computes the DR(p,A) relationships for non-terminal transitions. The input # is a tuple (state,N) where state is a number and N is a nonterminal symbol. # # Returns a list of terminals. # ----------------------------------------------------------------------------- def dr_relation(C,trans,nullable): dr_set = { } state,N = trans terms = [] g = lr0_goto(C[state],N) for p in g: if p.lr_index < p.len - 1: a = p.prod[p.lr_index+1] if a in Terminals: if a not in terms: terms.append(a) # This extra bit is to handle the start state if state == 0 and N == Productions[0].prod[0]: terms.append('$end') return terms # ----------------------------------------------------------------------------- # reads_relation() # # Computes the READS() relation (p,A) READS (t,C). # ----------------------------------------------------------------------------- def reads_relation(C, trans, empty): # Look for empty transitions rel = [] state, N = trans g = lr0_goto(C[state],N) j = _lr0_cidhash.get(id(g),-1) for p in g: if p.lr_index < p.len - 1: a = p.prod[p.lr_index + 1] if a in empty: rel.append((j,a)) return rel # ----------------------------------------------------------------------------- # compute_lookback_includes() # # Determines the lookback and includes relations # # LOOKBACK: # # This relation is determined by running the LR(0) state machine forward. # For example, starting with a production "N : . A B C", we run it forward # to obtain "N : A B C ." We then build a relationship between this final # state and the starting state. These relationships are stored in a dictionary # lookdict. # # INCLUDES: # # Computes the INCLUDE() relation (p,A) INCLUDES (p',B). # # This relation is used to determine non-terminal transitions that occur # inside of other non-terminal transition states. (p,A) INCLUDES (p', B) # if the following holds: # # B -> LAT, where T -> epsilon and p' -L-> p # # L is essentially a prefix (which may be empty), T is a suffix that must be # able to derive an empty string. State p' must lead to state p with the string L. # # ----------------------------------------------------------------------------- def compute_lookback_includes(C,trans,nullable): lookdict = {} # Dictionary of lookback relations includedict = {} # Dictionary of include relations # Make a dictionary of non-terminal transitions dtrans = {} for t in trans: dtrans[t] = 1 # Loop over all transitions and compute lookbacks and includes for state,N in trans: lookb = [] includes = [] for p in C[state]: if p.name != N: continue # Okay, we have a name match. We now follow the production all the way # through the state machine until we get the . on the right hand side lr_index = p.lr_index j = state while lr_index < p.len - 1: lr_index = lr_index + 1 t = p.prod[lr_index] # Check to see if this symbol and state are a non-terminal transition if (j,t) in dtrans: # Yes. Okay, there is some chance that this is an includes relation # the only way to know for certain is whether the rest of the # production derives empty li = lr_index + 1 while li < p.len: if p.prod[li] in Terminals: break # No forget it if p.prod[li] not in nullable: break li = li + 1 else: # Appears to be a relation between (j,t) and (state,N) includes.append((j,t)) g = lr0_goto(C[j],t) # Go to next set j = _lr0_cidhash.get(id(g),-1) # Go to next state # When we get here, j is the final state, now we have to locate the production for r in C[j]: if r.name != p.name: continue if r.len != p.len: continue i = 0 # This look is comparing a production ". A B C" with "A B C ." while i < r.lr_index: if r.prod[i] != p.prod[i+1]: break i = i + 1 else: lookb.append((j,r)) for i in includes: if i not in includedict: includedict[i] = [] includedict[i].append((state,N)) lookdict[(state,N)] = lookb return lookdict,includedict # ----------------------------------------------------------------------------- # digraph() # traverse() # # The following two functions are used to compute set valued functions # of the form: # # F(x) = F'(x) U U{F(y) | x R y} # # This is used to compute the values of Read() sets as well as FOLLOW sets # in LALR(1) generation. # # Inputs: X - An input set # R - A relation # FP - Set-valued function # ------------------------------------------------------------------------------ def digraph(X,R,FP): N = { } for x in X: N[x] = 0 stack = [] F = { } for x in X: if N[x] == 0: traverse(x,N,stack,F,X,R,FP) return F def traverse(x,N,stack,F,X,R,FP): stack.append(x) d = len(stack) N[x] = d F[x] = FP(x) # F(X) <- F'(x) rel = R(x) # Get y's related to x for y in rel: if N[y] == 0: traverse(y,N,stack,F,X,R,FP) N[x] = min(N[x],N[y]) for a in F.get(y,[]): if a not in F[x]: F[x].append(a) if N[x] == d: N[stack[-1]] = sys.maxsize F[stack[-1]] = F[x] element = stack.pop() while element != x: N[stack[-1]] = sys.maxsize F[stack[-1]] = F[x] element = stack.pop() # ----------------------------------------------------------------------------- # compute_read_sets() # # Given a set of LR(0) items, this function computes the read sets. # # Inputs: C = Set of LR(0) items # ntrans = Set of nonterminal transitions # nullable = Set of empty transitions # # Returns a set containing the read sets # ----------------------------------------------------------------------------- def compute_read_sets(C, ntrans, nullable): FP = lambda x: dr_relation(C,x,nullable) R = lambda x: reads_relation(C,x,nullable) F = digraph(ntrans,R,FP) return F # ----------------------------------------------------------------------------- # compute_follow_sets() # # Given a set of LR(0) items, a set of non-terminal transitions, a readset, # and an include set, this function computes the follow sets # # Follow(p,A) = Read(p,A) U U {Follow(p',B) | (p,A) INCLUDES (p',B)} # # Inputs: # ntrans = Set of nonterminal transitions # readsets = Readset (previously computed) # inclsets = Include sets (previously computed) # # Returns a set containing the follow sets # ----------------------------------------------------------------------------- def compute_follow_sets(ntrans,readsets,inclsets): FP = lambda x: readsets[x] R = lambda x: inclsets.get(x,[]) F = digraph(ntrans,R,FP) return F # ----------------------------------------------------------------------------- # add_lookaheads() # # Attaches the lookahead symbols to grammar rules. # # Inputs: lookbacks - Set of lookback relations # followset - Computed follow set # # This function directly attaches the lookaheads to productions contained # in the lookbacks set # ----------------------------------------------------------------------------- def add_lookaheads(lookbacks,followset): for trans,lb in lookbacks.items(): # Loop over productions in lookback for state,p in lb: if state not in p.lookaheads: p.lookaheads[state] = [] f = followset.get(trans,[]) for a in f: if a not in p.lookaheads[state]: p.lookaheads[state].append(a) # ----------------------------------------------------------------------------- # add_lalr_lookaheads() # # This function does all of the work of adding lookahead information for use # with LALR parsing # ----------------------------------------------------------------------------- def add_lalr_lookaheads(C): # Determine all of the nullable nonterminals nullable = compute_nullable_nonterminals() # Find all non-terminal transitions trans = find_nonterminal_transitions(C) # Compute read sets readsets = compute_read_sets(C,trans,nullable) # Compute lookback/includes relations lookd, included = compute_lookback_includes(C,trans,nullable) # Compute LALR FOLLOW sets followsets = compute_follow_sets(trans,readsets,included) # Add all of the lookaheads add_lookaheads(lookd,followsets) # ----------------------------------------------------------------------------- # lr_parse_table() # # This function constructs the parse tables for SLR or LALR # ----------------------------------------------------------------------------- def lr_parse_table(method): global _lr_method goto = _lr_goto # Goto array action = _lr_action # Action array actionp = { } # Action production array (temporary) _lr_method = method n_srconflict = 0 n_rrconflict = 0 if yaccdebug: sys.stderr.write("yacc: Generating %s parsing table...\n" % method) _vf.write("\n\nParsing method: %s\n\n" % method) # Step 1: Construct C = { I0, I1, ... IN}, collection of LR(0) items # This determines the number of states C = lr0_items() if method == 'LALR': add_lalr_lookaheads(C) # Build the parser table, state by state st = 0 for I in C: # Loop over each production in I actlist = [ ] # List of actions if yaccdebug: _vf.write("\nstate %d\n\n" % st) for p in I: _vf.write(" (%d) %s\n" % (p.number, str(p))) _vf.write("\n") for p in I: try: if p.prod[-1] == ".": if p.name == "S'": # Start symbol. Accept! action[st,"$end"] = 0 actionp[st,"$end"] = p else: # We are at the end of a production. Reduce! if method == 'LALR': laheads = p.lookaheads[st] else: laheads = Follow[p.name] for a in laheads: actlist.append((a,p,"reduce using rule %d (%s)" % (p.number,p))) r = action.get((st,a),None) if r is not None: # Whoa. Have a shift/reduce or reduce/reduce conflict if r > 0: # Need to decide on shift or reduce here # By default we favor shifting. Need to add # some precedence rules here. sprec,slevel = Productions[actionp[st,a].number].prec rprec,rlevel = Precedence.get(a,('right',0)) if (slevel < rlevel) or ((slevel == rlevel) and (rprec == 'left')): # We really need to reduce here. action[st,a] = -p.number actionp[st,a] = p if not slevel and not rlevel: _vfc.write("shift/reduce conflict in state %d resolved as reduce.\n" % st) _vf.write(" ! shift/reduce conflict for %s resolved as reduce.\n" % a) n_srconflict += 1 elif (slevel == rlevel) and (rprec == 'nonassoc'): action[st,a] = None else: # Hmmm. Guess we'll keep the shift if not rlevel: _vfc.write("shift/reduce conflict in state %d resolved as shift.\n" % st) _vf.write(" ! shift/reduce conflict for %s resolved as shift.\n" % a) n_srconflict +=1 elif r < 0: # Reduce/reduce conflict. In this case, we favor the rule # that was defined first in the grammar file oldp = Productions[-r] pp = Productions[p.number] if oldp.line > pp.line: action[st,a] = -p.number actionp[st,a] = p # sys.stderr.write("Reduce/reduce conflict in state %d\n" % st) n_rrconflict += 1 _vfc.write("reduce/reduce conflict in state %d resolved using rule %d (%s).\n" % (st, actionp[st,a].number, actionp[st,a])) _vf.write(" ! reduce/reduce conflict for %s resolved using rule %d (%s).\n" % (a,actionp[st,a].number, actionp[st,a])) else: sys.stderr.write("Unknown conflict in state %d\n" % st) else: action[st,a] = -p.number actionp[st,a] = p else: i = p.lr_index a = p.prod[i+1] # Get symbol right after the "." if a in Terminals: g = lr0_goto(I,a) j = _lr0_cidhash.get(id(g),-1) if j >= 0: # We are in a shift state actlist.append((a,p,"shift and go to state %d" % j)) r = action.get((st,a),None) if r is not None: # Whoa have a shift/reduce or shift/shift conflict if r > 0: if r != j: sys.stderr.write("Shift/shift conflict in state %d\n" % st) elif r < 0: # Do a precedence check. # - if precedence of reduce rule is higher, we reduce. # - if precedence of reduce is same and left assoc, we reduce. # - otherwise we shift rprec,rlevel = Productions[actionp[st,a].number].prec sprec,slevel = Precedence.get(a,('right',0)) if (slevel > rlevel) or ((slevel == rlevel) and (rprec != 'left')): # We decide to shift here... highest precedence to shift action[st,a] = j actionp[st,a] = p if not rlevel: n_srconflict += 1 _vfc.write("shift/reduce conflict in state %d resolved as shift.\n" % st) _vf.write(" ! shift/reduce conflict for %s resolved as shift.\n" % a) elif (slevel == rlevel) and (rprec == 'nonassoc'): action[st,a] = None else: # Hmmm. Guess we'll keep the reduce if not slevel and not rlevel: n_srconflict +=1 _vfc.write("shift/reduce conflict in state %d resolved as reduce.\n" % st) _vf.write(" ! shift/reduce conflict for %s resolved as reduce.\n" % a) else: sys.stderr.write("Unknown conflict in state %d\n" % st) else: action[st,a] = j actionp[st,a] = p except Exception as e: raise YaccError("Hosed in lr_parse_table").with_traceback(e) # Print the actions associated with each terminal if yaccdebug: _actprint = { } for a,p,m in actlist: if (st,a) in action: if p is actionp[st,a]: _vf.write(" %-15s %s\n" % (a,m)) _actprint[(a,m)] = 1 _vf.write("\n") for a,p,m in actlist: if (st,a) in action: if p is not actionp[st,a]: if (a,m) not in _actprint: _vf.write(" ! %-15s [ %s ]\n" % (a,m)) _actprint[(a,m)] = 1 # Construct the goto table for this state if yaccdebug: _vf.write("\n") nkeys = { } for ii in I: for s in ii.usyms: if s in Nonterminals: nkeys[s] = None for n in nkeys.keys(): g = lr0_goto(I,n) j = _lr0_cidhash.get(id(g),-1) if j >= 0: goto[st,n] = j if yaccdebug: _vf.write(" %-30s shift and go to state %d\n" % (n,j)) st += 1 if yaccdebug: if n_srconflict == 1: sys.stderr.write("yacc: %d shift/reduce conflict\n" % n_srconflict) if n_srconflict > 1: sys.stderr.write("yacc: %d shift/reduce conflicts\n" % n_srconflict) if n_rrconflict == 1: sys.stderr.write("yacc: %d reduce/reduce conflict\n" % n_rrconflict) if n_rrconflict > 1: sys.stderr.write("yacc: %d reduce/reduce conflicts\n" % n_rrconflict) # ----------------------------------------------------------------------------- # ==== LR Utility functions ==== # ----------------------------------------------------------------------------- # ----------------------------------------------------------------------------- # _lr_write_tables() # # This function writes the LR parsing tables to a file # ----------------------------------------------------------------------------- def lr_write_tables(modulename=tab_module,outputdir=''): filename = os.path.join(outputdir,modulename) + ".py" try: f = open(filename,"w") f.write(""" # %s # This file is automatically generated. Do not edit. _lr_method = %s _lr_signature = %s """ % (filename, repr(_lr_method), repr(Signature.digest()))) # Change smaller to 0 to go back to original tables smaller = 1 # Factor out names to try and make smaller if smaller: items = { } for k,v in _lr_action.items(): i = items.get(k[1]) if not i: i = ([],[]) items[k[1]] = i i[0].append(k[0]) i[1].append(v) f.write("\n_lr_action_items = {") for k,v in items.items(): f.write("%r:([" % k) for i in v[0]: f.write("%r," % i) f.write("],[") for i in v[1]: f.write("%r," % i) f.write("]),") f.write("}\n") f.write(""" _lr_action = { } for _k, _v in _lr_action_items.items(): for _x,_y in zip(_v[0],_v[1]): _lr_action[(_x,_k)] = _y del _lr_action_items """) else: f.write("\n_lr_action = { "); for k,v in _lr_action.items(): f.write("(%r,%r):%r," % (k[0],k[1],v)) f.write("}\n"); if smaller: # Factor out names to try and make smaller items = { } for k,v in _lr_goto.items(): i = items.get(k[1]) if not i: i = ([],[]) items[k[1]] = i i[0].append(k[0]) i[1].append(v) f.write("\n_lr_goto_items = {") for k,v in items.items(): f.write("%r:([" % k) for i in v[0]: f.write("%r," % i) f.write("],[") for i in v[1]: f.write("%r," % i) f.write("]),") f.write("}\n") f.write(""" _lr_goto = { } for _k, _v in _lr_goto_items.items(): for _x,_y in zip(_v[0],_v[1]): _lr_goto[(_x,_k)] = _y del _lr_goto_items """) else: f.write("\n_lr_goto = { "); for k,v in _lr_goto.items(): f.write("(%r,%r):%r," % (k[0],k[1],v)) f.write("}\n"); # Write production table f.write("_lr_productions = [\n") for p in Productions: if p: if (p.func): f.write(" (%r,%d,%r,%r,%d),\n" % (p.name, p.len, p.func.__name__,p.file,p.line)) else: f.write(" (%r,%d,None,None,None),\n" % (p.name, p.len)) else: f.write(" None,\n") f.write("]\n") f.close() except IOError as e: print("Unable to create '%s'" % filename) print(e) def lr_read_tables(module=tab_module,optimize=0): global _lr_action, _lr_goto, _lr_productions, _lr_method try: exec("import %s as parsetab" % module) if (optimize) or (Signature.digest() == parsetab._lr_signature): _lr_action = parsetab._lr_action _lr_goto = parsetab._lr_goto _lr_productions = parsetab._lr_productions _lr_method = parsetab._lr_method return 1 else: return 0 except (ImportError,AttributeError): return 0 # Available instance types. This is used when parsers are defined by a class. # In Python3 the InstanceType and ObjectType are no more, they've passed, ceased # to be, they are ex-classes along with old-style classes try: _INSTANCETYPE = (types.InstanceType, types.ObjectType) except AttributeError: _INSTANCETYPE = object # ----------------------------------------------------------------------------- # yacc(module) # # Build the parser module # ----------------------------------------------------------------------------- def yacc(method=default_lr, debug=yaccdebug, module=None, tabmodule=tab_module, start=None, check_recursion=1, optimize=0,write_tables=1,debugfile=debug_file,outputdir=''): global yaccdebug yaccdebug = debug initialize_vars() files = { } error = 0 # Add parsing method to signature Signature.update(util.encode_input(method)) # If a "module" parameter was supplied, extract its dictionary. # Note: a module may in fact be an instance as well. if module: # User supplied a module object. if isinstance(module, types.ModuleType): ldict = module.__dict__ elif isinstance(module, _INSTANCETYPE): _items = [(k,getattr(module,k)) for k in dir(module)] ldict = { } for i in _items: ldict[i[0]] = i[1] else: raise ValueError("Expected a module") else: # No module given. We might be able to get information from the caller. # Throw an exception and unwind the traceback to get the globals try: raise RuntimeError except RuntimeError: e,b,t = sys.exc_info() f = t.tb_frame f = f.f_back # Walk out to our calling function ldict = f.f_globals # Grab its globals dictionary # Add starting symbol to signature if not start: start = ldict.get("start",None) if start: Signature.update(util.encode_input(start)) # If running in optimized mode. We're going to if (optimize and lr_read_tables(tabmodule,1)): # Read parse table del Productions[:] for p in _lr_productions: if not p: Productions.append(None) else: m = MiniProduction() m.name = p[0] m.len = p[1] m.file = p[3] m.line = p[4] if p[2]: m.func = ldict[p[2]] Productions.append(m) else: # Get the tokens map if (module and isinstance(module,_INSTANCETYPE)): tokens = getattr(module,"tokens",None) else: tokens = ldict.get("tokens",None) if not tokens: raise YaccError("module does not define a list 'tokens'") if not (isinstance(tokens,list) or isinstance(tokens,tuple)): raise YaccError("tokens must be a list or tuple.") # Check to see if a requires dictionary is defined. requires = ldict.get("require",None) if requires: if not (isinstance(requires,dict)): raise YaccError("require must be a dictionary.") for r,v in requires.items(): try: if not (isinstance(v,list)): raise TypeError v1 = [x.split(".") for x in v] Requires[r] = v1 except Exception: print("Invalid specification for rule '%s' in require. Expected a list of strings" % r) # Build the dictionary of terminals. We a record a 0 in the # dictionary to track whether or not a terminal is actually # used in the grammar if 'error' in tokens: print("yacc: Illegal token 'error'. Is a reserved word.") raise YaccError("Illegal token name") for n in tokens: if n in Terminals: print("yacc: Warning. Token '%s' multiply defined." % n) Terminals[n] = [ ] Terminals['error'] = [ ] # Get the precedence map (if any) prec = ldict.get("precedence",None) if prec: if not (isinstance(prec,list) or isinstance(prec,tuple)): raise YaccError("precedence must be a list or tuple.") add_precedence(prec) Signature.update(util.encode_input(repr(prec))) for n in tokens: if n not in Precedence: Precedence[n] = ('right',0) # Default, right associative, 0 precedence # Look for error handler ef = ldict.get('p_error',None) if ef: if isinstance(ef,types.FunctionType): ismethod = 0 elif isinstance(ef, types.MethodType): ismethod = 1 else: raise YaccError("'p_error' defined, but is not a function or method.") eline = ef.__code__.co_firstlineno efile = ef.__code__.co_filename files[efile] = None if (ef.__code__.co_argcount != 1+ismethod): raise YaccError("%s:%d: p_error() requires 1 argument." % (efile,eline)) global Errorfunc Errorfunc = ef else: print("yacc: Warning. no p_error() function is defined.") # Get the list of built-in functions with p_ prefix symbols = [ldict[f] for f in ldict.keys() if (type(ldict[f]) in (types.FunctionType, types.MethodType) and ldict[f].__name__[:2] == 'p_' and ldict[f].__name__ != 'p_error')] # Check for non-empty symbols if len(symbols) == 0: raise YaccError("no rules of the form p_rulename are defined.") # Sort the symbols by line number symbols.sort(key=lambda x: x.__code__.co_firstlineno) # Add all of the symbols to the grammar for f in symbols: if (add_function(f)) < 0: error += 1 else: files[f.__code__.co_filename] = None # Make a signature of the docstrings for f in symbols: if f.__doc__: Signature.update(util.encode_input(f.__doc__)) lr_init_vars() if error: raise YaccError("Unable to construct parser.") if not lr_read_tables(tabmodule): # Validate files for filename in files.keys(): if not validate_file(filename): error = 1 # Validate dictionary validate_dict(ldict) if start and start not in Prodnames: raise YaccError("Bad starting symbol '%s'" % start) augment_grammar(start) error = verify_productions(cycle_check=check_recursion) otherfunc = [ldict[f] for f in ldict.keys() if (type(f) in (types.FunctionType,types.MethodType) and ldict[f].__name__[:2] != 'p_')] if error: raise YaccError("Unable to construct parser.") build_lritems() compute_first1() compute_follow(start) if method in ['SLR','LALR']: lr_parse_table(method) else: raise YaccError("Unknown parsing method '%s'" % method) if write_tables: lr_write_tables(tabmodule,outputdir) if yaccdebug: try: f = open(os.path.join(outputdir,debugfile),"w") f.write(_vfc.getvalue()) f.write("\n\n") f.write(_vf.getvalue()) f.close() except IOError as e: print("yacc: can't create '%s'" % debugfile,e) # Made it here. Create a parser object and set up its internal state. # Set global parse() method to bound method of parser object. p = Parser("xyzzy") p.productions = Productions p.errorfunc = Errorfunc p.action = _lr_action p.goto = _lr_goto p.method = _lr_method p.require = Requires global parse parse = p.parse global parser parser = p # Clean up all of the globals we created if (not optimize): yacc_cleanup() return p # yacc_cleanup function. Delete all of the global variables # used during table construction def yacc_cleanup(): global _lr_action, _lr_goto, _lr_method, _lr_goto_cache del _lr_action, _lr_goto, _lr_method, _lr_goto_cache global Productions, Prodnames, Prodmap, Terminals global Nonterminals, First, Follow, Precedence, LRitems global Errorfunc, Signature, Requires del Productions, Prodnames, Prodmap, Terminals del Nonterminals, First, Follow, Precedence, LRitems del Errorfunc, Signature, Requires global _vf, _vfc del _vf, _vfc # Stub that raises an error if parsing is attempted without first calling yacc() def parse(*args,**kwargs): raise YaccError("yacc: No parser built with yacc()") selinux-python-2.8/sepolgen/src/share/000077500000000000000000000000001330160122500200675ustar00rootroot00000000000000selinux-python-2.8/sepolgen/src/share/Makefile000066400000000000000000000002241330160122500215250ustar00rootroot00000000000000SHAREDIR ?= /var/lib/sepolgen all: install: all -mkdir -p $(DESTDIR)$(SHAREDIR) install -m 644 perm_map $(DESTDIR)$(SHAREDIR) clean: rm -f *~ selinux-python-2.8/sepolgen/src/share/perm_map000066400000000000000000001020131330160122500216070ustar00rootroot00000000000000# This is a permission map file for use in policy analysis. This # file maps object permissions (read, getattr, setattr, ..., etc.) # for an object class, to exactly one of the following: read, write, # both, or none. This file may be edited as long as the specific # syntax rules are obeyed. # # For each object class, there is a set of object permissions that are # individually mapped to read, write, both, or none. If a new object # class is added, make sure that the current number of object classes # is increased. # # The syntax for an object class definition is: # class # # This is followed by each permission and its individual mapping to one # of the following: # # r = Read # w = Write # n = None # b = Both # # Additionally, you can choose to follow the mapping with an optional # permission weight value from 1 (less importance) to 10 (higher importance). # 10 is the default weight value if one is not provided. # # Look to the examples below for further clarification. # # Number of object classes. 58 class security 11 compute_av n 1 compute_create n 1 compute_member n 1 check_context n 1 load_policy n 1 compute_relabel n 1 compute_user n 1 setenforce n 1 setbool n 1 setsecparam n 1 setcheckreqprot n 1 class process 29 fork n 1 transition w 5 sigchld w 1 sigkill w 1 sigstop w 1 signull n 1 signal w 5 ptrace b 10 getsched r 1 setsched w 1 getsession r 1 getpgid r 1 setpgid w 5 getcap r 3 setcap w 1 share b 1 getattr r 1 setexec w 1 setfscreate w 1 noatsecure n 1 siginh n 1 setrlimit n 1 rlimitinh n 1 dyntransition w 10 setcurrent w 1 execmem n 1 execstack n 1 execheap n 1 setkeycreate w 1 class system 4 ipc_info n 1 syslog_read n 1 syslog_mod n 1 syslog_console n 1 class capability 31 chown n 3 dac_override n 1 dac_read_search n 1 fowner n 1 fsetid n 1 kill n 1 setgid n 3 setuid n 1 setpcap n 3 linux_immutable n 1 net_bind_service n 1 net_broadcast n 1 net_admin n 1 net_raw n 1 ipc_lock n 1 ipc_owner n 1 sys_module n 1 sys_rawio n 1 sys_chroot n 1 sys_ptrace n 1 sys_pacct n 1 sys_admin n 3 sys_boot n 1 sys_nice n 1 sys_resource n 1 sys_time n 1 sys_tty_config n 1 mknod n 1 lease n 1 audit_write n 3 audit_control n 1 class filesystem 10 mount w 1 remount w 1 unmount w 1 getattr r 1 relabelfrom r 10 relabelto w 10 transition w 1 associate n 1 quotamod w 1 quotaget r 1 class file 21 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 10 unlink w 1 link w 1 rename w 5 execute r 10 swapon b 1 quotaon b 1 mounton b 1 open r 1 class dir 23 add_name w 1 remove_name w 1 reparent w 1 search r 1 rmdir b 1 ioctl n 1 read r 1 write w 1 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 1 relabelto w 1 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class fd 1 use b 1 class lnk_file 18 ioctl n 1 read r 1 write w 1 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 1 relabelto w 1 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class chr_file 21 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class blk_file 18 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class sock_file 18 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class fifo_file 18 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 open r 1 class socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class tcp_socket 27 connectto w 1 newconn w 1 acceptfrom r 1 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 name_connect w 1 class udp_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class rawip_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class node 7 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 enforce_dest n 1 class netif 6 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 class netlink_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class packet_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_stream_socket 25 connectto w 1 newconn w 1 acceptfrom r 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_dgram_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class sem 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class msg 2 send w 10 receive r 10 class msgq 10 enqueue w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class shm 10 lock w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class ipc 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class passwd 5 passwd w 1 chfn w 5 chsh w 5 rootok n 1 crontab w 5 class drawable 5 create w 1 destroy w 1 draw w 10 copy r 10 getattr r 7 class window 26 addchild w 1 create w 1 destroy w 1 map w 1 unmap w 1 chstack w 10 chproplist w 7 chprop w 10 listprop r 5 getattr r 5 setattr w 5 setfocus w 1 move w 10 chselection w 10 chparent w 5 ctrllife w 5 enumerate w 1 transparent w 1 mousemotion w 10 clientcomevent w 5 inputevent w 5 drawevent w 5 windowchangeevent w 5 windowchangerequest w 5 serverchangeevent w 5 extensionevent w 5 class gc 4 create w 1 free w 1 getattr r 5 setattr w 5 class font 4 load r 1 free w 1 getattr r 5 use r 1 class colormap 9 create w 1 free w 1 install w 10 uninstall w 1 list r 5 read r 10 store w 10 getattr r 5 setattr w 5 class property 4 create w 1 free w 1 read r 10 write w 10 class cursor 5 create w 1 createglyph w 10 free w 1 assign w 10 setattr w 5 class xclient 1 kill w 1 class xinput 11 lookup r 10 getattr r 5 setattr w 5 setfocus w 10 warppointer w 10 activegrab w 1 passivegrab w 1 ungrab w 1 bell w 3 mousemotion w 10 relabelinput b 3 class xserver 8 screensaver w 10 gethostlist r 7 sethostlist w 7 getfontpath r 7 setfontpath w 7 getattr r 7 grab w 10 ungrab w 1 class xextension 2 query r 10 use b 1 class pax 6 pageexec n 1 emutramp n 1 mprotect n 1 randmmap n 1 randexec n 1 segmexec n 1 class netlink_route_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_firewall_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_tcpdiag_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_nflog_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_xfrm_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_selinux_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_audit_socket 26 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 nlmsg_relay w 10 nlmsg_readpriv r 10 class netlink_ip6fw_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_dnrt_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_kobject_uevent_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class dbus 2 acquire_svc b 1 send_msg w 10 class nscd 8 getpwd r 7 getgrp r 7 gethost r 7 getstat r 7 admin w 5 shmempwd r 7 shmemgrp r 7 shmemhost r 7 class association 4 sendto w 10 recvfrom r 10 setcontext w 3 polmatch r 1 class appletalk_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key 7 view r 7 read r 10 write w 10 search r 5 link w 7 setattr w 7 create w 10 class packet 3 send w 10 recv r 10 relabelto w 3 selinux-python-2.8/sepolgen/tests/000077500000000000000000000000001330160122500173405ustar00rootroot00000000000000selinux-python-2.8/sepolgen/tests/.gitignore000066400000000000000000000000721330160122500213270ustar00rootroot00000000000000module_compile_test.fc module_compile_test.if output tmp/ selinux-python-2.8/sepolgen/tests/Makefile000066400000000000000000000003651330160122500210040ustar00rootroot00000000000000PYTHON ?= python clean: rm -f *~ *.pyc rm -f parser.out parsetab.py rm -f out.txt rm -f module_compile_test.fc rm -f module_compile_test.if rm -f module_compile_test.pp rm -f output rm -rf __pycache__ tmp test: $(PYTHON) run-tests.py selinux-python-2.8/sepolgen/tests/audit.txt000066400000000000000000001217251330160122500212170ustar00rootroot00000000000000type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.793:711): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.797:712): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.801:713): avc: denied { dac_read_search } for pid=8146 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.801:713): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.805:714): avc: denied { dac_override } for pid=8144 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.805:714): avc: denied { dac_read_search } for pid=8144 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.805:714): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0a6c8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.849:715): avc: denied { dac_override } for pid=8152 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.849:715): avc: denied { dac_read_search } for pid=8152 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.849:715): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0a0b8 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.853:716): avc: denied { dac_override } for pid=8153 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.853:716): avc: denied { dac_read_search } for pid=8153 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.853:716): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc09c78 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.945:717): avc: denied { dac_override } for pid=8144 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.945:717): avc: denied { dac_read_search } for pid=8144 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.945:717): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc09be8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.957:718): avc: denied { dac_override } for pid=8144 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.957:718): avc: denied { dac_read_search } for pid=8144 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.957:718): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc09be8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=CRED_ACQ msg=audit(1158584988.203:719): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1158584988.203:720): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1158584988.203:721): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session close acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1158585001.341:722): user pid=8294 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158585001.341:723): login pid=8294 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158585001.341:724): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158585001.345:725): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158585001.397:726): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158585001.397:727): user pid=8294 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158585033.003:728): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1158585033.003:729): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1158585033.003:730): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session close acct=root : exe="/usr/bin/sudo" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1158585601.463:731): user pid=8495 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158585601.463:732): login pid=8495 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158585601.463:733): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158585601.463:734): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158585601.483:735): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158585601.483:736): user pid=8495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158586201.552:737): user pid=8538 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158586201.552:738): login pid=8538 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158586201.552:739): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158586201.556:740): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158586201.576:741): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158586201.576:742): user pid=8538 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158586801.646:743): user pid=8563 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158586801.650:744): login pid=8563 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158586801.650:745): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158586801.650:746): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158586801.670:747): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158586801.670:748): user pid=8563 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158587401.735:749): user pid=8628 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158587401.735:750): login pid=8628 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158587401.739:751): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158587401.739:752): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158587401.759:753): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158587401.759:754): user pid=8628 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158588001.825:755): user pid=8779 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158588001.825:756): login pid=8779 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158588001.825:757): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158588001.825:758): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158588001.885:759): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158588001.885:760): user pid=8779 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158588061.896:761): user pid=8787 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158588061.900:762): login pid=8787 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158588061.900:763): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158588061.900:764): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158588061.920:765): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158588061.920:766): user pid=8787 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_AUTH msg=audit(1158588251.786:767): user pid=8857 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_ACCT msg=audit(1158588251.786:768): user pid=8857 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=LOGIN msg=audit(1158588251.790:769): login pid=8859 uid=0 old auid=4294967295 new auid=500 type=USER_START msg=audit(1158588251.790:770): user pid=8859 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=CRED_REFR msg=audit(1158588251.790:771): user pid=8859 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_AUTH msg=audit(1158588258.499:772): user pid=8877 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_ACCT msg=audit(1158588258.499:773): user pid=8877 uid=0 auid=4294967295 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=LOGIN msg=audit(1158588258.503:774): login pid=8879 uid=0 old auid=4294967295 new auid=500 type=USER_START msg=audit(1158588258.503:775): user pid=8879 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=CRED_REFR msg=audit(1158588258.503:776): user pid=8879 uid=0 auid=500 subj=system_u:system_r:unconfined_t:s0-s0:c0.c255 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/sshd" (hostname=192.168.1.102, addr=2.0.0.0, terminal=ssh res=success)' type=USER_ACCT msg=audit(1158588601.986:777): user pid=8933 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158588601.986:778): login pid=8933 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158588601.986:779): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158588601.990:780): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158588602.010:781): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158588602.010:782): user pid=8933 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158589201.084:783): user pid=8966 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158589201.084:784): login pid=8966 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158589201.084:785): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158589201.084:786): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158589201.104:787): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158589201.104:788): user pid=8966 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158589801.165:789): user pid=9001 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158589801.165:790): login pid=9001 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158589801.169:791): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158589801.169:792): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158589801.189:793): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158589801.189:794): user pid=9001 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158590401.255:795): user pid=9040 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158590401.255:796): login pid=9040 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158590401.255:797): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158590401.255:798): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158590401.279:799): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158590401.279:800): user pid=9040 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158591001.345:801): user pid=9074 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158591001.345:802): login pid=9074 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158591001.349:803): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158591001.349:804): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158591001.365:805): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158591001.365:806): user pid=9074 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158591601.438:807): user pid=9094 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158591601.438:808): login pid=9094 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158591601.438:809): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158591601.438:810): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158591601.458:811): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158591601.458:812): user pid=9094 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158591661.469:813): user pid=9184 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158591661.469:814): login pid=9184 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158591661.469:815): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158591661.469:816): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158591661.509:817): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158591661.513:818): user pid=9184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158592201.576:819): user pid=9289 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158592201.576:820): login pid=9289 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158592201.580:821): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158592201.580:822): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158592201.604:823): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158592201.604:824): user pid=9289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158592801.674:825): user pid=9341 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158592801.674:826): login pid=9341 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158592801.674:827): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158592801.674:828): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158592801.694:829): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158592801.694:830): user pid=9341 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158593401.759:831): user pid=9374 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158593401.759:832): login pid=9374 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158593401.759:833): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158593401.759:834): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158593401.775:835): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158593401.775:836): user pid=9374 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158594001.885:837): user pid=9432 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158594001.885:838): login pid=9432 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158594001.889:839): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158594001.889:840): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158594001.909:841): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158594001.909:842): user pid=9432 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158594601.982:843): user pid=9466 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158594601.982:844): login pid=9466 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158594601.982:845): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158594601.982:846): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158594601.998:847): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158594602.002:848): user pid=9466 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158595201.064:849): user pid=9502 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158595201.064:850): login pid=9502 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158595201.068:851): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158595201.068:852): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158595201.084:853): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158595201.084:854): user pid=9502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158595261.095:855): user pid=9507 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158595261.095:856): login pid=9507 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158595261.095:857): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158595261.095:858): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158595261.119:859): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158595261.119:860): user pid=9507 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_AUTH msg=audit(1158595693.694:861): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1158595693.694:862): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_START msg=audit(1158595693.734:863): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=CRED_ACQ msg=audit(1158595693.758:864): user pid=9561 uid=500 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_AUTH msg=audit(1158595701.599:865): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1158595701.599:866): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_START msg=audit(1158595701.627:867): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=CRED_ACQ msg=audit(1158595701.627:868): user pid=9582 uid=0 auid=500 subj=user_u:system_r:unconfined_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1158595801.182:869): user pid=9617 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158595801.182:870): login pid=9617 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158595801.182:871): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158595801.182:872): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158595801.202:873): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158595801.202:874): user pid=9617 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158596401.275:875): user pid=9645 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158596401.279:876): login pid=9645 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158596401.279:877): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158596401.279:878): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158596401.295:879): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158596401.295:880): user pid=9645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1158597001.361:881): user pid=9692 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1158597001.361:882): login pid=9692 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1158597001.361:883): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1158597001.361:884): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1158597001.381:885): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1158597001.381:886): user pid=9692 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c255 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' selinux-python-2.8/sepolgen/tests/module_compile_test.te000066400000000000000000000001771330160122500237330ustar00rootroot00000000000000module module_compile_test 1.0; require { type foo, bar; class file { read write }; } allow foo bar : file { read write }; selinux-python-2.8/sepolgen/tests/perm_map000066400000000000000000001015541330160122500210710ustar00rootroot00000000000000# This is a permission map file for use in policy analysis. This # file maps object permissions (read, getattr, setattr, ..., etc.) # for an object class, to exactly one of the following: read, write, # both, or none. This file may be edited as long as the specific # syntax rules are obeyed. # # For each object class, there is a set of object permissions that are # individually mapped to read, write, both, or none. If a new object # class is added, make sure that the current number of object classes # is increased. # # The syntax for an object class definition is: # class # # This is followed by each permission and its individual mapping to one # of the following: # # r = Read # w = Write # n = None # b = Both # # Additionally, you can choose to follow the mapping with an optional # permission weight value from 1 (less importance) to 10 (higher importance). # 10 is the default weight value if one is not provided. # # Look to the examples below for further clarification. # # Number of object classes. 58 class security 11 compute_av n 1 compute_create n 1 compute_member n 1 check_context n 1 load_policy n 1 compute_relabel n 1 compute_user n 1 setenforce n 1 setbool n 1 setsecparam n 1 setcheckreqprot n 1 class process 29 fork n 1 transition w 5 sigchld w 1 sigkill w 1 sigstop w 1 signull n 1 signal w 5 ptrace b 10 getsched r 1 setsched w 1 getsession r 1 getpgid r 1 setpgid w 5 getcap r 3 setcap w 1 share b 1 getattr r 1 setexec w 1 setfscreate w 1 noatsecure n 1 siginh n 1 setrlimit n 1 rlimitinh n 1 dyntransition w 10 setcurrent w 1 execmem n 1 execstack n 1 execheap n 1 setkeycreate w 1 class system 4 ipc_info n 1 syslog_read n 1 syslog_mod n 1 syslog_console n 1 class capability 31 chown n 3 dac_override n 1 dac_read_search n 1 fowner n 1 fsetid n 1 kill n 1 setgid n 3 setuid n 1 setpcap n 3 linux_immutable n 1 net_bind_service n 1 net_broadcast n 1 net_admin n 1 net_raw n 1 ipc_lock n 1 ipc_owner n 1 sys_module n 1 sys_rawio n 1 sys_chroot n 1 sys_ptrace n 1 sys_pacct n 1 sys_admin n 3 sys_boot n 1 sys_nice n 1 sys_resource n 1 sys_time n 1 sys_tty_config n 1 mknod n 1 lease n 1 audit_write n 3 audit_control n 1 class filesystem 10 mount w 1 remount w 1 unmount w 1 getattr r 1 relabelfrom r 10 relabelto w 10 transition w 1 associate n 1 quotamod w 1 quotaget r 1 class file 20 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class dir 22 add_name w 5 remove_name w 1 reparent w 1 search r 1 rmdir b 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class fd 1 use b 1 class lnk_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class chr_file 20 execute_no_trans r 1 entrypoint r 1 execmod n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class blk_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class sock_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 1 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class fifo_file 17 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 unlink w 1 link w 1 rename w 5 execute r 1 swapon b 1 quotaon b 1 mounton b 1 class socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class tcp_socket 27 connectto w 1 newconn w 1 acceptfrom r 1 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 name_connect w 1 class udp_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class rawip_socket 23 node_bind n 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class node 7 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 enforce_dest n 1 class netif 6 tcp_recv r 10 tcp_send w 10 udp_recv r 10 udp_send w 10 rawip_recv r 10 rawip_send w 10 class netlink_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class packet_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_stream_socket 25 connectto w 1 newconn w 1 acceptfrom r 1 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class unix_dgram_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class sem 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class msg 2 send w 10 receive r 10 class msgq 10 enqueue w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class shm 10 lock w 1 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class ipc 9 create w 1 destroy w 1 getattr r 1 setattr w 1 read r 10 write w 10 associate n 1 unix_read r 3 unix_write w 3 class passwd 5 passwd w 1 chfn w 5 chsh w 5 rootok n 1 crontab w 5 class drawable 5 create w 1 destroy w 1 draw w 10 copy r 10 getattr r 7 class window 26 addchild w 1 create w 1 destroy w 1 map w 1 unmap w 1 chstack w 10 chproplist w 7 chprop w 10 listprop r 5 getattr r 5 setattr w 5 setfocus w 1 move w 10 chselection w 10 chparent w 5 ctrllife w 5 enumerate w 1 transparent w 1 mousemotion w 10 clientcomevent w 5 inputevent w 5 drawevent w 5 windowchangeevent w 5 windowchangerequest w 5 serverchangeevent w 5 extensionevent w 5 class gc 4 create w 1 free w 1 getattr r 5 setattr w 5 class font 4 load r 1 free w 1 getattr r 5 use r 1 class colormap 9 create w 1 free w 1 install w 10 uninstall w 1 list r 5 read r 10 store w 10 getattr r 5 setattr w 5 class property 4 create w 1 free w 1 read r 10 write w 10 class cursor 5 create w 1 createglyph w 10 free w 1 assign w 10 setattr w 5 class xclient 1 kill w 1 class xinput 11 lookup r 10 getattr r 5 setattr w 5 setfocus w 10 warppointer w 10 activegrab w 1 passivegrab w 1 ungrab w 1 bell w 3 mousemotion w 10 relabelinput b 3 class xserver 8 screensaver w 10 gethostlist r 7 sethostlist w 7 getfontpath r 7 setfontpath w 7 getattr r 7 grab w 10 ungrab w 1 class xextension 2 query r 10 use b 1 class pax 6 pageexec n 1 emutramp n 1 mprotect n 1 randmmap n 1 randexec n 1 segmexec n 1 class netlink_route_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_firewall_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_tcpdiag_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_nflog_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_xfrm_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_selinux_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_audit_socket 26 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 nlmsg_relay w 10 nlmsg_readpriv r 10 class netlink_ip6fw_socket 24 nlmsg_read r 10 nlmsg_write w 10 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_dnrt_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto r 10 recv_msg r 10 send_msg w 10 name_bind n 1 class netlink_kobject_uevent_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 7 setattr w 7 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class dbus 2 acquire_svc b 1 send_msg w 10 class nscd 8 getpwd r 7 getgrp r 7 gethost r 7 getstat r 7 admin w 5 shmempwd r 7 shmemgrp r 7 shmemhost r 7 class association 4 sendto w 10 recvfrom r 10 setcontext w 3 polmatch r 1 class appletalk_socket 22 ioctl n 1 read r 10 write w 10 create w 1 getattr r 1 setattr w 1 lock n 1 relabelfrom r 10 relabelto w 10 append w 1 bind w 1 connect w 1 listen r 1 accept r 1 getopt r 1 setopt w 1 shutdown w 1 recvfrom r 10 sendto w 10 recv_msg r 10 send_msg w 10 name_bind n 1 class key 7 view r 7 read r 10 write w 10 search r 5 link w 7 setattr w 7 create w 10 class packet 3 send w 10 recv r 10 relabelto w 3 selinux-python-2.8/sepolgen/tests/run-tests.py000066400000000000000000000005501330160122500216560ustar00rootroot00000000000000import unittest import sys sys.path.insert(0, "../src/.") from test_access import * from test_audit import * from test_refpolicy import * from test_refparser import * from test_policygen import * from test_matching import * from test_interfaces import * from test_objectmodel import * from test_module import * if __name__ == "__main__": unittest.main() selinux-python-2.8/sepolgen/tests/test_access.py000066400000000000000000000207261330160122500222210ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.refpolicy as refpolicy import sepolgen.refparser as refparser import sepolgen.policygen as policygen import sepolgen.access as access class TestAccessVector(unittest.TestCase): def test_init(self): # Default construction a = access.AccessVector() self.assertEqual(a.src_type, None) self.assertEqual(a.tgt_type, None) self.assertEqual(a.obj_class, None) self.assertTrue(isinstance(a.perms, refpolicy.IdSet)) self.assertTrue(isinstance(a.audit_msgs, type([]))) self.assertEqual(len(a.audit_msgs), 0) # Construction from a list a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) l = access.AccessVector(['foo', 'bar', 'file', 'read', 'write']) self.assertEqual(a.src_type, l.src_type) self.assertEqual(a.tgt_type, l.tgt_type) self.assertEqual(a.obj_class, l.obj_class) self.assertEqual(a.perms, l.perms) def test_from_list(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) l = access.AccessVector() l.from_list(['foo', 'bar', 'file', 'read', 'write']) self.assertEqual(a.src_type, l.src_type) self.assertEqual(a.tgt_type, l.tgt_type) self.assertEqual(a.obj_class, l.obj_class) self.assertEqual(a.perms, l.perms) def test_to_list(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) l = a.to_list() self.assertEqual(l[0], "foo") self.assertEqual(l[1], "bar") self.assertEqual(l[2], "file") perms = l[3:] perms.sort() self.assertEqual(perms[0], "read") self.assertEqual(perms[1], "write") def test_to_string(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) first, second = str(a).split(':') self.assertEqual(first, "allow foo bar") second = second.split(' ') second.sort() expected = "file { read write };".split(' ') expected.sort() self.assertEqual(second, expected) first, second = a.to_string().split(':') self.assertEqual(first, "allow foo bar") second = second.split(' ') second.sort() expected = "file { read write };".split(' ') expected.sort() self.assertEqual(second, expected) def test_cmp(self): a = access.AccessVector() a.src_type = "foo" a.tgt_type = "bar" a.obj_class = "file" a.perms.update(["read", "write"]) b = access.AccessVector() b.src_type = "foo" b.tgt_type = "bar" b.obj_class = "file" b.perms.update(["read", "write"]) self.assertEqual(a, b) # Source Type b.src_type = "baz" self.assertNotEqual(a, b) self.assertTrue(a > b) b.src_type = "gaz" self.assertNotEqual(a, b) self.assertTrue(a < b) # Target Type b.src_type = "foo" b.tgt_type = "aar" self.assertNotEqual(a, b) self.assertTrue(a > b) b.tgt_type = "gaz" self.assertNotEqual(a, b) self.assertTrue(a < b) # Perms b.tgt_type = "bar" b.perms = refpolicy.IdSet(["read"]) self.assertNotEqual(a, b) self.assertTrue(a > b) b.perms = refpolicy.IdSet(["read", "write", "append"]) self.assertNotEqual(a, b) b.perms = refpolicy.IdSet(["read", "append"]) self.assertNotEqual(a, b) class TestUtilFunctions(unittest.TestCase): def test_is_idparam(self): self.assertTrue(access.is_idparam("$1")) self.assertTrue(access.is_idparam("$2")) self.assertTrue(access.is_idparam("$123")) self.assertFalse(access.is_idparam("$123.23")) self.assertFalse(access.is_idparam("$A")) def test_avrule_to_access_vectors(self): rule = refpolicy.AVRule() rule.src_types.add("foo") rule.src_types.add("baz") rule.tgt_types.add("bar") rule.tgt_types.add("what") rule.obj_classes.add("file") rule.obj_classes.add("dir") rule.perms.add("read") rule.perms.add("write") avs = access.avrule_to_access_vectors(rule) self.assertEqual(len(avs), 8) comps = [("foo", "what", "dir"), ("foo", "what", "file"), ("foo", "bar", "dir"), ("foo", "bar", "file"), ("baz", "what", "dir"), ("baz", "what", "file"), ("baz", "bar", "dir"), ("baz", "bar", "file")] status = [False] * 8 for av in access.avrule_to_access_vectors(rule): self.assertEqual(av.perms, refpolicy.IdSet(["read", "write"])) for i in range(len(comps)): if comps[i][0] == av.src_type and \ comps[i][1] == av.tgt_type and \ comps[i][2] == av.obj_class: status[i] = True for s in status: self.assertEqual(s, True) class TestAccessVectorSet(unittest.TestCase): def setUp(self): rule = refpolicy.AVRule() rule.src_types.add("foo") rule.src_types.add("baz") rule.tgt_types.add("bar") rule.tgt_types.add("what") rule.obj_classes.add("file") rule.obj_classes.add("dir") rule.perms.add("read") rule.perms.add("write") s = access.AccessVectorSet() avs = access.avrule_to_access_vectors(rule) for av in avs: s.add_av(av) self.s = s def test_init(self): a = access.AccessVectorSet() def test_iter(self): comps = [("foo", "what", "dir"), ("foo", "what", "file"), ("foo", "bar", "dir"), ("foo", "bar", "file"), ("baz", "what", "dir"), ("baz", "what", "file"), ("baz", "bar", "dir"), ("baz", "bar", "file")] status = [False] * 8 for av in self.s: self.assertEqual(av.perms, refpolicy.IdSet(["read", "write"])) for i in range(len(comps)): if comps[i][0] == av.src_type and \ comps[i][1] == av.tgt_type and \ comps[i][2] == av.obj_class: status[i] = True for s in status: self.assertEqual(s, True) def test_len(self): self.assertEqual(len(self.s), 8) def test_list(self): a = access.AccessVectorSet() a.add("$1", "foo", "file", refpolicy.IdSet(["read", "write"])) a.add("$1", "bar", "file", refpolicy.IdSet(["read", "write"])) a.add("what", "bar", "file", refpolicy.IdSet(["read", "write"])) avl = a.to_list() avl.sort() test_l = [['what','bar','file','read','write'], ['$1','foo','file','read','write'], ['$1','bar','file','read','write']] test_l.sort() for a,b in zip(test_l, avl): self.assertEqual(len(a), len(b)) for x,y in list(zip(a,b))[:3]: self.assertEqual(x, y) perms1 = a[3:] perms2 = b[3:] perms1.sort() perms2.sort() self.assertEqual(perms1, perms2) b = access.AccessVectorSet() b.from_list(avl) self.assertEqual(len(b), 3) selinux-python-2.8/sepolgen/tests/test_audit.py000066400000000000000000000256221330160122500220660ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.audit import sepolgen.refpolicy # syslog message audit1 = """Sep 12 08:26:43 dhcp83-5 kernel: audit(1158064002.046:4): avc: denied { read } for pid=2 496 comm="bluez-pin" name=".gdm1K3IFT" dev=dm-0 ino=3601333 scontext=user_u:system_r:bluetooth_helper_t:s0-s0:c0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file""" # audit daemon messages audit2 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability""" log1 = """type=AVC msg=audit(1158584779.745:708): avc: denied { dac_read_search } for pid=8132 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.753:709): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584779.825:710): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.793:711): avc: denied { dac_override } for pid=8144 comm="sh" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.793:711): avc: denied { dac_read_search } for pid=8144 comm="sh" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.793:711): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=SYSCALL msg=audit(1158584780.797:712): arch=40000003 syscall=195 success=no exit=-13 a0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc-script" exe="/bin/bash" subj=user_u:system_r:vpnc_t:s0 key=(null) type=AVC msg=audit(1158584780.801:713): avc: denied { dac_override } for pid=8146 comm="vpnc-script" capability=1 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC msg=audit(1158584780.801:713): avc: denied { dac_read_search } for pid=8146 comm="vpnc-script" capability=2 scontext=user_u:system_r:vpnc_t:s0 tcontext=user_u:system_r:vpnc_t:s0 tclass=capability type=AVC_PATH msg=audit(1162850461.778:1113): path="/etc/rc.d/init.d/innd" """ granted1 = """type=AVC msg=audit(1188833848.190:34): avc: granted { getattr } for pid=4310 comm="ls" name="foo.pp" dev=sda5 ino=295171 scontext=user_u:system_r:unconfined_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file""" path1 = """type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1" """ log2 = """type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1" type=SYSCALL msg=audit(1162852201.019:1225): arch=40000003 syscall=11 success=yes exit=0 a0=87271b0 a1=8727358 a2=8727290 a3=8727008 items=0 ppid=6973 pid=6974 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162852201.019:1225): avc: denied { execute_no_trans } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162852201.019:1225): avc: denied { execute } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file""" class TestAVCMessage(unittest.TestCase): def test_defs(self): avc = sepolgen.audit.AVCMessage(audit1) sc = sepolgen.refpolicy.SecurityContext() self.assertEqual(avc.scontext, sc) self.assertEqual(avc.tcontext, sc) self.assertEqual(avc.tclass, "") self.assertEqual(avc.accesses, []) def test_granted(self): avc = sepolgen.audit.AVCMessage(granted1) avc.from_split_string(granted1.split()) self.assertEqual(avc.scontext.user, "user_u") self.assertEqual(avc.scontext.role, "system_r") self.assertEqual(avc.scontext.type, "unconfined_t") self.assertEqual(avc.scontext.level, "s0") self.assertEqual(avc.tcontext.user, "user_u") self.assertEqual(avc.tcontext.role, "object_r") self.assertEqual(avc.tcontext.type, "user_home_t") self.assertEqual(avc.tcontext.level, "s0") self.assertEqual(avc.tclass, "file") self.assertEqual(avc.accesses, ["getattr"]) self.assertEqual(avc.denial, False) def test_from_split_string(self): # syslog message avc = sepolgen.audit.AVCMessage(audit1) recs = audit1.split() avc.from_split_string(recs) self.assertEqual(avc.header, "audit(1158064002.046:4):") self.assertEqual(avc.scontext.user, "user_u") self.assertEqual(avc.scontext.role, "system_r") self.assertEqual(avc.scontext.type, "bluetooth_helper_t") self.assertEqual(avc.scontext.level, "s0-s0:c0") self.assertEqual(avc.tcontext.user, "system_u") self.assertEqual(avc.tcontext.role, "object_r") self.assertEqual(avc.tcontext.type, "xdm_tmp_t") self.assertEqual(avc.tcontext.level, "s0") self.assertEqual(avc.tclass, "file") self.assertEqual(avc.accesses, ["read"]) self.assertEqual(avc.comm, "bluez-pin") self.assertEqual(avc.denial, True) # audit daemon message avc = sepolgen.audit.AVCMessage(audit2) recs = audit2.split() avc.from_split_string(recs) self.assertEqual(avc.header, "audit(1158584779.745:708):") self.assertEqual(avc.scontext.user, "user_u") self.assertEqual(avc.scontext.role, "system_r") self.assertEqual(avc.scontext.type, "vpnc_t") self.assertEqual(avc.scontext.level, "s0") self.assertEqual(avc.tcontext.user, "user_u") self.assertEqual(avc.tcontext.role, "system_r") self.assertEqual(avc.tcontext.type, "vpnc_t") self.assertEqual(avc.tcontext.level, "s0") self.assertEqual(avc.tclass, "capability") self.assertEqual(avc.accesses, ["dac_read_search"]) self.assertEqual(avc.comm, "sh") self.assertEqual(avc.denial, True) class TestPathMessage(unittest.TestCase): def test_from_split_string(self): path = sepolgen.audit.PathMessage(path1) recs = path1.split() path.from_split_string(recs) self.assertEqual(path.path, "/usr/lib/sa/sa1") # TODO - add tests for the other message types # TODO - these tests need a lot of expansion and more examples of # different types of log files class TestAuditParser(unittest.TestCase): def test_parse_string(self): a = sepolgen.audit.AuditParser() a.parse_string(log1) self.assertEqual(len(a.avc_msgs), 11) self.assertEqual(len(a.compute_sid_msgs), 0) self.assertEqual(len(a.invalid_msgs), 0) self.assertEqual(len(a.policy_load_msgs), 0) self.assertEqual(len(a.path_msgs), 1) def test_post_process(self): a = sepolgen.audit.AuditParser() a.parse_string(log2) self.assertEqual(len(a.avc_msgs), 2) self.assertEqual(a.avc_msgs[0].path, "/usr/lib/sa/sa1") self.assertEqual(a.avc_msgs[1].path, "/usr/lib/sa/sa1") def test_parse_file(self): f = open("audit.txt") a = sepolgen.audit.AuditParser() a.parse_file(f) f.close() self.assertEqual(len(a.avc_msgs), 21) self.assertEqual(len(a.compute_sid_msgs), 0) self.assertEqual(len(a.invalid_msgs), 0) self.assertEqual(len(a.policy_load_msgs), 0) class TestGeneration(unittest.TestCase): def test_generation(self): parser = sepolgen.audit.AuditParser() parser.parse_string(log1) avs = parser.to_access() self.assertEqual(len(avs), 1) def test_genaration_granted(self): parser = sepolgen.audit.AuditParser() parser.parse_string(granted1) avs = parser.to_access() self.assertEqual(len(avs), 0) avs = parser.to_access(only_denials=False) self.assertEqual(len(avs), 1) selinux-python-2.8/sepolgen/tests/test_data/000077500000000000000000000000001330160122500213105ustar00rootroot00000000000000selinux-python-2.8/sepolgen/tests/test_data/audit.log000066400000000000000000045007101330160122500231300ustar00rootroot00000000000000type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850335.022:982): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=USER_AUTH msg=audit(1162850343.419:983): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850343.419:984): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850343.419:985): arch=40000003 syscall=5 success=no exit=-2 a0=bf95cd98 a1=8000 a2=1b6 a3=8e1f9a8 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850343.427:986): avc: denied { write } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:986): arch=40000003 syscall=33 success=yes exit=0 a0=bfa1f935 a1=2 a2=bfa1e1e0 a3=0 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:987): avc: denied { read } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:987): arch=40000003 syscall=5 success=yes exit=2 a0=bfa1f935 a1=0 a2=1b6 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:988): avc: denied { getattr } for pid=6378 comm="xauth" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:988): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa1df2c a2=ce8ff4 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850343.427:988): path="/tmp/.gdmDOM7HT" type=AVC msg=audit(1162850343.427:989): avc: denied { write } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:989): avc: denied { add_name } for pid=6377 comm="su" name=".xauthqtQAcS" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:989): avc: denied { create } for pid=6377 comm="su" name=".xauthqtQAcS" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:989): arch=40000003 syscall=5 success=yes exit=4 a0=8e1facb a1=80c2 a2=180 a3=80c2 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850343.427:990): avc: denied { setattr } for pid=6377 comm="su" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:990): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=16d69f items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850343.427:991): avc: denied { search } for pid=6379 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850343.427:991): arch=40000003 syscall=195 success=no exit=-2 a0=bffc4257 a1=bffc3d70 a2=ad6ff4 a3=3 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:992): avc: denied { write } for pid=6379 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:992): avc: denied { add_name } for pid=6379 comm="xauth" name=".xauthqtQAcS-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:992): avc: denied { create } for pid=6379 comm="xauth" name=".xauthqtQAcS-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:992): arch=40000003 syscall=5 success=yes exit=2 a0=bffc4257 a1=c1 a2=180 a3=ffffffff items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:993): avc: denied { link } for pid=6379 comm="xauth" name=".xauthqtQAcS-c" dev=dm-0 ino=13127377 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:993): arch=40000003 syscall=9 success=yes exit=0 a0=bffc4257 a1=bffc3e56 a2=4db18a64 a3=2 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:994): avc: denied { write } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:994): arch=40000003 syscall=33 success=yes exit=0 a0=bffc5931 a1=2 a2=bffc4780 a3=0 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:995): avc: denied { read } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:995): arch=40000003 syscall=5 success=yes exit=2 a0=bffc5931 a1=0 a2=1b6 a3=8a85008 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850343.427:996): avc: denied { getattr } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:996): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bffc44cc a2=ad6ff4 a3=8a85008 items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850343.427:996): path="/root/.xauthqtQAcS" type=AVC msg=audit(1162850343.427:997): avc: denied { remove_name } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850343.427:997): avc: denied { unlink } for pid=6379 comm="xauth" name=".xauthqtQAcS" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.427:997): arch=40000003 syscall=10 success=yes exit=0 a0=8a85008 a1=1000 a2=0 a3=8a8508a items=0 ppid=6377 pid=6379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1162850343.431:998): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_ACQ msg=audit(1162850343.431:999): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850343.455:1000): avc: denied { dac_override } for pid=6380 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1162850343.455:1000): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bfdd2a90 a2=566ff4 a3=bfdd2af0 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850343.455:1001): avc: denied { read } for pid=6380 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.455:1001): arch=40000003 syscall=5 success=yes exit=3 a0=83cdb10 a1=8000 a2=0 a3=8000 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850343.495:1002): avc: denied { read } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850343.495:1002): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8000 a2=0 a3=8000 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850348.747:1003): avc: denied { write } for pid=6145 comm="gconfd-2" name="linc-12e8-0-2a09eb386cb5" dev=dm-0 ino=14469619 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850348.747:1003): arch=40000003 syscall=102 success=no exit=-111 a0=3 a1=bf8754a0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6145 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162850353.595:1004): user pid=6400 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850353.595:1005): user pid=6400 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ROLE_CHANGE msg=audit(1162850353.599:1006): user pid=6401 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='newrole: old-context=staff_u:staff_r:staff_t new-context=staff_u:sysadm_r:sysadm_t: exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=/dev/pts/1 res=success)' type=AVC msg=audit(1162850355.108:1007): avc: denied { create } for pid=6431 comm="gnome-screensav" name="linc-191f-0-64d0738e1c346" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850355.108:1007): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfafe8a0 a2=4e570f80 a3=b7fa968c items=0 ppid=1 pid=6431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/bin/gnome-screensaver" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850368.976:1008): avc: denied { execute } for pid=6401 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850368.976:1008): arch=40000003 syscall=33 success=yes exit=0 a0=9abfcc0 a1=1 a2=11 a3=9abfcc0 items=0 ppid=6400 pid=6401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162850370.221:1009): avc: denied { execute_no_trans } for pid=6434 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850370.221:1009): arch=40000003 syscall=11 success=yes exit=0 a0=9ab8fc8 a1=9abaed8 a2=9abc6f8 a3=9acc6d8 items=0 ppid=6401 pid=6434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162850370.221:1009): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=AVC msg=audit(1162850382.557:1010): avc: denied { connectto } for pid=6436 comm="xterm" name="6179" scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162850382.557:1010): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfed9e20 a2=4dc5d770 a3=15 items=0 ppid=6401 pid=6436 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xterm" exe="/usr/bin/xterm" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162850382.557:1010): path="/tmp/.ICE-unix/6179" type=AVC msg=audit(1162850382.717:1011): avc: denied { read } for pid=6449 comm="consoletype" name="Compose" dev=dm-0 ino=10378015 scontext=staff_u:sysadm_r:consoletype_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162850382.717:1011): arch=40000003 syscall=11 success=yes exit=0 a0=9d12630 a1=9d12048 a2=9d0cd08 a3=9d120e0 items=0 ppid=6448 pid=6449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:sysadm_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162850382.717:1011): path="/usr/share/X11/locale/en_US.UTF-8/Compose" type=AVC msg=audit(1162850395.230:1012): avc: denied { execheap } for pid=6462 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162850395.230:1012): avc: denied { execmem } for pid=6462 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162850395.230:1012): arch=40000003 syscall=125 success=yes exit=0 a0=8bf8000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850395.986:1013): avc: denied { ptrace } for pid=3896 comm="dbus-daemon" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=MAC_POLICY_LOAD msg=audit(1162850395.870:1014): policy loaded auid=500 type=SYSCALL msg=audit(1162850395.986:1013): arch=40000003 syscall=85 success=yes exit=16 a0=4d8cbfce a1=b7f49b58 a2=fff a3=b7f4ceba items=0 ppid=1 pid=3896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1162850395.870:1014): arch=40000003 syscall=4 success=yes exit=2097911 a0=4 a1=b7b16000 a2=2002f7 a3=bfc9e918 items=0 ppid=6401 pid=6470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:sysadm_r:load_policy_t:s0 key=(null) type=AVC msg=audit(1162850395.986:1015): avc: denied { getattr } for pid=3895 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1162850395.986:1015): arch=40000003 syscall=100 success=yes exit=0 a0=a a1=bf95fbdc a2=cf6ff4 a3=ffffffb8 items=0 ppid=1 pid=3895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850395.990:1016): avc: denied { search } for pid=3895 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850395.990:1016): avc: denied { search } for pid=3895 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162850395.990:1016): arch=40000003 syscall=5 success=no exit=-2 a0=8170658 a1=18800 a2=0 a3=bf95fd18 items=0 ppid=1 pid=3895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850398.546:1017): avc: denied { execute } for pid=6472 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.546:1017): arch=40000003 syscall=33 success=yes exit=0 a0=8db9868 a1=1 a2=11 a3=8db9868 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850398.546:1018): avc: denied { read } for pid=6472 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.546:1018): arch=40000003 syscall=33 success=yes exit=0 a0=8db9868 a1=4 a2=ffffffff a3=8db9868 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850398.546:1019): avc: denied { execute_no_trans } for pid=6472 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.546:1019): arch=40000003 syscall=11 success=yes exit=0 a0=8db9b80 a1=8db9808 a2=8dba5f0 a3=8db9808 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850398.546:1019): path="/usr/bin/mono" type=AVC msg=audit(1162850398.546:1020): avc: denied { execheap } for pid=6472 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162850398.546:1020): avc: denied { execmem } for pid=6472 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162850398.546:1020): arch=40000003 syscall=125 success=yes exit=0 a0=9aec000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850398.674:1021): avc: denied { read } for pid=6472 comm="beagled-helper" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850398.674:1021): arch=40000003 syscall=33 success=yes exit=0 a0=bfeb1fde a1=4 a2=4db18a64 a3=bfeb1fde items=0 ppid=1 pid=6472 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-helper" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.226:1022): avc: denied { write } for pid=6253 comm="gnome-power-man" name="orbit-kmacmill" dev=dm-0 ino=14469563 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850399.226:1022): avc: denied { remove_name } for pid=6253 comm="gnome-power-man" name="linc-1868-0-3840e8f2aa88e" dev=dm-0 ino=5434685 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850399.226:1022): avc: denied { unlink } for pid=6253 comm="gnome-power-man" name="linc-1868-0-3840e8f2aa88e" dev=dm-0 ino=5434685 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850399.226:1022): arch=40000003 syscall=10 success=yes exit=0 a0=9997538 a1=996db90 a2=4df37708 a3=b items=0 ppid=1 pid=6253 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-power-man" exe="/usr/bin/gnome-power-manager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.246:1023): avc: denied { write } for pid=6273 comm="gnome-panel" name="linc-18c0-0-55b6afc2586c" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850399.246:1023): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfff15f0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6273 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.322:1024): avc: denied { write } for pid=6380 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162850399.322:1024): arch=40000003 syscall=4 success=no exit=-5 a0=2 a1=b7f2b000 a2=2e a3=2e items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850399.322:1024): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162850399.322:1025): avc: denied { read } for pid=6380 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162850399.322:1025): arch=40000003 syscall=3 success=yes exit=0 a0=0 a1=bfdd204b a2=1 a3=567420 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850399.322:1025): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162850399.322:1026): avc: denied { append } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.322:1026): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8401 a2=0 a3=8401 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.326:1027): avc: denied { read } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.326:1027): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8000 a2=0 a3=8000 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.326:1028): avc: denied { write } for pid=6380 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.326:1028): arch=40000003 syscall=5 success=yes exit=3 a0=83cdcf0 a1=8201 a2=0 a3=8201 items=0 ppid=6377 pid=6380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1162850399.338:1029): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850399.338:1030): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850399.338:1030): avc: denied { write } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850399.338:1030): avc: denied { remove_name } for pid=6377 comm="su" name=".xauthqtQAcS" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850399.338:1030): avc: denied { unlink } for pid=6377 comm="su" name=".xauthqtQAcS" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850399.338:1030): arch=40000003 syscall=10 success=yes exit=0 a0=8e1f9a8 a1=8e1fa86 a2=16ebc8 a3=8e1c008 items=0 ppid=1 pid=6377 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1162850399.338:1031): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850399.422:1032): avc: denied { setattr } for pid=6485 comm="metacity" name="orbit-kmacmill" dev=dm-0 ino=14469563 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162850399.422:1032): arch=40000003 syscall=30 success=yes exit=0 a0=8ca7af0 a1=bf8d0a64 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=6485 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850399.426:1033): avc: denied { add_name } for pid=6485 comm="metacity" name="linc-1955-0-51d5b0be68eb4" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850399.426:1033): avc: denied { create } for pid=6485 comm="metacity" name="linc-1955-0-51d5b0be68eb4" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850399.426:1033): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf8d11f0 a2=4e570f80 a3=b7f03a1c items=0 ppid=1 pid=6485 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1162850399.534:1034): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1162850399.534:1035): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1162850401.602:1036): user pid=6513 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162850401.606:1037): login pid=6513 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162850401.606:1038): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162850401.606:1039): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162850401.610:1040): avc: denied { execute } for pid=6514 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162850401.610:1040): avc: denied { execute_no_trans } for pid=6514 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.610:1040): arch=40000003 syscall=11 success=yes exit=0 a0=9d241b0 a1=9d24358 a2=9d24290 a3=9d24008 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.610:1040): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162850401.614:1041): avc: denied { execute } for pid=6514 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162850401.614:1041): avc: denied { execute_no_trans } for pid=6514 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162850401.614:1041): avc: denied { read } for pid=6514 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.614:1041): arch=40000003 syscall=11 success=yes exit=0 a0=8841d48 a1=8841740 a2=8841d60 a3=8841740 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.614:1041): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162850401.614:1041): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162850401.618:1042): avc: denied { search } for pid=6514 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162850401.618:1042): avc: denied { read } for pid=6514 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.618:1042): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9d7f800 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.618:1043): avc: denied { getattr } for pid=6514 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.618:1043): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc5ed88 a2=b45ff4 a3=9d7f800 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.618:1043): path="/proc/net/dev" type=AVC msg=audit(1162850401.618:1044): avc: denied { search } for pid=6514 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162850401.618:1044): arch=40000003 syscall=33 success=yes exit=0 a0=bfc5f134 a1=0 a2=bfc5f028 a3=bfc5f030 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.618:1045): avc: denied { read append } for pid=6514 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.618:1045): arch=40000003 syscall=5 success=yes exit=3 a0=bfc5f134 a1=402 a2=bfc5f2f8 a3=bfc5f030 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.622:1046): avc: denied { search } for pid=6514 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162850401.622:1046): avc: denied { read } for pid=6514 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.622:1046): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9d7fdf0 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.622:1047): avc: denied { getattr } for pid=6514 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.622:1047): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc5ebe4 a2=b45ff4 a3=9d7fdf0 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.622:1047): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162850401.622:1048): avc: denied { search } for pid=6514 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162850401.622:1048): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9d7fdf0 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850401.622:1049): avc: denied { lock } for pid=6514 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162850401.622:1049): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc5f030 a3=3 items=0 ppid=6513 pid=6514 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850401.622:1049): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162850401.630:1050): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162850401.630:1051): user pid=6513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162850416.415:1052): user pid=3839 uid=0 auid=0 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/bin/login" (hostname=?, addr=?, terminal=tty1 res=success)' type=USER_END msg=audit(1162850416.415:1053): user pid=3839 uid=0 auid=0 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/bin/login" (hostname=?, addr=?, terminal=tty1 res=success)' type=USER_AUTH msg=audit(1162850424.220:1054): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1162850424.220:1055): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1162850424.224:1056): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1162850424.248:1057): login pid=4697 uid=0 old auid=500 new auid=500 type=USER_START msg=audit(1162850424.260:1058): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1162850424.260:1059): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1162850424.292:1060): avc: denied { read } for pid=6531 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.292:1060): arch=40000003 syscall=5 success=yes exit=12 a0=80865d5 a1=0 a2=1 a3=d items=0 ppid=4697 pid=6531 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850424.292:1061): avc: denied { getattr } for pid=6531 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.292:1061): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bffa43e0 a2=958ff4 a3=3 items=0 ppid=4697 pid=6531 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850424.292:1061): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162850424.308:1062): avc: denied { read } for pid=6544 comm="xrdb" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.308:1062): arch=40000003 syscall=33 success=yes exit=0 a0=bf81cfce a1=4 a2=4db18a64 a3=bf81cfce items=0 ppid=6531 pid=6544 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850424.412:1063): avc: denied { getattr } for pid=6585 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1162850424.412:1063): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bfcb232c a2=248ff4 a3=ffffffb8 items=0 ppid=6584 pid=6585 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850424.412:1064): avc: denied { search } for pid=6585 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850424.412:1064): arch=40000003 syscall=5 success=no exit=-2 a0=8e56b98 a1=18800 a2=11525c a3=bfcb2468 items=0 ppid=6584 pid=6585 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850424.796:1065): avc: denied { write } for pid=6531 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850424.796:1065): avc: denied { add_name } for pid=6531 comm="gnome-session" name="6531" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162850424.796:1065): avc: denied { create } for pid=6531 comm="gnome-session" name="6531" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850424.796:1065): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfa77710 a2=4dc5d770 a3=0 items=0 ppid=4697 pid=6531 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850424.808:1066): avc: denied { read write } for pid=6595 comm="gnome-settings-" name="[98613]" dev=sockfs ino=98613 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162850424.808:1066): arch=40000003 syscall=11 success=yes exit=0 a0=8e5d9b0 a1=8e5ccd8 a2=8e5db70 a3=b items=0 ppid=6594 pid=6595 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850424.808:1066): path="socket:[98613]" type=AVC msg=audit(1162850424.940:1067): avc: denied { read } for pid=6595 comm="gnome-settings-" name="resolv.conf" dev=dm-0 ino=9330746 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.940:1067): arch=40000003 syscall=5 success=yes exit=21 a0=5b1d13 a1=0 a2=1b6 a3=8230208 items=0 ppid=6594 pid=6595 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850424.948:1068): avc: denied { read } for pid=6603 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162850424.948:1068): arch=40000003 syscall=5 success=yes exit=14 a0=8206258 a1=0 a2=1b6 a3=8206278 items=0 ppid=1 pid=6603 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850425.140:1069): avc: denied { write } for pid=6620 comm="metacity" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162850425.140:1069): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9dcf80 a2=4dc5d770 a3=15 items=0 ppid=1 pid=6620 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850425.384:1070): avc: denied { execheap } for pid=6639 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162850425.384:1070): avc: denied { execmem } for pid=6639 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162850425.384:1070): arch=40000003 syscall=125 success=yes exit=0 a0=9a4f000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6639 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850425.596:1071): avc: denied { sigchld } for pid=6655 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1162850425.596:1071): arch=40000003 syscall=7 success=yes exit=0 a0=1a00 a1=bfcb1eb8 a2=1 a3=1a00 items=0 ppid=6587 pid=6655 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162850426.060:1072): avc: denied { ioctl } for pid=6686 comm="pam_timestamp_c" name="[98476]" dev=pipefs ino=98476 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162850426.060:1072): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfaea71c a3=bfaea75c items=0 ppid=6664 pid=6686 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162850426.060:1072): path="pipe:[98476]" type=AVC msg=audit(1162850426.816:1073): avc: denied { read } for pid=6666 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850426.816:1073): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=9178500 items=0 ppid=1 pid=6666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162850432.292:1074): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850432.292:1075): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850432.292:1076): avc: denied { search } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850432.292:1076): arch=40000003 syscall=5 success=no exit=-2 a0=bfd04948 a1=8000 a2=1b6 a3=93769a8 items=0 ppid=6699 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1077): avc: denied { write } for pid=6721 comm="xauth" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1077): arch=40000003 syscall=33 success=yes exit=0 a0=bfccb935 a1=2 a2=bfccb490 a3=0 items=0 ppid=6720 pid=6721 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1078): avc: denied { read } for pid=6721 comm="xauth" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1078): arch=40000003 syscall=5 success=yes exit=2 a0=bfccb935 a1=0 a2=1b6 a3=9ab6008 items=0 ppid=6720 pid=6721 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1079): avc: denied { getattr } for pid=6721 comm="xauth" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1079): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfccb1dc a2=ccdff4 a3=9ab6008 items=0 ppid=6720 pid=6721 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850432.296:1079): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162850432.296:1080): avc: denied { write } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.296:1080): avc: denied { add_name } for pid=6720 comm="su" name=".xauthyeka65" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.296:1080): avc: denied { create } for pid=6720 comm="su" name=".xauthyeka65" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1080): arch=40000003 syscall=5 success=yes exit=4 a0=9376acb a1=80c2 a2=180 a3=80c2 items=0 ppid=6699 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850432.296:1081): avc: denied { setattr } for pid=6720 comm="su" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.296:1081): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=13f69f items=0 ppid=6699 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1082): avc: denied { search } for pid=6722 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162850432.300:1082): arch=40000003 syscall=195 success=no exit=-2 a0=bf8b6b47 a1=bf8b6660 a2=ac4ff4 a3=3 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1083): avc: denied { write } for pid=6722 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.300:1083): avc: denied { add_name } for pid=6722 comm="xauth" name=".xauthyeka65-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.300:1083): avc: denied { create } for pid=6722 comm="xauth" name=".xauthyeka65-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1083): arch=40000003 syscall=5 success=yes exit=2 a0=bf8b6b47 a1=c1 a2=180 a3=ffffffff items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1084): avc: denied { link } for pid=6722 comm="xauth" name=".xauthyeka65-c" dev=dm-0 ino=13127377 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1084): arch=40000003 syscall=9 success=yes exit=0 a0=bf8b6b47 a1=bf8b6746 a2=4db18a64 a3=2 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1085): avc: denied { write } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1085): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b7931 a1=2 a2=bf8b7070 a3=0 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1086): avc: denied { read } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1086): arch=40000003 syscall=5 success=yes exit=2 a0=bf8b7931 a1=0 a2=1b6 a3=8a8e008 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162850432.300:1087): avc: denied { getattr } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1087): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf8b6dbc a2=ac4ff4 a3=8a8e008 items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162850432.300:1087): path="/root/.xauthyeka65" type=AVC msg=audit(1162850432.300:1088): avc: denied { remove_name } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162850432.300:1088): avc: denied { unlink } for pid=6722 comm="xauth" name=".xauthyeka65" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.300:1088): arch=40000003 syscall=10 success=yes exit=0 a0=8a8e008 a1=1000 a2=0 a3=8a8e08a items=0 ppid=6720 pid=6722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1162850432.300:1089): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_ACQ msg=audit(1162850432.300:1090): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850432.304:1091): avc: denied { dac_override } for pid=6723 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1162850432.304:1091): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bf866d20 a2=248ff4 a3=bf866d80 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850432.304:1092): avc: denied { read } for pid=6723 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.304:1092): arch=40000003 syscall=5 success=yes exit=3 a0=8250b10 a1=8000 a2=0 a3=8000 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850432.348:1093): avc: denied { read } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850432.348:1093): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8000 a2=0 a3=8000 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162850439.333:1094): user pid=6743 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850439.333:1095): user pid=6743 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ROLE_CHANGE msg=audit(1162850439.333:1096): user pid=6744 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='newrole: old-context=staff_u:staff_r:staff_t new-context=staff_u:sysadm_r:sysadm_t: exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=/dev/pts/1 res=success)' type=AVC msg=audit(1162850449.753:1097): avc: denied { execute } for pid=6744 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850449.753:1097): arch=40000003 syscall=33 success=yes exit=0 a0=85adb38 a1=1 a2=11 a3=85adb38 items=0 ppid=6743 pid=6744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162850449.985:1098): avc: denied { read } for pid=6774 comm="gnome-screensav" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850449.985:1098): arch=40000003 syscall=33 success=yes exit=0 a0=bfb0ae9e a1=4 a2=4db18a64 a3=bfb0ae9e items=0 ppid=1 pid=6774 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/bin/gnome-screensaver" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850451.210:1099): avc: denied { execute_no_trans } for pid=6776 comm="bash" name="audit2policy" dev=dm-0 ino=6618077 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162850451.210:1099): arch=40000003 syscall=11 success=yes exit=0 a0=85ad0a0 a1=85add38 a2=85ab188 a3=85bba58 items=0 ppid=6744 pid=6776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162850451.210:1099): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162850461.642:1100): user pid=6778 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162850461.642:1101): login pid=6778 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162850461.646:1102): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162850461.646:1103): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162850461.646:1104): avc: denied { getattr } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.646:1104): arch=40000003 syscall=195 success=yes exit=0 a0=9ebe120 a1=bfdaae60 a2=248ff4 a3=9ebe120 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.646:1104): path="/usr/bin/run-parts" type=AVC msg=audit(1162850461.678:1105): avc: denied { execute } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.678:1105): arch=40000003 syscall=33 success=yes exit=0 a0=9ebe120 a1=1 a2=11 a3=9ebe120 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.678:1106): avc: denied { read } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.678:1106): arch=40000003 syscall=33 success=yes exit=0 a0=9ebe120 a1=4 a2=ffffffff a3=9ebe120 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.678:1107): avc: denied { execute_no_trans } for pid=6779 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.678:1107): arch=40000003 syscall=11 success=yes exit=0 a0=9ebe120 a1=9ebe3d8 a2=9ebe2f8 a3=9ebdf98 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.678:1107): path="/usr/bin/run-parts" type=AVC msg=audit(1162850461.682:1108): avc: denied { ioctl } for pid=6779 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.682:1108): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd9c878 a3=bfd9c8b8 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.682:1108): path="/usr/bin/run-parts" type=AVC msg=audit(1162850461.698:1109): avc: denied { execute } for pid=6779 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.698:1109): arch=40000003 syscall=33 success=yes exit=0 a0=9a07990 a1=1 a2=1 a3=9a07c98 items=0 ppid=6778 pid=6779 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.698:1110): avc: denied { execute_no_trans } for pid=6780 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.698:1110): arch=40000003 syscall=11 success=yes exit=0 a0=9a07a10 a1=9a07ad8 a2=9a07ae8 a3=9a07758 items=0 ppid=6779 pid=6780 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.698:1110): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162850461.714:1111): avc: denied { execute } for pid=6782 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162850461.714:1111): avc: denied { execute_no_trans } for pid=6782 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162850461.714:1111): avc: denied { read } for pid=6782 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.714:1111): arch=40000003 syscall=11 success=yes exit=0 a0=8b4d678 a1=8b4d808 a2=8b4d720 a3=8b4d508 items=0 ppid=6780 pid=6782 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.714:1111): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162850461.714:1111): path="/sbin/chkconfig" type=AVC msg=audit(1162850461.778:1112): avc: denied { read } for pid=6782 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.778:1112): arch=40000003 syscall=5 success=yes exit=3 a0=bfe8d950 a1=0 a2=ffffffff a3=9f27038 items=0 ppid=6780 pid=6782 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162850461.778:1113): avc: denied { getattr } for pid=6782 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850461.778:1113): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe8d8c0 a2=f70ff4 a3=3 items=0 ppid=6780 pid=6782 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162850461.778:1113): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162850461.790:1114): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162850461.790:1115): user pid=6778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162850490.680:1116): avc: denied { execute } for pid=6807 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850490.680:1116): arch=40000003 syscall=33 success=yes exit=0 a0=882a868 a1=1 a2=11 a3=882a868 items=0 ppid=1 pid=6807 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850490.680:1117): avc: denied { read } for pid=6807 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850490.680:1117): arch=40000003 syscall=33 success=yes exit=0 a0=882a868 a1=4 a2=ffffffff a3=882a868 items=0 ppid=1 pid=6807 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled-index-h" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850490.680:1118): avc: denied { execute_no_trans } for pid=6807 comm="beagled-index-h" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162850490.680:1118): arch=40000003 syscall=11 success=yes exit=0 a0=882ab80 a1=882a808 a2=882b5f0 a3=882a808 items=0 ppid=1 pid=6807 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850490.680:1118): path="/usr/bin/mono" type=USER_ACCT msg=audit(1162851001.852:1119): user pid=6858 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162851001.852:1120): login pid=6858 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162851001.852:1121): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162851001.852:1122): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162851001.856:1123): avc: denied { execute } for pid=6859 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162851001.856:1123): avc: denied { execute_no_trans } for pid=6859 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.856:1123): arch=40000003 syscall=11 success=yes exit=0 a0=87b01b0 a1=87b0358 a2=87b0290 a3=87b0008 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.856:1123): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162851001.856:1124): avc: denied { execute } for pid=6859 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162851001.856:1124): avc: denied { execute_no_trans } for pid=6859 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162851001.856:1124): avc: denied { read } for pid=6859 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.856:1124): arch=40000003 syscall=11 success=yes exit=0 a0=894cd48 a1=894c740 a2=894cd60 a3=894c740 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.856:1124): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162851001.856:1124): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162851001.860:1125): avc: denied { search } for pid=6859 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162851001.860:1125): avc: denied { read } for pid=6859 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1125): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=88a7800 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1126): avc: denied { getattr } for pid=6859 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1126): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfce6e18 a2=dc5ff4 a3=88a7800 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.860:1126): path="/proc/net/dev" type=AVC msg=audit(1162851001.860:1127): avc: denied { search } for pid=6859 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162851001.860:1127): arch=40000003 syscall=33 success=yes exit=0 a0=bfce71c4 a1=0 a2=bfce70b8 a3=bfce70c0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1128): avc: denied { read append } for pid=6859 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1128): arch=40000003 syscall=5 success=yes exit=3 a0=bfce71c4 a1=402 a2=bfce7388 a3=bfce70c0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1129): avc: denied { search } for pid=6859 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162851001.860:1129): avc: denied { read } for pid=6859 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1129): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=88a7df0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1130): avc: denied { getattr } for pid=6859 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1130): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfce6c74 a2=dc5ff4 a3=88a7df0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.860:1130): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162851001.860:1131): avc: denied { search } for pid=6859 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162851001.860:1131): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=88a7df0 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851001.860:1132): avc: denied { lock } for pid=6859 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851001.860:1132): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfce70c0 a3=3 items=0 ppid=6858 pid=6859 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851001.860:1132): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162851001.872:1133): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162851001.872:1134): user pid=6858 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162851238.587:1135): avc: denied { search } for pid=6868 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.587:1135): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfcceb18 a2=aa0ff4 a3=3 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.591:1136): avc: denied { read } for pid=6868 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.591:1136): arch=40000003 syscall=33 success=yes exit=0 a0=bfcd0dff a1=4 a2=4db18a64 a3=bfcd0dff items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.591:1137): avc: denied { getattr } for pid=6868 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.591:1137): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfccea4c a2=aa0ff4 a3=8c90730 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.591:1137): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162851238.603:1138): avc: denied { search } for pid=6868 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.603:1138): avc: denied { write } for pid=6868 comm="evolution" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851238.603:1138): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcceb50 a2=4dc5d770 a3=15 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.603:1139): avc: denied { read } for pid=6868 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.603:1139): arch=40000003 syscall=33 success=yes exit=0 a0=8ca6218 a1=4 a2=4dc5d770 a3=8ca6218 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851238.603:1140): avc: denied { getattr } for pid=6868 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.603:1140): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfccebec a2=aa0ff4 a3=8ca6af8 items=0 ppid=1 pid=6868 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.603:1140): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162851238.827:1141): avc: denied { write } for pid=6871 comm="evolution-data-" name="[100190]" dev=pipefs ino=100190 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851238.827:1141): arch=40000003 syscall=11 success=yes exit=0 a0=8112db0 a1=8112d58 a2=8106478 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.827:1141): path="pipe:[100190]" type=AVC msg=audit(1162851238.839:1142): avc: denied { read } for pid=6871 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1142): arch=40000003 syscall=5 success=yes exit=3 a0=2589dc a1=0 a2=0 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.839:1143): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1143): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd5cbcc a2=26fff4 a3=3 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.839:1143): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1162851238.839:1144): avc: denied { getsched } for pid=6871 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162851238.839:1144): arch=40000003 syscall=155 success=yes exit=0 a0=1ad7 a1=b7f328dc a2=4fbff4 a3=b7f326d0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.839:1145): avc: denied { search } for pid=6871 comm="evolution-data-" name="locale" dev=dm-0 ino=10311905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1162851238.839:1145): avc: denied { read } for pid=6871 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1145): arch=40000003 syscall=5 success=yes exit=3 a0=4df2984c a1=8000 a2=1b6 a3=86fa480 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.839:1146): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.839:1146): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd5d0f8 a2=26fff4 a3=86fa480 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.839:1146): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1162851238.843:1147): avc: denied { read } for pid=6871 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.843:1147): arch=40000003 syscall=5 success=yes exit=3 a0=258a00 a1=8000 a2=1 a3=bfd5d0c0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1148): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.843:1148): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=270aa0 a2=26fff4 a3=bfd5d0c0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1148): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1162851238.843:1149): avc: denied { read } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1149): arch=40000003 syscall=5 success=yes exit=9 a0=86fc5a8 a1=18800 a2=60dfc0 a3=86fc5a8 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1150): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1150): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfd5d1dc a2=26fff4 a3=9 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1150): path="/tmp" type=AVC msg=audit(1162851238.843:1151): avc: denied { search } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.843:1151): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1151): arch=40000003 syscall=195 success=yes exit=0 a0=86fca68 a1=bfd5d220 a2=26fff4 a3=3 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1151): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162851238.843:1152): avc: denied { setattr } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851238.843:1152): arch=40000003 syscall=30 success=yes exit=0 a0=86fca90 a1=bfd5d274 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1153): avc: denied { read } for pid=6871 comm="evolution-data-" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851238.843:1153): arch=40000003 syscall=5 success=yes exit=9 a0=4def9880 a1=8000 a2=1b6 a3=86fd800 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.843:1154): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851238.843:1154): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfd5d1fc a2=26fff4 a3=86fd800 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1154): path="/dev/urandom" type=AVC msg=audit(1162851238.843:1155): avc: denied { ioctl } for pid=6871 comm="evolution-data-" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851238.843:1155): arch=40000003 syscall=54 success=no exit=-22 a0=9 a1=5401 a2=bfd5d15c a3=bfd5d19c items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.843:1155): path="/dev/urandom" type=AVC msg=audit(1162851238.847:1156): avc: denied { search } for pid=6871 comm="evolution-data-" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.847:1156): avc: denied { read } for pid=6871 comm="evolution-data-" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.847:1156): arch=40000003 syscall=5 success=yes exit=9 a0=86fee38 a1=0 a2=1b6 a3=86fee60 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.847:1157): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.847:1157): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfd5c888 a2=26fff4 a3=86fee60 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.847:1157): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162851238.847:1158): avc: denied { write } for pid=6871 comm="evolution-data-" name="linc-19be-0-41f49a5b6e22f" dev=dm-0 ino=15648248 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162851238.847:1158): avc: denied { connectto } for pid=6871 comm="evolution-data-" name="linc-19be-0-41f49a5b6e22f" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851238.847:1158): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd5cfa0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.847:1158): path="/tmp/orbit-kmacmill/linc-19be-0-41f49a5b6e22f" type=AVC msg=audit(1162851238.847:1159): avc: denied { write } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.847:1159): avc: denied { add_name } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851238.847:1159): avc: denied { create } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851238.847:1159): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfd5cfe0 a2=4e570f80 a3=b7f3269c items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.847:1160): avc: denied { connectto } for pid=6590 comm="gconfd-2" name="linc-1ad7-0-5a56670ecf53d" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851238.847:1160): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe86020 a2=4e570f80 a3=0 items=0 ppid=1 pid=6590 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.847:1160): path="/tmp/orbit-kmacmill/linc-1ad7-0-5a56670ecf53d" type=AVC msg=audit(1162851238.867:1161): avc: denied { write } for pid=6871 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.867:1161): arch=40000003 syscall=5 success=yes exit=16 a0=87058b8 a1=42 a2=1c0 a3=87058b8 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851238.867:1162): avc: denied { lock } for pid=6871 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851238.867:1162): arch=40000003 syscall=221 success=yes exit=0 a0=10 a1=7 a2=bfd5d23c a3=bfd5d23c items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.867:1162): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162851238.871:1163): avc: denied { getattr } for pid=6871 comm="evolution-data-" name="[100190]" dev=pipefs ino=100190 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851238.871:1163): arch=40000003 syscall=197 success=yes exit=0 a0=1e a1=bfd5d274 a2=26fff4 a3=8712c88 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162851238.871:1163): path="pipe:[100190]" type=USER_AVC msg=audit(1162851239.127:1164): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=6868 tpid=2797 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162851239.131:1165): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.50 spid=2797 tpid=6868 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162851239.179:1166): avc: denied { create } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1166): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b0cfd274 a2=aa0ff4 a3=727d7f items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1167): avc: denied { bind } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1167): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b0cfd274 a2=aa0ff4 a3=23 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1168): avc: denied { getattr } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1168): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b0cfd274 a2=aa0ff4 a3=23 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1169): avc: denied { write } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162851239.179:1169): avc: denied { nlmsg_read } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1169): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b0cfc1b4 a2=aa0ff4 a3=0 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.179:1170): avc: denied { read } for pid=6882 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162851239.179:1170): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b0cfc1b4 a2=aa0ff4 a3=0 items=0 ppid=1 pid=6882 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162851239.747:1171): avc: denied { read } for pid=6885 comm="xchat" name="resolv.conf" dev=dm-0 ino=9330746 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162851239.747:1171): arch=40000003 syscall=5 success=yes exit=9 a0=230d13 a1=0 a2=1b6 a3=8948c28 items=0 ppid=6884 pid=6885 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162851240.015:1172): avc: denied { write } for pid=6892 comm="evolution-alarm" name="[100287]" dev=pipefs ino=100287 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851240.015:1172): arch=40000003 syscall=11 success=yes exit=0 a0=80fc700 a1=8105200 a2=81179b0 a3=0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1172): path="pipe:[100287]" type=AVC msg=audit(1162851240.015:1173): avc: denied { read } for pid=6892 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1173): arch=40000003 syscall=5 success=yes exit=3 a0=bff64ed0 a1=0 a2=0 a3=bff64ed0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.015:1174): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1174): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff64f24 a2=322fc0 a3=4 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1174): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162851240.015:1175): avc: denied { execute } for pid=6892 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1175): arch=40000003 syscall=192 success=yes exit=1297682432 a0=4d591000 a1=33cd0 a2=5 a3=802 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1175): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162851240.015:1176): avc: denied { read } for pid=6892 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1176): arch=40000003 syscall=5 success=yes exit=3 a0=320037 a1=0 a2=323650 a3=ffffffff items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.015:1177): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.015:1177): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff64e18 a2=322fc0 a3=ffffffff items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.015:1177): path="/etc/ld.so.cache" type=AVC msg=audit(1162851240.051:1178): avc: denied { read } for pid=6892 comm="evolution-alarm" name="ld-2.5.90.so" dev=dm-0 ino=13716563 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.051:1178): arch=40000003 syscall=125 success=yes exit=0 a0=322000 a1=1000 a2=1 a3=380 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.051:1178): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1162851240.055:1179): avc: denied { getsched } for pid=6892 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1162851240.055:1179): arch=40000003 syscall=155 success=yes exit=0 a0=1aec a1=b7f3eaec a2=baaff4 a3=b7f3e8e0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.099:1180): avc: denied { read } for pid=6892 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.099:1180): arch=40000003 syscall=5 success=yes exit=3 a0=797e3d a1=0 a2=1b6 a3=9302a00 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.099:1181): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.099:1181): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff65008 a2=7afff4 a3=9302a00 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.099:1181): path="/etc/nsswitch.conf" type=AVC msg=audit(1162851240.103:1182): avc: denied { read } for pid=6892 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.103:1182): arch=40000003 syscall=5 success=yes exit=3 a0=bff60fa8 a1=0 a2=1b6 a3=930a280 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.103:1183): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.103:1183): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff60bc8 a2=7afff4 a3=930a280 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.103:1183): path="/usr/share/X11/locale/locale.alias" type=AVC msg=audit(1162851240.107:1184): avc: denied { read } for pid=6892 comm="evolution-alarm" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.107:1184): arch=40000003 syscall=33 success=yes exit=0 a0=bff65b68 a1=4 a2=4db18a64 a3=bff65b68 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.107:1185): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.107:1185): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff64e5c a2=7afff4 a3=930d6c0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.107:1185): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162851240.255:1186): avc: denied { read } for pid=6892 comm="evolution-alarm" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.255:1186): arch=40000003 syscall=5 success=yes exit=10 a0=9302700 a1=18800 a2=322fc0 a3=9302700 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.255:1187): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.255:1187): arch=40000003 syscall=195 success=yes exit=0 a0=931f210 a1=bff654c0 a2=7afff4 a3=3 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.255:1187): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162851240.255:1188): avc: denied { setattr } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.255:1188): arch=40000003 syscall=30 success=yes exit=0 a0=931f238 a1=bff65514 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.255:1189): avc: denied { read } for pid=6892 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851240.255:1189): arch=40000003 syscall=5 success=yes exit=10 a0=4def9880 a1=8000 a2=1b6 a3=931f2e0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.255:1190): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851240.255:1190): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bff6549c a2=7afff4 a3=931f2e0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.255:1190): path="/dev/urandom" type=AVC msg=audit(1162851240.255:1191): avc: denied { ioctl } for pid=6892 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2055 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162851240.255:1191): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bff653fc a3=bff6543c items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.255:1191): path="/dev/urandom" type=AVC msg=audit(1162851240.259:1192): avc: denied { read } for pid=6892 comm="evolution-alarm" name="modules" dev=dm-0 ino=9331073 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162851240.259:1192): arch=40000003 syscall=5 success=yes exit=10 a0=9320610 a1=18800 a2=4dea3d07 a3=9320610 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.259:1193): avc: denied { search } for pid=6892 comm="evolution-alarm" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.259:1193): avc: denied { write } for pid=6892 comm="evolution-alarm" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162851240.259:1193): avc: denied { connectto } for pid=6892 comm="evolution-alarm" name="6531" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851240.259:1193): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff64f10 a2=4dc5d770 a3=15 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.259:1193): path="/tmp/.ICE-unix/6531" type=AVC msg=audit(1162851240.259:1194): avc: denied { read } for pid=6892 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.259:1194): arch=40000003 syscall=33 success=yes exit=0 a0=9322f90 a1=4 a2=4dc5d770 a3=9322f90 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.259:1195): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.259:1195): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bff64fac a2=7afff4 a3=9323870 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.259:1195): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162851240.267:1196): avc: denied { search } for pid=6892 comm="evolution-alarm" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.267:1196): avc: denied { read } for pid=6892 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.267:1196): arch=40000003 syscall=5 success=yes exit=11 a0=9326700 a1=0 a2=1b6 a3=9326748 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.267:1197): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648303 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.267:1197): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bff64ac8 a2=7afff4 a3=9326748 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.267:1197): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162851240.267:1198): avc: denied { write } for pid=6892 comm="evolution-alarm" name="linc-19be-0-41f49a5b6e22f" dev=dm-0 ino=15648248 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851240.267:1198): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff651e0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.267:1199): avc: denied { write } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.267:1199): avc: denied { add_name } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162851240.267:1199): avc: denied { create } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162851240.267:1199): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bff65220 a2=4e570f80 a3=b7f3e8ac items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.267:1200): avc: denied { connectto } for pid=6590 comm="gconfd-2" name="linc-1aec-0-7f9bab7e41c94" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851240.267:1200): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe86020 a2=4e570f80 a3=0 items=0 ppid=1 pid=6590 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.267:1200): path="/tmp/orbit-kmacmill/linc-1aec-0-7f9bab7e41c94" type=AVC msg=audit(1162851240.279:1201): avc: denied { read } for pid=6892 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.279:1201): arch=40000003 syscall=5 success=yes exit=18 a0=79799a a1=0 a2=1b6 a3=933ee60 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.279:1202): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.279:1202): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bff60d3c a2=7afff4 a3=933ee60 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.279:1202): path="/proc/meminfo" type=AVC msg=audit(1162851240.279:1203): avc: denied { connectto } for pid=6892 comm="evolution-alarm" path=002F746D702F646275732D47416759386D56457350 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162851240.279:1203): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff65040 a2=fb9494 a3=0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.291:1204): avc: denied { write } for pid=6892 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.291:1204): arch=40000003 syscall=5 success=yes exit=19 a0=934c9a0 a1=42 a2=1c0 a3=934c9a0 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162851240.291:1205): avc: denied { lock } for pid=6892 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=15648339 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162851240.291:1205): arch=40000003 syscall=221 success=yes exit=0 a0=13 a1=7 a2=bff650ec a3=bff650ec items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.291:1205): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162851240.295:1206): avc: denied { signal } for pid=6896 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162851240.295:1206): arch=40000003 syscall=270 success=yes exit=0 a0=1ad7 a1=1af3 a2=21 a3=b72efbd0 items=0 ppid=1 pid=6896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162851240.307:1207): avc: denied { getattr } for pid=6892 comm="evolution-alarm" name="[100287]" dev=pipefs ino=100287 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162851240.307:1207): arch=40000003 syscall=197 success=yes exit=0 a0=1f a1=bff654b4 a2=7afff4 a3=9354540 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162851240.307:1207): path="pipe:[100287]" type=USER_ACCT msg=audit(1162851601.929:1208): user pid=6948 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162851601.933:1209): login pid=6948 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162851601.933:1210): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162851601.933:1211): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162851601.937:1212): avc: denied { search } for pid=6949 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162851601.937:1212): avc: denied { read } for pid=6949 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1212): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=85b0800 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1213): avc: denied { getattr } for pid=6949 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1213): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb0b438 a2=96aff4 a3=85b0800 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851601.937:1213): path="/proc/net/dev" type=AVC msg=audit(1162851601.937:1214): avc: denied { search } for pid=6949 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162851601.937:1214): arch=40000003 syscall=33 success=yes exit=0 a0=bfb0b7e4 a1=0 a2=bfb0b6d8 a3=bfb0b6e0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1215): avc: denied { read append } for pid=6949 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1215): arch=40000003 syscall=5 success=yes exit=3 a0=bfb0b7e4 a1=402 a2=bfb0b9a8 a3=bfb0b6e0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1216): avc: denied { search } for pid=6949 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162851601.937:1216): avc: denied { read } for pid=6949 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1216): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=85b0df0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162851601.937:1217): avc: denied { getattr } for pid=6949 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.937:1217): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb0b294 a2=96aff4 a3=85b0df0 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851601.937:1217): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162851601.941:1218): avc: denied { lock } for pid=6949 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162851601.941:1218): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfb0b6e0 a3=3 items=0 ppid=6948 pid=6949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162851601.941:1218): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162851601.949:1219): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162851601.949:1220): user pid=6948 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162852201.015:1221): user pid=6973 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162852201.015:1222): login pid=6973 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162852201.015:1223): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162852201.015:1224): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162852201.019:1225): avc: denied { execute } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162852201.019:1225): avc: denied { execute_no_trans } for pid=6974 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162852201.019:1225): arch=40000003 syscall=11 success=yes exit=0 a0=87271b0 a1=8727358 a2=8727290 a3=8727008 items=0 ppid=6973 pid=6974 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162852201.019:1225): path="/usr/lib/sa/sa1" type=CRED_DISP msg=audit(1162852201.031:1226): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162852201.031:1227): user pid=6973 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162852801.092:1228): user pid=7028 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162852801.092:1229): login pid=7028 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162852801.092:1230): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162852801.092:1231): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162852801.104:1232): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162852801.104:1233): user pid=7028 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162853401.170:1234): user pid=7088 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162853401.170:1235): login pid=7088 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162853401.170:1236): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162853401.170:1237): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162853401.186:1238): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162853401.186:1239): user pid=7088 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162853418.483:1240): avc: denied { search } for pid=7092 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162853418.483:1240): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfcd8318 a2=269ff4 a3=3 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.487:1241): avc: denied { read } for pid=7092 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.487:1241): arch=40000003 syscall=33 success=yes exit=0 a0=bfcd9dff a1=4 a2=4db18a64 a3=bfcd9dff items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.487:1242): avc: denied { getattr } for pid=7092 comm="evolution" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.487:1242): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfcd824c a2=269ff4 a3=98cb730 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162853418.487:1242): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162853418.495:1243): avc: denied { read } for pid=7092 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.495:1243): arch=40000003 syscall=33 success=yes exit=0 a0=98e1218 a1=4 a2=4dc5d770 a3=98e1218 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.495:1244): avc: denied { getattr } for pid=7092 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162853418.495:1244): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfcd83ec a2=269ff4 a3=98e1af8 items=0 ppid=1 pid=7092 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162853418.495:1244): path="/home/kmacmill/.ICEauthority" type=USER_AVC msg=audit(1162853418.735:1245): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=7092 tpid=2797 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162853418.735:1246): user pid=2350 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.51 spid=2797 tpid=7092 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162853418.791:1247): avc: denied { create } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1247): arch=40000003 syscall=102 success=yes exit=33 a0=1 a1=b16fe274 a2=269ff4 a3=a7ed7f items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1248): avc: denied { bind } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1248): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b16fe274 a2=269ff4 a3=21 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1249): avc: denied { getattr } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1249): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b16fe274 a2=269ff4 a3=21 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1250): avc: denied { write } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162853418.791:1250): avc: denied { nlmsg_read } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1250): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b16fd1b4 a2=269ff4 a3=0 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162853418.791:1251): avc: denied { read } for pid=7101 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162853418.791:1251): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b16fd1b4 a2=269ff4 a3=0 items=0 ppid=1 pid=7101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162854001.247:1252): user pid=7134 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162854001.247:1253): login pid=7134 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162854001.247:1254): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162854001.247:1255): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162854001.251:1256): avc: denied { execute } for pid=7135 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162854001.251:1256): avc: denied { execute_no_trans } for pid=7135 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162854001.251:1256): avc: denied { read } for pid=7135 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162854001.251:1256): arch=40000003 syscall=11 success=yes exit=0 a0=87bfd48 a1=87bf740 a2=87bfd60 a3=87bf740 items=0 ppid=7134 pid=7135 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854001.251:1256): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162854001.251:1256): path="/usr/lib/sa/sadc" type=CRED_DISP msg=audit(1162854001.263:1257): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162854001.263:1258): user pid=7134 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162854041.050:1259): avc: denied { execmem } for pid=7137 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162854041.050:1259): arch=40000003 syscall=192 success=yes exit=7720960 a0=75d000 a1=1a000 a2=7 a3=812 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162854041.086:1260): avc: denied { execstack } for pid=7137 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162854041.086:1260): arch=40000003 syscall=125 success=yes exit=0 a0=bff9d000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162854041.278:1261): avc: denied { execute } for pid=7137 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162854041.278:1261): arch=40000003 syscall=192 success=yes exit=10993664 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162854041.278:1261): path="/dev/zero" type=AVC msg=audit(1162854041.282:1262): avc: denied { read } for pid=7137 comm="gnome-screensav" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162854041.282:1262): arch=40000003 syscall=33 success=yes exit=0 a0=bff9ee90 a1=4 a2=4db18a64 a3=bff9ee90 items=0 ppid=6775 pid=7137 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162854061.267:1263): user pid=7139 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162854061.271:1264): login pid=7139 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162854061.271:1265): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162854061.271:1266): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162854061.275:1267): avc: denied { getattr } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1267): arch=40000003 syscall=195 success=yes exit=0 a0=9961120 a1=bfe19ed0 a2=bd9ff4 a3=9961120 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.275:1267): path="/usr/bin/run-parts" type=AVC msg=audit(1162854061.275:1268): avc: denied { execute } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1268): arch=40000003 syscall=33 success=yes exit=0 a0=9961120 a1=1 a2=11 a3=9961120 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.275:1269): avc: denied { read } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1269): arch=40000003 syscall=33 success=yes exit=0 a0=9961120 a1=4 a2=ffffffff a3=9961120 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.275:1270): avc: denied { execute_no_trans } for pid=7140 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1270): arch=40000003 syscall=11 success=yes exit=0 a0=9961120 a1=99613d8 a2=99612f8 a3=9960f98 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.275:1270): path="/usr/bin/run-parts" type=AVC msg=audit(1162854061.275:1271): avc: denied { ioctl } for pid=7140 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.275:1271): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf837318 a3=bf837358 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.275:1271): path="/usr/bin/run-parts" type=AVC msg=audit(1162854061.279:1272): avc: denied { execute } for pid=7140 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1272): arch=40000003 syscall=33 success=yes exit=0 a0=9e6d990 a1=1 a2=1 a3=9e6dc98 items=0 ppid=7139 pid=7140 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.279:1273): avc: denied { execute_no_trans } for pid=7141 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1273): arch=40000003 syscall=11 success=yes exit=0 a0=9e6da10 a1=9e6dad8 a2=9e6dae8 a3=9e6d758 items=0 ppid=7140 pid=7141 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.279:1273): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162854061.279:1274): avc: denied { read } for pid=7143 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1274): arch=40000003 syscall=5 success=yes exit=3 a0=bff001c0 a1=0 a2=ffffffff a3=96b9038 items=0 ppid=7141 pid=7143 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162854061.279:1275): avc: denied { getattr } for pid=7143 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162854061.279:1275): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff00130 a2=a98ff4 a3=3 items=0 ppid=7141 pid=7143 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162854061.279:1275): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162854061.291:1276): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162854061.291:1277): user pid=7139 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162854601.345:1278): user pid=7165 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162854601.345:1279): login pid=7165 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162854601.345:1280): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162854601.345:1281): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162854601.361:1282): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162854601.361:1283): user pid=7165 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162855201.426:1284): user pid=7183 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162855201.426:1285): login pid=7183 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162855201.426:1286): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162855201.426:1287): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162855201.438:1288): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162855201.438:1289): user pid=7183 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162855801.500:1290): user pid=7201 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162855801.500:1291): login pid=7201 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162855801.504:1292): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162855801.504:1293): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162855801.516:1294): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162855801.516:1295): user pid=7201 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162855927.312:1296): avc: denied { read } for pid=7208 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162855927.312:1296): arch=40000003 syscall=33 success=yes exit=0 a0=bfacdfcb a1=4 a2=4db18a64 a3=bfacdfcb items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162855927.312:1297): avc: denied { getattr } for pid=7208 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162855927.312:1297): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfacc66c a2=9eaff4 a3=8156140 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162855927.312:1297): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162855963.506:1298): avc: denied { getattr } for pid=7208 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162855963.506:1298): arch=40000003 syscall=196 success=yes exit=0 a0=bfacb558 a1=bfacb4bc a2=9eaff4 a3=90c12c0 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162855963.506:1298): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162855965.502:1299): avc: denied { read } for pid=7208 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162855965.502:1299): arch=40000003 syscall=5 success=yes exit=56 a0=8c33338 a1=0 a2=8c33330 a3=8c33338 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162855965.506:1300): avc: denied { execute } for pid=7208 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162855965.506:1300): arch=40000003 syscall=192 success=yes exit=24420352 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162855965.506:1300): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162856262.425:1301): avc: denied { ioctl } for pid=7279 comm="ps" name="[102106]" dev=pipefs ino=102106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162856262.425:1301): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5413 a2=bfb23d94 a3=bfb23dd8 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.425:1301): path="pipe:[102106]" type=AVC msg=audit(1162856262.425:1302): avc: denied { getattr } for pid=7279 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.425:1302): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.425:1302): path="/proc/1" type=AVC msg=audit(1162856262.425:1303): avc: denied { search } for pid=7279 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1162856262.425:1303): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.425:1303): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.425:1304): avc: denied { getattr } for pid=7279 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.425:1304): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.425:1304): path="/proc/2" type=AVC msg=audit(1162856262.425:1305): avc: denied { search } for pid=7279 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1162856262.425:1305): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.425:1305): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1306): avc: denied { getattr } for pid=7279 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.429:1306): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1306): path="/proc/455" type=AVC msg=audit(1162856262.429:1307): avc: denied { search } for pid=7279 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.429:1307): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=29818893 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.429:1307): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1308): avc: denied { getattr } for pid=7279 comm="ps" name="2180" dev=proc ino=142868482 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1308): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1308): path="/proc/2180" type=AVC msg=audit(1162856262.429:1309): avc: denied { search } for pid=7279 comm="ps" name="2180" dev=proc ino=142868482 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1309): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=142868493 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1309): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1310): avc: denied { getattr } for pid=7279 comm="ps" name="2192" dev=proc ino=143654914 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1310): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1310): path="/proc/2192" type=AVC msg=audit(1162856262.429:1311): avc: denied { search } for pid=7279 comm="ps" name="2192" dev=proc ino=143654914 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1311): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=143654925 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1311): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1312): avc: denied { getattr } for pid=7279 comm="ps" name="2208" dev=proc ino=144703490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1312): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1312): path="/proc/2208" type=AVC msg=audit(1162856262.429:1313): avc: denied { search } for pid=7279 comm="ps" name="2208" dev=proc ino=144703490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1313): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=144703501 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1313): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1314): avc: denied { getattr } for pid=7279 comm="ps" name="2211" dev=proc ino=144900098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1314): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1314): path="/proc/2211" type=AVC msg=audit(1162856262.429:1315): avc: denied { search } for pid=7279 comm="ps" name="2211" dev=proc ino=144900098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1315): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=144900109 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1315): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.429:1316): avc: denied { getattr } for pid=7279 comm="ps" name="2223" dev=proc ino=145686530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.429:1316): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.429:1316): path="/proc/2223" type=AVC msg=audit(1162856262.429:1317): avc: denied { search } for pid=7279 comm="ps" name="2223" dev=proc ino=145686530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1162856262.429:1317): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=145686541 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.429:1317): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1318): avc: denied { getattr } for pid=7279 comm="ps" name="2239" dev=proc ino=146735106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.433:1318): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1318): path="/proc/2239" type=AVC msg=audit(1162856262.433:1319): avc: denied { search } for pid=7279 comm="ps" name="2239" dev=proc ino=146735106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.433:1319): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=146735117 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.433:1319): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1320): avc: denied { getattr } for pid=7279 comm="ps" name="2252" dev=proc ino=147587074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1320): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1320): path="/proc/2252" type=AVC msg=audit(1162856262.433:1321): avc: denied { search } for pid=7279 comm="ps" name="2252" dev=proc ino=147587074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1321): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=147587085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1321): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1322): avc: denied { getattr } for pid=7279 comm="ps" name="2286" dev=proc ino=149815298 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1322): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1322): path="/proc/2286" type=AVC msg=audit(1162856262.433:1323): avc: denied { search } for pid=7279 comm="ps" name="2286" dev=proc ino=149815298 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1323): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=149815309 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1323): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1324): avc: denied { getattr } for pid=7279 comm="ps" name="2350" dev=proc ino=154009602 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1324): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1324): path="/proc/2350" type=AVC msg=audit(1162856262.433:1325): avc: denied { search } for pid=7279 comm="ps" name="2350" dev=proc ino=154009602 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1325): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=154009613 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1325): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1326): avc: denied { getattr } for pid=7279 comm="ps" name="2362" dev=proc ino=154796034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1326): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1326): path="/proc/2362" type=AVC msg=audit(1162856262.433:1327): avc: denied { search } for pid=7279 comm="ps" name="2362" dev=proc ino=154796034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1327): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=154796045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1327): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1328): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=156827661 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1328): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1329): avc: denied { getattr } for pid=7279 comm="ps" name="2452" dev=proc ino=160694274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1329): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1329): path="/proc/2452" type=AVC msg=audit(1162856262.433:1330): avc: denied { search } for pid=7279 comm="ps" name="2452" dev=proc ino=160694274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1330): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=160694285 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1330): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1331): avc: denied { getattr } for pid=7279 comm="ps" name="2471" dev=proc ino=161939458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1331): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1331): path="/proc/2471" type=AVC msg=audit(1162856262.433:1332): avc: denied { search } for pid=7279 comm="ps" name="2471" dev=proc ino=161939458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1332): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=161939469 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1332): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1333): avc: denied { getattr } for pid=7279 comm="ps" name="2482" dev=proc ino=162660354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1333): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1333): path="/proc/2482" type=AVC msg=audit(1162856262.433:1334): avc: denied { search } for pid=7279 comm="ps" name="2482" dev=proc ino=162660354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1334): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=162660365 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1334): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1335): avc: denied { getattr } for pid=7279 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.433:1335): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1335): path="/proc/2499" type=AVC msg=audit(1162856262.433:1336): avc: denied { search } for pid=7279 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.433:1336): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=163774477 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.433:1336): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1337): avc: denied { getattr } for pid=7279 comm="ps" name="2513" dev=proc ino=164691970 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.433:1337): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1337): path="/proc/2513" type=AVC msg=audit(1162856262.433:1338): avc: denied { search } for pid=7279 comm="ps" name="2513" dev=proc ino=164691970 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.433:1338): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=164691981 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.433:1338): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1339): avc: denied { getattr } for pid=7279 comm="ps" name="2525" dev=proc ino=165478402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1339): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1339): path="/proc/2525" type=AVC msg=audit(1162856262.433:1340): avc: denied { search } for pid=7279 comm="ps" name="2525" dev=proc ino=165478402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1340): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=165478413 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1340): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.433:1341): avc: denied { getattr } for pid=7279 comm="ps" name="2545" dev=proc ino=166789122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.433:1341): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.433:1341): path="/proc/2545" type=AVC msg=audit(1162856262.433:1342): avc: denied { search } for pid=7279 comm="ps" name="2545" dev=proc ino=166789122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1162856262.433:1342): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=166789133 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.433:1342): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1343): avc: denied { getattr } for pid=7279 comm="ps" name="2566" dev=proc ino=168165378 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1343): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1343): path="/proc/2566" type=AVC msg=audit(1162856262.437:1344): avc: denied { search } for pid=7279 comm="ps" name="2566" dev=proc ino=168165378 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1344): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=168165389 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1344): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1345): avc: denied { getattr } for pid=7279 comm="ps" name="2577" dev=proc ino=168886274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.437:1345): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1345): path="/proc/2577" type=AVC msg=audit(1162856262.437:1346): avc: denied { search } for pid=7279 comm="ps" name="2577" dev=proc ino=168886274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.437:1346): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=168886285 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.437:1346): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1347): avc: denied { getattr } for pid=7279 comm="ps" name="2614" dev=proc ino=171311106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1347): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1347): path="/proc/2614" type=AVC msg=audit(1162856262.437:1348): avc: denied { search } for pid=7279 comm="ps" name="2614" dev=proc ino=171311106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1348): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=171311117 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1348): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1349): avc: denied { getattr } for pid=7279 comm="ps" name="2707" dev=proc ino=177405954 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1349): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1349): path="/proc/2707" type=AVC msg=audit(1162856262.437:1350): avc: denied { search } for pid=7279 comm="ps" name="2707" dev=proc ino=177405954 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1350): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=177405965 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1350): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1351): avc: denied { getattr } for pid=7279 comm="ps" name="2719" dev=proc ino=178192386 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1351): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1351): path="/proc/2719" type=AVC msg=audit(1162856262.437:1352): avc: denied { search } for pid=7279 comm="ps" name="2719" dev=proc ino=178192386 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1352): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=178192397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1352): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1353): avc: denied { getattr } for pid=7279 comm="ps" name="2730" dev=proc ino=178913282 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1353): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1353): path="/proc/2730" type=AVC msg=audit(1162856262.437:1354): avc: denied { search } for pid=7279 comm="ps" name="2730" dev=proc ino=178913282 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1354): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=178913293 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1354): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1355): avc: denied { getattr } for pid=7279 comm="ps" name="2797" dev=proc ino=183304194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1355): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1355): path="/proc/2797" type=AVC msg=audit(1162856262.437:1356): avc: denied { search } for pid=7279 comm="ps" name="2797" dev=proc ino=183304194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1356): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=183304205 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1356): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1357): avc: denied { getattr } for pid=7279 comm="ps" name="2824" dev=proc ino=185073666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1357): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1357): path="/proc/2824" type=AVC msg=audit(1162856262.437:1358): avc: denied { search } for pid=7279 comm="ps" name="2824" dev=proc ino=185073666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1162856262.437:1358): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=185073677 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.437:1358): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.437:1359): avc: denied { getattr } for pid=7279 comm="ps" name="2835" dev=proc ino=185794562 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.437:1359): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.437:1359): path="/proc/2835" type=AVC msg=audit(1162856262.441:1360): avc: denied { search } for pid=7279 comm="ps" name="2835" dev=proc ino=185794562 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1360): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=185794573 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1360): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1361): avc: denied { getattr } for pid=7279 comm="ps" name="3060" dev=proc ino=200540162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:user_r:user_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.441:1361): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1361): path="/proc/3060" type=AVC msg=audit(1162856262.441:1362): avc: denied { search } for pid=7279 comm="ps" name="3060" dev=proc ino=200540162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:user_r:user_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1362): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=200540173 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:user_r:user_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1362): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1363): avc: denied { getattr } for pid=7279 comm="ps" name="3895" dev=proc ino=255262722 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.441:1363): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1363): path="/proc/3895" type=AVC msg=audit(1162856262.441:1364): avc: denied { search } for pid=7279 comm="ps" name="3895" dev=proc ino=255262722 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1364): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=255262733 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1364): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1365): avc: denied { getattr } for pid=7279 comm="ps" name="4653" dev=proc ino=304939010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.441:1365): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1365): path="/proc/4653" type=AVC msg=audit(1162856262.441:1366): avc: denied { search } for pid=7279 comm="ps" name="4653" dev=proc ino=304939010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.441:1366): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=304939021 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.441:1366): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1367): avc: denied { getattr } for pid=7279 comm="ps" name="6279" dev=proc ino=411500546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.441:1367): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1367): path="/proc/6279" type=AVC msg=audit(1162856262.441:1368): avc: denied { search } for pid=7279 comm="ps" name="6279" dev=proc ino=411500546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1162856262.441:1368): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=411500557 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.441:1368): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.441:1369): avc: denied { getattr } for pid=7279 comm="ps" name="6501" dev=proc ino=426049538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162856262.441:1369): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.441:1369): path="/proc/6501" type=AVC msg=audit(1162856262.441:1370): avc: denied { search } for pid=7279 comm="ps" name="6501" dev=proc ino=426049538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162856262.441:1370): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=426049549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162856262.441:1370): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.445:1371): avc: denied { getattr } for pid=7279 comm="ps" name="6583" dev=proc ino=431423490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.445:1371): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.445:1371): path="/proc/6583" type=AVC msg=audit(1162856262.445:1372): avc: denied { search } for pid=7279 comm="ps" name="6583" dev=proc ino=431423490 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1162856262.445:1372): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=431423501 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.445:1372): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1373): avc: denied { getattr } for pid=7279 comm="ps" name="6686" dev=proc ino=438173698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1373): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1373): path="/proc/6686" type=AVC msg=audit(1162856262.449:1374): avc: denied { search } for pid=7279 comm="ps" name="6686" dev=proc ino=438173698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1374): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=438173709 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1374): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1375): avc: denied { getattr } for pid=7279 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1375): arch=40000003 syscall=195 success=yes exit=0 a0=4cfe2840 a1=bfb21500 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1375): path="/dev/pts" type=AVC msg=audit(1162856262.449:1376): avc: denied { read } for pid=7279 comm="ps" name="2" dev=proc ino=439058434 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=lnk_file type=AVC msg=audit(1162856262.449:1376): avc: denied { ptrace } for pid=7279 comm="ps" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162856262.449:1376): arch=40000003 syscall=85 success=yes exit=10 a0=bfb21538 a1=4cfe2840 a2=7f a3=bfb21538 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1377): avc: denied { search } for pid=7279 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1377): avc: denied { getattr } for pid=7279 comm="ps" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162856262.449:1377): arch=40000003 syscall=195 success=yes exit=0 a0=4cfe2840 a1=bfb21440 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1377): path="/dev/pts/1" type=AVC msg=audit(1162856262.449:1378): avc: denied { getattr } for pid=7279 comm="ps" name="6720" dev=proc ino=440401922 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1378): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1378): path="/proc/6720" type=AVC msg=audit(1162856262.449:1379): avc: denied { search } for pid=7279 comm="ps" name="6720" dev=proc ino=440401922 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1379): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=440401933 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1379): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1380): avc: denied { getattr } for pid=7279 comm="ps" name="6743" dev=proc ino=441909250 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1380): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1380): path="/proc/6743" type=AVC msg=audit(1162856262.449:1381): avc: denied { search } for pid=7279 comm="ps" name="6743" dev=proc ino=441909250 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1381): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=441909261 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1381): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.449:1382): avc: denied { getattr } for pid=7279 comm="ps" name="6744" dev=proc ino=441974786 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.449:1382): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.449:1382): path="/proc/6744" type=AVC msg=audit(1162856262.449:1383): avc: denied { search } for pid=7279 comm="ps" name="6744" dev=proc ino=441974786 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=AVC msg=audit(1162856262.449:1383): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=441974797 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.449:1383): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.453:1384): avc: denied { getattr } for pid=7279 comm="ps" name="6871" dev=proc ino=450297858 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.453:1384): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.453:1384): path="/proc/6871" type=AVC msg=audit(1162856262.453:1385): avc: denied { search } for pid=7279 comm="ps" name="6871" dev=proc ino=450297858 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=AVC msg=audit(1162856262.453:1385): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=450297869 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.453:1385): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.453:1386): avc: denied { getattr } for pid=7279 comm="ps" name="6892" dev=proc ino=451674114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=SYSCALL msg=audit(1162856262.453:1386): arch=40000003 syscall=195 success=yes exit=0 a0=868d97c a1=bfb23cf0 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.453:1386): path="/proc/6892" type=AVC msg=audit(1162856262.453:1387): avc: denied { search } for pid=7279 comm="ps" name="6892" dev=proc ino=451674114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=AVC msg=audit(1162856262.453:1387): avc: denied { read } for pid=7279 comm="ps" name="stat" dev=proc ino=451674125 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.453:1387): arch=40000003 syscall=5 success=yes exit=18 a0=4cfe4780 a1=0 a2=0 a3=4cfe4780 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.453:1388): avc: denied { getattr } for pid=7279 comm="ps" name="2" dev=devpts ino=4 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162856262.453:1388): arch=40000003 syscall=195 success=yes exit=0 a0=4cfe2840 a1=bfb21440 a2=648ff4 a3=3 items=0 ppid=7278 pid=7279 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.453:1388): path="/dev/pts/2" type=AVC msg=audit(1162856262.873:1389): avc: denied { write } for pid=7208 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162856262.873:1389): avc: denied { add_name } for pid=7208 comm="firefox-bin" name="FlashoraxPs" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162856262.873:1389): avc: denied { create } for pid=7208 comm="firefox-bin" name="FlashoraxPs" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.873:1389): arch=40000003 syscall=5 success=yes exit=46 a0=bfacc47b a1=c2 a2=180 a3=1dfd81 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.873:1390): avc: denied { read write } for pid=7208 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.873:1390): arch=40000003 syscall=5 success=yes exit=46 a0=a6808db8 a1=242 a2=1b6 a3=9a75398 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856262.873:1391): avc: denied { getattr } for pid=7208 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856262.873:1391): arch=40000003 syscall=197 success=yes exit=0 a0=2e a1=bfacc2f8 a2=9eaff4 a3=9a75398 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856262.873:1391): path="/tmp/FlashoraxPs" type=AVC msg=audit(1162856263.025:1392): avc: denied { search } for pid=7208 comm="firefox-bin" name="pcm" dev=dm-0 ino=9330155 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1162856263.025:1392): avc: denied { read } for pid=7208 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162856263.025:1392): arch=40000003 syscall=5 success=yes exit=50 a0=99095e8 a1=0 a2=1b6 a3=8c4dd48 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856263.025:1393): avc: denied { getattr } for pid=7208 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162856263.025:1393): arch=40000003 syscall=197 success=yes exit=0 a0=32 a1=bfacc280 a2=9eaff4 a3=8c4dd48 items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162856263.025:1393): path="/etc/alsa/pcm/default.conf" type=AVC msg=audit(1162856263.029:1394): avc: denied { search } for pid=7208 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162856263.029:1394): arch=40000003 syscall=54 success=yes exit=0 a0=32 a1=c25c4111 a2=bfacbfbc a3=bfacbfbc items=0 ppid=1 pid=7208 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162856278.190:1395): avc: denied { remove_name } for pid=7281 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162856278.190:1395): avc: denied { unlink } for pid=7281 comm="firefox-bin" name="FlashoraxPs" dev=dm-0 ino=14469565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856278.190:1395): arch=40000003 syscall=10 success=yes exit=0 a0=a6808d70 a1=1 a2=1d711e0 a3=a6805e28 items=0 ppid=1 pid=7281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162856401.581:1396): user pid=7297 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162856401.581:1397): login pid=7297 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162856401.581:1398): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162856401.581:1399): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162856401.585:1400): avc: denied { execute } for pid=7298 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162856401.585:1400): avc: denied { execute_no_trans } for pid=7298 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.585:1400): arch=40000003 syscall=11 success=yes exit=0 a0=8b581b0 a1=8b58358 a2=8b58290 a3=8b58008 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.585:1400): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162856401.589:1401): avc: denied { execute } for pid=7298 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162856401.589:1401): avc: denied { execute_no_trans } for pid=7298 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162856401.589:1401): avc: denied { read } for pid=7298 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1401): arch=40000003 syscall=11 success=yes exit=0 a0=8b58d48 a1=8b58740 a2=8b58d60 a3=8b58740 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.589:1401): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162856401.589:1401): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162856401.589:1402): avc: denied { search } for pid=7298 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162856401.589:1402): avc: denied { read } for pid=7298 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1402): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8089800 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1403): avc: denied { getattr } for pid=7298 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1403): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf97e2a8 a2=c69ff4 a3=8089800 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.589:1403): path="/proc/net/dev" type=AVC msg=audit(1162856401.589:1404): avc: denied { search } for pid=7298 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162856401.589:1404): arch=40000003 syscall=33 success=yes exit=0 a0=bf97e654 a1=0 a2=bf97e548 a3=bf97e550 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1405): avc: denied { read append } for pid=7298 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1405): arch=40000003 syscall=5 success=yes exit=3 a0=bf97e654 a1=402 a2=bf97e818 a3=bf97e550 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1406): avc: denied { search } for pid=7298 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162856401.589:1406): avc: denied { read } for pid=7298 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1406): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8089d60 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.589:1407): avc: denied { getattr } for pid=7298 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.589:1407): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf97e104 a2=c69ff4 a3=8089d60 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.589:1407): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162856401.589:1408): avc: denied { search } for pid=7298 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162856401.589:1408): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8089d60 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162856401.593:1409): avc: denied { lock } for pid=7298 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162856401.593:1409): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf97e550 a3=3 items=0 ppid=7297 pid=7298 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162856401.593:1409): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162856401.601:1410): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162856401.601:1411): user pid=7297 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162856952.116:1412): avc: denied { execmem } for pid=7314 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162856952.116:1412): arch=40000003 syscall=192 success=yes exit=8175616 a0=7cc000 a1=1a000 a2=7 a3=812 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162856952.116:1413): avc: denied { execstack } for pid=7314 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162856952.116:1413): arch=40000003 syscall=125 success=yes exit=0 a0=bfa30000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162856952.140:1414): avc: denied { execute } for pid=7314 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162856952.140:1414): arch=40000003 syscall=192 success=yes exit=1114112 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162856952.140:1414): path="/dev/zero" type=AVC msg=audit(1162856952.144:1415): avc: denied { read } for pid=7314 comm="gnome-screensav" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162856952.144:1415): arch=40000003 syscall=33 success=yes exit=0 a0=bfa30e90 a1=4 a2=4db18a64 a3=bfa30e90 items=0 ppid=6775 pid=7314 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162857001.671:1416): user pid=7316 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162857001.675:1417): login pid=7316 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162857001.675:1418): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162857001.675:1419): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162857001.687:1420): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162857001.687:1421): user pid=7316 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162857601.756:1422): user pid=7334 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162857601.756:1423): login pid=7334 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162857601.756:1424): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162857601.756:1425): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162857601.772:1426): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162857601.772:1427): user pid=7334 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162857661.784:1428): user pid=7338 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162857661.784:1429): login pid=7338 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162857661.784:1430): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162857661.784:1431): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162857661.788:1432): avc: denied { getattr } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1432): arch=40000003 syscall=195 success=yes exit=0 a0=9b4a120 a1=bfd0fdd0 a2=248ff4 a3=9b4a120 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.788:1432): path="/usr/bin/run-parts" type=AVC msg=audit(1162857661.788:1433): avc: denied { execute } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1433): arch=40000003 syscall=33 success=yes exit=0 a0=9b4a120 a1=1 a2=11 a3=9b4a120 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.788:1434): avc: denied { read } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1434): arch=40000003 syscall=33 success=yes exit=0 a0=9b4a120 a1=4 a2=ffffffff a3=9b4a120 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.788:1435): avc: denied { execute_no_trans } for pid=7339 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1435): arch=40000003 syscall=11 success=yes exit=0 a0=9b4a120 a1=9b4a3d8 a2=9b4a2f8 a3=9b49f98 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.788:1435): path="/usr/bin/run-parts" type=AVC msg=audit(1162857661.788:1436): avc: denied { ioctl } for pid=7339 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.788:1436): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd0ffe8 a3=bfd10028 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.788:1436): path="/usr/bin/run-parts" type=AVC msg=audit(1162857661.792:1437): avc: denied { execute } for pid=7339 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.792:1437): arch=40000003 syscall=33 success=yes exit=0 a0=9b4b990 a1=1 a2=1 a3=9b4bc98 items=0 ppid=7338 pid=7339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.792:1438): avc: denied { execute_no_trans } for pid=7340 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.792:1438): arch=40000003 syscall=11 success=yes exit=0 a0=9b4ba10 a1=9b4bad8 a2=9b4bae8 a3=9b4b758 items=0 ppid=7339 pid=7340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.792:1438): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162857661.796:1439): avc: denied { execute } for pid=7342 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162857661.796:1439): avc: denied { execute_no_trans } for pid=7342 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162857661.796:1439): avc: denied { read } for pid=7342 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.796:1439): arch=40000003 syscall=11 success=yes exit=0 a0=9776678 a1=9776808 a2=9776720 a3=9776508 items=0 ppid=7340 pid=7342 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.796:1439): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162857661.796:1439): path="/sbin/chkconfig" type=AVC msg=audit(1162857661.796:1440): avc: denied { read } for pid=7342 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.796:1440): arch=40000003 syscall=5 success=yes exit=3 a0=bfddf8a0 a1=0 a2=ffffffff a3=9d41038 items=0 ppid=7340 pid=7342 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162857661.796:1441): avc: denied { getattr } for pid=7342 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162857661.796:1441): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfddf810 a2=977ff4 a3=3 items=0 ppid=7340 pid=7342 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162857661.796:1441): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162857661.804:1442): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162857661.804:1443): user pid=7338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162858201.870:1444): user pid=7364 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162858201.870:1445): login pid=7364 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162858201.870:1446): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162858201.870:1447): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162858201.882:1448): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162858201.886:1449): user pid=7364 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162858801.947:1450): user pid=7382 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162858801.947:1451): login pid=7382 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162858801.947:1452): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162858801.947:1453): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162858801.967:1454): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162858801.967:1455): user pid=7382 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162859401.037:1456): user pid=7400 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162859401.037:1457): login pid=7400 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162859401.037:1458): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162859401.037:1459): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162859401.049:1460): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162859401.049:1461): user pid=7400 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162859927.374:1462): avc: denied { read } for pid=7418 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162859927.374:1462): arch=40000003 syscall=33 success=yes exit=0 a0=bfb2ffcb a1=4 a2=4db18a64 a3=bfb2ffcb items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162859927.374:1463): avc: denied { getattr } for pid=7418 comm="firefox-bin" name=".gdmAHKGIT" dev=dm-0 ino=14469334 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162859927.374:1463): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb2decc a2=7bfff4 a3=9356140 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162859927.374:1463): path="/tmp/.gdmAHKGIT" type=AVC msg=audit(1162859943.499:1464): avc: denied { getattr } for pid=7418 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162859943.499:1464): arch=40000003 syscall=196 success=yes exit=0 a0=bfb2c628 a1=bfb2c58c a2=7bfff4 a3=9e16d28 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162859943.499:1464): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162859943.627:1465): avc: denied { read } for pid=7418 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162859943.627:1465): arch=40000003 syscall=5 success=yes exit=47 a0=9f09628 a1=0 a2=7c1150 a3=9f09628 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162859943.627:1466): avc: denied { execute } for pid=7418 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162859943.627:1466): arch=40000003 syscall=192 success=yes exit=74682368 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=7418 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162859943.627:1466): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162860001.106:1467): user pid=7444 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162860001.106:1468): login pid=7444 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162860001.106:1469): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162860001.110:1470): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162860001.114:1471): avc: denied { search } for pid=7445 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162860001.114:1471): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8646d60 items=0 ppid=7444 pid=7445 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162860001.122:1472): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162860001.122:1473): user pid=7444 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162860601.192:1474): user pid=7484 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162860601.192:1475): login pid=7484 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162860601.192:1476): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162860601.192:1477): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162860601.200:1478): avc: denied { search } for pid=7485 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162860601.200:1478): avc: denied { read } for pid=7485 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1478): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8a2f800 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162860601.200:1479): avc: denied { getattr } for pid=7485 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1479): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe9d7c8 a2=371ff4 a3=8a2f800 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162860601.200:1479): path="/proc/net/dev" type=AVC msg=audit(1162860601.200:1480): avc: denied { read append } for pid=7485 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1480): arch=40000003 syscall=5 success=yes exit=3 a0=bfe9db74 a1=402 a2=bfe9dd38 a3=bfe9da70 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162860601.200:1481): avc: denied { lock } for pid=7485 comm="sadc" name="sa06" dev=dm-0 ino=14600291 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162860601.200:1481): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfe9da70 a3=3 items=0 ppid=7484 pid=7485 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162860601.200:1481): path="/var/log/sa/sa06" type=CRED_DISP msg=audit(1162860601.244:1482): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162860601.244:1483): user pid=7484 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162861201.297:1484): user pid=7540 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162861201.297:1485): login pid=7540 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162861201.301:1486): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162861201.301:1487): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162861201.329:1488): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162861201.329:1489): user pid=7540 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162861261.337:1490): user pid=7544 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162861261.337:1491): login pid=7544 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162861261.337:1492): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162861261.337:1493): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162861261.357:1494): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162861261.357:1495): user pid=7544 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162861801.415:1496): user pid=7575 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162861801.415:1497): login pid=7575 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162861801.415:1498): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162861801.415:1499): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162861801.423:1500): avc: denied { search } for pid=7576 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162861801.423:1500): arch=40000003 syscall=33 success=yes exit=0 a0=bf951624 a1=0 a2=bf951518 a3=bf951520 items=0 ppid=7575 pid=7576 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162861801.443:1501): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162861801.443:1502): user pid=7575 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162862333.952:1503): avc: denied { write } for pid=6892 comm="evolution-alarm" name=".gnome2" dev=dm-0 ino=6547212 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1162862333.952:1503): avc: denied { add_name } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1162862333.952:1503): avc: denied { create } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862333.952:1503): arch=40000003 syscall=5 success=yes exit=23 a0=934d450 a1=c2 a2=180 a3=2f829a items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162862333.952:1504): avc: denied { remove_name } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" dev=dm-0 ino=6574545 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1162862333.952:1504): avc: denied { unlink } for pid=6892 comm="evolution-alarm" name="evolution-alarm-notify-vSUaW9" dev=dm-0 ino=6574545 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862333.952:1504): arch=40000003 syscall=10 success=yes exit=0 a0=934d450 a1=2 a2=4d48efd8 a3=9323060 items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162862333.960:1505): avc: denied { search } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1505): avc: denied { write } for pid=6892 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1505): avc: denied { remove_name } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" dev=dm-0 ino=15648472 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1505): avc: denied { unlink } for pid=6892 comm="evolution-alarm" name="linc-1aec-0-7f9bab7e41c94" dev=dm-0 ino=15648472 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862333.960:1505): arch=40000003 syscall=10 success=yes exit=0 a0=9327b10 a1=92fbb90 a2=4df37708 a3=c items=0 ppid=1 pid=6892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162862333.960:1506): avc: denied { search } for pid=6871 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1506): avc: denied { search } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862333.960:1507): avc: denied { signal } for pid=7604 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1162862333.960:1507): arch=40000003 syscall=270 success=yes exit=0 a0=1aec a1=1db4 a2=6 a3=b72f9c2c items=0 ppid=1 pid=7604 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=SYSCALL msg=audit(1162862333.960:1506): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfd5d1c0 a2=4e570f80 a3=0 items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162862334.088:1508): avc: denied { write } for pid=6723 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162862334.088:1508): arch=40000003 syscall=4 success=no exit=-5 a0=2 a1=b7fa8000 a2=2e a3=2e items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162862334.088:1508): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162862334.092:1509): avc: denied { read } for pid=6723 comm="bash" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162862334.092:1509): arch=40000003 syscall=3 success=yes exit=0 a0=0 a1=bf8662db a2=1 a3=249420 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162862334.092:1509): path=2F6465762F7074732F31202864656C6574656429 type=AVC msg=audit(1162862334.092:1510): avc: denied { append } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.092:1510): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8401 a2=0 a3=8401 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862334.092:1511): avc: denied { read } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.092:1511): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8000 a2=0 a3=8000 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862334.092:1512): avc: denied { write } for pid=6723 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.092:1512): arch=40000003 syscall=5 success=yes exit=3 a0=8250cf0 a1=8201 a2=0 a3=8201 items=0 ppid=6720 pid=6723 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1162862334.096:1513): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162862334.096:1514): avc: denied { search } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162862334.096:1514): avc: denied { write } for pid=6720 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162862334.096:1514): avc: denied { remove_name } for pid=6720 comm="su" name=".xauthyeka65" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162862334.096:1514): avc: denied { unlink } for pid=6720 comm="su" name=".xauthyeka65" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162862334.096:1514): arch=40000003 syscall=10 success=yes exit=0 a0=93769a8 a1=9376a86 a2=140bc8 a3=9373008 items=0 ppid=1 pid=6720 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1162862334.100:1515): user pid=6720 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162862334.116:1516): avc: denied { execheap } for pid=6639 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162862334.116:1516): avc: denied { execmem } for pid=6639 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162862334.116:1516): arch=40000003 syscall=125 success=yes exit=0 a0=9b76000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=6639 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862334.212:1517): avc: denied { write } for pid=7607 comm="bug-buddy" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862334.212:1517): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf8965f0 a2=4dc5d770 a3=15 items=0 ppid=7606 pid=7607 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162862338.965:1518): avc: denied { write } for pid=6871 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=15648177 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862338.965:1518): avc: denied { remove_name } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" dev=dm-0 ino=15648464 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862338.965:1518): avc: denied { unlink } for pid=6871 comm="evolution-data-" name="linc-1ad7-0-5a56670ecf53d" dev=dm-0 ino=15648464 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862338.965:1518): arch=40000003 syscall=10 success=yes exit=0 a0=87021d8 a1=86f70c8 a2=4df37708 a3=a items=0 ppid=1 pid=6871 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162862343.985:1519): avc: denied { write } for pid=6531 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14469315 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862343.985:1519): avc: denied { remove_name } for pid=6531 comm="gnome-session" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162862343.985:1519): avc: denied { unlink } for pid=6531 comm="gnome-session" name="6531" dev=dm-0 ino=14469454 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162862343.985:1519): arch=40000003 syscall=10 success=yes exit=0 a0=8b4bb7a a1=1 a2=4dc5d770 a3=8b4bb08 items=0 ppid=4697 pid=6531 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1162862344.101:1520): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1162862344.101:1521): user pid=4697 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=DAEMON_END msg=audit(1162862354.005:5730) auditd normal halt, sending auid=4294967295 pid=8144 subj=system_u:system_r:initrc_t:s0 type=DAEMON_START msg=audit(1162905957.883:2600) auditd start, ver=1.2.9, format=raw, auid=4294967295 pid=2166 res=success, auditd pid=21 type=CONFIG_CHANGE msg=audit(1162905957.979:51): audit_enabled=1 old=0 by auid=4294967295 subj=system_u:system_r:auditd_t:s0 type=CONFIG_CHANGE msg=audit(1162905958.435:52): audit_backlog_limit=256 old=64 by auid=4294967295 subj=system_u:system_r:auditctl_t:s0 type=AVC msg=audit(1162905958.459:53): avc: denied { read write } for pid=2181 comm="syslogd" name="0" dev=devpts ino=2 scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905958.459:53): arch=40000003 syscall=11 success=yes exit=0 a0=8887ae8 a1=88880d8 a2=8887fe0 a3=8887a58 items=0 ppid=2180 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="syslogd" exe="/sbin/syslogd" subj=system_u:system_r:syslogd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905958.459:53): path="/dev/pts/0" type=AVC msg=audit(1162905959.207:54): avc: denied { read write } for pid=2184 comm="klogd" name="0" dev=devpts ino=2 scontext=system_u:system_r:klogd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905959.207:54): arch=40000003 syscall=11 success=yes exit=0 a0=99e5b28 a1=99e6078 a2=99e5f88 a3=99e59e0 items=0 ppid=2183 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="klogd" exe="/sbin/klogd" subj=system_u:system_r:klogd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905959.207:54): path="/dev/pts/0" type=AVC msg=audit(1162905959.763:55): avc: denied { read write } for pid=2196 comm="irqbalance" name="0" dev=devpts ino=2 scontext=system_u:system_r:irqbalance_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905959.763:55): arch=40000003 syscall=11 success=yes exit=0 a0=9a2ad70 a1=9a2b068 a2=9a2af70 a3=9a2a9e8 items=0 ppid=2195 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="irqbalance" exe="/usr/sbin/irqbalance" subj=system_u:system_r:irqbalance_t:s0 key=(null) type=AVC_PATH msg=audit(1162905959.763:55): path="/dev/pts/0" type=AVC msg=audit(1162905960.255:56): avc: denied { read write } for pid=2212 comm="mcstransd" name="0" dev=devpts ino=2 scontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905960.255:56): arch=40000003 syscall=11 success=yes exit=0 a0=8f11ce0 a1=8f11fe0 a2=8f11ef8 a3=8f11970 items=0 ppid=2211 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="mcstransd" exe="/sbin/mcstransd" subj=system_u:system_r:setrans_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905960.255:56): path="/dev/pts/0" type=AVC msg=audit(1162905960.935:57): avc: denied { read write } for pid=2225 comm="portmap" name="0" dev=devpts ino=2 scontext=system_u:system_r:portmap_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905960.935:57): arch=40000003 syscall=11 success=yes exit=0 a0=99b3c18 a1=99b4048 a2=99b3f58 a3=99b39b0 items=0 ppid=2224 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="portmap" exe="/sbin/portmap" subj=system_u:system_r:portmap_t:s0 key=(null) type=AVC_PATH msg=audit(1162905960.935:57): path="/dev/pts/0" type=AVC msg=audit(1162905964.171:58): avc: denied { read write } for pid=2259 comm="rpc.statd" name="0" dev=devpts ino=2 scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.171:58): arch=40000003 syscall=11 success=yes exit=0 a0=8394d58 a1=8395060 a2=8394f70 a3=83949e8 items=0 ppid=2258 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpc.statd" exe="/sbin/rpc.statd" subj=system_u:system_r:rpcd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.171:58): path="/dev/pts/0" type=AVC msg=audit(1162905964.379:59): avc: denied { read write } for pid=2266 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.379:59): arch=40000003 syscall=11 success=yes exit=0 a0=8ce8b70 a1=8ce8bb8 a2=8ce86c0 a3=8ce8a90 items=0 ppid=2265 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.379:59): path="/dev/pts/0" type=AVC msg=audit(1162905964.383:60): avc: denied { getattr } for pid=2266 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.383:60): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfa8ff20 a2=42aff4 a3=3 items=0 ppid=2265 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.383:60): path="/dev/pts/0" type=AVC msg=audit(1162905964.447:61): avc: denied { read write } for pid=2282 comm="modprobe" name="0" dev=devpts ino=2 scontext=system_u:system_r:insmod_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.447:61): arch=40000003 syscall=11 success=yes exit=0 a0=8b460b8 a1=8b48428 a2=8b517c8 a3=8b48320 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=system_u:system_r:insmod_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.447:61): path="/dev/pts/0" type=AVC msg=audit(1162905964.447:62): avc: denied { getattr } for pid=2282 comm="modprobe" name="0" dev=devpts ino=2 scontext=system_u:system_r:insmod_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.447:62): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfd2d770 a2=7d9ff4 a3=3 items=0 ppid=2271 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=system_u:system_r:insmod_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.447:62): path="/dev/pts/0" type=AVC msg=audit(1162905964.523:63): avc: denied { ioctl } for pid=2283 comm="sh" name="0" dev=devpts ino=2 scontext=system_u:system_r:insmod_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905964.523:63): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bffae19c a3=bffae1dc items=0 ppid=2282 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=system_u:system_r:insmod_t:s0 key=(null) type=AVC_PATH msg=audit(1162905964.523:63): path="/dev/pts/0" type=AVC msg=audit(1162905965.040:64): avc: denied { read write } for pid=2321 comm="dbus-daemon" name="0" dev=devpts ino=2 scontext=system_u:system_r:system_dbusd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905965.040:64): arch=40000003 syscall=11 success=yes exit=0 a0=82c3ad0 a1=82c40c8 a2=82c3fc8 a3=82c3a40 items=0 ppid=2320 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=system_u:system_r:system_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905965.040:64): path="/dev/pts/0" type=AVC msg=audit(1162905965.880:65): avc: denied { read write } for pid=2335 comm="hcid" name="0" dev=devpts ino=2 scontext=system_u:system_r:bluetooth_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905965.880:65): arch=40000003 syscall=11 success=yes exit=0 a0=8abba80 a1=8abbf78 a2=8abbe80 a3=8abba00 items=0 ppid=2334 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hcid" exe="/usr/sbin/hcid" subj=system_u:system_r:bluetooth_t:s0 key=(null) type=AVC_PATH msg=audit(1162905965.880:65): path="/dev/pts/0" type=AVC msg=audit(1162905966.308:66): avc: denied { read write } for pid=2400 comm="hidd" name="0" dev=devpts ino=2 scontext=system_u:system_r:bluetooth_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905966.308:66): arch=40000003 syscall=11 success=yes exit=0 a0=8fd9b78 a1=8fd9fc8 a2=8fd9ec8 a3=8fd9a48 items=0 ppid=2399 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hidd" exe="/usr/bin/hidd" subj=system_u:system_r:bluetooth_t:s0 key=(null) type=AVC_PATH msg=audit(1162905966.308:66): path="/dev/pts/0" type=AVC msg=audit(1162905966.616:67): avc: denied { read write } for pid=2425 comm="automount" name="0" dev=devpts ino=2 scontext=system_u:system_r:automount_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905966.616:67): arch=40000003 syscall=11 success=yes exit=0 a0=964d738 a1=964d698 a2=964da90 a3=964d5c8 items=0 ppid=2414 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null) type=AVC_PATH msg=audit(1162905966.616:67): path="/dev/pts/0" type=AVC msg=audit(1162905966.900:68): avc: denied { read write } for pid=2444 comm="acpid" name="0" dev=devpts ino=2 scontext=system_u:system_r:apmd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905966.900:68): arch=40000003 syscall=11 success=yes exit=0 a0=8fc6a80 a1=8fc6f78 a2=8fc6e80 a3=8fc6a00 items=0 ppid=2443 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="acpid" exe="/usr/sbin/acpid" subj=system_u:system_r:apmd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905966.900:68): path="/dev/pts/0" type=AVC msg=audit(1162905967.032:69): avc: denied { read write } for pid=2455 comm="hpiod" name="0" dev=devpts ino=2 scontext=system_u:system_r:hplip_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905967.032:69): arch=40000003 syscall=11 success=yes exit=0 a0=8a9cc58 a1=8a9cf40 a2=8a9ce58 a3=8a9c9b8 items=0 ppid=2454 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hpiod" exe="/usr/sbin/hpiod" subj=system_u:system_r:hplip_t:s0 key=(null) type=AVC_PATH msg=audit(1162905967.032:69): path="/dev/pts/0" type=AVC msg=audit(1162905967.336:70): avc: denied { ioctl } for pid=2459 comm="python" name="0" dev=devpts ino=2 scontext=system_u:system_r:hplip_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905967.336:70): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bfafb6c8 a3=bfafb708 items=0 ppid=2458 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python" subj=system_u:system_r:hplip_t:s0 key=(null) type=AVC_PATH msg=audit(1162905967.336:70): path="/dev/pts/0" type=AVC msg=audit(1162905967.336:71): avc: denied { getattr } for pid=2459 comm="python" name="0" dev=devpts ino=2 scontext=system_u:system_r:hplip_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905967.336:71): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfafb6a8 a2=813ff4 a3=81483c items=0 ppid=2458 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python" subj=system_u:system_r:hplip_t:s0 key=(null) type=AVC_PATH msg=audit(1162905967.336:71): path="/dev/pts/0" type=AVC msg=audit(1162905968.076:72): avc: denied { read write } for pid=2472 comm="cupsd" name="0" dev=devpts ino=2 scontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.076:72): arch=40000003 syscall=11 success=yes exit=0 a0=9749c18 a1=974a048 a2=9749f58 a3=97499b0 items=0 ppid=2471 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=system_u:system_r:cupsd_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905968.076:72): path="/dev/pts/0" type=LABEL_LEVEL_CHANGE msg=audit(1162905968.484:73): user pid=2473 uid=0 auid=4294967295 subj=system_u:system_r:cupsd_t:s0-s0:c0.c1023 msg='printer=ML-1740 uri=hal:///org/freedesktop/Hal/devices/usb_device_4e8_324c_2W61BKCX911232K0_if0_printer_noserial banners=none,none range=unknown: exe="/usr/sbin/cupsd" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=? res=success)' type=AVC msg=audit(1162905968.808:74): avc: denied { setfscreate } for pid=2485 comm="cp" scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=SYSCALL msg=audit(1162905968.808:74): arch=40000003 syscall=4 success=yes exit=30 a0=3 a1=9a41088 a2=1e a3=4d02f748 items=0 ppid=2477 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905968.808:75): avc: denied { relabelfrom } for pid=2485 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1162905968.808:75): avc: denied { relabelto } for pid=2485 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162905968.808:75): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=4d02f0d3 a2=9a41088 a3=1e items=0 ppid=2477 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905968.808:76): avc: denied { setattr } for pid=2485 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162905968.808:76): arch=40000003 syscall=271 success=yes exit=0 a0=bf97d034 a1=bf97d09c a2=e1aff4 a3=0 items=0 ppid=2477 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905968.808:77): avc: denied { read write } for pid=2486 comm="sshd" name="0" dev=devpts ino=2 scontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.808:77): arch=40000003 syscall=11 success=yes exit=0 a0=9fa6398 a1=9fa67a0 a2=9fa69c0 a3=9fa3830 items=0 ppid=2477 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905968.808:77): path="/dev/pts/0" type=AVC msg=audit(1162905968.840:78): avc: denied { read write } for pid=2493 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.840:78): arch=40000003 syscall=11 success=yes exit=0 a0=8e03de8 a1=8e03e30 a2=8e03930 a3=8e03d08 items=0 ppid=2492 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905968.840:78): path="/dev/pts/0" type=AVC msg=audit(1162905968.840:79): avc: denied { getattr } for pid=2493 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905968.840:79): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfb27fb0 a2=516ff4 a3=3 items=0 ppid=2492 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905968.840:79): path="/dev/pts/0" type=AVC msg=audit(1162905969.004:80): avc: denied { read write } for pid=2498 comm="xinetd" name="0" dev=devpts ino=2 scontext=system_u:system_r:inetd_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.004:80): arch=40000003 syscall=11 success=yes exit=0 a0=8d06258 a1=8d067f0 a2=8d066c8 a3=8d06128 items=0 ppid=2497 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xinetd" exe="/usr/sbin/xinetd" subj=system_u:system_r:inetd_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.004:80): path="/dev/pts/0" type=AVC msg=audit(1162905969.340:81): avc: denied { read write } for pid=2514 comm="newaliases" name="0" dev=devpts ino=2 scontext=system_u:system_r:sendmail_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.340:81): arch=40000003 syscall=11 success=yes exit=0 a0=8945d70 a1=8941ae0 a2=894cde8 a3=895dcd8 items=0 ppid=2503 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=51 sgid=51 fsgid=51 tty=(none) comm="newaliases" exe="/usr/sbin/sendmail.sendmail" subj=system_u:system_r:sendmail_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.340:81): path="/dev/pts/0" type=AVC msg=audit(1162905969.344:82): avc: denied { getattr } for pid=2514 comm="newaliases" name="0" dev=devpts ino=2 scontext=system_u:system_r:sendmail_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.344:82): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bf95cf00 a2=514ff4 a3=3 items=0 ppid=2503 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=51 sgid=51 fsgid=51 tty=(none) comm="newaliases" exe="/usr/sbin/sendmail.sendmail" subj=system_u:system_r:sendmail_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.344:82): path="/dev/pts/0" type=AVC msg=audit(1162905969.352:83): avc: denied { ioctl } for pid=2514 comm="newaliases" name="0" dev=devpts ino=2 scontext=system_u:system_r:sendmail_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.352:83): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bf95cd88 a3=bf95cdc8 items=0 ppid=2503 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=51 sgid=51 fsgid=51 tty=(none) comm="newaliases" exe="/usr/sbin/sendmail.sendmail" subj=system_u:system_r:sendmail_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.352:83): path="/dev/pts/0" type=AVC msg=audit(1162905969.800:84): avc: denied { read write } for pid=2539 comm="gpm" name="0" dev=devpts ino=2 scontext=system_u:system_r:gpm_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.800:84): arch=40000003 syscall=11 success=yes exit=0 a0=9da1d30 a1=9da2180 a2=9da2078 a3=9da1af0 items=0 ppid=2538 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="gpm" exe="/usr/sbin/gpm" subj=system_u:system_r:gpm_t:s0 key=(null) type=AVC_PATH msg=audit(1162905969.800:84): path="/dev/pts/0" type=AVC msg=audit(1162905969.828:85): avc: denied { read write } for pid=2550 comm="crond" name="0" dev=devpts ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905969.828:85): arch=40000003 syscall=11 success=yes exit=0 a0=9c3bc18 a1=9c3c048 a2=9c3bf58 a3=9c3b9b0 items=0 ppid=2549 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="crond" exe="/usr/sbin/crond" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905969.828:85): path="/dev/pts/0" type=AVC msg=audit(1162905970.036:86): avc: denied { ioctl } for pid=1460 comm="Xorg" name="nvidia0" dev=tmpfs ino=1535 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file type=AVC msg=audit(1162905970.040:87): avc: denied { read write } for pid=1460 comm="Xorg" name="nvidia0" dev=tmpfs ino=1535 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file type=AVC msg=audit(1162905970.784:88): avc: denied { read write } for pid=2587 comm="xfs" name="0" dev=devpts ino=2 scontext=system_u:system_r:xfs_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.784:88): arch=40000003 syscall=11 success=yes exit=0 a0=a0e4b00 a1=a0e50f8 a2=a0e4ff8 a3=a0e4a70 items=0 ppid=2586 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xfs" exe="/usr/bin/xfs" subj=system_u:system_r:xfs_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.784:88): path="/dev/pts/0" type=AVC msg=audit(1162905970.848:89): avc: denied { read write } for pid=2598 comm="anacron" name="0" dev=devpts ino=2 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.848:89): arch=40000003 syscall=11 success=yes exit=0 a0=9e58d88 a1=9e59090 a2=9e58fa0 a3=9e58a18 items=0 ppid=2597 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.848:89): path="/dev/pts/0" type=AVC msg=audit(1162905970.936:90): avc: denied { ioctl } for pid=2598 comm="anacron" name="0" dev=devpts ino=2 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.936:90): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5422 a2=0 a3=2 items=0 ppid=2597 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.936:90): path="/dev/pts/0" type=AVC msg=audit(1162905970.936:91): avc: denied { write } for pid=2599 comm="anacron" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162905970.936:91): avc: denied { add_name } for pid=2599 comm="anacron" name="anacron.pid" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162905970.936:91): avc: denied { create } for pid=2599 comm="anacron" name="anacron.pid" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1162905970.936:91): arch=40000003 syscall=5 success=yes exit=3 a0=804c925 a1=241 a2=1b6 a3=8269020 items=0 ppid=2598 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162905970.936:92): avc: denied { write } for pid=2599 comm="anacron" name="anacron.pid" dev=dm-0 ino=14437020 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1162905970.936:92): arch=40000003 syscall=4 success=yes exit=4 a0=3 a1=b7fe7000 a2=4 a3=4 items=0 ppid=2598 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162905970.936:92): path="/var/run/anacron.pid" type=AVC msg=audit(1162905970.964:93): avc: denied { read write } for pid=2608 comm="atd" name="0" dev=devpts ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905970.964:93): arch=40000003 syscall=11 success=yes exit=0 a0=9823a80 a1=9823f78 a2=9823e80 a3=9823a00 items=0 ppid=2607 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="atd" exe="/usr/sbin/atd" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162905970.964:93): path="/dev/pts/0" type=AVC msg=audit(1162905971.144:94): avc: denied { read write } for pid=2670 comm="readahead" name="0" dev=devpts ino=2 scontext=system_u:system_r:readahead_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905971.144:94): arch=40000003 syscall=11 success=yes exit=0 a0=88ca0d0 a1=88c9f98 a2=88d4658 a3=88c82f8 items=0 ppid=1 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readahead" exe="/usr/sbin/readahead" subj=system_u:system_r:readahead_t:s0 key=(null) type=AVC_PATH msg=audit(1162905971.144:94): path="/dev/pts/0" type=AVC msg=audit(1162905971.252:95): avc: denied { getattr } for pid=2670 comm="readahead" name="0" dev=devpts ino=2 scontext=system_u:system_r:readahead_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905971.252:95): arch=40000003 syscall=195 success=yes exit=0 a0=bfa53aa4 a1=bfa53980 a2=40bff4 a3=3 items=0 ppid=1 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readahead" exe="/usr/sbin/readahead" subj=system_u:system_r:readahead_t:s0 key=(null) type=AVC_PATH msg=audit(1162905971.252:95): path="/dev/pts/0" type=AVC msg=audit(1162905971.360:96): avc: denied { setattr } for pid=2678 comm="cp" name="localtime" dev=dm-0 ino=9330774 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162905971.360:96): arch=40000003 syscall=271 success=yes exit=0 a0=bfda1c54 a1=bfda1cbc a2=248ff4 a3=0 items=0 ppid=2673 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cp" exe="/bin/cp" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC msg=audit(1162905971.360:97): avc: denied { read write } for pid=2679 comm="avahi-daemon" name="0" dev=devpts ino=2 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905971.360:97): arch=40000003 syscall=11 success=yes exit=0 a0=85e3370 a1=85e35d0 a2=85eb8f8 a3=85e3168 items=0 ppid=2673 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="avahi-daemon" exe="/usr/sbin/avahi-daemon" subj=system_u:system_r:avahi_t:s0 key=(null) type=AVC_PATH msg=audit(1162905971.360:97): path="/dev/pts/0" type=AVC msg=audit(1162905974.672:98): avc: denied { read write } for pid=2705 comm="hald" name="0" dev=devpts ino=2 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905974.672:98): arch=40000003 syscall=11 success=yes exit=0 a0=82c4c18 a1=82c5048 a2=82c4f58 a3=82c49b0 items=0 ppid=2704 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="hald" exe="/usr/sbin/hald" subj=system_u:system_r:hald_t:s0 key=(null) type=AVC_PATH msg=audit(1162905974.672:98): path="/dev/pts/0" type=AVC msg=audit(1162905977.128:99): avc: denied { accept } for pid=1460 comm="Xorg" lport=6009 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:system_r:rhgb_t:s0 tclass=tcp_socket type=AVC msg=audit(1162905977.216:100): avc: denied { write } for pid=2718 comm="xkbcomp" name="xkb" dev=dm-0 ino=14437298 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162905977.216:100): avc: denied { add_name } for pid=2718 comm="xkbcomp" name="server-9.xkm" scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162905977.216:100): avc: denied { create } for pid=2718 comm="xkbcomp" name="server-9.xkm" scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162905977.216:100): arch=40000003 syscall=5 success=yes exit=0 a0=bfdc3efe a1=c1 a2=1b6 a3=2494c0 items=0 ppid=1460 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty8 comm="xkbcomp" exe="/usr/bin/xkbcomp" subj=system_u:system_r:rhgb_t:s0 key=(null) type=AVC msg=audit(1162905977.216:101): avc: denied { write } for pid=2718 comm="xkbcomp" name="server-9.xkm" dev=dm-0 ino=14437174 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162905977.216:101): arch=40000003 syscall=4 success=yes exit=4096 a0=0 a1=b7f0f000 a2=1000 a3=1000 items=0 ppid=1460 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty8 comm="xkbcomp" exe="/usr/bin/xkbcomp" subj=system_u:system_r:rhgb_t:s0 key=(null) type=AVC_PATH msg=audit(1162905977.216:101): path="/var/lib/xkb/server-9.xkm" type=AVC msg=audit(1162905977.216:102): avc: denied { remove_name } for pid=1460 comm="Xorg" name="server-9.xkm" dev=dm-0 ino=14437174 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162905977.216:103): avc: denied { unlink } for pid=1460 comm="Xorg" name="server-9.xkm" dev=dm-0 ino=14437174 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=AVC msg=audit(1162905980.961:104): avc: denied { read write } for pid=2765 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905980.961:104): arch=40000003 syscall=11 success=yes exit=0 a0=96c5d70 a1=96c5db8 a2=96c58e8 a3=96c5c90 items=0 ppid=2764 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905980.961:104): path="/dev/pts/0" type=AVC msg=audit(1162905980.961:105): avc: denied { getattr } for pid=2765 comm="consoletype" name="0" dev=devpts ino=2 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905980.961:105): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfa696f0 a2=b97ff4 a3=3 items=0 ppid=2764 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="consoletype" exe="/sbin/consoletype" subj=system_u:system_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1162905980.961:105): path="/dev/pts/0" type=AVC msg=audit(1162905980.977:106): avc: denied { read write } for pid=2770 comm="NetworkManager" name="0" dev=devpts ino=2 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905980.977:106): arch=40000003 syscall=11 success=yes exit=0 a0=90ebe88 a1=90ec2d0 a2=90ec198 a3=90ebad8 items=0 ppid=2769 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=system_u:system_r:NetworkManager_t:s0 key=(null) type=AVC_PATH msg=audit(1162905980.977:106): path="/dev/pts/0" type=AVC msg=audit(1162905982.669:107): avc: denied { read write } for pid=2796 comm="smartd" name="0" dev=devpts ino=2 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:rhgb_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162905982.669:107): arch=40000003 syscall=11 success=yes exit=0 a0=8db3ba8 a1=8db3ff8 a2=8db3ef8 a3=8db3a78 items=0 ppid=2795 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="smartd" exe="/usr/sbin/smartd" subj=system_u:system_r:fsdaemon_t:s0 key=(null) type=AVC_PATH msg=audit(1162905982.669:107): path="/dev/pts/0" type=AVC msg=audit(1162905985.521:108): avc: denied { ioctl } for pid=1460 comm="Xorg" name="nvidiactl" dev=tmpfs ino=1545 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file type=AVC msg=audit(1162905985.569:109): avc: denied { write } for pid=1460 comm="Xorg" name="00.0" dev=proc ino=-268435022 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=AVC msg=audit(1162905985.573:110): avc: denied { chown } for pid=1460 comm="Xorg" capability=0 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:system_r:rhgb_t:s0 tclass=capability type=AVC msg=audit(1162905985.573:111): avc: denied { setattr } for pid=1460 comm="Xorg" name="tty0" dev=tmpfs ino=761 scontext=system_u:system_r:rhgb_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=USER_ERR msg=audit(1162905989.541:112): user pid=2827 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: bad_ident acct=? : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=console res=failed)' type=USER_AUTH msg=audit(1162906001.198:113): user pid=2934 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1162906001.206:114): user pid=2934 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1162906001.206:115): user pid=2934 uid=0 auid=4294967295 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1162906001.210:116): login pid=2934 uid=0 old auid=4294967295 new auid=500 type=USER_START msg=audit(1162906001.254:117): user pid=2934 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1162906001.254:118): user pid=2934 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1162906001.634:119): avc: denied { read } for pid=2965 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906001.634:119): arch=40000003 syscall=5 success=yes exit=9 a0=80865d5 a1=0 a2=1 a3=a items=0 ppid=2934 pid=2965 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906001.654:120): avc: denied { getattr } for pid=2965 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906001.654:120): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bffc5400 a2=82dff4 a3=3 items=0 ppid=2934 pid=2965 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906001.654:120): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162906001.670:121): avc: denied { read } for pid=2978 comm="xrdb" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906001.670:121): arch=40000003 syscall=33 success=yes exit=0 a0=bfaeffce a1=4 a2=4db18a64 a3=bfaeffce items=0 ppid=2965 pid=2978 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906001.974:122): avc: denied { getattr } for pid=3019 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1162906001.974:122): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bff14d8c a2=493ff4 a3=ffffffb8 items=0 ppid=3018 pid=3019 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162906001.974:123): avc: denied { search } for pid=3019 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162906001.974:123): avc: denied { search } for pid=3019 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162906001.974:123): arch=40000003 syscall=5 success=no exit=-2 a0=8eddb98 a1=18800 a2=36025c a3=bff14ec8 items=0 ppid=3018 pid=3019 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162906003.926:124): avc: denied { write } for pid=2965 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906003.926:124): avc: denied { add_name } for pid=2965 comm="gnome-session" name="2965" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906003.926:124): avc: denied { create } for pid=2965 comm="gnome-session" name="2965" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906003.926:124): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf9ce660 a2=4dc5d770 a3=0 items=0 ppid=2934 pid=2965 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906004.018:125): avc: denied { read write } for pid=3029 comm="gnome-settings-" name="[11958]" dev=sockfs ino=11958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162906004.018:125): arch=40000003 syscall=11 success=yes exit=0 a0=8ee4b88 a1=8ee4430 a2=8ee4d68 a3=b items=0 ppid=3028 pid=3029 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906004.018:125): path="socket:[11958]" type=AVC msg=audit(1162906004.602:126): avc: denied { read } for pid=3029 comm="gnome-settings-" name="resolv.conf" dev=dm-0 ino=9330746 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162906004.602:126): arch=40000003 syscall=5 success=yes exit=21 a0=581d13 a1=0 a2=1b6 a3=9ddb1c8 items=0 ppid=3028 pid=3029 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906004.734:127): avc: denied { read } for pid=3037 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162906004.734:127): arch=40000003 syscall=5 success=yes exit=14 a0=99dd258 a1=0 a2=1b6 a3=99dd278 items=0 ppid=1 pid=3037 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906005.982:128): avc: denied { write } for pid=3056 comm="metacity" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906005.982:128): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe71c10 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3056 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906006.202:129): avc: denied { sigchld } for pid=3073 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1162906006.202:129): arch=40000003 syscall=7 success=yes exit=0 a0=c02 a1=bff14918 a2=1 a3=c02 items=0 ppid=3021 pid=3073 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1162906006.414:130): avc: denied { execute } for pid=3080 comm="beagle-search" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906006.414:130): arch=40000003 syscall=33 success=yes exit=0 a0=8e8db10 a1=1 a2=11 a3=8e8db10 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906006.414:131): avc: denied { read } for pid=3080 comm="beagle-search" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906006.414:131): arch=40000003 syscall=33 success=yes exit=0 a0=8e8db10 a1=4 a2=ffffffff a3=8e8db10 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906006.414:132): avc: denied { execute_no_trans } for pid=3080 comm="beagle-search" name="mono" dev=dm-0 ino=10323612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906006.414:132): arch=40000003 syscall=11 success=yes exit=0 a0=8e8d928 a1=8e8daf8 a2=8e8e200 a3=8e8daf8 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906006.414:132): path="/usr/bin/mono" type=AVC msg=audit(1162906006.718:133): avc: denied { execheap } for pid=3080 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162906006.718:133): avc: denied { execmem } for pid=3080 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162906006.718:133): arch=40000003 syscall=125 success=yes exit=0 a0=9fec000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=3080 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906008.014:134): avc: denied { ioctl } for pid=3112 comm="pam_timestamp_c" name="[11821]" dev=pipefs ino=11821 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162906008.014:134): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfe86abc a3=bfe86afc items=0 ppid=3106 pid=3112 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162906008.014:134): path="pipe:[11821]" type=AVC msg=audit(1162906008.338:135): avc: denied { execheap } for pid=3111 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162906008.338:135): avc: denied { execmem } for pid=3111 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162906008.338:135): arch=40000003 syscall=125 success=yes exit=0 a0=994f000 a1=1000 a2=7 a3=1 items=0 ppid=3093 pid=3111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906010.194:136): avc: denied { read } for pid=3087 comm="sealert" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906010.194:136): arch=40000003 syscall=33 success=yes exit=0 a0=bf82ce56 a1=4 a2=4db18a64 a3=bf82ce56 items=0 ppid=1 pid=3087 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sealert" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906018.299:137): avc: denied { read } for pid=3111 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162906018.299:137): arch=40000003 syscall=5 success=yes exit=24 a0=f0733c a1=0 a2=1 a3=9ad4110 items=0 ppid=1 pid=3111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906035.312:138): avc: denied { write } for pid=3159 comm="nm-vpnc-auth-di" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906035.312:138): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfef76b0 a2=4dc5d770 a3=15 items=0 ppid=3098 pid=3159 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906041.868:139): avc: denied { read write } for pid=3191 comm="notification-da" name="[11958]" dev=sockfs ino=11958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162906041.868:139): arch=40000003 syscall=11 success=yes exit=0 a0=8ef6540 a1=8eea710 a2=8ef66c8 a3=15 items=0 ppid=3190 pid=3191 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="notification-da" exe="/usr/libexec/notification-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906041.868:139): path="socket:[11958]" type=AVC msg=audit(1162906044.868:140): avc: denied { read } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906044.868:140): arch=40000003 syscall=33 success=yes exit=0 a0=bffb3fcb a1=4 a2=4db18a64 a3=bffb3fcb items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162906044.868:141): avc: denied { getattr } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906044.868:141): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bffb1b4c a2=f64ff4 a3=8f15140 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162906044.868:141): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162906050.593:142): avc: denied { search } for pid=3205 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162906050.593:142): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bf99bfe8 a2=fb4ff4 a3=3 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.597:143): avc: denied { read } for pid=3205 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.597:143): arch=40000003 syscall=33 success=yes exit=0 a0=bf99edff a1=4 a2=4db18a64 a3=bf99edff items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.597:144): avc: denied { getattr } for pid=3205 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.597:144): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf99bf1c a2=fb4ff4 a3=9602730 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906050.597:144): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162906050.609:145): avc: denied { search } for pid=3205 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906050.609:145): avc: denied { write } for pid=3205 comm="evolution" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906050.609:145): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf99c020 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.609:146): avc: denied { read } for pid=3205 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.609:146): arch=40000003 syscall=33 success=yes exit=0 a0=9618218 a1=4 a2=4dc5d770 a3=9618218 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906050.609:147): avc: denied { getattr } for pid=3205 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906050.609:147): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf99c0bc a2=fb4ff4 a3=9618af8 items=0 ppid=1 pid=3205 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906050.609:147): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162906053.301:148): avc: denied { read } for pid=3207 comm="xchat" name="resolv.conf" dev=dm-0 ino=9334542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.301:148): arch=40000003 syscall=5 success=yes exit=9 a0=432d13 a1=0 a2=1b6 a3=9b48c68 items=0 ppid=3203 pid=3207 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906053.377:149): avc: denied { write } for pid=3214 comm="evolution-data-" name="[13401]" dev=pipefs ino=13401 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906053.377:149): arch=40000003 syscall=11 success=yes exit=0 a0=833e808 a1=833e478 a2=833e4d0 a3=0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.377:149): path="pipe:[13401]" type=AVC msg=audit(1162906053.497:150): avc: denied { read } for pid=3214 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.497:150): arch=40000003 syscall=5 success=yes exit=3 a0=6a29dc a1=0 a2=0 a3=0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.497:151): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.497:151): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf841ebc a2=6b9ff4 a3=3 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.497:151): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1162906053.501:152): avc: denied { getsched } for pid=3214 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162906053.501:152): arch=40000003 syscall=155 success=yes exit=0 a0=c8e a1=b7f858dc a2=12bff4 a3=b7f856d0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:153): avc: denied { search } for pid=3214 comm="evolution-data-" name="locale" dev=dm-0 ino=10311905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1162906053.501:153): avc: denied { read } for pid=3214 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:153): arch=40000003 syscall=5 success=yes exit=3 a0=4df2984c a1=8000 a2=1b6 a3=8ea7480 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:154): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:154): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8423e8 a2=6b9ff4 a3=8ea7480 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:154): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1162906053.501:155): avc: denied { read } for pid=3214 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:155): arch=40000003 syscall=5 success=yes exit=3 a0=6a2a00 a1=8000 a2=1 a3=bf8423b0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:156): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.501:156): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=6baaa0 a2=6b9ff4 a3=bf8423b0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:156): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1162906053.501:157): avc: denied { read } for pid=3214 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:157): arch=40000003 syscall=5 success=yes exit=9 a0=8ea95a8 a1=18800 a2=bdefc0 a3=8ea95a8 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:158): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:158): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf8424cc a2=6b9ff4 a3=9 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:158): path="/tmp" type=AVC msg=audit(1162906053.501:159): avc: denied { search } for pid=3214 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.501:159): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:159): arch=40000003 syscall=195 success=yes exit=0 a0=8ea9a68 a1=bf842510 a2=6b9ff4 a3=3 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:159): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162906053.501:160): avc: denied { setattr } for pid=3214 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906053.501:160): arch=40000003 syscall=30 success=yes exit=0 a0=8ea9a90 a1=bf842564 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:161): avc: denied { read } for pid=3214 comm="evolution-data-" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906053.501:161): arch=40000003 syscall=5 success=yes exit=9 a0=4def9880 a1=8000 a2=1b6 a3=8eaa800 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.501:162): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906053.501:162): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf8424ec a2=6b9ff4 a3=8eaa800 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:162): path="/dev/urandom" type=AVC msg=audit(1162906053.501:163): avc: denied { ioctl } for pid=3214 comm="evolution-data-" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906053.501:163): arch=40000003 syscall=54 success=no exit=-22 a0=9 a1=5401 a2=bf84244c a3=bf84248c items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.501:163): path="/dev/urandom" type=AVC msg=audit(1162906053.505:164): avc: denied { search } for pid=3214 comm="evolution-data-" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.505:164): avc: denied { read } for pid=3214 comm="evolution-data-" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.505:164): arch=40000003 syscall=5 success=yes exit=9 a0=8eabe38 a1=0 a2=1b6 a3=8eabe60 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.505:165): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.505:165): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf841b78 a2=6b9ff4 a3=8eabe60 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.505:165): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162906053.505:166): avc: denied { write } for pid=3214 comm="evolution-data-" name="linc-bd0-0-6f75742e134f6" dev=dm-0 ino=14567714 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162906053.505:166): avc: denied { connectto } for pid=3214 comm="evolution-data-" name="linc-bd0-0-6f75742e134f6" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906053.505:166): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf842290 a2=4e570f80 a3=0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.505:166): path="/tmp/orbit-kmacmill/linc-bd0-0-6f75742e134f6" type=AVC msg=audit(1162906053.505:167): avc: denied { write } for pid=3214 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.505:167): avc: denied { add_name } for pid=3214 comm="evolution-data-" name="linc-c8e-0-2f6d638e7c118" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906053.505:167): avc: denied { create } for pid=3214 comm="evolution-data-" name="linc-c8e-0-2f6d638e7c118" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906053.505:167): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf8422d0 a2=4e570f80 a3=b7f8569c items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.505:168): avc: denied { connectto } for pid=3024 comm="gconfd-2" name="linc-c8e-0-2f6d638e7c118" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906053.505:168): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf902a90 a2=4e570f80 a3=0 items=0 ppid=1 pid=3024 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.505:168): path="/tmp/orbit-kmacmill/linc-c8e-0-2f6d638e7c118" type=AVC msg=audit(1162906053.837:169): avc: denied { write } for pid=3214 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.837:169): arch=40000003 syscall=5 success=yes exit=16 a0=8eb28b8 a1=42 a2=1c0 a3=8eb28b8 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906053.837:170): avc: denied { lock } for pid=3214 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906053.837:170): arch=40000003 syscall=221 success=yes exit=0 a0=10 a1=7 a2=bf84252c a3=bf84252c items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906053.837:170): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162906054.041:171): avc: denied { getattr } for pid=3214 comm="evolution-data-" name="[13401]" dev=pipefs ino=13401 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906054.041:171): arch=40000003 syscall=197 success=yes exit=0 a0=1d a1=bf842564 a2=6b9ff4 a3=8ebfca0 items=0 ppid=1 pid=3214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1162906054.041:171): path="pipe:[13401]" type=USER_AVC msg=audit(1162906057.949:172): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=3205 tpid=2771 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162906057.949:173): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.22 spid=2771 tpid=3205 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162906057.997:174): avc: denied { create } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906057.997:174): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b184f274 a2=fb4ff4 a3=8cfd7f items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906057.997:175): avc: denied { bind } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906057.997:175): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b184f274 a2=fb4ff4 a3=23 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906057.997:176): avc: denied { getattr } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906057.997:176): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b184f274 a2=fb4ff4 a3=23 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906058.001:177): avc: denied { write } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162906058.001:177): avc: denied { nlmsg_read } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906058.001:177): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b184e1b4 a2=fb4ff4 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906058.001:178): avc: denied { read } for pid=3226 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162906058.001:178): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b184e1b4 a2=fb4ff4 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906058.001:179): avc: denied { search } for pid=3226 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162906058.001:179): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=b184ee74 a2=fb4ff4 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162906060.209:180): avc: denied { write } for pid=3239 comm="evolution-alarm" name="[13479]" dev=pipefs ino=13479 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906060.209:180): arch=40000003 syscall=11 success=yes exit=0 a0=833fbc0 a1=8346628 a2=83477f8 a3=0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.209:180): path="pipe:[13479]" type=AVC msg=audit(1162906060.433:181): avc: denied { read } for pid=3239 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:181): arch=40000003 syscall=5 success=yes exit=3 a0=bf922090 a1=0 a2=0 a3=bf922090 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.433:182): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:182): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf9220e4 a2=daafc0 a3=4 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.433:182): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162906060.433:183): avc: denied { execute } for pid=3239 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=14174689 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:183): arch=40000003 syscall=192 success=yes exit=1297682432 a0=4d591000 a1=33cd0 a2=5 a3=802 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.433:183): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1162906060.433:184): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:184): arch=40000003 syscall=5 success=yes exit=3 a0=da8037 a1=0 a2=dab650 a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.433:185): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.433:185): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf921fd8 a2=daafc0 a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.433:185): path="/etc/ld.so.cache" type=AVC msg=audit(1162906060.673:186): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ld-2.5.90.so" dev=dm-0 ino=13716563 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.673:186): arch=40000003 syscall=125 success=yes exit=0 a0=daa000 a1=1000 a2=1 a3=380 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.673:186): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1162906060.677:187): avc: denied { getsched } for pid=3239 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1162906060.677:187): arch=40000003 syscall=155 success=yes exit=0 a0=ca7 a1=b7f8daec a2=ba4ff4 a3=b7f8d8e0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.677:188): avc: denied { read } for pid=3239 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:188): arch=40000003 syscall=5 success=yes exit=3 a0=2c3e3d a1=0 a2=1b6 a3=87b3a00 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.677:189): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9330856 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:189): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf9221c8 a2=2dbff4 a3=87b3a00 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.677:189): path="/etc/nsswitch.conf" type=AVC msg=audit(1162906060.677:190): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:190): arch=40000003 syscall=5 success=yes exit=3 a0=da8037 a1=0 a2=2a a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.677:191): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=user_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.677:191): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf921c58 a2=daafc0 a3=ffffffff items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.677:191): path="/etc/ld.so.cache" type=AVC msg=audit(1162906060.681:192): avc: denied { read } for pid=3239 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.681:192): arch=40000003 syscall=5 success=yes exit=3 a0=bf91e168 a1=0 a2=1b6 a3=87bb280 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.681:193): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=10379454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.681:193): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf91dd88 a2=2dbff4 a3=87bb280 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.681:193): path="/usr/share/X11/locale/locale.alias" type=AVC msg=audit(1162906060.685:194): avc: denied { read } for pid=3239 comm="evolution-alarm" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:194): arch=40000003 syscall=33 success=yes exit=0 a0=bf924b68 a1=4 a2=4db18a64 a3=bf924b68 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.685:195): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:195): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf92201c a2=2dbff4 a3=87be6c0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.685:195): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162906060.685:196): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ISO8859-1.so" dev=dm-0 ino=10387600 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:196): arch=40000003 syscall=5 success=yes exit=4 a0=87cd8d0 a1=0 a2=87cd8c8 a3=87cd8d0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.685:197): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ISO8859-1.so" dev=dm-0 ino=10387600 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:197): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf921bcc a2=daafc0 a3=5 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.685:197): path="/usr/lib/gconv/ISO8859-1.so" type=AVC msg=audit(1162906060.685:198): avc: denied { execute } for pid=3239 comm="evolution-alarm" name="ISO8859-1.so" dev=dm-0 ino=10387600 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.685:198): arch=40000003 syscall=192 success=yes exit=12324864 a0=0 a1=2014 a2=5 a3=802 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.685:198): path="/usr/lib/gconv/ISO8859-1.so" type=AVC msg=audit(1162906060.689:199): avc: denied { read } for pid=3239 comm="evolution-alarm" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.689:199): arch=40000003 syscall=5 success=yes exit=10 a0=87b3700 a1=18800 a2=daafc0 a3=87b3700 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.689:200): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.689:200): arch=40000003 syscall=195 success=yes exit=0 a0=87d1250 a1=bf922680 a2=2dbff4 a3=3 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.689:200): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1162906060.689:201): avc: denied { setattr } for pid=3239 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.689:201): arch=40000003 syscall=30 success=yes exit=0 a0=87d0230 a1=bf9226d4 a2=4e570f80 a3=1f4 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.689:202): avc: denied { read } for pid=3239 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906060.689:202): arch=40000003 syscall=5 success=yes exit=10 a0=4def9880 a1=8000 a2=1b6 a3=87d02a8 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.689:203): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906060.689:203): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bf92265c a2=2dbff4 a3=87d02a8 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.689:203): path="/dev/urandom" type=AVC msg=audit(1162906060.689:204): avc: denied { ioctl } for pid=3239 comm="evolution-alarm" name="urandom" dev=tmpfs ino=2054 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162906060.689:204): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bf9225bc a3=bf9225fc items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.689:204): path="/dev/urandom" type=AVC msg=audit(1162906060.693:205): avc: denied { read } for pid=3239 comm="evolution-alarm" name="modules" dev=dm-0 ino=9331073 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162906060.693:205): arch=40000003 syscall=5 success=yes exit=10 a0=87d1618 a1=18800 a2=4dea3d07 a3=87d1618 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.693:206): avc: denied { search } for pid=3239 comm="evolution-alarm" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.693:206): avc: denied { write } for pid=3239 comm="evolution-alarm" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1162906060.693:206): avc: denied { connectto } for pid=3239 comm="evolution-alarm" name="2965" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906060.693:206): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9220d0 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.693:206): path="/tmp/.ICE-unix/2965" type=AVC msg=audit(1162906060.693:207): avc: denied { read } for pid=3239 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.693:207): arch=40000003 syscall=33 success=yes exit=0 a0=87d3fa0 a1=4 a2=4dc5d770 a3=87d3fa0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.693:208): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.693:208): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf92216c a2=2dbff4 a3=87d4880 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.693:208): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162906060.697:209): avc: denied { search } for pid=3239 comm="evolution-alarm" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.697:209): avc: denied { read } for pid=3239 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.697:209): arch=40000003 syscall=5 success=yes exit=11 a0=87d7728 a1=0 a2=1b6 a3=87d7770 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.697:210): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="ior" dev=dm-0 ino=15648171 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906060.697:210): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf921c88 a2=2dbff4 a3=87d7770 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.697:210): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1162906060.697:211): avc: denied { write } for pid=3239 comm="evolution-alarm" name="linc-bd0-0-6f75742e134f6" dev=dm-0 ino=14567714 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906060.697:211): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9223a0 a2=4e570f80 a3=0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.697:212): avc: denied { write } for pid=3239 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.697:212): avc: denied { add_name } for pid=3239 comm="evolution-alarm" name="linc-ca7-0-6fcffd09ab5a6" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162906060.697:212): avc: denied { create } for pid=3239 comm="evolution-alarm" name="linc-ca7-0-6fcffd09ab5a6" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162906060.697:212): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf9223e0 a2=4e570f80 a3=b7f8d8ac items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906060.697:213): avc: denied { connectto } for pid=3024 comm="gconfd-2" name="linc-ca7-0-6fcffd09ab5a6" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906060.697:213): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf902a90 a2=4e570f80 a3=0 items=0 ppid=1 pid=3024 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162906060.697:213): path="/tmp/orbit-kmacmill/linc-ca7-0-6fcffd09ab5a6" type=AVC msg=audit(1162906061.066:214): avc: denied { read } for pid=3239 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.066:214): arch=40000003 syscall=5 success=yes exit=18 a0=2c399a a1=0 a2=1b6 a3=87efe98 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906061.066:215): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.066:215): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bf91defc a2=2dbff4 a3=87efe98 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906061.066:215): path="/proc/meminfo" type=AVC msg=audit(1162906061.066:216): avc: denied { connectto } for pid=3239 comm="evolution-alarm" path=002F746D702F646275732D6E6948324A5970414645 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162906061.066:216): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf922200 a2=a04494 a3=0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906061.078:217): avc: denied { write } for pid=3239 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.078:217): arch=40000003 syscall=5 success=yes exit=19 a0=87fdba0 a1=42 a2=1c0 a3=87fdba0 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1162906061.078:218): avc: denied { lock } for pid=3239 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567725 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906061.078:218): arch=40000003 syscall=221 success=yes exit=0 a0=13 a1=7 a2=bf9222ac a3=bf9222ac items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906061.078:218): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1162906061.122:219): avc: denied { signal } for pid=3243 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1162906061.122:219): arch=40000003 syscall=270 success=yes exit=0 a0=c8e a1=c8f a2=21 a3=b7d84bd0 items=0 ppid=1 pid=3243 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162906061.126:220): avc: denied { getattr } for pid=3239 comm="evolution-alarm" name="[13479]" dev=pipefs ino=13479 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162906061.126:220): arch=40000003 syscall=197 success=yes exit=0 a0=1e a1=bf922674 a2=2dbff4 a3=8806300 items=0 ppid=1 pid=3239 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1162906061.126:220): path="pipe:[13479]" type=AVC msg=audit(1162906080.663:221): avc: denied { execheap } for pid=3276 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1162906080.663:221): avc: denied { execmem } for pid=3276 comm="beagled" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162906080.663:221): arch=40000003 syscall=125 success=yes exit=0 a0=9bba000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=3276 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162906121.825:222): avc: denied { execute } for pid=3302 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162906121.825:222): avc: denied { execute_no_trans } for pid=3302 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162906121.825:222): avc: denied { read } for pid=3302 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906121.825:222): arch=40000003 syscall=11 success=yes exit=0 a0=81a18b8 a1=81a3928 a2=81a4120 a3=81a3928 items=0 ppid=1 pid=3302 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906121.825:222): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162906121.825:222): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162906121.837:223): avc: denied { getattr } for pid=3302 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906121.837:223): arch=40000003 syscall=196 success=yes exit=0 a0=bfdf2d18 a1=bfdf280c a2=248ff4 a3=bfdf4a05 items=0 ppid=1 pid=3302 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162906121.837:223): path="/usr/lib/firefox-2.0/firefox-bin" type=USER_ACCT msg=audit(1162906202.054:224): user pid=3313 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162906202.054:225): login pid=3313 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162906202.054:226): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162906202.054:227): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906202.058:228): avc: denied { execute } for pid=3314 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162906202.058:228): avc: denied { execute_no_trans } for pid=3314 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.058:228): arch=40000003 syscall=11 success=yes exit=0 a0=87a11b0 a1=87a1358 a2=87a1290 a3=87a1008 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.058:228): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162906202.086:229): avc: denied { execute } for pid=3314 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906202.086:229): avc: denied { execute_no_trans } for pid=3314 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906202.086:229): avc: denied { read } for pid=3314 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.086:229): arch=40000003 syscall=11 success=yes exit=0 a0=8f54d48 a1=8f54740 a2=8f54d60 a3=8f54740 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.086:229): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162906202.086:229): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162906202.090:230): avc: denied { search } for pid=3314 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162906202.090:230): avc: denied { read } for pid=3314 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:230): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8eaf800 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:231): avc: denied { getattr } for pid=3314 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:231): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8b91e8 a2=248ff4 a3=8eaf800 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.090:231): path="/proc/net/dev" type=AVC msg=audit(1162906202.090:232): avc: denied { search } for pid=3314 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162906202.090:232): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b9594 a1=0 a2=bf8b9488 a3=bf8b9490 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:233): avc: denied { read append } for pid=3314 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:233): arch=40000003 syscall=5 success=yes exit=3 a0=bf8b9594 a1=402 a2=bf8b9758 a3=bf8b9490 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:234): avc: denied { search } for pid=3314 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162906202.090:234): avc: denied { read } for pid=3314 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:234): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8eafdf0 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:235): avc: denied { getattr } for pid=3314 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:235): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf8b9044 a2=248ff4 a3=8eafdf0 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.090:235): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162906202.090:236): avc: denied { search } for pid=3314 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162906202.090:236): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8eafdf0 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162906202.090:237): avc: denied { lock } for pid=3314 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162906202.090:237): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf8b9490 a3=3 items=0 ppid=3313 pid=3314 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906202.090:237): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162906202.122:238): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162906202.122:239): user pid=3313 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906204.526:240): avc: denied { getattr } for pid=2322 comm="setroubleshootd" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162906204.526:240): arch=40000003 syscall=195 success=yes exit=0 a0=b7a69150 a1=b7a69194 a2=f18ff4 a3=b7a69159 items=0 ppid=1 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="setroubleshootd" exe="/usr/bin/python" subj=system_u:system_r:setroubleshootd_t:s0 key=(null) type=AVC_PATH msg=audit(1162906204.526:240): path="/proc/net" type=USER_ACCT msg=audit(1162906801.188:241): user pid=3389 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162906801.188:242): login pid=3389 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162906801.188:243): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162906801.188:244): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906801.192:245): avc: denied { execute } for pid=3390 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906801.192:245): avc: denied { execute_no_trans } for pid=3390 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162906801.192:245): avc: denied { read } for pid=3390 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162906801.192:245): arch=40000003 syscall=11 success=yes exit=0 a0=8948d48 a1=8948740 a2=8948d60 a3=8948740 items=0 ppid=3389 pid=3390 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162906801.192:245): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162906801.192:245): path="/usr/lib/sa/sadc" type=CRED_DISP msg=audit(1162906801.204:246): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162906801.204:247): user pid=3389 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162906994.496:248): avc: denied { search } for pid=3434 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162906994.496:248): avc: denied { search } for pid=3434 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162906994.496:248): arch=40000003 syscall=33 success=no exit=-2 a0=96c69f8 a1=4 a2=814bbc a3=96c69c8 items=0 ppid=3205 pid=3434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162906994.700:249): avc: denied { search } for pid=3434 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162906994.700:249): avc: denied { read } for pid=3434 comm="gpg" name="evolution-pgp.M0FTIT" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162906994.700:249): arch=40000003 syscall=5 success=yes exit=3 a0=bf9efb1a a1=8000 a2=0 a3=8000 items=0 ppid=3205 pid=3434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162907008.873:250): avc: denied { search } for pid=3439 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162907008.873:250): avc: denied { write } for pid=3439 comm="evolution-data-" name="linc-c85-0-25367ec497172" dev=dm-0 ino=14567744 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162907008.873:250): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b5f3fe70 a2=4e570f80 a3=0 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:251): avc: denied { create } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:251): arch=40000003 syscall=102 success=yes exit=26 a0=1 a1=b5f3fb04 a2=6b9ff4 a3=b5f3fd91 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:252): avc: denied { bind } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:252): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b5f3fb04 a2=6b9ff4 a3=1a items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:253): avc: denied { getattr } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:253): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b5f3fb04 a2=6b9ff4 a3=1a items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:254): avc: denied { write } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162907009.201:254): avc: denied { nlmsg_read } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:254): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907009.201:255): avc: denied { read } for pid=3439 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162907009.201:255): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=3439 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162907012.161:256): avc: denied { execute } for pid=3444 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162907012.161:256): avc: denied { execute_no_trans } for pid=3444 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162907012.161:256): avc: denied { read } for pid=3444 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162907012.161:256): arch=40000003 syscall=11 success=yes exit=0 a0=9ca3898 a1=9ca5908 a2=9ca6100 a3=9ca5908 items=0 ppid=1 pid=3444 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162907012.161:256): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162907012.161:256): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162907012.169:257): avc: denied { getattr } for pid=3444 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379744 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162907012.169:257): arch=40000003 syscall=196 success=yes exit=0 a0=bfc35b68 a1=bfc3565c a2=248ff4 a3=bfc36a12 items=0 ppid=1 pid=3444 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162907012.169:257): path="/usr/lib/firefox-2.0/firefox-bin" type=USER_ACCT msg=audit(1162907401.269:258): user pid=3519 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162907401.273:259): login pid=3519 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162907401.273:260): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162907401.273:261): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162907401.277:262): avc: denied { search } for pid=3520 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162907401.277:262): arch=40000003 syscall=33 success=yes exit=0 a0=bfd85254 a1=0 a2=bfd85148 a3=bfd85150 items=0 ppid=3519 pid=3520 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162907401.277:263): avc: denied { read append } for pid=3520 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162907401.277:263): arch=40000003 syscall=5 success=yes exit=3 a0=bfd85254 a1=402 a2=bfd85418 a3=bfd85150 items=0 ppid=3519 pid=3520 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162907401.281:264): avc: denied { lock } for pid=3520 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162907401.281:264): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfd85150 a3=3 items=0 ppid=3519 pid=3520 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162907401.281:264): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162907401.289:265): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162907401.289:266): user pid=3519 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162907975.585:267): avc: denied { getattr } for pid=3193 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162907975.585:267): arch=40000003 syscall=196 success=yes exit=0 a0=bffaf564 a1=bffaf4c8 a2=f64ff4 a3=a15d798 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162907975.585:267): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162908001.359:268): user pid=3556 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162908001.359:269): login pid=3556 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162908001.359:270): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162908001.359:271): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162908001.375:272): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162908001.375:273): user pid=3556 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162908061.387:274): user pid=3561 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162908061.387:275): login pid=3561 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162908061.387:276): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162908061.387:277): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162908061.391:278): avc: denied { getattr } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.391:278): arch=40000003 syscall=195 success=yes exit=0 a0=9ff8120 a1=bfc3b4f0 a2=92eff4 a3=9ff8120 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.391:278): path="/usr/bin/run-parts" type=AVC msg=audit(1162908061.423:279): avc: denied { execute } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.423:279): arch=40000003 syscall=33 success=yes exit=0 a0=9ff8120 a1=1 a2=11 a3=9ff8120 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.423:280): avc: denied { read } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.423:280): arch=40000003 syscall=33 success=yes exit=0 a0=9ff8120 a1=4 a2=ffffffff a3=9ff8120 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.423:281): avc: denied { execute_no_trans } for pid=3562 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.423:281): arch=40000003 syscall=11 success=yes exit=0 a0=9ff8120 a1=9ff83d8 a2=9ff82f8 a3=9ff7f98 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.423:281): path="/usr/bin/run-parts" type=AVC msg=audit(1162908061.427:282): avc: denied { ioctl } for pid=3562 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.427:282): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfc6df48 a3=bfc6df88 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.427:282): path="/usr/bin/run-parts" type=AVC msg=audit(1162908061.443:283): avc: denied { execute } for pid=3562 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.443:283): arch=40000003 syscall=33 success=yes exit=0 a0=9158990 a1=1 a2=1 a3=9158c98 items=0 ppid=3561 pid=3562 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.443:284): avc: denied { execute_no_trans } for pid=3563 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.443:284): arch=40000003 syscall=11 success=yes exit=0 a0=9158a10 a1=9158ad8 a2=9158ae8 a3=9158758 items=0 ppid=3562 pid=3563 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.443:284): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162908061.455:285): avc: denied { execute } for pid=3565 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162908061.455:285): avc: denied { execute_no_trans } for pid=3565 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162908061.455:285): avc: denied { read } for pid=3565 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.455:285): arch=40000003 syscall=11 success=yes exit=0 a0=9846678 a1=9846808 a2=9846720 a3=9846508 items=0 ppid=3563 pid=3565 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.455:285): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162908061.455:285): path="/sbin/chkconfig" type=AVC msg=audit(1162908061.483:286): avc: denied { read } for pid=3565 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.483:286): arch=40000003 syscall=5 success=yes exit=3 a0=bf9eccb0 a1=0 a2=ffffffff a3=8bf5038 items=0 ppid=3563 pid=3565 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162908061.483:287): avc: denied { getattr } for pid=3565 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162908061.483:287): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf9ecc20 a2=fc6ff4 a3=3 items=0 ppid=3563 pid=3565 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162908061.483:287): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162908061.543:288): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162908061.543:289): user pid=3561 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162908185.322:290): avc: denied { search } for pid=3575 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162908185.322:290): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf95f7e0 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3575 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.322:291): avc: denied { read } for pid=3575 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908185.322:291): arch=40000003 syscall=33 success=yes exit=0 a0=9ac0218 a1=4 a2=4dc5d770 a3=9ac0218 items=0 ppid=1 pid=3575 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.322:292): avc: denied { getattr } for pid=3575 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908185.322:292): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bf95f87c a2=4c0ff4 a3=9ac0af8 items=0 ppid=1 pid=3575 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162908185.322:292): path="/home/kmacmill/.ICEauthority" type=USER_AVC msg=audit(1162908185.586:293): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=3575 tpid=2771 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162908185.590:294): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=2771 tpid=3575 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162908185.638:295): avc: denied { create } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:295): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b0d9d274 a2=4c0ff4 a3=802d7f items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:296): avc: denied { bind } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:296): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b0d9d274 a2=4c0ff4 a3=23 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:297): avc: denied { getattr } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:297): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b0d9d274 a2=4c0ff4 a3=23 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:298): avc: denied { write } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162908185.638:298): avc: denied { nlmsg_read } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:298): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b0d9c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.638:299): avc: denied { read } for pid=3584 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162908185.638:299): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b0d9c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908185.642:300): avc: denied { search } for pid=3584 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162908185.642:300): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=b0d9ce74 a2=4c0ff4 a3=0 items=0 ppid=1 pid=3584 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162908377.786:301): avc: denied { read } for pid=3193 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908377.786:301): arch=40000003 syscall=5 success=yes exit=60 a0=a315b68 a1=0 a2=4d765048 a3=a315b68 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162908377.806:302): avc: denied { execute } for pid=3193 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162908377.806:302): arch=40000003 syscall=192 success=yes exit=24014848 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162908377.806:302): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162908378.158:303): avc: denied { read } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162908378.158:303): arch=40000003 syscall=33 success=yes exit=0 a0=bffb3fcb a1=4 a2=4db18a64 a3=bffb3fcb items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162908378.158:304): avc: denied { getattr } for pid=3193 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162908378.158:304): arch=40000003 syscall=197 success=yes exit=0 a0=3d a1=bffaea8c a2=f64ff4 a3=9d2b038 items=0 ppid=1 pid=3193 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162908378.158:304): path="/tmp/.gdmF70UIT" type=USER_ACCT msg=audit(1162908601.608:305): user pid=3618 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162908601.608:306): login pid=3618 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162908601.608:307): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162908601.608:308): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162908601.612:309): avc: denied { search } for pid=3619 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162908601.612:309): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8803800 items=0 ppid=3618 pid=3619 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162908601.624:310): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162908601.624:311): user pid=3618 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162909201.686:312): user pid=3656 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162909201.686:313): login pid=3656 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162909201.686:314): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162909201.686:315): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162909201.706:316): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162909201.706:317): user pid=3656 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162909801.775:318): user pid=3774 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162909801.775:319): login pid=3774 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162909801.775:320): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162909801.775:321): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162909801.791:322): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162909801.791:323): user pid=3774 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162909864.491:324): avc: denied { read } for pid=3783 comm="gnome-terminal" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909864.491:324): arch=40000003 syscall=33 success=yes exit=0 a0=bff99df5 a1=4 a2=4db18a64 a3=bff99df5 items=0 ppid=1 pid=3783 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909864.503:325): avc: denied { write } for pid=3783 comm="gnome-terminal" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162909864.503:325): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff97ff0 a2=4dc5d770 a3=15 items=0 ppid=1 pid=3783 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909871.660:326): avc: denied { getattr } for pid=3811 comm="0logwatch" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:logwatch_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909871.660:326): arch=40000003 syscall=195 success=yes exit=0 a0=92f43e0 a1=92a50c8 a2=24cff4 a3=92f43e0 items=0 ppid=3808 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:logwatch_t:s0 key=(null) type=AVC_PATH msg=audit(1162909871.660:326): path="/root" type=AVC msg=audit(1162909871.660:327): avc: denied { search } for pid=3811 comm="0logwatch" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:logwatch_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909871.660:327): arch=40000003 syscall=195 success=no exit=-2 a0=92f43e0 a1=92a50c8 a2=24cff4 a3=92f43e0 items=0 ppid=3808 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:logwatch_t:s0 key=(null) type=AVC msg=audit(1162909881.284:328): avc: denied { search } for pid=4239 comm="procmail" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:procmail_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.284:328): arch=40000003 syscall=5 success=no exit=-2 a0=8717d90 a1=8000 a2=0 a3=8000 items=0 ppid=4238 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="procmail" exe="/usr/bin/procmail" subj=system_u:system_r:procmail_t:s0 key=(null) type=AVC msg=audit(1162909881.356:329): avc: denied { create } for pid=4242 comm="mktemp" name=".beagleindexwapi.WBuTxi4242" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.356:329): arch=40000003 syscall=39 success=yes exit=0 a0=95be008 a1=1c0 a2=95be00c a3=95be008 items=0 ppid=4240 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="mktemp" exe="/bin/mktemp" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.356:330): avc: denied { setattr } for pid=4243 comm="chown" name=".beagleindexwapi.WBuTxi4242" dev=dm-0 ino=14567747 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.356:330): arch=40000003 syscall=212 success=yes exit=0 a0=a0545c8 a1=3a a2=ffffffff a3=0 items=0 ppid=4240 pid=4243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chown" exe="/bin/chown" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.420:331): avc: denied { search } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=SYSCALL msg=audit(1162909881.420:331): arch=40000003 syscall=288 success=yes exit=644961874 a0=0 a1=fffffffd a2=0 a3=3a items=0 ppid=4240 pid=4252 auid=4294967295 uid=58 gid=58 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:332): avc: denied { write } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=AVC msg=audit(1162909881.448:332): avc: denied { link } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=SYSCALL msg=audit(1162909881.448:332): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=3a items=0 ppid=4240 pid=4252 auid=4294967295 uid=58 gid=58 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:333): avc: denied { create } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162909881.448:333): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bfb31c50 a2=4d8cdff4 a3=0 items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:334): avc: denied { write } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162909881.448:334): avc: denied { nlmsg_relay } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162909881.448:334): avc: denied { audit_write } for pid=4252 comm="runuser" capability=29 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=capability type=USER_START msg=audit(1162909881.448:335): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=SYSCALL msg=audit(1162909881.448:334): arch=40000003 syscall=102 success=yes exit=116 a0=b a1=bfb26ed0 a2=4d8cdff4 a3=bfb2d910 items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.448:336): avc: denied { read } for pid=4252 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162909881.448:336): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bfb26e80 a2=4d8cdff4 a3=bfb2924c items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=CRED_ACQ msg=audit(1162909881.448:337): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162909881.692:338): avc: denied { execute } for pid=4253 comm="beagle-build-in" name="mono" dev=dm-0 ino=10323612 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.692:338): arch=40000003 syscall=33 success=yes exit=0 a0=845d5b0 a1=1 a2=11 a3=845d5b0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.692:339): avc: denied { read } for pid=4253 comm="beagle-build-in" name="mono" dev=dm-0 ino=10323612 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.692:339): arch=40000003 syscall=33 success=yes exit=0 a0=845d5b0 a1=4 a2=ffffffff a3=845d5b0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.692:340): avc: denied { execute_no_trans } for pid=4253 comm="beagle-build-in" name="mono" dev=dm-0 ino=10323612 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.692:340): arch=40000003 syscall=11 success=yes exit=0 a0=845d000 a1=845cbd8 a2=845d798 a3=845cbd8 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162909881.692:340): path="/usr/bin/mono" type=AVC msg=audit(1162909881.696:341): avc: denied { execheap } for pid=4253 comm="mono" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=process type=AVC msg=audit(1162909881.696:341): avc: denied { execmem } for pid=4253 comm="mono" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=process type=SYSCALL msg=audit(1162909881.696:341): arch=40000003 syscall=125 success=yes exit=0 a0=8575000 a1=1000 a2=7 a3=1 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.696:342): avc: denied { getsched } for pid=4253 comm="mono" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=process type=SYSCALL msg=audit(1162909881.696:342): arch=40000003 syscall=155 success=yes exit=0 a0=109d a1=b7f828dc a2=496ff4 a3=b7f826d0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.708:343): avc: denied { create } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909881.708:343): arch=40000003 syscall=117 success=yes exit=32769 a0=2 a1=4d004945 a2=8 a3=780 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.708:344): avc: denied { unix_write } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=AVC msg=audit(1162909881.708:344): avc: denied { write } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909881.708:344): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=8001 a2=0 a3=111 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.708:345): avc: denied { read } for pid=4253 comm="mono" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909881.708:345): arch=40000003 syscall=117 success=yes exit=0 a0=1 a1=8001 a2=1 a3=0 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.916:346): avc: denied { write } for pid=4253 comm="beagle-build-in" name="applications" dev=dm-0 ino=14504728 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909881.916:346): avc: denied { remove_name } for pid=4253 comm="beagle-build-in" name="Locks" dev=dm-0 ino=14504729 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909881.916:346): avc: denied { rmdir } for pid=4253 comm="beagle-build-in" name="Locks" dev=dm-0 ino=14504729 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162909881.916:346): arch=40000003 syscall=40 success=yes exit=0 a0=8644198 a1=45 a2=8208528 a3=8644198 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.932:347): avc: denied { unlink } for pid=4253 comm="beagle-build-in" name="_228.cfs" dev=dm-0 ino=14535829 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.932:347): arch=40000003 syscall=10 success=yes exit=0 a0=864a890 a1=45 a2=8208528 a3=864a890 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909881.972:348): avc: denied { unlink } for pid=4253 comm="beagle-build-in" name="segments" dev=dm-0 ino=14504743 scontext=system_u:system_r:system_crond_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909881.972:348): arch=40000003 syscall=10 success=yes exit=0 a0=8681000 a1=45 a2=8208528 a3=8681000 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.040:349): avc: denied { write } for pid=4253 comm="beagle-build-in" name="indexes" dev=dm-0 ino=14437230 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909882.040:349): avc: denied { remove_name } for pid=4253 comm="beagle-build-in" name="applications" dev=dm-0 ino=14504728 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162909882.040:349): arch=40000003 syscall=40 success=yes exit=0 a0=8653f58 a1=45 a2=8208528 a3=8653f58 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.044:350): avc: denied { add_name } for pid=4253 comm="beagle-build-in" name="applications" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162909882.044:350): avc: denied { create } for pid=4253 comm="beagle-build-in" name="applications" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162909882.044:350): arch=40000003 syscall=39 success=yes exit=0 a0=86488f8 a1=1ff a2=8208528 a3=86488f8 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.288:351): avc: denied { create } for pid=4253 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909882.288:351): arch=40000003 syscall=5 success=yes exit=12 a0=871b158 a1=80c2 a2=100 a3=80c2 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909882.296:352): avc: denied { write } for pid=4253 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" dev=dm-0 ino=14567754 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909882.296:352): arch=40000003 syscall=4 success=yes exit=5 a0=c a1=87227b8 a2=5 a3=81c30 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162909882.296:352): path="/var/cache/beagle/indexes/applications/Locks/lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" type=AVC msg=audit(1162909882.304:353): avc: denied { rename } for pid=4253 comm="beagle-build-in" name="segments.new" dev=dm-0 ino=14567756 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162909882.304:353): arch=40000003 syscall=38 success=yes exit=0 a0=8721790 a1=8720bc0 a2=8208528 a3=8721790 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909925.087:354): avc: denied { unix_read } for pid=4253 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909925.087:354): arch=40000003 syscall=117 success=yes exit=2 a0=3 a1=8001 a2=7 a3=10c items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909925.087:355): avc: denied { destroy } for pid=4253 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162909925.087:355): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=8001 a2=0 a3=100 items=0 ppid=4252 pid=4253 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162909925.091:356): avc: denied { audit_write } for pid=4252 comm="runuser" capability=29 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=capability type=CRED_DISP msg=audit(1162909925.091:357): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=SYSCALL msg=audit(1162909925.091:356): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bfb26ed0 a2=4d8cdff4 a3=bfb2d910 items=0 ppid=4240 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=USER_END msg=audit(1162909925.091:358): user pid=4252 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1162909925.139:359): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=CRED_ACQ msg=audit(1162909925.139:360): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_AUTH msg=audit(1162909926.015:361): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1162909926.015:362): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1162909926.043:363): avc: denied { search } for pid=4282 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909926.043:363): arch=40000003 syscall=5 success=no exit=-2 a0=bfccd0f8 a1=8000 a2=1b6 a3=971d9a8 items=0 ppid=4262 pid=4282 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162909926.079:364): avc: denied { write } for pid=4298 comm="xauth" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.079:364): arch=40000003 syscall=33 success=yes exit=0 a0=bfd4991c a1=2 a2=bfd484f0 a3=0 items=0 ppid=4282 pid=4298 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.079:365): avc: denied { read } for pid=4298 comm="xauth" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.079:365): arch=40000003 syscall=5 success=yes exit=2 a0=bfd4991c a1=0 a2=1b6 a3=8423008 items=0 ppid=4282 pid=4298 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.079:366): avc: denied { getattr } for pid=4298 comm="xauth" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.079:366): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfd4823c a2=907ff4 a3=8423008 items=0 ppid=4282 pid=4298 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162909926.079:366): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162909926.083:367): avc: denied { write } for pid=4282 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:367): avc: denied { add_name } for pid=4282 comm="su" name=".xauth7KBaGA" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:367): avc: denied { create } for pid=4282 comm="su" name=".xauth7KBaGA" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:367): arch=40000003 syscall=5 success=yes exit=4 a0=971dacb a1=80c2 a2=180 a3=80c2 items=0 ppid=4262 pid=4282 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162909926.083:368): avc: denied { setattr } for pid=4282 comm="su" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:368): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=42a69f items=0 ppid=4262 pid=4282 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1162909926.083:369): avc: denied { search } for pid=4299 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162909926.083:369): arch=40000003 syscall=195 success=no exit=-2 a0=bf9ac427 a1=bf9abf40 a2=c97ff4 a3=3 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:370): avc: denied { write } for pid=4299 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:370): avc: denied { add_name } for pid=4299 comm="xauth" name=".xauth7KBaGA-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:370): avc: denied { create } for pid=4299 comm="xauth" name=".xauth7KBaGA-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:370): arch=40000003 syscall=5 success=yes exit=2 a0=bf9ac427 a1=c1 a2=180 a3=ffffffff items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:371): avc: denied { link } for pid=4299 comm="xauth" name=".xauth7KBaGA-c" dev=dm-0 ino=13127377 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:371): arch=40000003 syscall=9 success=yes exit=0 a0=bf9ac427 a1=bf9ac026 a2=4db18a64 a3=2 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:372): avc: denied { write } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:372): arch=40000003 syscall=33 success=yes exit=0 a0=bf9ae918 a1=2 a2=bf9ac950 a3=0 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:373): avc: denied { read } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:373): arch=40000003 syscall=5 success=yes exit=2 a0=bf9ae918 a1=0 a2=1b6 a3=90c5008 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1162909926.083:374): avc: denied { getattr } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:374): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf9ac69c a2=c97ff4 a3=90c5008 items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1162909926.083:374): path="/root/.xauth7KBaGA" type=AVC msg=audit(1162909926.083:375): avc: denied { remove_name } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1162909926.083:375): avc: denied { unlink } for pid=4299 comm="xauth" name=".xauth7KBaGA" dev=dm-0 ino=13127376 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.083:375): arch=40000003 syscall=10 success=yes exit=0 a0=90c5008 a1=1000 a2=0 a3=90c508a items=0 ppid=4282 pid=4299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1162909926.083:376): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1162909926.083:377): user pid=4282 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1162909926.087:378): avc: denied { dac_override } for pid=4300 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1162909926.087:378): arch=40000003 syscall=195 success=yes exit=0 a0=9a7be38 a1=bfd8a290 a2=673ff4 a3=bfd8a290 items=0 ppid=4282 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909926.087:379): avc: denied { read } for pid=4300 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.087:379): arch=40000003 syscall=5 success=yes exit=3 a0=9a7db58 a1=8000 a2=0 a3=8000 items=0 ppid=4282 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162909926.175:380): avc: denied { read } for pid=4300 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1162909926.175:380): arch=40000003 syscall=5 success=yes exit=3 a0=9a7dd38 a1=8000 a2=0 a3=8000 items=0 ppid=4282 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1162909932.419:381): user pid=4321 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1162909932.419:382): user pid=4321 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ROLE_CHANGE msg=audit(1162909932.423:383): user pid=4324 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='newrole: old-context=staff_u:staff_r:staff_t new-context=staff_u:sysadm_r:sysadm_t: exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=/dev/pts/2 res=success)' type=AVC msg=audit(1162910331.648:384): avc: denied { read } for pid=4374 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910331.648:384): arch=40000003 syscall=33 success=yes exit=0 a0=bfc4cf92 a1=4 a2=4db18a64 a3=bfc4cf92 items=0 ppid=4373 pid=4374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162910331.684:385): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910331.684:385): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910331.684:386): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910331.684:386): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf973d1c a2=36aff4 a3=85d3140 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910331.684:386): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162910331.836:387): avc: denied { unix_write } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=AVC msg=audit(1162910331.836:387): avc: denied { read write } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162910331.836:387): arch=40000003 syscall=117 success=yes exit=0 a0=1 a1=10001 a2=1 a3=0 items=0 ppid=4291 pid=4292 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910339.621:388): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910339.621:388): arch=40000003 syscall=196 success=yes exit=0 a0=bf9716e4 a1=bf971648 a2=36aff4 a3=8dbb4c8 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910339.621:388): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162910340.461:389): avc: denied { read } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910340.461:389): arch=40000003 syscall=5 success=yes exit=46 a0=ae84b060 a1=0 a2=0 a3=ae84b060 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910340.461:390): avc: denied { execute } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910340.461:390): arch=40000003 syscall=192 success=yes exit=102780928 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910340.461:390): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162910353.258:391): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910353.258:391): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910353.258:392): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162910353.258:392): arch=40000003 syscall=197 success=yes exit=0 a0=28 a1=bf970c5c a2=36aff4 a3=ae82ff58 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910353.258:392): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162910371.007:393): avc: denied { execute } for pid=4371 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910371.007:393): arch=40000003 syscall=192 success=yes exit=33730560 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910371.007:393): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162910371.063:394): avc: denied { execstack } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1162910371.063:394): avc: denied { execmem } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162910371.063:394): arch=40000003 syscall=125 success=yes exit=0 a0=bf974000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910371.115:395): avc: denied { execmod } for pid=4371 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910371.115:395): arch=40000003 syscall=125 success=yes exit=0 a0=202b000 a1=26f000 a2=5 a3=bf971620 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162910371.115:395): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162910376.651:396): avc: denied { search } for pid=4371 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162910376.651:396): arch=40000003 syscall=54 success=yes exit=0 a0=42 a1=c0045002 a2=bf973f14 a3=abd446b4 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162910376.699:397): avc: denied { write } for pid=4296 comm="beagle-build-in" name="PrimaryIndex" dev=dm-0 ino=14534976 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162910376.699:397): avc: denied { add_name } for pid=4296 comm="beagle-build-in" name="_9hc.fnm" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162910376.699:397): arch=40000003 syscall=5 success=yes exit=14 a0=b6556648 a1=8041 a2=1a4 a3=8041 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910376.723:398): avc: denied { remove_name } for pid=4296 comm="beagle-build-in" name="segments" dev=dm-0 ino=14535064 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162910376.723:398): arch=40000003 syscall=10 success=yes exit=0 a0=b6556600 a1=45 a2=8208528 a3=b6556600 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910401.857:399): avc: denied { unlink } for pid=4296 comm="beagle-build-in" name="FileAttributesStore.db-journal" dev=dm-0 ino=14534984 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.857:399): arch=40000003 syscall=10 success=yes exit=0 a0=9d21242 a1=1 a2=4d3cee2c a3=9d21100 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910401.857:400): avc: denied { create } for pid=4296 comm="beagle-build-in" name="FileAttributesStore.db-journal" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.857:400): arch=40000003 syscall=5 success=yes exit=14 a0=9d21242 a1=80c2 a2=1a4 a3=80c2 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910401.857:401): avc: denied { write } for pid=4296 comm="beagle-build-in" name="FileAttributesStore.db-journal" dev=dm-0 ino=14534984 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.857:401): arch=40000003 syscall=4 success=yes exit=24 a0=e a1=b6bcda64 a2=18 a3=18 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162910401.857:401): path="/var/cache/beagle/indexes/documentation/FileAttributesStore.db-journal" type=USER_ACCT msg=audit(1162910401.857:402): user pid=4418 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162910401.857:403): login pid=4418 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162910401.861:404): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162910401.861:405): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162910401.861:406): avc: denied { execute } for pid=4419 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162910401.861:406): avc: denied { execute_no_trans } for pid=4419 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.861:406): arch=40000003 syscall=11 success=yes exit=0 a0=92291b0 a1=9229358 a2=9229290 a3=9229008 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.861:406): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162910401.865:407): avc: denied { execute } for pid=4419 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162910401.865:407): avc: denied { execute_no_trans } for pid=4419 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162910401.865:407): avc: denied { read } for pid=4419 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:407): arch=40000003 syscall=11 success=yes exit=0 a0=9229d48 a1=9229740 a2=9229d60 a3=9229740 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.865:407): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162910401.865:407): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162910401.865:408): avc: denied { search } for pid=4419 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162910401.865:408): avc: denied { read } for pid=4419 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:408): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9756800 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:409): avc: denied { getattr } for pid=4419 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:409): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bffbf0e8 a2=9d1ff4 a3=9756800 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.865:409): path="/proc/net/dev" type=AVC msg=audit(1162910401.865:410): avc: denied { search } for pid=4419 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162910401.865:410): arch=40000003 syscall=33 success=yes exit=0 a0=bffbf494 a1=0 a2=bffbf388 a3=bffbf390 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:411): avc: denied { read append } for pid=4419 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:411): arch=40000003 syscall=5 success=yes exit=3 a0=bffbf494 a1=402 a2=bffbf658 a3=bffbf390 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:412): avc: denied { search } for pid=4419 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162910401.865:412): avc: denied { read } for pid=4419 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:412): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9756df0 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.865:413): avc: denied { getattr } for pid=4419 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.865:413): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bffbef44 a2=9d1ff4 a3=9756df0 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.865:413): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162910401.865:414): avc: denied { search } for pid=4419 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162910401.865:414): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9756df0 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162910401.869:415): avc: denied { lock } for pid=4419 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162910401.869:415): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bffbf390 a3=3 items=0 ppid=4418 pid=4419 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162910401.869:415): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162910401.885:416): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162910401.885:417): user pid=4418 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162910402.229:418): avc: denied { rename } for pid=4296 comm="beagle-build-in" name="segments.new" dev=dm-0 ino=14535044 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162910402.229:418): arch=40000003 syscall=38 success=yes exit=0 a0=b6533ee0 a1=b6533b58 a2=8208528 a3=b6533ee0 items=0 ppid=4291 pid=4296 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162910855.309:419): avc: denied { execute } for pid=4324 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910855.309:419): arch=40000003 syscall=33 success=yes exit=0 a0=9c26268 a1=1 a2=11 a3=9c26268 items=0 ppid=4321 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162910857.045:420): avc: denied { execute_no_trans } for pid=4498 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162910857.045:420): arch=40000003 syscall=11 success=yes exit=0 a0=9c27358 a1=9c24610 a2=9c23ec0 a3=9c24340 items=0 ppid=4324 pid=4498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162910857.045:420): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162911001.962:421): user pid=4529 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162911001.962:422): login pid=4529 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162911001.962:423): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162911001.962:424): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911001.970:425): avc: denied { execute } for pid=4530 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911001.970:425): avc: denied { execute_no_trans } for pid=4530 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911001.970:425): avc: denied { read } for pid=4530 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911001.970:425): arch=40000003 syscall=11 success=yes exit=0 a0=962dd48 a1=962d740 a2=962dd60 a3=962d740 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911001.970:425): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162911001.970:425): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162911001.970:426): avc: denied { search } for pid=4530 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162911001.970:426): arch=40000003 syscall=33 success=yes exit=0 a0=bfc9f974 a1=0 a2=bfc9f868 a3=bfc9f870 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911001.970:427): avc: denied { read append } for pid=4530 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911001.970:427): arch=40000003 syscall=5 success=yes exit=3 a0=bfc9f974 a1=402 a2=bfc9fb38 a3=bfc9f870 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911001.970:428): avc: denied { lock } for pid=4530 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911001.970:428): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc9f870 a3=3 items=0 ppid=4529 pid=4530 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911001.970:428): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162911002.118:429): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162911002.118:430): user pid=4529 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911228.792:431): avc: denied { unix_read } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162911228.792:431): arch=40000003 syscall=117 success=yes exit=2 a0=3 a1=10001 a2=7 a3=10c items=0 ppid=4291 pid=4292 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.792:432): avc: denied { destroy } for pid=4292 comm="beagle-build-in" key=1291864389 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=sem type=SYSCALL msg=audit(1162911228.792:432): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=10001 a2=0 a3=100 items=0 ppid=4291 pid=4292 auid=4294967295 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:433): avc: denied { create } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162911228.796:433): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bfdc6e80 a2=4d8cdff4 a3=8004 items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:434): avc: denied { write } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162911228.796:434): avc: denied { nlmsg_relay } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1162911228.796:434): avc: denied { audit_write } for pid=4291 comm="runuser" capability=29 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=capability type=CRED_DISP msg=audit(1162911228.796:435): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=SYSCALL msg=audit(1162911228.796:434): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bfdbc100 a2=4d8cdff4 a3=bfdc2b40 items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:436): avc: denied { read } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1162911228.796:436): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bfdbc0b0 a2=4d8cdff4 a3=bfdbe47c items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911228.796:437): avc: denied { search } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=AVC msg=audit(1162911228.796:437): avc: denied { write } for pid=4291 comm="runuser" scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:system_r:system_crond_t:s0 tclass=key type=SYSCALL msg=audit(1162911228.796:437): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=1dd81146 a2=0 a3=3a items=0 ppid=4240 pid=4291 auid=4294967295 uid=0 gid=0 euid=58 suid=58 fsuid=58 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:system_crond_t:s0 key=(null) type=USER_END msg=audit(1162911228.796:438): user pid=4291 uid=0 auid=4294967295 subj=system_u:system_r:system_crond_t:s0 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162911228.932:439): avc: denied { rmdir } for pid=4570 comm="rm" name=".wapi" dev=dm-0 ino=14567748 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162911228.932:439): arch=40000003 syscall=40 success=yes exit=0 a0=9c61960 a1=bfbb20d4 a2=805277c a3=2 items=0 ppid=4240 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911229.901:440): avc: denied { read } for pid=4576 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911229.901:440): arch=40000003 syscall=5 success=yes exit=3 a0=bfa96cd0 a1=0 a2=ffffffff a3=8995858 items=0 ppid=4574 pid=4576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162911334.707:441): avc: denied { getattr } for pid=11055 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911334.707:441): arch=40000003 syscall=196 success=yes exit=0 a0=bfe324b8 a1=bfe32288 a2=faaff4 a3=98cea6c items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC_PATH msg=audit(1162911334.707:441): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162911334.707:442): avc: denied { getattr } for pid=11055 comm="updatedb" name="/" dev=hdc ino=3008 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:iso9660_t:s0 tclass=dir type=SYSCALL msg=audit(1162911334.707:442): arch=40000003 syscall=196 success=yes exit=0 a0=bfe324b8 a1=bfe32288 a2=faaff4 a3=98cea68 items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC_PATH msg=audit(1162911334.707:442): path=2F6D656469612F5761726372616674204949495F type=AVC msg=audit(1162911473.860:443): avc: denied { search } for pid=4371 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911473.860:443): arch=40000003 syscall=54 success=yes exit=0 a0=29 a1=c0045002 a2=bf973f14 a3=abd446b4 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162911513.254:444): avc: denied { getattr } for pid=11055 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911513.254:444): arch=40000003 syscall=196 success=yes exit=0 a0=bfe324b8 a1=bfe32288 a2=faaff4 a3=98cea6c items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC_PATH msg=audit(1162911513.254:444): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162911514.670:445): avc: denied { read } for pid=11055 comm="updatedb" name="/" dev=selinuxfs ino=344 scontext=system_u:system_r:locate_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=dir type=SYSCALL msg=audit(1162911514.670:445): arch=40000003 syscall=5 success=yes exit=7 a0=804dc02 a1=18800 a2=bfe3229c a3=98cc928 items=0 ppid=11050 pid=11055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:locate_t:s0 key=(null) type=AVC msg=audit(1162911582.255:446): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162911582.255:446): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162911582.255:447): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162911582.255:447): arch=40000003 syscall=197 success=yes exit=0 a0=3f a1=bf97398c a2=36aff4 a3=ab1b79f8 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162911582.255:447): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162911582.555:448): avc: denied { write } for pid=11102 comm="prelink" name="prelink.quick" dev=dm-0 ino=14438319 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162911582.555:448): arch=40000003 syscall=5 success=yes exit=3 a0=82b3708 a1=8241 a2=1b6 a3=8241 items=0 ppid=11094 pid=11102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=USER_ACCT msg=audit(1162911601.424:449): user pid=11104 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162911601.424:450): login pid=11104 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162911601.432:451): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162911601.432:452): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911601.436:453): avc: denied { execute } for pid=11105 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162911601.436:453): avc: denied { execute_no_trans } for pid=11105 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.436:453): arch=40000003 syscall=11 success=yes exit=0 a0=9a591b0 a1=9a59358 a2=9a59290 a3=9a59008 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.436:453): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162911601.536:454): avc: denied { execute } for pid=11105 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911601.536:454): avc: denied { execute_no_trans } for pid=11105 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162911601.536:454): avc: denied { read } for pid=11105 comm="sa1" name="sadc" dev=dm-0 ino=11981386 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.536:454): arch=40000003 syscall=11 success=yes exit=0 a0=833ad48 a1=833a740 a2=833ad60 a3=833a740 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.536:454): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162911601.536:454): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162911601.540:455): avc: denied { search } for pid=11105 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162911601.540:455): avc: denied { read } for pid=11105 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.540:455): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8295800 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.540:456): avc: denied { getattr } for pid=11105 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.540:456): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe60788 a2=2c3ff4 a3=8295800 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.540:456): path="/proc/net/dev" type=AVC msg=audit(1162911601.540:457): avc: denied { search } for pid=11105 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162911601.540:457): arch=40000003 syscall=33 success=yes exit=0 a0=bfe60b34 a1=0 a2=bfe60a28 a3=bfe60a30 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.540:458): avc: denied { read append } for pid=11105 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.540:458): arch=40000003 syscall=5 success=yes exit=3 a0=bfe60b34 a1=402 a2=bfe60cf8 a3=bfe60a30 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.596:459): avc: denied { search } for pid=11105 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162911601.596:459): avc: denied { read } for pid=11105 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.596:459): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8295df0 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.596:460): avc: denied { getattr } for pid=11105 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.596:460): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe605e4 a2=2c3ff4 a3=8295df0 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.596:460): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162911601.596:461): avc: denied { search } for pid=11105 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162911601.596:461): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8295df0 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911601.600:462): avc: denied { lock } for pid=11105 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162911601.600:462): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfe60a30 a3=3 items=0 ppid=11104 pid=11105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911601.600:462): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162911601.704:463): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162911601.704:464): user pid=11104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162911661.712:465): user pid=12754 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162911661.712:466): login pid=12754 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162911661.712:467): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162911661.716:468): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911661.716:469): avc: denied { getattr } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:469): arch=40000003 syscall=195 success=yes exit=0 a0=9e38120 a1=bfee4fa0 a2=dbcff4 a3=9e38120 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.716:469): path="/usr/bin/run-parts" type=AVC msg=audit(1162911661.716:470): avc: denied { execute } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:470): arch=40000003 syscall=33 success=yes exit=0 a0=9e38120 a1=1 a2=11 a3=9e38120 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.716:471): avc: denied { read } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:471): arch=40000003 syscall=33 success=yes exit=0 a0=9e38120 a1=4 a2=ffffffff a3=9e38120 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.716:472): avc: denied { execute_no_trans } for pid=12755 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.716:472): arch=40000003 syscall=11 success=yes exit=0 a0=9e38120 a1=9e383d8 a2=9e382f8 a3=9e37f98 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.716:472): path="/usr/bin/run-parts" type=AVC msg=audit(1162911661.756:473): avc: denied { ioctl } for pid=12755 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.756:473): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd16ff8 a3=bfd17038 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.756:473): path="/usr/bin/run-parts" type=AVC msg=audit(1162911661.780:474): avc: denied { execute } for pid=12755 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.780:474): arch=40000003 syscall=33 success=yes exit=0 a0=93ee990 a1=1 a2=1 a3=93eec98 items=0 ppid=12754 pid=12755 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.780:475): avc: denied { execute_no_trans } for pid=12758 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.780:475): arch=40000003 syscall=11 success=yes exit=0 a0=93eea10 a1=93eead8 a2=93eeae8 a3=93ee758 items=0 ppid=12755 pid=12758 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.780:475): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162911661.832:476): avc: denied { execute } for pid=12760 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162911661.832:476): avc: denied { execute_no_trans } for pid=12760 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162911661.832:476): avc: denied { read } for pid=12760 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=2848378 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.832:476): arch=40000003 syscall=11 success=yes exit=0 a0=8f9b678 a1=8f9b808 a2=8f9b720 a3=8f9b508 items=0 ppid=12758 pid=12760 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.832:476): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162911661.832:476): path="/sbin/chkconfig" type=AVC msg=audit(1162911661.928:477): avc: denied { read } for pid=12760 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.928:477): arch=40000003 syscall=5 success=yes exit=3 a0=bfb2edf0 a1=0 a2=ffffffff a3=87d4038 items=0 ppid=12758 pid=12760 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162911661.928:478): avc: denied { getattr } for pid=12760 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162911661.928:478): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb2ed60 a2=63cff4 a3=3 items=0 ppid=12758 pid=12760 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162911661.928:478): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162911661.972:479): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162911661.976:480): user pid=12754 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162911943.065:481): avc: denied { search } for pid=4371 comm="firefox-bin" name="usbdev4.2_ep01" dev=sysfs ino=247897 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162911943.065:481): arch=40000003 syscall=6 success=yes exit=0 a0=29 a1=0 a2=229b790 a3=ab187a88 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162912027.014:482): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162912027.014:482): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162912027.014:483): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162912027.014:483): arch=40000003 syscall=197 success=yes exit=0 a0=3e a1=bf97398c a2=36aff4 a3=b2c6b110 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162912027.014:483): path="/tmp/.gdmF70UIT" type=USER_ACCT msg=audit(1162912201.225:484): user pid=17460 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162912201.225:485): login pid=17460 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162912201.257:486): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162912201.257:487): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162912201.289:488): avc: denied { execute } for pid=17461 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162912201.289:488): avc: denied { execute_no_trans } for pid=17461 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.289:488): arch=40000003 syscall=11 success=yes exit=0 a0=98881b0 a1=9888358 a2=9888290 a3=9888008 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912201.289:488): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162912201.389:489): avc: denied { search } for pid=17461 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162912201.389:489): avc: denied { read } for pid=17461 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.389:489): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8261800 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912201.393:490): avc: denied { getattr } for pid=17461 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.393:490): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb8edb8 a2=239ff4 a3=8261800 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912201.393:490): path="/proc/net/dev" type=AVC msg=audit(1162912201.501:491): avc: denied { search } for pid=17461 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162912201.501:491): avc: denied { read } for pid=17461 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.501:491): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8261df0 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912201.501:492): avc: denied { getattr } for pid=17461 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162912201.501:492): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb8ec14 a2=239ff4 a3=8261df0 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912201.501:492): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162912201.501:493): avc: denied { search } for pid=17461 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162912201.501:493): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8261df0 items=0 ppid=17460 pid=17461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162912201.633:494): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162912201.637:495): user pid=17460 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162912454.541:496): avc: denied { read } for pid=18789 comm="ldd" name="init" dev=dm-0 ino=9984490 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912454.541:496): arch=40000003 syscall=33 success=yes exit=0 a0=8f33888 a1=4 a2=1 a3=8f33920 items=0 ppid=18788 pid=18789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ldd" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162912454.541:497): avc: denied { execute } for pid=18789 comm="ldd" name="init" dev=dm-0 ino=9984490 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912454.541:497): arch=40000003 syscall=33 success=yes exit=0 a0=8f2f680 a1=1 a2=1 a3=8f33ce8 items=0 ppid=18788 pid=18789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ldd" exe="/bin/bash" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162912454.545:498): avc: denied { execute_no_trans } for pid=18793 comm="ldd" name="init" dev=dm-0 ino=9984490 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912454.545:498): arch=40000003 syscall=11 success=yes exit=0 a0=8f2de50 a1=8f33ed8 a2=8f2e230 a3=8f2dcd8 items=0 ppid=18792 pid=18793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="init" exe="/sbin/init" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC_PATH msg=audit(1162912454.545:498): path="/sbin/init" type=AVC msg=audit(1162912459.649:499): avc: denied { execute } for pid=18802 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=AVC msg=audit(1162912459.649:499): avc: denied { execute_no_trans } for pid=18802 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162912459.649:499): arch=40000003 syscall=11 success=yes exit=0 a0=9c209e8 a1=9c27370 a2=9c23ec0 a3=9c20a30 items=0 ppid=4324 pid=18802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162912459.649:499): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=AVC msg=audit(1162912482.851:500): avc: denied { write } for pid=2599 comm="anacron" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162912482.851:500): avc: denied { remove_name } for pid=2599 comm="anacron" name="anacron.pid" dev=dm-0 ino=14437020 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1162912482.851:500): avc: denied { unlink } for pid=2599 comm="anacron" name="anacron.pid" dev=dm-0 ino=14437020 scontext=system_u:system_r:system_crond_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1162912482.851:500): arch=40000003 syscall=10 success=yes exit=0 a0=804c925 a1=fe8c98 a2=fe7ff4 a3=1 items=0 ppid=1 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:system_crond_t:s0 key=(null) type=AVC msg=audit(1162912619.407:501): avc: denied { search } for pid=4371 comm="firefox-bin" name="usbdev4.2_ep01" dev=sysfs ino=277031 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162912619.407:501): arch=40000003 syscall=6 success=yes exit=0 a0=29 a1=0 a2=229b790 a3=aab165c0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162912801.707:502): user pid=18887 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162912801.707:503): login pid=18887 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162912801.707:504): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162912801.707:505): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162912801.711:506): avc: denied { execute } for pid=18888 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162912801.711:506): avc: denied { execute_no_trans } for pid=18888 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162912801.711:506): avc: denied { read } for pid=18888 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.711:506): arch=40000003 syscall=11 success=yes exit=0 a0=8c1cd48 a1=8c1c740 a2=8c1cd60 a3=8c1c740 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912801.711:506): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162912801.711:506): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162912801.711:507): avc: denied { search } for pid=18888 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162912801.711:507): avc: denied { read } for pid=18888 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.711:507): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8b77800 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912801.711:508): avc: denied { getattr } for pid=18888 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.711:508): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf809138 a2=239ff4 a3=8b77800 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912801.711:508): path="/proc/net/dev" type=AVC msg=audit(1162912801.711:509): avc: denied { search } for pid=18888 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162912801.711:509): arch=40000003 syscall=33 success=yes exit=0 a0=bf8094e4 a1=0 a2=bf8093d8 a3=bf8093e0 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912801.715:510): avc: denied { read append } for pid=18888 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.715:510): arch=40000003 syscall=5 success=yes exit=3 a0=bf8094e4 a1=402 a2=bf8096a8 a3=bf8093e0 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162912801.715:511): avc: denied { lock } for pid=18888 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162912801.715:511): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf8093e0 a3=3 items=0 ppid=18887 pid=18888 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162912801.715:511): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162912801.739:512): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162912801.739:513): user pid=18887 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162913401.808:514): user pid=18990 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162913401.808:515): login pid=18990 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162913401.808:516): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162913401.808:517): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162913401.812:518): avc: denied { execute } for pid=18991 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162913401.812:518): avc: denied { execute_no_trans } for pid=18991 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.812:518): arch=40000003 syscall=11 success=yes exit=0 a0=90d71b0 a1=90d7358 a2=90d7290 a3=90d7008 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162913401.812:518): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162913401.816:519): avc: denied { search } for pid=18991 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162913401.816:519): avc: denied { read } for pid=18991 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.816:519): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=86b7df0 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162913401.816:520): avc: denied { getattr } for pid=18991 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.816:520): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbe0364 a2=239ff4 a3=86b7df0 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162913401.816:520): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162913401.816:521): avc: denied { search } for pid=18991 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162913401.816:521): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=86b7df0 items=0 ppid=18990 pid=18991 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162913401.828:522): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162913401.828:523): user pid=18990 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162913401.888:524): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.888:524): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162913401.888:525): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913401.888:525): arch=40000003 syscall=197 success=yes exit=0 a0=32 a1=bf97398c a2=36aff4 a3=aa4a0518 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162913401.888:525): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162913576.187:526): avc: denied { read } for pid=19023 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913576.187:526): arch=40000003 syscall=33 success=yes exit=0 a0=bfca3f92 a1=4 a2=de7a64 a3=bfca3f92 items=0 ppid=19022 pid=19023 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162913584.800:527): avc: denied { execmem } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162913584.800:527): arch=40000003 syscall=192 success=yes exit=93360128 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162913723.828:528): avc: denied { read } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162913723.828:528): arch=40000003 syscall=5 success=yes exit=63 a0=aa0964f0 a1=0 a2=aa0964e8 a3=aa0964f0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162913723.828:529): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162913723.828:529): arch=40000003 syscall=197 success=yes exit=0 a0=3f a1=bf9711d0 a2=230fc0 a3=40 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162913723.828:529): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162913723.828:530): avc: denied { execute } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162913723.828:530): arch=40000003 syscall=192 success=yes exit=26157056 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162913723.828:530): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162913771.903:531): avc: denied { search } for pid=19088 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162913771.903:531): avc: denied { search } for pid=19088 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162913771.903:531): arch=40000003 syscall=33 success=no exit=-2 a0=98cf9f8 a1=4 a2=dfabbc a3=98cf9c8 items=0 ppid=3575 pid=19088 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162913772.127:532): avc: denied { search } for pid=19088 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162913772.127:532): avc: denied { read } for pid=19088 comm="gpg" name="evolution-pgp.Y1R1IT" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913772.127:532): arch=40000003 syscall=5 success=yes exit=3 a0=bfceeb1a a1=8000 a2=0 a3=8000 items=0 ppid=3575 pid=19088 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162913785.060:533): avc: denied { read } for pid=19094 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.060:533): arch=40000003 syscall=33 success=yes exit=0 a0=bf974f92 a1=4 a2=de7a64 a3=bf974f92 items=0 ppid=19093 pid=19094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913785.060:534): avc: denied { getattr } for pid=19094 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.060:534): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf9739bc a2=47aff4 a3=8b39ab0 items=0 ppid=19093 pid=19094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162913785.060:534): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162913785.096:535): avc: denied { execute } for pid=19091 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162913785.096:535): avc: denied { execute_no_trans } for pid=19091 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162913785.096:535): avc: denied { read } for pid=19091 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.096:535): arch=40000003 syscall=11 success=yes exit=0 a0=86bb8b8 a1=86bd928 a2=86be120 a3=86bd928 items=0 ppid=1 pid=19091 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162913785.096:535): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162913785.096:535): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162913785.332:536): avc: denied { getattr } for pid=19091 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162913785.332:536): arch=40000003 syscall=196 success=yes exit=0 a0=bfc25b48 a1=bfc2563c a2=239ff4 a3=bfc26a05 items=0 ppid=1 pid=19091 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162913785.332:536): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162913785.740:537): avc: denied { search } for pid=19091 comm="firefox-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162913785.740:537): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfc259b8 a2=239ff4 a3=3 items=0 ppid=1 pid=19091 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913787.352:538): avc: denied { search } for pid=19101 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162913787.352:538): avc: denied { search } for pid=19101 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162913787.352:538): avc: denied { write } for pid=19101 comm="evolution-data-" name="linc-df7-0-776fae0850c0c" dev=dm-0 ino=14567744 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162913787.352:538): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b5f3fe70 a2=4e570f80 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.840:539): avc: denied { write } for pid=19101 comm="evolution-data-" name="linc-c8e-0-2f6d638e7c118" dev=dm-0 ino=14567745 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162913787.840:539): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b5f3fcd0 a2=4e570f80 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:540): avc: denied { create } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:540): arch=40000003 syscall=102 success=yes exit=27 a0=1 a1=b5f3fb04 a2=6b9ff4 a3=b5f3fd91 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:541): avc: denied { bind } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:541): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b5f3fb04 a2=6b9ff4 a3=1b items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:542): avc: denied { getattr } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:542): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b5f3fb04 a2=6b9ff4 a3=1b items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:543): avc: denied { write } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162913787.908:543): avc: denied { nlmsg_read } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:543): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913787.908:544): avc: denied { read } for pid=19101 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913787.908:544): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b5f3ea44 a2=6b9ff4 a3=0 items=0 ppid=1 pid=19101 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe=2F7573722F6C6962657865632F65766F6C7574696F6E2D646174612D7365727665722D312E31302E237072656C696E6B232E663161413778202864656C6574656429 subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1162913789.312:545): avc: denied { search } for pid=19105 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162913789.312:545): arch=40000003 syscall=33 success=no exit=-2 a0=865d9f8 a1=4 a2=a92bbc a3=865d9c8 items=0 ppid=3575 pid=19105 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162913794.937:546): avc: denied { create } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:546): arch=40000003 syscall=102 success=yes exit=48 a0=1 a1=b179e274 a2=4c0ff4 a3=0 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:547): avc: denied { bind } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:547): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b179e274 a2=4c0ff4 a3=30 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:548): avc: denied { getattr } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:548): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b179e274 a2=4c0ff4 a3=30 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:549): avc: denied { write } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162913794.937:549): avc: denied { nlmsg_read } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:549): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b179d1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162913794.937:550): avc: denied { read } for pid=19111 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162913794.937:550): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b179d1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=19111 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162914001.894:551): user pid=19157 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162914001.894:552): login pid=19157 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162914001.894:553): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162914001.894:554): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162914001.898:555): avc: denied { execute } for pid=19158 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162914001.898:555): avc: denied { execute_no_trans } for pid=19158 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162914001.898:555): avc: denied { read } for pid=19158 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162914001.898:555): arch=40000003 syscall=11 success=yes exit=0 a0=84b1d48 a1=84b1740 a2=84b1d60 a3=84b1740 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162914001.898:555): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162914001.898:555): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162914001.898:556): avc: denied { search } for pid=19158 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162914001.898:556): arch=40000003 syscall=33 success=yes exit=0 a0=bfea2374 a1=0 a2=bfea2268 a3=bfea2270 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162914001.898:557): avc: denied { read append } for pid=19158 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162914001.898:557): arch=40000003 syscall=5 success=yes exit=3 a0=bfea2374 a1=402 a2=bfea2538 a3=bfea2270 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162914001.898:558): avc: denied { lock } for pid=19158 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162914001.898:558): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfea2270 a3=3 items=0 ppid=19157 pid=19158 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162914001.898:558): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162914001.910:559): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162914001.910:560): user pid=19157 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162914100.280:561): avc: denied { execute } for pid=19185 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=AVC msg=audit(1162914100.280:561): avc: denied { execute_no_trans } for pid=19185 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162914100.280:561): arch=40000003 syscall=11 success=yes exit=0 a0=9c25f18 a1=9c34a20 a2=9c23ec0 a3=9c34ca8 items=0 ppid=4324 pid=19185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162914100.280:561): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162914601.967:562): user pid=19284 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162914601.967:563): login pid=19284 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162914601.967:564): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162914601.967:565): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162914601.999:566): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162914601.999:567): user pid=19284 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162915201.317:568): user pid=19490 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162915201.317:569): login pid=19490 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162915201.317:570): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162915201.317:571): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162915201.329:572): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162915201.329:573): user pid=19490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915217.242:574): avc: denied { search } for pid=19500 comm="firefox-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162915217.242:574): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfb168b8 a2=239ff4 a3=3 items=0 ppid=1 pid=19500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162915261.340:575): user pid=19525 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162915261.340:576): login pid=19525 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162915261.340:577): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162915261.340:578): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915261.344:579): avc: denied { getattr } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:579): arch=40000003 syscall=195 success=yes exit=0 a0=9344120 a1=bff1efe0 a2=239ff4 a3=9344120 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.344:579): path="/usr/bin/run-parts" type=AVC msg=audit(1162915261.344:580): avc: denied { execute } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:580): arch=40000003 syscall=33 success=yes exit=0 a0=9344120 a1=1 a2=11 a3=9344120 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.344:581): avc: denied { read } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:581): arch=40000003 syscall=33 success=yes exit=0 a0=9344120 a1=4 a2=ffffffff a3=9344120 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.344:582): avc: denied { execute_no_trans } for pid=19526 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:582): arch=40000003 syscall=11 success=yes exit=0 a0=9344120 a1=93443d8 a2=93442f8 a3=9343f98 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.344:582): path="/usr/bin/run-parts" type=AVC msg=audit(1162915261.344:583): avc: denied { ioctl } for pid=19526 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.344:583): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfaf35d8 a3=bfaf3618 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.344:583): path="/usr/bin/run-parts" type=AVC msg=audit(1162915261.408:584): avc: denied { execute } for pid=19526 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.408:584): arch=40000003 syscall=33 success=yes exit=0 a0=9b9d990 a1=1 a2=1 a3=9b9dc98 items=0 ppid=19525 pid=19526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.408:585): avc: denied { execute_no_trans } for pid=19527 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.408:585): arch=40000003 syscall=11 success=yes exit=0 a0=9b9da10 a1=9b9dad8 a2=9b9dae8 a3=9b9d758 items=0 ppid=19526 pid=19527 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.408:585): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162915261.452:586): avc: denied { execute } for pid=19529 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162915261.452:586): avc: denied { execute_no_trans } for pid=19529 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162915261.452:586): avc: denied { read } for pid=19529 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.452:586): arch=40000003 syscall=11 success=yes exit=0 a0=85b5678 a1=85b5808 a2=85b5720 a3=85b5508 items=0 ppid=19527 pid=19529 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.452:586): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162915261.452:586): path="/sbin/chkconfig" type=AVC msg=audit(1162915261.476:587): avc: denied { read } for pid=19529 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.476:587): arch=40000003 syscall=5 success=yes exit=3 a0=bff191e0 a1=0 a2=ffffffff a3=8e7b038 items=0 ppid=19527 pid=19529 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915261.509:588): avc: denied { getattr } for pid=19529 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162915261.509:588): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff19150 a2=239ff4 a3=3 items=0 ppid=19527 pid=19529 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915261.509:588): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162915261.537:589): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162915261.537:590): user pid=19525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915365.643:591): avc: denied { write } for pid=4371 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162915365.643:591): avc: denied { add_name } for pid=4371 comm="firefox-bin" name="xz46pk56" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162915365.643:591): avc: denied { create } for pid=4371 comm="firefox-bin" name="xz46pk56" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915365.643:591): arch=40000003 syscall=5 success=yes exit=69 a0=ac402920 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915365.643:592): avc: denied { write } for pid=4371 comm="firefox-bin" name="xz46pk56" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915365.643:592): arch=40000003 syscall=5 success=yes exit=69 a0=ac402920 a1=8041 a2=180 a3=8041 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915370.767:593): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="Fortress-WP.pdf" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915370.767:593): arch=40000003 syscall=195 success=yes exit=0 a0=ac7c1c28 a1=bf973794 a2=36aff4 a3=3 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915370.767:593): path="/tmp/Fortress-WP.pdf" type=AVC msg=audit(1162915370.767:594): avc: denied { remove_name } for pid=4371 comm="firefox-bin" name="Fortress-WP.pdf" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162915370.767:594): avc: denied { unlink } for pid=4371 comm="firefox-bin" name="Fortress-WP.pdf" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915370.767:594): arch=40000003 syscall=10 success=yes exit=0 a0=ac7c1c28 a1=0 a2=4d765304 a3=0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915370.767:595): avc: denied { rename } for pid=4371 comm="firefox-bin" name="xz46pk56" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915370.767:595): arch=40000003 syscall=38 success=yes exit=0 a0=ac402920 a1=bf97385c a2=4d765304 a3=0 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915371.587:596): avc: denied { search } for pid=19567 comm="evince" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162915371.587:596): avc: denied { write } for pid=19567 comm="evince" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162915371.587:596): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfbcb260 a2=39b770 a3=15 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915371.591:597): avc: denied { read } for pid=19567 comm="evince" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915371.591:597): arch=40000003 syscall=33 success=yes exit=0 a0=8f74950 a1=4 a2=39b770 a3=8f74950 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915371.627:598): avc: denied { getattr } for pid=19567 comm="evince" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915371.627:598): arch=40000003 syscall=197 success=yes exit=0 a0=2d a1=bfbcb2fc a2=25dff4 a3=8f75230 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915371.627:598): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162915371.967:599): avc: denied { connectto } for pid=19567 comm="evince" path=002F746D702F646275732D6E6948324A5970414645 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1162915371.967:599): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfbcb7d0 a2=7dcf494 a3=15 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915374.488:600): avc: denied { read } for pid=19570 comm="gam_server" name="inotify" dev=inotifyfs ino=339 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162915374.488:600): arch=40000003 syscall=3 success=yes exit=48 a0=3 a1=913f4f8 a2=400 a3=400 items=0 ppid=1 pid=19570 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915374.488:600): path="inotify" type=AVC msg=audit(1162915374.512:601): avc: denied { read } for pid=19568 comm="evince" name="Fortress-WP.pdf" dev=dm-0 ino=14469396 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.512:601): arch=40000003 syscall=5 success=yes exit=55 a0=90bfc70 a1=8000 a2=1b6 a3=90c5708 items=0 ppid=4371 pid=19568 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915374.756:602): avc: denied { create } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:602): arch=40000003 syscall=5 success=yes exit=61 a0=9105920 a1=80c2 a2=1b6 a3=80c2 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915374.756:603): avc: denied { getattr } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:603): arch=40000003 syscall=197 success=yes exit=0 a0=3d a1=bfbcac14 a2=25dff4 a3=911ec28 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915374.756:603): path="/home/kmacmill/.recently-used.xbel.CED2IT" type=AVC msg=audit(1162915374.756:604): avc: denied { write } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:604): arch=40000003 syscall=4 success=yes exit=90112 a0=3d a1=912cd50 a2=16000 a3=16000 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915374.756:604): path="/home/kmacmill/.recently-used.xbel.CED2IT" type=AVC msg=audit(1162915374.756:605): avc: denied { rename } for pid=19567 comm="evince" name=".recently-used.xbel.CED2IT" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915374.756:605): arch=40000003 syscall=38 success=yes exit=0 a0=90dcb48 a1=8fc5968 a2=76c0708 a3=b7f3e8cc items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915375.592:606): avc: denied { read } for pid=19567 comm="evince" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1162915375.592:606): arch=40000003 syscall=5 success=yes exit=61 a0=8fc5968 a1=8000 a2=0 a3=8000 items=0 ppid=4371 pid=19567 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915575.868:607): avc: denied { search } for pid=19568 comm="evince" name="usbdev4.2_ep01" dev=sysfs ino=328509 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=AVC msg=audit(1162915608.822:608): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915608.822:608): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915608.822:609): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162915608.822:609): arch=40000003 syscall=197 success=yes exit=0 a0=3e a1=bf9732ec a2=36aff4 a3=a5b1c038 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915608.822:609): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162915756.967:610): avc: denied { execmem } for pid=4378 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162915756.967:610): arch=40000003 syscall=192 success=yes exit=116039680 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=4378 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162915801.590:611): user pid=19625 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162915801.590:612): login pid=19625 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162915801.590:613): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162915801.590:614): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915801.598:615): avc: denied { search } for pid=19626 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162915801.598:615): avc: denied { read } for pid=19626 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:615): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9305800 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915801.598:616): avc: denied { getattr } for pid=19626 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:616): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe3ca28 a2=239ff4 a3=9305800 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915801.598:616): path="/proc/net/dev" type=AVC msg=audit(1162915801.598:617): avc: denied { search } for pid=19626 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162915801.598:617): avc: denied { read } for pid=19626 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:617): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9305df0 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162915801.598:618): avc: denied { getattr } for pid=19626 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162915801.598:618): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe3c884 a2=239ff4 a3=9305df0 items=0 ppid=19625 pid=19626 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162915801.598:618): path="/proc/sys/fs/dentry-state" type=CRED_DISP msg=audit(1162915801.610:619): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162915801.610:620): user pid=19625 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162915974.193:621): avc: denied { read } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915974.193:621): arch=40000003 syscall=5 success=yes exit=75 a0=aa089078 a1=0 a2=b5e00040 a3=aa089078 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162915974.193:622): avc: denied { getattr } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915974.193:622): arch=40000003 syscall=197 success=yes exit=0 a0=4b a1=bf970ad4 a2=230fc0 a3=4c items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915974.193:622): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162915974.193:623): avc: denied { execute } for pid=4371 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162915974.193:623): arch=40000003 syscall=192 success=yes exit=104456192 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162915974.193:623): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162916401.676:624): user pid=19751 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162916401.676:625): login pid=19751 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162916401.676:626): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162916401.676:627): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162916401.680:628): avc: denied { execute } for pid=19752 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162916401.680:628): avc: denied { execute_no_trans } for pid=19752 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162916401.680:628): avc: denied { read } for pid=19752 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162916401.680:628): arch=40000003 syscall=11 success=yes exit=0 a0=8aa3d48 a1=8aa3740 a2=8aa3d60 a3=8aa3740 items=0 ppid=19751 pid=19752 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162916401.680:628): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162916401.680:628): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162916401.684:629): avc: denied { search } for pid=19752 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162916401.684:629): arch=40000003 syscall=33 success=yes exit=0 a0=bfd40214 a1=0 a2=bfd40108 a3=bfd40110 items=0 ppid=19751 pid=19752 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162916401.696:630): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162916401.696:631): user pid=19751 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162916996.341:632): avc: denied { search } for pid=19878 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162916996.341:632): avc: denied { search } for pid=19878 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162916996.341:632): arch=40000003 syscall=33 success=no exit=-2 a0=9da69f8 a1=4 a2=ca7bbc a3=9da69c8 items=0 ppid=3575 pid=19878 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162916996.341:633): avc: denied { search } for pid=19878 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162916996.341:633): avc: denied { read } for pid=19878 comm="gpg" name="evolution-pgp.SGNUIT" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162916996.341:633): arch=40000003 syscall=5 success=yes exit=3 a0=bf8b4b1a a1=8000 a2=0 a3=8000 items=0 ppid=3575 pid=19878 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=USER_ACCT msg=audit(1162917001.757:634): user pid=19879 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162917001.757:635): login pid=19879 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162917001.761:636): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162917001.761:637): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162917001.765:638): avc: denied { read append } for pid=19880 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162917001.765:638): arch=40000003 syscall=5 success=yes exit=3 a0=bfe0bae4 a1=402 a2=bfe0bca8 a3=bfe0b9e0 items=0 ppid=19879 pid=19880 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162917001.765:639): avc: denied { lock } for pid=19880 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162917001.765:639): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfe0b9e0 a3=3 items=0 ppid=19879 pid=19880 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162917001.765:639): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162917001.793:640): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162917001.793:641): user pid=19879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162917038.508:642): avc: denied { read } for pid=19888 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162917038.508:642): arch=40000003 syscall=33 success=yes exit=0 a0=bfccff92 a1=4 a2=de7a64 a3=bfccff92 items=0 ppid=19887 pid=19888 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162917232.176:643): avc: denied { write } for pid=19916 comm="gnome-terminal" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162917232.176:643): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfeaf5b0 a2=39b770 a3=15 items=0 ppid=1 pid=19916 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162917240.052:644): avc: denied { getattr } for pid=19922 comm="bash" name="unix" dev=proc ino=-268434925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=dir type=SYSCALL msg=audit(1162917240.052:644): arch=40000003 syscall=195 success=yes exit=0 a0=9999ea8 a1=bfcb9848 a2=239ff4 a3=9999ea8 items=0 ppid=3783 pid=19922 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162917240.052:644): path="/proc/sys/net/unix" type=AVC msg=audit(1162917242.712:645): avc: denied { read } for pid=19922 comm="bash" name="unix" dev=proc ino=-268434925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=dir type=SYSCALL msg=audit(1162917242.712:645): arch=40000003 syscall=5 success=yes exit=3 a0=9999728 a1=18800 a2=0 a3=999970a items=0 ppid=3783 pid=19922 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162917242.712:646): avc: denied { search } for pid=19922 comm="bash" name="unix" dev=proc ino=-268434925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=dir type=AVC msg=audit(1162917242.712:646): avc: denied { getattr } for pid=19922 comm="bash" name="max_dgram_qlen" dev=proc ino=-268434924 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_net_unix_t:s0 tclass=file type=SYSCALL msg=audit(1162917242.712:646): arch=40000003 syscall=195 success=yes exit=0 a0=9999740 a1=bfcb9934 a2=239ff4 a3=2 items=0 ppid=3783 pid=19922 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162917242.712:646): path="/proc/sys/net/unix/max_dgram_qlen" type=AVC msg=audit(1162917340.570:647): avc: denied { execute } for pid=4324 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162917340.570:647): arch=40000003 syscall=33 success=yes exit=0 a0=9c29130 a1=1 a2=11 a3=9c29130 items=0 ppid=4321 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1162917341.046:648): avc: denied { execute_no_trans } for pid=19949 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162917341.046:648): arch=40000003 syscall=11 success=yes exit=0 a0=9c22688 a1=9c22620 a2=9c23ec0 a3=9c28c28 items=0 ppid=4324 pid=19949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162917341.046:648): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=USER_ACCT msg=audit(1162917601.863:649): user pid=19977 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162917601.863:650): login pid=19977 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162917601.863:651): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162917601.863:652): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162917601.927:653): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162917601.927:654): user pid=19977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162918201.988:655): user pid=20054 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162918201.988:656): login pid=20054 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162918201.988:657): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162918201.988:658): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162918202.008:659): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162918202.008:660): user pid=20054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162918801.066:661): user pid=20120 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162918801.066:662): login pid=20120 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162918801.066:663): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162918801.066:664): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162918801.082:665): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162918801.082:666): user pid=20120 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162918861.093:667): user pid=20125 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162918861.093:668): login pid=20125 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162918861.093:669): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162918861.093:670): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162918861.097:671): avc: denied { getattr } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:671): arch=40000003 syscall=195 success=yes exit=0 a0=8efa120 a1=bff70830 a2=375ff4 a3=8efa120 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.097:671): path="/usr/bin/run-parts" type=AVC msg=audit(1162918861.097:672): avc: denied { execute } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:672): arch=40000003 syscall=33 success=yes exit=0 a0=8efa120 a1=1 a2=11 a3=8efa120 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.097:673): avc: denied { read } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:673): arch=40000003 syscall=33 success=yes exit=0 a0=8efa120 a1=4 a2=ffffffff a3=8efa120 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.097:674): avc: denied { execute_no_trans } for pid=20126 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.097:674): arch=40000003 syscall=11 success=yes exit=0 a0=8efa120 a1=8efa3d8 a2=8efa2f8 a3=8ef9f98 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.097:674): path="/usr/bin/run-parts" type=AVC msg=audit(1162918861.101:675): avc: denied { ioctl } for pid=20126 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.101:675): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd46828 a3=bfd46868 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.101:675): path="/usr/bin/run-parts" type=AVC msg=audit(1162918861.101:676): avc: denied { execute } for pid=20126 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.101:676): arch=40000003 syscall=33 success=yes exit=0 a0=9b3a990 a1=1 a2=1 a3=9b3ac98 items=0 ppid=20125 pid=20126 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.101:677): avc: denied { execute_no_trans } for pid=20127 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.101:677): arch=40000003 syscall=11 success=yes exit=0 a0=9b3aa10 a1=9b3aad8 a2=9b3aae8 a3=9b3a758 items=0 ppid=20126 pid=20127 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.101:677): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162918861.105:678): avc: denied { execute } for pid=20128 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162918861.105:678): avc: denied { execute_no_trans } for pid=20128 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162918861.105:678): avc: denied { read } for pid=20128 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.105:678): arch=40000003 syscall=11 success=yes exit=0 a0=95f8678 a1=95f8808 a2=95f8720 a3=95f8508 items=0 ppid=20127 pid=20128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.105:678): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162918861.105:678): path="/sbin/chkconfig" type=AVC msg=audit(1162918861.105:679): avc: denied { read } for pid=20128 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.105:679): arch=40000003 syscall=5 success=yes exit=3 a0=bff4da10 a1=0 a2=ffffffff a3=8768038 items=0 ppid=20127 pid=20128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162918861.105:680): avc: denied { getattr } for pid=20128 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162918861.105:680): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff4d980 a2=2eeff4 a3=3 items=0 ppid=20127 pid=20128 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162918861.105:680): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162918861.113:681): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162918861.113:682): user pid=20125 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162919401.167:683): user pid=20179 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162919401.167:684): login pid=20179 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162919401.167:685): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162919401.167:686): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162919401.175:687): avc: denied { search } for pid=20180 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162919401.175:687): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9b31800 items=0 ppid=20179 pid=20180 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162919401.187:688): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162919401.187:689): user pid=20179 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162920001.245:690): user pid=20253 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162920001.245:691): login pid=20253 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162920001.245:692): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162920001.245:693): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162920001.261:694): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162920001.261:695): user pid=20253 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162920013.069:696): avc: denied { read } for pid=20277 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920013.069:696): arch=40000003 syscall=33 success=yes exit=0 a0=bf950f92 a1=4 a2=de7a64 a3=bf950f92 items=0 ppid=20276 pid=20277 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162920030.163:697): avc: denied { execmem } for pid=4371 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162920030.163:697): arch=40000003 syscall=192 success=yes exit=96612352 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920048.188:698): avc: denied { read } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920048.188:698): arch=40000003 syscall=33 success=yes exit=0 a0=bf976fcb a1=4 a2=4db18a64 a3=bf976fcb items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920048.188:699): avc: denied { getattr } for pid=4371 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920048.188:699): arch=40000003 syscall=197 success=yes exit=0 a0=47 a1=bf9739e8 a2=36aff4 a3=ac901250 items=0 ppid=1 pid=4371 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920048.188:699): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162920137.525:700): avc: denied { execute } for pid=20295 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162920137.525:700): arch=40000003 syscall=192 success=yes exit=70774784 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920137.525:700): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162920137.537:701): avc: denied { execstack } for pid=20295 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162920137.537:701): arch=40000003 syscall=125 success=yes exit=0 a0=bf924000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920137.573:702): avc: denied { execmod } for pid=20295 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162920137.573:702): arch=40000003 syscall=125 success=yes exit=0 a0=437f000 a1=26f000 a2=5 a3=bf920a50 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920137.573:702): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162920142.458:703): avc: denied { ioctl } for pid=20328 comm="ps" name="[379798]" dev=pipefs ino=379798 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1162920142.458:703): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5413 a2=bff1a184 a3=bff1a1c8 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.458:703): path="pipe:[379798]" type=AVC msg=audit(1162920142.482:704): avc: denied { getattr } for pid=20328 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.482:704): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.482:704): path="/proc/1" type=AVC msg=audit(1162920142.482:705): avc: denied { search } for pid=20328 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1162920142.482:705): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.482:705): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.482:706): avc: denied { getattr } for pid=20328 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.482:706): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.482:706): path="/proc/2" type=AVC msg=audit(1162920142.482:707): avc: denied { search } for pid=20328 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1162920142.482:707): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.482:707): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:708): avc: denied { getattr } for pid=20328 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.486:708): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:708): path="/proc/455" type=AVC msg=audit(1162920142.486:709): avc: denied { search } for pid=20328 comm="ps" name="455" dev=proc ino=29818882 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.486:709): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=29818893 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.486:709): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:710): avc: denied { getattr } for pid=20328 comm="ps" name="2154" dev=proc ino=141164546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:710): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:710): path="/proc/2154" type=AVC msg=audit(1162920142.486:711): avc: denied { search } for pid=20328 comm="ps" name="2154" dev=proc ino=141164546 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:711): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=141164557 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:711): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:712): avc: denied { getattr } for pid=20328 comm="ps" name="2166" dev=proc ino=141950978 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:712): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:712): path="/proc/2166" type=AVC msg=audit(1162920142.486:713): avc: denied { search } for pid=20328 comm="ps" name="2166" dev=proc ino=141950978 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:713): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=141950989 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:713): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:714): avc: denied { getattr } for pid=20328 comm="ps" name="2182" dev=proc ino=142999554 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:714): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:714): path="/proc/2182" type=AVC msg=audit(1162920142.486:715): avc: denied { search } for pid=20328 comm="ps" name="2182" dev=proc ino=142999554 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:715): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=142999565 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:715): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:716): avc: denied { getattr } for pid=20328 comm="ps" name="2185" dev=proc ino=143196162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:716): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:716): path="/proc/2185" type=AVC msg=audit(1162920142.486:717): avc: denied { search } for pid=20328 comm="ps" name="2185" dev=proc ino=143196162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:717): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=143196173 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:717): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:718): avc: denied { getattr } for pid=20328 comm="ps" name="2197" dev=proc ino=143982594 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.486:718): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:718): path="/proc/2197" type=AVC msg=audit(1162920142.486:719): avc: denied { search } for pid=20328 comm="ps" name="2197" dev=proc ino=143982594 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1162920142.486:719): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=143982605 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.486:719): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.486:720): avc: denied { getattr } for pid=20328 comm="ps" name="2213" dev=proc ino=145031170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.486:720): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.486:720): path="/proc/2213" type=AVC msg=audit(1162920142.486:721): avc: denied { search } for pid=20328 comm="ps" name="2213" dev=proc ino=145031170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.486:721): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=145031181 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.486:721): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:722): avc: denied { getattr } for pid=20328 comm="ps" name="2226" dev=proc ino=145883138 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:722): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:722): path="/proc/2226" type=AVC msg=audit(1162920142.490:723): avc: denied { search } for pid=20328 comm="ps" name="2226" dev=proc ino=145883138 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:723): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=145883149 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:723): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:724): avc: denied { getattr } for pid=20328 comm="ps" name="2260" dev=proc ino=148111362 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:724): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:724): path="/proc/2260" type=AVC msg=audit(1162920142.490:725): avc: denied { search } for pid=20328 comm="ps" name="2260" dev=proc ino=148111362 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:725): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=148111373 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:725): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:726): avc: denied { getattr } for pid=20328 comm="ps" name="2324" dev=proc ino=152305666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:726): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:726): path="/proc/2324" type=AVC msg=audit(1162920142.490:727): avc: denied { search } for pid=20328 comm="ps" name="2324" dev=proc ino=152305666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:727): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=152305677 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:727): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:728): avc: denied { getattr } for pid=20328 comm="ps" name="2336" dev=proc ino=153092098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:728): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:728): path="/proc/2336" type=AVC msg=audit(1162920142.490:729): avc: denied { search } for pid=20328 comm="ps" name="2336" dev=proc ino=153092098 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:729): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=153092109 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:729): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:730): avc: denied { getattr } for pid=20328 comm="ps" name="2426" dev=proc ino=158990338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:730): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:730): path="/proc/2426" type=AVC msg=audit(1162920142.490:731): avc: denied { search } for pid=20328 comm="ps" name="2426" dev=proc ino=158990338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:731): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=158990349 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:731): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:732): avc: denied { getattr } for pid=20328 comm="ps" name="2445" dev=proc ino=160235522 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:732): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:732): path="/proc/2445" type=AVC msg=audit(1162920142.490:733): avc: denied { search } for pid=20328 comm="ps" name="2445" dev=proc ino=160235522 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:733): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=160235533 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:733): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:734): avc: denied { getattr } for pid=20328 comm="ps" name="2456" dev=proc ino=160956418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:734): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:734): path="/proc/2456" type=AVC msg=audit(1162920142.490:735): avc: denied { search } for pid=20328 comm="ps" name="2456" dev=proc ino=160956418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:735): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=160956429 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:735): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:736): avc: denied { getattr } for pid=20328 comm="ps" name="2473" dev=proc ino=162070530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.490:736): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:736): path="/proc/2473" type=AVC msg=audit(1162920142.490:737): avc: denied { search } for pid=20328 comm="ps" name="2473" dev=proc ino=162070530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.490:737): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=162070541 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.490:737): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:738): avc: denied { getattr } for pid=20328 comm="ps" name="2487" dev=proc ino=162988034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.490:738): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:738): path="/proc/2487" type=AVC msg=audit(1162920142.490:739): avc: denied { search } for pid=20328 comm="ps" name="2487" dev=proc ino=162988034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.490:739): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=162988045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.490:739): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:740): avc: denied { getattr } for pid=20328 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:740): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:740): path="/proc/2499" type=AVC msg=audit(1162920142.490:741): avc: denied { search } for pid=20328 comm="ps" name="2499" dev=proc ino=163774466 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:741): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=163774477 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:741): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:742): avc: denied { getattr } for pid=20328 comm="ps" name="2519" dev=proc ino=165085186 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:742): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:742): path="/proc/2519" type=AVC msg=audit(1162920142.490:743): avc: denied { search } for pid=20328 comm="ps" name="2519" dev=proc ino=165085186 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:743): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=165085197 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:743): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:744): avc: denied { getattr } for pid=20328 comm="ps" name="2540" dev=proc ino=166461442 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.490:744): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:744): path="/proc/2540" type=AVC msg=audit(1162920142.490:745): avc: denied { search } for pid=20328 comm="ps" name="2540" dev=proc ino=166461442 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1162920142.490:745): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=166461453 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.490:745): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.490:746): avc: denied { getattr } for pid=20328 comm="ps" name="2551" dev=proc ino=167182338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.490:746): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.490:746): path="/proc/2551" type=AVC msg=audit(1162920142.494:747): avc: denied { search } for pid=20328 comm="ps" name="2551" dev=proc ino=167182338 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.494:747): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=167182349 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.494:747): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:748): avc: denied { getattr } for pid=20328 comm="ps" name="2588" dev=proc ino=169607170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:748): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:748): path="/proc/2588" type=AVC msg=audit(1162920142.494:749): avc: denied { search } for pid=20328 comm="ps" name="2588" dev=proc ino=169607170 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:749): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=169607181 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:749): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:750): avc: denied { getattr } for pid=20328 comm="ps" name="2681" dev=proc ino=175702018 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:750): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:750): path="/proc/2681" type=AVC msg=audit(1162920142.494:751): avc: denied { search } for pid=20328 comm="ps" name="2681" dev=proc ino=175702018 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:751): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=175702029 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:avahi_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:751): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:752): avc: denied { getattr } for pid=20328 comm="ps" name="2693" dev=proc ino=176488450 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:752): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:752): path="/proc/2693" type=AVC msg=audit(1162920142.494:753): avc: denied { search } for pid=20328 comm="ps" name="2693" dev=proc ino=176488450 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:753): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=176488461 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:753): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:754): avc: denied { getattr } for pid=20328 comm="ps" name="2706" dev=proc ino=177340418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:754): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:754): path="/proc/2706" type=AVC msg=audit(1162920142.494:755): avc: denied { search } for pid=20328 comm="ps" name="2706" dev=proc ino=177340418 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:755): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=177340429 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:755): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:756): avc: denied { getattr } for pid=20328 comm="ps" name="2771" dev=proc ino=181600258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:756): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:756): path="/proc/2771" type=AVC msg=audit(1162920142.494:757): avc: denied { search } for pid=20328 comm="ps" name="2771" dev=proc ino=181600258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:757): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=181600269 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:757): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:758): avc: denied { getattr } for pid=20328 comm="ps" name="2798" dev=proc ino=183369730 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:758): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:758): path="/proc/2798" type=AVC msg=audit(1162920142.494:759): avc: denied { search } for pid=20328 comm="ps" name="2798" dev=proc ino=183369730 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:759): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=183369741 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:759): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:760): avc: denied { getattr } for pid=20328 comm="ps" name="2813" dev=proc ino=184352770 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.494:760): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:760): path="/proc/2813" type=AVC msg=audit(1162920142.494:761): avc: denied { search } for pid=20328 comm="ps" name="2813" dev=proc ino=184352770 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1162920142.494:761): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=184352781 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.494:761): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:762): avc: denied { getattr } for pid=20328 comm="ps" name="2827" dev=proc ino=185270274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.494:762): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:762): path="/proc/2827" type=AVC msg=audit(1162920142.494:763): avc: denied { search } for pid=20328 comm="ps" name="2827" dev=proc ino=185270274 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.494:763): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=185270285 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.494:763): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.494:764): avc: denied { getattr } for pid=20328 comm="ps" name="2936" dev=proc ino=192413698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1162920142.494:764): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.494:764): path="/proc/2936" type=AVC msg=audit(1162920142.494:765): avc: denied { search } for pid=20328 comm="ps" name="2936" dev=proc ino=192413698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1162920142.494:765): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=192413709 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1162920142.494:765): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:766): avc: denied { getattr } for pid=20328 comm="ps" name="2965" dev=proc ino=194314242 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:766): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:766): path="/proc/2965" type=AVC msg=audit(1162920142.498:767): avc: denied { search } for pid=20328 comm="ps" name="2965" dev=proc ino=194314242 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:767): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=194314253 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:767): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:768): avc: denied { getattr } for pid=20328 comm="ps" name="3017" dev=proc ino=197722114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:768): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:768): path="/proc/3017" type=AVC msg=audit(1162920142.498:769): avc: denied { search } for pid=20328 comm="ps" name="3017" dev=proc ino=197722114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:769): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=197722125 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:769): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:770): avc: denied { getattr } for pid=20328 comm="ps" name="3021" dev=proc ino=197984258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:770): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:770): path="/proc/3021" type=AVC msg=audit(1162920142.498:771): avc: denied { search } for pid=20328 comm="ps" name="3021" dev=proc ino=197984258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:771): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=197984269 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:771): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.498:772): avc: denied { getattr } for pid=20328 comm="ps" name="3112" dev=proc ino=203948034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.498:772): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.498:772): path="/proc/3112" type=AVC msg=audit(1162920142.498:773): avc: denied { search } for pid=20328 comm="ps" name="3112" dev=proc ino=203948034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1162920142.498:773): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=203948045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.498:773): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:774): avc: denied { getattr } for pid=20328 comm="ps" name="3214" dev=proc ino=210632706 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:774): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:774): path="/proc/3214" type=AVC msg=audit(1162920142.502:775): avc: denied { search } for pid=20328 comm="ps" name="3214" dev=proc ino=210632706 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:775): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=210632717 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:775): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:776): avc: denied { getattr } for pid=20328 comm="ps" name="3239" dev=proc ino=212271106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:776): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:776): path="/proc/3239" type=AVC msg=audit(1162920142.502:777): avc: denied { search } for pid=20328 comm="ps" name="3239" dev=proc ino=212271106 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:777): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=212271117 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:777): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:778): avc: denied { getattr } for pid=20328 comm="ps" name="3575" dev=proc ino=234291202 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:778): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:778): path="/proc/3575" type=AVC msg=audit(1162920142.502:779): avc: denied { search } for pid=20328 comm="ps" name="3575" dev=proc ino=234291202 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:779): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=234291213 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:779): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:780): avc: denied { getattr } for pid=20328 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:780): arch=40000003 syscall=195 success=yes exit=0 a0=4bb840 a1=bff178f0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:780): path="/dev/pts" type=AVC msg=audit(1162920142.502:781): avc: denied { read } for pid=20328 comm="ps" name="2" dev=proc ino=248152066 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=lnk_file type=AVC msg=audit(1162920142.502:781): avc: denied { ptrace } for pid=20328 comm="ps" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162920142.502:781): arch=40000003 syscall=85 success=yes exit=10 a0=bff17928 a1=4bb840 a2=7f a3=bff17928 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:782): avc: denied { search } for pid=20328 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:782): avc: denied { getattr } for pid=20328 comm="ps" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162920142.502:782): arch=40000003 syscall=195 success=yes exit=0 a0=4bb840 a1=bff17830 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:782): path="/dev/pts/1" type=AVC msg=audit(1162920142.502:783): avc: denied { getattr } for pid=20328 comm="ps" name="2" dev=devpts ino=4 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162920142.502:783): arch=40000003 syscall=195 success=yes exit=0 a0=4bb840 a1=bff17830 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:783): path="/dev/pts/2" type=AVC msg=audit(1162920142.502:784): avc: denied { getattr } for pid=20328 comm="ps" name="4282" dev=proc ino=280625154 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:784): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:784): path="/proc/4282" type=AVC msg=audit(1162920142.502:785): avc: denied { search } for pid=20328 comm="ps" name="4282" dev=proc ino=280625154 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:785): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=280625165 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:785): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:786): avc: denied { getattr } for pid=20328 comm="ps" name="4321" dev=proc ino=283181058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:786): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:786): path="/proc/4321" type=AVC msg=audit(1162920142.502:787): avc: denied { search } for pid=20328 comm="ps" name="4321" dev=proc ino=283181058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:787): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=283181069 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:787): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920142.502:788): avc: denied { getattr } for pid=20328 comm="ps" name="4324" dev=proc ino=283377666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=SYSCALL msg=audit(1162920142.502:788): arch=40000003 syscall=195 success=yes exit=0 a0=996897c a1=bff1a0e0 a2=239ff4 a3=3 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920142.502:788): path="/proc/4324" type=AVC msg=audit(1162920142.502:789): avc: denied { search } for pid=20328 comm="ps" name="4324" dev=proc ino=283377666 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=AVC msg=audit(1162920142.502:789): avc: denied { read } for pid=20328 comm="ps" name="stat" dev=proc ino=283377677 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=file type=SYSCALL msg=audit(1162920142.502:789): arch=40000003 syscall=5 success=yes exit=18 a0=4bd780 a1=0 a2=0 a3=4bd780 items=0 ppid=20327 pid=20328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920144.582:790): avc: denied { write } for pid=20295 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162920144.582:790): avc: denied { add_name } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162920144.582:790): avc: denied { create } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920144.582:790): arch=40000003 syscall=5 success=yes exit=50 a0=bf923acb a1=c2 a2=180 a3=293500 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920144.582:791): avc: denied { read write } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920144.582:791): arch=40000003 syscall=5 success=yes exit=50 a0=a6d65080 a1=242 a2=1b6 a3=90edaa0 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920144.582:792): avc: denied { getattr } for pid=20295 comm="firefox-bin" name="Flash6fMJkH" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920144.582:792): arch=40000003 syscall=197 success=yes exit=0 a0=32 a1=bf923948 a2=239ff4 a3=90edaa0 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920144.582:792): path="/tmp/Flash6fMJkH" type=AVC msg=audit(1162920363.911:793): avc: denied { search } for pid=20295 comm="firefox-bin" name="pcm" dev=dm-0 ino=9330155 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1162920363.911:793): avc: denied { read } for pid=20295 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162920363.911:793): arch=40000003 syscall=5 success=yes exit=53 a0=8c301e0 a1=0 a2=1b6 a3=982b840 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920363.927:794): avc: denied { getattr } for pid=20295 comm="firefox-bin" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1162920363.927:794): arch=40000003 syscall=197 success=yes exit=0 a0=35 a1=bf923770 a2=239ff4 a3=982b840 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162920363.927:794): path="/etc/alsa/pcm/default.conf" type=AVC msg=audit(1162920363.951:795): avc: denied { search } for pid=20295 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162920363.951:795): arch=40000003 syscall=54 success=yes exit=0 a0=35 a1=c25c4111 a2=bf9234ac a3=bf9234ac items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920398.374:796): avc: denied { remove_name } for pid=20295 comm="firefox-bin" name="7j7px5ah.bin" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162920398.374:796): avc: denied { unlink } for pid=20295 comm="firefox-bin" name="7j7px5ah.bin" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162920398.374:796): arch=40000003 syscall=10 success=yes exit=0 a0=960cca8 a1=0 a2=6e44304 a3=0 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162920425.635:797): avc: denied { create } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:797): arch=40000003 syscall=102 success=yes exit=49 a0=1 a1=b410d274 a2=4c0ff4 a3=802d7f items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:798): avc: denied { bind } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:798): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b410d274 a2=4c0ff4 a3=31 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:799): avc: denied { getattr } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:799): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b410d274 a2=4c0ff4 a3=31 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:800): avc: denied { write } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162920425.635:800): avc: denied { nlmsg_read } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:800): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b410c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162920425.635:801): avc: denied { read } for pid=20374 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162920425.635:801): arch=40000003 syscall=102 success=yes exit=128 a0=11 a1=b410c1b4 a2=4c0ff4 a3=0 items=0 ppid=1 pid=20374 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162920601.326:802): user pid=20440 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162920601.326:803): login pid=20440 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162920601.326:804): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162920601.326:805): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162920601.330:806): avc: denied { execute } for pid=20441 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162920601.330:806): avc: denied { execute_no_trans } for pid=20441 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.330:806): arch=40000003 syscall=11 success=yes exit=0 a0=8f781b0 a1=8f78358 a2=8f78290 a3=8f78008 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.330:806): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162920601.330:807): avc: denied { execute } for pid=20441 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162920601.330:807): avc: denied { execute_no_trans } for pid=20441 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162920601.330:807): avc: denied { read } for pid=20441 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.330:807): arch=40000003 syscall=11 success=yes exit=0 a0=99c1d48 a1=99c1740 a2=99c1d60 a3=99c1740 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.330:807): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162920601.330:807): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162920601.330:808): avc: denied { search } for pid=20441 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162920601.330:808): avc: denied { read } for pid=20441 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.330:808): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=991c800 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:809): avc: denied { getattr } for pid=20441 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.334:809): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf913238 a2=239ff4 a3=991c800 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.334:809): path="/proc/net/dev" type=AVC msg=audit(1162920601.334:810): avc: denied { search } for pid=20441 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162920601.334:810): arch=40000003 syscall=33 success=yes exit=0 a0=bf9135e4 a1=0 a2=bf9134d8 a3=bf9134e0 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:811): avc: denied { read append } for pid=20441 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.334:811): arch=40000003 syscall=5 success=yes exit=3 a0=bf9135e4 a1=402 a2=bf9137a8 a3=bf9134e0 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:812): avc: denied { search } for pid=20441 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162920601.334:812): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=991cd60 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:813): avc: denied { search } for pid=20441 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162920601.334:813): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=991cd60 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162920601.334:814): avc: denied { lock } for pid=20441 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162920601.334:814): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf9134e0 a3=3 items=0 ppid=20440 pid=20441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162920601.334:814): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162920601.350:815): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162920601.350:816): user pid=20440 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162920787.822:817): avc: denied { search } for pid=20497 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162920787.822:817): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=b219efd8 a2=4c0ff4 a3=0 items=0 ppid=1 pid=20497 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162921052.278:818): avc: denied { search } for pid=20295 comm="firefox-bin" name="usbdev4.2_ep01" dev=sysfs ino=380744 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162921052.278:818): arch=40000003 syscall=91 success=yes exit=0 a0=b7fcc000 a1=1000 a2=7ea9ebc a3=9be1028 items=0 ppid=1 pid=20295 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162921060.375:819): avc: denied { read } for pid=20537 comm="nm-vpnc-auth-di" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162921060.375:819): arch=40000003 syscall=33 success=yes exit=0 a0=bfd3ee46 a1=4 a2=de7a64 a3=bfd3ee46 items=0 ppid=3098 pid=20537 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162921102.986:820): avc: denied { read } for pid=20574 comm="xchat" name="resolv.conf" dev=dm-0 ino=9334542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162921102.986:820): arch=40000003 syscall=5 success=yes exit=9 a0=432d13 a1=0 a2=1b6 a3=9a0fcf8 items=0 ppid=3203 pid=20574 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162921201.420:821): user pid=20607 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162921201.424:822): login pid=20607 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162921201.424:823): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162921201.424:824): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162921201.424:825): avc: denied { execute } for pid=20608 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162921201.424:825): avc: denied { execute_no_trans } for pid=20608 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.424:825): arch=40000003 syscall=11 success=yes exit=0 a0=9d971b0 a1=9d97358 a2=9d97290 a3=9d97008 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.424:825): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162921201.428:826): avc: denied { execute } for pid=20608 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162921201.428:826): avc: denied { execute_no_trans } for pid=20608 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162921201.428:826): avc: denied { read } for pid=20608 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.428:826): arch=40000003 syscall=11 success=yes exit=0 a0=8f92d48 a1=8f92740 a2=8f92d60 a3=8f92740 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.428:826): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162921201.428:826): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162921201.428:827): avc: denied { search } for pid=20608 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162921201.428:827): arch=40000003 syscall=33 success=yes exit=0 a0=bfa8a764 a1=0 a2=bfa8a658 a3=bfa8a660 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.428:828): avc: denied { read append } for pid=20608 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.428:828): arch=40000003 syscall=5 success=yes exit=3 a0=bfa8a764 a1=402 a2=bfa8a928 a3=bfa8a660 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.428:829): avc: denied { search } for pid=20608 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162921201.428:829): avc: denied { read } for pid=20608 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.428:829): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8eeddf0 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.432:830): avc: denied { getattr } for pid=20608 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.432:830): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa8a214 a2=239ff4 a3=8eeddf0 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.432:830): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162921201.432:831): avc: denied { search } for pid=20608 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162921201.432:831): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8eeddf0 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162921201.432:832): avc: denied { lock } for pid=20608 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162921201.432:832): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfa8a660 a3=3 items=0 ppid=20607 pid=20608 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162921201.432:832): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162921201.444:833): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162921201.444:834): user pid=20607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162921791.973:835): avc: denied { execmem } for pid=20631 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162921791.973:835): arch=40000003 syscall=192 success=yes exit=133574656 a0=7f63000 a1=1a000 a2=7 a3=812 items=0 ppid=3158 pid=20631 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162921791.973:836): avc: denied { execstack } for pid=20631 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162921791.973:836): arch=40000003 syscall=125 success=yes exit=0 a0=bffc3000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=3158 pid=20631 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162921792.041:837): avc: denied { execute } for pid=20631 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162921792.041:837): arch=40000003 syscall=192 success=yes exit=10104832 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3158 pid=20631 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162921792.041:837): path="/dev/zero" type=USER_ACCT msg=audit(1162921801.505:838): user pid=20632 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162921801.505:839): login pid=20632 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162921801.505:840): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162921801.505:841): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162921801.517:842): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162921801.521:843): user pid=20632 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162922401.579:844): user pid=20655 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162922401.583:845): login pid=20655 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162922401.583:846): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162922401.583:847): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162922401.595:848): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162922401.595:849): user pid=20655 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162922461.602:850): user pid=20659 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162922461.602:851): login pid=20659 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162922461.606:852): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162922461.606:853): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162922461.610:854): avc: denied { getattr } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:854): arch=40000003 syscall=195 success=yes exit=0 a0=8881120 a1=bfd71e30 a2=239ff4 a3=8881120 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:854): path="/usr/bin/run-parts" type=AVC msg=audit(1162922461.610:855): avc: denied { execute } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:855): arch=40000003 syscall=33 success=yes exit=0 a0=8881120 a1=1 a2=11 a3=8881120 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.610:856): avc: denied { read } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:856): arch=40000003 syscall=33 success=yes exit=0 a0=8881120 a1=4 a2=ffffffff a3=8881120 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.610:857): avc: denied { execute_no_trans } for pid=20660 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:857): arch=40000003 syscall=11 success=yes exit=0 a0=8881120 a1=88813d8 a2=88812f8 a3=8880f98 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:857): path="/usr/bin/run-parts" type=AVC msg=audit(1162922461.610:858): avc: denied { ioctl } for pid=20660 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:858): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfe32118 a3=bfe32158 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:858): path="/usr/bin/run-parts" type=AVC msg=audit(1162922461.610:859): avc: denied { execute } for pid=20660 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:859): arch=40000003 syscall=33 success=yes exit=0 a0=9947990 a1=1 a2=1 a3=9947c98 items=0 ppid=20659 pid=20660 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.610:860): avc: denied { execute_no_trans } for pid=20661 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.610:860): arch=40000003 syscall=11 success=yes exit=0 a0=9947a10 a1=9947ad8 a2=9947ae8 a3=9947758 items=0 ppid=20660 pid=20661 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.610:860): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162922461.614:861): avc: denied { execute } for pid=20662 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162922461.614:861): avc: denied { execute_no_trans } for pid=20662 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162922461.614:861): avc: denied { read } for pid=20662 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.614:861): arch=40000003 syscall=11 success=yes exit=0 a0=946e678 a1=946e808 a2=946e720 a3=946e508 items=0 ppid=20661 pid=20662 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.614:861): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162922461.614:861): path="/sbin/chkconfig" type=AVC msg=audit(1162922461.614:862): avc: denied { read } for pid=20662 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.614:862): arch=40000003 syscall=5 success=yes exit=3 a0=bf918be0 a1=0 a2=ffffffff a3=824f038 items=0 ppid=20661 pid=20662 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162922461.614:863): avc: denied { getattr } for pid=20662 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162922461.614:863): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf918b50 a2=239ff4 a3=3 items=0 ppid=20661 pid=20662 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162922461.614:863): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162922461.626:864): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162922461.626:865): user pid=20659 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162923001.688:866): user pid=20720 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162923001.688:867): login pid=20720 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162923001.688:868): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162923001.688:869): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162923001.704:870): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162923001.704:871): user pid=20720 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162923595.241:872): avc: denied { execute } for pid=20743 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162923595.241:872): arch=40000003 syscall=192 success=yes exit=4689920 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3158 pid=20743 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162923595.241:872): path="/dev/zero" type=USER_ACCT msg=audit(1162923601.770:873): user pid=20744 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162923601.770:874): login pid=20744 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162923601.770:875): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162923601.770:876): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162923601.778:877): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162923601.778:878): user pid=20744 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162924201.839:879): user pid=20771 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162924201.839:880): login pid=20771 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162924201.839:881): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162924201.839:882): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162924201.855:883): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162924201.855:884): user pid=20771 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162924801.917:885): user pid=20796 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162924801.917:886): login pid=20796 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162924801.917:887): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162924801.917:888): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162924801.933:889): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162924801.933:890): user pid=20796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162925401.990:891): user pid=20821 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162925401.990:892): login pid=20821 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162925401.990:893): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162925401.990:894): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162925402.002:895): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162925402.002:896): user pid=20821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162926001.064:897): user pid=20846 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162926001.064:898): login pid=20846 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162926001.064:899): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162926001.064:900): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162926001.080:901): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162926001.080:902): user pid=20846 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162926061.087:903): user pid=20850 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162926061.087:904): login pid=20850 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162926061.087:905): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162926061.087:906): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162926061.103:907): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162926061.107:908): user pid=20850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162926601.157:909): user pid=20879 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162926601.157:910): login pid=20879 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162926601.157:911): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162926601.161:912): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162926601.173:913): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162926601.173:914): user pid=20879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162927201.247:915): user pid=20903 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162927201.247:916): login pid=20903 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162927201.247:917): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162927201.247:918): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162927201.263:919): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162927201.263:920): user pid=20903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162927801.324:921): user pid=20930 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162927801.328:922): login pid=20930 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162927801.328:923): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162927801.328:924): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162927801.340:925): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162927801.340:926): user pid=20930 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162928401.410:927): user pid=20953 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162928401.410:928): login pid=20953 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162928401.410:929): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162928401.410:930): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162928401.426:931): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162928401.426:932): user pid=20953 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162929001.487:933): user pid=20976 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162929001.487:934): login pid=20976 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162929001.487:935): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162929001.487:936): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162929001.495:937): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162929001.495:938): user pid=20976 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162929601.561:939): user pid=21000 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162929601.561:940): login pid=21000 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162929601.561:941): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162929601.561:942): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162929601.577:943): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162929601.577:944): user pid=21000 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162929661.588:945): user pid=21004 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162929661.588:946): login pid=21004 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162929661.588:947): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162929661.588:948): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162929661.608:949): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162929661.608:950): user pid=21004 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162930201.670:951): user pid=21033 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162930201.670:952): login pid=21033 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162930201.670:953): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162930201.670:954): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162930201.686:955): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162930201.686:956): user pid=21033 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162930801.744:957): user pid=21056 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162930801.744:958): login pid=21056 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162930801.744:959): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162930801.744:960): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162930801.760:961): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162930801.760:962): user pid=21056 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162931401.825:963): user pid=21081 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162931401.825:964): login pid=21081 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162931401.825:965): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162931401.825:966): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162931401.841:967): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162931401.841:968): user pid=21081 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162932001.895:969): user pid=21104 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162932001.895:970): login pid=21104 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162932001.899:971): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162932001.899:972): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162932001.911:973): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162932001.911:974): user pid=21104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162932601.984:975): user pid=21129 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162932601.984:976): login pid=21129 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162932601.984:977): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162932601.984:978): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162932602.000:979): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162932602.000:980): user pid=21129 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162933201.062:981): user pid=21152 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162933201.066:982): login pid=21152 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162933201.066:983): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162933201.066:984): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162933201.078:985): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162933201.078:986): user pid=21152 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162933261.085:987): user pid=21156 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162933261.085:988): login pid=21156 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162933261.085:989): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162933261.085:990): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162933261.105:991): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162933261.105:992): user pid=21156 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162933801.167:993): user pid=21184 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162933801.167:994): login pid=21184 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162933801.167:995): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162933801.167:996): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162933801.183:997): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162933801.183:998): user pid=21184 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162934401.249:999): user pid=21210 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162934401.249:1000): login pid=21210 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162934401.249:1001): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162934401.249:1002): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162934401.285:1003): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162934401.285:1004): user pid=21210 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162935001.354:1005): user pid=21237 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162935001.354:1006): login pid=21237 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162935001.354:1007): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162935001.354:1008): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162935001.370:1009): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162935001.370:1010): user pid=21237 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162935601.440:1011): user pid=21260 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162935601.440:1012): login pid=21260 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162935601.440:1013): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162935601.440:1014): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162935601.456:1015): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162935601.456:1016): user pid=21260 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162936201.517:1017): user pid=21285 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162936201.517:1018): login pid=21285 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162936201.517:1019): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162936201.517:1020): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162936201.533:1021): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162936201.533:1022): user pid=21285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162936801.603:1023): user pid=21308 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162936801.603:1024): login pid=21308 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162936801.603:1025): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162936801.603:1026): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162936801.619:1027): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162936801.619:1028): user pid=21308 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162936861.626:1029): user pid=21312 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162936861.626:1030): login pid=21312 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162936861.626:1031): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162936861.626:1032): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162936861.646:1033): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162936861.646:1034): user pid=21312 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162937184.851:1035): avc: denied { read } for pid=21353 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.851:1035): arch=40000003 syscall=33 success=yes exit=0 a0=bfa81f92 a1=4 a2=de7a64 a3=bfa81f92 items=0 ppid=21352 pid=21353 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937184.851:1036): avc: denied { getattr } for pid=21353 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.851:1036): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa80acc a2=239ff4 a3=817bab0 items=0 ppid=21352 pid=21353 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937184.851:1036): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162937184.879:1037): avc: denied { execute } for pid=21350 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162937184.879:1037): avc: denied { execute_no_trans } for pid=21350 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162937184.879:1037): avc: denied { read } for pid=21350 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.879:1037): arch=40000003 syscall=11 success=yes exit=0 a0=881f8b8 a1=8821920 a2=8822118 a3=8821920 items=0 ppid=1 pid=21350 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937184.879:1037): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162937184.879:1037): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162937184.891:1038): avc: denied { getattr } for pid=21350 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162937184.891:1038): arch=40000003 syscall=196 success=yes exit=0 a0=bfbce2f8 a1=bfbcddec a2=47aff4 a3=bfbcfa06 items=0 ppid=1 pid=21350 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937184.891:1038): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162937189.635:1039): avc: denied { read } for pid=21358 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937189.635:1039): arch=40000003 syscall=33 success=yes exit=0 a0=bf94cfcb a1=4 a2=de7a64 a3=bf94cfcb items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937189.635:1040): avc: denied { getattr } for pid=21358 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937189.635:1040): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf94acec a2=239ff4 a3=9838140 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937189.635:1040): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162937312.079:1041): avc: denied { search } for pid=21414 comm="firefox-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162937312.079:1041): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bff6ccd8 a2=239ff4 a3=3 items=0 ppid=1 pid=21414 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937330.052:1042): avc: denied { execute } for pid=21358 comm="firefox-bin" name="realplay" dev=dm-0 ino=12212539 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162937330.052:1042): arch=40000003 syscall=33 success=yes exit=0 a0=a12f7fc a1=1 a2=76c0708 a3=8 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937330.084:1043): avc: denied { write } for pid=21358 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937330.084:1043): avc: denied { add_name } for pid=21358 comm="firefox-bin" name="o1smfxjx" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937330.084:1043): avc: denied { create } for pid=21358 comm="firefox-bin" name="o1smfxjx" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937330.084:1043): arch=40000003 syscall=5 success=yes exit=39 a0=a1336b0 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937330.084:1044): avc: denied { write } for pid=21358 comm="firefox-bin" name="o1smfxjx" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937330.084:1044): arch=40000003 syscall=5 success=yes exit=39 a0=a1336b0 a1=8041 a2=180 a3=8041 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937340.076:1045): avc: denied { getattr } for pid=21358 comm="firefox-bin" name="part3.ogg" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.076:1045): arch=40000003 syscall=195 success=yes exit=0 a0=9f14fc8 a1=bf949384 a2=239ff4 a3=3 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937340.076:1045): path="/tmp/part3.ogg" type=AVC msg=audit(1162937340.076:1046): avc: denied { remove_name } for pid=21358 comm="firefox-bin" name="part3.ogg" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937340.076:1046): avc: denied { unlink } for pid=21358 comm="firefox-bin" name="part3.ogg" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.076:1046): arch=40000003 syscall=10 success=yes exit=0 a0=9f14fc8 a1=0 a2=6e44304 a3=0 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937340.076:1047): avc: denied { rename } for pid=21358 comm="firefox-bin" name="o1smfxjx" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.076:1047): arch=40000003 syscall=38 success=yes exit=0 a0=a1336b0 a1=bf94944c a2=6e44304 a3=0 items=0 ppid=1 pid=21358 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937340.080:1048): avc: denied { execute_no_trans } for pid=21437 comm="firefox-bin" name="realplay" dev=dm-0 ino=12212539 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162937340.080:1048): arch=40000003 syscall=11 success=yes exit=0 a0=a5cadf8 a1=9fa1660 a2=9ac6e40 a3=0 items=0 ppid=21358 pid=21437 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay" exe="/bin/bash" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937340.080:1048): path="/usr/local/RealPlayer/realplay" type=AVC msg=audit(1162937340.632:1049): avc: denied { execmem } for pid=21442 comm="realplay.bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162937340.632:1049): arch=40000003 syscall=192 per=400000 success=yes exit=16302080 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=21437 pid=21442 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay.bin" exe="/usr/local/RealPlayer/realplay.bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937341.152:1050): avc: denied { search } for pid=21442 comm="realplay.bin" name="usbdev4.2_ep01" dev=sysfs ino=384384 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937341.152:1050): arch=40000003 syscall=6 per=400000 success=yes exit=0 a0=1f a1=0 a2=3852ed4 a3=9478dd0 items=0 ppid=21437 pid=21442 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay.bin" exe="/usr/local/RealPlayer/realplay.bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937341.216:1051): avc: denied { read } for pid=21442 comm="realplay.bin" name="part3.ogg" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937341.216:1051): arch=40000003 syscall=5 per=400000 success=yes exit=31 a0=94a7f38 a1=0 a2=180 a3=94a8008 items=0 ppid=21437 pid=21442 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="realplay.bin" exe="/usr/local/RealPlayer/realplay.bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937365.042:1052): avc: denied { search } for pid=21459 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162937365.042:1052): avc: denied { search } for pid=21459 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162937365.042:1052): arch=40000003 syscall=33 success=no exit=-2 a0=9c449f8 a1=4 a2=f19bbc a3=9c449c8 items=0 ppid=3575 pid=21459 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162937365.042:1053): avc: denied { search } for pid=21459 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162937365.042:1053): avc: denied { read } for pid=21459 comm="gpg" name="evolution-pgp.X7ROIT" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937365.042:1053): arch=40000003 syscall=5 success=yes exit=3 a0=bfbf0b1a a1=8000 a2=0 a3=8000 items=0 ppid=3575 pid=21459 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=USER_ACCT msg=audit(1162937401.704:1054): user pid=21469 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162937401.704:1055): login pid=21469 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162937401.708:1056): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162937401.708:1057): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162937401.712:1058): avc: denied { search } for pid=21470 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162937401.712:1058): avc: denied { read } for pid=21470 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162937401.712:1058): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=84b9800 items=0 ppid=21469 pid=21470 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162937401.712:1059): avc: denied { getattr } for pid=21470 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162937401.712:1059): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf808138 a2=239ff4 a3=84b9800 items=0 ppid=21469 pid=21470 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162937401.712:1059): path="/proc/net/dev" type=CRED_DISP msg=audit(1162937401.720:1060): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162937401.720:1061): user pid=21469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162937572.283:1062): avc: denied { search } for pid=21498 comm="bug-buddy" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162937572.283:1062): avc: denied { write } for pid=21498 comm="bug-buddy" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162937572.283:1062): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf969ec0 a2=39b770 a3=15 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937572.283:1063): avc: denied { read } for pid=21498 comm="bug-buddy" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.283:1063): arch=40000003 syscall=33 success=yes exit=0 a0=89a4258 a1=4 a2=39b770 a3=89a4258 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937572.283:1064): avc: denied { getattr } for pid=21498 comm="bug-buddy" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.283:1064): arch=40000003 syscall=197 success=yes exit=0 a0=29 a1=bf969f5c a2=2ddff4 a3=89a4b38 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937572.283:1064): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162937572.851:1065): avc: denied { getattr } for pid=21500 comm="gam_server" name="inotify" dev=inotifyfs ino=339 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937572.851:1065): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa629ac a2=239ff4 a3=3 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937572.851:1065): path="inotify" type=AVC msg=audit(1162937572.907:1066): avc: denied { getattr } for pid=21500 comm="gam_server" name="mtab" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.907:1066): arch=40000003 syscall=195 success=yes exit=0 a0=805a6a8 a1=bfa62798 a2=239ff4 a3=8b018d8 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937572.907:1066): path="/etc/mtab" type=AVC msg=audit(1162937572.907:1067): avc: denied { read } for pid=21500 comm="gam_server" name="mtab" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162937572.907:1067): arch=40000003 syscall=5 success=yes exit=8 a0=805a6a8 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937577.503:1068): avc: denied { read } for pid=21500 comm="gam_server" name="inotify" dev=inotifyfs ino=339 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937577.503:1068): arch=40000003 syscall=3 success=yes exit=16 a0=3 a1=8b08678 a2=400 a3=400 items=0 ppid=1 pid=21500 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937577.503:1068): path="inotify" type=AVC msg=audit(1162937581.079:1069): avc: denied { getattr } for pid=21498 comm="bug-buddy" name="/" dev=sysfs ino=1 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162937581.079:1069): arch=40000003 syscall=195 success=yes exit=0 a0=b79218 a1=bf96423c a2=2ddff4 a3=4 items=0 ppid=21497 pid=21498 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bug-buddy" exe="/usr/bin/bug-buddy" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162937581.079:1069): path="/sys" type=AVC msg=audit(1162937581.375:1070): avc: denied { ptrace } for pid=21506 comm="gdb" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=process type=SYSCALL msg=audit(1162937581.375:1070): arch=40000003 syscall=26 success=yes exit=0 a0=10 a1=df7 a2=0 a3=0 items=0 ppid=1 pid=21506 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gdb" exe="/usr/bin/gdb" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937581.375:1071): avc: denied { sigstop } for pid=21507 comm="gdb" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=process type=SYSCALL msg=audit(1162937581.375:1071): arch=40000003 syscall=37 success=yes exit=0 a0=5403 a1=13 a2=df7 a3=0 items=0 ppid=21506 pid=21507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gdb" exe="/usr/bin/gdb" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162937591.840:1072): avc: denied { read } for pid=21529 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937591.840:1072): arch=40000003 syscall=33 success=yes exit=0 a0=bf879f92 a1=4 a2=de7a64 a3=bf879f92 items=0 ppid=21528 pid=21529 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162937591.864:1073): avc: denied { read } for pid=21526 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937591.864:1073): arch=40000003 syscall=33 success=yes exit=0 a0=bf944fcb a1=4 a2=de7a64 a3=bf944fcb items=0 ppid=1 pid=21526 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162937591.864:1074): avc: denied { getattr } for pid=21526 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162937591.864:1074): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf942cdc a2=239ff4 a3=9186140 items=0 ppid=1 pid=21526 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162937591.864:1074): path="/tmp/.gdmF70UIT" type=USER_ACCT msg=audit(1162938001.790:1075): user pid=21555 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162938001.790:1076): login pid=21555 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162938001.790:1077): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162938001.790:1078): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162938001.794:1079): avc: denied { execute } for pid=21556 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162938001.794:1079): avc: denied { execute_no_trans } for pid=21556 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.794:1079): arch=40000003 syscall=11 success=yes exit=0 a0=9b301b0 a1=9b30358 a2=9b30290 a3=9b30008 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.794:1079): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162938001.798:1080): avc: denied { execute } for pid=21556 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162938001.798:1080): avc: denied { execute_no_trans } for pid=21556 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162938001.798:1080): avc: denied { read } for pid=21556 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1080): arch=40000003 syscall=11 success=yes exit=0 a0=9b30d48 a1=9b30740 a2=9b30d60 a3=9b30740 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.798:1080): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162938001.798:1080): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162938001.798:1081): avc: denied { search } for pid=21556 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162938001.798:1081): arch=40000003 syscall=33 success=yes exit=0 a0=bf7fdcd4 a1=0 a2=bf7fdbc8 a3=bf7fdbd0 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.798:1082): avc: denied { read append } for pid=21556 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1082): arch=40000003 syscall=5 success=yes exit=3 a0=bf7fdcd4 a1=402 a2=bf7fde98 a3=bf7fdbd0 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.798:1083): avc: denied { search } for pid=21556 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162938001.798:1083): avc: denied { read } for pid=21556 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1083): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9201d60 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.798:1084): avc: denied { getattr } for pid=21556 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.798:1084): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf7fd784 a2=239ff4 a3=9201d60 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.798:1084): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162938001.798:1085): avc: denied { search } for pid=21556 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162938001.798:1085): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9201d60 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162938001.802:1086): avc: denied { lock } for pid=21556 comm="sadc" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162938001.802:1086): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf7fdbd0 a3=3 items=0 ppid=21555 pid=21556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162938001.802:1086): path="/var/log/sa/sa07" type=CRED_DISP msg=audit(1162938001.810:1087): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162938001.810:1088): user pid=21555 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162938205.102:1089): avc: denied { execmem } for pid=21563 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162938205.102:1089): arch=40000003 syscall=192 success=yes exit=133574656 a0=7f63000 a1=1a000 a2=7 a3=812 items=0 ppid=3158 pid=21563 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162938205.102:1090): avc: denied { execstack } for pid=21563 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1162938205.102:1090): arch=40000003 syscall=125 success=yes exit=0 a0=bfe47000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=3158 pid=21563 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162938205.126:1091): avc: denied { execute } for pid=21563 comm="gnome-screensav" name="zero" dev=tmpfs ino=1524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1162938205.126:1091): arch=40000003 syscall=192 success=yes exit=10162176 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3158 pid=21563 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162938205.126:1091): path="/dev/zero" type=USER_ACCT msg=audit(1162938601.875:1092): user pid=21576 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162938601.879:1093): login pid=21576 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162938601.879:1094): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162938601.879:1095): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162938601.891:1096): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162938601.891:1097): user pid=21576 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162939201.961:1098): user pid=21594 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162939201.961:1099): login pid=21594 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162939201.961:1100): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162939201.961:1101): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162939201.977:1102): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162939201.977:1103): user pid=21594 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162939801.046:1104): user pid=21612 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162939801.046:1105): login pid=21612 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162939801.046:1106): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162939801.046:1107): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162939801.058:1108): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162939801.058:1109): user pid=21612 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162940401.128:1110): user pid=21630 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162940401.128:1111): login pid=21630 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162940401.128:1112): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162940401.128:1113): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162940401.148:1114): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162940401.148:1115): user pid=21630 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162940461.159:1116): user pid=21634 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162940461.159:1117): login pid=21634 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162940461.159:1118): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162940461.159:1119): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162940461.163:1120): avc: denied { getattr } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1120): arch=40000003 syscall=195 success=yes exit=0 a0=9ed2120 a1=bfe57f10 a2=239ff4 a3=9ed2120 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.163:1120): path="/usr/bin/run-parts" type=AVC msg=audit(1162940461.163:1121): avc: denied { execute } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1121): arch=40000003 syscall=33 success=yes exit=0 a0=9ed2120 a1=1 a2=11 a3=9ed2120 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.163:1122): avc: denied { read } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1122): arch=40000003 syscall=33 success=yes exit=0 a0=9ed2120 a1=4 a2=ffffffff a3=9ed2120 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.163:1123): avc: denied { execute_no_trans } for pid=21635 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.163:1123): arch=40000003 syscall=11 success=yes exit=0 a0=9ed2120 a1=9ed23d8 a2=9ed22f8 a3=9ed1f98 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.163:1123): path="/usr/bin/run-parts" type=AVC msg=audit(1162940461.167:1124): avc: denied { ioctl } for pid=21635 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.167:1124): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd36818 a3=bfd36858 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.167:1124): path="/usr/bin/run-parts" type=AVC msg=audit(1162940461.167:1125): avc: denied { execute } for pid=21635 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.167:1125): arch=40000003 syscall=33 success=yes exit=0 a0=93c6990 a1=1 a2=1 a3=93c6c98 items=0 ppid=21634 pid=21635 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.167:1126): avc: denied { execute_no_trans } for pid=21636 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.167:1126): arch=40000003 syscall=11 success=yes exit=0 a0=93c6a10 a1=93c6ad8 a2=93c6ae8 a3=93c6758 items=0 ppid=21635 pid=21636 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.167:1126): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1162940461.171:1127): avc: denied { read } for pid=21637 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.171:1127): arch=40000003 syscall=5 success=yes exit=3 a0=bfb45610 a1=0 a2=ffffffff a3=9338038 items=0 ppid=21636 pid=21637 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162940461.171:1128): avc: denied { getattr } for pid=21637 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162940461.171:1128): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb45580 a2=239ff4 a3=3 items=0 ppid=21636 pid=21637 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162940461.171:1128): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162940461.183:1129): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162940461.183:1130): user pid=21634 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162941001.245:1131): user pid=21658 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162941001.245:1132): login pid=21658 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162941001.245:1133): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162941001.245:1134): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162941001.257:1135): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162941001.261:1136): user pid=21658 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162941601.315:1137): user pid=21676 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162941601.315:1138): login pid=21676 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162941601.319:1139): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162941601.319:1140): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162941601.351:1141): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162941601.351:1142): user pid=21676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162942201.420:1143): user pid=21701 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162942201.420:1144): login pid=21701 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162942201.420:1145): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162942201.420:1146): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162942201.432:1147): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162942201.432:1148): user pid=21701 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162942801.490:1149): user pid=21719 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162942801.490:1150): login pid=21719 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162942801.494:1151): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162942801.494:1152): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162942801.502:1153): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162942801.502:1154): user pid=21719 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162943401.563:1155): user pid=21737 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162943401.563:1156): login pid=21737 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162943401.563:1157): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162943401.563:1158): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162943401.579:1159): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162943401.579:1160): user pid=21737 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162944001.633:1161): user pid=21755 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162944001.637:1162): login pid=21755 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162944001.637:1163): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162944001.637:1164): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162944001.649:1165): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162944001.649:1166): user pid=21755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162944061.656:1167): user pid=21759 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162944061.656:1168): login pid=21759 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162944061.660:1169): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162944061.660:1170): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162944061.676:1171): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162944061.676:1172): user pid=21759 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162944601.734:1173): user pid=21783 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162944601.734:1174): login pid=21783 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162944601.734:1175): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162944601.734:1176): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162944601.750:1177): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162944601.750:1178): user pid=21783 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162945201.816:1179): user pid=21801 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162945201.816:1180): login pid=21801 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162945201.816:1181): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162945201.816:1182): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162945201.828:1183): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162945201.828:1184): user pid=21801 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162945801.889:1185): user pid=21821 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162945801.889:1186): login pid=21821 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162945801.889:1187): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162945801.889:1188): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162945801.905:1189): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162945801.905:1190): user pid=21821 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162946401.967:1191): user pid=21839 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162946401.967:1192): login pid=21839 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162946401.967:1193): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162946401.967:1194): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162946401.983:1195): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162946401.983:1196): user pid=21839 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162947001.036:1197): user pid=21857 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162947001.036:1198): login pid=21857 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162947001.036:1199): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162947001.036:1200): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162947001.048:1201): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162947001.048:1202): user pid=21857 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162947601.118:1203): user pid=21875 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162947601.118:1204): login pid=21875 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162947601.118:1205): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162947601.118:1206): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162947601.130:1207): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162947601.130:1208): user pid=21875 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162947661.141:1209): user pid=21879 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162947661.141:1210): login pid=21879 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162947661.141:1211): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162947661.141:1212): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162947661.161:1213): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162947661.161:1214): user pid=21879 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162948201.211:1215): user pid=21903 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162948201.211:1216): login pid=21903 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162948201.215:1217): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162948201.215:1218): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162948201.231:1219): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162948201.235:1220): user pid=21903 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162948801.293:1221): user pid=21921 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162948801.293:1222): login pid=21921 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162948801.293:1223): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162948801.293:1224): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162948801.305:1225): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162948801.309:1226): user pid=21921 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162949401.366:1227): user pid=21941 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162949401.370:1228): login pid=21941 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162949401.370:1229): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162949401.370:1230): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162949401.382:1231): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162949401.382:1232): user pid=21941 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162950001.444:1233): user pid=21959 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162950001.444:1234): login pid=21959 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162950001.444:1235): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162950001.444:1236): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162950001.460:1237): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162950001.460:1238): user pid=21959 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162950601.525:1239): user pid=21977 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162950601.525:1240): login pid=21977 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162950601.525:1241): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162950601.525:1242): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162950601.537:1243): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162950601.537:1244): user pid=21977 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162951201.599:1245): user pid=21995 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162951201.599:1246): login pid=21995 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162951201.599:1247): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162951201.599:1248): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162951201.615:1249): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162951201.615:1250): user pid=21995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162951261.626:1251): user pid=21999 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162951261.626:1252): login pid=21999 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162951261.626:1253): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162951261.626:1254): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162951261.646:1255): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162951261.646:1256): user pid=21999 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162951801.708:1257): user pid=22023 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162951801.708:1258): login pid=22023 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162951801.708:1259): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162951801.708:1260): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162951801.720:1261): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162951801.720:1262): user pid=22023 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162952401.782:1263): user pid=22041 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162952401.782:1264): login pid=22041 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162952401.782:1265): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162952401.782:1266): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162952401.794:1267): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162952401.794:1268): user pid=22041 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162953001.863:1269): user pid=22061 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162953001.863:1270): login pid=22061 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162953001.863:1271): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162953001.863:1272): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162953001.875:1273): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162953001.879:1274): user pid=22061 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162953601.933:1275): user pid=22079 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162953601.933:1276): login pid=22079 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162953601.937:1277): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162953601.937:1278): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162953601.949:1279): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162953601.949:1280): user pid=22079 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162954201.014:1281): user pid=22097 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162954201.014:1282): login pid=22097 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162954201.014:1283): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162954201.014:1284): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162954201.026:1285): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162954201.030:1286): user pid=22097 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162954801.092:1287): user pid=22115 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162954801.092:1288): login pid=22115 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162954801.092:1289): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162954801.092:1290): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162954801.104:1291): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162954801.104:1292): user pid=22115 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162954861.111:1293): user pid=22119 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162954861.111:1294): login pid=22119 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162954861.115:1295): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162954861.115:1296): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162954861.131:1297): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162954861.131:1298): user pid=22119 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162955401.189:1299): user pid=22143 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162955401.189:1300): login pid=22143 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162955401.189:1301): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162955401.189:1302): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162955401.205:1303): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162955401.205:1304): user pid=22143 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162956001.267:1305): user pid=22162 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162956001.267:1306): login pid=22162 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162956001.267:1307): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162956001.267:1308): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162956001.279:1309): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162956001.279:1310): user pid=22162 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162956601.348:1311): user pid=22182 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162956601.348:1312): login pid=22182 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162956601.348:1313): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162956601.348:1314): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162956601.364:1315): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162956601.364:1316): user pid=22182 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162957201.438:1317): user pid=22200 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162957201.438:1318): login pid=22200 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162957201.438:1319): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162957201.438:1320): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162957201.450:1321): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162957201.450:1322): user pid=22200 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162957801.511:1323): user pid=22218 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162957801.511:1324): login pid=22218 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162957801.511:1325): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162957801.511:1326): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162957801.527:1327): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162957801.527:1328): user pid=22218 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162958401.597:1329): user pid=22236 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162958401.597:1330): login pid=22236 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162958401.597:1331): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162958401.597:1332): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162958401.609:1333): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162958401.609:1334): user pid=22236 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162958461.620:1335): user pid=22239 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162958461.620:1336): login pid=22239 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162958461.620:1337): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162958461.620:1338): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162958461.636:1339): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162958461.636:1340): user pid=22239 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162959001.690:1341): user pid=22264 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162959001.690:1342): login pid=22264 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162959001.694:1343): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162959001.694:1344): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162959001.706:1345): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162959001.706:1346): user pid=22264 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162959601.776:1347): user pid=22282 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162959601.776:1348): login pid=22282 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162959601.776:1349): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162959601.776:1350): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162959601.788:1351): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162959601.792:1352): user pid=22282 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162960201.853:1353): user pid=22302 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162960201.853:1354): login pid=22302 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162960201.853:1355): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162960201.853:1356): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162960201.865:1357): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162960201.869:1358): user pid=22302 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162960801.927:1359): user pid=22320 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162960801.927:1360): login pid=22320 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162960801.927:1361): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162960801.927:1362): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162960801.971:1363): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162960801.971:1364): user pid=22320 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162961401.040:1365): user pid=22338 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162961401.040:1366): login pid=22338 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162961401.040:1367): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162961401.040:1368): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162961401.052:1369): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162961401.052:1370): user pid=22338 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162961581.067:1371): user pid=22344 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162961581.067:1372): login pid=22344 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162961581.067:1373): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162961581.067:1374): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162961581.115:1375): avc: denied { getattr } for pid=22345 comm="sa2" name="sa07" dev=dm-0 ino=14600351 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.115:1375): arch=40000003 syscall=195 success=yes exit=0 a0=93090b0 a1=bfe26d58 a2=239ff4 a3=9309080 items=0 ppid=22344 pid=22345 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa2" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162961581.115:1375): path="/var/log/sa/sa07" type=AVC msg=audit(1162961581.115:1376): avc: denied { write } for pid=22347 comm="sa2" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=AVC msg=audit(1162961581.115:1376): avc: denied { add_name } for pid=22347 comm="sa2" name="sar07" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=AVC msg=audit(1162961581.115:1376): avc: denied { create } for pid=22347 comm="sa2" name="sar07" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.115:1376): arch=40000003 syscall=5 success=yes exit=3 a0=9307a00 a1=8241 a2=1b6 a3=8241 items=0 ppid=22345 pid=22347 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa2" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162961581.199:1377): avc: denied { write } for pid=22347 comm="sar" name="sar07" dev=dm-0 ino=14600270 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.199:1377): arch=40000003 syscall=4 success=yes exit=0 a0=1 a1=8051aa5 a2=0 a3=0 items=0 ppid=22345 pid=22347 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sar" exe="/usr/bin/sar" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162961581.199:1377): path="/var/log/sa/sar07" type=AVC msg=audit(1162961581.307:1378): avc: denied { getattr } for pid=22348 comm="find" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162961581.307:1378): arch=40000003 syscall=196 success=yes exit=0 a0=bfcbff2b a1=bfcbe708 a2=239ff4 a3=bfcbff2b items=0 ppid=22345 pid=22348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162961581.307:1378): path="/var/log/sa" type=AVC msg=audit(1162961581.311:1379): avc: denied { read } for pid=22348 comm="find" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162961581.311:1379): arch=40000003 syscall=5 success=yes exit=4 a0=bfcbff2b a1=18800 a2=bfcbe5b8 a3=ffffffff items=0 ppid=22345 pid=22348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162961581.359:1380): avc: denied { remove_name } for pid=22349 comm="rm" name="sar29" dev=dm-0 ino=14600293 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=AVC msg=audit(1162961581.359:1380): avc: denied { unlink } for pid=22349 comm="rm" name="sar29" dev=dm-0 ino=14600293 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162961581.359:1380): arch=40000003 syscall=10 success=yes exit=0 a0=bfa91f5b a1=0 a2=805277c a3=bfa91844 items=0 ppid=22348 pid=22349 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162961581.547:1381): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162961581.547:1382): user pid=22344 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162962001.598:1383): user pid=22367 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162962001.598:1384): login pid=22367 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162962001.598:1385): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162962001.602:1386): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162962001.618:1387): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162962001.618:1388): user pid=22367 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162962061.629:1389): user pid=22370 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162962061.629:1390): login pid=22370 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162962061.629:1391): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162962061.629:1392): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162962061.649:1393): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162962061.649:1394): user pid=22370 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162962601.711:1395): user pid=22395 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162962601.711:1396): login pid=22395 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162962601.711:1397): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162962601.711:1398): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162962601.723:1399): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162962601.723:1400): user pid=22395 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162963201.785:1401): user pid=22413 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162963201.785:1402): login pid=22413 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162963201.785:1403): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162963201.785:1404): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162963201.801:1405): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162963201.801:1406): user pid=22413 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162963801.870:1407): user pid=22433 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162963801.870:1408): login pid=22433 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162963801.870:1409): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162963801.870:1410): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162963801.882:1411): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162963801.882:1412): user pid=22433 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162964401.948:1413): user pid=22451 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162964401.948:1414): login pid=22451 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162964401.952:1415): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162964401.952:1416): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162964401.964:1417): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162964401.964:1418): user pid=22451 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162965001.033:1419): user pid=22469 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162965001.033:1420): login pid=22469 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162965001.033:1421): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162965001.033:1422): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162965001.049:1423): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162965001.049:1424): user pid=22469 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162965601.115:1425): user pid=22487 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162965601.115:1426): login pid=22487 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162965601.115:1427): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162965601.115:1428): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162965601.127:1429): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162965601.127:1430): user pid=22487 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162965661.134:1431): user pid=22490 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162965661.134:1432): login pid=22490 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162965661.138:1433): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162965661.138:1434): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162965661.154:1435): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162965661.154:1436): user pid=22490 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162966201.212:1437): user pid=22515 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162966201.212:1438): login pid=22515 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162966201.212:1439): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162966201.216:1440): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162966201.236:1441): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162966201.236:1442): user pid=22515 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162966801.310:1443): user pid=22533 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162966801.310:1444): login pid=22533 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162966801.310:1445): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162966801.310:1446): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162966801.326:1447): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162966801.326:1448): user pid=22533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162967401.387:1449): user pid=22553 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162967401.387:1450): login pid=22553 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162967401.387:1451): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162967401.387:1452): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162967401.399:1453): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162967401.399:1454): user pid=22553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162968001.473:1455): user pid=22571 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162968001.473:1456): login pid=22571 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162968001.473:1457): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162968001.473:1458): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162968001.485:1459): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162968001.485:1460): user pid=22571 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162968601.546:1461): user pid=22589 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162968601.546:1462): login pid=22589 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162968601.546:1463): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162968601.546:1464): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162968601.562:1465): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162968601.562:1466): user pid=22589 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162969201.640:1467): user pid=22607 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162969201.640:1468): login pid=22607 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162969201.640:1469): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162969201.640:1470): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162969201.672:1471): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162969201.672:1472): user pid=22607 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162969261.683:1473): user pid=22610 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162969261.683:1474): login pid=22610 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162969261.683:1475): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162969261.683:1476): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162969261.699:1477): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162969261.703:1478): user pid=22610 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162969801.761:1479): user pid=22635 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162969801.765:1480): login pid=22635 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162969801.765:1481): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162969801.765:1482): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162969801.777:1483): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162969801.777:1484): user pid=22635 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162970401.847:1485): user pid=22653 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162970401.847:1486): login pid=22653 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162970401.847:1487): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162970401.847:1488): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162970401.883:1489): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162970401.883:1490): user pid=22653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162971001.948:1491): user pid=22673 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162971001.948:1492): login pid=22673 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162971001.948:1493): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162971001.948:1494): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162971001.960:1495): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162971001.960:1496): user pid=22673 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162971601.026:1497): user pid=22691 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162971601.026:1498): login pid=22691 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162971601.026:1499): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162971601.026:1500): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162971601.042:1501): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162971601.042:1502): user pid=22691 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162972201.107:1503): user pid=22709 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162972201.107:1504): login pid=22709 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162972201.107:1505): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162972201.107:1506): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162972201.143:1507): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162972201.143:1508): user pid=22709 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162972801.197:1509): user pid=22727 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162972801.197:1510): login pid=22727 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162972801.201:1511): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162972801.201:1512): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162972801.213:1513): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162972801.213:1514): user pid=22727 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162972861.224:1515): user pid=22730 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162972861.224:1516): login pid=22730 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162972861.224:1517): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162972861.228:1518): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162972861.244:1519): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162972861.248:1520): user pid=22730 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162973401.298:1521): user pid=22755 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162973401.298:1522): login pid=22755 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162973401.298:1523): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162973401.298:1524): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162973401.314:1525): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162973401.314:1526): user pid=22755 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162974001.376:1527): user pid=22773 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162974001.376:1528): login pid=22773 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162974001.376:1529): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162974001.380:1530): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162974001.392:1531): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162974001.392:1532): user pid=22773 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162974601.461:1533): user pid=22793 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162974601.461:1534): login pid=22793 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162974601.461:1535): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162974601.461:1536): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162974601.473:1537): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162974601.473:1538): user pid=22793 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162975201.531:1539): user pid=22811 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162975201.531:1540): login pid=22811 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162975201.535:1541): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162975201.535:1542): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162975201.547:1543): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162975201.547:1544): user pid=22811 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162975801.608:1545): user pid=22829 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162975801.608:1546): login pid=22829 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162975801.608:1547): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162975801.608:1548): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162975801.624:1549): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162975801.624:1550): user pid=22829 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162976401.690:1551): user pid=22847 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162976401.690:1552): login pid=22847 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162976401.690:1553): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162976401.690:1554): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162976401.702:1555): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162976401.702:1556): user pid=22847 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162976461.709:1557): user pid=22850 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162976461.709:1558): login pid=22850 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162976461.713:1559): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162976461.713:1560): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162976461.729:1561): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162976461.729:1562): user pid=22850 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162976521.737:1563): user pid=22862 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162976521.737:1564): login pid=22862 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162976521.737:1565): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162976521.737:1566): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162976521.793:1567): avc: denied { getattr } for pid=22864 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1567): arch=40000003 syscall=195 success=yes exit=0 a0=92ba8b0 a1=bf96f830 a2=2e7ff4 a3=92ba8b0 items=0 ppid=22863 pid=22864 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0anacron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.793:1567): path="/usr/sbin/anacron" type=AVC msg=audit(1162976521.793:1568): avc: denied { execute } for pid=22864 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1568): arch=40000003 syscall=33 success=yes exit=0 a0=92ba8b0 a1=1 a2=11 a3=92ba8b0 items=0 ppid=22863 pid=22864 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0anacron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.793:1569): avc: denied { read } for pid=22864 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1569): arch=40000003 syscall=33 success=yes exit=0 a0=92ba8b0 a1=4 a2=ffffffff a3=92ba8b0 items=0 ppid=22863 pid=22864 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0anacron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.793:1570): avc: denied { execute_no_trans } for pid=22866 comm="0anacron" name="anacron" dev=dm-0 ino=10320623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:anacron_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.793:1570): arch=40000003 syscall=11 success=yes exit=0 a0=92ba8b0 a1=92bac30 a2=92bab48 a3=92ba6e0 items=0 ppid=22864 pid=22866 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.793:1570): path="/usr/sbin/anacron" type=AVC msg=audit(1162976521.809:1571): avc: denied { search } for pid=22866 comm="anacron" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976521.809:1571): arch=40000003 syscall=10 success=no exit=-2 a0=804c93a a1=ffffffcc a2=bf916f04 a3=1 items=0 ppid=22864 pid=22866 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.813:1572): avc: denied { write } for pid=22867 comm="anacron" name="subsys" dev=dm-0 ino=14436611 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976521.813:1572): avc: denied { add_name } for pid=22867 comm="anacron" name="anacron" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976521.813:1572): avc: denied { create } for pid=22867 comm="anacron" name="anacron" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.813:1572): arch=40000003 syscall=5 success=yes exit=3 a0=804c93a a1=c1 a2=180 a3=1 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.833:1573): avc: denied { write } for pid=22867 comm="anacron" name="cron.daily" dev=dm-0 ino=14437389 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_spool_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.833:1573): arch=40000003 syscall=5 success=yes exit=3 a0=92c2858 a1=42 a2=180 a3=92c2820 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.833:1574): avc: denied { setattr } for pid=22867 comm="anacron" name="cron.daily" dev=dm-0 ino=14437389 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_spool_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.833:1574): arch=40000003 syscall=207 success=yes exit=0 a0=3 a1=0 a2=0 a3=92c2820 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.813:1575): avc: denied { getattr } for pid=22863 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.813:1575): arch=40000003 syscall=195 success=yes exit=0 a0=94a18b0 a1=bf9d7bd8 a2=239ff4 a3=94a21e8 items=0 ppid=22862 pid=22863 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.813:1575): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC msg=audit(1162976521.861:1576): avc: denied { execute } for pid=22863 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.861:1576): arch=40000003 syscall=33 success=yes exit=0 a0=94a18b0 a1=1 a2=1 a3=94a1c88 items=0 ppid=22862 pid=22863 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976521.861:1577): avc: denied { execute_no_trans } for pid=22868 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=AVC msg=audit(1162976521.861:1577): avc: denied { read } for pid=22868 comm="run-parts" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=AVC msg=audit(1162976521.865:1578): avc: denied { remove_name } for pid=22867 comm="anacron" name="anacron" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976521.865:1578): avc: denied { unlink } for pid=22867 comm="anacron" name="anacron" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976521.865:1578): arch=40000003 syscall=10 success=yes exit=0 a0=804c93a a1=23ac98 a2=239ff4 a3=1 items=0 ppid=1 pid=22867 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="anacron" exe="/usr/sbin/anacron" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=SYSCALL msg=audit(1162976521.861:1577): arch=40000003 syscall=11 success=yes exit=0 a0=94a18f0 a1=94a1f88 a2=94a2098 a3=94a1fc0 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976521.861:1577): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC_PATH msg=audit(1162976521.861:1577): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC msg=audit(1162976522.029:1579): avc: denied { ioctl } for pid=22868 comm="0logwatch" name="logwatch.pl" dev=dm-0 ino=10741010 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.029:1579): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfbd6da8 a3=bfbd6de8 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976522.029:1579): path="/usr/share/logwatch/scripts/logwatch.pl" type=AVC msg=audit(1162976522.821:1580): avc: denied { getattr } for pid=22868 comm="0logwatch" name="Logwatch.pm" dev=dm-0 ino=10740999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.821:1580): arch=40000003 syscall=195 success=yes exit=0 a0=8a74a20 a1=bfbd694c a2=239ff4 a3=8a74a20 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976522.821:1580): path="/usr/share/logwatch/lib/Logwatch.pm" type=AVC msg=audit(1162976522.821:1581): avc: denied { read } for pid=22868 comm="0logwatch" name="Logwatch.pm" dev=dm-0 ino=10740999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.821:1581): arch=40000003 syscall=5 success=yes exit=3 a0=8a756e8 a1=8000 a2=0 a3=8000 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976522.821:1582): avc: denied { ioctl } for pid=22868 comm="0logwatch" name="Logwatch.pm" dev=dm-0 ino=10740999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976522.821:1582): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfbd6748 a3=bfbd6788 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976522.821:1582): path="/usr/share/logwatch/lib/Logwatch.pm" type=AVC msg=audit(1162976523.141:1583): avc: denied { read } for pid=22868 comm="0logwatch" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.141:1583): arch=40000003 syscall=5 success=yes exit=3 a0=bfbcce78 a1=18800 a2=bfbccd3c a3=bfbd0f1c items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.185:1584): avc: denied { getattr } for pid=22868 comm="0logwatch" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.185:1584): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbccd3c a2=239ff4 a3=3 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.185:1584): path="/var/log/httpd" type=AVC msg=audit(1162976523.205:1585): avc: denied { search } for pid=22868 comm="0logwatch" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=AVC msg=audit(1162976523.205:1585): avc: denied { getattr } for pid=22868 comm="0logwatch" name="access_log" dev=dm-0 ino=14437011 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.205:1585): arch=40000003 syscall=196 success=yes exit=0 a0=bfbcbd98 a1=bfbcad38 a2=239ff4 a3=bfbcad38 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.205:1585): path="/var/log/httpd/access_log" type=AVC msg=audit(1162976523.213:1586): avc: denied { getattr } for pid=22868 comm="0logwatch" name="maillog" dev=dm-0 ino=14438079 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.213:1586): arch=40000003 syscall=196 success=yes exit=0 a0=bfbcde78 a1=bfbcce18 a2=239ff4 a3=bfbcce18 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.213:1586): path="/var/log/maillog" type=AVC msg=audit(1162976523.249:1587): avc: denied { read } for pid=22868 comm="0logwatch" name="samba" dev=dm-0 ino=14436668 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.249:1587): arch=40000003 syscall=5 success=yes exit=3 a0=bfbcce78 a1=18800 a2=bfbccd3c a3=bfbd0f08 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.261:1588): avc: denied { getattr } for pid=22868 comm="0logwatch" name="samba" dev=dm-0 ino=14436668 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.261:1588): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbccd3c a2=239ff4 a3=3 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.261:1588): path="/var/log/samba" type=AVC msg=audit(1162976523.265:1589): avc: denied { search } for pid=22868 comm="0logwatch" name="samba" dev=dm-0 ino=14436668 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=dir type=AVC msg=audit(1162976523.265:1589): avc: denied { getattr } for pid=22868 comm="0logwatch" name="smbd.log.3" dev=dm-0 ino=14437190 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.265:1589): arch=40000003 syscall=196 success=yes exit=0 a0=bfbcbd98 a1=bfbcad38 a2=239ff4 a3=bfbcad38 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.265:1589): path="/var/log/samba/smbd.log.3" type=AVC msg=audit(1162976523.317:1590): avc: denied { read } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.317:1590): arch=40000003 syscall=5 success=yes exit=3 a0=8a91338 a1=18800 a2=870006 a3=8a3ec70 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.317:1591): avc: denied { getattr } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.317:1591): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbd6fcc a2=239ff4 a3=3 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.317:1591): path="/var/cache/logwatch" type=AVC msg=audit(1162976523.337:1592): avc: denied { search } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976523.337:1592): avc: denied { write } for pid=22868 comm="0logwatch" name="logwatch" dev=dm-0 ino=14437047 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976523.337:1592): avc: denied { add_name } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976523.337:1592): avc: denied { create } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976523.337:1592): arch=40000003 syscall=39 success=yes exit=0 a0=8ac9900 a1=1c0 a2=a095cc a3=8ac9900 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.557:1593): avc: denied { create } for pid=22881 comm="sh" name="maillog-archive" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.557:1593): arch=40000003 syscall=5 success=yes exit=3 a0=8320c48 a1=8441 a2=1b6 a3=8441 items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.557:1594): avc: denied { getattr } for pid=22881 comm="cat" name="maillog-archive" dev=dm-0 ino=14796674 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.557:1594): arch=40000003 syscall=197 success=yes exit=0 a0=1 a1=bf9545a4 a2=35eff4 a3=804bb4b items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.557:1594): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog-archive" type=AVC msg=audit(1162976523.561:1595): avc: denied { read } for pid=22881 comm="cat" name="maillog.1" dev=dm-0 ino=14437116 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.561:1595): arch=40000003 syscall=5 success=yes exit=3 a0=bf954e5f a1=8000 a2=0 a3=8000 items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.589:1596): avc: denied { append } for pid=22881 comm="cat" name="maillog-archive" dev=dm-0 ino=14796674 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.589:1596): arch=40000003 syscall=4 success=yes exit=4096 a0=1 a1=8c1e000 a2=1000 a3=1000 items=0 ppid=22880 pid=22881 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.589:1596): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog-archive" type=AVC msg=audit(1162976523.605:1597): avc: denied { read } for pid=22883 comm="cat" name="maillog-archive" dev=dm-0 ino=14796674 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.605:1597): arch=40000003 syscall=5 success=yes exit=3 a0=bfe14e2b a1=8000 a2=0 a3=8000 items=0 ppid=22882 pid=22883 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976523.613:1598): avc: denied { ioctl } for pid=22886 comm="perl" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.613:1598): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfd93568 a3=bfd935a8 items=0 ppid=22882 pid=22886 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.613:1598): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog" type=AVC msg=audit(1162976523.813:1599): avc: denied { write } for pid=22886 comm="perl" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976523.813:1599): arch=40000003 syscall=4 success=yes exit=1255 a0=1 a1=855af88 a2=4e7 a3=855af88 items=0 ppid=22882 pid=22886 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976523.813:1599): path="/var/cache/logwatch/logwatch.ueRIpGof/maillog" type=AVC msg=audit(1162976524.497:1600): avc: denied { read } for pid=22935 comm="cat" name="smbd.log.3" dev=dm-0 ino=14437190 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976524.497:1600): arch=40000003 syscall=5 success=yes exit=3 a0=bfbfcda6 a1=8000 a2=0 a3=8000 items=0 ppid=22934 pid=22935 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976525.013:1601): avc: denied { read } for pid=22966 comm="cat" name="access_log" dev=dm-0 ino=14437011 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976525.013:1601): arch=40000003 syscall=5 success=yes exit=3 a0=bf835e58 a1=8000 a2=0 a3=8000 items=0 ppid=22965 pid=22966 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976526.709:1602): avc: denied { read } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14437156 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=lnk_file type=AVC msg=audit(1162976526.709:1602): avc: denied { getattr } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14436619 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976526.709:1602): arch=40000003 syscall=195 success=yes exit=0 a0=8b10d60 a1=8ac30c8 a2=239ff4 a3=8b10d60 items=0 ppid=22868 pid=23215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976526.709:1602): path="/var/spool/mail" type=AVC msg=audit(1162976526.709:1603): avc: denied { read } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14436619 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976526.709:1603): arch=40000003 syscall=5 success=yes exit=3 a0=8ad89c8 a1=18800 a2=8ac3008 a3=8b9c8d0 items=0 ppid=22868 pid=23215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976526.709:1604): avc: denied { search } for pid=23215 comm="perl" name="mail" dev=dm-0 ino=14436619 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=AVC msg=audit(1162976526.709:1604): avc: denied { getattr } for pid=23215 comm="perl" name="kmacmill" dev=dm-0 ino=14437393 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mail_spool_t:s0 tclass=file type=SYSCALL msg=audit(1162976526.709:1604): arch=40000003 syscall=195 success=yes exit=0 a0=8b10d60 a1=8ac30c8 a2=239ff4 a3=8b3cee8 items=0 ppid=22868 pid=23215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976526.709:1604): path="/var/spool/mail/kmacmill" type=AVC msg=audit(1162976526.985:1605): avc: denied { getattr } for pid=23280 comm="perl" name="ntpd" dev=dm-0 ino=10324369 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ntpd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976526.985:1605): arch=40000003 syscall=195 success=yes exit=0 a0=823be80 a1=81e20c8 a2=239ff4 a3=823be80 items=0 ppid=23276 pid=23280 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="perl" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976526.985:1605): path="/usr/sbin/ntpd" type=AVC msg=audit(1162976527.097:1606): avc: denied { read } for pid=23282 comm="df" name="mtab" dev=dm-0 ino=9330919 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162976527.097:1606): arch=40000003 syscall=5 success=yes exit=3 a0=80505b1 a1=0 a2=1b6 a3=9c97048 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.097:1607): avc: denied { getattr } for pid=23282 comm="df" name="mtab" dev=dm-0 ino=9330919 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1162976527.097:1607): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd13290 a2=239ff4 a3=9c97048 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976527.097:1607): path="/etc/mtab" type=AVC msg=audit(1162976527.101:1608): avc: denied { search } for pid=23282 comm="df" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.101:1608): arch=40000003 syscall=268 success=yes exit=0 a0=9c98440 a1=54 a2=bfd12f94 a3=bfd12f94 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.101:1609): avc: denied { search } for pid=23282 comm="df" name="media" dev=dm-0 ino=6972769 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mnt_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.101:1609): arch=40000003 syscall=268 success=yes exit=0 a0=9c984a0 a1=54 a2=bfd12f94 a3=bfd12f94 items=0 ppid=23281 pid=23282 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="df" exe="/bin/df" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.393:1610): avc: denied { setattr } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" dev=dm-0 ino=14796673 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.393:1610): arch=40000003 syscall=15 success=yes exit=0 a0=8dc72b0 a1=1c0 a2=a095cc a3=8dc72b0 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.393:1611): avc: denied { remove_name } for pid=22868 comm="0logwatch" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=AVC msg=audit(1162976527.393:1611): avc: denied { unlink } for pid=22868 comm="0logwatch" name="maillog" dev=dm-0 ino=14796675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976527.393:1611): arch=40000003 syscall=10 success=yes exit=0 a0=8abda30 a1=87f0068 a2=a095cc a3=8abda30 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.393:1612): avc: denied { rmdir } for pid=22868 comm="0logwatch" name="logwatch.ueRIpGof" dev=dm-0 ino=14796673 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logwatch_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.393:1612): arch=40000003 syscall=40 success=yes exit=0 a0=8dc72b0 a1=885adec a2=a095cc a3=8dc72b0 items=0 ppid=22863 pid=22868 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="0logwatch" exe="/usr/bin/perl" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.461:1613): avc: denied { search } for pid=23290 comm="procmail" name="root" dev=dm-0 ino=13127137 scontext=system_u:system_r:procmail_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976527.461:1613): arch=40000003 syscall=5 success=no exit=-2 a0=9000d90 a1=8000 a2=0 a3=8000 items=0 ppid=23285 pid=23290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="procmail" exe="/usr/bin/procmail" subj=system_u:system_r:procmail_t:s0 key=(null) type=AVC msg=audit(1162976527.493:1614): avc: denied { chown } for pid=23289 comm="chown" capability=0 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1162976527.493:1614): arch=40000003 syscall=212 success=yes exit=0 a0=8274da8 a1=3a a2=ffffffff a3=0 items=0 ppid=23286 pid=23289 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chown" exe="/bin/chown" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976527.789:1615): avc: denied { link } for pid=23299 comm="runuser" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=key type=SYSCALL msg=audit(1162976527.789:1615): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=3a items=0 ppid=23286 pid=23299 auid=0 uid=58 gid=58 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="runuser" exe="/sbin/runuser" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=USER_START msg=audit(1162976528.013:1616): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=CRED_ACQ msg=audit(1162976528.013:1617): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162976528.045:1618): avc: denied { ioctl } for pid=23300 comm="beagle-build-in" name="beagle-build-index" dev=dm-0 ino=10321858 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1618): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bff79158 a3=bff79198 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1618): path="/usr/sbin/beagle-build-index" type=AVC msg=audit(1162976528.045:1619): avc: denied { getattr } for pid=23300 comm="beagle-build-in" name="beagle-build-index" dev=dm-0 ino=10321858 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1619): arch=40000003 syscall=197 success=yes exit=0 a0=ff a1=bff7924c a2=239ff4 a3=0 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1619): path="/usr/sbin/beagle-build-index" type=AVC msg=audit(1162976528.045:1620): avc: denied { getattr } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1620): arch=40000003 syscall=195 success=yes exit=0 a0=9c32858 a1=bff78e90 a2=239ff4 a3=9c32858 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1620): path="/usr/bin/mono" type=AVC msg=audit(1162976528.045:1621): avc: denied { execute } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1621): arch=40000003 syscall=33 success=yes exit=0 a0=9c32858 a1=1 a2=11 a3=9c32858 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.045:1622): avc: denied { read } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1622): arch=40000003 syscall=33 success=yes exit=0 a0=9c32858 a1=4 a2=ffffffff a3=9c32858 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.045:1623): avc: denied { execute_no_trans } for pid=23300 comm="beagle-build-in" name="mono" dev=dm-0 ino=10337402 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.045:1623): arch=40000003 syscall=11 success=yes exit=0 a0=9c322a8 a1=9c31fb0 a2=9c32a40 a3=9c31fb0 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.045:1623): path="/usr/bin/mono" type=AVC msg=audit(1162976528.333:1624): avc: denied { execheap } for pid=23300 comm="mono" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1162976528.333:1624): avc: denied { execmem } for pid=23300 comm="mono" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1162976528.333:1624): arch=40000003 syscall=125 success=yes exit=0 a0=8ea2000 a1=1000 a2=7 a3=1 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.709:1625): avc: denied { read } for pid=23300 comm="beagle-build-in" name="applications" dev=dm-0 ino=14567751 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1162976528.709:1625): arch=40000003 syscall=5 success=yes exit=10 a0=8f001e0 a1=18800 a2=49f60 a3=8f001e0 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976528.789:1626): avc: denied { getattr } for pid=23300 comm="beagle-build-in" name="FileAttributesStore.db" dev=dm-0 ino=14567759 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.789:1626): arch=40000003 syscall=195 success=yes exit=0 a0=8f00b48 a1=bff77c20 a2=239ff4 a3=bff77c20 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976528.789:1626): path="/var/cache/beagle/indexes/applications/FileAttributesStore.db" type=AVC msg=audit(1162976528.989:1627): avc: denied { read } for pid=23300 comm="beagle-build-in" name="version" dev=dm-0 ino=14567757 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976528.989:1627): arch=40000003 syscall=5 success=yes exit=11 a0=8fa5200 a1=8000 a2=0 a3=8000 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976529.498:1628): avc: denied { write } for pid=23300 comm="beagle-build-in" name="FileAttributesStore.db" dev=dm-0 ino=14567759 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976529.498:1628): arch=40000003 syscall=5 success=yes exit=12 a0=9035550 a1=8042 a2=1a4 a3=8042 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976529.538:1629): avc: denied { lock } for pid=23300 comm="beagle-build-in" name="FileAttributesStore.db" dev=dm-0 ino=14567759 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976529.538:1629): arch=40000003 syscall=221 success=yes exit=0 a0=c a1=d a2=bff77328 a3=bff77328 items=0 ppid=23299 pid=23300 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976529.538:1629): path="/var/cache/beagle/indexes/applications/FileAttributesStore.db" type=AVC msg=audit(1162976529.686:1630): avc: denied { read } for pid=23303 comm="beagle-build-in" name="gimp-2.2.desktop" dev=dm-0 ino=10317656 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1162976529.686:1630): arch=40000003 syscall=195 success=yes exit=0 a0=9052bc0 a1=b6f2af08 a2=239ff4 a3=b6f2af08 items=0 ppid=23299 pid=23303 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976529.686:1631): avc: denied { getattr } for pid=23303 comm="beagle-build-in" name="linux-uninstall.desktop" dev=dm-0 ino=10316106 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976529.686:1631): arch=40000003 syscall=195 success=yes exit=0 a0=9054888 a1=b6f2af08 a2=239ff4 a3=b6f2af08 items=0 ppid=23299 pid=23303 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976529.686:1631): path="/usr/share/applications/linux-uninstall.desktop" type=AVC msg=audit(1162976529.710:1632): avc: denied { getattr } for pid=23303 comm="beagle-build-in" name="gimp-2.2.desktop" dev=dm-0 ino=10317656 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1162976529.710:1632): arch=40000003 syscall=196 success=yes exit=0 a0=b6c01c58 a1=b6f2ae74 a2=239ff4 a3=de720 items=0 ppid=23299 pid=23303 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976529.710:1632): path="/usr/share/applications/gimp-2.2.desktop" type=AVC msg=audit(1162976530.070:1633): avc: denied { write } for pid=23304 comm="beagle-build-in" name="Locks" dev=dm-0 ino=14567752 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162976530.070:1633): avc: denied { add_name } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162976530.070:1633): avc: denied { create } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-write.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976530.070:1633): arch=40000003 syscall=5 success=yes exit=13 a0=906c600 a1=80c2 a2=100 a3=80c2 items=0 ppid=23299 pid=23304 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976530.134:1634): avc: denied { remove_name } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-commit.lock" dev=dm-0 ino=14567744 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1162976530.134:1634): avc: denied { unlink } for pid=23304 comm="beagle-build-in" name="lucene-387e9e5278e1cbfa1ca3bb850a474745-commit.lock" dev=dm-0 ino=14567744 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1162976530.134:1634): arch=40000003 syscall=10 success=yes exit=0 a0=9027b28 a1=45 a2=8208528 a3=9027b28 items=0 ppid=23299 pid=23304 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162976532.774:1635): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1162976532.774:1636): user pid=23299 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_START msg=audit(1162976532.834:1637): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=CRED_ACQ msg=audit(1162976532.834:1638): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162976544.858:1639): avc: denied { getattr } for pid=23318 comm="beagle-build-in" name="README.txt" dev=dm-0 ino=10379427 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162976544.858:1639): arch=40000003 syscall=195 success=yes exit=0 a0=941d790 a1=b6ef3f08 a2=239ff4 a3=b6ef3f08 items=0 ppid=23314 pid=23318 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976544.858:1639): path="/usr/share/doc/NVIDIA_GLX-1.0/README.txt" type=AVC msg=audit(1162976556.151:1640): avc: denied { read } for pid=23318 comm="beagle-build-in" name="log4j" dev=dm-0 ino=10446960 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1162976556.151:1640): arch=40000003 syscall=195 success=yes exit=0 a0=9406288 a1=b6ef3f08 a2=239ff4 a3=b6ef3f08 items=0 ppid=23314 pid=23318 auid=0 uid=58 gid=58 euid=58 suid=58 fsuid=58 egid=58 sgid=58 fsgid=58 tty=(none) comm="beagle-build-in" exe="/usr/bin/mono" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162976592.245:1641): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=USER_END msg=audit(1162976592.249:1642): user pid=23314 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=beaglidx : exe="/sbin/runuser" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1162976592.313:1643): avc: denied { search } for pid=23324 comm="cups" name="cups" dev=dm-0 ino=14437056 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=AVC msg=audit(1162976592.313:1643): avc: denied { getattr } for pid=23324 comm="cups" name="tmp" dev=dm-0 ino=14437057 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.313:1643): arch=40000003 syscall=195 success=yes exit=0 a0=97d4908 a1=bfbb98b8 a2=239ff4 a3=97d58f8 items=0 ppid=22863 pid=23324 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cups" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.313:1643): path="/var/spool/cups/tmp" type=AVC msg=audit(1162976592.341:1644): avc: denied { execute } for pid=23326 comm="cups" name="tmpwatch" dev=dm-0 ino=10323837 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpreaper_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.341:1644): avc: denied { execute_no_trans } for pid=23326 comm="cups" name="tmpwatch" dev=dm-0 ino=10323837 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpreaper_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.341:1644): avc: denied { read } for pid=23326 comm="cups" name="tmpwatch" dev=dm-0 ino=10323837 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpreaper_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.341:1644): arch=40000003 syscall=11 success=yes exit=0 a0=97d5b90 a1=97d4b60 a2=97d5bd8 a3=97d57e0 items=0 ppid=23324 pid=23326 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.341:1644): path="/usr/sbin/tmpwatch" type=AVC_PATH msg=audit(1162976592.341:1644): path="/usr/sbin/tmpwatch" type=AVC msg=audit(1162976592.341:1645): avc: denied { read } for pid=23326 comm="tmpwatch" name="tmp" dev=dm-0 ino=14437057 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.341:1645): arch=40000003 syscall=5 success=yes exit=4 a0=804abea a1=18800 a2=fd00 a3=0 items=0 ppid=23324 pid=23326 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.349:1646): avc: denied { setattr } for pid=23326 comm="tmpwatch" name="tmp" dev=dm-0 ino=14437057 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.349:1646): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfbf20c0 a2=0 a3=0 items=0 ppid=23324 pid=23326 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.389:1647): avc: denied { execute } for pid=23333 comm="logrotate" name="logrotate" dev=dm-0 ino=10319445 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.389:1647): avc: denied { execute_no_trans } for pid=23333 comm="logrotate" name="logrotate" dev=dm-0 ino=10319445 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_exec_t:s0 tclass=file type=AVC msg=audit(1162976592.389:1647): avc: denied { read } for pid=23333 comm="logrotate" name="logrotate" dev=dm-0 ino=10319445 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.389:1647): arch=40000003 syscall=11 success=yes exit=0 a0=98ec540 a1=98ec6c8 a2=98ec5f8 a3=98ec3c0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.389:1647): path="/usr/sbin/logrotate" type=AVC_PATH msg=audit(1162976592.389:1647): path="/usr/sbin/logrotate" type=AVC msg=audit(1162976592.421:1648): avc: denied { getattr } for pid=23333 comm="logrotate" name="acpid" dev=dm-0 ino=14437362 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:apmd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.421:1648): arch=40000003 syscall=196 success=yes exit=0 a0=88526c0 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.421:1648): path="/var/log/acpid" type=AVC msg=audit(1162976592.429:1649): avc: denied { read } for pid=23333 comm="logrotate" name="cups" dev=dm-0 ino=14437052 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.429:1649): arch=40000003 syscall=5 success=yes exit=4 a0=bfbe4730 a1=18800 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.429:1650): avc: denied { getattr } for pid=23333 comm="logrotate" name="cups" dev=dm-0 ino=14437052 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.429:1650): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbe445c a2=239ff4 a3=4 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.429:1650): path="/var/log/cups" type=AVC msg=audit(1162976592.429:1651): avc: denied { search } for pid=23333 comm="logrotate" name="cups" dev=dm-0 ino=14437052 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=AVC msg=audit(1162976592.429:1651): avc: denied { getattr } for pid=23333 comm="logrotate" name="access_log" dev=dm-0 ino=14437876 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.429:1651): arch=40000003 syscall=196 success=yes exit=0 a0=8852860 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.429:1651): path="/var/log/cups/access_log" type=AVC msg=audit(1162976592.557:1652): avc: denied { search } for pid=23333 comm="logrotate" name="account" dev=dm-0 ino=14437046 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:acct_data_t:s0 tclass=dir type=AVC msg=audit(1162976592.557:1652): avc: denied { getattr } for pid=23333 comm="logrotate" name="pacct" dev=dm-0 ino=14437048 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:acct_data_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.557:1652): arch=40000003 syscall=196 success=yes exit=0 a0=8853648 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.557:1652): path="/var/account/pacct" type=AVC msg=audit(1162976592.609:1653): avc: denied { read } for pid=23333 comm="logrotate" name="setroubleshoot" dev=dm-0 ino=14469339 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.609:1653): arch=40000003 syscall=5 success=yes exit=4 a0=bfbe4750 a1=18800 a2=18a5c0 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.625:1654): avc: denied { getattr } for pid=23333 comm="logrotate" name="setroubleshoot" dev=dm-0 ino=14469339 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.625:1654): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbe447c a2=239ff4 a3=4 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.625:1654): path="/var/log/setroubleshoot" type=AVC msg=audit(1162976592.633:1655): avc: denied { search } for pid=23333 comm="logrotate" name="setroubleshoot" dev=dm-0 ino=14469339 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_log_t:s0 tclass=dir type=AVC msg=audit(1162976592.633:1655): avc: denied { getattr } for pid=23333 comm="logrotate" name="setroubleshootd.log" dev=dm-0 ino=14469341 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:setroubleshoot_var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.633:1655): arch=40000003 syscall=196 success=yes exit=0 a0=88546f0 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.633:1655): path="/var/log/setroubleshoot/setroubleshootd.log" type=AVC msg=audit(1162976592.665:1656): avc: denied { getattr } for pid=23333 comm="logrotate" name="catalina.out" dev=dm-0 ino=14731349 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.665:1656): arch=40000003 syscall=196 success=yes exit=0 a0=88534c8 a1=bfbe4a90 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.665:1656): path="/var/log/tomcat5/catalina.out" type=AVC msg=audit(1162976592.705:1657): avc: denied { getattr } for pid=23333 comm="logrotate" name="wtmp" dev=dm-0 ino=6422812 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wtmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.705:1657): arch=40000003 syscall=196 success=yes exit=0 a0=8853678 a1=bfbe5080 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.705:1657): path="/var/log/wtmp" type=AVC msg=audit(1162976592.705:1658): avc: denied { getattr } for pid=23333 comm="logrotate" name="logrotate.status" dev=dm-0 ino=14436936 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.705:1658): arch=40000003 syscall=195 success=yes exit=0 a0=805083f a1=bfbe5514 a2=239ff4 a3=88523e0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.705:1658): path="/var/lib/logrotate.status" type=AVC msg=audit(1162976592.733:1659): avc: denied { read } for pid=23333 comm="logrotate" name="logrotate.status" dev=dm-0 ino=14436936 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.733:1659): arch=40000003 syscall=5 success=yes exit=3 a0=805083f a1=8000 a2=1b6 a3=88523e0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.737:1660): avc: denied { getattr } for pid=23333 comm="logrotate" name="acpid" dev=dm-0 ino=14437362 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:apmd_log_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.737:1660): arch=40000003 syscall=195 success=yes exit=0 a0=8852718 a1=bfbe52e0 a2=239ff4 a3=0 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.737:1660): path="/var/log/acpid" type=AVC msg=audit(1162976592.737:1661): avc: denied { write } for pid=23333 comm="logrotate" name="logrotate.status" dev=dm-0 ino=14436936 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:logrotate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.737:1661): arch=40000003 syscall=5 success=yes exit=3 a0=805083f a1=8241 a2=1b6 a3=8855368 items=0 ppid=23331 pid=23333 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.777:1662): avc: denied { search } for pid=23334 comm="makewhatis.cron" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.777:1662): arch=40000003 syscall=195 success=no exit=-2 a0=827ba80 a1=bfac29a8 a2=239ff4 a3=827b548 items=0 ppid=22863 pid=23334 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis.cron" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.817:1663): avc: denied { write } for pid=23339 comm="touch" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976592.817:1663): avc: denied { add_name } for pid=23339 comm="touch" name="makewhatis.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976592.817:1663): avc: denied { create } for pid=23339 comm="touch" name="makewhatis.lock" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.817:1663): arch=40000003 syscall=5 success=yes exit=0 a0=bfa62f5f a1=8941 a2=1b6 a3=8941 items=0 ppid=23334 pid=23339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.817:1664): avc: denied { write } for pid=23339 comm="touch" name="makewhatis.lock" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.817:1664): arch=40000003 syscall=271 success=yes exit=0 a0=bfa60ec4 a1=0 a2=239ff4 a3=0 items=0 ppid=23334 pid=23339 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.877:1665): avc: denied { getattr } for pid=23340 comm="makewhatis" name="man" dev=dm-0 ino=10311888 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.877:1665): arch=40000003 syscall=195 success=yes exit=0 a0=8ac0de0 a1=bfcae198 a2=239ff4 a3=8ac0e60 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.877:1665): path="/usr/share/man" type=AVC msg=audit(1162976592.881:1666): avc: denied { search } for pid=23340 comm="makewhatis" name="man" dev=dm-0 ino=10311888 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.881:1666): arch=40000003 syscall=195 success=no exit=-2 a0=8ac1088 a1=bfcae198 a2=239ff4 a3=8ac11d8 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.897:1667): avc: denied { read } for pid=23354 comm="find" name="man1" dev=dm-0 ino=10311889 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976592.897:1667): arch=40000003 syscall=5 success=yes exit=3 a0=80648ce a1=8000 a2=0 a3=8000 items=0 ppid=23340 pid=23354 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976592.901:1668): avc: denied { getattr } for pid=23354 comm="find" name="pamtofits.1.gz" dev=dm-0 ino=10330525 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976592.901:1668): arch=40000003 syscall=196 success=yes exit=0 a0=95562e4 a1=bfb81478 a2=239ff4 a3=bfb81478 items=0 ppid=23340 pid=23354 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976592.901:1668): path="/usr/share/man/man1/pamtofits.1.gz" type=AVC msg=audit(1162976668.826:1669): avc: denied { read } for pid=23378 comm="cat" name="whatis" dev=dm-0 ino=14437978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976668.826:1669): arch=40000003 syscall=5 success=yes exit=3 a0=bfb87f20 a1=8000 a2=0 a3=8000 items=0 ppid=23340 pid=23378 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cat" exe="/bin/cat" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976668.950:1670): avc: denied { write } for pid=23380 comm="makewhatis" name="whatis" dev=dm-0 ino=14437978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976668.950:1670): arch=40000003 syscall=5 success=yes exit=3 a0=8aca928 a1=8241 a2=1b6 a3=8241 items=0 ppid=23340 pid=23380 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.010:1671): avc: denied { setattr } for pid=23381 comm="chmod" name="whatis" dev=dm-0 ino=14437978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.010:1671): arch=40000003 syscall=15 success=yes exit=0 a0=88ca090 a1=1a4 a2=8051594 a3=0 items=0 ppid=23340 pid=23381 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chmod" exe="/bin/chmod" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.166:1672): avc: denied { getattr } for pid=23383 comm="find" name="rubber.1" dev=dm-0 ino=11425301 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.166:1672): arch=40000003 syscall=196 success=yes exit=0 a0=816bc44 a1=bfe2e728 a2=239ff4 a3=bfe2e728 items=0 ppid=23340 pid=23383 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.166:1672): path="/usr/local/man/man1/rubber.1" type=AVC msg=audit(1162976669.166:1673): avc: denied { getattr } for pid=23340 comm="makewhatis" name="man8" dev=dm-0 ino=14535139 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.166:1673): arch=40000003 syscall=195 success=yes exit=0 a0=8acb2a8 a1=bfcacdb8 a2=239ff4 a3=8acb1b8 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.166:1673): path="/usr/local/man/man8" type=AVC msg=audit(1162976669.206:1674): avc: denied { search } for pid=23340 comm="makewhatis" name="man8" dev=dm-0 ino=14535139 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.206:1674): arch=40000003 syscall=12 success=yes exit=0 a0=8acafd8 a1=1 a2=0 a3=8acafd8 items=0 ppid=23334 pid=23340 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="makewhatis" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.206:1675): avc: denied { read } for pid=23384 comm="find" name="man8" dev=dm-0 ino=14535139 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.206:1675): arch=40000003 syscall=5 success=yes exit=3 a0=80648ce a1=8000 a2=0 a3=8000 items=0 ppid=23340 pid=23384 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.674:1676): avc: denied { remove_name } for pid=23430 comm="rm" name="makewhatis.lock" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1162976669.674:1676): avc: denied { unlink } for pid=23430 comm="rm" name="makewhatis.lock" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.674:1676): arch=40000003 syscall=10 success=yes exit=0 a0=bffe4f65 a1=0 a2=805277c a3=bffe35a4 items=0 ppid=23334 pid=23430 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.710:1677): avc: denied { execute } for pid=23436 comm="mlocate.cron" name="updatedb" dev=dm-0 ino=10334536 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_exec_t:s0 tclass=file type=AVC msg=audit(1162976669.710:1677): avc: denied { execute_no_trans } for pid=23436 comm="mlocate.cron" name="updatedb" dev=dm-0 ino=10334536 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_exec_t:s0 tclass=file type=AVC msg=audit(1162976669.710:1677): avc: denied { read } for pid=23436 comm="mlocate.cron" name="updatedb" dev=dm-0 ino=10334536 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.710:1677): arch=40000003 syscall=11 success=yes exit=0 a0=97cb4a8 a1=97cb490 a2=97cbd98 a3=97cba48 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.710:1677): path="/usr/bin/updatedb" type=AVC_PATH msg=audit(1162976669.710:1677): path="/usr/bin/updatedb" type=AVC msg=audit(1162976669.754:1678): avc: denied { search } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976669.754:1678): avc: denied { read } for pid=23436 comm="updatedb" name="mlocate.db" dev=dm-0 ino=14438247 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.754:1678): arch=40000003 syscall=5 success=yes exit=3 a0=804d345 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.786:1679): avc: denied { write } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976669.786:1679): avc: denied { add_name } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976669.786:1679): avc: denied { create } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.786:1679): arch=40000003 syscall=5 success=yes exit=4 a0=8ff0fa0 a1=80c2 a2=180 a3=80c2 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.786:1680): avc: denied { getattr } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.786:1680): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfbb7de4 a2=239ff4 a3=8ff0fc8 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1680): path="/var/lib/mlocate/mlocate.db.DwVvuL" type=AVC msg=audit(1162976669.786:1681): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=sda1 ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1681): arch=40000003 syscall=196 success=yes exit=0 a0=8ff116d a1=bfbb3ca4 a2=239ff4 a3=bfbb3ca4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1681): path="/boot" type=AVC msg=audit(1162976669.786:1682): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=tmpfs ino=6550 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1682): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5243 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1682): path="/dev/shm" type=AVC msg=audit(1162976669.786:1683): avc: denied { getattr } for pid=23436 comm="updatedb" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1683): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5247 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1683): path="/proc/sys/fs" type=AVC msg=audit(1162976669.786:1684): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=binfmt_misc ino=6641 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:binfmt_misc_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1684): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524a items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1684): path="/proc/sys/fs/binfmt_misc" type=AVC msg=audit(1162976669.786:1685): avc: denied { getattr } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1685): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1685): path="/var/lib/nfs" type=AVC msg=audit(1162976669.786:1686): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1686): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524c items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1686): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162976669.786:1687): avc: denied { getattr } for pid=23436 comm="updatedb" name="media" dev=dm-0 ino=6972769 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mnt_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1687): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5242 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1687): path="/media" type=AVC msg=audit(1162976669.786:1688): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=hdc ino=3008 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iso9660_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.786:1688): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.786:1688): path=2F6D656469612F5761726372616674204949495F type=AVC msg=audit(1162976669.790:1689): avc: denied { search } for pid=23436 comm="updatedb" name="/" dev=sda1 ino=2 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.790:1689): arch=40000003 syscall=12 success=yes exit=0 a0=8ff116d a1=bfbb3ca4 a2=bfbb5f50 a3=8ff116d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976669.886:1690): avc: denied { getattr } for pid=23436 comm="updatedb" name="lost+found" dev=sda1 ino=11 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lost_found_t:s0 tclass=dir type=SYSCALL msg=audit(1162976669.886:1690): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15d1 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.886:1690): path="/boot/lost+found" type=AVC msg=audit(1162976669.898:1691): avc: denied { write } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976669.898:1691): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=b7f67000 a2=1000 a3=1000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976669.898:1691): path="/var/lib/mlocate/mlocate.db.DwVvuL" type=AVC msg=audit(1162976670.038:1692): avc: denied { getattr } for pid=23436 comm="updatedb" name="printconf" dev=dm-0 ino=9331054 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.038:1692): arch=40000003 syscall=196 success=yes exit=0 a0=8ff665d a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.038:1692): path="/etc/alchemist/namespace/printconf" type=AVC msg=audit(1162976670.054:1693): avc: denied { getattr } for pid=23436 comm="updatedb" name="pcm" dev=dm-0 ino=9330155 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.054:1693): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6655 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.054:1693): path="/etc/alsa/pcm" type=AVC msg=audit(1162976670.054:1694): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=11425219 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.054:1694): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6409 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.054:1694): path="/etc/amanda" type=AVC msg=audit(1162976670.066:1695): avc: denied { search } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=11425219 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.066:1695): arch=40000003 syscall=12 success=yes exit=0 a0=8ff6409 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff6409 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.090:1696): avc: denied { getattr } for pid=23436 comm="updatedb" name="audit" dev=dm-0 ino=11494585 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:auditd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.090:1696): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e1 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.090:1696): path="/etc/audit" type=AVC msg=audit(1162976670.090:1697): avc: denied { getattr } for pid=23436 comm="updatedb" name="blkid" dev=dm-0 ino=9330183 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.090:1697): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14d5 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.090:1697): path="/etc/blkid" type=AVC msg=audit(1162976670.102:1698): avc: denied { getattr } for pid=23436 comm="updatedb" name="bluetooth" dev=dm-0 ino=9330923 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bluetooth_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.102:1698): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6281 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.102:1698): path="/etc/bluetooth" type=AVC msg=audit(1162976670.102:1699): avc: denied { getattr } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=9330715 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.102:1699): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1589 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.102:1699): path="/etc/cups" type=AVC msg=audit(1162976670.110:1700): avc: denied { search } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=9330715 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.110:1700): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1589 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1589 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.118:1701): avc: denied { getattr } for pid=23436 comm="updatedb" name="dbus-1" dev=dm-0 ino=9329778 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.118:1701): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1c19 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.118:1701): path="/etc/dbus-1" type=AVC msg=audit(1162976670.118:1702): avc: denied { search } for pid=23436 comm="updatedb" name="dbus-1" dev=dm-0 ino=9329778 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.118:1702): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1c19 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1c19 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.226:1703): avc: denied { getattr } for pid=23436 comm="updatedb" name="hp" dev=dm-0 ino=9330526 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hplip_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.226:1703): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1c89 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.226:1703): path="/etc/hp" type=AVC msg=audit(1162976670.230:1704): avc: denied { getattr } for pid=23436 comm="updatedb" name="htdig" dev=dm-0 ino=9362555 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.230:1704): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1e9d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.230:1704): path="/etc/htdig" type=AVC msg=audit(1162976670.250:1705): avc: denied { getattr } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.250:1705): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13b9 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.250:1705): path="/etc/httpd" type=AVC msg=audit(1162976670.274:1706): avc: denied { search } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.274:1706): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13b9 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff13b9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.334:1707): avc: denied { getattr } for pid=23436 comm="updatedb" name="lvm" dev=dm-0 ino=9329762 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.334:1707): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1951 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.334:1707): path="/etc/lvm" type=AVC msg=audit(1162976670.342:1708): avc: denied { search } for pid=23436 comm="updatedb" name="lvm" dev=dm-0 ino=9329762 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.342:1708): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1951 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1951 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.342:1709): avc: denied { getattr } for pid=23436 comm="updatedb" name="archive" dev=dm-0 ino=9330266 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_metadata_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.342:1709): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6645 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.342:1709): path="/etc/lvm/archive" type=AVC msg=audit(1162976670.346:1710): avc: denied { getattr } for pid=23436 comm="updatedb" name="mail" dev=dm-0 ino=9330776 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_mail_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.346:1710): arch=40000003 syscall=196 success=yes exit=0 a0=8ff19c5 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.346:1710): path="/etc/mail" type=AVC msg=audit(1162976670.346:1711): avc: denied { search } for pid=23436 comm="updatedb" name="mail" dev=dm-0 ino=9330776 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_mail_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.346:1711): arch=40000003 syscall=12 success=yes exit=0 a0=8ff19c5 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff19c5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.358:1712): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=11981501 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.358:1712): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1339 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.358:1712): path="/etc/news" type=AVC msg=audit(1162976670.454:1713): avc: denied { getattr } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=9330491 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.454:1713): arch=40000003 syscall=196 success=yes exit=0 a0=8ff2071 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.454:1713): path="/etc/ppp" type=AVC msg=audit(1162976670.454:1714): avc: denied { search } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=9330491 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.454:1714): arch=40000003 syscall=12 success=yes exit=0 a0=8ff2071 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff2071 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.454:1715): avc: denied { getattr } for pid=23436 comm="updatedb" name="peers" dev=dm-0 ino=9330497 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.454:1715): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6719 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.454:1715): path="/etc/ppp/peers" type=AVC msg=audit(1162976670.466:1716): avc: denied { read } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=9330491 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.466:1716): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.466:1717): avc: denied { search } for pid=23436 comm="updatedb" name="peers" dev=dm-0 ino=9330497 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.466:1717): arch=40000003 syscall=12 success=yes exit=0 a0=8ff6719 a1=8000 a2=bfbb1bb0 a3=8ff6719 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.482:1718): avc: denied { getattr } for pid=23436 comm="updatedb" name="racoon" dev=dm-0 ino=9330979 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_conf_file_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.482:1718): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15b1 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.482:1718): path="/etc/racoon" type=AVC msg=audit(1162976670.486:1719): avc: denied { search } for pid=23436 comm="updatedb" name="racoon" dev=dm-0 ino=9330979 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_conf_file_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.486:1719): arch=40000003 syscall=12 success=yes exit=0 a0=8ff15b1 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff15b1 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.486:1720): avc: denied { getattr } for pid=23436 comm="updatedb" name="certs" dev=dm-0 ino=9330980 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_key_file_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.486:1720): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6639 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.486:1720): path="/etc/racoon/certs" type=AVC msg=audit(1162976670.522:1721): avc: denied { getattr } for pid=23436 comm="updatedb" name="samba" dev=dm-0 ino=9330307 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:samba_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.522:1721): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1765 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.522:1721): path="/etc/samba" type=AVC msg=audit(1162976670.522:1722): avc: denied { getattr } for pid=23436 comm="updatedb" name="console.apps" dev=dm-0 ino=9330284 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.522:1722): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6661 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.522:1722): path="/etc/security/console.apps" type=AVC msg=audit(1162976670.538:1723): avc: denied { getattr } for pid=23436 comm="updatedb" name="files" dev=dm-0 ino=9334527 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.538:1723): arch=40000003 syscall=196 success=yes exit=0 a0=8ff674d a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.538:1723): path="/etc/selinux/strict/contexts/files" type=AVC msg=audit(1162976670.554:1724): avc: denied { getattr } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9334708 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.554:1724): arch=40000003 syscall=196 success=yes exit=0 a0=8ff66dd a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.554:1724): path="/etc/selinux/strict/modules/active" type=AVC msg=audit(1162976670.566:1725): avc: denied { search } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9334708 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.566:1725): arch=40000003 syscall=12 success=yes exit=0 a0=8ff66dd a1=8000 a2=bfbad810 a3=8ff66dd items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.586:1726): avc: denied { getattr } for pid=23436 comm="updatedb" name="policy" dev=dm-0 ino=9334538 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.586:1726): arch=40000003 syscall=196 success=yes exit=0 a0=8ff66ad a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.586:1726): path="/etc/selinux/strict/policy" type=AVC msg=audit(1162976670.658:1727): avc: denied { getattr } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9331999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.658:1727): arch=40000003 syscall=196 success=yes exit=0 a0=8ff66f9 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.658:1727): path="/etc/selinux/targeted/modules/active" type=AVC msg=audit(1162976670.678:1728): avc: denied { search } for pid=23436 comm="updatedb" name="active" dev=dm-0 ino=9331999 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.678:1728): arch=40000003 syscall=12 success=yes exit=0 a0=8ff66f9 a1=8000 a2=bfbad810 a3=8ff66f9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.686:1729): avc: denied { getattr } for pid=23436 comm="updatedb" name="previous" dev=dm-0 ino=9331688 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.686:1729): arch=40000003 syscall=196 success=yes exit=0 a0=8ff6705 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.686:1729): path="/etc/selinux/targeted/modules/previous" type=AVC msg=audit(1162976670.698:1730): avc: denied { search } for pid=23436 comm="updatedb" name="previous" dev=dm-0 ino=9331688 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.698:1730): arch=40000003 syscall=12 success=yes exit=0 a0=8ff6705 a1=bfbab564 a2=bfbad810 a3=8ff6705 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.722:1731): avc: denied { getattr } for pid=23436 comm="updatedb" name="stunnel" dev=dm-0 ino=9330593 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:stunnel_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.722:1731): arch=40000003 syscall=196 success=yes exit=0 a0=8ff65d9 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.722:1731): path="/etc/stunnel" type=AVC msg=audit(1162976670.926:1732): avc: denied { getattr } for pid=23436 comm="updatedb" name=".kde" dev=dm-0 ino=14640795 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.926:1732): arch=40000003 syscall=196 success=yes exit=0 a0=8ff12d5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.926:1732): path="/home/foo/.kde" type=AVC msg=audit(1162976670.966:1733): avc: denied { search } for pid=23436 comm="updatedb" name=".kde" dev=dm-0 ino=14640795 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.966:1733): arch=40000003 syscall=12 success=yes exit=0 a0=8ff12d5 a1=8000 a2=bfbb1bb0 a3=8ff12d5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.966:1734): avc: denied { getattr } for pid=23436 comm="updatedb" name=".AbiSuite" dev=dm-0 ino=6579948 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.966:1734): arch=40000003 syscall=196 success=yes exit=0 a0=8ff196d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976670.966:1734): path="/home/kmacmill/.AbiSuite" type=AVC msg=audit(1162976670.990:1735): avc: denied { search } for pid=23436 comm="updatedb" name=".Trash" dev=dm-0 ino=6547233 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.990:1735): arch=40000003 syscall=12 success=yes exit=0 a0=8ff17fd a1=8000 a2=bfbb1bb0 a3=8ff17fd items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976670.990:1736): avc: denied { read } for pid=23436 comm="updatedb" name=".Trash" dev=dm-0 ino=6547233 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976670.990:1736): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976672.098:1737): avc: denied { getattr } for pid=23436 comm="updatedb" name=".camel_certs" dev=dm-0 ino=6809377 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976672.098:1737): arch=40000003 syscall=196 success=yes exit=0 a0=8ff158d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976672.098:1737): path="/home/kmacmill/.camel_certs" type=AVC msg=audit(1162976673.006:1738): avc: denied { search } for pid=23436 comm="updatedb" name=".evolution" dev=dm-0 ino=6776355 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976673.006:1738): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1389 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1389 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976673.006:1739): avc: denied { read } for pid=23436 comm="updatedb" name=".evolution" dev=dm-0 ino=6776355 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976673.006:1739): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976673.491:1740): avc: denied { getattr } for pid=23436 comm="updatedb" name=".fonts" dev=dm-0 ino=6612820 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976673.491:1740): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1301 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976673.491:1740): path="/home/kmacmill/.fonts" type=AVC msg=audit(1162976675.011:1741): avc: denied { getattr } for pid=23436 comm="updatedb" name=".gnupg" dev=dm-0 ino=6814310 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_gpg_secret_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.011:1741): arch=40000003 syscall=196 success=yes exit=0 a0=8ff18a5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976675.011:1741): path="/home/kmacmill/.gnupg" type=AVC msg=audit(1162976675.467:1742): avc: denied { getattr } for pid=23436 comm="updatedb" name=".java" dev=dm-0 ino=6781792 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.467:1742): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1999 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976675.467:1742): path="/home/kmacmill/.java" type=AVC msg=audit(1162976675.467:1743): avc: denied { search } for pid=23436 comm="updatedb" name=".java" dev=dm-0 ino=6781792 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.467:1743): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1999 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1999 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976675.467:1744): avc: denied { read } for pid=23436 comm="updatedb" name=".java" dev=dm-0 ino=6781792 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976675.467:1744): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976676.563:1745): avc: denied { getattr } for pid=23436 comm="updatedb" name=".mplayer" dev=dm-0 ino=6843133 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_mplayer_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976676.563:1745): arch=40000003 syscall=196 success=yes exit=0 a0=8ff18bd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976676.563:1745): path="/home/kmacmill/.mplayer" type=AVC msg=audit(1162976676.751:1746): avc: denied { getattr } for pid=23436 comm="updatedb" name=".spamassassin" dev=dm-0 ino=6810443 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_spamassassin_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976676.751:1746): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1705 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976676.751:1746): path="/home/kmacmill/.spamassassin" type=AVC msg=audit(1162976676.775:1747): avc: denied { getattr } for pid=23436 comm="updatedb" name=".ssh" dev=dm-0 ino=6579939 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_ssh_t:s0 tclass=dir type=SYSCALL msg=audit(1162976676.775:1747): arch=40000003 syscall=196 success=yes exit=0 a0=8ff130d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976676.775:1747): path="/home/kmacmill/.ssh" type=AVC msg=audit(1162976677.067:1748): avc: denied { getattr } for pid=23436 comm="updatedb" name=".thunderbird" dev=dm-0 ino=6783128 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_thunderbird_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976677.067:1748): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1505 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976677.067:1748): path="/home/kmacmill/.thunderbird" type=AVC msg=audit(1162976677.067:1749): avc: denied { search } for pid=23436 comm="updatedb" name=".thunderbird" dev=dm-0 ino=6783128 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_thunderbird_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976677.067:1749): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1505 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1505 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976677.067:1750): avc: denied { read } for pid=23436 comm="updatedb" name=".thunderbird" dev=dm-0 ino=6783128 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_thunderbird_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976677.067:1750): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976778.857:1751): avc: denied { getattr } for pid=23436 comm="updatedb" name="modules" dev=dm-0 ino=13716388 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976778.857:1751): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1b39 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976778.857:1751): path="/lib/modules" type=AVC msg=audit(1162976778.857:1752): avc: denied { search } for pid=23436 comm="updatedb" name="modules" dev=dm-0 ino=13716388 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976778.857:1752): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1b39 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1b39 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976778.857:1753): avc: denied { read } for pid=23436 comm="updatedb" name="modules" dev=dm-0 ino=13716388 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976778.857:1753): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976779.557:1754): avc: denied { getattr } for pid=23436 comm="updatedb" name="misc" dev=dm-0 ino=13750632 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976779.557:1754): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1fe9 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976779.557:1754): path="/lib/modules/2.6.17-1.2145_FC5smp/misc" type=AVC msg=audit(1162976783.645:1755): avc: denied { search } for pid=23436 comm="updatedb" name="drivers" dev=dm-0 ino=13716394 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.645:1755): arch=40000003 syscall=12 success=yes exit=0 a0=8ff7249 a1=8000 a2=bfbad810 a3=8ff7249 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976783.669:1756): avc: denied { read } for pid=23436 comm="updatedb" name="drivers" dev=dm-0 ino=13716394 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.669:1756): arch=40000003 syscall=5 success=yes exit=11 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976783.729:1757): avc: denied { getattr } for pid=23436 comm="updatedb" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1757): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5247 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1757): path="/proc/sys/fs" type=AVC msg=audit(1162976783.729:1758): avc: denied { search } for pid=23436 comm="updatedb" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1758): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524a items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976783.729:1759): avc: denied { getattr } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1759): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff5248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1759): path="/var/lib/nfs" type=AVC msg=audit(1162976783.729:1760): avc: denied { search } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=AVC msg=audit(1162976783.729:1760): avc: denied { getattr } for pid=23436 comm="updatedb" name="/" dev=rpc_pipefs ino=8009 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpc_pipefs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1760): arch=40000003 syscall=196 success=yes exit=0 a0=bfbb3d88 a1=bfbb3b58 a2=239ff4 a3=8ff524c items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1760): path="/var/lib/nfs/rpc_pipefs" type=AVC msg=audit(1162976783.729:1761): avc: denied { getattr } for pid=23436 comm="updatedb" name="windows" dev=dm-0 ino=12178745 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:mnt_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.729:1761): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1275 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.729:1761): path="/mnt/windows" type=AVC msg=audit(1162976783.865:1762): avc: denied { getattr } for pid=23436 comm="updatedb" name=".Trash" dev=dm-0 ino=13159950 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.865:1762): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1289 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976783.865:1762): path="/root/.Trash" type=AVC msg=audit(1162976783.933:1763): avc: denied { read } for pid=23436 comm="updatedb" name=".ccache" dev=dm-0 ino=13127266 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976783.933:1763): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.553:1764): avc: denied { getattr } for pid=23436 comm="updatedb" name=".gconf" dev=dm-0 ino=13127147 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.553:1764): arch=40000003 syscall=196 success=yes exit=0 a0=8ff133d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.553:1764): path="/root/.gconf" type=AVC msg=audit(1162976784.553:1765): avc: denied { search } for pid=23436 comm="updatedb" name=".gconf" dev=dm-0 ino=13127147 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.553:1765): arch=40000003 syscall=12 success=yes exit=0 a0=8ff133d a1=bfbb1ad4 a2=bfbb3d80 a3=8ff133d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.553:1766): avc: denied { read } for pid=23436 comm="updatedb" name=".gconf" dev=dm-0 ino=13127147 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.553:1766): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.649:1767): avc: denied { search } for pid=23436 comm="updatedb" name="panel" dev=dm-0 ino=13159964 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.649:1767): arch=40000003 syscall=12 success=yes exit=0 a0=8ff190d a1=bfbad734 a2=bfbaf9e0 a3=8ff190d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.653:1768): avc: denied { read } for pid=23436 comm="updatedb" name="panel" dev=dm-0 ino=13159964 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.653:1768): arch=40000003 syscall=5 success=yes exit=10 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.801:1769): avc: denied { getattr } for pid=23436 comm="updatedb" name=".mozilla" dev=dm-0 ino=13127150 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.801:1769): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1415 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.801:1769): path="/root/.mozilla" type=AVC msg=audit(1162976784.813:1770): avc: denied { getattr } for pid=23436 comm="updatedb" name=".ssh" dev=dm-0 ino=13127265 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=root:object_r:user_home_ssh_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.813:1770): arch=40000003 syscall=196 success=yes exit=0 a0=8ff148d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.813:1770): path="/root/.ssh" type=AVC msg=audit(1162976784.845:1771): avc: denied { getattr } for pid=23436 comm="updatedb" name="tftpboot" dev=dm-0 ino=14763937 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tftpdir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.845:1771): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1241 a1=bfbb3ca4 a2=239ff4 a3=bfbb3ca4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.845:1771): path="/tftpboot" type=AVC msg=audit(1162976784.873:1772): avc: denied { search } for pid=23436 comm="updatedb" name="tftpboot" dev=dm-0 ino=14763937 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tftpdir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.873:1772): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1241 a1=bfbb3ca4 a2=bfbb5f50 a3=8ff1241 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976784.873:1773): avc: denied { getattr } for pid=23436 comm="updatedb" name="pxelinux.cfg" dev=dm-0 ino=14763989 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:tftpdir_t:s0 tclass=dir type=SYSCALL msg=audit(1162976784.873:1773): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1295 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976784.873:1773): path="/tftpboot/pxelinux.cfg" type=AVC msg=audit(1162976788.046:1774): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=11425231 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_usr_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976788.046:1774): arch=40000003 syscall=196 success=yes exit=0 a0=9009c95 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976788.046:1774): path="/usr/lib/amanda" type=AVC msg=audit(1162976788.474:1775): avc: denied { getattr } for pid=23436 comm="updatedb" name="games" dev=dm-0 ino=10311856 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:games_exec_t:s0 tclass=dir type=SYSCALL msg=audit(1162976788.474:1775): arch=40000003 syscall=196 success=yes exit=0 a0=8fff39d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976788.474:1775): path="/usr/lib/games" type=AVC msg=audit(1162976789.082:1776): avc: denied { getattr } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=10640259 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=dir type=SYSCALL msg=audit(1162976789.082:1776): arch=40000003 syscall=196 success=yes exit=0 a0=8ff7cf5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976789.082:1776): path="/usr/lib/httpd" type=AVC msg=audit(1162976789.082:1777): avc: denied { search } for pid=23436 comm="updatedb" name="httpd" dev=dm-0 ino=10640259 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=dir type=SYSCALL msg=audit(1162976789.082:1777): arch=40000003 syscall=12 success=yes exit=0 a0=8ff7cf5 a1=bfbaf904 a2=bfbb1bb0 a3=8ff7cf5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976802.927:1778): avc: denied { getattr } for pid=23436 comm="updatedb" name="settings" dev=dm-0 ino=10575168 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976802.927:1778): arch=40000003 syscall=196 success=yes exit=0 a0=900b2f5 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976802.927:1778): path="/usr/lib/qt-3.3/etc/settings" type=AVC msg=audit(1162976805.899:1779): avc: denied { getattr } for pid=23436 comm="updatedb" name="fonts" dev=dm-0 ino=12407306 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976805.899:1779): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1429 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976805.899:1779): path="/usr/local/share/fonts" type=AVC msg=audit(1162976805.899:1780): avc: denied { search } for pid=23436 comm="updatedb" name="fonts" dev=dm-0 ino=12407306 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976805.899:1780): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1429 a1=bfbad734 a2=bfbaf9e0 a3=8ff1429 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976805.947:1781): avc: denied { getattr } for pid=23436 comm="updatedb" name="src" dev=dm-0 ino=10311882 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976805.947:1781): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976805.947:1781): path="/usr/local/src" type=AVC msg=audit(1162976809.203:1782): avc: denied { getattr } for pid=23436 comm="updatedb" name="cracklib" dev=dm-0 ino=10442892 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:crack_db_t:s0 tclass=dir type=SYSCALL msg=audit(1162976809.203:1782): arch=40000003 syscall=196 success=yes exit=0 a0=8ff166d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976809.203:1782): path="/usr/share/cracklib" type=AVC msg=audit(1162976809.307:1783): avc: denied { read } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=10738055 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976809.307:1783): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976809.995:1784): avc: denied { read } for pid=23436 comm="updatedb" name="fonts" dev=dm-0 ino=10541654 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dir type=SYSCALL msg=audit(1162976809.995:1784): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976811.091:1785): avc: denied { getattr } for pid=23436 comm="updatedb" name="hwdata" dev=dm-0 ino=10607875 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=SYSCALL msg=audit(1162976811.091:1785): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1d01 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976811.091:1785): path="/usr/share/hwdata" type=AVC msg=audit(1162976811.095:1786): avc: denied { search } for pid=23436 comm="updatedb" name="hwdata" dev=dm-0 ino=10607875 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=SYSCALL msg=audit(1162976811.095:1786): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1d01 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1d01 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1787): avc: denied { search } for pid=23436 comm="updatedb" name="src" dev=dm-0 ino=10311902 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1787): arch=40000003 syscall=12 success=yes exit=0 a0=8ff131d a1=bfbb1ad4 a2=bfbb3d80 a3=8ff131d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1788): avc: denied { getattr } for pid=23436 comm="updatedb" name="kernels" dev=dm-0 ino=11655090 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1788): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1335 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976823.180:1788): path="/usr/src/kernels" type=AVC msg=audit(1162976823.180:1789): avc: denied { read } for pid=23436 comm="updatedb" name="src" dev=dm-0 ino=10311902 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1789): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1790): avc: denied { search } for pid=23436 comm="updatedb" name="kernels" dev=dm-0 ino=11655090 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1790): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1335 a1=8000 a2=bfbb1bb0 a3=8ff1335 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976823.180:1791): avc: denied { read } for pid=23436 comm="updatedb" name="kernels" dev=dm-0 ino=11655090 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:src_t:s0 tclass=dir type=SYSCALL msg=audit(1162976823.180:1791): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.540:1792): avc: denied { getattr } for pid=23436 comm="updatedb" name="account" dev=dm-0 ino=14437046 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:acct_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.540:1792): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1275 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.540:1792): path="/var/account" type=AVC msg=audit(1162976832.560:1793): avc: denied { search } for pid=23436 comm="updatedb" name="printconf.local" dev=dm-0 ino=14436630 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.560:1793): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1431 a1=8000 a2=bfbaf9e0 a3=8ff1431 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.564:1794): avc: denied { getattr } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=14534811 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.564:1794): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13b1 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.564:1794): path="/var/cache/cups" type=AVC msg=audit(1162976832.820:1795): avc: denied { getattr } for pid=23436 comm="updatedb" name="cvs" dev=dm-0 ino=14731350 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cvs_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.820:1795): arch=40000003 syscall=196 success=yes exit=0 a0=8ff129d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.820:1795): path="/var/cvs" type=AVC msg=audit(1162976832.868:1796): avc: denied { getattr } for pid=23436 comm="updatedb" name="gdm" dev=dm-0 ino=14437234 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xserver_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.868:1796): arch=40000003 syscall=196 success=yes exit=0 a0=8ff12c9 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.868:1796): path="/var/gdm" type=AVC msg=audit(1162976832.868:1797): avc: denied { search } for pid=23436 comm="updatedb" name="gdm" dev=dm-0 ino=14437234 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xserver_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.868:1797): arch=40000003 syscall=12 success=yes exit=0 a0=8ff12c9 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff12c9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.888:1798): avc: denied { getattr } for pid=23436 comm="updatedb" name="alternatives" dev=dm-0 ino=14436621 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.888:1798): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.888:1798): path="/var/lib/alternatives" type=AVC msg=audit(1162976832.888:1799): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534972 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.888:1799): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13a9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.888:1799): path="/var/lib/amanda" type=AVC msg=audit(1162976832.892:1800): avc: denied { read } for pid=23436 comm="updatedb" name="lib" dev=dm-0 ino=14436578 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.892:1800): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.892:1801): avc: denied { search } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534972 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.892:1801): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13a9 a1=8000 a2=bfbb1bb0 a3=8ff13a9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.892:1802): avc: denied { getattr } for pid=23436 comm="updatedb" name="DailySet1" dev=dm-0 ino=14534978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.892:1802): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1545 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.892:1802): path="/var/lib/amanda/DailySet1" type=AVC msg=audit(1162976832.904:1803): avc: denied { read } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534972 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.904:1803): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.904:1804): avc: denied { search } for pid=23436 comm="updatedb" name="DailySet1" dev=dm-0 ino=14534978 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.904:1804): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1545 a1=8000 a2=bfbaf9e0 a3=8ff1545 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.908:1805): avc: denied { getattr } for pid=23436 comm="updatedb" name="gnutar-lists" dev=dm-0 ino=14534980 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_gnutarlists_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.908:1805): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1555 a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.908:1805): path="/var/lib/amanda/gnutar-lists" type=AVC msg=audit(1162976832.908:1806): avc: denied { getattr } for pid=23436 comm="updatedb" name="bluetooth" dev=dm-0 ino=15648230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bluetooth_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.908:1806): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13b5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.908:1806): path="/var/lib/bluetooth" type=AVC msg=audit(1162976832.924:1807): avc: denied { search } for pid=23436 comm="updatedb" name="bluetooth" dev=dm-0 ino=15648230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bluetooth_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.924:1807): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13b5 a1=bfbaf904 a2=bfbb1bb0 a3=8ff13b5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976832.936:1808): avc: denied { getattr } for pid=23436 comm="updatedb" name="dav" dev=dm-0 ino=14436675 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.936:1808): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13cd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.936:1808): path="/var/lib/dav" type=AVC msg=audit(1162976832.980:1809): avc: denied { getattr } for pid=23436 comm="updatedb" name="dhclient" dev=dm-0 ino=14437064 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.980:1809): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13d9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.980:1809): path="/var/lib/dhclient" type=AVC msg=audit(1162976832.980:1810): avc: denied { getattr } for pid=23436 comm="updatedb" name="dhcpd" dev=dm-0 ino=14607569 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dhcpd_state_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.980:1810): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976832.980:1810): path="/var/lib/dhcpd" type=AVC msg=audit(1162976832.988:1811): avc: denied { read } for pid=23436 comm="updatedb" name="nvidia" dev=dm-0 ino=14437025 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976832.988:1811): arch=40000003 syscall=5 success=yes exit=10 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.032:1812): avc: denied { getattr } for pid=23436 comm="updatedb" name="games" dev=dm-0 ino=14436607 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.032:1812): arch=40000003 syscall=196 success=yes exit=0 a0=8ff140d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.032:1812): path="/var/lib/games" type=AVC msg=audit(1162976833.044:1813): avc: denied { search } for pid=23436 comm="updatedb" name="games" dev=dm-0 ino=14436607 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.044:1813): arch=40000003 syscall=12 success=yes exit=0 a0=8ff140d a1=bfbaf904 a2=bfbb1bb0 a3=8ff140d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.072:1814): avc: denied { getattr } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.072:1814): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1455 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.072:1814): path="/var/lib/mlocate" type=AVC msg=audit(1162976833.072:1815): avc: denied { read } for pid=23436 comm="updatedb" name="mlocate" dev=dm-0 ino=14437049 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.072:1815): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.072:1816): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607564 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.072:1816): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1465 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.072:1816): path="/var/lib/news" type=AVC msg=audit(1162976833.084:1817): avc: denied { search } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607564 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.084:1817): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1465 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1465 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.112:1818): avc: denied { read } for pid=23436 comm="updatedb" name="nfs" dev=dm-0 ino=14437242 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.112:1818): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.132:1819): avc: denied { getattr } for pid=23436 comm="updatedb" name="ntp" dev=dm-0 ino=14436930 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ntp_drift_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.132:1819): arch=40000003 syscall=196 success=yes exit=0 a0=8ff147d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.132:1819): path="/var/lib/ntp" type=AVC msg=audit(1162976833.164:1820): avc: denied { getattr } for pid=23436 comm="updatedb" name="setroubleshoot" dev=dm-0 ino=15287756 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.164:1820): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14c9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.164:1820): path="/var/lib/setroubleshoot" type=AVC msg=audit(1162976833.200:1821): avc: denied { getattr } for pid=23436 comm="updatedb" name="texmf" dev=dm-0 ino=14731201 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.200:1821): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14ed a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.200:1821): path="/var/lib/texmf" type=AVC msg=audit(1162976833.200:1822): avc: denied { search } for pid=23436 comm="updatedb" name="texmf" dev=dm-0 ino=14731201 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.200:1822): arch=40000003 syscall=12 success=yes exit=0 a0=8ff14ed a1=bfbaf904 a2=bfbb1bb0 a3=8ff14ed items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.200:1823): avc: denied { read } for pid=23436 comm="updatedb" name="texmf" dev=dm-0 ino=14731201 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.200:1823): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.304:1824): avc: denied { getattr } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14534807 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.304:1824): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1509 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.304:1824): path="/var/lib/xen" type=AVC msg=audit(1162976833.304:1825): avc: denied { search } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14534807 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.304:1825): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1509 a1=bfbaf904 a2=bfbb1bb0 a3=8ff1509 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.328:1826): avc: denied { read } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14534807 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.328:1826): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.328:1827): avc: denied { getattr } for pid=23436 comm="updatedb" name="xenstored" dev=dm-0 ino=14534834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xenstored_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.328:1827): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1515 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.328:1827): path="/var/lib/xenstored" type=AVC msg=audit(1162976833.328:1828): avc: denied { getattr } for pid=23436 comm="updatedb" name="xkb" dev=dm-0 ino=14437298 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.328:1828): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1525 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.328:1828): path="/var/lib/xkb" type=AVC msg=audit(1162976833.336:1829): avc: denied { getattr } for pid=23436 comm="updatedb" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.336:1829): arch=40000003 syscall=196 success=yes exit=0 a0=8ff12ed a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.336:1829): path="/var/lock" type=AVC msg=audit(1162976833.336:1830): avc: denied { read } for pid=23436 comm="updatedb" name="lock" dev=dm-0 ino=14436610 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.336:1830): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=18800 a2=bfbb199c a3=8ff40f0 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.336:1831): avc: denied { getattr } for pid=23436 comm="updatedb" name="lvm" dev=dm-0 ino=14436627 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.336:1831): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.336:1831): path="/var/lock/lvm" type=AVC msg=audit(1162976833.345:1832): avc: denied { getattr } for pid=23436 comm="updatedb" name="amanda" dev=dm-0 ino=14534977 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:amanda_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1832): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1405 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1832): path="/var/log/amanda" type=AVC msg=audit(1162976833.345:1833): avc: denied { getattr } for pid=23436 comm="updatedb" name="audit" dev=dm-0 ino=14469481 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:auditd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1833): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1451 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1833): path="/var/log/audit" type=AVC msg=audit(1162976833.345:1834): avc: denied { getattr } for pid=23436 comm="updatedb" name="mail" dev=dm-0 ino=14437073 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sendmail_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1834): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1535 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1834): path="/var/log/mail" type=AVC msg=audit(1162976833.345:1835): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607586 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.345:1835): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15e1 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.345:1835): path="/var/log/news" type=AVC msg=audit(1162976833.349:1836): avc: denied { search } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607586 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.349:1836): arch=40000003 syscall=12 success=yes exit=0 a0=8ff15e1 a1=8000 a2=bfbb1bb0 a3=8ff15e1 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.369:1837): avc: denied { getattr } for pid=23436 comm="updatedb" name="prelink" dev=dm-0 ino=15647814 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:prelink_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.369:1837): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1615 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.369:1837): path="/var/log/prelink" type=AVC msg=audit(1162976833.369:1838): avc: denied { getattr } for pid=23436 comm="updatedb" name="xen" dev=dm-0 ino=14567524 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.369:1838): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1799 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.369:1838): path="/var/log/xen" type=AVC msg=audit(1162976833.381:1839): avc: denied { getattr } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14437060 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1839): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1311 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.381:1839): path="/var/named" type=AVC msg=audit(1162976833.381:1840): avc: denied { search } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14437060 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1840): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1311 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1311 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.381:1841): avc: denied { getattr } for pid=23436 comm="updatedb" name="chroot" dev=dm-0 ino=14534815 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1841): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.381:1841): path="/var/named/chroot" type=AVC msg=audit(1162976833.381:1842): avc: denied { read } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14437060 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1842): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.381:1843): avc: denied { search } for pid=23436 comm="updatedb" name="chroot" dev=dm-0 ino=14534815 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.381:1843): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1395 a1=8000 a2=bfbb1bb0 a3=8ff1395 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.401:1844): avc: denied { read } for pid=23436 comm="updatedb" name="chroot" dev=dm-0 ino=14534815 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.401:1844): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.401:1845): avc: denied { getattr } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14534818 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.401:1845): arch=40000003 syscall=196 success=yes exit=0 a0=8ff146d a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.401:1845): path="/var/named/chroot/var/named" type=AVC msg=audit(1162976833.417:1846): avc: denied { search } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14534818 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:named_zone_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.417:1846): arch=40000003 syscall=12 success=yes exit=0 a0=8ff146d a1=8000 a2=bfbad810 a3=8ff146d items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.417:1847): avc: denied { getattr } for pid=23436 comm="updatedb" name="data" dev=dm-0 ino=14534823 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_cache_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.417:1847): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1485 a1=bfba9394 a2=239ff4 a3=bfba9394 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.417:1847): path="/var/named/chroot/var/named/data" type=AVC msg=audit(1162976833.441:1848): avc: denied { getattr } for pid=23436 comm="updatedb" name="named" dev=dm-0 ino=14534821 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:named_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.441:1848): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1485 a1=bfba9394 a2=239ff4 a3=bfba9394 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.441:1848): path="/var/named/chroot/var/run/named" type=AVC msg=audit(1162976833.461:1849): avc: denied { getattr } for pid=23436 comm="updatedb" name="racoon" dev=dm-0 ino=14437084 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ipsec_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.461:1849): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1345 a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.461:1849): path="/var/racoon" type=AVC msg=audit(1162976833.465:1850): avc: denied { getattr } for pid=23436 comm="updatedb" name="NetworkManager" dev=dm-0 ino=14437087 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:NetworkManager_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.465:1850): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15fd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.465:1850): path="/var/run/NetworkManager" type=AVC msg=audit(1162976833.473:1851): avc: denied { getattr } for pid=23436 comm="updatedb" name="avahi-daemon" dev=dm-0 ino=14437058 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:avahi_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.473:1851): arch=40000003 syscall=196 success=yes exit=0 a0=8ff16bd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.473:1851): path="/var/run/avahi-daemon" type=AVC msg=audit(1162976833.473:1852): avc: denied { getattr } for pid=23436 comm="updatedb" name="console" dev=dm-0 ino=14436665 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.473:1852): arch=40000003 syscall=196 success=yes exit=0 a0=8ff16e9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.473:1852): path="/var/run/console" type=AVC msg=audit(1162976833.473:1853): avc: denied { getattr } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=14534808 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.473:1853): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1439 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.473:1853): path="/var/run/cups" type=AVC msg=audit(1162976833.485:1854): avc: denied { search } for pid=23436 comm="updatedb" name="cups" dev=dm-0 ino=14534808 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.485:1854): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1439 a1=8000 a2=bfbb1bb0 a3=8ff1439 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.485:1855): avc: denied { getattr } for pid=23436 comm="updatedb" name="dbus" dev=dm-0 ino=14436623 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.485:1855): arch=40000003 syscall=196 success=yes exit=0 a0=8ff142d a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.485:1855): path="/var/run/dbus" type=AVC msg=audit(1162976833.485:1856): avc: denied { getattr } for pid=23436 comm="updatedb" name="mdadm" dev=dm-0 ino=14437081 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mdadm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.485:1856): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1659 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.485:1856): path="/var/run/mdadm" type=AVC msg=audit(1162976833.505:1857): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607588 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:innd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.505:1857): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13cd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.505:1857): path="/var/run/news" type=AVC msg=audit(1162976833.509:1858): avc: denied { getattr } for pid=23436 comm="updatedb" name="ppp" dev=dm-0 ino=14437042 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pppd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.509:1858): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1679 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.509:1858): path="/var/run/ppp" type=AVC msg=audit(1162976833.513:1859): avc: denied { getattr } for pid=23436 comm="updatedb" name="saslauthd" dev=dm-0 ino=14437072 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:saslauthd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.513:1859): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1611 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.513:1859): path="/var/run/saslauthd" type=AVC msg=audit(1162976833.513:1860): avc: denied { getattr } for pid=23436 comm="updatedb" name="setroubleshoot" dev=dm-0 ino=14469478 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:setroubleshoot_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.513:1860): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13a5 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.513:1860): path="/var/run/setroubleshoot" type=AVC msg=audit(1162976833.517:1861): avc: denied { getattr } for pid=23436 comm="updatedb" name="sudo" dev=dm-0 ino=14437043 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1861): arch=40000003 syscall=196 success=yes exit=0 a0=8ff15b9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.517:1861): path="/var/run/sudo" type=AVC msg=audit(1162976833.517:1862): avc: denied { search } for pid=23436 comm="updatedb" name="sudo" dev=dm-0 ino=14437043 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1862): arch=40000003 syscall=12 success=yes exit=0 a0=8ff15b9 a1=bfbaf904 a2=bfbb1bb0 a3=8ff15b9 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.517:1863): avc: denied { getattr } for pid=23436 comm="updatedb" name="kmacmill" dev=dm-0 ino=14437414 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1863): arch=40000003 syscall=196 success=yes exit=0 a0=8ff171d a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.517:1863): path="/var/run/sudo/kmacmill" type=AVC msg=audit(1162976833.517:1864): avc: denied { search } for pid=23436 comm="updatedb" name="sudo" dev=dm-0 ino=14437043 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_run_t:s0 tclass=dir type=AVC msg=audit(1162976833.517:1864): avc: denied { getattr } for pid=23436 comm="updatedb" name="root" dev=dm-0 ino=14534873 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:pam_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.517:1864): arch=40000003 syscall=196 success=yes exit=0 a0=8ff172d a1=bfbad734 a2=239ff4 a3=bfbad734 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.517:1864): path="/var/run/sudo/root" type=AVC msg=audit(1162976833.545:1865): avc: denied { getattr } for pid=23436 comm="updatedb" name="xend" dev=dm-0 ino=14534871 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.545:1865): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13e9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.545:1865): path="/var/run/xend" type=AVC msg=audit(1162976833.557:1866): avc: denied { getattr } for pid=23436 comm="updatedb" name="xenstored" dev=dm-0 ino=14534835 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xenstored_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.557:1866): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1569 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.557:1866): path="/var/run/xenstored" type=AVC msg=audit(1162976833.581:1867): avc: denied { getattr } for pid=23436 comm="updatedb" name="clientmqueue" dev=dm-0 ino=14437075 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1867): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13ad a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.581:1867): path="/var/spool/clientmqueue" type=AVC msg=audit(1162976833.581:1868): avc: denied { search } for pid=23436 comm="updatedb" name="clientmqueue" dev=dm-0 ino=14437075 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1868): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13ad a1=bfbaf904 a2=bfbb1bb0 a3=8ff13ad items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.581:1869): avc: denied { read } for pid=23436 comm="updatedb" name="clientmqueue" dev=dm-0 ino=14437075 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1869): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=18800 a2=bfbaf7cc a3=8ff6248 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.581:1870): avc: denied { getattr } for pid=23436 comm="updatedb" name="lpd" dev=dm-0 ino=14436618 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1870): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13d9 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.581:1870): path="/var/spool/lpd" type=AVC msg=audit(1162976833.581:1871): avc: denied { getattr } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607589 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1871): arch=40000003 syscall=196 success=yes exit=0 a0=8ff13fd a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.581:1871): path="/var/spool/news" type=AVC msg=audit(1162976833.581:1872): avc: denied { search } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607589 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.581:1872): arch=40000003 syscall=12 success=yes exit=0 a0=8ff13fd a1=bfbaf904 a2=bfbb1bb0 a3=8ff13fd items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.605:1873): avc: denied { read } for pid=23436 comm="updatedb" name="news" dev=dm-0 ino=14607589 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.605:1873): arch=40000003 syscall=5 success=yes exit=9 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.605:1874): avc: denied { getattr } for pid=23436 comm="updatedb" name="c" dev=dm-0 ino=14607609 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.605:1874): arch=40000003 syscall=196 success=yes exit=0 a0=8ff14a5 a1=bfbab564 a2=239ff4 a3=bfbab564 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.605:1874): path="/var/spool/news/overview/c" type=AVC msg=audit(1162976833.605:1875): avc: denied { search } for pid=23436 comm="updatedb" name="c" dev=dm-0 ino=14607609 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:news_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.605:1875): arch=40000003 syscall=12 success=yes exit=0 a0=8ff14a5 a1=8000 a2=bfbad810 a3=8ff14a5 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.621:1876): avc: denied { search } for pid=23436 comm="updatedb" name="www" dev=dm-0 ino=14436677 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.621:1876): arch=40000003 syscall=12 success=yes exit=0 a0=8ff1375 a1=bfbb1ad4 a2=bfbb3d80 a3=8ff1375 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.621:1877): avc: denied { getattr } for pid=23436 comm="updatedb" name="cgi-bin" dev=dm-0 ino=14436678 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_script_exec_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.621:1877): arch=40000003 syscall=196 success=yes exit=0 a0=8ff1395 a1=bfbaf904 a2=239ff4 a3=bfbaf904 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.621:1877): path="/var/www/cgi-bin" type=AVC msg=audit(1162976833.641:1878): avc: denied { read } for pid=23436 comm="updatedb" name="www" dev=dm-0 ino=14436677 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.641:1878): arch=40000003 syscall=5 success=yes exit=8 a0=804dc02 a1=8000 a2=0 a3=8000 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.685:1879): avc: denied { getattr } for pid=23436 comm="updatedb" name="yp" dev=dm-0 ino=14436620 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_yp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976833.685:1879): arch=40000003 syscall=196 success=yes exit=0 a0=8ff138d a1=bfbb1ad4 a2=239ff4 a3=bfbb1ad4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.685:1879): path="/var/yp" type=AVC msg=audit(1162976833.713:1880): avc: denied { setattr } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.713:1880): arch=40000003 syscall=212 success=yes exit=0 a0=8ff0fa0 a1=ffffffff a2=15 a3=23b8f4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.713:1881): avc: denied { fsetid } for pid=23436 comm="updatedb" capability=4 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1162976833.713:1881): arch=40000003 syscall=15 success=yes exit=0 a0=8ff0fa0 a1=1a0 a2=804f699 a3=23b8f4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.713:1882): avc: denied { remove_name } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976833.713:1882): avc: denied { rename } for pid=23436 comm="updatedb" name="mlocate.db.DwVvuL" dev=dm-0 ino=14437015 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=AVC msg=audit(1162976833.713:1882): avc: denied { unlink } for pid=23436 comm="updatedb" name="mlocate.db" dev=dm-0 ino=14438247 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locate_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.713:1882): arch=40000003 syscall=38 success=yes exit=0 a0=8ff0fa0 a1=804d345 a2=804f699 a3=23b8f4 items=0 ppid=23431 pid=23436 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="updatedb" exe="/usr/bin/updatedb" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1883): avc: denied { execute } for pid=22863 comm="run-parts" name="prelink" dev=dm-0 ino=9330616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1883): arch=40000003 syscall=33 success=yes exit=0 a0=94a18b0 a1=1 a2=1 a3=94a1c30 items=0 ppid=22862 pid=22863 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1884): avc: denied { getattr } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1884): arch=40000003 syscall=195 success=yes exit=0 a0=94a23b8 a1=bf9d8330 a2=239ff4 a3=94a23b8 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.725:1884): path="/bin/gawk" type=AVC msg=audit(1162976833.725:1885): avc: denied { execute } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1885): arch=40000003 syscall=33 success=yes exit=0 a0=94a23b8 a1=1 a2=11 a3=94a23b8 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1886): avc: denied { read } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1886): arch=40000003 syscall=33 success=yes exit=0 a0=94a23b8 a1=4 a2=ffffffff a3=94a23b8 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.725:1887): avc: denied { execute_no_trans } for pid=23442 comm="run-parts" name="gawk" dev=dm-0 ino=13683707 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1162976833.725:1888): avc: denied { execute_no_trans } for pid=23441 comm="run-parts" name="prelink" dev=dm-0 ino=9330616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.725:1887): arch=40000003 syscall=11 success=yes exit=0 a0=94a23b8 a1=94a1d40 a2=94a2098 a3=94a1be0 items=0 ppid=22863 pid=23442 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="awk" exe="/bin/gawk" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.725:1887): path="/bin/gawk" type=SYSCALL msg=audit(1162976833.725:1888): arch=40000003 syscall=11 success=yes exit=0 a0=94a18f0 a1=94a2238 a2=94a2098 a3=94a0838 items=0 ppid=22863 pid=23441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.725:1888): path="/etc/cron.daily/prelink" type=AVC msg=audit(1162976833.757:1889): avc: denied { getattr } for pid=23441 comm="prelink" name="prelink.cache" dev=dm-0 ino=9330746 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:prelink_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.757:1889): arch=40000003 syscall=195 success=yes exit=0 a0=95fc7d0 a1=bfe51338 a2=239ff4 a3=95fc880 items=0 ppid=22863 pid=23441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.757:1889): path="/etc/prelink.cache" type=AVC msg=audit(1162976833.777:1890): avc: denied { read } for pid=23444 comm="grep" name="prelink.cache" dev=dm-0 ino=9330746 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:prelink_cache_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.777:1890): arch=40000003 syscall=5 success=yes exit=3 a0=bfeedf68 a1=8000 a2=0 a3=8000 items=0 ppid=23441 pid=23444 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="grep" exe="/bin/grep" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976833.889:1891): avc: denied { getattr } for pid=23446 comm="find" name="prelink.full" dev=dm-0 ino=14437327 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.889:1891): arch=40000003 syscall=196 success=yes exit=0 a0=bf898f5b a1=bf896b48 a2=2e8ff4 a3=bf898f5b items=0 ppid=23445 pid=23446 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="find" exe="/usr/bin/find" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.889:1891): path="/var/lib/misc/prelink.full" type=AVC msg=audit(1162976833.909:1892): avc: denied { search } for pid=23441 comm="prelink" name="rpm" dev=dm-0 ino=14436579 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=dir type=AVC msg=audit(1162976833.909:1892): avc: denied { getattr } for pid=23441 comm="prelink" name="Packages" dev=dm-0 ino=14437071 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.909:1892): arch=40000003 syscall=195 success=yes exit=0 a0=95fc9a8 a1=bfe50de8 a2=239ff4 a3=95fcc50 items=0 ppid=22863 pid=23441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="prelink" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.909:1892): path="/var/lib/rpm/Packages" type=AVC msg=audit(1162976833.909:1893): avc: denied { execute } for pid=23451 comm="rpm" name="rpm" dev=dm-0 ino=13683834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=AVC msg=audit(1162976833.909:1893): avc: denied { execute_no_trans } for pid=23451 comm="rpm" name="rpm" dev=dm-0 ino=13683834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=AVC msg=audit(1162976833.909:1893): avc: denied { read } for pid=23451 comm="rpm" name="rpm" dev=dm-0 ino=13683834 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162976833.909:1893): arch=40000003 syscall=11 success=yes exit=0 a0=986a9a8 a1=986aa08 a2=986a720 a3=986a598 items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpm" exe="/bin/rpm" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976833.909:1893): path="/bin/rpm" type=AVC_PATH msg=audit(1162976833.909:1893): path="/bin/rpm" type=AVC msg=audit(1162976834.145:1894): avc: denied { write } for pid=23451 comm="rpmq" name="rpm" dev=dm-0 ino=14436579 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1162976834.145:1894): arch=40000003 syscall=33 success=yes exit=0 a0=8c24810 a1=2 a2=9deb44 a3=0 items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpmq" exe="/usr/lib/rpm/rpmq" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976834.149:1895): avc: denied { read write } for pid=23451 comm="rpmq" name="__db.001" dev=dm-0 ino=14436585 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976834.149:1895): arch=40000003 syscall=5 success=yes exit=3 a0=8c24b50 a1=8002 a2=0 a3=8002 items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpmq" exe="/usr/lib/rpm/rpmq" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976834.149:1896): avc: denied { lock } for pid=23451 comm="rpmq" name="Packages" dev=dm-0 ino=14437071 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1162976834.149:1896): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=d a2=bfb2a58c a3=bfb2a58c items=0 ppid=23449 pid=23451 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rpmq" exe="/usr/lib/rpm/rpmq" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976834.149:1896): path="/var/lib/rpm/Packages" type=AVC msg=audit(1162976851.122:1897): avc: denied { getattr } for pid=23456 comm="tmpwatch" name="ls-R" dev=dm-0 ino=14731502 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.122:1897): arch=40000003 syscall=196 success=yes exit=0 a0=949304f a1=bfc98630 a2=34eff4 a3=0 items=0 ppid=23454 pid=23456 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.122:1897): path="/var/lib/texmf/ls-R" type=AVC msg=audit(1162976851.150:1898): avc: denied { setattr } for pid=23456 comm="tmpwatch" name="ec" dev=dm-0 ino=14731255 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tetex_data_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.150:1898): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfc98300 a2=0 a3=0 items=0 ppid=23454 pid=23456 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.174:1899): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".X11-unix" dev=dm-0 ino=14567593 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.174:1899): arch=40000003 syscall=196 success=yes exit=0 a0=bfb4a7a7 a1=bfb4a6f8 a2=239ff4 a3=bfb4bf0c items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1899): path="/tmp/.X11-unix" type=AVC msg=audit(1162976851.174:1900): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".font-unix" dev=dm-0 ino=14567591 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xfs_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.174:1900): arch=40000003 syscall=196 success=yes exit=0 a0=bfb4a7a7 a1=bfb4a6f8 a2=239ff4 a3=bfb4bf30 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1900): path="/tmp/.font-unix" type=AVC msg=audit(1162976851.174:1901): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.174:1901): arch=40000003 syscall=196 success=yes exit=0 a0=bfb4a7a7 a1=bfb4a6f8 a2=239ff4 a3=bfb4bf43 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1901): path="/tmp/.ICE-unix" type=AVC msg=audit(1162976851.174:1902): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="mapping-kmacmill" dev=dm-0 ino=14469334 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162976851.174:1902): arch=40000003 syscall=196 success=yes exit=0 a0=9ce415f a1=bfb4b740 a2=239ff4 a3=9ce4058 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1902): path="/tmp/mapping-kmacmill" type=AVC msg=audit(1162976851.174:1903): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="sealert.log" dev=dm-0 ino=14469458 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.174:1903): arch=40000003 syscall=196 success=yes exit=0 a0=9ce4187 a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.174:1903): path="/tmp/sealert.log" type=AVC msg=audit(1162976851.178:1904): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".gdm_socket" dev=dm-0 ino=14469317 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162976851.178:1904): arch=40000003 syscall=196 success=yes exit=0 a0=9ce41a7 a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.178:1904): path="/tmp/.gdm_socket" type=AVC msg=audit(1162976851.178:1905): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.178:1905): arch=40000003 syscall=196 success=yes exit=0 a0=9ce41c7 a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.178:1905): path="/tmp/gconfd-kmacmill" type=AVC msg=audit(1162976851.178:1906): avc: denied { search } for pid=23459 comm="tmpwatch" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.178:1906): arch=40000003 syscall=12 success=yes exit=0 a0=9ce41c7 a1=bfb4b4e8 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.178:1907): avc: denied { read } for pid=23459 comm="tmpwatch" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.178:1907): arch=40000003 syscall=5 success=yes exit=6 a0=804abea a1=18800 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.218:1908): avc: denied { setattr } for pid=23459 comm="tmpwatch" name="lock" dev=dm-0 ino=15648168 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1162976851.218:1908): avc: denied { fowner } for pid=23459 comm="tmpwatch" capability=3 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1162976851.218:1908): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfb4b540 a2=0 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.218:1909): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.218:1909): arch=40000003 syscall=196 success=yes exit=0 a0=9ce422f a1=bfb4b740 a2=239ff4 a3=9ce4080 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.218:1909): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162976851.218:1910): avc: denied { getattr } for pid=23459 comm="tmpwatch" name=".X0-lock" dev=dm-0 ino=14469318 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_xserver_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.218:1910): arch=40000003 syscall=196 success=yes exit=0 a0=9ce424f a1=bfb4b740 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.218:1910): path="/tmp/.X0-lock" type=AVC msg=audit(1162976851.238:1911): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="Fortress-WP.pdf" dev=dm-0 ino=14469396 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.238:1911): arch=40000003 syscall=196 success=yes exit=0 a0=9ce4287 a1=bfb4b740 a2=239ff4 a3=9ce5178 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.238:1911): path="/tmp/Fortress-WP.pdf" type=AVC msg=audit(1162976851.238:1912): avc: denied { rmdir } for pid=23459 comm="tmpwatch" name="orbit-kmacmill" dev=dm-0 ino=14567713 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.238:1912): arch=40000003 syscall=40 success=no exit=-39 a0=9ce42af a1=9ce40d0 a2=bfb4b780 a3=9ce5158 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.246:1913): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.246:1913): arch=40000003 syscall=196 success=yes exit=0 a0=9ce42ff a1=bfb4b740 a2=239ff4 a3=9ce5178 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.246:1913): path="/tmp/ssh-OhlJzg2965" type=AVC msg=audit(1162976851.246:1914): avc: denied { search } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.246:1914): arch=40000003 syscall=12 success=yes exit=0 a0=9ce42ff a1=bfb4b4e8 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.246:1915): avc: denied { read } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.246:1915): arch=40000003 syscall=5 success=yes exit=6 a0=804abea a1=18800 a2=fd00 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.250:1916): avc: denied { getattr } for pid=23459 comm="tmpwatch" name="agent.2965" dev=dm-0 ino=14567712 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162976851.250:1916): arch=40000003 syscall=196 success=yes exit=0 a0=9ce57af a1=bfb4b610 a2=239ff4 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.250:1916): path="/tmp/ssh-OhlJzg2965/agent.2965" type=AVC msg=audit(1162976851.250:1917): avc: denied { setattr } for pid=23459 comm="tmpwatch" name="ssh-OhlJzg2965" dev=dm-0 ino=14567711 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_ssh_agent_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.250:1917): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfb4b670 a2=0 a3=0 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.258:1918): avc: denied { setattr } for pid=23459 comm="tmpwatch" name="tmp" dev=dm-0 ino=14469313 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.258:1918): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfb4b7a0 a2=0 a3=9ce5190 items=0 ppid=23457 pid=23459 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.274:1919): avc: denied { setattr } for pid=23460 comm="tmpwatch" name="favicons" dev=dm-0 ino=14699100 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.274:1919): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfa87500 a2=0 a3=0 items=0 ppid=23457 pid=23460 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162976851.274:1920): avc: denied { getattr } for pid=23460 comm="tmpwatch" name="ksycocastamp" dev=dm-0 ino=14469416 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=user_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162976851.274:1920): arch=40000003 syscall=196 success=yes exit=0 a0=84df6d7 a1=bfa875d0 a2=292ff4 a3=84df0b0 items=0 ppid=23457 pid=23460 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162976851.274:1920): path="/var/tmp/kdecache-kmacmill/ksycocastamp" type=AVC msg=audit(1162976851.538:1921): avc: denied { setattr } for pid=23461 comm="tmpwatch" name="cat1" dev=dm-0 ino=14436644 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1162976851.538:1921): arch=40000003 syscall=30 success=yes exit=0 a0=804abea a1=bfc9f960 a2=0 a3=0 items=0 ppid=23457 pid=23461 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="tmpwatch" exe="/usr/sbin/tmpwatch" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162976851.570:1922): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162976851.570:1923): user pid=22862 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162977001.591:1924): user pid=23495 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162977001.591:1925): login pid=23495 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162977001.591:1926): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162977001.591:1927): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162977001.595:1928): avc: denied { execute } for pid=23496 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162977001.595:1928): avc: denied { execute_no_trans } for pid=23496 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.595:1928): arch=40000003 syscall=11 success=yes exit=0 a0=89241b0 a1=8924358 a2=8924290 a3=8924008 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162977001.595:1928): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162977001.599:1929): avc: denied { search } for pid=23496 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162977001.599:1929): avc: denied { read } for pid=23496 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1929): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9c46800 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162977001.599:1930): avc: denied { getattr } for pid=23496 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1930): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8799a8 a2=278ff4 a3=9c46800 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162977001.599:1930): path="/proc/net/dev" type=AVC msg=audit(1162977001.599:1931): avc: denied { read } for pid=23496 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1931): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9c46d60 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162977001.599:1932): avc: denied { getattr } for pid=23496 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162977001.599:1932): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf879804 a2=278ff4 a3=9c46d60 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162977001.599:1932): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162977001.599:1933): avc: denied { search } for pid=23496 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162977001.599:1933): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9c46d60 items=0 ppid=23495 pid=23496 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162977001.623:1934): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162977001.623:1935): user pid=23495 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162977601.689:1936): user pid=23513 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162977601.689:1937): login pid=23513 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162977601.689:1938): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162977601.689:1939): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162977601.701:1940): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162977601.701:1941): user pid=23513 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162978201.754:1942): user pid=23533 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162978201.754:1943): login pid=23533 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162978201.754:1944): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162978201.754:1945): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162978201.770:1946): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162978201.770:1947): user pid=23533 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162978801.836:1948): user pid=23551 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162978801.836:1949): login pid=23551 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162978801.836:1950): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162978801.836:1951): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162978801.840:1952): avc: denied { execute } for pid=23552 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162978801.840:1952): avc: denied { execute_no_trans } for pid=23552 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162978801.840:1952): avc: denied { read } for pid=23552 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162978801.840:1952): arch=40000003 syscall=11 success=yes exit=0 a0=90d1d48 a1=90d1740 a2=90d1d60 a3=90d1740 items=0 ppid=23551 pid=23552 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162978801.840:1952): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162978801.840:1952): path="/usr/lib/sa/sadc" type=CRED_DISP msg=audit(1162978801.876:1953): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162978801.876:1954): user pid=23551 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162979401.933:1955): user pid=23569 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162979401.933:1956): login pid=23569 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162979401.937:1957): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162979401.937:1958): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162979401.949:1959): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162979401.949:1960): user pid=23569 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162980001.018:1961): user pid=23587 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162980001.018:1962): login pid=23587 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162980001.018:1963): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162980001.018:1964): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162980001.030:1965): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162980001.030:1966): user pid=23587 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162980061.046:1967): user pid=23590 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162980061.046:1968): login pid=23590 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162980061.046:1969): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162980061.046:1970): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162980061.050:1971): avc: denied { ioctl } for pid=23591 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1162980061.050:1971): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfe5b938 a3=bfe5b978 items=0 ppid=23590 pid=23591 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162980061.050:1971): path="/usr/bin/run-parts" type=AVC msg=audit(1162980061.054:1972): avc: denied { execute } for pid=23594 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162980061.054:1972): avc: denied { execute_no_trans } for pid=23594 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162980061.054:1972): avc: denied { read } for pid=23594 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162980061.054:1972): arch=40000003 syscall=11 success=yes exit=0 a0=9765678 a1=9765808 a2=9765720 a3=9765508 items=0 ppid=23592 pid=23594 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162980061.054:1972): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162980061.054:1972): path="/sbin/chkconfig" type=CRED_DISP msg=audit(1162980061.066:1973): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162980061.066:1974): user pid=23590 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162980601.120:1975): user pid=23615 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162980601.120:1976): login pid=23615 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162980601.124:1977): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162980601.124:1978): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162980601.136:1979): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162980601.136:1980): user pid=23615 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162981201.205:1981): user pid=23633 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162981201.205:1982): login pid=23633 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162981201.205:1983): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162981201.205:1984): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162981201.221:1985): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162981201.221:1986): user pid=23633 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162981801.291:1987): user pid=23653 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162981801.291:1988): login pid=23653 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162981801.291:1989): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162981801.291:1990): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162981801.303:1991): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162981801.303:1992): user pid=23653 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162982401.364:1993): user pid=23676 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162982401.364:1994): login pid=23676 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162982401.364:1995): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162982401.364:1996): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162982401.372:1997): avc: denied { read append } for pid=23677 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162982401.372:1997): arch=40000003 syscall=5 success=yes exit=3 a0=bfa55f24 a1=402 a2=bfa560e8 a3=bfa55e20 items=0 ppid=23676 pid=23677 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162982401.372:1998): avc: denied { lock } for pid=23677 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162982401.372:1998): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfa55e20 a3=3 items=0 ppid=23676 pid=23677 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162982401.372:1998): path="/var/log/sa/sa08" type=CRED_DISP msg=audit(1162982401.396:1999): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162982401.396:2000): user pid=23676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162983001.462:2001): user pid=23694 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162983001.462:2002): login pid=23694 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162983001.462:2003): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162983001.462:2004): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162983001.474:2005): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162983001.474:2006): user pid=23694 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162983601.531:2007): user pid=23712 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162983601.531:2008): login pid=23712 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162983601.531:2009): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162983601.531:2010): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162983601.547:2011): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162983601.547:2012): user pid=23712 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162983661.559:2013): user pid=23715 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162983661.559:2014): login pid=23715 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162983661.559:2015): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162983661.559:2016): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162983661.579:2017): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162983661.579:2018): user pid=23715 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162984201.641:2019): user pid=23740 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162984201.641:2020): login pid=23740 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162984201.641:2021): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162984201.641:2022): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162984201.669:2023): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162984201.669:2024): user pid=23740 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162984801.726:2025): user pid=23758 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162984801.726:2026): login pid=23758 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162984801.730:2027): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162984801.730:2028): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162984801.746:2029): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162984801.746:2030): user pid=23758 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162985401.812:2031): user pid=23778 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162985401.812:2032): login pid=23778 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162985401.812:2033): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162985401.812:2034): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162985401.824:2035): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162985401.828:2036): user pid=23778 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162986001.889:2037): user pid=23796 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162986001.893:2038): login pid=23796 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162986001.893:2039): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162986001.893:2040): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162986001.905:2041): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162986001.905:2042): user pid=23796 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162986601.975:2043): user pid=23814 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162986601.975:2044): login pid=23814 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162986601.975:2045): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162986601.975:2046): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162986602.023:2047): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162986602.023:2048): user pid=23814 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162987201.096:2049): user pid=23832 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162987201.096:2050): login pid=23832 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162987201.096:2051): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162987201.096:2052): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162987201.108:2053): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162987201.112:2054): user pid=23832 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162987261.120:2055): user pid=23835 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162987261.124:2056): login pid=23835 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162987261.124:2057): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162987261.124:2058): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162987261.140:2059): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162987261.140:2060): user pid=23835 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162987801.198:2061): user pid=23860 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162987801.198:2062): login pid=23860 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162987801.198:2063): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162987801.198:2064): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162987801.214:2065): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162987801.214:2066): user pid=23860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162988401.283:2067): user pid=23878 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162988401.283:2068): login pid=23878 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162988401.283:2069): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162988401.283:2070): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162988401.303:2071): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162988401.303:2072): user pid=23878 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162989001.365:2073): user pid=23898 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162989001.365:2074): login pid=23898 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162989001.365:2075): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162989001.365:2076): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162989001.381:2077): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162989001.381:2078): user pid=23898 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162989601.454:2079): user pid=23916 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162989601.454:2080): login pid=23916 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162989601.454:2081): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162989601.454:2082): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162989601.478:2083): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162989601.478:2084): user pid=23916 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162990201.536:2085): user pid=23934 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162990201.536:2086): login pid=23934 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162990201.540:2087): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162990201.540:2088): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162990201.552:2089): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162990201.552:2090): user pid=23934 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162990801.613:2091): user pid=23952 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162990801.613:2092): login pid=23952 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162990801.613:2093): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162990801.613:2094): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162990801.625:2095): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162990801.625:2096): user pid=23952 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162990861.641:2097): user pid=23955 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162990861.641:2098): login pid=23955 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162990861.641:2099): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162990861.641:2100): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162990861.661:2101): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162990861.661:2102): user pid=23955 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162991401.715:2103): user pid=23980 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162991401.719:2104): login pid=23980 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162991401.719:2105): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162991401.719:2106): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162991401.735:2107): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162991401.735:2108): user pid=23980 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162992001.804:2109): user pid=23998 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162992001.804:2110): login pid=23998 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162992001.804:2111): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162992001.804:2112): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162992001.820:2113): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162992001.820:2114): user pid=23998 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162992601.890:2115): user pid=24018 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162992601.890:2116): login pid=24018 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162992601.890:2117): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162992601.890:2118): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162992601.902:2119): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162992601.902:2120): user pid=24018 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162993201.963:2121): user pid=24036 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162993201.963:2122): login pid=24036 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162993201.963:2123): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162993201.963:2124): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162993201.979:2125): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162993201.979:2126): user pid=24036 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162993801.053:2127): user pid=24054 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162993801.053:2128): login pid=24054 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162993801.053:2129): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162993801.053:2130): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162993801.065:2131): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162993801.065:2132): user pid=24054 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162994401.130:2133): user pid=24072 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162994401.130:2134): login pid=24072 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162994401.130:2135): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162994401.130:2136): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162994401.142:2137): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162994401.142:2138): user pid=24072 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162994461.154:2139): user pid=24075 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162994461.154:2140): login pid=24075 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162994461.154:2141): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162994461.158:2142): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162994461.174:2143): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162994461.174:2144): user pid=24075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162994955.017:2145): avc: denied { read } for pid=24099 comm="nm-vpnc-auth-di" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994955.017:2145): arch=40000003 syscall=33 success=yes exit=0 a0=bfedde46 a1=4 a2=de7a64 a3=bfedde46 items=0 ppid=3098 pid=24099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994955.161:2146): avc: denied { write } for pid=24099 comm="nm-vpnc-auth-di" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162994955.161:2146): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfedc6a0 a2=39b770 a3=15 items=0 ppid=3098 pid=24099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994957.397:2147): avc: denied { read write } for pid=24121 comm="notification-da" name="[11958]" dev=sockfs ino=11958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1162994957.397:2147): arch=40000003 syscall=11 success=yes exit=0 a0=8eeae78 a1=8ef9188 a2=8eee770 a3=14 items=0 ppid=24120 pid=24121 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="notification-da" exe="/usr/libexec/notification-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162994957.397:2147): path="socket:[11958]" type=AVC msg=audit(1162994957.481:2148): avc: denied { read } for pid=24121 comm="notification-da" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994957.481:2148): arch=40000003 syscall=33 success=yes exit=0 a0=bfce6e98 a1=4 a2=de7a64 a3=bfce6e98 items=0 ppid=24120 pid=24121 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="notification-da" exe="/usr/libexec/notification-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994960.305:2149): avc: denied { read } for pid=24124 comm="xchat" name="resolv.conf" dev=dm-0 ino=9334542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1162994960.305:2149): arch=40000003 syscall=5 success=yes exit=9 a0=221d13 a1=0 a2=1b6 a3=8737c68 items=0 ppid=24123 pid=24124 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xchat" exe="/usr/bin/xchat" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162994962.137:2150): avc: denied { search } for pid=24127 comm="evolution" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1162994962.137:2150): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfcb0af8 a2=239ff4 a3=3 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.141:2151): avc: denied { read } for pid=24127 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.141:2151): arch=40000003 syscall=33 success=yes exit=0 a0=bfcb2dff a1=4 a2=de7a64 a3=bfcb2dff items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.141:2152): avc: denied { getattr } for pid=24127 comm="evolution" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.141:2152): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfcb0a2c a2=239ff4 a3=8796730 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162994962.141:2152): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162994962.149:2153): avc: denied { search } for pid=24127 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1162994962.149:2153): avc: denied { write } for pid=24127 comm="evolution" name="2965" dev=dm-0 ino=14567716 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1162994962.149:2153): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcb0b30 a2=39b770 a3=15 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.149:2154): avc: denied { read } for pid=24127 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.149:2154): arch=40000003 syscall=33 success=yes exit=0 a0=87ac218 a1=4 a2=39b770 a3=87ac218 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994962.149:2155): avc: denied { getattr } for pid=24127 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6570930 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:object_r:staff_iceauth_home_t:s0 tclass=file type=SYSCALL msg=audit(1162994962.149:2155): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfcb0bcc a2=239ff4 a3=87acaf8 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162994962.149:2155): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1162994963.042:2156): avc: denied { sigkill } for pid=24127 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=process type=SYSCALL msg=audit(1162994963.042:2156): arch=40000003 syscall=37 success=yes exit=0 a0=5e41 a1=9 a2=4b077b8 a3=5e41 items=0 ppid=1 pid=24127 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_AVC msg=audit(1162994964.146:2157): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=24127 tpid=2771 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:system_r:NetworkManager_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1162994964.146:2158): user pid=2324 uid=81 auid=4294967295 subj=system_u:system_r:system_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.34 spid=2771 tpid=24127 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1162994964.190:2159): avc: denied { create } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2159): arch=40000003 syscall=102 success=yes exit=35 a0=1 a1=b219f274 a2=239ff4 a3=5d56d7f items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2160): avc: denied { bind } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2160): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b219f274 a2=239ff4 a3=23 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2161): avc: denied { getattr } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2161): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b219f274 a2=239ff4 a3=23 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2162): avc: denied { write } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1162994964.190:2162): avc: denied { nlmsg_read } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2162): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b219e1b4 a2=239ff4 a3=0 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162994964.190:2163): avc: denied { read } for pid=24135 comm="evolution" scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=staff_u:staff_r:staff_evolution_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1162994964.190:2163): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b219e1b4 a2=239ff4 a3=0 items=0 ppid=1 pid=24135 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=USER_ACCT msg=audit(1162995001.236:2164): user pid=24158 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162995001.236:2165): login pid=24158 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162995001.236:2166): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162995001.236:2167): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995001.240:2168): avc: denied { execute } for pid=24159 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1162995001.240:2168): avc: denied { execute_no_trans } for pid=24159 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.240:2168): arch=40000003 syscall=11 success=yes exit=0 a0=8ecb1b0 a1=8ecb358 a2=8ecb290 a3=8ecb008 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995001.240:2168): path="/usr/lib/sa/sa1" type=AVC msg=audit(1162995001.244:2169): avc: denied { search } for pid=24159 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1162995001.244:2169): avc: denied { read } for pid=24159 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2169): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8e26800 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995001.244:2170): avc: denied { getattr } for pid=24159 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2170): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff14838 a2=239ff4 a3=8e26800 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995001.244:2170): path="/proc/net/dev" type=AVC msg=audit(1162995001.244:2171): avc: denied { search } for pid=24159 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1162995001.244:2171): avc: denied { read } for pid=24159 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2171): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8e26df0 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995001.244:2172): avc: denied { getattr } for pid=24159 comm="sadc" name="dentry-state" dev=proc ino=-268435227 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162995001.244:2172): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff14694 a2=239ff4 a3=8e26df0 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995001.244:2172): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1162995001.244:2173): avc: denied { search } for pid=24159 comm="sadc" name="rpc" dev=proc ino=-268434552 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1162995001.244:2173): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8e26df0 items=0 ppid=24158 pid=24159 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162995001.256:2174): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162995001.256:2175): user pid=24158 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995036.438:2176): avc: denied { read } for pid=24173 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.438:2176): arch=40000003 syscall=33 success=yes exit=0 a0=bfb9af92 a1=4 a2=de7a64 a3=bfb9af92 items=0 ppid=24172 pid=24173 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC msg=audit(1162995036.438:2177): avc: denied { getattr } for pid=24173 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.438:2177): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb993dc a2=239ff4 a3=8769ab0 items=0 ppid=24172 pid=24173 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162995036.438:2177): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162995036.470:2178): avc: denied { execute } for pid=24170 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162995036.470:2178): avc: denied { execute_no_trans } for pid=24170 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1162995036.470:2178): avc: denied { read } for pid=24170 comm="firefox" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.470:2178): arch=40000003 syscall=11 success=yes exit=0 a0=8cf48b8 a1=8cf6920 a2=8cf7118 a3=8cf6920 items=0 ppid=1 pid=24170 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162995036.470:2178): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1162995036.470:2178): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162995036.570:2179): avc: denied { getattr } for pid=24170 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=13552825 scontext=staff_u:staff_r:staff_evolution_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162995036.570:2179): arch=40000003 syscall=196 success=yes exit=0 a0=bfd04428 a1=bfd03f1c a2=239ff4 a3=bfd05a05 items=0 ppid=1 pid=24170 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_evolution_t:s0 key=(null) type=AVC_PATH msg=audit(1162995036.570:2179): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1162995043.603:2180): avc: denied { read } for pid=24178 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995043.603:2180): arch=40000003 syscall=33 success=yes exit=0 a0=bfcf0fcb a1=4 a2=de7a64 a3=bfcf0fcb items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162995043.603:2181): avc: denied { getattr } for pid=24178 comm="firefox-bin" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995043.603:2181): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfcef08c a2=239ff4 a3=84c2140 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162995043.603:2181): path="/tmp/.gdmF70UIT" type=AVC msg=audit(1162995146.313:2182): avc: denied { getattr } for pid=24178 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162995146.313:2182): arch=40000003 syscall=196 success=yes exit=0 a0=bfcecc58 a1=bfcecbbc a2=239ff4 a3=982c840 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162995146.313:2182): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1162995147.313:2183): avc: denied { read } for pid=24178 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162995147.313:2183): arch=40000003 syscall=5 success=yes exit=52 a0=969da00 a1=0 a2=0 a3=969da00 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162995147.329:2184): avc: denied { execute } for pid=24178 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162995147.329:2184): arch=40000003 syscall=192 success=yes exit=26243072 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162995147.329:2184): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=USER_ACCT msg=audit(1162995601.325:2185): user pid=24285 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162995601.329:2186): login pid=24285 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162995601.329:2187): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162995601.329:2188): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995601.333:2189): avc: denied { execute } for pid=24286 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162995601.333:2189): avc: denied { execute_no_trans } for pid=24286 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1162995601.333:2189): avc: denied { read } for pid=24286 comm="sa1" name="sadc" dev=dm-0 ino=11981390 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162995601.333:2189): arch=40000003 syscall=11 success=yes exit=0 a0=9d1ed48 a1=9d1e740 a2=9d1ed60 a3=9d1e740 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995601.333:2189): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1162995601.333:2189): path="/usr/lib/sa/sadc" type=AVC msg=audit(1162995601.333:2190): avc: denied { search } for pid=24286 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1162995601.333:2190): arch=40000003 syscall=33 success=yes exit=0 a0=bf9b1684 a1=0 a2=bf9b1578 a3=bf9b1580 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995601.333:2191): avc: denied { read append } for pid=24286 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162995601.333:2191): arch=40000003 syscall=5 success=yes exit=3 a0=bf9b1684 a1=402 a2=bf9b1848 a3=bf9b1580 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162995601.333:2192): avc: denied { lock } for pid=24286 comm="sadc" name="sa08" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1162995601.333:2192): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf9b1580 a3=3 items=0 ppid=24285 pid=24286 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162995601.333:2192): path="/var/log/sa/sa08" type=CRED_DISP msg=audit(1162995601.393:2193): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162995601.393:2194): user pid=24285 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162995783.573:2195): avc: denied { search } for pid=24305 comm="gpg" name="home" dev=dm-0 ino=6547201 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1162995783.573:2195): avc: denied { search } for pid=24305 comm="gpg" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1162995783.573:2195): arch=40000003 syscall=33 success=no exit=-2 a0=9b409f8 a1=4 a2=ed4bbc a3=9b409c8 items=0 ppid=24127 pid=24305 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162995783.777:2196): avc: denied { search } for pid=24305 comm="gpg" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162995783.777:2196): avc: denied { read } for pid=24305 comm="gpg" name="evolution-pgp.BLRTIT" dev=dm-0 ino=14469397 scontext=staff_u:staff_r:staff_gpg_t:s0 tcontext=staff_u:object_r:staff_evolution_orbit_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162995783.777:2196): arch=40000003 syscall=5 success=yes exit=3 a0=bfcc8b1a a1=8000 a2=0 a3=8000 items=0 ppid=24127 pid=24305 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:staff_gpg_t:s0 key=(null) type=AVC msg=audit(1162996117.142:2197): avc: denied { execute } for pid=24178 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162996117.142:2197): arch=40000003 syscall=192 success=yes exit=68603904 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162996117.142:2197): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162996117.154:2198): avc: denied { execstack } for pid=24178 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1162996117.154:2198): avc: denied { execmem } for pid=24178 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1162996117.154:2198): arch=40000003 syscall=125 success=yes exit=0 a0=bfcef000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996117.198:2199): avc: denied { execmod } for pid=24178 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1162996117.198:2199): arch=40000003 syscall=125 success=yes exit=0 a0=416d000 a1=26f000 a2=5 a3=bfcec990 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162996117.198:2199): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1162996122.842:2200): avc: denied { search } for pid=24178 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162996122.842:2200): arch=40000003 syscall=54 success=yes exit=0 a0=43 a1=c0045002 a2=bfcef284 a3=a7b716c items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162996201.475:2201): user pid=24375 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162996201.475:2202): login pid=24375 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162996201.475:2203): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162996201.475:2204): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162996201.495:2205): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162996201.495:2206): user pid=24375 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162996346.912:2207): avc: denied { write } for pid=24178 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2207): avc: denied { add_name } for pid=24178 comm="firefox-bin" name="plugtmp" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2207): avc: denied { create } for pid=24178 comm="firefox-bin" name="plugtmp" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1162996346.912:2207): arch=40000003 syscall=39 success=yes exit=0 a0=aa846e8 a1=1c0 a2=6e44304 a3=1c0 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996346.912:2208): avc: denied { write } for pid=24178 comm="firefox-bin" name="plugtmp" dev=dm-0 ino=14796673 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2208): avc: denied { add_name } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996346.912:2208): avc: denied { create } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996346.912:2208): arch=40000003 syscall=5 success=yes exit=71 a0=9b981e0 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996346.912:2209): avc: denied { write } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996346.912:2209): arch=40000003 syscall=5 success=yes exit=71 a0=9b981e0 a1=8241 a2=180 a3=8241 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1162996358.917:2210): avc: denied { getattr } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996358.917:2210): arch=40000003 syscall=195 success=yes exit=0 a0=9b981e0 a1=bfcee7a0 a2=239ff4 a3=3 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1162996358.917:2210): path="/tmp/plugtmp/right.rail.exclude.html" type=AVC msg=audit(1162996358.917:2211): avc: denied { remove_name } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1162996358.917:2211): avc: denied { unlink } for pid=24178 comm="firefox-bin" name="right.rail.exclude.html" dev=dm-0 ino=14796674 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162996358.917:2211): arch=40000003 syscall=10 success=yes exit=0 a0=9b981e0 a1=0 a2=6e44304 a3=0 items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162996801.568:2212): user pid=24467 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162996801.568:2213): login pid=24467 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162996801.568:2214): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162996801.568:2215): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162996801.572:2216): avc: denied { search } for pid=24468 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1162996801.572:2216): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9666800 items=0 ppid=24467 pid=24468 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1162996801.580:2217): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162996801.584:2218): user pid=24467 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162997292.355:2219): avc: denied { read } for pid=24587 comm="mozilla-xremote" name=".gdmF70UIT" dev=dm-0 ino=14469320 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162997292.355:2219): arch=40000003 syscall=33 success=yes exit=0 a0=bfe5bf92 a1=4 a2=de7a64 a3=bfe5bf92 items=0 ppid=24586 pid=24587 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1162997401.650:2220): user pid=24603 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162997401.650:2221): login pid=24603 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162997401.650:2222): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162997401.650:2223): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1162997401.666:2224): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162997401.666:2225): user pid=24603 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162997573.365:2226): avc: denied { search } for pid=24178 comm="firefox-bin" name="4-1:1.1" dev=sysfs ino=972 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir type=SYSCALL msg=audit(1162997573.365:2226): arch=40000003 syscall=54 success=yes exit=0 a0=2c a1=c0045002 a2=bfcef284 a3=a7b716c items=0 ppid=1 pid=24178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1162998001.731:2227): user pid=24671 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162998001.731:2228): login pid=24671 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162998001.731:2229): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162998001.731:2230): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162998001.735:2231): avc: denied { read } for pid=24672 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162998001.735:2231): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=93d2800 items=0 ppid=24671 pid=24672 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162998001.735:2232): avc: denied { getattr } for pid=24672 comm="sadc" name="dev" dev=proc ino=-268435159 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1162998001.735:2232): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bffa50c8 a2=282ff4 a3=93d2800 items=0 ppid=24671 pid=24672 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162998001.735:2232): path="/proc/net/dev" type=CRED_DISP msg=audit(1162998001.747:2233): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162998001.747:2234): user pid=24671 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1162998061.751:2235): user pid=24676 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1162998061.755:2236): login pid=24676 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1162998061.755:2237): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1162998061.755:2238): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162998061.763:2239): avc: denied { execute } for pid=24680 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162998061.763:2239): avc: denied { execute_no_trans } for pid=24680 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1162998061.763:2239): avc: denied { read } for pid=24680 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984740 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1162998061.763:2239): arch=40000003 syscall=11 success=yes exit=0 a0=8d42678 a1=8d42808 a2=8d42720 a3=8d42508 items=0 ppid=24678 pid=24680 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162998061.763:2239): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1162998061.763:2239): path="/sbin/chkconfig" type=AVC msg=audit(1162998061.763:2240): avc: denied { read } for pid=24680 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162998061.763:2240): arch=40000003 syscall=5 success=yes exit=3 a0=bff169e0 a1=0 a2=ffffffff a3=9184038 items=0 ppid=24678 pid=24680 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1162998061.763:2241): avc: denied { getattr } for pid=24680 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1162998061.763:2241): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff16950 a2=239ff4 a3=3 items=0 ppid=24678 pid=24680 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1162998061.763:2241): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1162998061.771:2242): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1162998061.775:2243): user pid=24676 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1162998302.314:2244): avc: denied { execute } for pid=24729 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=AVC msg=audit(1162998302.314:2244): avc: denied { execute_no_trans } for pid=24729 comm="bash" name="audit2policy" dev=dm-0 ino=13683706 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1162998302.314:2244): arch=40000003 syscall=11 success=yes exit=0 a0=9c21608 a1=9c26730 a2=9c23ec0 a3=9c21f40 items=0 ppid=4324 pid=24729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="audit2policy" exe="/usr/bin/python" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1162998302.314:2244): path="/home/kmacmill/projects/selinux/madison/audit2policy" type=AVC msg=audit(1162998522.584:2245): avc: denied { execute } for pid=4324 comm="bash" name="authconfig.py" dev=dm-0 ino=10607331 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1162998522.584:2245): arch=40000003 syscall=33 success=yes exit=0 a0=9c20ad0 a1=1 a2=11 a3=9c20ad0 items=0 ppid=4321 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) selinux-python-2.8/sepolgen/tests/test_data/httpd.log000066400000000000000000142664141330160122500231600ustar00rootroot00000000000000type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.453:8094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.457:8095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.461:8096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.461:8097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.465:8098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.469:8099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.481:8103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.485:8108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.489:8109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.489:8110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.493:8111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.497:8112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.497:8113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.509:8114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.509:8115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.509:8116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.513:8117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.513:8118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.513:8119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.517:8123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.521:8124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.521:8125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.525:8126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.525:8127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.553:8128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.553:8129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.553:8130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.557:8134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.561:8135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.561:8136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.577:8140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.581:8141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.581:8142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.585:8143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.585:8144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.589:8148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.593:8149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.593:8150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.593:8151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.597:8152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.597:8153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.601:8154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.605:8155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.621:8156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.625:8162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.629:8163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.629:8164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.629:8165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.633:8166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.633:8167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.633:8168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.641:8169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.649:8170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.649:8171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.653:8176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.657:8177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.657:8178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.661:8179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.661:8180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.665:8181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.665:8182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.669:8183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.681:8184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.681:8185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.681:8186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.685:8190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.689:8194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.693:8195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.697:8196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.697:8197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.705:8198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.709:8199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.709:8200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.713:8204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.717:8205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.717:8206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.717:8207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.721:8208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.721:8209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.725:8210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.733:8211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.741:8212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.745:8216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.749:8220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.753:8221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.753:8222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.753:8223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.757:8224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.761:8225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.777:8226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.781:8230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.785:8231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.785:8232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.785:8233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8234): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8235): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.789:8237): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.793:8238): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.797:8239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.809:8240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.809:8241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.809:8242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.813:8246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.817:8247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.817:8248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.817:8249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.821:8250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.821:8251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.825:8252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.825:8253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.837:8254): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8255): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.841:8258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.845:8262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.857:8263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.857:8264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.857:8265): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.861:8266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.869:8267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.869:8268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8270): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8271): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.873:8272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8273): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.877:8276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.881:8277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.881:8278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.889:8279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.889:8280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.893:8281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.893:8282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.893:8283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.901:8284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.901:8285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.901:8286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8290): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.905:8291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.909:8292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.909:8293): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.913:8294): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.913:8295): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8299): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.929:8300): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.933:8301): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.933:8302): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.933:8303): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.937:8304): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.957:8305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.957:8306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.957:8307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.961:8308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.961:8309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.965:8310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.969:8314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.973:8318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.977:8319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.977:8320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.977:8321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.981:8322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.989:8323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.997:8324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772866.997:8325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8328): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.001:8329): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8330): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8331): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.005:8334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.009:8335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.057:8336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.061:8337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.073:8338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.073:8339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.073:8340): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.077:8346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.081:8347): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.081:8348): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.085:8349): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.109:8350): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.117:8351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.133:8352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.133:8353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8355): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.137:8358): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8359): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8360): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8361): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.141:8362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.145:8363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.145:8364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.149:8365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.157:8366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.157:8367): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.157:8368): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8371): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8372): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.161:8373): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.165:8374): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.165:8375): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.169:8376): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.169:8377): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.173:8378): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.173:8379): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.181:8380): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.181:8381): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8382): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8383): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8384): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.185:8385): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.189:8386): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.189:8387): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.189:8388): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.193:8389): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.193:8390): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.197:8391): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.197:8392): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.201:8393): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.217:8394): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8395): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8396): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8397): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.221:8398): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8399): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8400): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8401): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8402): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.225:8403): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.229:8404): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.229:8405): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.233:8406): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.285:8407): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.297:8408): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.297:8409): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.297:8410): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.301:8411): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.301:8412): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8413): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8414): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8415): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8416): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.305:8417): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.309:8418): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.309:8419): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.309:8420): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.313:8421): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.325:8422): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8423): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8424): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8425): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.329:8426): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8427): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8428): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8429): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8430): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.333:8431): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.337:8432): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.337:8433): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.341:8434): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.341:8435): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8436): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8437): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8438): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.357:8439): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8440): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8441): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8442): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.361:8443): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.365:8444): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.385:8445): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.385:8446): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.385:8447): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.389:8448): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.389:8449): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.389:8450): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.393:8451): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.393:8452): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.393:8453): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.397:8454): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.397:8455): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.401:8456): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.405:8457): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.405:8458): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.405:8459): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.413:8460): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.417:8461): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.417:8462): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.421:8463): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.421:8464): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8465): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8466): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8467): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8468): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8469): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8470): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8471): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.425:8472): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.429:8473): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.433:8474): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.433:8475): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.433:8476): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.441:8477): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.457:8478): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.457:8479): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.461:8480): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.461:8481): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8482): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8483): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8484): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.465:8485): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.469:8486): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8487): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8488): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8489): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8490): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.489:8491): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8492): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.493:8497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.501:8498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.505:8499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.517:8504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8509): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.521:8512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.525:8516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.529:8517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.529:8518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.585:8519): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.605:8520): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.605:8521): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.605:8522): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.609:8523): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.609:8524): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.609:8525): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.613:8526): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.613:8527): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.613:8528): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.633:8529): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.637:8530): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.637:8531): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.637:8532): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.641:8533): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.641:8534): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8535): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8536): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8537): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.645:8538): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.649:8539): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.649:8540): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.649:8541): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.653:8542): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8543): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8544): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8545): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.673:8546): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8547): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8548): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8549): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8550): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8551): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8552): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.677:8553): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8554): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8555): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8556): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.681:8557): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.685:8558): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.685:8559): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.689:8560): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.701:8561): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.701:8562): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8563): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8564): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8565): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.705:8566): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8567): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8568): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8569): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8570): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.709:8571): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.713:8572): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.713:8573): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.717:8574): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.725:8575): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.733:8576): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.733:8577): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.737:8578): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.737:8579): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8580): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8581): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8582): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.741:8583): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.745:8584): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.745:8585): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.745:8586): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.749:8587): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.753:8588): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.757:8589): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8590): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8591): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8592): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8593): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.769:8594): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.773:8595): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.773:8596): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.773:8597): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.777:8598): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.777:8599): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8600): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8601): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8602): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.782:8603): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.798:8604): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8605): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8606): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8607): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8608): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.802:8609): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8610): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8611): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8612): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.806:8613): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.810:8614): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.810:8615): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.814:8616): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8617): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8618): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8619): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.830:8620): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8621): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8622): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8623): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.834:8624): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.838:8625): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.838:8626): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8627): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8628): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8629): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.858:8630): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.862:8631): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.862:8632): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.866:8633): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8634): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8635): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8636): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8637): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8638): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8639): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8640): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.870:8641): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.874:8642): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.878:8643): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.878:8644): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.882:8645): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.894:8646): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8647): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8648): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8649): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.898:8650): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8651): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8652): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8653): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8654): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8655): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.902:8656): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.910:8657): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.910:8658): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.914:8659): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8660): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8661): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8662): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.922:8663): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.926:8664): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.926:8665): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.926:8666): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8667): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8668): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8669): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8670): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.930:8671): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.934:8672): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.942:8673): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.950:8674): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8675): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8676): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8677): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8678): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8679): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8680): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8681): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.954:8682): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.962:8683): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.962:8684): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.966:8685): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.966:8686): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.966:8687): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.986:8688): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.986:8689): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.990:8690): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.990:8691): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.990:8692): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8693): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8694): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8695): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772867.994:8696): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.006:8697): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.006:8698): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.006:8699): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.010:8700): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.010:8701): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8702): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8703): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8704): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8705): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.018:8706): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8707): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8708): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8709): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8710): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.022:8711): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.026:8712): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.030:8713): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.030:8714): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.030:8715): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.034:8716): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.034:8717): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.058:8718): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.058:8719): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.058:8720): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.062:8721): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.062:8722): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.062:8723): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.066:8724): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.066:8725): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.066:8726): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.106:8727): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.146:8728): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.154:8729): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.174:8730): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8731): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8732): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8733): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.178:8734): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8735): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8736): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8737): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.182:8738): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.186:8739): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.186:8740): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.190:8741): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.190:8742): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.226:8743): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8744): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8745): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8746): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8747): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8748): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8749): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.242:8750): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.246:8751): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.246:8752): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.246:8753): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.250:8754): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.250:8755): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.266:8756): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.270:8757): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.274:8758): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.282:8759): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.282:8760): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.282:8761): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8762): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8763): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8764): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.286:8765): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.290:8766): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.290:8767): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.290:8768): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.294:8769): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.294:8770): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.302:8771): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.310:8772): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.310:8773): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.310:8774): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.314:8775): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.314:8776): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.318:8777): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.318:8778): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.318:8779): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.322:8780): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.322:8781): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.322:8782): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.326:8783): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.326:8784): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.330:8785): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.334:8786): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.334:8787): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.334:8788): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.346:8789): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.346:8790): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8791): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8792): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8793): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8794): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.350:8795): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.354:8796): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.358:8797): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.362:8798): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.362:8799): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8800): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8801): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8802): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8803): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.370:8804): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.374:8805): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.374:8806): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.378:8807): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.378:8808): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.378:8809): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.382:8810): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.386:8811): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.386:8812): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.390:8813): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.402:8814): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.402:8815): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.402:8816): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8817): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8818): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8819): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.406:8820): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.410:8821): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.410:8822): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.414:8823): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.414:8824): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.414:8825): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.418:8826): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.430:8827): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8828): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8829): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8830): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.446:8831): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8832): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8833): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8834): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8835): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8836): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.450:8837): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.454:8838): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.458:8839): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.462:8840): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.474:8841): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.474:8842): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.474:8843): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8844): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8845): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8846): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8847): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8848): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8849): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8850): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.478:8851): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.482:8852): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.482:8853): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.486:8854): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.502:8855): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8856): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8857): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8858): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.518:8859): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.522:8860): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.522:8861): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8862): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8863): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8864): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.526:8865): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.530:8866): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.546:8867): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.546:8868): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.546:8869): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8870): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8871): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8872): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.550:8873): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.554:8874): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.554:8875): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.554:8876): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.558:8877): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.566:8878): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.566:8879): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.570:8880): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.570:8881): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.574:8882): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.574:8883): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8884): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8885): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8886): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8890): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.578:8891): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.582:8892): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.582:8893): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.586:8894): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.586:8895): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.590:8896): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.590:8897): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.606:8898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.606:8899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.610:8900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.610:8901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.610:8902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8903): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8904): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8905): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8906): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.614:8907): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.618:8908): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.618:8909): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.618:8910): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.622:8911): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.634:8912): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8914): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8915): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8917): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8918): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.638:8919): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.642:8920): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.642:8921): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.646:8922): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.646:8923): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.690:8924): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.702:8925): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8926): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8927): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8928): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.726:8929): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.730:8930): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.730:8931): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.730:8932): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8933): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8934): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8935): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.734:8936): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.746:8937): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.750:8938): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.750:8939): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.750:8940): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.754:8941): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.758:8942): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.758:8943): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.758:8944): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8945): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8946): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8947): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.762:8948): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.766:8949): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.766:8950): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.766:8951): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.770:8952): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.774:8953): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.786:8954): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8955): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8956): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8957): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.790:8958): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8959): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8960): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8961): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.794:8962): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.798:8963): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.798:8964): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.802:8965): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.806:8966): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.826:8967): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8968): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8969): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8970): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8971): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8972): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8973): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8974): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.830:8975): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.834:8976): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.834:8977): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.834:8978): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.838:8979): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.838:8980): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.850:8981): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.854:8982): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.862:8983): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.862:8984): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.866:8991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.870:8992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.874:8993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.874:8994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.874:8995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.894:8996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.894:8997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.894:8998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.898:8999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.898:9000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9001): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9002): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9003): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.902:9004): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.906:9005): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.906:9006): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.930:9007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.930:9008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.930:9009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.934:9010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.934:9011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.934:9012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9016): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.938:9017): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.942:9018): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.942:9019): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.942:9020): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.946:9021): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.946:9022): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.958:9023): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.974:9024): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.974:9025): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.974:9026): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9027): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9028): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9029): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9030): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9031): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.978:9032): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.982:9033): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.982:9034): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.986:9035): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.990:9036): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.998:9037): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.998:9038): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772868.998:9039): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9040): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9042): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.002:9043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.006:9047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.010:9048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.010:9049): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.010:9050): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.046:9051): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.062:9052): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.062:9053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.066:9057): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.070:9058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.070:9059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.070:9060): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.074:9061): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.074:9062): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.086:9063): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.086:9064): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.086:9065): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9066): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9067): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9068): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9069): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9070): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9071): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.090:9074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.094:9075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.098:9076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.098:9077): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.102:9078): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.106:9079): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.118:9080): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.118:9081): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.118:9082): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9083): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.122:9088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.126:9089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.126:9090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.130:9091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.130:9092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.134:9093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.150:9094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.150:9095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.150:9096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.154:9101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.158:9102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.158:9103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.158:9104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.162:9105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.162:9106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.166:9107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.194:9108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.194:9109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.198:9113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.202:9114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.202:9115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.206:9119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.210:9120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.214:9121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.226:9122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.226:9123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.226:9124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.230:9128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.234:9129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.234:9130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.234:9131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.246:9132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.246:9133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.246:9134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.254:9140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.270:9144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.278:9145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.278:9146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.282:9147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.286:9148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.290:9149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.302:9150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.302:9151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.302:9152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.306:9156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.310:9160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.314:9161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.322:9162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.322:9163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.334:9167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.338:9171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.342:9172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.342:9173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.342:9174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.346:9175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.350:9176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.350:9177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.366:9181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.370:9186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.374:9187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.374:9188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.394:9189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.394:9190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.394:9191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.398:9192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.402:9193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.402:9194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.402:9195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.406:9196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.406:9197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.406:9198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.410:9199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.410:9200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.410:9201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.414:9202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.414:9203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.418:9204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.466:9205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.494:9206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.494:9207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.498:9211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.502:9212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.502:9213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.502:9214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.514:9215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.518:9216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.518:9217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.518:9218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.522:9219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.522:9220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.526:9221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.526:9222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.530:9226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.534:9227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.534:9228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.534:9229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.538:9230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.538:9231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.542:9232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.582:9233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9234): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9235): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.594:9237): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9238): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.598:9241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.602:9242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.602:9243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.602:9244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.606:9245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.606:9246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.610:9247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.626:9248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.626:9249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.626:9250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.630:9254): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.634:9255): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.638:9260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.642:9261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.650:9262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9265): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.654:9266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9270): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.658:9271): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.662:9272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.662:9273): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.670:9274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.670:9275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.682:9279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.686:9283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.690:9284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.690:9285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.690:9286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.694:9287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.694:9288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.698:9289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.714:9290): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.714:9291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.714:9292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9293): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9294): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9295): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.718:9296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.722:9297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.722:9298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.738:9299): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.738:9300): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.738:9301): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.742:9302): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.742:9303): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.746:9304): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.750:9309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.754:9313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.758:9314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.758:9315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.758:9316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.770:9317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.790:9321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.794:9327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.798:9328): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.802:9329): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.802:9330): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.810:9331): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.826:9332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.830:9333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.830:9334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.830:9335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.834:9339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.838:9340): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.838:9341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.838:9342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.842:9343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.846:9344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.850:9345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.850:9346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.854:9347): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.854:9348): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9349): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9350): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.862:9352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.874:9353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.874:9354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.874:9355): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.878:9356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.878:9357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.878:9358): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.910:9359): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.910:9360): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.910:9361): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.914:9365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9367): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9368): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.918:9369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.922:9370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.922:9371): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.926:9372): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.930:9373): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.990:9374): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.990:9375): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.990:9376): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.994:9377): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.994:9378): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.994:9379): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9380): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9381): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9382): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772869.998:9383): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.010:9384): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.010:9385): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.010:9386): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.014:9387): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.018:9388): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.018:9389): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.018:9390): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.022:9391): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.026:9392): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.026:9393): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.026:9394): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.030:9395): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.030:9396): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.030:9397): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.034:9398): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.038:9399): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.038:9400): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.054:9401): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.054:9402): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9403): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9404): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9405): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.058:9406): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9407): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9408): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9409): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9410): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.062:9411): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.066:9412): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.066:9413): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.070:9414): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.106:9415): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.122:9416): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.122:9417): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.122:9418): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9419): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9420): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9421): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.126:9422): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.130:9423): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.130:9424): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.130:9425): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.134:9426): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.134:9427): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.138:9428): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.138:9429): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.154:9430): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.158:9431): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.158:9432): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.158:9433): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9434): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9435): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9436): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9437): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.162:9438): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.166:9439): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.166:9440): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.166:9441): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.170:9442): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.174:9443): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9444): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9445): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9446): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.186:9447): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9448): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9449): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9450): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9451): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.190:9452): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.194:9453): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.194:9454): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.198:9455): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.202:9456): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.202:9457): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.210:9458): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.210:9459): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.210:9460): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9461): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9462): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9463): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.214:9464): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.218:9465): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.218:9466): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.218:9467): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.222:9468): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.222:9469): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.226:9470): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.226:9471): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9472): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9473): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9474): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9475): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9476): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9477): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.238:9478): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.242:9479): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.242:9480): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.242:9481): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.246:9482): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.246:9483): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.250:9484): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.250:9485): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9486): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9487): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9488): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9489): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.266:9490): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.270:9491): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9492): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.274:9495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.278:9496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.278:9497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.282:9498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.286:9499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.294:9500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.298:9504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.302:9509): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.306:9510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.306:9511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.314:9512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.314:9513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.326:9517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9519): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9520): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.330:9521): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.334:9522): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.334:9523): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.334:9524): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.338:9525): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.338:9526): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.342:9527): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.354:9528): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.354:9529): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.354:9530): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9531): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9532): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9533): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.358:9534): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.362:9535): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9536): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9537): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9538): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.366:9539): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.370:9540): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.374:9541): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9542): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9543): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9544): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.382:9545): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9546): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9547): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9548): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.386:9549): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.390:9550): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.390:9551): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.394:9552): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.394:9553): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.394:9554): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.398:9555): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.410:9556): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.410:9557): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.410:9558): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.414:9559): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.414:9560): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.414:9561): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.418:9562): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.418:9563): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.418:9564): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9565): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9566): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9567): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9568): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9569): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9570): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.434:9571): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.442:9572): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.442:9573): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9574): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9575): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9576): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.446:9577): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.450:9578): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.450:9579): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.450:9580): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.462:9581): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.462:9582): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.466:9583): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.466:9584): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.470:9585): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9586): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9587): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9588): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.474:9589): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9590): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9591): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9592): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.478:9593): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.482:9594): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.482:9595): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.486:9596): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.494:9597): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.534:9598): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9599): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9600): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9601): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.538:9602): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9603): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9604): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9605): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9606): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.542:9607): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.546:9608): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.546:9609): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.550:9610): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.550:9611): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9612): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9613): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9614): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.566:9615): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9616): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9617): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9618): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.570:9619): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.574:9620): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.574:9621): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.574:9622): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.578:9623): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.578:9624): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.582:9625): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.590:9626): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.590:9627): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.590:9628): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9629): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9630): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9631): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.626:9632): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.630:9633): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.630:9634): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.634:9635): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.634:9636): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.634:9637): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.638:9638): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.642:9639): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.650:9640): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.650:9641): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.650:9642): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.654:9643): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.654:9644): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.654:9645): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9646): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9647): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9648): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.658:9649): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.662:9650): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.666:9651): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.666:9652): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.670:9653): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9654): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9655): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9656): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.686:9657): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9658): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9659): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9660): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.690:9661): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.694:9662): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.694:9663): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.694:9664): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.698:9665): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.698:9666): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.702:9667): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.714:9668): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9669): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9670): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9671): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.718:9672): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9673): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9674): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9675): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.722:9676): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.726:9677): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.726:9678): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.730:9679): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.730:9680): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.742:9681): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.758:9682): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.758:9683): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.758:9684): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9685): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9686): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9687): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9688): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9689): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.762:9690): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.766:9691): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.766:9692): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.770:9693): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.774:9694): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.778:9695): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.786:9696): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.786:9697): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.786:9698): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9699): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9700): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9701): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9702): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.794:9703): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.798:9704): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.798:9705): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.802:9706): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.802:9707): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.826:9708): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.838:9709): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9710): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9711): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9712): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9713): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.858:9714): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.862:9715): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.862:9716): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.862:9717): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9718): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9719): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9720): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.866:9721): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.878:9722): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.886:9723): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.906:9724): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.906:9725): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.906:9726): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9727): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9728): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9729): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9730): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9731): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.910:9732): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.914:9733): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.918:9734): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.918:9735): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.918:9736): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.970:9737): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9738): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9739): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9740): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9741): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.982:9742): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9743): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9744): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9745): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.986:9746): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.990:9747): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.990:9748): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772870.994:9749): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.002:9750): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.014:9751): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9752): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9753): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9754): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9755): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.038:9756): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9757): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9758): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9759): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9760): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.042:9761): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.046:9762): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.050:9763): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.050:9764): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9765): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9766): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9767): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.070:9768): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.074:9769): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.074:9770): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9771): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9772): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9773): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9774): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.078:9775): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.086:9776): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.090:9777): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.094:9778): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.094:9779): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.094:9780): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.098:9781): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.098:9782): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.098:9783): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9784): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9785): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9786): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9787): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9788): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.102:9789): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.106:9790): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.106:9791): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.110:9792): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.114:9793): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.126:9794): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.126:9795): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.130:9796): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.130:9797): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.134:9798): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.134:9799): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.134:9800): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.138:9801): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.138:9802): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.142:9803): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.142:9804): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.146:9805): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.150:9806): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.150:9807): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.154:9808): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.154:9809): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.158:9810): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.158:9811): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.158:9812): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.162:9813): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.162:9814): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.166:9815): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.166:9816): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.166:9817): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.170:9818): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.170:9819): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.178:9820): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.182:9821): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.186:9822): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.186:9823): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.186:9824): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9825): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9826): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9827): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9828): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.190:9829): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.194:9830): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.194:9831): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.198:9832): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.202:9833): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.202:9834): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.206:9835): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.222:9836): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.222:9837): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.222:9838): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.226:9839): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.230:9840): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.230:9841): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.234:9842): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.234:9843): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.234:9844): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.238:9845): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.238:9846): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.242:9847): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.242:9848): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.246:9849): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.250:9850): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.250:9851): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.254:9852): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.254:9853): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.258:9854): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.258:9855): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.258:9856): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.262:9857): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.262:9858): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.266:9859): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.270:9860): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.278:9861): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.278:9862): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.278:9863): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9864): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9865): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9866): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9867): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9868): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9869): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.282:9870): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.286:9871): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.286:9872): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.286:9873): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.290:9874): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.294:9875): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.294:9876): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.298:9877): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.310:9878): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.314:9879): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.314:9880): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.314:9881): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9882): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9883): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9884): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.318:9885): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.322:9886): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.322:9887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.326:9888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.326:9889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.330:9890): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.346:9891): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.346:9892): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.346:9893): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.350:9894): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.350:9895): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.350:9896): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9897): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.354:9900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.358:9901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.358:9902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.362:9903): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.362:9904): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.366:9905): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9906): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9907): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9908): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9909): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9910): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9911): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9912): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.374:9913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.382:9914): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.382:9915): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.386:9916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.386:9917): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.386:9918): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.394:9919): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9920): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9921): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9922): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.406:9923): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.410:9924): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.410:9925): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.410:9926): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9927): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9928): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9929): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.414:9930): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9931): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9932): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9933): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.434:9934): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9935): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9936): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9937): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9938): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.438:9939): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.442:9940): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.442:9941): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.442:9942): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.454:9943): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.454:9944): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.458:9945): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.458:9946): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.462:9947): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.462:9948): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.466:9949): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.466:9950): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.466:9951): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9952): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9953): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9954): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.470:9955): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.474:9956): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9957): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9958): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9959): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.486:9960): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.490:9961): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9962): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9963): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9964): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9965): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.494:9966): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9967): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9968): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9969): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9970): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.498:9971): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.502:9972): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.502:9973): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.506:9974): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.510:9975): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.514:9976): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9977): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9978): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9979): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.522:9980): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9981): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9982): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9983): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.526:9984): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.530:9985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.534:9986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.534:9987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.538:9988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.546:9989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.562:9990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.562:9991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.562:9992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.566:9996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.570:9997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.570:9998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.582:9999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.586:10000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.586:10001): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.586:10002): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.590:10003): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.590:10004): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.594:10005): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.594:10006): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.594:10007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.598:10013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.602:10014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.602:10015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.606:10016): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.618:10017): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.630:10018): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10019): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10020): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10021): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.634:10022): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10023): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10024): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10025): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10026): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.638:10027): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.642:10028): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.642:10029): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.646:10030): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.650:10031): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10032): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10033): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10034): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.662:10035): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.666:10036): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.666:10037): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.666:10038): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.670:10039): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.670:10040): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.674:10041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.674:10042): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.682:10043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.686:10048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10049): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10050): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10051): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10052): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.690:10053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.694:10054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.694:10055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.698:10056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.698:10057): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.706:10058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.710:10059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.726:10060): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10061): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10062): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10063): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10064): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10065): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.730:10066): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10067): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10068): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10069): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.734:10070): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.738:10071): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.738:10072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.738:10073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.754:10074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.754:10075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.758:10076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.758:10077): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.758:10078): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.762:10079): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.762:10080): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.762:10081): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.766:10082): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.766:10083): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.770:10084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.770:10085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.770:10086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.774:10087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.794:10095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.798:10096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.798:10097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.802:10098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.802:10099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.802:10100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.814:10101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.826:10108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.830:10109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.830:10110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.834:10111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.834:10112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.834:10113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.882:10114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.886:10115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.902:10122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.906:10123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.906:10124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.910:10125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.910:10126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.910:10127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.922:10128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.926:10129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.938:10130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.942:10131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.942:10132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.942:10133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.946:10137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.950:10138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.950:10139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.950:10140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.954:10141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.958:10142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.966:10143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.970:10144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.970:10145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.970:10146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.974:10153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.978:10154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.982:10155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.982:10156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.982:10157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772871.998:10162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.002:10163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.002:10164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.002:10165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.006:10166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.006:10167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.006:10168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.010:10169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.014:10170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.014:10171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.026:10172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.026:10173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.030:10177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.034:10181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.038:10182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.042:10183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.042:10184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.062:10185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.062:10186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.062:10187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.066:10191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.070:10196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.086:10197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.086:10198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.090:10199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.090:10200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.090:10201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.094:10202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.094:10203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.094:10204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.098:10210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.114:10215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.122:10219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.126:10220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.126:10221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.126:10222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.130:10223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.130:10224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.134:10225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.142:10226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.150:10227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.162:10228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.162:10229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.166:10233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.170:10234): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.170:10235): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.170:10236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.174:10237): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.174:10238): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.178:10239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.202:10240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.206:10241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.222:10242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.226:10243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.226:10244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.230:10248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.234:10249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.234:10250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.234:10251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.238:10252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.238:10253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.246:10254): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.254:10255): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.266:10259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.274:10264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.278:10265): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.278:10266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.278:10267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.282:10268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.294:10269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10270): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10271): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10273): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.306:10274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.310:10275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.310:10276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.310:10277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.314:10281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.326:10282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.326:10283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10290): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.342:10292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.346:10293): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.350:10294): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.350:10295): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.350:10296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.358:10297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10299): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10300): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.378:10301): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10302): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10303): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10304): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.382:10305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.386:10306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.442:10311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.446:10312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.450:10313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.450:10314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.450:10315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.454:10320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.462:10321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.462:10322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.466:10323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.466:10324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.470:10325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.478:10326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.478:10327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.482:10328): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.486:10329): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.486:10330): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.486:10331): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.490:10332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.490:10333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.490:10334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.494:10335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.494:10336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.498:10337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.502:10338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.502:10339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.514:10340): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.514:10341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.518:10342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.518:10343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.518:10344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10347): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10348): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.522:10349): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.526:10350): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.526:10351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.534:10355): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.542:10356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.542:10357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.542:10358): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10359): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10360): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10361): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.546:10363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.550:10364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.554:10365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.586:10366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.594:10367): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.602:10368): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10371): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.606:10372): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10373): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10374): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10375): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10376): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.610:10377): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.614:10378): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.618:10379): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.618:10380): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.626:10381): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10382): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10383): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10384): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10385): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.630:10386): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.638:10387): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.638:10388): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.638:10389): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.642:10390): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.642:10391): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.642:10392): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.694:10393): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.698:10394): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.706:10395): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.722:10396): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.726:10397): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.726:10398): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.726:10399): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10400): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10401): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10402): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10403): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.730:10404): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.734:10405): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.738:10406): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.738:10407): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.738:10408): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10409): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10410): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10411): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.758:10412): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10413): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10414): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10415): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.762:10416): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.766:10417): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.766:10418): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10419): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10420): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10421): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.782:10422): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10423): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10424): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10425): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10426): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.786:10427): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10428): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10429): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10430): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.790:10431): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10432): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10433): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10434): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10435): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10436): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10437): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.850:10438): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10439): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10440): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10441): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10442): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.858:10443): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.866:10444): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.866:10445): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10446): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10447): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10448): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10449): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.874:10450): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10451): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10452): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10453): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.878:10454): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.882:10455): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.886:10456): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10457): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10458): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10459): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.890:10460): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.894:10461): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.910:10462): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.910:10463): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.910:10464): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.914:10465): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.914:10466): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.918:10467): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.918:10468): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10469): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10470): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10471): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.922:10472): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10473): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10474): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10475): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10476): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.926:10477): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.930:10478): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.934:10479): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10480): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10481): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10482): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10483): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10484): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10485): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.946:10486): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10487): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10488): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10489): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10490): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10491): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.954:10492): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.978:10493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.994:10494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.994:10495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.994:10496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.998:10497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.998:10498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772872.998:10499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.002:10500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.002:10501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.002:10502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.014:10503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.014:10504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.018:10505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.018:10506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.022:10507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.022:10508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.026:10509): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.026:10510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.026:10511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.030:10512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.030:10513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.030:10514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.034:10518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.050:10519): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.050:10520): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.050:10521): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.054:10522): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.054:10523): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.054:10524): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10525): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10526): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10527): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10528): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10529): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.058:10530): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.062:10531): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.062:10532): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.070:10533): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.070:10534): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.082:10535): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10536): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10537): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10538): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.086:10539): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10540): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10541): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10542): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10543): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10544): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.090:10545): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.094:10546): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.094:10547): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.098:10548): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.110:10549): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10550): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10551): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10552): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.114:10553): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10554): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10555): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10556): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.118:10557): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.122:10558): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.122:10559): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.122:10560): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.126:10561): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.126:10562): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.126:10563): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.138:10564): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.138:10565): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.138:10566): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10567): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10568): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10569): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.142:10570): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.146:10571): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.146:10572): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.146:10573): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.150:10574): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.150:10575): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.154:10576): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.154:10577): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.162:10578): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.162:10579): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.166:10580): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.166:10581): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.166:10582): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10583): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10584): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10585): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10586): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.170:10587): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.174:10588): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.174:10589): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.182:10590): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.182:10591): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.194:10592): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10593): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10594): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10595): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.198:10596): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.202:10597): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.202:10598): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.202:10599): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.206:10600): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.206:10601): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.206:10602): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.210:10603): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.210:10604): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.214:10605): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.226:10606): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.226:10607): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.226:10608): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10609): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10610): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10611): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.230:10612): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.234:10613): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.234:10614): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.270:10615): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.270:10616): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10617): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10618): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10619): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10620): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.274:10621): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.282:10622): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10623): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10624): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10625): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.286:10626): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.290:10627): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.290:10628): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.290:10629): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.294:10630): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.294:10631): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.298:10632): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.298:10633): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.358:10634): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10635): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10636): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10637): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.362:10638): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.366:10639): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.366:10640): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.366:10641): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.370:10642): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.382:10643): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.382:10644): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.386:10645): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.386:10646): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.386:10647): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.390:10648): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.394:10649): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.394:10650): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10651): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10652): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10653): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.398:10654): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.402:10655): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.402:10656): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.402:10657): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.406:10658): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.406:10659): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.410:10660): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.418:10661): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.426:10662): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.426:10663): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.426:10664): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10665): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10666): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10667): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.434:10668): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10669): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10670): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10671): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.438:10672): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.446:10673): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.446:10674): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.454:10675): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.470:10676): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.470:10677): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.470:10678): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10679): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10680): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10681): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.474:10682): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10683): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10684): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10685): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.478:10686): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.482:10687): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.482:10688): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.490:10689): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10690): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10691): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10692): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.502:10693): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10694): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10695): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10696): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10697): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.506:10698): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.510:10699): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.510:10700): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.514:10701): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.514:10702): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.518:10703): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.526:10704): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.530:10705): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.530:10706): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.530:10707): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10708): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10709): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10710): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10711): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.534:10712): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.538:10713): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.538:10714): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.542:10715): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.542:10716): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.554:10717): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.566:10718): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.566:10719): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10720): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10721): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10722): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10723): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10724): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10725): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.570:10726): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.574:10727): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.578:10728): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.578:10729): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.582:10730): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.586:10731): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10732): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10733): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10734): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.602:10735): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10736): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10737): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10738): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.606:10739): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.610:10740): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.610:10741): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.610:10742): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.614:10743): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.614:10744): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.638:10745): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10746): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10747): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10748): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.658:10749): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10750): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10751): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10752): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.662:10753): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.666:10754): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10755): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10756): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10757): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.682:10758): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10759): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10760): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10761): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10762): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.686:10763): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.690:10764): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.690:10765): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.690:10766): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.694:10767): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10768): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10769): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10770): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10771): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.714:10772): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10773): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10774): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10775): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10776): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10777): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10778): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.718:10779): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.730:10780): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.730:10781): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.734:10782): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.734:10783): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.738:10784): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.738:10785): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10786): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10787): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10788): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10789): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.742:10790): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.746:10791): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.754:10792): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.754:10793): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.758:10794): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.758:10795): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.758:10796): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.762:10797): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.762:10798): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.770:10799): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.770:10800): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.774:10801): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.794:10802): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.794:10803): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.794:10804): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10805): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10806): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10807): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10808): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10809): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.798:10810): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.802:10811): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.806:10812): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.806:10813): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.806:10814): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.822:10815): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.822:10816): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.822:10817): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.826:10818): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.826:10819): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.826:10820): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10821): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10822): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10823): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.830:10824): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.842:10825): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.842:10826): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10827): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10828): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10829): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.846:10830): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10831): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10832): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10833): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10834): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.854:10835): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.858:10836): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.858:10837): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.858:10838): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.862:10839): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.862:10840): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.862:10841): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.866:10842): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.866:10843): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.878:10844): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10845): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10846): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10847): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.882:10848): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10849): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10850): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10851): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.886:10852): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.890:10853): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.890:10854): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.894:10855): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.894:10856): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.898:10857): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.910:10858): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.910:10859): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.910:10860): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.914:10861): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.914:10862): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.914:10863): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.918:10864): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.918:10865): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.918:10866): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.938:10867): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.942:10868): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.942:10869): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.942:10870): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.946:10871): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.946:10872): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10873): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10874): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10875): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10876): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10877): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.950:10878): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.954:10879): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.954:10880): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.954:10881): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.958:10882): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.958:10883): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.962:10884): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.966:10885): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10886): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10890): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.982:10891): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10892): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10893): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10894): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.986:10895): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.990:10896): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.990:10897): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.994:10898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772873.994:10899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.002:10900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10903): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10904): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10905): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.006:10906): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.010:10907): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.010:10908): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.010:10909): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.014:10910): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.014:10911): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.022:10912): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.026:10913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.058:10914): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.058:10915): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.058:10916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.062:10917): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.062:10918): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.062:10919): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.066:10920): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.066:10921): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.066:10922): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10923): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10924): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10925): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.070:10926): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.074:10927): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.090:10928): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.090:10929): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.094:10930): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.094:10931): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.094:10932): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10933): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10934): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10935): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.098:10936): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10937): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10938): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10939): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.114:10940): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.118:10941): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.122:10942): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.122:10943): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.122:10944): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10945): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10946): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10947): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10948): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10949): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.126:10950): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.130:10951): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.130:10952): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.134:10953): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.134:10954): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.154:10955): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10956): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10957): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10958): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10959): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.174:10960): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10961): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10962): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10963): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10964): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.178:10965): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.182:10966): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.182:10967): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.186:10968): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.194:10969): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.202:10970): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.202:10971): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.202:10972): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10973): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10974): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10975): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10976): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.206:10977): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.210:10978): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.210:10979): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10980): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10981): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10982): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.214:10983): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.230:10984): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.234:10988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.238:10993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.242:10994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.242:10995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.246:10996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.266:10997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.278:10998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.278:10999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.282:11000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.282:11001): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.282:11002): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11003): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11004): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11005): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.286:11006): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.290:11007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.290:11008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.290:11009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.294:11010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.294:11011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11016): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.306:11017): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11018): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11019): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11020): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.314:11021): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.318:11022): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.318:11023): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.322:11024): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.322:11025): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11026): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11027): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11028): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.342:11029): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11030): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11031): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11032): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.346:11033): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.350:11034): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.350:11035): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.350:11036): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.354:11037): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.354:11038): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.354:11039): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.366:11040): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.366:11041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.366:11042): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.370:11046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.374:11047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.374:11048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.374:11049): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.378:11050): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.378:11051): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.382:11052): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.382:11053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.390:11054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.390:11055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.394:11056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.394:11057): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.394:11058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11060): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11061): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.398:11062): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.402:11063): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.402:11064): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.406:11065): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.406:11066): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.410:11067): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11068): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11069): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11070): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.422:11071): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.426:11072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.426:11073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.426:11074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.430:11075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.430:11076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.430:11077): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.434:11078): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.434:11079): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.434:11080): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.438:11081): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.446:11082): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.446:11083): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.446:11084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.450:11085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.450:11086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.454:11091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.458:11092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.462:11093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.462:11094): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.478:11095): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.490:11096): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.490:11097): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11098): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11099): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11100): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11101): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11102): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.494:11103): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.498:11104): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.498:11105): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.498:11106): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.502:11107): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.502:11108): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.558:11109): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.570:11110): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.574:11111): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.574:11112): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.578:11113): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.578:11114): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.582:11115): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.582:11116): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.586:11117): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.586:11118): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.590:11119): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.590:11120): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.598:11121): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.598:11122): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.602:11123): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.602:11124): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11125): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11126): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11127): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11128): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11129): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.606:11130): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.610:11131): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.610:11132): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.610:11133): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.630:11134): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.634:11135): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.634:11136): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.634:11137): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.638:11138): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.638:11139): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.642:11140): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.642:11141): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11142): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11143): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11144): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11145): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11146): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.646:11147): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.650:11148): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.650:11149): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.650:11150): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.682:11151): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.698:11152): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11153): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11154): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11155): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.702:11156): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.706:11157): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.706:11158): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.710:11159): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.710:11160): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.714:11161): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.714:11162): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11163): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11164): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11165): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11166): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11167): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11168): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11169): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11170): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11171): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11172): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11173): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11174): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.726:11175): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.738:11176): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.738:11177): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.742:11178): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.742:11179): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.758:11180): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.762:11181): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.762:11182): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.762:11183): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11184): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11185): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11186): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.766:11187): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.770:11188): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.770:11189): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.770:11190): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.774:11191): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.782:11192): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.782:11193): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.798:11194): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.798:11195): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.798:11196): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.802:11197): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.806:11198): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.806:11199): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.810:11200): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.810:11201): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11202): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11203): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11204): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11205): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.822:11206): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11207): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11208): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11209): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.834:11210): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.882:11211): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.882:11212): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.882:11213): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.886:11214): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.886:11215): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.886:11216): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.890:11217): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.890:11218): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.894:11219): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.894:11220): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.898:11221): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.914:11222): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.914:11223): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11224): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11225): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11226): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11227): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11228): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.918:11229): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.922:11230): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.922:11231): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.922:11232): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772874.934:11233): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772874.970:11234): avc: denied { execute } for pid=8103 comm="dbus-daemon" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772874.970:11234): avc: denied { execute_no_trans } for pid=8103 comm="dbus-daemon" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772874.970:11234): avc: denied { read } for pid=8103 comm="dbus-daemon" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163772874.970:11234): arch=40000003 syscall=11 success=yes exit=0 a0=9222e60 a1=922b8b0 a2=9222138 a3=11 items=0 ppid=8102 pid=8103 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772874.970:11234): path="/sbin/dhcdbd" type=AVC_PATH msg=audit(1163772874.970:11234): path="/sbin/dhcdbd" type=AVC msg=audit(1163772875.014:11235): avc: denied { write } for pid=8103 comm="dhcdbd" name="system_bus_socket" dev=dm-0 ino=14436971 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:system_dbusd_var_run_t:s0 tclass=sock_file type=AVC msg=audit(1163772875.014:11235): avc: denied { connectto } for pid=8103 comm="dhcdbd" name="system_bus_socket" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163772875.014:11235): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfb65830 a2=4d18494 a3=1f items=0 ppid=8102 pid=8103 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.014:11235): path="/var/run/dbus/system_bus_socket" type=USER_AVC msg=audit(1163772875.022:11236): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.030:11237): avc: denied { write } for pid=8102 comm="dbus-daemon" name="[31337]" dev=pipefs ino=31337 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163772875.030:11237): arch=40000003 syscall=4 success=yes exit=1 a0=12 a1=bfcd505b a2=1 a3=b7fb1688 items=0 ppid=6659 pid=8102 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.030:11237): path="pipe:[31337]" type=AVC msg=audit(1163772875.030:11238): avc: denied { read } for pid=8102 comm="dbus-daemon" name="[31337]" dev=pipefs ino=31337 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163772875.030:11238): arch=40000003 syscall=3 success=yes exit=1 a0=10 a1=bfcd5408 a2=1 a3=13 items=0 ppid=6659 pid=8102 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.030:11238): path="pipe:[31337]" type=USER_AVC msg=audit(1163772875.038:11239): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.046:11240): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.050:11241): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.050:11242): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.050:11243): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.054:11244): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.130:11245): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.134:11246): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.134:11247): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.134:11248): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.138:11249): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11250): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11251): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11252): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.146:11253): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.170:11254): avc: denied { dac_override } for pid=8094 comm="dhcdbd" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163772875.170:11254): avc: denied { read } for pid=8094 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.170:11254): arch=40000003 syscall=5 success=yes exit=3 a0=830d2a8 a1=8000 a2=0 a3=8000 items=0 ppid=8085 pid=8094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dhcdbd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772875.170:11255): avc: denied { ioctl } for pid=8094 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.170:11255): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bf7ffd68 a3=bf7ffda8 items=0 ppid=8085 pid=8094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dhcdbd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.170:11255): path="/var/run/dhcdbd.pid" type=USER_AVC msg=audit(1163772875.186:11256): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.186:11257): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.186:11258): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.186:11259): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11260): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11261): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11262): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11263): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.194:11264): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.194:11265): avc: denied { execute } for pid=8111 comm="bash" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772875.194:11265): avc: denied { execute_no_trans } for pid=8111 comm="bash" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=AVC msg=audit(1163772875.194:11265): avc: denied { read } for pid=8111 comm="bash" name="dhcdbd" dev=dm-0 ino=9984544 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=USER_AVC msg=audit(1163772875.194:11266): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=SYSCALL msg=audit(1163772875.194:11265): arch=40000003 syscall=11 success=yes exit=0 a0=99b6768 a1=99b6830 a2=99b6ab8 a3=99b6638 items=0 ppid=8108 pid=8111 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.194:11265): path="/sbin/dhcdbd" type=AVC_PATH msg=audit(1163772875.194:11265): path="/sbin/dhcdbd" type=USER_AVC msg=audit(1163772875.194:11267): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.206:11268): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.214:11269): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.214:11270): avc: denied { unlink } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.214:11270): arch=40000003 syscall=10 success=yes exit=0 a0=8057e86 a1=0 a2=bfb0bbbc a3=9b16fe0 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772875.214:11271): avc: denied { add_name } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=USER_AVC msg=audit(1163772875.214:11272): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772875.214:11271): avc: denied { create } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.214:11271): arch=40000003 syscall=5 success=yes exit=5 a0=8057e86 a1=41 a2=0 a3=9b16fe0 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772875.214:11273): avc: denied { write } for pid=8112 comm="dhcdbd" name="dhcdbd.pid" dev=dm-0 ino=14437120 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772875.214:11273): arch=40000003 syscall=4 success=yes exit=4 a0=5 a1=bfb0bc48 a2=4 a3=9b16fe0 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772875.214:11273): path="/var/run/dhcdbd.pid" type=USER_AVC msg=audit(1163772875.230:11274): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.230:11275): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.234:11276): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationFailed dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.234:11277): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=reason dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.634:11278): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.634:11279): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.634:11280): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11281): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11282): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11283): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11284): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivating dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.638:11285): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.642:11286): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.642:11287): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772875.646:11288): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.642:11289): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp member=up dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772876.662:11290): avc: denied { signal } for pid=8112 comm="dhcdbd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=process type=SYSCALL msg=audit(1163772876.662:11290): arch=40000003 syscall=37 success=yes exit=0 a0=c34 a1=f a2=0 a3=bfb0a5c8 items=0 ppid=1 pid=8112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhcdbd" exe="/sbin/dhcdbd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163772876.870:11291): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=com.redhat.dhcp.state member=eth0 dest=org.freedesktop.DBus spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.870:11292): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp member=up dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772876.874:11293): avc: denied { read } for pid=8116 comm="dhclient" name="dhclient-eth0.leases" dev=dm-0 ino=14437333 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=file type=SYSCALL msg=audit(1163772876.874:11293): arch=40000003 syscall=5 success=yes exit=4 a0=bf926f50 a1=0 a2=ffb700 a3=fef190 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.882:11294): avc: denied { write } for pid=8116 comm="dhclient" name="dhclient-eth0.leases" dev=dm-0 ino=14437333 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=file type=SYSCALL msg=audit(1163772876.882:11294): arch=40000003 syscall=5 success=yes exit=4 a0=bf926f50 a1=241 a2=1b6 a3=9634038 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.918:11295): avc: denied { ioctl } for pid=8117 comm="dhclient-script" name="dhclient-script" dev=dm-0 ino=2848156 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163772876.918:11295): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf9d1cf8 a3=bf9d1d38 items=0 ppid=8116 pid=8117 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient-script" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772876.918:11295): path="/sbin/dhclient-script" type=USER_AVC msg=audit(1163772876.934:11296): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp member=set dest=com.redhat.dhcp spid=8121 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.938:11297): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=com.redhat.dhcp.state member=eth0 dest=org.freedesktop.DBus spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772876.938:11298): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp member=set dest=:1.10 spid=8112 tpid=8121 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772876.942:11299): avc: denied { create } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=AVC msg=audit(1163772876.942:11299): avc: denied { net_raw } for pid=8116 comm="dhclient" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163772876.942:11299): arch=40000003 syscall=102 success=yes exit=6 a0=1 a1=bf924280 a2=feeb34 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.942:11300): avc: denied { bind } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772876.942:11300): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf924280 a2=feeb34 a3=bf9242a8 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.974:11301): avc: denied { setopt } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772876.974:11301): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bf9242d0 a2=feeb34 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.974:11302): avc: denied { name_bind } for pid=8116 comm="dhclient" src=68 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcpc_port_t:s0 tclass=udp_socket type=AVC msg=audit(1163772876.974:11302): avc: denied { net_bind_service } for pid=8116 comm="dhclient" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163772876.974:11302): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf924260 a2=feeb34 a3=5 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772876.974:11303): avc: denied { write } for pid=8116 comm="dhclient" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772876.974:11303): arch=40000003 syscall=102 success=yes exit=342 a0=b a1=bf924540 a2=feeb34 a3=bf924c14 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772878.022:11304): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772878.022:11304): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772878.022:11304): path="socket:[31406]" type=USER_AVC msg=audit(1163772878.038:11305): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp member=set dest=com.redhat.dhcp spid=8126 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.038:11306): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=com.redhat.dhcp.state member=eth0 dest=org.freedesktop.DBus spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.038:11307): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp member=set dest=:1.11 spid=8112 tpid=8126 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.042:11308): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.042:11309): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=ip_address dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.042:11310): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=ip_address dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11311): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=subnet_mask dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11312): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=subnet_mask dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11313): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=broadcast_address dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.046:11314): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=broadcast_address dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.050:11315): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=routers dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.050:11316): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=routers dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.054:11317): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=host_name dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.054:11318): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.058:11319): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=domain_name_servers dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.058:11320): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=domain_name_servers dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.058:11321): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=domain_name dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.062:11322): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return interface=com.redhat.dhcp.dbus.get member=domain_name dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.062:11323): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=nis_domain dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.062:11324): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.066:11325): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=com.redhat.dhcp.dbus.get member=nis_servers dest=com.redhat.dhcp spid=6687 tpid=8112 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.066:11326): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.DBus.Error.UnknownMethod dest=:1.6 spid=8112 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772878.066:11327): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772879.090:11328): avc: denied { ioctl } for pid=6689 comm="NetworkManager" name="[31434]" dev=sockfs ino=31434 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772879.090:11328): arch=40000003 syscall=54 success=yes exit=0 a0=c a1=890b a2=b7f85194 a3=84fe248 items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772879.090:11328): path="socket:[31434]" type=AVC msg=audit(1163772879.102:11329): avc: denied { write } for pid=6689 comm="NetworkManager" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163772879.102:11329): avc: denied { add_name } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163772879.102:11329): avc: denied { create } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163772879.102:11329): arch=40000003 syscall=5 success=yes exit=12 a0=80892c8 a1=241 a2=1b6 a3=84ff4b8 items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772879.102:11330): avc: denied { write } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163772879.102:11330): arch=40000003 syscall=4 success=yes exit=125 a0=c a1=b7fa1000 a2=7d a3=7d items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772879.102:11330): path="/etc/resolv.conf.tmp" type=AVC msg=audit(1163772879.102:11331): avc: denied { remove_name } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163772879.102:11331): avc: denied { rename } for pid=6689 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163772879.102:11331): avc: denied { unlink } for pid=6689 comm="NetworkManager" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163772879.102:11331): arch=40000003 syscall=38 success=yes exit=0 a0=80892c8 a1=8089313 a2=8094374 a3=808930e items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163772879.118:11332): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceActivationStage dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.122:11333): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=StateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.122:11334): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager member=DeviceNowActive dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.122:11335): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.126:11336): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.126:11337): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772879.126:11338): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.4 spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772881.978:11339): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772883.738:11340): avc: denied { read } for pid=8133 comm="nm-vpnc-auth-di" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.738:11340): arch=40000003 syscall=33 success=yes exit=0 a0=952dcb0 a1=4 a2=df7770 a3=952dcb0 items=0 ppid=3866 pid=8133 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163772883.750:11341): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=activateVPNConnection dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.750:11342): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.750:11343): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.750:11344): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.754:11345): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionVPNData dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.754:11346): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772883.766:11347): avc: denied { execute } for pid=8136 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.766:11347): avc: denied { execute_no_trans } for pid=8136 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.766:11347): avc: denied { read } for pid=8136 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.766:11347): arch=40000003 syscall=11 success=yes exit=0 a0=99066c0 a1=9906830 a2=9906770 a3=9906548 items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772883.766:11347): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163772883.766:11347): path="/sbin/modprobe" type=AVC msg=audit(1163772883.770:11348): avc: denied { read } for pid=8136 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.770:11348): arch=40000003 syscall=5 success=yes exit=5 a0=8bd8118 a1=0 a2=1b6 a3=8bd8300 items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772883.774:11349): avc: denied { read write } for pid=8136 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.774:11349): arch=40000003 syscall=5 success=yes exit=5 a0=8bd80bc a1=2 a2=0 a3=8bd80bc items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772883.774:11350): avc: denied { lock } for pid=8136 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163772883.774:11350): arch=40000003 syscall=221 success=yes exit=0 a0=5 a1=7 a2=bfcf47a0 a3=bfcf47a0 items=0 ppid=8135 pid=8136 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772883.774:11350): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/drivers/net/tun.ko" type=USER_AVC msg=audit(1163772883.783:11351): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.967:11352): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.967:11353): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=startConnection dest=org.freedesktop.NetworkManager.vpnc spid=6687 tpid=8135 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772883.967:11354): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772883.987:11355): avc: denied { execute } for pid=8137 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.987:11355): avc: denied { execute_no_trans } for pid=8137 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163772883.987:11355): avc: denied { read } for pid=8137 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=USER_AVC msg=audit(1163772884.003:11356): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.003:11357): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=SYSCALL msg=audit(1163772883.987:11355): arch=40000003 syscall=11 success=yes exit=0 a0=804b8f3 a1=8bcf518 a2=bf99503c a3=0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772883.987:11355): path="/usr/sbin/vpnc" type=AVC_PATH msg=audit(1163772883.987:11355): path="/usr/sbin/vpnc" type=AVC msg=audit(1163772884.031:11358): avc: denied { ipc_lock } for pid=8137 comm="vpnc" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163772884.031:11358): arch=40000003 syscall=150 success=yes exit=0 a0=b7fc1000 a1=4000 a2=57612c4 a3=b7fc1000 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.031:11359): avc: denied { name_bind } for pid=8137 comm="vpnc" src=500 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:isakmp_port_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163772884.031:11359): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfa213a0 a2=805b6e8 a3=3 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.047:11360): avc: denied { read write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163772884.047:11360): arch=40000003 syscall=5 success=yes exit=4 a0=8058da4 a1=2 a2=10 a3=805c4c4 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.047:11361): avc: denied { ioctl } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163772884.047:11361): arch=40000003 syscall=54 success=yes exit=0 a0=4 a1=400454ca a2=bfa213b8 a3=4 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772884.047:11361): path="/dev/net/tun" type=USER_AVC msg=audit(1163772884.735:11362): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=signalIP4Config dest=org.freedesktop.NetworkManager.vpnc spid=8149 tpid=8135 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.739:11363): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=IP4Config dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.739:11364): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.739:11365): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772884.743:11366): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772884.743:11367): avc: denied { create } for pid=6687 comm="NetworkManager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772884.743:11367): arch=40000003 syscall=102 success=yes exit=14 a0=1 a1=bfaf32b0 a2=84ff760 a3=2 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772884.743:11368): avc: denied { ioctl } for pid=6687 comm="NetworkManager" name="[31576]" dev=sockfs ino=31576 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163772884.743:11368): arch=40000003 syscall=54 success=yes exit=0 a0=e a1=890b a2=bfaf3364 a3=84ff760 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772884.743:11368): path="socket:[31576]" type=USER_AVC msg=audit(1163772885.799:11369): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=LoginBanner dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163772885.799:11370): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163772893.279:11371): avc: denied { append } for pid=8154 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.279:11371): arch=40000003 syscall=5 success=yes exit=4 a0=89cde18 a1=8441 a2=1b6 a3=8964208 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772893.291:11372): avc: denied { create } for pid=8154 comm="yum" name="yum.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.291:11372): arch=40000003 syscall=5 success=yes exit=5 a0=877ef30 a1=80c1 a2=1a4 a3=80c1 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772893.295:11373): avc: denied { write } for pid=8154 comm="yum" name="yum.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.295:11373): arch=40000003 syscall=4 success=yes exit=4 a0=5 a1=89f7934 a2=4 a3=86a71b0 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163772893.295:11373): path="/var/run/yum.pid" type=AVC msg=audit(1163772893.443:11374): avc: denied { write } for pid=8154 comm="yum" name="repomd.xml" dev=dm-0 ino=15287718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.443:11374): arch=40000003 syscall=5 success=yes exit=6 a0=86fae70 a1=8241 a2=1b6 a3=8a32e78 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772893.459:11375): avc: denied { setattr } for pid=8154 comm="yum" name="repomd.xml" dev=dm-0 ino=15287718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772893.459:11375): arch=40000003 syscall=271 success=yes exit=0 a0=86fae70 a1=bff0df54 a2=c4eff4 a3=899be8c items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772895.559:11376): avc: denied { write } for pid=8154 comm="yum" name="development" dev=dm-0 ino=15288131 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163772895.559:11376): avc: denied { add_name } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163772895.559:11376): avc: denied { create } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772895.559:11376): arch=40000003 syscall=5 success=yes exit=10 a0=8735f30 a1=80c2 a2=1a4 a3=80c2 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772895.559:11377): avc: denied { remove_name } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" dev=dm-0 ino=15288159 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163772895.559:11377): avc: denied { unlink } for pid=8154 comm="yum" name="primary.xml.gz.sqlite-journal" dev=dm-0 ino=15288159 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163772895.559:11377): arch=40000003 syscall=10 success=yes exit=0 a0=8735f30 a1=1 a2=2c0e2c a3=8735e08 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772959.055:11378): avc: denied { unlink } for pid=8154 comm="yum" name="yum.pid" dev=dm-0 ino=14437127 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.055:11378): arch=40000003 syscall=10 success=yes exit=0 a0=cd5b368 a1=0 a2=59d1fe4 a3=86a71b0 items=0 ppid=6537 pid=8154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163772959.287:11379): avc: denied { getattr } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.287:11379): arch=40000003 syscall=196 success=yes exit=0 a0=bfcfcae4 a1=bfcfca48 a2=c4eff4 a3=930e3b0 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163772959.287:11379): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163772959.883:11380): avc: denied { read } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.883:11380): arch=40000003 syscall=5 success=yes exit=51 a0=9773e28 a1=0 a2=c50150 a3=9773e28 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163772959.899:11381): avc: denied { execute } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163772959.899:11381): arch=40000003 syscall=192 success=yes exit=41328640 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163772959.899:11381): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163772960.231:11382): avc: denied { read } for pid=6507 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163772960.231:11382): arch=40000003 syscall=33 success=yes exit=0 a0=bfd00fcb a1=4 a2=da3a64 a3=bfd00fcb items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163772960.231:11383): avc: denied { getattr } for pid=6507 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163772960.231:11383): arch=40000003 syscall=197 success=yes exit=0 a0=33 a1=bfcf964c a2=c4eff4 a3=97039c8 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163772960.231:11383): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163773001.406:11384): avc: denied { write } for pid=8165 comm="rpm" name="gnome-python2-gnomevfs-2.16.2" dev=dm-0 ino=10412290 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163773001.406:11384): avc: denied { remove_name } for pid=8165 comm="rpm" name="sync-xfer.py" dev=dm-0 ino=10412299 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163773001.406:11384): avc: denied { unlink } for pid=8165 comm="rpm" name="sync-xfer.py" dev=dm-0 ino=10412299 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163773001.406:11384): arch=40000003 syscall=10 success=yes exit=0 a0=9975238 a1=2d a2=186040 a3=9975238 items=0 ppid=6537 pid=8165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rpm" exe="/bin/rpm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773001.438:11385): avc: denied { rmdir } for pid=8165 comm="rpm" name="pygvfsmethod" dev=dm-0 ino=10412294 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163773001.438:11385): arch=40000003 syscall=40 success=yes exit=0 a0=9975238 a1=2d a2=186040 a3=9975238 items=0 ppid=6537 pid=8165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rpm" exe="/bin/rpm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773045.629:11386): avc: denied { read } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773045.629:11386): arch=40000003 syscall=5 success=yes exit=58 a0=9bbf070 a1=0 a2=9bbf068 a3=9bbf070 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773045.633:11387): avc: denied { getattr } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773045.633:11387): arch=40000003 syscall=197 success=yes exit=0 a0=3a a1=bfcfc5d0 a2=4aafc0 a3=3b items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773045.633:11387): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163773045.633:11388): avc: denied { execute } for pid=6507 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773045.633:11388): arch=40000003 syscall=192 success=yes exit=41328640 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773045.633:11388): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163773049.833:11389): avc: denied { execute } for pid=6507 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773049.833:11389): arch=40000003 syscall=192 success=yes exit=99201024 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773049.833:11389): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773049.845:11390): avc: denied { execstack } for pid=6507 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163773049.845:11390): avc: denied { execmem } for pid=6507 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163773049.845:11390): arch=40000003 syscall=125 success=yes exit=0 a0=bfcff000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773049.889:11391): avc: denied { execmod } for pid=6507 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773049.889:11391): arch=40000003 syscall=125 success=yes exit=0 a0=5e9b000 a1=26f000 a2=5 a3=bfcfca20 items=0 ppid=1 pid=6507 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773049.889:11391): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773057.641:11392): avc: denied { write } for pid=8179 comm="gnome-terminal" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163773057.641:11392): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfab5230 a2=df7770 a3=15 items=0 ppid=1 pid=8179 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773132.042:11393): avc: denied { execute } for pid=8206 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773132.042:11393): arch=40000003 syscall=192 success=yes exit=22396928 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=8206 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773132.042:11393): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773132.050:11394): avc: denied { execmod } for pid=8206 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773132.050:11394): arch=40000003 syscall=125 success=yes exit=0 a0=155c000 a1=26f000 a2=5 a3=bf942670 items=0 ppid=1 pid=8206 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773132.050:11394): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773160.768:11395): avc: denied { ioctl } for pid=8264 comm="ps" name="[32611]" dev=pipefs ino=32611 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163773160.768:11395): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5413 a2=bfa460f4 a3=bfa46138 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.768:11395): path="pipe:[32611]" type=AVC msg=audit(1163773160.768:11396): avc: denied { getattr } for pid=8264 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.768:11396): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.768:11396): path="/proc/1" type=AVC msg=audit(1163773160.768:11397): avc: denied { search } for pid=8264 comm="ps" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1163773160.768:11397): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.768:11397): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.768:11398): avc: denied { getattr } for pid=8264 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.768:11398): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.768:11398): path="/proc/2" type=AVC msg=audit(1163773160.768:11399): avc: denied { search } for pid=8264 comm="ps" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1163773160.768:11399): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.768:11399): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.772:11400): avc: denied { getattr } for pid=8264 comm="ps" name="436" dev=proc ino=28573698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.772:11400): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.772:11400): path="/proc/436" type=AVC msg=audit(1163773160.772:11401): avc: denied { search } for pid=8264 comm="ps" name="436" dev=proc ino=28573698 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.772:11401): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=28573709 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.772:11401): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.772:11402): avc: denied { getattr } for pid=8264 comm="ps" name="1853" dev=proc ino=121438210 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.772:11402): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.772:11402): path="/proc/1853" type=AVC msg=audit(1163773160.772:11403): avc: denied { search } for pid=8264 comm="ps" name="1853" dev=proc ino=121438210 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=dir type=AVC msg=audit(1163773160.772:11403): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=121438221 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.772:11403): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.772:11404): avc: denied { getattr } for pid=8264 comm="ps" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.772:11404): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.772:11404): path="/proc/1865" type=AVC msg=audit(1163773160.772:11405): avc: denied { search } for pid=8264 comm="ps" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1163773160.772:11405): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=122224653 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.772:11405): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11406): avc: denied { getattr } for pid=8264 comm="ps" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11406): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11406): path="/proc/1881" type=AVC msg=audit(1163773160.776:11407): avc: denied { search } for pid=8264 comm="ps" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11407): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=123273229 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11407): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11408): avc: denied { getattr } for pid=8264 comm="ps" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11408): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11408): path="/proc/1884" type=AVC msg=audit(1163773160.776:11409): avc: denied { search } for pid=8264 comm="ps" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11409): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=123469837 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11409): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11410): avc: denied { getattr } for pid=8264 comm="ps" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11410): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11410): path="/proc/1896" type=AVC msg=audit(1163773160.776:11411): avc: denied { search } for pid=8264 comm="ps" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11411): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=124256269 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11411): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11412): avc: denied { getattr } for pid=8264 comm="ps" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.776:11412): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11412): path="/proc/1912" type=AVC msg=audit(1163773160.776:11413): avc: denied { search } for pid=8264 comm="ps" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.776:11413): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=125304845 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.776:11413): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11414): avc: denied { getattr } for pid=8264 comm="ps" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11414): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11414): path="/proc/1925" type=AVC msg=audit(1163773160.776:11415): avc: denied { search } for pid=8264 comm="ps" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11415): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=126156813 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11415): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11416): avc: denied { getattr } for pid=8264 comm="ps" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11416): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11416): path="/proc/1959" type=AVC msg=audit(1163773160.776:11417): avc: denied { search } for pid=8264 comm="ps" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11417): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=128385037 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11417): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11418): avc: denied { getattr } for pid=8264 comm="ps" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11418): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11418): path="/proc/2033" type=AVC msg=audit(1163773160.776:11419): avc: denied { search } for pid=8264 comm="ps" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11419): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=133234701 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11419): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11420): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=135135245 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11420): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11421): avc: denied { getattr } for pid=8264 comm="ps" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11421): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11421): path="/proc/2123" type=AVC msg=audit(1163773160.776:11422): avc: denied { search } for pid=8264 comm="ps" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11422): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=139132941 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11422): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11423): avc: denied { getattr } for pid=8264 comm="ps" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11423): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11423): path="/proc/2142" type=AVC msg=audit(1163773160.776:11424): avc: denied { search } for pid=8264 comm="ps" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11424): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=140378125 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11424): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11425): avc: denied { getattr } for pid=8264 comm="ps" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11425): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11425): path="/proc/2153" type=AVC msg=audit(1163773160.776:11426): avc: denied { search } for pid=8264 comm="ps" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11426): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=141099021 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11426): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11427): avc: denied { getattr } for pid=8264 comm="ps" name="2170" dev=proc ino=142213122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.776:11427): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11427): path="/proc/2170" type=AVC msg=audit(1163773160.776:11428): avc: denied { search } for pid=8264 comm="ps" name="2170" dev=proc ino=142213122 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.776:11428): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=142213133 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.776:11428): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11429): avc: denied { getattr } for pid=8264 comm="ps" name="2184" dev=proc ino=143130626 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.776:11429): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11429): path="/proc/2184" type=AVC msg=audit(1163773160.776:11430): avc: denied { search } for pid=8264 comm="ps" name="2184" dev=proc ino=143130626 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.776:11430): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=143130637 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.776:11430): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11431): avc: denied { getattr } for pid=8264 comm="ps" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11431): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11431): path="/proc/2196" type=AVC msg=audit(1163773160.776:11432): avc: denied { search } for pid=8264 comm="ps" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11432): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=143917069 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11432): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11433): avc: denied { getattr } for pid=8264 comm="ps" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11433): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11433): path="/proc/2216" type=AVC msg=audit(1163773160.776:11434): avc: denied { search } for pid=8264 comm="ps" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1163773160.776:11434): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=145227789 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.776:11434): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.776:11435): avc: denied { getattr } for pid=8264 comm="ps" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.776:11435): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.776:11435): path="/proc/2237" type=AVC msg=audit(1163773160.780:11436): avc: denied { search } for pid=8264 comm="ps" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11436): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=146604045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11436): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11437): avc: denied { getattr } for pid=8264 comm="ps" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.780:11437): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11437): path="/proc/2248" type=AVC msg=audit(1163773160.780:11438): avc: denied { search } for pid=8264 comm="ps" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.780:11438): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=147324941 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.780:11438): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11439): avc: denied { getattr } for pid=8264 comm="ps" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11439): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11439): path="/proc/2285" type=AVC msg=audit(1163773160.780:11440): avc: denied { search } for pid=8264 comm="ps" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11440): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=149749773 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11440): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11441): avc: denied { getattr } for pid=8264 comm="ps" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11441): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11441): path="/proc/2401" type=AVC msg=audit(1163773160.780:11442): avc: denied { search } for pid=8264 comm="ps" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11442): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=157351949 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11442): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11443): avc: denied { getattr } for pid=8264 comm="ps" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11443): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11443): path="/proc/2723" type=AVC msg=audit(1163773160.780:11444): avc: denied { search } for pid=8264 comm="ps" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11444): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=178454541 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11444): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11445): avc: denied { getattr } for pid=8264 comm="ps" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11445): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11445): path="/proc/2732" type=AVC msg=audit(1163773160.780:11446): avc: denied { search } for pid=8264 comm="ps" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11446): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=179044365 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11446): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11447): avc: denied { getattr } for pid=8264 comm="ps" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11447): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11447): path="/proc/2735" type=AVC msg=audit(1163773160.780:11448): avc: denied { search } for pid=8264 comm="ps" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11448): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=179240973 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11448): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11449): avc: denied { getattr } for pid=8264 comm="ps" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11449): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11449): path="/proc/3150" type=AVC msg=audit(1163773160.780:11450): avc: denied { search } for pid=8264 comm="ps" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11450): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=206438413 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11450): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11451): avc: denied { getattr } for pid=8264 comm="ps" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.780:11451): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11451): path="/proc/3172" type=AVC msg=audit(1163773160.780:11452): avc: denied { search } for pid=8264 comm="ps" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1163773160.780:11452): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=207880205 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.780:11452): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.780:11453): avc: denied { getattr } for pid=8264 comm="ps" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.780:11453): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.780:11453): path="/proc/3201" type=AVC msg=audit(1163773160.780:11454): avc: denied { search } for pid=8264 comm="ps" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.780:11454): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=209780749 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.780:11454): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11455): avc: denied { getattr } for pid=8264 comm="ps" name="3289" dev=proc ino=215547906 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163773160.784:11455): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11455): path="/proc/3289" type=AVC msg=audit(1163773160.784:11456): avc: denied { search } for pid=8264 comm="ps" name="3289" dev=proc ino=215547906 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163773160.784:11456): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=215547917 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163773160.784:11456): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11457): avc: denied { getattr } for pid=8264 comm="ps" name="3310" dev=proc ino=216924162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11457): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11457): path="/proc/3310" type=AVC msg=audit(1163773160.784:11458): avc: denied { search } for pid=8264 comm="ps" name="3310" dev=proc ino=216924162 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11458): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=216924173 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11458): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11459): avc: denied { getattr } for pid=8264 comm="ps" name="3362" dev=proc ino=220332034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11459): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11459): path="/proc/3362" type=AVC msg=audit(1163773160.784:11460): avc: denied { search } for pid=8264 comm="ps" name="3362" dev=proc ino=220332034 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11460): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=220332045 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11460): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11461): avc: denied { getattr } for pid=8264 comm="ps" name="3366" dev=proc ino=220594178 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11461): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11461): path="/proc/3366" type=AVC msg=audit(1163773160.784:11462): avc: denied { search } for pid=8264 comm="ps" name="3366" dev=proc ino=220594178 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11462): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=220594189 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11462): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11463): avc: denied { getattr } for pid=8264 comm="ps" name="3875" dev=proc ino=253952002 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11463): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11463): path="/proc/3875" type=AVC msg=audit(1163773160.784:11464): avc: denied { search } for pid=8264 comm="ps" name="3875" dev=proc ino=253952002 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11464): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=253952013 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11464): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11465): avc: denied { getattr } for pid=8264 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11465): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bfa4385c a2=c4eff4 a3=bfa4385c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11465): path="/dev/pts" type=AVC msg=audit(1163773160.784:11466): avc: denied { read } for pid=8264 comm="ps" name="2" dev=proc ino=257851394 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=lnk_file type=AVC msg=audit(1163773160.784:11466): avc: denied { ptrace } for pid=8264 comm="ps" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163773160.784:11466): arch=40000003 syscall=85 success=yes exit=10 a0=bfa43898 a1=c62840 a2=7f a3=bfa43898 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773160.784:11467): avc: denied { search } for pid=8264 comm="ps" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11467): avc: denied { getattr } for pid=8264 comm="ps" name="1" dev=devpts ino=3 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773160.784:11467): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bfa4379c a2=c4eff4 a3=bfa4379c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11467): path="/dev/pts/1" type=AVC msg=audit(1163773160.784:11468): avc: denied { getattr } for pid=8264 comm="ps" name="4062" dev=proc ino=266207234 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1163773160.784:11468): arch=40000003 syscall=195 success=yes exit=0 a0=892097c a1=bfa4604c a2=c4eff4 a3=bfa4604c items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773160.784:11468): path="/proc/4062" type=AVC msg=audit(1163773160.784:11469): avc: denied { search } for pid=8264 comm="ps" name="4062" dev=proc ino=266207234 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1163773160.784:11469): avc: denied { read } for pid=8264 comm="ps" name="stat" dev=proc ino=266207245 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1163773160.784:11469): arch=40000003 syscall=5 success=yes exit=18 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=8263 pid=8264 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773182.121:11470): avc: denied { dac_override } for pid=8271 comm="yum" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163773182.121:11470): arch=40000003 syscall=33 success=yes exit=0 a0=8dfc308 a1=2 a2=488b44 a3=0 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773184.609:11471): avc: denied { write } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=14731267 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163773184.609:11471): avc: denied { remove_name } for pid=8271 comm="yum" name="book.dat" dev=dm-0 ino=10738969 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163773184.609:11471): avc: denied { unlink } for pid=8271 comm="yum" name="book.dat" dev=dm-0 ino=10738969 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163773184.609:11471): arch=40000003 syscall=10 success=yes exit=0 a0=a3e7280 a1=2d a2=d2a040 a3=a3e7280 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773184.637:11472): avc: denied { rmdir } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=14731267 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=SYSCALL msg=audit(1163773184.637:11472): arch=40000003 syscall=40 success=yes exit=0 a0=a892d88 a1=2d a2=d2a040 a3=a892d88 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773184.697:11473): avc: denied { write } for pid=8271 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163773184.697:11473): avc: denied { remove_name } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=10332735 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163773184.697:11473): avc: denied { unlink } for pid=8271 comm="yum" name="gnuchess" dev=dm-0 ino=10332735 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163773184.697:11473): arch=40000003 syscall=10 success=yes exit=0 a0=b210580 a1=2d a2=d2a040 a3=b210580 items=0 ppid=6537 pid=8271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163773201.786:11474): user pid=8275 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163773201.786:11475): login pid=8275 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163773201.786:11476): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163773201.786:11477): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773201.790:11478): avc: denied { execute } for pid=8276 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163773201.790:11478): avc: denied { execute_no_trans } for pid=8276 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.790:11478): arch=40000003 syscall=11 success=yes exit=0 a0=982f1b0 a1=982f358 a2=982f290 a3=982f008 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.790:11478): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163773201.794:11479): avc: denied { execute } for pid=8276 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163773201.794:11479): avc: denied { execute_no_trans } for pid=8276 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163773201.794:11479): avc: denied { read } for pid=8276 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.794:11479): arch=40000003 syscall=11 success=yes exit=0 a0=9851d48 a1=9851740 a2=9851d60 a3=9851740 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.794:11479): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163773201.794:11479): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163773201.798:11480): avc: denied { search } for pid=8276 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163773201.798:11480): avc: denied { read } for pid=8276 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11480): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=97ac7f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11481): avc: denied { getattr } for pid=8276 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11481): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa33b58 a2=c4eff4 a3=97ac7f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.798:11481): path="/proc/net/dev" type=AVC msg=audit(1163773201.798:11482): avc: denied { search } for pid=8276 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163773201.798:11482): arch=40000003 syscall=33 success=yes exit=0 a0=bfa33f04 a1=0 a2=bfa33df8 a3=bfa33e00 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11483): avc: denied { read append } for pid=8276 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11483): arch=40000003 syscall=5 success=yes exit=3 a0=bfa33f04 a1=402 a2=bfa340c8 a3=bfa33e00 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11484): avc: denied { search } for pid=8276 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163773201.798:11484): avc: denied { read } for pid=8276 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11484): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=97ad2f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.798:11485): avc: denied { getattr } for pid=8276 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.798:11485): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa339b0 a2=c4eff4 a3=97ad2f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.798:11485): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163773201.798:11486): avc: denied { search } for pid=8276 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163773201.798:11486): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=97ad2f8 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773201.802:11487): avc: denied { lock } for pid=8276 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163773201.802:11487): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfa33e00 a3=3 items=0 ppid=8275 pid=8276 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773201.802:11487): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163773201.862:11488): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163773201.862:11489): user pid=8275 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773212.595:11490): avc: denied { search } for pid=8278 comm="thunderbird" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163773212.595:11490): avc: denied { read } for pid=8278 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11490): arch=40000003 syscall=5 success=yes exit=3 a0=c37d80 a1=8000 a2=1 a3=bfe9f4a0 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.595:11491): avc: denied { getattr } for pid=8278 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11491): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=c4faa0 a2=c4eff4 a3=bfe9f4a0 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.595:11491): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163773212.595:11492): avc: denied { read } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11492): arch=40000003 syscall=5 success=yes exit=3 a0=c36d1a a1=0 a2=1b6 a3=8852a60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.595:11493): avc: denied { getattr } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11493): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe9d618 a2=c4eff4 a3=8852a60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.595:11493): path="/proc/meminfo" type=AVC msg=audit(1163773212.595:11494): avc: denied { read } for pid=8278 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11494): arch=40000003 syscall=5 success=yes exit=3 a0=c37d5c a1=0 a2=0 a3=bfe9f700 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.595:11495): avc: denied { getattr } for pid=8278 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.595:11495): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfe9f5a8 a2=c4eff4 a3=3 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.595:11495): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163773212.979:11496): avc: denied { read } for pid=8290 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.979:11496): arch=40000003 syscall=5 success=yes exit=3 a0=bfac7f20 a1=0 a2=1b6 a3=9003398 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.979:11497): avc: denied { getattr } for pid=8290 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.979:11497): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfac7dbc a2=c4eff4 a3=9003398 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.979:11497): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1163773212.979:11498): avc: denied { search } for pid=8290 comm="thunderbird-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163773212.979:11498): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfac7e90 a2=c4eff4 a3=3 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.991:11499): avc: denied { read } for pid=8290 comm="thunderbird-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.991:11499): arch=40000003 syscall=33 success=yes exit=0 a0=bfacaf72 a1=4 a2=da3a64 a3=bfacaf72 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773212.995:11500): avc: denied { getattr } for pid=8290 comm="thunderbird-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773212.995:11500): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfac7c1c a2=c4eff4 a3=8ff7558 items=0 ppid=8285 pid=8290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773212.995:11500): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163773213.179:11501): avc: denied { read } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.179:11501): arch=40000003 syscall=5 success=yes exit=3 a0=c36d1a a1=0 a2=1b6 a3=9b5fa60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.179:11502): avc: denied { getattr } for pid=8278 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.179:11502): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf80ed68 a2=c4eff4 a3=9b5fa60 items=0 ppid=1 pid=8278 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.179:11502): path="/proc/meminfo" type=AVC msg=audit(1163773213.359:11503): avc: denied { search } for pid=8301 comm="thunderbird-bin" name=".mozilla" dev=dm-0 ino=6547337 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163773213.359:11503): arch=40000003 syscall=33 success=yes exit=0 a0=9903cb8 a1=0 a2=ab3bdc a3=bfe14c4c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.363:11504): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="dom_html.xpt" dev=dm-0 ino=10737706 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.363:11504): arch=40000003 syscall=195 success=yes exit=0 a0=9907400 a1=bfe14b0c a2=c4eff4 a3=bfe14b0c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.363:11504): path="/usr/lib/thunderbird-1.5.0.7/components/dom_html.xpt" type=AVC msg=audit(1163773213.367:11505): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="plugins" dev=dm-0 ino=6547805 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163773213.367:11505): arch=40000003 syscall=5 success=yes exit=5 a0=9903cb8 a1=18800 a2=bfe14af8 a3=bfe14b60 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.367:11506): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="plugins" dev=dm-0 ino=6547805 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163773213.367:11506): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfe14acc a2=c4eff4 a3=5 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.367:11506): path="/home/kmacmill/.mozilla/plugins" type=AVC msg=audit(1163773213.367:11507): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.367:11507): arch=40000003 syscall=195 success=yes exit=0 a0=990ad70 a1=bfe14b0c a2=c4eff4 a3=bfe14b0c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.367:11507): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163773213.367:11508): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.367:11508): arch=40000003 syscall=195 success=yes exit=0 a0=990ad70 a1=bfe14b0c a2=c4eff4 a3=bfe14b0c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773213.367:11508): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163773213.371:11509): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="msgbase.xpt" dev=dm-0 ino=10737972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.371:11509): arch=40000003 syscall=5 success=yes exit=5 a0=9907cb8 a1=8000 a2=0 a3=8000 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773213.675:11510): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="flashplayer.xpt" dev=dm-0 ino=6547381 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773213.675:11510): arch=40000003 syscall=5 success=yes exit=5 a0=990ad70 a1=8000 a2=0 a3=8000 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773216.487:11511): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773216.487:11511): arch=40000003 syscall=5 success=yes exit=18 a0=3d4880 a1=8000 a2=1b6 a3=9abb478 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773216.487:11512): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773216.487:11512): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bfe12f2c a2=c4eff4 a3=9abb478 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773216.487:11512): path="/dev/urandom" type=AVC msg=audit(1163773216.487:11513): avc: denied { ioctl } for pid=8301 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773216.487:11513): arch=40000003 syscall=54 success=no exit=-22 a0=12 a1=5401 a2=bfe12e8c a3=bfe12ecc items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773216.487:11513): path="/dev/urandom" type=AVC msg=audit(1163773228.744:11514): avc: denied { search } for pid=8301 comm="thunderbird-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163773228.744:11514): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bf845c10 a2=c4eff4 a3=3 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773229.948:11515): avc: denied { read } for pid=8301 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773229.948:11515): arch=40000003 syscall=5 success=yes exit=30 a0=a01d410 a1=0 a2=f501c600 a3=a0118b8 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773229.948:11516): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773229.948:11516): arch=40000003 syscall=197 success=yes exit=0 a0=1e a1=bf84460c a2=c4eff4 a3=bf84460c items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773229.948:11516): path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" type=AVC msg=audit(1163773231.640:11517): avc: denied { search } for pid=8312 comm="netstat" name="sys" dev=proc ino=-268435429 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_t:s0 tclass=dir type=AVC msg=audit(1163773231.640:11517): avc: denied { search } for pid=8312 comm="netstat" name="net" dev=proc ino=-268435343 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163773231.640:11517): arch=40000003 syscall=33 success=no exit=-2 a0=805f53c a1=4 a2=8064740 a3=8 items=0 ppid=8301 pid=8312 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="netstat" exe="/bin/netstat" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11518): avc: denied { create } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11518): arch=40000003 syscall=102 success=yes exit=40 a0=1 a1=b26fd1d4 a2=c4eff4 a3=0 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11519): avc: denied { bind } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11519): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b26fd1d4 a2=c4eff4 a3=28 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11520): avc: denied { getattr } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11520): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b26fd1d4 a2=c4eff4 a3=28 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11521): avc: denied { write } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163773231.928:11521): avc: denied { nlmsg_read } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11521): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b26fc10c a2=c4eff4 a3=0 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.928:11522): avc: denied { read } for pid=8315 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163773231.928:11522): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b26fc10c a2=c4eff4 a3=0 items=0 ppid=8296 pid=8315 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773231.936:11523): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773231.936:11523): arch=40000003 syscall=3 success=yes exit=69 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773231.936:11523): path="/dev/net/tun" type=AVC msg=audit(1163773231.988:11524): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163773231.988:11524): arch=40000003 syscall=4 success=yes exit=117 a0=4 a1=805c570 a2=75 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773231.988:11524): path="/dev/net/tun" type=AVC msg=audit(1163773396.727:11525): avc: denied { read } for pid=8326 comm="gnome-font-prop" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773396.727:11525): arch=40000003 syscall=33 success=yes exit=0 a0=bfb43de7 a1=4 a2=da3a64 a3=bfb43de7 items=0 ppid=1 pid=8326 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-font-prop" exe="/usr/bin/gnome-font-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773396.779:11526): avc: denied { read } for pid=8326 comm="gnome-font-prop" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163773396.779:11526): arch=40000003 syscall=33 success=yes exit=0 a0=8f0d598 a1=4 a2=df7770 a3=8f0d598 items=0 ppid=1 pid=8326 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-font-prop" exe="/usr/bin/gnome-font-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773397.655:11527): avc: denied { getattr } for pid=8301 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=5466955 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773397.655:11527): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bf844720 a2=c4eff4 a3=0 items=0 ppid=8296 pid=8301 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773397.655:11527): path="/etc/localtime" type=AVC msg=audit(1163773695.057:11528): avc: denied { search } for pid=8345 comm="thunderbird" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163773695.057:11528): avc: denied { read } for pid=8345 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11528): arch=40000003 syscall=5 success=yes exit=3 a0=c37d80 a1=8000 a2=1 a3=bfbadff0 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773695.057:11529): avc: denied { getattr } for pid=8345 comm="thunderbird" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11529): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=c4faa0 a2=c4eff4 a3=bfbadff0 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773695.057:11529): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163773695.057:11530): avc: denied { read } for pid=8345 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11530): arch=40000003 syscall=5 success=yes exit=3 a0=c37d5c a1=0 a2=0 a3=bfbae250 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773695.057:11531): avc: denied { getattr } for pid=8345 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.057:11531): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfbae0f8 a2=c4eff4 a3=3 items=0 ppid=1 pid=8345 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163773695.057:11531): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163773695.125:11532): avc: denied { read } for pid=8357 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314350 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163773695.125:11532): arch=40000003 syscall=5 success=yes exit=3 a0=bfbdf030 a1=0 a2=1b6 a3=9ad3398 items=0 ppid=8352 pid=8357 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163773700.438:11533): avc: denied { read } for pid=8303 comm="yum" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163773700.438:11533): arch=40000003 syscall=5 success=yes exit=9 a0=c37093 a1=0 a2=1b6 a3=8c40560 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773705.594:11534): avc: denied { write } for pid=8303 comm="yum" name="packages" dev=dm-0 ino=15288142 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163773705.594:11534): avc: denied { add_name } for pid=8303 comm="yum" name="selinux-policy-devel-2.4.4-3.fc7.noarch.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163773705.594:11534): arch=40000003 syscall=5 success=yes exit=10 a0=c896d70 a1=8241 a2=1b6 a3=8c40560 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773780.783:11535): avc: denied { read } for pid=8387 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773780.783:11535): arch=40000003 syscall=33 success=yes exit=0 a0=bff2cfcb a1=4 a2=da3a64 a3=bff2cfcb items=0 ppid=1 pid=8387 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163773780.783:11536): avc: denied { getattr } for pid=8387 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163773780.783:11536): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff2b34c a2=c4eff4 a3=9ca2140 items=0 ppid=1 pid=8387 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773780.783:11536): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163773780.791:11537): avc: denied { write } for pid=8303 comm="yum" name="qt-designer-3.3.7-1.fc7.i386.rpm" dev=dm-0 ino=15288245 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773780.791:11537): arch=40000003 syscall=4 success=yes exit=4096 a0=a a1=b7fa1000 a2=1000 a3=1000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773780.791:11537): path="/var/cache/yum/development/packages/qt-designer-3.3.7-1.fc7.i386.rpm" type=AVC msg=audit(1163773782.935:11538): avc: denied { setattr } for pid=8303 comm="yum" name="qt-designer-3.3.7-1.fc7.i386.rpm" dev=dm-0 ino=15288245 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773782.935:11538): arch=40000003 syscall=271 success=yes exit=0 a0=a3ba900 a1=bf87c404 a2=c4eff4 a3=880aaec items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163773783.023:11539): avc: denied { create } for pid=8303 comm="yum" name="openssh-4.3p2-12.fc7.i386.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163773783.023:11539): arch=40000003 syscall=5 success=yes exit=10 a0=95665a8 a1=8241 a2=1b6 a3=8ecbc20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163773801.916:11540): user pid=8412 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163773801.916:11541): login pid=8412 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163773801.916:11542): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163773801.916:11543): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773801.928:11544): avc: denied { search } for pid=8413 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163773801.928:11544): avc: denied { read } for pid=8413 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773801.928:11544): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=97477f8 items=0 ppid=8412 pid=8413 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163773801.928:11545): avc: denied { getattr } for pid=8413 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163773801.928:11545): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc2b558 a2=c4eff4 a3=97477f8 items=0 ppid=8412 pid=8413 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163773801.928:11545): path="/proc/net/dev" type=CRED_DISP msg=audit(1163773802.012:11546): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163773802.016:11547): user pid=8412 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163773872.184:11548): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163773872.184:11548): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163773872.184:11548): path="socket:[31406]" type=AVC msg=audit(1163773953.097:11549): avc: denied { getattr } for pid=8434 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163773953.097:11549): arch=40000003 syscall=196 success=yes exit=0 a0=bf84f9d4 a1=bf84f938 a2=c4eff4 a3=98d60f8 items=0 ppid=1 pid=8434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163773953.097:11549): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163774133.877:11550): avc: denied { write } for pid=8465 comm="gnome-terminal" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163774133.877:11550): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd8bd10 a2=df7770 a3=15 items=0 ppid=1 pid=8465 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774169.215:11551): avc: denied { write } for pid=8303 comm="yum" name="packages" dev=dm-0 ino=15288142 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163774169.215:11551): avc: denied { add_name } for pid=8303 comm="yum" name="udev-103-2.i386.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774169.215:11551): arch=40000003 syscall=5 success=yes exit=10 a0=c675da8 a1=8241 a2=1b6 a3=9fce418 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163774197.053:11552): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163774197.053:11553): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774197.069:11554): avc: denied { search } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774197.069:11554): arch=40000003 syscall=5 success=no exit=-2 a0=bfca7178 a1=8000 a2=1b6 a3=96e49a8 items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163774197.197:11555): avc: denied { write } for pid=8521 comm="xauth" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.197:11555): arch=40000003 syscall=33 success=yes exit=0 a0=bfec99ba a1=2 a2=bfec9720 a3=0 items=0 ppid=8520 pid=8521 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.201:11556): avc: denied { read } for pid=8521 comm="xauth" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.201:11556): arch=40000003 syscall=5 success=yes exit=2 a0=bfec99ba a1=0 a2=1b6 a3=9caa008 items=0 ppid=8520 pid=8521 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.201:11557): avc: denied { getattr } for pid=8521 comm="xauth" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.201:11557): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfec946c a2=c4eff4 a3=9caa008 items=0 ppid=8520 pid=8521 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163774197.201:11557): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163774197.201:11558): avc: denied { write } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.201:11558): avc: denied { add_name } for pid=8520 comm="su" name=".xauthb3Z41E" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.201:11558): avc: denied { create } for pid=8520 comm="su" name=".xauthb3Z41E" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.201:11558): arch=40000003 syscall=5 success=yes exit=4 a0=96e4acb a1=80c2 a2=180 a3=80c2 items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163774197.217:11559): avc: denied { setattr } for pid=8520 comm="su" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.217:11559): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=25869f items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11560): avc: denied { search } for pid=8522 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774197.221:11560): arch=40000003 syscall=195 success=no exit=-2 a0=bfbeff17 a1=bfbefa2c a2=c4eff4 a3=bfbefa2c items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11561): avc: denied { write } for pid=8522 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.221:11561): avc: denied { add_name } for pid=8522 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.221:11561): avc: denied { create } for pid=8522 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11561): arch=40000003 syscall=5 success=yes exit=2 a0=bfbeff17 a1=c1 a2=180 a3=ffffffff items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11562): avc: denied { link } for pid=8522 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127385 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11562): arch=40000003 syscall=9 success=yes exit=0 a0=bfbeff17 a1=bfbefb16 a2=da3a64 a3=2 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11563): avc: denied { write } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11563): arch=40000003 syscall=33 success=yes exit=0 a0=bfbf19b6 a1=2 a2=bfbf0440 a3=0 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11564): avc: denied { read } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11564): arch=40000003 syscall=5 success=yes exit=2 a0=bfbf19b6 a1=0 a2=1b6 a3=9a31008 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163774197.221:11565): avc: denied { getattr } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.221:11565): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfbf018c a2=c4eff4 a3=9a31008 items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163774197.221:11565): path="/root/.xauthb3Z41E" type=AVC msg=audit(1163774197.229:11566): avc: denied { remove_name } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774197.229:11566): avc: denied { unlink } for pid=8522 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.229:11566): arch=40000003 syscall=10 success=yes exit=0 a0=9a31008 a1=1000 a2=0 a3=9a3108a items=0 ppid=8520 pid=8522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163774197.229:11567): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1163774197.245:11568): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774197.257:11569): avc: denied { dac_override } for pid=8523 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774197.257:11569): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bfed1540 a2=c4eff4 a3=bfed15a0 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774197.257:11570): avc: denied { read } for pid=8523 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.257:11570): arch=40000003 syscall=5 success=yes exit=3 a0=86ac760 a1=8000 a2=0 a3=8000 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774197.345:11571): avc: denied { read } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774197.345:11571): arch=40000003 syscall=5 success=yes exit=3 a0=86ac940 a1=8000 a2=0 a3=8000 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774199.765:11572): avc: denied { read } for pid=8543 comm="consolehelper-g" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.765:11572): arch=40000003 syscall=33 success=yes exit=0 a0=bfda3f9d a1=4 a2=da3a64 a3=bfda3f9d items=0 ppid=8523 pid=8543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="consolehelper-g" exe="/usr/bin/consolehelper-gtk" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163774199.777:11573): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163774199.777:11573): arch=40000003 syscall=11 success=yes exit=0 a0=804c35f a1=9f87c28 a2=bfda35ec a3=3 items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_AUTH msg=audit(1163774199.949:11574): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: authentication acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163774199.949:11575): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: accounting acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774199.949:11576): avc: denied { search } for pid=8544 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774199.949:11576): arch=40000003 syscall=5 success=no exit=-2 a0=bfeeab38 a1=8000 a2=1b6 a3=90963e8 items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163774199.949:11577): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=AVC msg=audit(1163774199.949:11577): avc: denied { execute_no_trans } for pid=8545 comm="userhelper" name="xauth" dev=dm-0 ino=10326959 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.949:11577): arch=40000003 syscall=11 success=yes exit=0 a0=31c761 a1=bfeebafc a2=9092568 a3=4 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163774199.949:11577): path="/usr/bin/xauth" type=AVC msg=audit(1163774199.953:11578): avc: denied { write } for pid=8545 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774199.953:11578): avc: denied { add_name } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774199.953:11578): avc: denied { create } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11578): arch=40000003 syscall=5 success=yes exit=2 a0=bfa3d337 a1=c1 a2=180 a3=ffffffff items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11579): avc: denied { link } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11579): arch=40000003 syscall=9 success=yes exit=0 a0=bfa3d337 a1=bfa3cf36 a2=da3a64 a3=2 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11580): avc: denied { write } for pid=8545 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11580): arch=40000003 syscall=33 success=yes exit=0 a0=bfa3df09 a1=2 a2=bfa3d860 a3=0 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11581): avc: denied { read } for pid=8545 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11581): arch=40000003 syscall=5 success=yes exit=2 a0=bfa3df09 a1=0 a2=1b6 a3=9312008 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11582): avc: denied { getattr } for pid=8545 comm="xauth" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11582): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa3d5ac a2=c4eff4 a3=9312008 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163774199.953:11582): path="/root/.xauthb3Z41E" type=AVC msg=audit(1163774199.953:11583): avc: denied { remove_name } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774199.953:11583): avc: denied { unlink } for pid=8545 comm="xauth" name=".xauthb3Z41E-c" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11583): arch=40000003 syscall=10 success=yes exit=0 a0=bfa3cf27 a1=bfa3cb39 a2=da3a64 a3=bfa3cb26 items=0 ppid=8544 pid=8545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163774199.953:11584): avc: denied { setattr } for pid=8544 comm="userhelper" name=".xauthTAYBaF" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774199.953:11584): arch=40000003 syscall=207 success=yes exit=0 a0=5 a1=0 a2=0 a3=31c69f items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163774199.953:11585): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163774199.953:11585): arch=40000003 syscall=11 success=yes exit=0 a0=31c761 a1=bfeebafc a2=9092568 a3=4 items=0 ppid=8544 pid=8546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_START msg=audit(1163774200.085:11586): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session open acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163774201.129:11587): avc: denied { write } for pid=8547 comm="python" name=".virt-manager" dev=dm-0 ino=13127378 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774201.129:11587): arch=40000003 syscall=33 success=yes exit=0 a0=8690ca0 a1=2 a2=59d1fe4 a3=b7ec754c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774201.129:11588): avc: denied { write } for pid=8547 comm="python" name="virt-manager.log" dev=dm-0 ino=13127380 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774201.129:11588): arch=40000003 syscall=5 success=yes exit=3 a0=869c970 a1=8241 a2=1b6 a3=8699b60 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774202.241:11589): avc: denied { search } for pid=8547 comm="python" name="xen" dev=proc ino=-268434186 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=dir type=AVC msg=audit(1163774202.241:11589): avc: denied { read write } for pid=8547 comm="python" name="privcmd" dev=proc ino=-268433970 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774202.241:11589): arch=40000003 syscall=5 success=yes exit=10 a0=90fd8b a1=2 a2=6040e01 a3=bfcc1be7 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774202.241:11590): avc: denied { ioctl } for pid=8547 comm="python" name="privcmd" dev=proc ino=-268433970 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774202.241:11590): arch=40000003 syscall=54 success=yes exit=196608 a0=a a1=305000 a2=bfcc0a1c a3=a items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774202.241:11590): path="/proc/xen/privcmd" type=AVC msg=audit(1163774202.241:11591): avc: denied { ipc_lock } for pid=8547 comm="python" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774202.241:11591): arch=40000003 syscall=150 success=yes exit=0 a0=bfcc09c0 a1=44 a2=91324c a3=1 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.361:11592): avc: denied { write } for pid=8549 comm="gconfd-2" name=".gconf" dev=dm-0 ino=13127147 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774203.361:11592): avc: denied { add_name } for pid=8549 comm="gconfd-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774203.361:11592): avc: denied { create } for pid=8549 comm="gconfd-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.361:11592): arch=40000003 syscall=5 success=yes exit=14 a0=9649fe8 a1=41 a2=1c0 a3=9649fe8 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.489:11593): avc: denied { remove_name } for pid=8549 comm="gconfd-2" name=".testing.writeability" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774203.489:11593): avc: denied { unlink } for pid=8549 comm="gconfd-2" name=".testing.writeability" dev=dm-0 ino=13127384 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.489:11593): arch=40000003 syscall=10 success=yes exit=0 a0=9649fe8 a1=41 a2=412708 a3=9649fe8 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.493:11594): avc: denied { read } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.493:11594): arch=40000003 syscall=5 success=yes exit=8 a0=964a460 a1=0 a2=1b6 a3=964a488 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774203.521:11595): avc: denied { append } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774203.521:11595): arch=40000003 syscall=5 success=yes exit=15 a0=964bff8 a1=441 a2=1b6 a3=964c020 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774204.769:11596): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163774204.769:11596): arch=40000003 syscall=4 success=yes exit=1412 a0=4 a1=805c570 a2=584 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774204.769:11596): path="/dev/net/tun" type=AVC msg=audit(1163774204.769:11597): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163774204.769:11597): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774204.769:11597): path="/dev/net/tun" type=AVC msg=audit(1163774207.325:11598): avc: denied { write } for pid=8547 comm="python" name="xend-socket" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=sock_file type=AVC msg=audit(1163774207.325:11598): avc: denied { connectto } for pid=8547 comm="python" name="xend-socket" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163774207.325:11598): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc5630 a2=91324c a3=89da860 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774207.325:11598): path="/var/lib/xend/xend-socket" type=AVC msg=audit(1163774207.333:11599): avc: denied { write } for pid=8547 comm="python" name="socket" dev=dm-0 ino=14534849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xenstored_var_run_t:s0 tclass=sock_file type=AVC msg=audit(1163774207.333:11599): avc: denied { connectto } for pid=8547 comm="python" name="socket" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163774207.333:11599): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc6a10 a2=4c0590 a3=bfcc6a8a items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774207.333:11599): path="/var/run/xenstored/socket" type=AVC msg=audit(1163774207.673:11600): avc: denied { read } for pid=8547 comm="python" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163774207.673:11600): arch=40000003 syscall=5 success=yes exit=16 a0=c37093 a1=0 a2=1b6 a3=8a3d080 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.105:11601): avc: denied { setuid } for pid=8547 comm="python" capability=7 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774211.105:11601): arch=40000003 syscall=208 success=yes exit=0 a0=ffffffff a1=0 a2=ffffffff a3=bfcc740c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.157:11602): avc: denied { read write } for pid=8552 comm="dbus-daemon" name="2" dev=devpts ino=4 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163774211.157:11602): avc: denied { write } for pid=8552 comm="dbus-daemon" name="virt-manager.log" dev=dm-0 ino=13127380 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=AVC msg=audit(1163774211.157:11602): avc: denied { read write } for pid=8552 comm="dbus-daemon" name="privcmd" dev=proc ino=-268433970 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774211.157:11602): arch=40000003 syscall=11 success=yes exit=0 a0=804cc28 a1=bf9c48e8 a2=bf9c5fa8 a3=400 items=0 ppid=8551 pid=8552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC_PATH msg=audit(1163774211.157:11602): path="/proc/xen/privcmd" type=AVC_PATH msg=audit(1163774211.157:11602): path="/root/.virt-manager/virt-manager.log" type=AVC msg=audit(1163774211.217:11603): avc: denied { getattr } for pid=8552 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163774211.217:11603): arch=40000003 syscall=100 success=yes exit=0 a0=7 a1=bfccce5c a2=39cff4 a3=ffffffb8 items=0 ppid=8551 pid=8552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163774211.545:11604): avc: denied { search } for pid=8552 comm="dbus-daemon" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774211.545:11604): arch=40000003 syscall=5 success=no exit=-2 a0=9aee6b0 a1=18800 a2=9af0b80 a3=bfcccf98 items=0 ppid=8551 pid=8552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163774211.549:11605): avc: denied { write } for pid=8550 comm="dbus-launch" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774211.549:11605): avc: denied { add_name } for pid=8550 comm="dbus-launch" name=".dbus" scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774211.549:11605): avc: denied { create } for pid=8550 comm="dbus-launch" name=".dbus" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774211.549:11605): arch=40000003 syscall=39 success=yes exit=0 a0=912d400 a1=1c0 a2=804e38c a3=912d400 items=0 ppid=8547 pid=8550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.549:11606): avc: denied { add_name } for pid=8550 comm="dbus-launch" name="session-bus" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163774211.549:11606): arch=40000003 syscall=39 success=yes exit=0 a0=912d400 a1=1c0 a2=804e38c a3=912d400 items=0 ppid=8547 pid=8550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.549:11607): avc: denied { create } for pid=8550 comm="dbus-launch" name="9dc35d453761bffef33db47122b61900-0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774211.549:11607): arch=40000003 syscall=5 success=yes exit=7 a0=912d420 a1=241 a2=1b6 a3=912d460 items=0 ppid=8547 pid=8550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774211.669:11608): avc: denied { read write } for pid=8557 comm="gnome-vfs-daemo" name="[34416]" dev=sockfs ino=34416 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1163774211.669:11608): arch=40000003 syscall=11 success=yes exit=0 a0=9af86f0 a1=9af8670 a2=9af86a8 a3=13 items=0 ppid=8556 pid=8557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="gnome-vfs-daemo" exe="/usr/libexec/gnome-vfs-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774211.669:11608): path="socket:[34416]" type=USER_AVC msg=audit(1163774211.833:11609): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.gnome.GnomeVFS.Daemon member=GetDrives dest=org.gnome.GnomeVFS.Daemon spid=8547 tpid=8557 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163774212.006:11610): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.0 spid=8557 tpid=8547 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163774212.006:11611): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.gnome.GnomeVFS.Daemon member=GetVolumes dest=org.gnome.GnomeVFS.Daemon spid=8547 tpid=8557 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163774212.006:11612): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.0 spid=8557 tpid=8547 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163774212.210:11613): avc: denied { write } for pid=8547 comm="python" name="xend-socket" dev=dm-0 ino=14567713 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xend_var_lib_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163774212.210:11613): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc61f0 a2=91324c a3=0 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774212.642:11614): avc: denied { read } for pid=8561 comm="python" name=".mcoprc" dev=dm-0 ino=6574117 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774212.642:11614): arch=40000003 syscall=5 success=yes exit=20 a0=8a890e0 a1=8000 a2=1b6 a3=8a8aca0 items=0 ppid=8544 pid=8561 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774229.731:11615): avc: denied { remove_name } for pid=8547 comm="python" name="gtkfilechooser.B4AWIT" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774229.731:11615): avc: denied { rename } for pid=8547 comm="python" name="gtkfilechooser.B4AWIT" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774229.731:11615): arch=40000003 syscall=38 success=yes exit=0 a0=8b2b8e8 a1=8b2b9d0 a2=412708 a3=b7f0f68c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774229.763:11616): avc: denied { search } for pid=8569 comm="python" name="home" dev=dm-0 ino=6547201 scontext=system_u:system_r:xend_t:s0 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=AVC msg=audit(1163774229.763:11616): avc: denied { search } for pid=8569 comm="python" name="kmacmill" dev=dm-0 ino=6547202 scontext=system_u:system_r:xend_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774229.763:11616): avc: denied { search } for pid=8569 comm="python" name="vm" dev=dm-0 ino=9100619 scontext=system_u:system_r:xend_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=AVC msg=audit(1163774229.763:11616): avc: denied { read } for pid=8569 comm="python" name="rawhide.state" dev=dm-0 ino=6547920 scontext=system_u:system_r:xend_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774229.763:11616): arch=40000003 syscall=5 success=yes exit=21 a0=972fa48 a1=8000 a2=0 a3=8000 items=0 ppid=2735 pid=8569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python" subj=system_u:system_r:xend_t:s0 key=(null) type=AVC msg=audit(1163774230.579:11617): avc: denied { search } for pid=8578 comm="block" name="xen" dev=dm-0 ino=14567524 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=AVC msg=audit(1163774230.579:11617): avc: denied { write } for pid=8578 comm="block" name="xen" dev=dm-0 ino=14567524 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=AVC msg=audit(1163774230.579:11617): avc: denied { add_name } for pid=8578 comm="block" name="xen-hotplug.log" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=dir type=AVC msg=audit(1163774230.579:11617): avc: denied { create } for pid=8578 comm="block" name="xen-hotplug.log" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=file type=AVC msg=audit(1163774230.583:11618): avc: denied { append } for pid=8580 comm="vif-bridge" name="xen-hotplug.log" dev=dm-0 ino=14567775 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xend_var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774230.579:11617): arch=40000003 syscall=5 success=yes exit=3 a0=9b54580 a1=8441 a2=1b6 a3=8441 items=0 ppid=8574 pid=8578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="block" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=SYSCALL msg=audit(1163774230.583:11618): arch=40000003 syscall=5 success=yes exit=3 a0=8940740 a1=8441 a2=1b6 a3=8441 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774230.891:11619): avc: denied { search } for pid=8631 comm="xenstore-read" name="xen" dev=proc ino=-268434186 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=dir type=AVC msg=audit(1163774230.891:11620): avc: denied { search } for pid=8632 comm="xenstore-read" name="xen" dev=proc ino=-268434186 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=dir type=AVC msg=audit(1163774230.891:11620): avc: denied { getattr } for pid=8632 comm="xenstore-read" name="xenbus" dev=proc ino=-268434183 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774230.891:11620): arch=40000003 syscall=195 success=yes exit=0 a0=cc5d0c a1=bf88d36c a2=c4eff4 a3=bf88d36c items=0 ppid=8630 pid=8632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xenstore-read" exe="/usr/bin/xenstore-read" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774230.891:11620): path="/proc/xen/xenbus" type=AVC msg=audit(1163774230.891:11621): avc: denied { read write } for pid=8632 comm="xenstore-read" name="xenbus" dev=proc ino=-268434183 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_xen_t:s0 tclass=file type=SYSCALL msg=audit(1163774230.891:11621): arch=40000003 syscall=5 success=yes exit=3 a0=cc5d0c a1=2 a2=bf88d400 a3=cc5d0c items=0 ppid=8630 pid=8632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xenstore-read" exe="/usr/bin/xenstore-read" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=SYSCALL msg=audit(1163774230.891:11619): arch=40000003 syscall=195 success=yes exit=0 a0=cc5d0c a1=bfbd0efc a2=c4eff4 a3=bfbd0efc items=0 ppid=8629 pid=8631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xenstore-read" exe="/usr/bin/xenstore-read" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774230.967:11622): avc: denied { getattr } for pid=8646 comm="readlink" name="home" dev=dm-0 ino=6547201 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=SYSCALL msg=audit(1163774230.967:11622): arch=40000003 syscall=196 success=yes exit=0 a0=9fd9038 a1=bfdc09e0 a2=c4eff4 a3=bfdc09e0 items=0 ppid=8578 pid=8646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readlink" exe="/usr/bin/readlink" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774230.967:11622): path="/home" type=AVC msg=audit(1163774230.967:11623): avc: denied { search } for pid=8646 comm="readlink" name="home" dev=dm-0 ino=6547201 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:home_root_t:s0 tclass=dir type=SYSCALL msg=audit(1163774230.967:11623): arch=40000003 syscall=196 success=yes exit=0 a0=9fd9038 a1=bfdc09e0 a2=c4eff4 a3=bfdc09e0 items=0 ppid=8578 pid=8646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="readlink" exe="/usr/bin/readlink" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.155:11624): avc: denied { read } for pid=8658 comm="brctl" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163774231.155:11624): arch=40000003 syscall=33 success=yes exit=0 a0=c36d7e a1=4 a2=c4eff4 a3=c33980 items=0 ppid=8580 pid=8658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.155:11625): avc: denied { search } for pid=8658 comm="brctl" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163774231.155:11625): avc: denied { read } for pid=8658 comm="brctl" name="unix" dev=proc ino=-268433932 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.155:11625): arch=40000003 syscall=33 success=yes exit=0 a0=bff71b13 a1=4 a2=c4eff4 a3=c33980 items=0 ppid=8580 pid=8658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=ANOM_PROMISCUOUS msg=audit(1163774231.155:11626): dev=vif1.0 prom=256 old_prom=0 auid=4294967295 type=SYSCALL msg=audit(1163774231.155:11626): arch=40000003 syscall=54 success=yes exit=0 a0=3 a1=89a2 a2=bff71bb0 a3=1 items=0 ppid=8580 pid=8658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.159:11627): avc: denied { getattr } for pid=8580 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.159:11627): arch=40000003 syscall=195 success=yes exit=0 a0=893e740 a1=bf907eb0 a2=c4eff4 a3=893e740 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774231.159:11627): path="/sbin/iptables" type=AVC msg=audit(1163774231.179:11628): avc: denied { execute } for pid=8580 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.179:11628): arch=40000003 syscall=33 success=yes exit=0 a0=893e740 a1=1 a2=11 a3=893e740 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.183:11629): avc: denied { read } for pid=8580 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.183:11629): arch=40000003 syscall=33 success=yes exit=0 a0=893e740 a1=4 a2=ffffffff a3=893e740 items=0 ppid=8579 pid=8580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vif-bridge" exe="/bin/bash" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774231.183:11630): avc: denied { execute_no_trans } for pid=8660 comm="vif-bridge" name="iptables" dev=dm-0 ino=9984709 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774231.183:11630): arch=40000003 syscall=11 success=yes exit=0 a0=893e740 a1=89448c8 a2=8945318 a3=893e0a0 items=0 ppid=8580 pid=8660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774231.183:11630): path="/sbin/iptables" type=AVC msg=audit(1163774233.527:11631): avc: denied { write } for pid=8549 comm="gconfd-2" name=".gconfd" dev=dm-0 ino=13127148 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774233.527:11631): avc: denied { add_name } for pid=8549 comm="gconfd-2" name="saved_state.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774233.527:11631): avc: denied { create } for pid=8549 comm="gconfd-2" name="saved_state.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.527:11631): arch=40000003 syscall=5 success=yes exit=15 a0=9824658 a1=241 a2=1c0 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774233.647:11632): avc: denied { write } for pid=8549 comm="gconfd-2" name="saved_state.tmp" dev=dm-0 ino=13127393 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.647:11632): arch=40000003 syscall=4 success=yes exit=2546 a0=f a1=982ab28 a2=9f2 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774233.647:11632): path="/root/.gconfd/saved_state.tmp" type=AVC msg=audit(1163774233.647:11633): avc: denied { remove_name } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774233.647:11633): avc: denied { rename } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.647:11633): arch=40000003 syscall=38 success=yes exit=0 a0=964b2a0 a1=98298e8 a2=0 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774233.647:11634): avc: denied { unlink } for pid=8549 comm="gconfd-2" name="saved_state.orig" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774233.647:11634): arch=40000003 syscall=10 success=yes exit=0 a0=98298e8 a1=964b2a0 a2=412708 a3=9648330 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=ANOM_PROMISCUOUS msg=audit(1163774238.875:11635): dev=vif1.0 prom=0 old_prom=256 auid=4294967295 type=AVC msg=audit(1163774239.051:11636): avc: denied { connectto } for pid=8547 comm="python" name="xend-socket" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163774239.051:11636): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcc6020 a2=91324c a3=0 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774239.051:11636): path="/var/lib/xend/xend-socket" type=AVC msg=audit(1163774239.519:11637): avc: denied { sys_module } for pid=8734 comm="brctl" capability=16 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=capability type=SYSCALL msg=audit(1163774239.519:11637): arch=40000003 syscall=54 success=no exit=-19 a0=4 a1=8933 a2=bfd1a0ec a3=bfd1a0ec items=0 ppid=8673 pid=8734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="brctl" exe="/usr/sbin/brctl" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774239.803:11638): avc: denied { create } for pid=8757 comm="mkdir" name="block" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163774239.803:11638): arch=40000003 syscall=39 success=yes exit=0 a0=bf89be9f a1=1ff a2=804f258 a3=bf89be9f items=0 ppid=8742 pid=8757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="mkdir" exe="/bin/mkdir" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774240.011:11639): avc: denied { rmdir } for pid=8788 comm="rm" name="block" dev=dm-0 ino=14567776 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163774240.011:11639): arch=40000003 syscall=40 success=yes exit=0 a0=9d30140 a1=bff8b474 a2=805277c a3=2 items=0 ppid=8742 pid=8788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=system_u:system_r:udev_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774258.076:11640): avc: denied { read } for pid=8547 comm="python" name="gtkfilechooser" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774258.076:11640): arch=40000003 syscall=5 success=yes exit=20 a0=8b4b3c0 a1=8000 a2=0 a3=8000 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774259.836:11641): avc: denied { write } for pid=8547 comm="python" name="gtk-2.0" dev=dm-0 ino=13127391 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774259.836:11641): avc: denied { add_name } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774259.836:11641): avc: denied { create } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774259.836:11641): arch=40000003 syscall=5 success=yes exit=20 a0=8a72740 a1=80c2 a2=1b6 a3=80c2 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774259.836:11642): avc: denied { write } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774259.836:11642): arch=40000003 syscall=4 success=yes exit=96 a0=14 a1=b7f2f000 a2=60 a3=60 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774259.836:11642): path="/root/.config/gtk-2.0/gtkfilechooser.3C2NIT" type=AVC msg=audit(1163774259.836:11643): avc: denied { remove_name } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774259.836:11643): avc: denied { rename } for pid=8547 comm="python" name="gtkfilechooser.3C2NIT" dev=dm-0 ino=13127383 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=AVC msg=audit(1163774259.836:11643): avc: denied { unlink } for pid=8547 comm="python" name="gtkfilechooser" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774259.836:11643): arch=40000003 syscall=38 success=yes exit=0 a0=8a72b08 a1=8a72ac0 a2=412708 a3=b7f0f68c items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774295.471:11644): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="necko_file.xpt" dev=dm-0 ino=10737989 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774295.471:11644): arch=40000003 syscall=195 success=yes exit=0 a0=a9831b8 a1=bfae6ce8 a2=c4eff4 a3=bfae6ce8 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163774295.471:11644): path="/usr/lib/thunderbird-1.5.0.7/components/necko_file.xpt" type=AVC msg=audit(1163774295.511:11645): avc: denied { read } for pid=8368 comm="thunderbird-bin" name="necko_file.xpt" dev=dm-0 ino=10737989 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774295.511:11645): arch=40000003 syscall=5 success=yes exit=41 a0=a9831b8 a1=8000 a2=0 a3=8000 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163774296.723:11646): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=5466955 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774296.723:11646): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bfae855c a2=c4eff4 a3=0 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163774296.723:11646): path="/etc/localtime" type=AVC msg=audit(1163774327.793:11647): avc: denied { write } for pid=8549 comm="gconfd-2" name="apps" dev=dm-0 ino=13127161 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774327.793:11647): avc: denied { add_name } for pid=8549 comm="gconfd-2" name="virt-manager" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774327.793:11647): avc: denied { create } for pid=8549 comm="gconfd-2" name="virt-manager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163774327.793:11647): arch=40000003 syscall=39 success=yes exit=0 a0=9829a88 a1=1c0 a2=879820 a3=964b2a0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774327.813:11648): avc: denied { write } for pid=8549 comm="gconfd-2" name="virt-manager" dev=dm-0 ino=13127392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=AVC msg=audit(1163774327.813:11648): avc: denied { add_name } for pid=8549 comm="gconfd-2" name="%gconf.xml.new" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163774327.813:11648): arch=40000003 syscall=5 success=yes exit=15 a0=9826048 a1=41 a2=180 a3=964b2a0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774327.813:11649): avc: denied { remove_name } for pid=8549 comm="gconfd-2" name="%gconf.xml.new" dev=dm-0 ino=13127394 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163774327.813:11649): arch=40000003 syscall=38 success=yes exit=0 a0=9826048 a1=9829300 a2=879820 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163774401.437:11650): user pid=8807 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163774401.437:11651): login pid=8807 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163774401.477:11652): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163774401.477:11653): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163774401.501:11654): avc: denied { execute } for pid=8808 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163774401.501:11654): avc: denied { execute_no_trans } for pid=8808 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.501:11654): arch=40000003 syscall=11 success=yes exit=0 a0=a0661b0 a1=a066358 a2=a066290 a3=a066008 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.501:11654): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163774401.557:11655): avc: denied { execute } for pid=8808 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163774401.557:11655): avc: denied { execute_no_trans } for pid=8808 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163774401.557:11655): avc: denied { read } for pid=8808 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.557:11655): arch=40000003 syscall=11 success=yes exit=0 a0=972bd48 a1=972b740 a2=972bd60 a3=972b740 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.557:11655): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163774401.557:11655): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163774401.605:11656): avc: denied { search } for pid=8808 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163774401.605:11656): avc: denied { read } for pid=8808 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.605:11656): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=84397f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.605:11657): avc: denied { getattr } for pid=8808 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.605:11657): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff58088 a2=24bff4 a3=84397f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.605:11657): path="/proc/net/dev" type=AVC msg=audit(1163774401.605:11658): avc: denied { search } for pid=8808 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163774401.605:11658): arch=40000003 syscall=33 success=yes exit=0 a0=bff58434 a1=0 a2=bff58328 a3=bff58330 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.653:11659): avc: denied { read append } for pid=8808 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.653:11659): arch=40000003 syscall=5 success=yes exit=3 a0=bff58434 a1=402 a2=bff585f8 a3=bff58330 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.661:11660): avc: denied { search } for pid=8808 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163774401.661:11660): avc: denied { read } for pid=8808 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.661:11660): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=843a2f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.661:11661): avc: denied { getattr } for pid=8808 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.661:11661): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff57ee0 a2=24bff4 a3=843a2f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.661:11661): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163774401.661:11662): avc: denied { search } for pid=8808 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163774401.661:11662): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=843a2f8 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163774401.661:11663): avc: denied { lock } for pid=8808 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774401.661:11663): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bff58330 a3=3 items=0 ppid=8807 pid=8808 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163774401.661:11663): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163774401.761:11664): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163774401.761:11665): user pid=8807 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163774538.766:11666): avc: denied { write } for pid=8303 comm="yum" name="packages" dev=dm-0 ino=15288142 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163774538.766:11666): avc: denied { add_name } for pid=8303 comm="yum" name="openssh-clients-4.3p2-12.fc7.i386.rpm" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774538.766:11666): arch=40000003 syscall=5 success=yes exit=10 a0=c675da8 a1=8241 a2=1b6 a3=8ecbc20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774644.333:11667): avc: denied { ipc_lock } for pid=8547 comm="python" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774644.333:11667): arch=40000003 syscall=150 success=yes exit=0 a0=8c60e18 a1=84d0 a2=91324c a3=1f4 items=0 ppid=8544 pid=8547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="python" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774670.742:11668): avc: denied { dac_override } for pid=8303 comm="yum" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163774670.742:11668): arch=40000003 syscall=33 success=yes exit=0 a0=de62ed8 a1=2 a2=488b44 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.187:11669): avc: denied { read } for pid=8303 comm="yum" name="dhcpd.conf" dev=dm-0 ino=9331955 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dhcp_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.187:11669): arch=40000003 syscall=5 success=yes exit=15 a0=de7e588 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.315:11670): avc: denied { read } for pid=8303 comm="yum" name="dhcpd" dev=dm-0 ino=9331480 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.315:11670): arch=40000003 syscall=5 success=yes exit=15 a0=de7e588 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.379:11671): avc: denied { read } for pid=8303 comm="yum" name="dhcpd.leases" dev=dm-0 ino=14600286 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:dhcpd_state_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.379:11671): arch=40000003 syscall=5 success=yes exit=15 a0=de7e588 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774685.567:11672): avc: denied { read } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9330291 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774685.567:11672): arch=40000003 syscall=5 success=yes exit=15 a0=de7e730 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774712.025:11673): avc: denied { read } for pid=8303 comm="yum" name="yumex" dev=dm-0 ino=9331890 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163774712.025:11673): arch=40000003 syscall=5 success=yes exit=15 a0=dea5638 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774751.795:11674): avc: denied { read } for pid=8303 comm="yum" name="sysstat" dev=dm-0 ino=9330372 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_cron_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163774751.795:11674): arch=40000003 syscall=5 success=yes exit=15 a0=de7bd10 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774761.820:11675): avc: denied { read } for pid=8303 comm="yum" name="proxy_ajp.conf" dev=dm-0 ino=9330410 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163774761.820:11675): arch=40000003 syscall=5 success=yes exit=15 a0=de87b00 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774761.904:11676): avc: denied { read } for pid=8303 comm="yum" name="HTTP_BAD_GATEWAY.html.var" dev=dm-0 ino=14437217 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163774761.904:11676): arch=40000003 syscall=5 success=yes exit=15 a0=de87b00 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774762.652:11677): avc: denied { read } for pid=8303 comm="yum" name="auto.master" dev=dm-0 ino=9331354 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:automount_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774762.652:11677): arch=40000003 syscall=5 success=yes exit=15 a0=debb1f8 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774767.344:11678): avc: denied { read } for pid=8303 comm="yum" name="lvm.conf" dev=dm-0 ino=9331271 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774767.344:11678): arch=40000003 syscall=5 success=yes exit=15 a0=deb6488 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774767.860:11679): avc: denied { read } for pid=8303 comm="yum" name="etab" dev=dm-0 ino=14438235 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_nfs_t:s0 tclass=file type=SYSCALL msg=audit(1163774767.860:11679): arch=40000003 syscall=5 success=yes exit=15 a0=dea4970 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774774.257:11680): avc: denied { read } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14436943 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163774774.257:11680): arch=40000003 syscall=5 success=yes exit=15 a0=de88c98 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774774.941:11681): avc: denied { read } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163774774.941:11681): arch=40000003 syscall=5 success=yes exit=15 a0=de870d8 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774776.045:11682): avc: denied { read } for pid=8303 comm="yum" name="adjtime" dev=dm-0 ino=9330626 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:adjtime_t:s0 tclass=file type=SYSCALL msg=audit(1163774776.045:11682): arch=40000003 syscall=5 success=yes exit=15 a0=deb6280 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774776.073:11683): avc: denied { read } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331766 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774776.073:11683): arch=40000003 syscall=5 success=yes exit=15 a0=deb6280 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774786.425:11684): avc: denied { read } for pid=8303 comm="yum" name="aliases" dev=dm-0 ino=9329982 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_aliases_t:s0 tclass=file type=SYSCALL msg=audit(1163774786.425:11684): arch=40000003 syscall=5 success=yes exit=15 a0=de7f900 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774786.441:11685): avc: denied { read } for pid=8303 comm="yum" name="exports" dev=dm-0 ino=9329773 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:exports_t:s0 tclass=file type=SYSCALL msg=audit(1163774786.441:11685): arch=40000003 syscall=5 success=yes exit=15 a0=de7f900 a1=8000 a2=0 a3=8000 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774851.769:11686): avc: denied { search } for pid=8544 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774851.769:11686): avc: denied { write } for pid=8544 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774851.769:11686): avc: denied { remove_name } for pid=8544 comm="userhelper" name=".xauthTAYBaF" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163774851.769:11686): avc: denied { unlink } for pid=8544 comm="userhelper" name=".xauthTAYBaF" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163774851.769:11686): arch=40000003 syscall=10 success=yes exit=0 a0=90929d8 a1=90965ee a2=31dbc8 a3=9095bf8 items=0 ppid=8543 pid=8544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_END msg=audit(1163774851.805:11687): user pid=8544 uid=0 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session close acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163774861.786:11688): avc: denied { write } for pid=8303 comm="yum" name="lib" dev=dm-0 ino=13716385 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774861.786:11688): avc: denied { add_name } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774861.786:11688): avc: denied { create } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.786:11688): arch=40000003 syscall=5 success=yes exit=18 a0=deb2050 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.810:11689): avc: denied { write } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.810:11689): arch=40000003 syscall=4 success=yes exit=40960 a0=12 a1=e919f68 a2=a000 a3=e8f92b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774861.810:11689): path="/lib/libgcc_s-4.1.1-20061116.so.1;455dcb57" type=AVC msg=audit(1163774861.818:11690): avc: denied { remove_name } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774861.818:11690): avc: denied { rename } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1;455dcb57" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.818:11690): arch=40000003 syscall=38 success=yes exit=0 a0=deb2050 a1=b843910 a2=d2a040 a3=deb2050 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11691): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163774861.830:11691): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.830:11691): arch=40000003 syscall=227 success=yes exit=0 a0=b843910 a1=a2f0d3 a2=e84a0f8 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11692): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc_s-4.1.1-20061116.so.1" dev=dm-0 ino=13716392 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.830:11692): arch=40000003 syscall=212 success=yes exit=0 a0=b843910 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11693): avc: denied { create } for pid=8303 comm="yum" name="libgcc_s.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.830:11693): arch=40000003 syscall=83 success=yes exit=0 a0=e919f68 a1=e6c5990 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.830:11694): avc: denied { rename } for pid=8303 comm="yum" name="libgcc_s.so.1;455dcb57" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163774861.830:11694): avc: denied { unlink } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13717262 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.830:11694): arch=40000003 syscall=38 success=yes exit=0 a0=e6c5990 a1=e850608 a2=d2a040 a3=e6c5990 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.850:11695): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163774861.850:11695): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.850:11695): arch=40000003 syscall=227 success=yes exit=0 a0=e850608 a1=a2f0d3 a2=e6c5948 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.850:11696): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc_s.so.1" dev=dm-0 ino=13716398 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163774861.850:11696): arch=40000003 syscall=198 success=yes exit=0 a0=e850608 a1=0 a2=0 a3=e8fd684 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.850:11697): avc: denied { write } for pid=8303 comm="yum" name="sbin" dev=dm-0 ino=10311842 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163774861.850:11697): avc: denied { add_name } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163774861.850:11697): avc: denied { create } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.850:11697): arch=40000003 syscall=5 success=yes exit=18 a0=e85bde8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.890:11698): avc: denied { write } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.890:11698): arch=40000003 syscall=4 success=yes exit=1508 a0=12 a1=b6f50000 a2=5e4 a3=e85be18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774861.890:11698): path="/usr/sbin/libgcc_post_upgrade;455dcb57" type=AVC msg=audit(1163774861.890:11699): avc: denied { remove_name } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163774861.890:11699): avc: denied { rename } for pid=8303 comm="yum" name="libgcc_post_upgrade;455dcb57" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163774861.890:11699): avc: denied { unlink } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.890:11699): arch=40000003 syscall=38 success=yes exit=0 a0=e85bde8 a1=e6c5968 a2=d2a040 a3=e85bde8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.922:11700): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163774861.922:11700): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.922:11700): arch=40000003 syscall=227 success=yes exit=0 a0=e6c5968 a1=a2f0d3 a2=e85bdc8 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.922:11701): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc_post_upgrade" dev=dm-0 ino=10324310 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.922:11701): arch=40000003 syscall=212 success=yes exit=0 a0=e6c5968 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.926:11702): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.926:11702): avc: denied { relabelto } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774861.926:11702): arch=40000003 syscall=227 success=yes exit=0 a0=e85bdc8 a1=a2f0d3 a2=e096d70 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.926:11703): avc: denied { setattr } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774861.926:11703): arch=40000003 syscall=212 success=yes exit=0 a0=e85bdc8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.926:11704): avc: denied { write } for pid=8303 comm="yum" name="libgcc-4.1.1" dev=dm-0 ino=10608329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.926:11704): avc: denied { add_name } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.926:11704): avc: denied { create } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.926:11704): arch=40000003 syscall=5 success=yes exit=18 a0=e0cbb50 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.942:11705): avc: denied { write } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.942:11705): arch=40000003 syscall=4 success=yes exit=24576 a0=12 a1=e919f68 a2=6000 a3=e0cbb88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774861.942:11705): path="/usr/share/doc/libgcc-4.1.1/COPYING.LIB;455dcb57" type=AVC msg=audit(1163774861.950:11706): avc: denied { remove_name } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163774861.950:11706): avc: denied { rename } for pid=8303 comm="yum" name="COPYING.LIB;455dcb57" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=AVC msg=audit(1163774861.950:11706): avc: denied { unlink } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609151 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.950:11706): arch=40000003 syscall=38 success=yes exit=0 a0=e0cbb50 a1=e0cbb20 a2=d2a040 a3=e0cbb50 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.966:11707): avc: denied { relabelfrom } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=AVC msg=audit(1163774861.966:11707): avc: denied { relabelto } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.966:11707): arch=40000003 syscall=227 success=yes exit=0 a0=e0cbb20 a1=a2f0d3 a2=c1f0820 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774861.966:11708): avc: denied { setattr } for pid=8303 comm="yum" name="COPYING.LIB" dev=dm-0 ino=10609081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774861.966:11708): arch=40000003 syscall=212 success=yes exit=0 a0=e0cbb20 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774863.270:11709): avc: denied { setexec } for pid=8825 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163774863.270:11709): arch=40000003 syscall=4 success=no exit=-22 a0=1c a1=e91ca10 a2=20 a3=a2f751 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774863.282:11710): avc: denied { execute } for pid=8825 comm="libgcc_post_upg" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774863.282:11710): arch=40000003 syscall=33 success=yes exit=0 a0=80482e0 a1=1 a2=bff661f4 a3=1 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="libgcc_post_upg" exe="/usr/sbin/libgcc_post_upgrade" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774863.330:11711): avc: denied { execute_no_trans } for pid=8825 comm="libgcc_post_upg" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163774863.330:11711): avc: denied { read } for pid=8825 comm="libgcc_post_upg" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774863.330:11711): arch=40000003 syscall=11 success=yes exit=0 a0=80482e0 a1=bff66184 a2=bff661fc a3=1 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774863.330:11711): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163774863.330:11711): path="/sbin/ldconfig" type=AVC msg=audit(1163774863.614:11712): avc: denied { append } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127393 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163774863.614:11712): arch=40000003 syscall=5 success=yes exit=8 a0=96418f0 a1=441 a2=1b6 a3=964c020 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.060:11713): avc: denied { write } for pid=8825 comm="ldconfig" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.060:11713): avc: denied { add_name } for pid=8825 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.060:11713): avc: denied { create } for pid=8825 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.060:11713): arch=40000003 syscall=5 success=yes exit=3 a0=9b9eb20 a1=20241 a2=1a4 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.084:11714): avc: denied { write } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.084:11714): arch=40000003 syscall=4 success=yes exit=17824 a0=3 a1=9bb3030 a2=45a0 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774899.084:11714): path="/etc/ld.so.cache~" type=AVC msg=audit(1163774899.084:11715): avc: denied { setattr } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.084:11715): arch=40000003 syscall=15 success=yes exit=0 a0=9b9eb20 a1=1a4 a2=bfcb9ce0 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.084:11716): avc: denied { remove_name } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.084:11716): avc: denied { rename } for pid=8825 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163774899.084:11716): avc: denied { unlink } for pid=8825 comm="ldconfig" name="ld.so.cache" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.084:11716): arch=40000003 syscall=38 success=yes exit=0 a0=9b9eb20 a1=bfcb9d60 a2=bfcb9ce0 a3=9b9eb20 items=0 ppid=8303 pid=8825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.128:11717): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.128:11717): arch=40000003 syscall=4 success=yes exit=46 a0=4 a1=b7bd1000 a2=2e a3=2e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774899.128:11717): path="/var/log/yum.log" type=AVC msg=audit(1163774899.232:11718): avc: denied { relabelfrom } for pid=8303 comm="yum" name="xdg" dev=dm-0 ino=9329898 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163774899.232:11718): avc: denied { relabelto } for pid=8303 comm="yum" name="xdg" dev=dm-0 ino=9329898 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163774899.232:11718): arch=40000003 syscall=227 success=yes exit=0 a0=dea5808 a1=a2f0d3 a2=e0cb6e0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.232:11719): avc: denied { setattr } for pid=8303 comm="yum" name="xdg" dev=dm-0 ino=9329898 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163774899.232:11719): arch=40000003 syscall=212 success=yes exit=0 a0=dea5808 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.236:11720): avc: denied { unlink } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330099 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.236:11720): arch=40000003 syscall=38 success=yes exit=0 a0=c287538 a1=c287568 a2=d2a040 a3=c287538 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.236:11721): avc: denied { relabelfrom } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163774899.236:11721): avc: denied { relabelto } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.236:11721): arch=40000003 syscall=227 success=yes exit=0 a0=c287568 a1=a2f0d3 a2=c287538 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.236:11722): avc: denied { setattr } for pid=8303 comm="yum" name="applications.menu" dev=dm-0 ino=9330329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.236:11722): arch=40000003 syscall=212 success=yes exit=0 a0=c287568 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.480:11723): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311907 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774899.480:11723): avc: denied { add_name } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774899.480:11723): avc: denied { create } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.480:11723): arch=40000003 syscall=5 success=yes exit=29 a0=d7acf80 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.488:11724): avc: denied { write } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.488:11724): arch=40000003 syscall=4 success=yes exit=6092 a0=1d a1=b6f50000 a2=17cc a3=d7acfc0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774899.488:11724): path="/usr/share/locale/af/LC_MESSAGES/redhat-menus.mo;455dcb57" type=AVC msg=audit(1163774899.488:11725): avc: denied { remove_name } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774899.488:11725): avc: denied { rename } for pid=8303 comm="yum" name="redhat-menus.mo;455dcb57" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1163774899.488:11725): avc: denied { unlink } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10339841 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.488:11725): arch=40000003 syscall=38 success=yes exit=0 a0=d7acf80 a1=d7acf48 a2=d2a040 a3=d7acf80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.504:11726): avc: denied { relabelfrom } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1163774899.504:11726): avc: denied { relabelto } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.504:11726): arch=40000003 syscall=227 success=yes exit=0 a0=d7acf48 a1=a2f0d3 a2=d7ae9b0 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774899.504:11727): avc: denied { setattr } for pid=8303 comm="yum" name="redhat-menus.mo" dev=dm-0 ino=10316014 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774899.504:11727): arch=40000003 syscall=212 success=yes exit=0 a0=d7acf48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.713:11728): avc: denied { setattr } for pid=8827 comm="update-desktop-" name=".mimeinfo.cache.6JNWIT" dev=dm-0 ino=10316943 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.713:11728): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=1a4 a3=9fbdf50 items=0 ppid=8826 pid=8827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.713:11729): avc: denied { unlink } for pid=8827 comm="update-desktop-" name="mimeinfo.cache" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.713:11729): arch=40000003 syscall=38 success=yes exit=0 a0=9fcc528 a1=9fcccc0 a2=1a4 a3=9fbdf50 items=0 ppid=8826 pid=8827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.737:11730): avc: denied { read } for pid=8434 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163774912.737:11730): arch=40000003 syscall=3 success=yes exit=416 a0=21 a1=9c76020 a2=400 a3=400 items=0 ppid=1 pid=8434 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163774912.737:11730): path="inotify" type=AVC msg=audit(1163774912.825:11731): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163774912.825:11731): avc: denied { add_name } for pid=8303 comm="yum" name="urlgrabber;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163774912.825:11731): avc: denied { create } for pid=8303 comm="yum" name="urlgrabber;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.825:11731): arch=40000003 syscall=5 success=yes exit=30 a0=e928150 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.853:11732): avc: denied { write } for pid=8303 comm="yum" name="urlgrabber;455dcb57" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.853:11732): arch=40000003 syscall=4 success=yes exit=4868 a0=1e a1=b6f50000 a2=1304 a3=c255100 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774912.853:11732): path="/usr/bin/urlgrabber;455dcb57" type=AVC msg=audit(1163774912.853:11733): avc: denied { remove_name } for pid=8303 comm="yum" name="urlgrabber;455dcb57" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163774912.853:11733): avc: denied { rename } for pid=8303 comm="yum" name="urlgrabber;455dcb57" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163774912.853:11733): avc: denied { unlink } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10324363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.853:11733): arch=40000003 syscall=38 success=yes exit=0 a0=e928150 a1=c255328 a2=d2a040 a3=e928150 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.885:11734): avc: denied { relabelfrom } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163774912.885:11734): avc: denied { relabelto } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.885:11734): arch=40000003 syscall=227 success=yes exit=0 a0=c255328 a1=a2f0d3 a2=c287558 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.889:11735): avc: denied { setattr } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10323600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.889:11735): arch=40000003 syscall=212 success=yes exit=0 a0=c255328 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.889:11736): avc: denied { relabelfrom } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10609112 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163774912.889:11736): avc: denied { relabelto } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10609112 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163774912.889:11736): arch=40000003 syscall=227 success=yes exit=0 a0=e255cd8 a1=a2f0d3 a2=e254fe0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.889:11737): avc: denied { setattr } for pid=8303 comm="yum" name="urlgrabber" dev=dm-0 ino=10609112 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163774912.889:11737): arch=40000003 syscall=212 success=yes exit=0 a0=e255cd8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.897:11738): avc: denied { unlink } for pid=8303 comm="yum" name="__init__.py" dev=dm-0 ino=10608633 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.897:11738): arch=40000003 syscall=38 success=yes exit=0 a0=e279690 a1=e278050 a2=d2a040 a3=e279690 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.905:11739): avc: denied { relabelto } for pid=8303 comm="yum" name="__init__.py" dev=dm-0 ino=10609082 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.905:11739): arch=40000003 syscall=227 success=yes exit=0 a0=e278050 a1=a2f0d3 a2=db63178 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774912.905:11740): avc: denied { setattr } for pid=8303 comm="yum" name="__init__.py" dev=dm-0 ino=10609082 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163774912.905:11740): arch=40000003 syscall=212 success=yes exit=0 a0=e278050 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774913.941:11741): avc: denied { unlink } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774913.941:11741): arch=40000003 syscall=38 success=yes exit=0 a0=c254478 a1=c22e658 a2=d2a040 a3=c254478 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774913.985:11742): avc: denied { relabelto } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=10324363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774913.985:11742): arch=40000003 syscall=227 success=yes exit=0 a0=c22e658 a1=a2f0d3 a2=c254f90 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774913.985:11743): avc: denied { setattr } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=10324363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163774913.985:11743): arch=40000003 syscall=212 success=yes exit=0 a0=c22e658 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.765:11744): avc: denied { write } for pid=8303 comm="yum" name="man5" dev=dm-0 ino=10311893 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163774914.765:11744): avc: denied { add_name } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163774914.765:11744): avc: denied { create } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.765:11744): arch=40000003 syscall=5 success=yes exit=30 a0=c2044e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.785:11745): avc: denied { write } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11745): arch=40000003 syscall=4 success=yes exit=5173 a0=1e a1=b6f50000 a2=1435 a3=c205528 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163774914.785:11745): path="/usr/share/man/man5/yum.conf.5.gz;455dcb57" type=AVC msg=audit(1163774914.785:11746): avc: denied { remove_name } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163774914.785:11746): avc: denied { rename } for pid=8303 comm="yum" name="yum.conf.5.gz;455dcb57" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163774914.785:11746): avc: denied { unlink } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321857 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11746): arch=40000003 syscall=38 success=yes exit=0 a0=c2044e0 a1=c205430 a2=d2a040 a3=c2044e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.785:11747): avc: denied { relabelfrom } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163774914.785:11747): avc: denied { relabelto } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11747): arch=40000003 syscall=227 success=yes exit=0 a0=c205430 a1=a2f0d3 a2=c205468 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.785:11748): avc: denied { setattr } for pid=8303 comm="yum" name="yum.conf.5.gz" dev=dm-0 ino=10321123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163774914.785:11748): arch=40000003 syscall=212 success=yes exit=0 a0=c205430 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.929:11749): avc: denied { relabelfrom } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=14436582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=AVC msg=audit(1163774914.929:11749): avc: denied { relabelto } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=14436582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774914.929:11749): arch=40000003 syscall=227 success=yes exit=0 a0=c207f60 a1=a2f0d3 a2=c206e60 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774914.957:11750): avc: denied { setattr } for pid=8303 comm="yum" name="yum" dev=dm-0 ino=14436582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=dir type=SYSCALL msg=audit(1163774914.957:11750): arch=40000003 syscall=212 success=yes exit=0 a0=c207f60 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.238:11751): avc: denied { create } for pid=8303 comm="yum" name="tzdata-2006o" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.238:11751): arch=40000003 syscall=39 success=yes exit=0 a0=d7da450 a1=1c0 a2=d2a040 a3=d7da450 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.298:11752): avc: denied { relabelfrom } for pid=8303 comm="yum" name="tzdata-2006o" dev=dm-0 ino=11098958 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.298:11752): arch=40000003 syscall=227 success=yes exit=0 a0=d7da450 a1=a2f0d3 a2=ccc2bc0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.330:11753): avc: denied { relabelfrom } for pid=8303 comm="yum" name="zoneinfo" dev=dm-0 ino=10312131 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163774927.330:11753): avc: denied { relabelto } for pid=8303 comm="yum" name="zoneinfo" dev=dm-0 ino=10312131 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.330:11753): arch=40000003 syscall=227 success=yes exit=0 a0=ccc2be0 a1=a2f0d3 a2=c227a70 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774927.358:11754): avc: denied { setattr } for pid=8303 comm="yum" name="zoneinfo" dev=dm-0 ino=10312131 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163774927.358:11754): arch=40000003 syscall=212 success=yes exit=0 a0=ccc2be0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774930.114:11755): avc: denied { link } for pid=8303 comm="yum" name="Yap;455dcb57" dev=dm-0 ino=10313177 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774930.114:11755): arch=40000003 syscall=9 success=yes exit=0 a0=e402dd8 a1=e402e10 a2=d2a040 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774930.118:11756): avc: denied { rename } for pid=8303 comm="yum" name="Yap;455dcb57" dev=dm-0 ino=10313177 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774930.118:11756): arch=40000003 syscall=38 success=yes exit=0 a0=e402dd8 a1=e4029b8 a2=d2a040 a3=e402dd8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163774930.118:11757): avc: denied { relabelfrom } for pid=8303 comm="yum" name="Yap" dev=dm-0 ino=10313177 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163774930.118:11757): arch=40000003 syscall=227 success=yes exit=0 a0=e4029b8 a1=a2f0d3 a2=e402cf8 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163775002.259:11758): user pid=8837 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163775002.259:11759): login pid=8837 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163775002.279:11760): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163775002.283:11761): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775002.291:11762): avc: denied { execute } for pid=8839 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775002.291:11762): avc: denied { execute_no_trans } for pid=8839 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.291:11762): arch=40000003 syscall=11 success=yes exit=0 a0=91971b0 a1=9197358 a2=9197290 a3=9197008 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775002.291:11762): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163775002.355:11763): avc: denied { execute } for pid=8839 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775002.355:11763): avc: denied { execute_no_trans } for pid=8839 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775002.355:11763): avc: denied { read } for pid=8839 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.355:11763): arch=40000003 syscall=11 success=yes exit=0 a0=89d9d48 a1=89d9740 a2=89d9d60 a3=89d9740 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775002.355:11763): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163775002.355:11763): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163775002.423:11764): avc: denied { search } for pid=8839 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775002.423:11764): arch=40000003 syscall=33 success=yes exit=0 a0=bfc260f4 a1=0 a2=bfc25fe8 a3=bfc25ff0 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.531:11765): avc: denied { read append } for pid=8839 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.531:11765): arch=40000003 syscall=5 success=yes exit=3 a0=bfc260f4 a1=402 a2=bfc262b8 a3=bfc25ff0 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.539:11766): avc: denied { search } for pid=8839 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1163775002.539:11766): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=84232f8 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.539:11767): avc: denied { search } for pid=8839 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775002.539:11767): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=84232f8 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775002.539:11768): avc: denied { lock } for pid=8839 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775002.539:11768): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc25ff0 a3=3 items=0 ppid=8837 pid=8839 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775002.539:11768): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163775003.011:11769): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163775003.011:11770): user pid=8837 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775034.029:11771): avc: denied { unlink } for pid=8840 comm="build-locale-ar" name="locale-archive" dev=dm-0 ino=10328905 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775034.029:11771): arch=40000003 syscall=10 success=yes exit=0 a0=80a5a29 a1=bfb61bb0 a2=0 a3=20612 items=0 ppid=8303 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="build-locale-ar" exe="/usr/sbin/build-locale-archive" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775034.033:11772): avc: denied { unlink } for pid=8840 comm="build-locale-ar" name="locale-archive.4nRZQd" dev=dm-0 ino=10314302 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775034.033:11772): arch=40000003 syscall=10 success=yes exit=0 a0=bfb506d0 a1=bfb50780 a2=bfb50714 a3=3 items=0 ppid=8303 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="build-locale-ar" exe="/usr/sbin/build-locale-archive" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775034.033:11773): avc: denied { setattr } for pid=8840 comm="build-locale-ar" name="locale-archive.4nRZQd" dev=dm-0 ino=10314302 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775034.033:11773): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=bfb50714 a3=3 items=0 ppid=8303 pid=8840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="build-locale-ar" exe="/usr/sbin/build-locale-archive" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.950:11774): avc: denied { unlink } for pid=8303 comm="yum" name="libc-2.5.90.so" dev=dm-0 ino=13716387 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.950:11774): arch=40000003 syscall=38 success=yes exit=0 a0=c1f8440 a1=e5b3590 a2=d2a040 a3=c1f8440 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.970:11775): avc: denied { unlink } for pid=8303 comm="yum" name="ld-2.5.90.so" dev=dm-0 ino=13716438 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.970:11775): arch=40000003 syscall=38 success=yes exit=0 a0=e5aad20 a1=e593780 a2=d2a040 a3=e5aad20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.970:11776): avc: denied { relabelto } for pid=8303 comm="yum" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.970:11776): arch=40000003 syscall=227 success=yes exit=0 a0=e593780 a1=a2f0d3 a2=e5b7f88 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775049.970:11777): avc: denied { setattr } for pid=8303 comm="yum" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163775049.970:11777): arch=40000003 syscall=212 success=yes exit=0 a0=e593780 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775050.510:11778): avc: denied { unlink } for pid=8303 comm="yum" name="ldconfig" dev=dm-0 ino=9984594 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775050.510:11778): arch=40000003 syscall=38 success=yes exit=0 a0=e5acd30 a1=e593780 a2=d2a040 a3=e5acd30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775050.534:11779): avc: denied { relabelto } for pid=8303 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775050.534:11779): arch=40000003 syscall=227 success=yes exit=0 a0=e593780 a1=a2f0d3 a2=db631a8 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775050.534:11780): avc: denied { setattr } for pid=8303 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775050.534:11780): arch=40000003 syscall=212 success=yes exit=0 a0=e593780 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775051.746:11781): avc: denied { unlink } for pid=8303 comm="yum" name="gconv-modules.cache" dev=dm-0 ino=10387675 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775051.746:11781): arch=40000003 syscall=38 success=yes exit=0 a0=e59f300 a1=e5b1170 a2=d2a040 a3=e59f300 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775051.906:11782): avc: denied { relabelfrom } for pid=8303 comm="yum" name="getconf" dev=dm-0 ino=10377557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775051.906:11782): avc: denied { relabelto } for pid=8303 comm="yum" name="getconf" dev=dm-0 ino=10377557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775051.906:11782): arch=40000003 syscall=227 success=yes exit=0 a0=e5b4328 a1=a2f0d3 a2=e59beb0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775051.906:11783): avc: denied { setattr } for pid=8303 comm="yum" name="getconf" dev=dm-0 ino=10377557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775051.906:11783): arch=40000003 syscall=212 success=yes exit=0 a0=e5b4328 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775052.094:11784): avc: denied { link } for pid=8303 comm="yum" name="iconvconfig.i686;455dcb57" dev=dm-0 ino=10314303 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775052.094:11784): arch=40000003 syscall=9 success=yes exit=0 a0=e5b6ff0 a1=e5b7018 a2=d2a040 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775052.098:11785): avc: denied { rename } for pid=8303 comm="yum" name="iconvconfig.i686;455dcb57" dev=dm-0 ino=10314303 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775052.098:11785): arch=40000003 syscall=38 success=yes exit=0 a0=e5b7540 a1=e5b4af0 a2=d2a040 a3=e5b7540 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775052.102:11786): avc: denied { relabelfrom } for pid=8303 comm="yum" name="iconvconfig.i686" dev=dm-0 ino=10314303 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775052.102:11786): arch=40000003 syscall=227 success=yes exit=0 a0=e5b4af0 a1=a2f0d3 a2=e5b7568 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.051:11787): avc: denied { unlink } for pid=8845 comm="ldconfig" name="ld.so.cache" dev=dm-0 ino=9330919 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.051:11787): arch=40000003 syscall=38 success=yes exit=0 a0=821bb20 a1=bfcaace0 a2=bfcaac60 a3=821bb20 items=0 ppid=8844 pid=8845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.115:11788): avc: denied { write } for pid=8844 comm="glibc_post_upgr" name="gconv-modules.cache" dev=dm-0 ino=10386338 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.115:11788): arch=40000003 syscall=271 success=yes exit=0 a0=809f933 a1=0 a2=0 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.155:11789): avc: denied { setattr } for pid=8846 comm="iconvconfig.i68" name="gconv-modules.cache.RsaIv0" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.155:11789): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=6374 a3=bff33014 items=0 ppid=8844 pid=8846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="iconvconfig.i68" exe="/usr/sbin/iconvconfig.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.155:11790): avc: denied { execute } for pid=8844 comm="glibc_post_upgr" name="init" dev=dm-0 ino=9984714 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.155:11790): arch=40000003 syscall=33 success=yes exit=0 a0=809f956 a1=1 a2=3 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.183:11791): avc: denied { sys_ptrace } for pid=8844 comm="glibc_post_upgr" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163775060.183:11791): avc: denied { ptrace } for pid=8844 comm="glibc_post_upgr" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163775060.183:11791): arch=40000003 syscall=85 success=yes exit=10 a0=809f971 a1=bf9be038 a2=100 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.183:11792): avc: denied { read } for pid=8844 comm="glibc_post_upgr" name="init" dev=dm-0 ino=9984714 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.183:11792): arch=40000003 syscall=5 success=yes exit=3 a0=809f971 a1=0 a2=bf9bcfe3 a3=1 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.187:11793): avc: denied { execute_no_trans } for pid=8847 comm="glibc_post_upgr" name="init" dev=dm-0 ino=9984714 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.187:11793): arch=40000003 syscall=11 success=yes exit=0 a0=809f956 a1=809fa98 a2=bf9be44c a3=bf9bd020 items=0 ppid=8844 pid=8847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="telinit" exe="/sbin/init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775060.187:11793): path="/sbin/init" type=AVC msg=audit(1163775060.331:11794): avc: denied { write } for pid=8847 comm="telinit" name="initctl" dev=tmpfs ino=1148 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initctl_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775060.331:11794): arch=40000003 syscall=5 success=yes exit=3 a0=804f07f a1=1 a2=0 a3=bffc9bdd items=0 ppid=8844 pid=8847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="telinit" exe="/sbin/init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.427:11795): avc: denied { execute } for pid=8844 comm="glibc_post_upgr" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.427:11795): arch=40000003 syscall=33 success=yes exit=0 a0=809f998 a1=1 a2=bf9be038 a3=bf9bd020 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775060.427:11796): avc: denied { read } for pid=8844 comm="glibc_post_upgr" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775060.427:11796): arch=40000003 syscall=5 success=yes exit=3 a0=809f998 a1=0 a2=14 a3=1 items=0 ppid=8303 pid=8844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="glibc_post_upgr" exe="/usr/sbin/glibc_post_upgrade.i686" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.075:11797): avc: denied { execute } for pid=8849 comm="service" name="sshd" dev=dm-0 ino=9331582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.075:11797): arch=40000003 syscall=33 success=yes exit=0 a0=8696c30 a1=1 a2=1 a3=86932b0 items=0 ppid=8844 pid=8849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.131:11798): avc: denied { execute_no_trans } for pid=8856 comm="env" name="sshd" dev=dm-0 ino=9331582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.131:11798): arch=40000003 syscall=11 success=yes exit=0 a0=bfefbbf3 a1=bfefb978 a2=98f4858 a3=5 items=0 ppid=8849 pid=8856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.131:11798): path="/etc/rc.d/init.d/sshd" type=AVC msg=audit(1163775061.151:11799): avc: denied { ioctl } for pid=8856 comm="sshd" name="sshd" dev=dm-0 ino=9331582 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.151:11799): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf9c0d08 a3=bf9c0d48 items=0 ppid=8849 pid=8856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.151:11799): path="/etc/rc.d/init.d/sshd" type=AVC msg=audit(1163775061.275:11800): avc: denied { execute_no_trans } for pid=8864 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.275:11800): arch=40000003 syscall=11 success=yes exit=0 a0=81761d0 a1=81761e8 a2=81658e0 a3=8176070 items=0 ppid=8856 pid=8864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.275:11800): path="/usr/sbin/sshd" type=AVC msg=audit(1163775061.483:11801): avc: denied { read } for pid=8864 comm="sshd" name="ssh_host_rsa_key" dev=dm-0 ino=9331557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.483:11801): arch=40000003 syscall=5 success=yes exit=3 a0=62e425 a1=8000 a2=0 a3=8000 items=0 ppid=8856 pid=8864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.579:11802): avc: denied { read } for pid=8865 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.579:11802): arch=40000003 syscall=5 success=yes exit=3 a0=8177b90 a1=8000 a2=0 a3=8000 items=0 ppid=8856 pid=8865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.599:11803): avc: denied { ioctl } for pid=8865 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.599:11803): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bf9bd1d8 a3=bf9bd218 items=0 ppid=8856 pid=8865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775061.599:11803): path="/var/run/sshd.pid" type=AVC msg=audit(1163775061.611:11804): avc: denied { signal } for pid=8856 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775061.611:11804): arch=40000003 syscall=37 success=yes exit=0 a0=888 a1=f a2=888 a3=888 items=0 ppid=8849 pid=8856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sshd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775061.811:11805): avc: denied { write } for pid=8868 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775061.811:11805): avc: denied { remove_name } for pid=8868 comm="rm" name="sshd" dev=dm-0 ino=14436998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775061.811:11805): avc: denied { unlink } for pid=8868 comm="rm" name="sshd" dev=dm-0 ino=14436998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775061.811:11805): arch=40000003 syscall=10 success=yes exit=0 a0=bf9f2f87 a1=0 a2=805277c a3=bf9f0fe4 items=0 ppid=8856 pid=8868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.915:11806): avc: denied { write } for pid=8870 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.915:11806): arch=40000003 syscall=5 success=yes exit=4 a0=9be2060 a1=8201 a2=0 a3=8201 items=0 ppid=8856 pid=8870 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11807): avc: denied { node_bind } for pid=8872 comm="sshd" src=22 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163775064.931:11807): avc: denied { net_bind_service } for pid=8872 comm="sshd" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775064.931:11807): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf895ed0 a2=dec7ac a3=9f1f3e8 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11808): avc: denied { node_bind } for pid=8872 comm="sshd" src=22 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163775064.931:11808): arch=40000003 syscall=102 success=no exit=-98 a0=2 a1=bf895ed0 a2=dec7ac a3=9f1f428 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11809): avc: denied { write } for pid=8872 comm="sshd" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775064.931:11809): avc: denied { add_name } for pid=8872 comm="sshd" name="sshd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775064.931:11809): avc: denied { create } for pid=8872 comm="sshd" name="sshd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.931:11809): arch=40000003 syscall=5 success=yes exit=4 a0=dd8459 a1=8241 a2=1b6 a3=9f20f10 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.931:11810): avc: denied { write } for pid=8872 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.931:11810): arch=40000003 syscall=4 success=yes exit=5 a0=4 a1=b7fe4000 a2=5 a3=5 items=0 ppid=8871 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775064.931:11810): path="/var/run/sshd.pid" type=AVC msg=audit(1163775064.947:11811): avc: denied { add_name } for pid=8873 comm="touch" name="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775064.947:11811): avc: denied { create } for pid=8873 comm="touch" name="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.947:11811): arch=40000003 syscall=5 success=yes exit=0 a0=bfb21f81 a1=8941 a2=1b6 a3=8941 items=0 ppid=8856 pid=8873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775064.947:11812): avc: denied { write } for pid=8873 comm="touch" name="sshd" dev=dm-0 ino=14436998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775064.947:11812): arch=40000003 syscall=271 success=yes exit=0 a0=bfb1ffa4 a1=0 a2=f9fff4 a3=0 items=0 ppid=8856 pid=8873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775068.911:11813): avc: denied { execute } for pid=8874 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775068.911:11813): avc: denied { execute_no_trans } for pid=8874 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775068.911:11813): avc: denied { read } for pid=8874 comm="yum" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775068.911:11813): arch=40000003 syscall=11 success=yes exit=0 a0=e531ba9 a1=bf87ad90 a2=892c7d0 a3=ffffffff items=0 ppid=8303 pid=8874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775068.911:11813): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163775068.911:11813): path="/sbin/ldconfig" type=AVC msg=audit(1163775072.343:11814): avc: denied { write } for pid=8879 comm="install-info" name="dir" dev=dm-0 ino=10318269 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775072.343:11814): arch=40000003 syscall=5 success=yes exit=3 a0=bffe1be2 a1=241 a2=1b6 a3=98d61c0 items=0 ppid=8878 pid=8879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="install-info" exe="/sbin/install-info" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775073.899:11815): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775073.899:11815): arch=40000003 syscall=3 success=yes exit=60 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775073.899:11815): path="/dev/net/tun" type=AVC msg=audit(1163775073.987:11816): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775073.987:11816): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775073.987:11816): path="/dev/net/tun" type=AVC msg=audit(1163775079.260:11817): avc: denied { unlink } for pid=8303 comm="yum" name="ls" dev=dm-0 ino=13683777 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.260:11817): arch=40000003 syscall=38 success=yes exit=0 a0=e4cbd80 a1=d7d49b0 a2=d2a040 a3=e4cbd80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.272:11818): avc: denied { relabelto } for pid=8303 comm="yum" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.272:11818): arch=40000003 syscall=227 success=yes exit=0 a0=d7d49b0 a1=a2f0d3 a2=b4ae160 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.272:11819): avc: denied { setattr } for pid=8303 comm="yum" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.272:11819): arch=40000003 syscall=212 success=yes exit=0 a0=d7d49b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.400:11820): avc: denied { unlink } for pid=8303 comm="yum" name="su" dev=dm-0 ino=13683660 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.400:11820): arch=40000003 syscall=38 success=yes exit=0 a0=e4cc770 a1=d7d49b0 a2=d2a040 a3=e4cc770 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.408:11821): avc: denied { relabelto } for pid=8303 comm="yum" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.408:11821): arch=40000003 syscall=227 success=yes exit=0 a0=d7d49b0 a1=a2f0d3 a2=b4ae160 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.408:11822): avc: denied { setattr } for pid=8303 comm="yum" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775079.408:11822): arch=40000003 syscall=212 success=yes exit=0 a0=d7d49b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.728:11823): avc: denied { create } for pid=8303 comm="yum" name="cut;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.728:11823): arch=40000003 syscall=83 success=yes exit=0 a0=e5e2e98 a1=e629fc0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.728:11824): avc: denied { rename } for pid=8303 comm="yum" name="cut;455dcb57" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775079.728:11824): avc: denied { unlink } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=654845 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.728:11824): arch=40000003 syscall=38 success=yes exit=0 a0=e629fc0 a1=e6255e0 a2=d2a040 a3=e629fc0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.768:11825): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775079.768:11825): avc: denied { relabelto } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.768:11825): arch=40000003 syscall=227 success=yes exit=0 a0=e6255e0 a1=a2f0d3 a2=e629fe0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775079.768:11826): avc: denied { setattr } for pid=8303 comm="yum" name="cut" dev=dm-0 ino=10314339 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775079.768:11826): arch=40000003 syscall=198 success=yes exit=0 a0=e6255e0 a1=0 a2=0 a3=e9184bc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.896:11827): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311907 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775080.896:11827): avc: denied { add_name } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.896:11827): arch=40000003 syscall=5 success=yes exit=30 a0=e6425b0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.896:11828): avc: denied { remove_name } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" dev=dm-0 ino=10318523 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.896:11828): arch=40000003 syscall=38 success=yes exit=0 a0=e6425b0 a1=e642478 a2=d2a040 a3=e6425b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.900:11829): avc: denied { relabelfrom } for pid=8303 comm="yum" name="LC_TIME" dev=dm-0 ino=10543998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775080.900:11829): avc: denied { relabelto } for pid=8303 comm="yum" name="LC_TIME" dev=dm-0 ino=10543998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.900:11829): arch=40000003 syscall=227 success=yes exit=0 a0=e642538 a1=a2f0d3 a2=e642588 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.900:11830): avc: denied { setattr } for pid=8303 comm="yum" name="LC_TIME" dev=dm-0 ino=10543998 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775080.900:11830): arch=40000003 syscall=212 success=yes exit=0 a0=e642538 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.900:11831): avc: denied { create } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.900:11831): arch=40000003 syscall=83 success=yes exit=0 a0=e5e2e98 a1=e642620 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.916:11832): avc: denied { rename } for pid=8303 comm="yum" name="coreutils.mo;455dcb57" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=lnk_file type=AVC msg=audit(1163775080.916:11832): avc: denied { unlink } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10548217 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.916:11832): arch=40000003 syscall=38 success=yes exit=0 a0=e642620 a1=e6425f0 a2=d2a040 a3=e642620 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.924:11833): avc: denied { relabelfrom } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=lnk_file type=AVC msg=audit(1163775080.924:11833): avc: denied { relabelto } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.924:11833): arch=40000003 syscall=227 success=yes exit=0 a0=e6425f0 a1=a2f0d3 a2=e642538 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775080.924:11834): avc: denied { setattr } for pid=8303 comm="yum" name="coreutils.mo" dev=dm-0 ino=10542613 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775080.924:11834): arch=40000003 syscall=198 success=yes exit=0 a0=e6425f0 a1=0 a2=0 a3=e9184bc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775086.344:11835): avc: denied { unlink } for pid=8885 comm="mv" name="dir" dev=dm-0 ino=10318269 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775086.344:11835): arch=40000003 syscall=38 success=yes exit=0 a0=bff70bda a1=bff70bf8 a2=805a75c a3=bff706ec items=0 ppid=8883 pid=8885 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mv" exe="/bin/mv" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775087.908:11836): avc: denied { rmdir } for pid=8889 comm="rm" name="ro" dev=dm-0 ino=10672443 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775087.908:11836): arch=40000003 syscall=40 success=yes exit=0 a0=9937960 a1=bfa45c34 a2=805277c a3=2 items=0 ppid=8888 pid=8889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775088.528:11837): avc: denied { relabelfrom } for pid=8303 comm="yum" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775088.528:11837): avc: denied { relabelto } for pid=8303 comm="yum" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775088.528:11837): arch=40000003 syscall=227 success=yes exit=0 a0=e9aff48 a1=a2f0d3 a2=ea04d08 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775088.528:11838): avc: denied { setattr } for pid=8303 comm="yum" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775088.528:11838): arch=40000003 syscall=212 success=yes exit=0 a0=e9aff48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.380:11839): avc: denied { append } for pid=8891 comm="sh" name="scrollkeeper.log" dev=dm-0 ino=14436937 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775090.380:11839): arch=40000003 syscall=5 success=yes exit=3 a0=93a7168 a1=8441 a2=1b6 a3=8441 items=0 ppid=8890 pid=8891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.416:11840): avc: denied { write } for pid=8895 comm="rm" name="lib" dev=dm-0 ino=14436578 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775090.416:11840): arch=40000003 syscall=10 success=no exit=-21 a0=bf9d5bf6 a1=0 a2=805277c a3=bf9d43d4 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.440:11841): avc: denied { write } for pid=8895 comm="rm" name="ro" dev=dm-0 ino=14438156 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775090.440:11841): avc: denied { remove_name } for pid=8895 comm="rm" name="scrollkeeper_cl.xml" dev=dm-0 ino=2618897 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775090.440:11841): avc: denied { unlink } for pid=8895 comm="rm" name="scrollkeeper_cl.xml" dev=dm-0 ino=2618897 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775090.440:11841): arch=40000003 syscall=10 success=yes exit=0 a0=853898f a1=853897c a2=805277c a3=bf9d43d4 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775090.480:11842): avc: denied { remove_name } for pid=8895 comm="rm" name="ro" dev=dm-0 ino=14438156 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775090.480:11842): avc: denied { rmdir } for pid=8895 comm="rm" name="ro" dev=dm-0 ino=14438156 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775090.480:11842): arch=40000003 syscall=40 success=yes exit=0 a0=8538960 a1=bf9d43d4 a2=805277c a3=2 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.320:11843): avc: denied { rmdir } for pid=8895 comm="rm" name="scrollkeeper" dev=dm-0 ino=14438155 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775091.320:11843): arch=40000003 syscall=40 success=yes exit=0 a0=8538960 a1=bf9d43d4 a2=805277c a3=2 items=0 ppid=8891 pid=8895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.460:11844): avc: denied { add_name } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775091.460:11844): avc: denied { create } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775091.460:11844): arch=40000003 syscall=39 success=yes exit=0 a0=bfb32548 a1=1ed a2=658338 a3=9642869 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.480:11845): avc: denied { write } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper" dev=dm-0 ino=14567773 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775091.480:11845): avc: denied { add_name } for pid=8896 comm="scrollkeeper-up" name="ro" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775091.480:11845): arch=40000003 syscall=39 success=yes exit=0 a0=bfb33008 a1=1ed a2=658338 a3=1 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.480:11846): avc: denied { create } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper_cl.xml" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775091.480:11846): arch=40000003 syscall=5 success=yes exit=5 a0=bfb32e08 a1=241 a2=1b6 a3=9643a30 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775091.480:11847): avc: denied { write } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper_cl.xml" dev=dm-0 ino=14567777 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775091.480:11847): arch=40000003 syscall=4 success=yes exit=4096 a0=5 a1=b7f09000 a2=1000 a3=1000 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775091.480:11847): path="/var/lib/scrollkeeper/ro/scrollkeeper_cl.xml" type=AVC msg=audit(1163775092.981:11848): avc: denied { append } for pid=8896 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567874 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775092.981:11848): arch=40000003 syscall=4 success=yes exit=181 a0=3 a1=b7f0a000 a2=b5 a3=b5 items=0 ppid=8891 pid=8896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775092.981:11848): path="/var/lib/scrollkeeper/scrollkeeper_docs" type=AVC msg=audit(1163775124.923:11849): avc: denied { write } for pid=10895 comm="xmlcatalog" name="catalog" dev=dm-0 ino=9330418 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775124.923:11849): arch=40000003 syscall=5 success=yes exit=3 a0=bfb80be3 a1=8241 a2=1b6 a3=89a9d50 items=0 ppid=8890 pid=10895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xmlcatalog" exe="/usr/bin/xmlcatalog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.199:11850): avc: denied { relabelfrom } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163775125.199:11850): avc: denied { relabelto } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1163775125.199:11850): arch=40000003 syscall=227 success=yes exit=0 a0=dc6c850 a1=a2f0d3 a2=e5f2e70 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.207:11851): avc: denied { setattr } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1163775125.207:11851): arch=40000003 syscall=212 success=yes exit=0 a0=dc6c850 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.463:11852): avc: denied { unlink } for pid=8303 comm="yum" name="pam_console_apply" dev=dm-0 ino=9984687 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.463:11852): arch=40000003 syscall=38 success=yes exit=0 a0=ea2e4b0 a1=ea2f750 a2=d2a040 a3=ea2e4b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.535:11853): avc: denied { relabelto } for pid=8303 comm="yum" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.535:11853): arch=40000003 syscall=227 success=yes exit=0 a0=ea2f750 a1=a2f0d3 a2=ea352e0 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.535:11854): avc: denied { setattr } for pid=8303 comm="yum" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.535:11854): arch=40000003 syscall=212 success=yes exit=0 a0=ea2f750 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.547:11855): avc: denied { unlink } for pid=8303 comm="yum" name="pam_timestamp_check" dev=dm-0 ino=9984596 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.547:11855): arch=40000003 syscall=38 success=yes exit=0 a0=ea35320 a1=ea35300 a2=d2a040 a3=ea35320 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.547:11856): avc: denied { relabelto } for pid=8303 comm="yum" name="pam_timestamp_check" dev=dm-0 ino=9984614 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.547:11856): arch=40000003 syscall=227 success=yes exit=0 a0=ea35300 a1=a2f0d3 a2=ea36290 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.547:11857): avc: denied { setattr } for pid=8303 comm="yum" name="pam_timestamp_check" dev=dm-0 ino=9984614 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.547:11857): arch=40000003 syscall=212 success=yes exit=0 a0=ea35300 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.551:11858): avc: denied { unlink } for pid=8303 comm="yum" name="unix_chkpwd" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.551:11858): arch=40000003 syscall=38 success=yes exit=0 a0=ea35300 a1=ea2e4b0 a2=d2a040 a3=ea35300 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.591:11859): avc: denied { relabelto } for pid=8303 comm="yum" name="unix_chkpwd" dev=dm-0 ino=9984687 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.591:11859): arch=40000003 syscall=227 success=yes exit=0 a0=ea2e4b0 a1=a2f0d3 a2=ea3ded8 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.591:11860): avc: denied { setattr } for pid=8303 comm="yum" name="unix_chkpwd" dev=dm-0 ino=9984687 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.591:11860): arch=40000003 syscall=212 success=yes exit=0 a0=ea2e4b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.651:11861): avc: denied { unlink } for pid=8303 comm="yum" name="Copyright" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.651:11861): arch=40000003 syscall=38 success=yes exit=0 a0=ea427f0 a1=ea352b0 a2=d2a040 a3=ea427f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.671:11862): avc: denied { relabelto } for pid=8303 comm="yum" name="Copyright" dev=dm-0 ino=14731258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.671:11862): arch=40000003 syscall=227 success=yes exit=0 a0=ea352b0 a1=a2f0d3 a2=ea42790 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775125.671:11863): avc: denied { setattr } for pid=8303 comm="yum" name="Copyright" dev=dm-0 ino=14731258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775125.671:11863): arch=40000003 syscall=212 success=yes exit=0 a0=ea352b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.023:11864): avc: denied { unlink } for pid=8303 comm="yum" name="Linux-PAM.mo" dev=dm-0 ino=3109965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.023:11864): arch=40000003 syscall=38 success=yes exit=0 a0=ea42828 a1=ea427f0 a2=d2a040 a3=ea42828 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.027:11865): avc: denied { relabelto } for pid=8303 comm="yum" name="Linux-PAM.mo" dev=dm-0 ino=10321235 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.027:11865): arch=40000003 syscall=227 success=yes exit=0 a0=ea427f0 a1=a2f0d3 a2=e64eac0 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.027:11866): avc: denied { setattr } for pid=8303 comm="yum" name="Linux-PAM.mo" dev=dm-0 ino=10321235 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.027:11866): arch=40000003 syscall=212 success=yes exit=0 a0=ea427f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.295:11867): avc: denied { write } for pid=8303 comm="yum" name="log" dev=dm-0 ino=14436604 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775126.295:11867): avc: denied { add_name } for pid=8303 comm="yum" name="faillog;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775126.295:11867): avc: denied { create } for pid=8303 comm="yum" name="faillog;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.295:11867): arch=40000003 syscall=5 success=yes exit=30 a0=ea43e90 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.295:11868): avc: denied { remove_name } for pid=8303 comm="yum" name="faillog;455dcb57" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775126.295:11868): avc: denied { rename } for pid=8303 comm="yum" name="faillog;455dcb57" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.295:11868): arch=40000003 syscall=38 success=yes exit=0 a0=ea43e90 a1=ea2e4b0 a2=d2a040 a3=ea43e90 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.299:11869): avc: denied { relabelfrom } for pid=8303 comm="yum" name="faillog" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_log_t:s0 tclass=file type=AVC msg=audit(1163775126.299:11869): avc: denied { relabelto } for pid=8303 comm="yum" name="faillog" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.299:11869): arch=40000003 syscall=227 success=yes exit=0 a0=ea2e4b0 a1=a2f0d3 a2=eab52b8 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.299:11870): avc: denied { setattr } for pid=8303 comm="yum" name="faillog" dev=dm-0 ino=14437882 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775126.299:11870): arch=40000003 syscall=212 success=yes exit=0 a0=ea2e4b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.323:11871): avc: denied { relabelfrom } for pid=8303 comm="yum" name="console" dev=dm-0 ino=14436665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=AVC msg=audit(1163775126.323:11871): avc: denied { relabelto } for pid=8303 comm="yum" name="console" dev=dm-0 ino=14436665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=SYSCALL msg=audit(1163775126.323:11871): arch=40000003 syscall=227 success=yes exit=0 a0=ea2e4b0 a1=a2f0d3 a2=ead9858 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775126.323:11872): avc: denied { setattr } for pid=8303 comm="yum" name="console" dev=dm-0 ino=14436665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir type=SYSCALL msg=audit(1163775126.323:11872): arch=40000003 syscall=212 success=yes exit=0 a0=ea2e4b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.171:11873): avc: denied { unlink } for pid=8303 comm="yum" name="liblber-2.3.so.0" dev=dm-0 ino=10314788 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775129.171:11873): arch=40000003 syscall=38 success=yes exit=0 a0=ea3de88 a1=e658000 a2=d2a040 a3=ea3de88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11874): avc: denied { write } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10311844 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775129.251:11874): avc: denied { add_name } for pid=8303 comm="yum" name="openldap-2.3.30" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11874): arch=40000003 syscall=39 success=yes exit=0 a0=e6582a0 a1=1c0 a2=d2a040 a3=e6582a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11875): avc: denied { relabelto } for pid=8303 comm="yum" name="openldap-2.3.30" dev=dm-0 ino=11099061 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11875): arch=40000003 syscall=227 success=yes exit=0 a0=e6582a0 a1=a2f0d3 a2=e658148 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11876): avc: denied { setattr } for pid=8303 comm="yum" name="openldap-2.3.30" dev=dm-0 ino=11099061 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11876): arch=40000003 syscall=212 success=yes exit=0 a0=e6582a0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.251:11877): avc: denied { remove_name } for pid=8303 comm="yum" name="ANNOUNCEMENT;455dcb57" dev=dm-0 ino=11099062 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.251:11877): arch=40000003 syscall=38 success=yes exit=0 a0=e6581c0 a1=ead9888 a2=d2a040 a3=e6581c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775129.303:11878): avc: denied { relabelfrom } for pid=8303 comm="yum" name="openldap" dev=dm-0 ino=10574715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775129.303:11878): arch=40000003 syscall=227 success=yes exit=0 a0=e65bce8 a1=a2f0d3 a2=e52c110 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775148.900:11879): avc: denied { unlink } for pid=8303 comm="yum" name="gappletviewer" dev=dm-0 ino=10319685 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:java_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775148.900:11879): arch=40000003 syscall=38 success=yes exit=0 a0=e5f1d08 a1=e6a6140 a2=d2a040 a3=e5f1d08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775148.996:11880): avc: denied { relabelto } for pid=8303 comm="yum" name="gappletviewer" dev=dm-0 ino=10317587 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:java_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775148.996:11880): arch=40000003 syscall=227 success=yes exit=0 a0=e6a6140 a1=a2f0d3 a2=e679d38 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775148.996:11881): avc: denied { setattr } for pid=8303 comm="yum" name="gappletviewer" dev=dm-0 ino=10317587 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:java_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775148.996:11881): arch=40000003 syscall=212 success=yes exit=0 a0=e6a6140 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775155.072:11882): avc: denied { read } for pid=10924 comm="gij" name="[59846]" dev=pipefs ino=59846 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=AVC msg=audit(1163775155.072:11882): avc: denied { write } for pid=10924 comm="gij" name="[59868]" dev=pipefs ino=59868 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775155.072:11882): arch=40000003 syscall=11 success=yes exit=0 a0=9c5b768 a1=9c5b838 a2=9c5d8d8 a3=9c5b670 items=0 ppid=10923 pid=10924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gij" exe="/usr/bin/gij" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163775155.072:11882): path="pipe:[59868]" type=AVC_PATH msg=audit(1163775155.072:11882): path="pipe:[59846]" type=AVC msg=audit(1163775155.112:11883): avc: denied { sigchld } for pid=10923 comm="sh" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163775155.236:11884): avc: denied { getattr } for pid=10924 comm="gij" name="[59868]" dev=pipefs ino=59868 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775155.236:11884): arch=40000003 syscall=197 success=yes exit=0 a0=1 a1=bf9fc2a0 a2=262ff4 a3=2634c0 items=0 ppid=10923 pid=10924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gij" exe="/usr/bin/gij" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163775155.236:11884): path="pipe:[59868]" type=SYSCALL msg=audit(1163775155.112:11883): arch=40000003 syscall=7 success=yes exit=10924 a0=ffffffff a1=bf98d6e8 a2=0 a3=9c5d5f0 items=0 ppid=10922 pid=10923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775155.916:11885): avc: denied { unlink } for pid=10958 comm="update-alternat" name="jaxp_parser_impl" dev=dm-0 ino=9329800 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775155.916:11885): arch=40000003 syscall=10 success=yes exit=0 a0=bfb69870 a1=0 a2=81b2b40 a3=804c7f6 items=0 ppid=10922 pid=10958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-alternat" exe="/usr/sbin/alternatives" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775155.916:11886): avc: denied { create } for pid=10958 comm="update-alternat" name="jaxp_parser_impl" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775155.916:11886): arch=40000003 syscall=83 success=yes exit=0 a0=81b2a90 a1=bfb69870 a2=81b2b40 a3=804c7f6 items=0 ppid=10922 pid=10958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-alternat" exe="/usr/sbin/alternatives" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.741:11887): avc: denied { unlink } for pid=8303 comm="yum" name="chage" dev=dm-0 ino=10321438 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.741:11887): arch=40000003 syscall=38 success=yes exit=0 a0=dc651c8 a1=eb14e48 a2=d2a040 a3=dc651c8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.761:11888): avc: denied { relabelto } for pid=8303 comm="yum" name="chage" dev=dm-0 ino=10320806 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.761:11888): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=bc898f8 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.761:11889): avc: denied { setattr } for pid=8303 comm="yum" name="chage" dev=dm-0 ino=10320806 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.761:11889): arch=40000003 syscall=212 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.777:11890): avc: denied { unlink } for pid=8303 comm="yum" name="gpasswd" dev=dm-0 ino=10325925 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.777:11890): arch=40000003 syscall=38 success=yes exit=0 a0=eb15308 a1=eb14e48 a2=d2a040 a3=eb15308 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.781:11891): avc: denied { relabelto } for pid=8303 comm="yum" name="gpasswd" dev=dm-0 ino=10321799 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.781:11891): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=ea7d7b0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.781:11892): avc: denied { setattr } for pid=8303 comm="yum" name="gpasswd" dev=dm-0 ino=10321799 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.781:11892): arch=40000003 syscall=212 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11893): avc: denied { create } for pid=8303 comm="yum" name="adduser;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11893): arch=40000003 syscall=83 success=yes exit=0 a0=eb15ef8 a1=e5f0b10 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11894): avc: denied { rename } for pid=8303 comm="yum" name="adduser;455dcb57" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775156.857:11894): avc: denied { unlink } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10330001 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11894): arch=40000003 syscall=38 success=yes exit=0 a0=e5f0b10 a1=eb14e48 a2=d2a040 a3=e5f0b10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11895): avc: denied { relabelfrom } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775156.857:11895): avc: denied { relabelto } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11895): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=ea7da60 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.857:11896): avc: denied { setattr } for pid=8303 comm="yum" name="adduser" dev=dm-0 ino=10317247 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775156.857:11896): arch=40000003 syscall=198 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=e5d8d4c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.889:11897): avc: denied { unlink } for pid=8303 comm="yum" name="grpconv" dev=dm-0 ino=10333815 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:admin_passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.889:11897): arch=40000003 syscall=38 success=yes exit=0 a0=eb33fa0 a1=eb14e48 a2=d2a040 a3=eb33fa0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.889:11898): avc: denied { relabelto } for pid=8303 comm="yum" name="grpconv" dev=dm-0 ino=10321538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:admin_passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.889:11898): arch=40000003 syscall=227 success=yes exit=0 a0=eb14e48 a1=a2f0d3 a2=eb34a30 a3=29 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.889:11899): avc: denied { setattr } for pid=8303 comm="yum" name="grpconv" dev=dm-0 ino=10321538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:admin_passwd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.889:11899): arch=40000003 syscall=212 success=yes exit=0 a0=eb14e48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.901:11900): avc: denied { unlink } for pid=8303 comm="yum" name="useradd" dev=dm-0 ino=10322649 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.901:11900): arch=40000003 syscall=38 success=yes exit=0 a0=eb41178 a1=e5f1540 a2=d2a040 a3=eb41178 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.921:11901): avc: denied { relabelto } for pid=8303 comm="yum" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.921:11901): arch=40000003 syscall=227 success=yes exit=0 a0=e5f1540 a1=a2f0d3 a2=eb49f08 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775156.921:11902): avc: denied { setattr } for pid=8303 comm="yum" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775156.921:11902): arch=40000003 syscall=212 success=yes exit=0 a0=e5f1540 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11903): avc: denied { create } for pid=8303 comm="yum" name="adduser.8.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11903): arch=40000003 syscall=83 success=yes exit=0 a0=eb15ef8 a1=eb4c5d0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11904): avc: denied { rename } for pid=8303 comm="yum" name="adduser.8.gz;455dcb57" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775157.709:11904): avc: denied { unlink } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317995 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11904): arch=40000003 syscall=38 success=yes exit=0 a0=eb4c5d0 a1=eb4c460 a2=d2a040 a3=eb4c5d0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11905): avc: denied { relabelfrom } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775157.709:11905): avc: denied { relabelto } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11905): arch=40000003 syscall=227 success=yes exit=0 a0=eb4c460 a1=a2f0d3 a2=eb4c720 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.709:11906): avc: denied { setattr } for pid=8303 comm="yum" name="adduser.8.gz" dev=dm-0 ino=10317994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775157.709:11906): arch=40000003 syscall=198 success=yes exit=0 a0=eb4c460 a1=0 a2=0 a3=e5d8d4c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.853:11907): avc: denied { write } for pid=8303 comm="yum" name="man3" dev=dm-0 ino=10542601 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775157.853:11907): avc: denied { add_name } for pid=8303 comm="yum" name="getspnam.3.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775157.853:11907): arch=40000003 syscall=5 success=yes exit=30 a0=eb4d1c0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775157.861:11908): avc: denied { remove_name } for pid=8303 comm="yum" name="getspnam.3.gz;455dcb57" dev=dm-0 ino=10543859 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775157.861:11908): arch=40000003 syscall=38 success=yes exit=0 a0=eb4d1c0 a1=eb4d168 a2=d2a040 a3=eb4d1c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.805:11909): avc: denied { execute } for pid=10978 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775160.805:11909): avc: denied { execute_no_trans } for pid=10978 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775160.805:11909): avc: denied { read } for pid=10978 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.805:11909): arch=40000003 syscall=11 success=yes exit=0 a0=9aa9278 a1=9aa8ae8 a2=9aa94b0 a3=9aa8e10 items=0 ppid=10977 pid=10978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775160.805:11909): path="/usr/sbin/useradd" type=AVC_PATH msg=audit(1163775160.805:11909): path="/usr/sbin/useradd" type=AVC msg=audit(1163775160.901:11910): avc: denied { audit_write } for pid=10978 comm="useradd" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_CHAUTHTOK msg=audit(1163775160.901:11911): user pid=10978 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='op=adding user acct=dbus exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/1 res=failed)' type=SYSCALL msg=audit(1163775160.901:11910): arch=40000003 syscall=102 success=yes exit=116 a0=b a1=bffa7ed0 a2=a47ff4 a3=bffae920 items=0 ppid=10977 pid=10978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.913:11912): avc: denied { create } for pid=8303 comm="yum" name="dbus-cleanup-sockets;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.913:11912): arch=40000003 syscall=5 success=yes exit=30 a0=eb4d550 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.921:11913): avc: denied { write } for pid=8303 comm="yum" name="dbus-cleanup-sockets;455dcb57" dev=dm-0 ino=13683789 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.921:11913): arch=40000003 syscall=4 success=yes exit=7800 a0=1e a1=b6f50000 a2=1e78 a3=e6a5630 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775160.921:11913): path="/bin/dbus-cleanup-sockets;455dcb57" type=AVC msg=audit(1163775160.921:11914): avc: denied { rename } for pid=8303 comm="yum" name="dbus-cleanup-sockets;455dcb57" dev=dm-0 ino=13683789 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.921:11914): arch=40000003 syscall=38 success=yes exit=0 a0=eb4d550 a1=e5f1ce8 a2=d2a040 a3=eb4d550 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.941:11915): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus-cleanup-sockets" dev=dm-0 ino=13683789 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.941:11915): arch=40000003 syscall=227 success=yes exit=0 a0=e5f1ce8 a1=a2f0d3 a2=eb4b930 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.981:11916): avc: denied { unlink } for pid=8303 comm="yum" name="dbus-daemon" dev=dm-0 ino=13683713 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.981:11916): arch=40000003 syscall=38 success=yes exit=0 a0=e5f1ce8 a1=eb4d0d0 a2=d2a040 a3=e5f1ce8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.981:11917): avc: denied { relabelto } for pid=8303 comm="yum" name="dbus-daemon" dev=dm-0 ino=13683727 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.981:11917): arch=40000003 syscall=227 success=yes exit=0 a0=eb4d0d0 a1=a2f0d3 a2=e6a5840 a3=29 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775160.981:11918): avc: denied { setattr } for pid=8303 comm="yum" name="dbus-daemon" dev=dm-0 ino=13683727 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775160.981:11918): arch=40000003 syscall=212 success=yes exit=0 a0=eb4d0d0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.057:11919): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.057:11919): avc: denied { relabelto } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.057:11919): arch=40000003 syscall=227 success=yes exit=0 a0=e11dfc8 a1=a2f0d3 a2=ea73908 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.077:11920): avc: denied { setattr } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.077:11920): arch=40000003 syscall=212 success=yes exit=0 a0=e11dfc8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.077:11921): avc: denied { write } for pid=8303 comm="yum" name="dbus-1" dev=dm-0 ino=9329778 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.077:11921): avc: denied { add_name } for pid=8303 comm="yum" name="session.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.077:11921): avc: denied { create } for pid=8303 comm="yum" name="session.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.077:11921): arch=40000003 syscall=5 success=yes exit=30 a0=ea73908 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.081:11922): avc: denied { write } for pid=8303 comm="yum" name="session.conf;455dcb57" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.081:11922): arch=40000003 syscall=4 success=yes exit=1016 a0=1e a1=b6f50000 a2=3f8 a3=ea73980 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775161.081:11922): path="/etc/dbus-1/session.conf;455dcb57" type=AVC msg=audit(1163775161.081:11923): avc: denied { remove_name } for pid=8303 comm="yum" name="session.conf;455dcb57" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775161.081:11923): avc: denied { rename } for pid=8303 comm="yum" name="session.conf;455dcb57" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775161.081:11923): avc: denied { unlink } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9330291 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.081:11923): arch=40000003 syscall=38 success=yes exit=0 a0=ea73908 a1=eb4b930 a2=d2a040 a3=ea73908 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.085:11924): avc: denied { relabelfrom } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775161.085:11924): avc: denied { relabelto } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.085:11924): arch=40000003 syscall=227 success=yes exit=0 a0=eb4b930 a1=a2f0d3 a2=ea73908 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.085:11925): avc: denied { setattr } for pid=8303 comm="yum" name="session.conf" dev=dm-0 ino=9329933 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.085:11925): arch=40000003 syscall=212 success=yes exit=0 a0=eb4b930 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.097:11926): avc: denied { unlink } for pid=8303 comm="yum" name="messagebus" dev=dm-0 ino=9331033 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.097:11926): arch=40000003 syscall=38 success=yes exit=0 a0=e6a5808 a1=eb4b930 a2=d2a040 a3=e6a5808 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.101:11927): avc: denied { relabelto } for pid=8303 comm="yum" name="messagebus" dev=dm-0 ino=9330223 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.101:11927): arch=40000003 syscall=227 success=yes exit=0 a0=eb4b930 a1=a2f0d3 a2=ea73958 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.101:11928): avc: denied { setattr } for pid=8303 comm="yum" name="messagebus" dev=dm-0 ino=9330223 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.101:11928): arch=40000003 syscall=212 success=yes exit=0 a0=eb4b930 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11929): avc: denied { create } for pid=8303 comm="yum" name="dbus-1.0.0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.157:11929): arch=40000003 syscall=39 success=yes exit=0 a0=ea7cf00 a1=1c0 a2=d2a040 a3=ea7cf00 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11930): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus-1.0.0" dev=dm-0 ino=11099077 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.157:11930): arch=40000003 syscall=227 success=yes exit=0 a0=ea7cf00 a1=a2f0d3 a2=eb5e6a0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11931): avc: denied { create } for pid=8303 comm="yum" name="COPYING;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.157:11931): arch=40000003 syscall=5 success=yes exit=30 a0=eb5e6c0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.157:11932): avc: denied { write } for pid=8303 comm="yum" name="COPYING;455dcb57" dev=dm-0 ino=11099078 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.157:11932): arch=40000003 syscall=4 success=yes exit=24576 a0=1e a1=eb4d890 a2=6000 a3=eb5e6f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775161.157:11932): path="/usr/share/doc/dbus-1.0.0/COPYING;455dcb57" type=AVC msg=audit(1163775161.157:11933): avc: denied { rename } for pid=8303 comm="yum" name="COPYING;455dcb57" dev=dm-0 ino=11099078 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.157:11933): arch=40000003 syscall=38 success=yes exit=0 a0=eb5e6c0 a1=ea73930 a2=d2a040 a3=eb5e6c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.165:11934): avc: denied { relabelfrom } for pid=8303 comm="yum" name="COPYING" dev=dm-0 ino=11099078 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775161.165:11934): arch=40000003 syscall=227 success=yes exit=0 a0=ea73930 a1=a2f0d3 a2=ea7cf00 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.213:11935): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14567750 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.213:11935): arch=40000003 syscall=227 success=yes exit=0 a0=eb5e9f8 a1=a2f0d3 a2=ea73930 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.221:11936): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14436623 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775161.221:11936): avc: denied { relabelto } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14436623 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.221:11936): arch=40000003 syscall=227 success=yes exit=0 a0=eb5e9f8 a1=a2f0d3 a2=eb7a868 a3=2c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775161.221:11937): avc: denied { setattr } for pid=8303 comm="yum" name="dbus" dev=dm-0 ino=14436623 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775161.221:11937): arch=40000003 syscall=212 success=yes exit=0 a0=eb5e9f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775163.505:11938): avc: denied { create } for pid=8303 comm="yum" name="xfce-mcs-manager.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.505:11938): arch=40000003 syscall=5 success=yes exit=30 a0=e690328 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775163.505:11939): avc: denied { write } for pid=8303 comm="yum" name="xfce-mcs-manager.mo;455dcb57" dev=dm-0 ino=10321875 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.505:11939): arch=40000003 syscall=4 success=yes exit=560 a0=1e a1=b6f50000 a2=230 a3=eb2dc88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775163.505:11939): path="/usr/share/locale/ar/LC_MESSAGES/xfce-mcs-manager.mo;455dcb57" type=AVC msg=audit(1163775163.509:11940): avc: denied { rename } for pid=8303 comm="yum" name="xfce-mcs-manager.mo;455dcb57" dev=dm-0 ino=10321875 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.509:11940): arch=40000003 syscall=38 success=yes exit=0 a0=e690328 a1=eb2ddf0 a2=d2a040 a3=e690328 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775163.517:11941): avc: denied { relabelfrom } for pid=8303 comm="yum" name="xfce-mcs-manager.mo" dev=dm-0 ino=10321875 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775163.517:11941): arch=40000003 syscall=227 success=yes exit=0 a0=eb2ddf0 a1=a2f0d3 a2=eb2ddc8 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.965:11942): avc: denied { create } for pid=8303 comm="yum" name="add.png;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.965:11942): arch=40000003 syscall=83 success=yes exit=0 a0=ebc2888 a1=dc65200 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.965:11943): avc: denied { rename } for pid=8303 comm="yum" name="add.png;455dcb57" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775164.965:11943): avc: denied { unlink } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13063759 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.965:11943): arch=40000003 syscall=38 success=yes exit=0 a0=dc65200 a1=e6a53d8 a2=d2a040 a3=dc65200 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.977:11944): avc: denied { relabelfrom } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775164.977:11944): avc: denied { relabelto } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.977:11944): arch=40000003 syscall=227 success=yes exit=0 a0=e6a53d8 a1=a2f0d3 a2=dc65240 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775164.977:11945): avc: denied { setattr } for pid=8303 comm="yum" name="add.png" dev=dm-0 ino=13061670 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775164.977:11945): arch=40000003 syscall=198 success=yes exit=0 a0=e6a53d8 a1=0 a2=0 a3=e5d7a34 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775188.875:11946): avc: denied { unlink } for pid=10990 comm="gtk-update-icon" name=".icon-theme.cache" dev=dm-0 ino=10378011 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775188.875:11946): arch=40000003 syscall=10 success=yes exit=0 a0=9f37be0 a1=1 a2=412708 a3=0 items=0 ppid=10984 pid=10990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gtk-update-icon" exe="/usr/bin/gtk-update-icon-cache" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775197.651:11947): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775197.651:11947): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bfae855c a2=c4eff4 a3=0 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163775197.651:11947): path="/etc/localtime" type=AVC msg=audit(1163775197.655:11948): avc: denied { read } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775197.655:11948): arch=40000003 syscall=5 success=yes exit=43 a0=c36800 a1=0 a2=1b6 a3=ac8bf48 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775219.792:11949): avc: denied { read } for pid=11018 comm="mozilla-xremote" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775219.792:11949): arch=40000003 syscall=33 success=yes exit=0 a0=bfd34f92 a1=4 a2=252a64 a3=bfd34f92 items=0 ppid=11017 pid=11018 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775221.509:11950): avc: denied { read } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775221.509:11950): arch=40000003 syscall=33 success=yes exit=0 a0=bf969fcb a1=4 a2=83ea64 a3=bf969fcb items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775221.509:11951): avc: denied { getattr } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775221.509:11951): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf96758c a2=c4cff4 a3=8f41140 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775221.509:11951): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163775228.225:11952): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775228.225:11952): arch=40000003 syscall=4 success=yes exit=55 a0=4 a1=b7bd1000 a2=37 a3=37 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775228.225:11952): path="/var/log/yum.log" type=AVC msg=audit(1163775228.409:11953): avc: denied { write } for pid=8303 comm="yum" name="lib" dev=dm-0 ino=10311854 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775228.409:11953): avc: denied { add_name } for pid=8303 comm="yum" name="libsoup-2.2.so.8;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775228.409:11953): arch=40000003 syscall=83 success=yes exit=0 a0=ebefb20 a1=eb04ab8 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775228.409:11954): avc: denied { remove_name } for pid=8303 comm="yum" name="libsoup-2.2.so.8;455dcb57" dev=dm-0 ino=10333004 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775228.409:11954): arch=40000003 syscall=38 success=yes exit=0 a0=eb04ab8 a1=e69bed0 a2=d2a040 a3=eb04ab8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775228.445:11955): avc: denied { relabelto } for pid=8303 comm="yum" name="libsoup-2.2.so.8.5.0" dev=dm-0 ino=10333007 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775228.445:11955): arch=40000003 syscall=227 success=yes exit=0 a0=eb04ab8 a1=a2f0d3 a2=ea5f800 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775228.445:11956): avc: denied { setattr } for pid=8303 comm="yum" name="libsoup-2.2.so.8.5.0" dev=dm-0 ino=10333007 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775228.445:11956): arch=40000003 syscall=212 success=yes exit=0 a0=eb04ab8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775231.461:11957): avc: denied { write } for pid=11030 comm="ldconfig" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775231.461:11957): avc: denied { add_name } for pid=11030 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775231.461:11957): arch=40000003 syscall=5 success=yes exit=3 a0=8c60b20 a1=20241 a2=1a4 a3=8c60b20 items=0 ppid=8303 pid=11030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775231.461:11958): avc: denied { remove_name } for pid=11030 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9331033 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775231.461:11958): arch=40000003 syscall=38 success=yes exit=0 a0=8c60b20 a1=bfc904d0 a2=bfc90450 a3=8c60b20 items=0 ppid=8303 pid=11030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775234.185:11959): avc: denied { unlink } for pid=8303 comm="yum" name="helpers.rc" dev=dm-0 ino=9334371 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775234.185:11959): arch=40000003 syscall=38 success=yes exit=0 a0=ea5eca0 a1=eb040f8 a2=d2a040 a3=ea5eca0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775234.197:11960): avc: denied { relabelto } for pid=8303 comm="yum" name="helpers.rc" dev=dm-0 ino=9330558 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775234.197:11960): arch=40000003 syscall=227 success=yes exit=0 a0=eb040f8 a1=a2f0d3 a2=ebeebb8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775234.197:11961): avc: denied { setattr } for pid=8303 comm="yum" name="helpers.rc" dev=dm-0 ino=9330558 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775234.197:11961): arch=40000003 syscall=212 success=yes exit=0 a0=eb040f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775236.106:11962): avc: denied { write } for pid=8303 comm="yum" name="exo-0.3" dev=dm-0 ino=10344948 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775236.106:11962): avc: denied { add_name } for pid=8303 comm="yum" name="exo-thumbnail-frame.png;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775236.106:11962): arch=40000003 syscall=5 success=yes exit=30 a0=ebb21b8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775236.118:11963): avc: denied { remove_name } for pid=8303 comm="yum" name="exo-thumbnail-frame.png;455dcb57" dev=dm-0 ino=10344947 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775236.118:11963): arch=40000003 syscall=38 success=yes exit=0 a0=ebb21b8 a1=ebb2060 a2=d2a040 a3=ebb21b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775239.770:11964): avc: denied { unlink } for pid=8303 comm="yum" name="libaprutil-1.so.0.2.7" dev=dm-0 ino=10321183 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775239.770:11964): arch=40000003 syscall=38 success=yes exit=0 a0=ebcbe48 a1=e6598f8 a2=d2a040 a3=ebcbe48 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775240.926:11965): avc: denied { relabelfrom } for pid=8303 comm="yum" name="dev.d" dev=dm-0 ino=9330472 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775240.926:11965): avc: denied { relabelto } for pid=8303 comm="yum" name="dev.d" dev=dm-0 ino=9330472 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775240.926:11965): arch=40000003 syscall=227 success=yes exit=0 a0=e68d5f0 a1=a2f0d3 a2=ebcbec8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775240.926:11966): avc: denied { setattr } for pid=8303 comm="yum" name="dev.d" dev=dm-0 ino=9330472 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775240.926:11966): arch=40000003 syscall=212 success=yes exit=0 a0=e68d5f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.090:11967): avc: denied { relabelfrom } for pid=8303 comm="yum" name="firmware" dev=dm-0 ino=13716612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775241.090:11967): avc: denied { relabelto } for pid=8303 comm="yum" name="firmware" dev=dm-0 ino=13716612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775241.090:11967): arch=40000003 syscall=227 success=yes exit=0 a0=e68d5f0 a1=a2f0d3 a2=ebcbee8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.090:11968): avc: denied { setattr } for pid=8303 comm="yum" name="firmware" dev=dm-0 ino=13716612 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775241.090:11968): arch=40000003 syscall=212 success=yes exit=0 a0=e68d5f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.262:11969): avc: denied { unlink } for pid=8303 comm="yum" name="scsi_id" dev=dm-0 ino=13717608 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.262:11969): arch=40000003 syscall=38 success=yes exit=0 a0=eb863d8 a1=eb858f8 a2=d2a040 a3=eb863d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.310:11970): avc: denied { relabelto } for pid=8303 comm="yum" name="scsi_id" dev=dm-0 ino=13717607 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.310:11970): arch=40000003 syscall=227 success=yes exit=0 a0=eb858f8 a1=a2f0d3 a2=eb86398 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.310:11971): avc: denied { setattr } for pid=8303 comm="yum" name="scsi_id" dev=dm-0 ino=13717607 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.310:11971): arch=40000003 syscall=212 success=yes exit=0 a0=eb858f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.386:11972): avc: denied { create } for pid=8303 comm="yum" name="firmware_helper;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.386:11972): arch=40000003 syscall=5 success=yes exit=30 a0=eb81dd0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.386:11973): avc: denied { write } for pid=8303 comm="yum" name="firmware_helper;455dcb57" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.386:11973): arch=40000003 syscall=4 success=yes exit=5824 a0=1e a1=b6ebb000 a2=16c0 a3=eb880b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775241.386:11973): path="/sbin/firmware_helper;455dcb57" type=AVC msg=audit(1163775241.386:11974): avc: denied { rename } for pid=8303 comm="yum" name="firmware_helper;455dcb57" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.386:11974): arch=40000003 syscall=38 success=yes exit=0 a0=eb81dd0 a1=eb88098 a2=d2a040 a3=eb81dd0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.414:11975): avc: denied { relabelfrom } for pid=8303 comm="yum" name="firmware_helper" dev=dm-0 ino=9984659 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.414:11975): arch=40000003 syscall=227 success=yes exit=0 a0=eb88098 a1=a2f0d3 a2=eb88008 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.426:11976): avc: denied { unlink } for pid=8303 comm="yum" name="start_udev" dev=dm-0 ino=9984548 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.426:11976): arch=40000003 syscall=38 success=yes exit=0 a0=eb88008 a1=eb858f8 a2=d2a040 a3=eb88008 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.434:11977): avc: denied { relabelto } for pid=8303 comm="yum" name="start_udev" dev=dm-0 ino=9984710 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.434:11977): arch=40000003 syscall=227 success=yes exit=0 a0=eb858f8 a1=a2f0d3 a2=eb9ec48 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775241.434:11978): avc: denied { setattr } for pid=8303 comm="yum" name="start_udev" dev=dm-0 ino=9984710 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775241.434:11978): arch=40000003 syscall=212 success=yes exit=0 a0=eb858f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775242.826:11979): avc: denied { write } for pid=11015 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775242.826:11979): avc: denied { add_name } for pid=11015 comm="firefox-bin" name="tmp.xpi" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775242.826:11979): avc: denied { create } for pid=11015 comm="firefox-bin" name="tmp.xpi" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775242.826:11979): arch=40000003 syscall=5 success=yes exit=28 a0=94c3270 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11980): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11980): arch=40000003 syscall=85 success=yes exit=10 a0=bfbc5178 a1=8c6a1e0 a2=1000 a3=8c6a028 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11981): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11981): arch=40000003 syscall=85 success=no exit=-2 a0=bfbc5178 a1=8c6b1e8 a2=1000 a3=8c6a058 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11982): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.254:11982): arch=40000003 syscall=85 success=yes exit=30 a0=bfbc5178 a1=8c8bb08 a2=1000 a3=8c8a988 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11983): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11983): arch=40000003 syscall=85 success=yes exit=21 a0=bfbc5178 a1=8c8eb20 a2=1000 a3=8c8aa58 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.254:11984): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.254:11984): arch=40000003 syscall=85 success=yes exit=12 a0=bfbc5178 a1=8c8fcb0 a2=1000 a3=8c8aab8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11985): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11985): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8c91cc0 a2=1000 a3=8c8fb90 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11986): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11986): arch=40000003 syscall=85 success=yes exit=11 a0=bfbc5178 a1=8c92cc8 a2=1000 a3=8c8fbf0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11987): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11987): arch=40000003 syscall=85 success=yes exit=20 a0=bfbc5178 a1=8c93cd0 a2=1000 a3=8c8fc40 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11988): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.262:11988): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c94e90 a2=1000 a3=8c94cd8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11989): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11989): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8c95e98 a2=1000 a3=8c94d08 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11990): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11990): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c96ea0 a2=1000 a3=8c94d58 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11991): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11991): arch=40000003 syscall=85 success=yes exit=14 a0=bfbc5178 a1=8c98eb0 a2=1000 a3=8c94df8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11992): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11992): arch=40000003 syscall=85 success=no exit=-2 a0=bfbc5178 a1=8c9b070 a2=1000 a3=8c99ee8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11993): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11993): arch=40000003 syscall=85 success=yes exit=19 a0=bfbc5178 a1=8c9d080 a2=1000 a3=8c99f70 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11994): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11994): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c9e088 a2=1000 a3=8c99fc0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11995): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11995): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8c9f218 a2=1000 a3=8c9a018 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11996): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.262:11996): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8ca1228 a2=1000 a3=8c9f0f0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11997): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11997): arch=40000003 syscall=85 success=yes exit=16 a0=bfbc5178 a1=8ca2230 a2=1000 a3=8c9f140 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11998): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11998): arch=40000003 syscall=85 success=yes exit=27 a0=bfbc5178 a1=8ca33c8 a2=1000 a3=8c9f1a8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:11999): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:11999): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8ca53d8 a2=1000 a3=8ca32a8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12000): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.262:12000): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8ca63e0 a2=1000 a3=8ca3310 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12001): avc: denied { sys_ptrace } for pid=11047 comm="pidof" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163775243.262:12001): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12001): arch=40000003 syscall=85 success=yes exit=12 a0=bfbc5178 a1=8ca7560 a2=1000 a3=8ca3360 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12002): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12002): arch=40000003 syscall=85 success=yes exit=14 a0=bfbc5178 a1=8ca9570 a2=1000 a3=8ca7440 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12003): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12003): arch=40000003 syscall=85 success=yes exit=19 a0=bfbc5178 a1=8caf918 a2=1000 a3=8caf750 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12004): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12004): arch=40000003 syscall=85 success=yes exit=21 a0=bfbc5178 a1=8cb0920 a2=1000 a3=8caf780 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12005): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12005): arch=40000003 syscall=85 success=yes exit=15 a0=bfbc5178 a1=8cb1928 a2=1000 a3=8caf7d0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12006): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12006): arch=40000003 syscall=85 success=yes exit=16 a0=bfbc5178 a1=8cb4ab8 a2=1000 a3=8cb3938 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.262:12007): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.262:12007): arch=40000003 syscall=85 success=yes exit=14 a0=bfbc5178 a1=8cb5ac0 a2=1000 a3=8cb39a0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12008): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.274:12008): arch=40000003 syscall=85 success=yes exit=20 a0=bfbc5178 a1=8cbbe28 a2=1000 a3=8cb7c08 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12009): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.274:12009): arch=40000003 syscall=85 success=yes exit=13 a0=bfbc5178 a1=8cbde38 a2=1000 a3=8cbbcf0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12010): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.274:12010): arch=40000003 syscall=85 success=yes exit=18 a0=bfbc5178 a1=8cbffe8 a2=1000 a3=8cbbdb8 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.274:12011): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.274:12011): arch=40000003 syscall=85 success=yes exit=35 a0=bfbc5178 a1=8cc1ff8 a2=1000 a3=8cbfec0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.282:12012): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.282:12012): arch=40000003 syscall=85 success=yes exit=44 a0=bfbc5178 a1=8ccd550 a2=1000 a3=8ccc3a0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.282:12013): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.282:12013): arch=40000003 syscall=85 success=yes exit=26 a0=bfbc5178 a1=8cd88f8 a2=1000 a3=8cd4850 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.282:12014): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.282:12014): arch=40000003 syscall=85 success=yes exit=9 a0=bfbc5178 a1=8ce8000 a2=1000 a3=8ce5ed0 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.294:12015): avc: denied { ptrace } for pid=11047 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163775243.294:12015): arch=40000003 syscall=85 success=yes exit=32 a0=bfbc5178 a1=8cf45a8 a2=1000 a3=8cf3420 items=0 ppid=11046 pid=11047 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.294:12016): avc: denied { signal } for pid=11046 comm="sh" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775243.294:12016): arch=40000003 syscall=37 success=yes exit=0 a0=1b4 a1=f a2=1b4 a3=1b4 items=0 ppid=8303 pid=11046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.294:12017): avc: denied { execute } for pid=11048 comm="sh" name="udevd" dev=dm-0 ino=9984584 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=AVC msg=audit(1163775243.294:12017): avc: denied { execute_no_trans } for pid=11048 comm="sh" name="udevd" dev=dm-0 ino=9984584 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=AVC msg=audit(1163775243.294:12017): avc: denied { read } for pid=11048 comm="sh" name="udevd" dev=dm-0 ino=9984584 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775243.294:12017): arch=40000003 syscall=11 success=yes exit=0 a0=94e7658 a1=94e76f0 a2=94e7528 a3=94e6850 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775243.294:12017): path="/sbin/udevd" type=AVC_PATH msg=audit(1163775243.294:12017): path="/sbin/udevd" type=AVC msg=audit(1163775243.330:12018): avc: denied { write } for pid=11015 comm="firefox-bin" name="tmp.xpi" dev=dm-0 ino=14469458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775243.330:12018): arch=40000003 syscall=5 success=yes exit=33 a0=94c3270 a1=8241 a2=180 a3=8241 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775243.382:12019): avc: denied { create } for pid=11048 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163775243.382:12019): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bfedb4d0 a2=791234 a3=17 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.382:12020): avc: denied { setopt } for pid=11048 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=AVC msg=audit(1163775243.382:12020): avc: denied { net_admin } for pid=11048 comm="udevd" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775243.382:12020): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bfedb4c0 a2=791234 a3=17 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.386:12021): avc: denied { bind } for pid=11048 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163775243.386:12021): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfedb4d0 a2=791234 a3=17 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.394:12022): avc: denied { write } for pid=11048 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163775243.394:12022): arch=40000003 syscall=5 success=yes exit=6 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=11046 pid=11048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.394:12023): avc: denied { sys_resource } for pid=11049 comm="udevd" capability=24 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775243.394:12023): arch=40000003 syscall=4 success=yes exit=3 a0=6 a1=78b03d a2=3 a3=6 items=0 ppid=11048 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.470:12024): avc: denied { create } for pid=8303 comm="yum" name="libgd.so.2;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.470:12024): arch=40000003 syscall=83 success=yes exit=0 a0=ec28238 a1=eb20198 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.470:12025): avc: denied { rename } for pid=8303 comm="yum" name="libgd.so.2;455dcb57" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163775243.470:12025): avc: denied { unlink } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10335526 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.470:12025): arch=40000003 syscall=38 success=yes exit=0 a0=eb20198 a1=a1cca30 a2=d2a040 a3=eb20198 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.490:12026): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163775243.490:12026): avc: denied { relabelto } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.490:12026): arch=40000003 syscall=227 success=yes exit=0 a0=a1cca30 a1=a2f0d3 a2=eba7ce8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775243.490:12027): avc: denied { setattr } for pid=8303 comm="yum" name="libgd.so.2" dev=dm-0 ino=10333143 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775243.490:12027): arch=40000003 syscall=198 success=yes exit=0 a0=a1cca30 a1=0 a2=0 a3=eb5428c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775244.138:12028): avc: denied { read } for pid=11015 comm="firefox-bin" name="tmp.xpi" dev=dm-0 ino=14469458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.138:12028): arch=40000003 syscall=5 success=yes exit=33 a0=94c3270 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775244.174:12029): avc: denied { getattr } for pid=11015 comm="firefox-bin" name="tmp.xpi" dev=dm-0 ino=14469458 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.174:12029): arch=40000003 syscall=195 success=yes exit=0 a0=94c3270 a1=bf9667b0 a2=c4cff4 a3=bf9667b0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775244.174:12029): path="/tmp/tmp.xpi" type=AVC msg=audit(1163775244.302:12030): avc: denied { write } for pid=11015 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775244.302:12030): avc: denied { add_name } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775244.302:12030): avc: denied { create } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.302:12030): arch=40000003 syscall=5 success=yes exit=35 a0=964b2f0 a1=8041 a2=1a4 a3=8041 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775244.310:12031): avc: denied { setattr } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.310:12031): arch=40000003 syscall=30 success=yes exit=0 a0=964b2f0 a1=bf9661f0 a2=4a4e304 a3=de9a3ce0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775244.474:12032): avc: denied { setexec } for pid=11051 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775244.474:12032): arch=40000003 syscall=4 success=no exit=-22 a0=1e a1=eb9ebf8 a2=20 a3=a2f751 items=0 ppid=8303 pid=11051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775244.806:12033): avc: denied { remove_name } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163775244.806:12033): avc: denied { unlink } for pid=11015 comm="firefox-bin" name="install-6x3..rdf" dev=dm-0 ino=14469575 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775244.806:12033): arch=40000003 syscall=10 success=yes exit=0 a0=964b2f0 a1=0 a2=4a4e304 a3=0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775245.174:12034): avc: denied { create } for pid=8303 comm="yum" name="X;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.174:12034): arch=40000003 syscall=83 success=yes exit=0 a0=ec38240 a1=a1cca30 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.174:12035): avc: denied { rename } for pid=8303 comm="yum" name="X;455dcb57" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775245.174:12035): avc: denied { unlink } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10314705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.174:12035): arch=40000003 syscall=38 success=yes exit=0 a0=a1cca30 a1=ebac1e0 a2=d2a040 a3=a1cca30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.210:12036): avc: denied { relabelfrom } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775245.210:12036): avc: denied { relabelto } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.210:12036): arch=40000003 syscall=227 success=yes exit=0 a0=ebac1e0 a1=a2f0d3 a2=e68d5c0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.214:12037): avc: denied { setattr } for pid=8303 comm="yum" name="X" dev=dm-0 ino=10324349 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775245.214:12037): arch=40000003 syscall=198 success=yes exit=0 a0=ebac1e0 a1=0 a2=0 a3=eb5448c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.294:12038): avc: denied { unlink } for pid=8303 comm="yum" name="Xorg" dev=dm-0 ino=10334312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.294:12038): arch=40000003 syscall=38 success=yes exit=0 a0=e68d5c0 a1=a1cca30 a2=d2a040 a3=e68d5c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.298:12039): avc: denied { relabelto } for pid=8303 comm="yum" name="Xorg" dev=dm-0 ino=10314705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.298:12039): arch=40000003 syscall=227 success=yes exit=0 a0=a1cca30 a1=a2f0d3 a2=ebac700 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.298:12040): avc: denied { setattr } for pid=8303 comm="yum" name="Xorg" dev=dm-0 ino=10314705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.298:12040): arch=40000003 syscall=212 success=yes exit=0 a0=a1cca30 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.606:12041): avc: denied { unlink } for pid=8303 comm="yum" name="libglx.so" dev=dm-0 ino=11002042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.606:12041): arch=40000003 syscall=38 success=yes exit=0 a0=ebcb0c0 a1=ec5b4c8 a2=d2a040 a3=ebcb0c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.610:12042): avc: denied { relabelto } for pid=8303 comm="yum" name="libglx.so" dev=dm-0 ino=9722652 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.610:12042): arch=40000003 syscall=227 success=yes exit=0 a0=ec5b4c8 a1=a2f0d3 a2=ec5cd20 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775245.610:12043): avc: denied { setattr } for pid=8303 comm="yum" name="libglx.so" dev=dm-0 ino=9722652 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775245.610:12043): arch=40000003 syscall=212 success=yes exit=0 a0=ec5b4c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.194:12044): avc: denied { unlink } for pid=8303 comm="yum" name="SecurityPolicy" dev=dm-0 ino=10999522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.194:12044): arch=40000003 syscall=38 success=yes exit=0 a0=ec5d7e0 a1=ec5d758 a2=d2a040 a3=ec5d7e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.194:12045): avc: denied { relabelto } for pid=8303 comm="yum" name="SecurityPolicy" dev=dm-0 ino=163682 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.194:12045): arch=40000003 syscall=227 success=yes exit=0 a0=ec5d758 a1=a2f0d3 a2=ec5ce00 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.198:12046): avc: denied { setattr } for pid=8303 comm="yum" name="SecurityPolicy" dev=dm-0 ino=163682 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.198:12046): arch=40000003 syscall=212 success=yes exit=0 a0=ec5d758 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.302:12047): avc: denied { relabelfrom } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.302:12047): avc: denied { relabelto } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775246.302:12047): arch=40000003 syscall=227 success=yes exit=0 a0=ebcb0e0 a1=a2f0d3 a2=ec5f060 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.302:12048): avc: denied { setattr } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775246.302:12048): arch=40000003 syscall=212 success=yes exit=0 a0=ebcb0e0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.306:12049): avc: denied { write } for pid=8303 comm="yum" name="xkb" dev=dm-0 ino=14437298 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.306:12049): avc: denied { add_name } for pid=8303 comm="yum" name="README.compiled;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.306:12049): avc: denied { create } for pid=8303 comm="yum" name="README.compiled;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.306:12049): arch=40000003 syscall=5 success=yes exit=30 a0=c336540 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.310:12050): avc: denied { write } for pid=8303 comm="yum" name="README.compiled;455dcb57" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.310:12050): arch=40000003 syscall=4 success=yes exit=644 a0=1e a1=b6ebb000 a2=284 a3=ec5f0d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775246.310:12050): path="/var/lib/xkb/README.compiled;455dcb57" type=AVC msg=audit(1163775246.310:12051): avc: denied { remove_name } for pid=8303 comm="yum" name="README.compiled;455dcb57" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775246.310:12051): avc: denied { rename } for pid=8303 comm="yum" name="README.compiled;455dcb57" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=AVC msg=audit(1163775246.310:12051): avc: denied { unlink } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437875 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.310:12051): arch=40000003 syscall=38 success=yes exit=0 a0=c336540 a1=ec5f060 a2=d2a040 a3=c336540 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.318:12052): avc: denied { relabelfrom } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xkb_var_lib_t:s0 tclass=file type=AVC msg=audit(1163775246.318:12052): avc: denied { relabelto } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.318:12052): arch=40000003 syscall=227 success=yes exit=0 a0=ec5f060 a1=a2f0d3 a2=ecf2e30 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775246.318:12053): avc: denied { setattr } for pid=8303 comm="yum" name="README.compiled" dev=dm-0 ino=14437971 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xkb_var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775246.318:12053): arch=40000003 syscall=212 success=yes exit=0 a0=ec5f060 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.799:12054): avc: denied { write } for pid=8303 comm="yum" name="xfce4-session" dev=dm-0 ino=9334423 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775255.799:12054): avc: denied { add_name } for pid=8303 comm="yum" name="xfce4-session.rc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.799:12054): arch=40000003 syscall=5 success=yes exit=30 a0=ebab930 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.807:12055): avc: denied { remove_name } for pid=8303 comm="yum" name="xfce4-session.rc;455dcb57" dev=dm-0 ino=9334424 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.807:12055): arch=40000003 syscall=38 success=yes exit=0 a0=ebab930 a1=ec4cd28 a2=d2a040 a3=ebab930 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.919:12056): avc: denied { write } for pid=8303 comm="yum" name="engines" dev=dm-0 ino=10345936 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775255.919:12056): avc: denied { add_name } for pid=8303 comm="yum" name="libmice.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.919:12056): arch=40000003 syscall=5 success=yes exit=30 a0=ebab930 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775255.959:12057): avc: denied { remove_name } for pid=8303 comm="yum" name="libmice.so;455dcb57" dev=dm-0 ino=10344644 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775255.959:12057): arch=40000003 syscall=38 success=yes exit=0 a0=ebab930 a1=ec4cd28 a2=d2a040 a3=ebab930 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775267.847:12058): avc: denied { write } for pid=8303 comm="yum" name="qt-devel-3.3.7" dev=dm-0 ino=12048172 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775267.847:12058): avc: denied { add_name } for pid=8303 comm="yum" name="html" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775267.847:12058): arch=40000003 syscall=39 success=yes exit=0 a0=ea5daa8 a1=1c0 a2=d2a040 a3=ea5daa8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775270.820:12059): avc: denied { read } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775270.820:12059): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b9f1c a1=4 a2=5a6a64 a3=bf8b9f1c items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775270.828:12060): avc: denied { getattr } for pid=11015 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775270.828:12060): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf8b7c1c a2=104aff4 a3=9cb40c0 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775270.828:12060): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163775271.260:12061): avc: denied { getattr } for pid=11015 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775271.260:12061): arch=40000003 syscall=195 success=yes exit=0 a0=9cf3b18 a1=bf8b7fac a2=104aff4 a3=bf8b7fac items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775271.260:12061): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163775291.741:12062): avc: denied { read } for pid=11015 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163775291.741:12062): arch=40000003 syscall=3 success=yes exit=992 a0=23 a1=ac830388 a2=400 a3=400 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775291.741:12062): path="inotify" type=AVC msg=audit(1163775300.834:12063): avc: denied { relabelfrom } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12063): avc: denied { relabelto } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775300.834:12063): arch=40000003 syscall=227 success=yes exit=0 a0=cd1c498 a1=a2f0d3 a2=ede56b8 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.834:12064): avc: denied { setattr } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775300.834:12064): arch=40000003 syscall=212 success=yes exit=0 a0=cd1c498 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.834:12065): avc: denied { write } for pid=8303 comm="yum" name="settings" dev=dm-0 ino=10575168 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12065): avc: denied { add_name } for pid=8303 comm="yum" name="kstylerc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12065): avc: denied { create } for pid=8303 comm="yum" name="kstylerc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.834:12065): arch=40000003 syscall=5 success=yes exit=30 a0=ede5730 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.834:12066): avc: denied { remove_name } for pid=8303 comm="yum" name="kstylerc;455dcb57" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775300.834:12066): avc: denied { rename } for pid=8303 comm="yum" name="kstylerc;455dcb57" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=AVC msg=audit(1163775300.834:12066): avc: denied { unlink } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=10574748 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.834:12066): arch=40000003 syscall=38 success=yes exit=0 a0=ede5730 a1=ecb7060 a2=d2a040 a3=ede5730 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.846:12067): avc: denied { relabelfrom } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=AVC msg=audit(1163775300.846:12067): avc: denied { relabelto } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.846:12067): arch=40000003 syscall=227 success=yes exit=0 a0=ecb7060 a1=a2f0d3 a2=edebf48 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.846:12068): avc: denied { setattr } for pid=8303 comm="yum" name="kstylerc" dev=dm-0 ino=11523091 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.846:12068): arch=40000003 syscall=212 success=yes exit=0 a0=ecb7060 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775300.858:12069): avc: denied { write } for pid=8303 comm="yum" name="qtrc;455dcb57" dev=dm-0 ino=11523295 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775300.858:12069): arch=40000003 syscall=4 success=yes exit=1292 a0=1e a1=b6dcb000 a2=50c a3=edebf70 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775300.858:12069): path="/usr/lib/qt-3.3/etc/settings/qtrc;455dcb57" type=AVC msg=audit(1163775301.458:12070): avc: denied { create } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12070): arch=40000003 syscall=83 success=yes exit=0 a0=eef78b8 a1=ec7bbf0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775301.458:12071): avc: denied { rename } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd;455dcb57" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775301.458:12071): avc: denied { unlink } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=10574325 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12071): arch=40000003 syscall=38 success=yes exit=0 a0=ec7bbf0 a1=ec7bc50 a2=d2a040 a3=ec7bbf0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775301.458:12072): avc: denied { relabelfrom } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775301.458:12072): avc: denied { relabelto } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12072): arch=40000003 syscall=227 success=yes exit=0 a0=ec7bc50 a1=a2f0d3 a2=ec7bbf0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775301.458:12073): avc: denied { setattr } for pid=8303 comm="yum" name="08e8e1c95fe2fc01f976f1e063a24ccd" dev=dm-0 ino=12210965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775301.458:12073): arch=40000003 syscall=198 success=yes exit=0 a0=ec7bc50 a1=0 a2=0 a3=ecb54a4 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775327.275:12074): avc: denied { read } for pid=11015 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775327.275:12074): arch=40000003 syscall=5 success=yes exit=58 a0=acb3c538 a1=0 a2=bf8b5174 a3=acb3c538 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163775327.383:12075): avc: denied { execute } for pid=11015 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=user_u:object_r:user_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775327.383:12075): arch=40000003 syscall=192 success=yes exit=134664192 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775327.383:12075): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163775357.749:12076): avc: denied { setattr } for pid=11129 comm="update-desktop-" name=".mimeinfo.cache.FYVVIT" dev=dm-0 ino=10937683 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775357.749:12076): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=1a4 a3=9caef44 items=0 ppid=11124 pid=11129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775361.813:12077): avc: denied { read } for pid=3838 comm="nautilus" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775361.813:12077): arch=40000003 syscall=33 success=yes exit=0 a0=bf97ae55 a1=4 a2=da3a64 a3=bf97ae55 items=0 ppid=1 pid=3838 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.318:12078): avc: denied { append } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.318:12078): arch=40000003 syscall=5 success=yes exit=15 a0=964bc70 a1=441 a2=1b6 a3=964c020 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.338:12079): avc: denied { create } for pid=8549 comm="gconfd-2" name="saved_state.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.338:12079): arch=40000003 syscall=5 success=yes exit=15 a0=9829600 a1=241 a2=1c0 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.346:12080): avc: denied { write } for pid=8549 comm="gconfd-2" name="saved_state.tmp" dev=dm-0 ino=13127397 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.346:12080): arch=40000003 syscall=4 success=yes exit=1897 a0=f a1=9829bf8 a2=769 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775366.346:12080): path="/root/.gconfd/saved_state.tmp" type=AVC msg=audit(1163775366.346:12081): avc: denied { rename } for pid=8549 comm="gconfd-2" name="saved_state" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.346:12081): arch=40000003 syscall=38 success=yes exit=0 a0=96418f0 a1=9828f58 a2=0 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775366.346:12082): avc: denied { unlink } for pid=8549 comm="gconfd-2" name="saved_state.orig" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163775366.346:12082): arch=40000003 syscall=10 success=yes exit=0 a0=9828f58 a1=96418f0 a2=412708 a3=0 items=0 ppid=1 pid=8549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775368.578:12083): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163775368.578:12083): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775368.578:12083): path="socket:[31406]" type=AVC msg=audit(1163775373.374:12084): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.374:12084): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12085): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12085): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12086): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12086): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12087): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.378:12087): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12088): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12088): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12089): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.378:12089): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.378:12090): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.378:12090): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12091): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12091): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12092): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12092): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12093): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12093): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12094): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.382:12094): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12095): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=AVC msg=audit(1163775373.382:12096): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775373.382:12096): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775373.382:12096): path="/dev/net/tun" type=AVC msg=audit(1163775373.382:12097): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775373.382:12097): arch=40000003 syscall=3 success=yes exit=40 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775373.382:12097): path="/dev/net/tun" type=SYSCALL msg=audit(1163775373.382:12095): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12098): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.382:12098): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.382:12099): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775373.382:12099): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.386:12100): avc: denied { kill } for pid=11138 comm="killall" capability=5 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775373.386:12100): arch=40000003 syscall=37 success=yes exit=0 a0=1042 a1=f a2=0 a3=1042 items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.394:12101): avc: denied { ptrace } for pid=11138 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=process type=SYSCALL msg=audit(1163775373.394:12101): arch=40000003 syscall=195 success=yes exit=0 a0=9194088 a1=bfed26f4 a2=6d1ff4 a3=bfed1a6c items=0 ppid=11135 pid=11138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775373.638:12102): avc: denied { unlink } for pid=11135 comm="gconftool-2" name="%gconf-tree-th.xml" dev=dm-0 ino=9331348 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775373.638:12102): arch=40000003 syscall=38 success=yes exit=0 a0=9717650 a1=94ac4e8 a2=14d820 a3=0 items=0 ppid=11133 pid=11135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775374.162:12103): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163775374.162:12103): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775374.162:12103): path="socket:[31406]" type=AVC msg=audit(1163775376.486:12104): avc: denied { unlink } for pid=8303 comm="yum" name="boxes.h" dev=dm-0 ino=10607191 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.486:12104): arch=40000003 syscall=38 success=yes exit=0 a0=ecc78b0 a1=effad30 a2=d2a040 a3=ecc78b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.486:12105): avc: denied { relabelto } for pid=8303 comm="yum" name="boxes.h" dev=dm-0 ino=5368786 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.486:12105): arch=40000003 syscall=227 success=yes exit=0 a0=effad30 a1=a2f0d3 a2=ecc7a58 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.486:12106): avc: denied { setattr } for pid=8303 comm="yum" name="boxes.h" dev=dm-0 ino=5368786 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.486:12106): arch=40000003 syscall=212 success=yes exit=0 a0=effad30 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.866:12107): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311909 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775376.866:12107): avc: denied { add_name } for pid=8303 comm="yum" name="metacity.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775376.866:12107): arch=40000003 syscall=5 success=yes exit=30 a0=ecc7cf8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.866:12108): avc: denied { remove_name } for pid=8303 comm="yum" name="metacity.mo;455dcb57" dev=dm-0 ino=10316951 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775376.866:12108): avc: denied { unlink } for pid=8303 comm="yum" name="metacity.mo" dev=dm-0 ino=10325162 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.866:12108): arch=40000003 syscall=38 success=yes exit=0 a0=ecc7cf8 a1=ecc7c20 a2=d2a040 a3=ecc7cf8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.870:12109): avc: denied { relabelto } for pid=8303 comm="yum" name="metacity.mo" dev=dm-0 ino=10316951 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.870:12109): arch=40000003 syscall=227 success=yes exit=0 a0=ecc7c20 a1=a2f0d3 a2=ebfe948 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775376.870:12110): avc: denied { setattr } for pid=8303 comm="yum" name="metacity.mo" dev=dm-0 ino=10316951 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775376.870:12110): arch=40000003 syscall=212 success=yes exit=0 a0=ecc7c20 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.527:12111): avc: denied { write } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10311889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775380.527:12111): avc: denied { add_name } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775380.527:12111): arch=40000003 syscall=5 success=yes exit=30 a0=ecc7cf8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.539:12112): avc: denied { remove_name } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz;455dcb57" dev=dm-0 ino=10319617 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775380.539:12112): avc: denied { unlink } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz" dev=dm-0 ino=10319618 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775380.539:12112): arch=40000003 syscall=38 success=yes exit=0 a0=ecc7cf8 a1=ecc7c20 a2=d2a040 a3=ecc7cf8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.571:12113): avc: denied { relabelto } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz" dev=dm-0 ino=10319617 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775380.571:12113): arch=40000003 syscall=227 success=yes exit=0 a0=ecc7c20 a1=a2f0d3 a2=ebfe928 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775380.571:12114): avc: denied { setattr } for pid=8303 comm="yum" name="metacity-theme-viewer.1.gz" dev=dm-0 ino=10319617 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775380.571:12114): arch=40000003 syscall=212 success=yes exit=0 a0=ecc7c20 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775389.011:12115): avc: denied { execute } for pid=11140 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775389.011:12115): avc: denied { execute_no_trans } for pid=11140 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163775389.011:12115): avc: denied { read } for pid=11140 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775389.011:12115): arch=40000003 syscall=11 success=yes exit=0 a0=951ebb8 a1=951e220 a2=951ec38 a3=951e120 items=0 ppid=11139 pid=11140 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775389.011:12115): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163775389.011:12115): path="/sbin/ldconfig" type=AVC msg=audit(1163775396.440:12116): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12116): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775396.440:12117): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12117): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775396.440:12118): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12118): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775396.440:12119): avc: denied { ptrace } for pid=11143 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163775396.440:12119): arch=40000003 syscall=195 success=yes exit=0 a0=81c0088 a1=bfd375d4 a2=39dff4 a3=bfd3694c items=0 ppid=11142 pid=11143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.248:12120): avc: denied { write } for pid=8303 comm="yum" name="/" dev=sda1 ino=2 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=AVC msg=audit(1163775400.248:12120): avc: denied { add_name } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=AVC msg=audit(1163775400.248:12120): avc: denied { create } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.248:12120): arch=40000003 syscall=5 success=yes exit=30 a0=ecc7c20 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.356:12121): avc: denied { write } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.356:12121): arch=40000003 syscall=4 success=yes exit=65536 a0=1e a1=ef9fd28 a2=10000 a3=bef75f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775400.356:12121): path="/boot/System.map-2.6.18-1.2849.fc6;455dcb57" type=AVC msg=audit(1163775400.436:12122): avc: denied { remove_name } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=dir type=AVC msg=audit(1163775400.436:12122): avc: denied { rename } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6;455dcb57" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.436:12122): arch=40000003 syscall=38 success=yes exit=0 a0=ecc7c20 a1=ebfe948 a2=d2a040 a3=ecc7c20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.500:12123): avc: denied { relabelfrom } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=AVC msg=audit(1163775400.500:12123): avc: denied { relabelto } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_map_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.500:12123): arch=40000003 syscall=227 success=yes exit=0 a0=ebfe948 a1=a2f0d3 a2=ecc7c20 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.500:12124): avc: denied { setattr } for pid=8303 comm="yum" name="System.map-2.6.18-1.2849.fc6" dev=sda1 ino=10046 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:system_map_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.500:12124): arch=40000003 syscall=212 success=yes exit=0 a0=ebfe948 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.508:12125): avc: denied { relabelto } for pid=8303 comm="yum" name="config-2.6.18-1.2849.fc6" dev=sda1 ino=10047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.508:12125): arch=40000003 syscall=227 success=yes exit=0 a0=ebfe948 a1=a2f0d3 a2=ec35ac8 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.508:12126): avc: denied { setattr } for pid=8303 comm="yum" name="config-2.6.18-1.2849.fc6" dev=sda1 ino=10047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.508:12126): arch=40000003 syscall=212 success=yes exit=0 a0=ebfe948 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.712:12127): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=13716388 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.712:12127): avc: denied { add_name } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.712:12127): avc: denied { create } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1163775400.712:12127): arch=40000003 syscall=39 success=yes exit=0 a0=ebfe948 a1=1c0 a2=d2a040 a3=ebfe948 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.736:12128): avc: denied { relabelfrom } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" dev=dm-0 ino=13717306 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.736:12128): avc: denied { relabelto } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" dev=dm-0 ino=13717306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1163775400.736:12128): arch=40000003 syscall=227 success=yes exit=0 a0=ebfe948 a1=a2f0d3 a2=eee8910 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12129): avc: denied { setattr } for pid=8303 comm="yum" name="2.6.18-1.2849.fc6" dev=dm-0 ino=13717306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=SYSCALL msg=audit(1163775400.740:12129): arch=40000003 syscall=212 success=yes exit=0 a0=ebfe948 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12130): avc: denied { create } for pid=8303 comm="yum" name="build;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12130): arch=40000003 syscall=83 success=yes exit=0 a0=ef9fd28 a1=eee8910 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12131): avc: denied { remove_name } for pid=8303 comm="yum" name="build;455dcb57" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir type=AVC msg=audit(1163775400.740:12131): avc: denied { rename } for pid=8303 comm="yum" name="build;455dcb57" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12131): arch=40000003 syscall=38 success=yes exit=0 a0=eee8910 a1=ec0e4c8 a2=d2a040 a3=eee8910 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12132): avc: denied { relabelfrom } for pid=8303 comm="yum" name="build" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=lnk_file type=AVC msg=audit(1163775400.740:12132): avc: denied { relabelto } for pid=8303 comm="yum" name="build" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12132): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e4c8 a1=a2f0d3 a2=ec0e4f8 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.740:12133): avc: denied { setattr } for pid=8303 comm="yum" name="build" dev=dm-0 ino=13720656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775400.740:12133): arch=40000003 syscall=198 success=yes exit=0 a0=ec0e4c8 a1=0 a2=0 a3=ec1460c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.744:12134): avc: denied { create } for pid=8303 comm="yum" name="aes-i586.ko;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.744:12134): arch=40000003 syscall=5 success=yes exit=30 a0=ec0e630 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.744:12135): avc: denied { write } for pid=8303 comm="yum" name="aes-i586.ko;455dcb57" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.744:12135): arch=40000003 syscall=4 success=yes exit=16384 a0=1e a1=ef9fd28 a2=4000 a3=ec0e680 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775400.744:12135): path="/lib/modules/2.6.18-1.2849.fc6/kernel/arch/i386/crypto/aes-i586.ko;455dcb57" type=AVC msg=audit(1163775400.744:12136): avc: denied { rename } for pid=8303 comm="yum" name="aes-i586.ko;455dcb57" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.744:12136): arch=40000003 syscall=38 success=yes exit=0 a0=ec0e630 a1=ec0e680 a2=d2a040 a3=ec0e630 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.760:12137): avc: denied { relabelfrom } for pid=8303 comm="yum" name="aes-i586.ko" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=AVC msg=audit(1163775400.760:12137): avc: denied { relabelto } for pid=8303 comm="yum" name="aes-i586.ko" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.760:12137): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e680 a1=a2f0d3 a2=eee8910 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775400.760:12138): avc: denied { setattr } for pid=8303 comm="yum" name="aes-i586.ko" dev=dm-0 ino=13720662 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775400.760:12138): arch=40000003 syscall=212 success=yes exit=0 a0=ec0e680 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775422.877:12139): avc: denied { execute } for pid=11148 comm="new-kernel-pkg" name="depmod" dev=dm-0 ino=9984676 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:depmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.877:12139): arch=40000003 syscall=33 success=yes exit=0 a0=97f4298 a1=1 a2=11 a3=97f4298 items=0 ppid=11144 pid=11148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="new-kernel-pkg" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775422.877:12140): avc: denied { read } for pid=11148 comm="new-kernel-pkg" name="depmod" dev=dm-0 ino=9984676 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:depmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.877:12140): arch=40000003 syscall=33 success=yes exit=0 a0=97f4298 a1=4 a2=ffffffff a3=97f4298 items=0 ppid=11144 pid=11148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="new-kernel-pkg" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775422.877:12141): avc: denied { execute_no_trans } for pid=11156 comm="new-kernel-pkg" name="depmod" dev=dm-0 ino=9984676 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:depmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.877:12141): arch=40000003 syscall=11 success=yes exit=0 a0=97f4298 a1=97e60a0 a2=97e98a8 a3=97f45c8 items=0 ppid=11148 pid=11156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="depmod" exe="/sbin/depmod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775422.877:12141): path="/sbin/depmod" type=AVC msg=audit(1163775422.965:12142): avc: denied { read } for pid=11156 comm="depmod" name="anubis.ko" dev=dm-0 ino=13720675 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775422.965:12142): arch=40000003 syscall=5 success=yes exit=7 a0=9d7475c a1=0 a2=1b6 a3=9d7cf10 items=0 ppid=11148 pid=11156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="depmod" exe="/sbin/depmod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.421:12143): avc: denied { execute } for pid=11157 comm="new-kernel-pkg" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=AVC msg=audit(1163775423.421:12143): avc: denied { execute_no_trans } for pid=11157 comm="new-kernel-pkg" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=AVC msg=audit(1163775423.421:12143): avc: denied { read } for pid=11157 comm="new-kernel-pkg" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.421:12143): arch=40000003 syscall=11 success=yes exit=0 a0=97f3dc0 a1=97e60a0 a2=97e98a8 a3=97f42d8 items=0 ppid=11148 pid=11157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.421:12143): path="/sbin/mkinitrd" type=AVC_PATH msg=audit(1163775423.421:12143): path="/sbin/mkinitrd" type=AVC msg=audit(1163775423.445:12144): avc: denied { ioctl } for pid=11157 comm="mkinitrd" name="mkinitrd" dev=dm-0 ino=9984521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.445:12144): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf930808 a3=bf930848 items=0 ppid=11148 pid=11157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.445:12144): path="/sbin/mkinitrd" type=AVC msg=audit(1163775423.725:12145): avc: denied { execute } for pid=11165 comm="mkinitrd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.725:12145): arch=40000003 syscall=33 success=yes exit=0 a0=99ec890 a1=1 a2=11 a3=99ec890 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.725:12146): avc: denied { read } for pid=11165 comm="mkinitrd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.725:12146): arch=40000003 syscall=33 success=yes exit=0 a0=99ec890 a1=4 a2=ffffffff a3=99ec890 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.725:12147): avc: denied { execute_no_trans } for pid=11165 comm="mkinitrd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.725:12147): arch=40000003 syscall=11 success=yes exit=0 a0=99ec890 a1=99ecaa8 a2=99c4170 a3=99ec908 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.725:12147): path="/sbin/modprobe" type=AVC msg=audit(1163775423.809:12148): avc: denied { read } for pid=11165 comm="modprobe" name="modules.dep" dev=dm-0 ino=13722566 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.809:12148): arch=40000003 syscall=5 success=yes exit=3 a0=822d1d0 a1=0 a2=1b6 a3=822d3b8 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.813:12149): avc: denied { write } for pid=11165 comm="modprobe" name="uhci-hcd.ko" dev=dm-0 ino=13721860 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.813:12149): arch=40000003 syscall=5 success=yes exit=3 a0=822d174 a1=2 a2=0 a3=822d174 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775423.813:12150): avc: denied { lock } for pid=11165 comm="modprobe" name="uhci-hcd.ko" dev=dm-0 ino=13721860 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163775423.813:12150): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfb99a20 a3=bfb99a20 items=0 ppid=11164 pid=11165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775423.813:12150): path="/lib/modules/2.6.18-1.2849.fc6/kernel/drivers/usb/host/uhci-hcd.ko" type=AVC msg=audit(1163775424.821:12151): avc: denied { execute } for pid=11318 comm="mkinitrd" name="lvm.static" dev=dm-0 ino=9984644 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775424.821:12151): arch=40000003 syscall=33 success=yes exit=0 a0=99ebea8 a1=1 a2=11 a3=99ebea8 items=0 ppid=11157 pid=11318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775424.825:12152): avc: denied { read } for pid=11318 comm="mkinitrd" name="lvm.static" dev=dm-0 ino=9984644 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775424.825:12152): arch=40000003 syscall=33 success=yes exit=0 a0=99ebea8 a1=4 a2=ffffffff a3=99ebea8 items=0 ppid=11157 pid=11318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mkinitrd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775424.825:12153): avc: denied { execute_no_trans } for pid=11319 comm="mkinitrd" name="lvm.static" dev=dm-0 ino=9984644 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775424.825:12153): arch=40000003 syscall=11 success=yes exit=0 a0=99ebea8 a1=99eba60 a2=99c4170 a3=99ebf60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775424.825:12153): path="/sbin/lvm.static" type=AVC msg=audit(1163775425.329:12154): avc: denied { read } for pid=11319 comm="lvm.static" name="lvm.conf" dev=dm-0 ino=9331271 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.329:12154): arch=40000003 syscall=5 success=yes exit=3 a0=8578d00 a1=8000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.341:12155): avc: denied { read } for pid=11319 comm="lvm.static" name=".cache" dev=dm-0 ino=9331107 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_metadata_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.341:12155): arch=40000003 syscall=5 success=yes exit=3 a0=8585c70 a1=8000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.349:12156): avc: denied { getattr } for pid=11319 comm="lvm.static" name="001" dev=tmpfs ino=4880 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.349:12156): arch=40000003 syscall=195 success=yes exit=0 a0=858e330 a1=bf83d63c a2=1 a3=858e330 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.349:12156): path="/dev/bus/usb/001/001" type=AVC msg=audit(1163775425.353:12157): avc: denied { getattr } for pid=11319 comm="lvm.static" name="kcore" dev=proc ino=-268435434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:proc_kcore_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.353:12157): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12157): path="/proc/kcore" type=AVC msg=audit(1163775425.353:12158): avc: denied { getattr } for pid=11319 comm="lvm.static" name="microcode" dev=tmpfs ino=3250 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.353:12158): arch=40000003 syscall=195 success=yes exit=0 a0=858c210 a1=bf83d83c a2=1 a3=858c210 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12158): path="/dev/cpu/microcode" type=AVC msg=audit(1163775425.353:12159): avc: denied { getattr } for pid=11319 comm="lvm.static" name="mice" dev=tmpfs ino=3191 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mouse_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.353:12159): arch=40000003 syscall=195 success=yes exit=0 a0=858ae90 a1=bf83d83c a2=1 a3=858ae90 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12159): path="/dev/input/mice" type=AVC msg=audit(1163775425.353:12160): avc: denied { getattr } for pid=11319 comm="lvm.static" name="lp0" dev=tmpfs ino=5586 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:printer_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.353:12160): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.353:12160): path="/dev/lp0" type=AVC msg=audit(1163775425.361:12161): avc: denied { getattr } for pid=11319 comm="lvm.static" name="control" dev=tmpfs ino=965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12161): arch=40000003 syscall=195 success=yes exit=0 a0=8585c60 a1=bf83d83c a2=1 a3=8585c60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12161): path="/dev/mapper/control" type=AVC msg=audit(1163775425.361:12162): avc: denied { getattr } for pid=11319 comm="lvm.static" name="mem" dev=tmpfs ino=2000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12162): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12162): path="/dev/mem" type=AVC msg=audit(1163775425.361:12163): avc: denied { getattr } for pid=11319 comm="lvm.static" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12163): arch=40000003 syscall=195 success=yes exit=0 a0=8585c60 a1=bf83d83c a2=1 a3=8585c60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12163): path="/dev/net/tun" type=AVC msg=audit(1163775425.361:12164): avc: denied { getattr } for pid=11319 comm="lvm.static" name="nvram" dev=tmpfs ino=3204 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:nvram_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12164): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12164): path="/dev/nvram" type=AVC msg=audit(1163775425.361:12165): avc: denied { getattr } for pid=11319 comm="lvm.static" name="ppp" dev=tmpfs ino=1477 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ppp_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.361:12165): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.361:12165): path="/dev/ppp" type=AVC msg=audit(1163775425.365:12166): avc: denied { getattr } for pid=11319 comm="lvm.static" name="rtc" dev=tmpfs ino=744 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:clock_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12166): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12166): path="/dev/rtc" type=AVC msg=audit(1163775425.365:12167): avc: denied { getattr } for pid=11319 comm="lvm.static" name="sg0" dev=tmpfs ino=4865 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12167): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12167): path="/dev/sg0" type=AVC msg=audit(1163775425.365:12168): avc: denied { getattr } for pid=11319 comm="lvm.static" name="systty" dev=tmpfs ino=740 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12168): arch=40000003 syscall=195 success=yes exit=0 a0=8586188 a1=bf83d93c a2=1 a3=8586188 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12168): path="/dev/systty" type=AVC msg=audit(1163775425.365:12169): avc: denied { getattr } for pid=11319 comm="lvm.static" name="blktap0" dev=tmpfs ino=10081 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xen_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775425.365:12169): arch=40000003 syscall=195 success=yes exit=0 a0=8585c60 a1=bf83d83c a2=1 a3=8585c60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.365:12169): path="/dev/xen/blktap0" type=AVC msg=audit(1163775425.425:12170): avc: denied { read write search } for pid=11319 comm="lvm.static" name="lvm" dev=dm-0 ino=14436627 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1163775425.425:12170): arch=40000003 syscall=33 success=yes exit=0 a0=81deb60 a1=7 a2=81d2a28 a3=81deb60 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.425:12171): avc: denied { add_name } for pid=11319 comm="lvm.static" name="V_VolGroup00" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=AVC msg=audit(1163775425.425:12171): avc: denied { create } for pid=11319 comm="lvm.static" name="V_VolGroup00" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lvm_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.425:12171): arch=40000003 syscall=5 success=yes exit=3 a0=bf83e3a8 a1=8442 a2=1ff a3=1ff items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.437:12172): avc: denied { lock } for pid=11319 comm="lvm.static" name="V_VolGroup00" dev=dm-0 ino=14438001 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lvm_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775425.437:12172): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=1 a2=81d2a28 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.437:12172): path="/var/lock/lvm/V_VolGroup00" type=AVC msg=audit(1163775425.437:12173): avc: denied { read } for pid=11319 comm="lvm.static" name="ram0" dev=tmpfs ino=790 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775425.437:12173): arch=40000003 syscall=5 success=no exit=-22 a0=857f7f8 a1=4c000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775425.437:12174): avc: denied { ioctl } for pid=11319 comm="lvm.static" name="ram0" dev=tmpfs ino=790 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775425.437:12174): arch=40000003 syscall=54 success=yes exit=0 a0=4 a1=80041270 a2=857f008 a3=857eff0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775425.437:12174): path="/dev/ram0" type=AVC msg=audit(1163775425.465:12175): avc: denied { dac_override } for pid=11319 comm="lvm.static" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775425.465:12175): arch=40000003 syscall=5 success=yes exit=4 a0=857d6f8 a1=4c000 a2=0 a3=0 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.045:12176): avc: denied { remove_name } for pid=11319 comm="lvm.static" name="V_VolGroup00" dev=dm-0 ino=14438001 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_lock_t:s0 tclass=dir type=AVC msg=audit(1163775427.045:12176): avc: denied { unlink } for pid=11319 comm="lvm.static" name="V_VolGroup00" dev=dm-0 ino=14438001 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lvm_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775427.045:12176): arch=40000003 syscall=10 success=yes exit=0 a0=858d878 a1=0 a2=81d2a28 a3=bf83e28c items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.045:12177): avc: denied { write } for pid=11319 comm="lvm.static" name=".cache" dev=dm-0 ino=9331107 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_metadata_t:s0 tclass=file type=SYSCALL msg=audit(1163775427.045:12177): arch=40000003 syscall=5 success=yes exit=3 a0=8586198 a1=8241 a2=1b6 a3=4 items=0 ppid=11318 pid=11319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.137:12178): avc: denied { read write } for pid=11322 comm="lvm.static" name="control" dev=tmpfs ino=965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775427.137:12178): arch=40000003 syscall=5 success=yes exit=5 a0=bf9142d4 a1=8002 a2=0 a3=0 items=0 ppid=11321 pid=11322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775427.137:12179): avc: denied { ioctl } for pid=11322 comm="lvm.static" name="control" dev=tmpfs ino=965 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775427.137:12179): arch=40000003 syscall=54 success=yes exit=0 a0=5 a1=c134fd00 a2=8d312b0 a3=81d6b60 items=0 ppid=11321 pid=11322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="lvm.static" exe="/sbin/lvm.static" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775427.137:12179): path="/dev/mapper/control" type=AVC msg=audit(1163775428.994:12180): avc: denied { create } for pid=11620 comm="dmraid" name=".lock" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775428.994:12180): arch=40000003 syscall=5 success=yes exit=3 a0=ca36cc a1=442 a2=1ff a3=81b73e0 items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775429.014:12181): avc: denied { lock } for pid=11620 comm="dmraid" name=".lock" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775429.014:12181): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=2 a2=cac650 a3=81b73e0 items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775429.014:12181): path="/var/lock/dmraid/.lock" type=AVC msg=audit(1163775429.014:12182): avc: denied { sys_rawio } for pid=11620 comm="dmraid" capability=17 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775429.014:12182): arch=40000003 syscall=54 success=yes exit=0 a0=5 a1=31f a2=81b9708 a3=81b9708 items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775429.110:12183): avc: denied { unlink } for pid=11620 comm="dmraid" name=".lock" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775429.110:12183): arch=40000003 syscall=10 success=yes exit=0 a0=ca36cc a1=81b73e0 a2=cac650 a3=ca36cc items=0 ppid=11619 pid=11620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="dmraid" exe="/sbin/dmraid" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775430.234:12184): avc: denied { mknod } for pid=11693 comm="mknod" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163775430.234:12184): avc: denied { create } for pid=11693 comm="mknod" name="ram0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775430.234:12184): arch=40000003 syscall=14 success=yes exit=0 a0=bfe88bb3 a1=61b6 a2=100 a3=0 items=0 ppid=11157 pid=11693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mknod" exe="/bin/mknod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775430.246:12185): avc: denied { create } for pid=11696 comm="mknod" name="null" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775430.246:12185): arch=40000003 syscall=14 success=yes exit=0 a0=bfde5bb3 a1=21b6 a2=103 a3=0 items=0 ppid=11157 pid=11696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mknod" exe="/bin/mknod" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775430.882:12186): avc: denied { ioctl } for pid=11835 comm="gzip" name="initrd-2.6.18-1.2849.fc6.img" dev=sda1 ino=10050 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775430.882:12186): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfcd9728 a3=bfcd9768 items=0 ppid=11157 pid=11835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gzip" exe="/bin/gzip" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775430.882:12186): path="/boot/initrd-2.6.18-1.2849.fc6.img" type=AVC msg=audit(1163775433.094:12187): avc: denied { unlink } for pid=11836 comm="rm" name="ram1" dev=dm-0 ino=14568121 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775433.094:12187): arch=40000003 syscall=10 success=yes exit=0 a0=80b198f a1=80b197c a2=805277c a3=bfc2fde4 items=0 ppid=11157 pid=11836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.094:12188): avc: denied { unlink } for pid=11836 comm="rm" name="ttyS1" dev=dm-0 ino=14568140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163775433.094:12188): arch=40000003 syscall=10 success=yes exit=0 a0=80b19a7 a1=80b1994 a2=805277c a3=bfc2fde4 items=0 ppid=11157 pid=11836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.346:12189): avc: denied { write } for pid=11843 comm="grubby" name="fd0" dev=tmpfs ino=4597 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:removable_device_t:s0 tclass=blk_file type=SYSCALL msg=audit(1163775433.346:12189): arch=40000003 syscall=5 success=no exit=-6 a0=9651970 a1=0 a2=0 a3=3 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12190): avc: denied { write } for pid=11843 comm="grubby" name="blkid.tab" dev=dm-0 ino=9331364 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12190): arch=40000003 syscall=33 success=yes exit=0 a0=96536c0 a1=2 a2=96518f8 a3=3 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12191): avc: denied { write } for pid=11843 comm="grubby" name="blkid" dev=dm-0 ino=9330183 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=AVC msg=audit(1163775433.590:12191): avc: denied { add_name } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=AVC msg=audit(1163775433.590:12191): avc: denied { create } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12191): arch=40000003 syscall=5 success=yes exit=3 a0=96532c0 a1=c2 a2=180 a3=62a46a items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12192): avc: denied { setattr } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" dev=dm-0 ino=9331792 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12192): arch=40000003 syscall=94 success=yes exit=0 a0=3 a1=1a4 a2=3 a3=3 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.590:12193): avc: denied { write } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" dev=dm-0 ino=9331792 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.590:12193): arch=40000003 syscall=4 success=yes exit=1160 a0=3 a1=b7fa8000 a2=488 a3=488 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775433.590:12193): path="/etc/blkid/blkid.tab-lm5AcU" type=AVC msg=audit(1163775433.594:12194): avc: denied { remove_name } for pid=11843 comm="grubby" name="blkid.tab.old" dev=dm-0 ino=9330705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=dir type=AVC msg=audit(1163775433.594:12194): avc: denied { unlink } for pid=11843 comm="grubby" name="blkid.tab.old" dev=dm-0 ino=9330705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.594:12194): arch=40000003 syscall=10 success=yes exit=0 a0=9651920 a1=0 a2=9651920 a3=96518f8 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.594:12195): avc: denied { link } for pid=11843 comm="grubby" name="blkid.tab" dev=dm-0 ino=9331364 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.594:12195): arch=40000003 syscall=9 success=yes exit=0 a0=96536c0 a1=9651920 a2=9651920 a3=96518f8 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.594:12196): avc: denied { rename } for pid=11843 comm="grubby" name="blkid.tab-lm5AcU" dev=dm-0 ino=9331792 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.594:12196): arch=40000003 syscall=38 success=yes exit=0 a0=96532c0 a1=96536c0 a2=9651920 a3=96518f8 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.626:12197): avc: denied { setattr } for pid=11843 comm="grubby" name="grub.conf-" dev=sda1 ino=2011 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.626:12197): arch=40000003 syscall=15 success=yes exit=0 a0=bffadda0 a1=180 a2=80efd04 a3=9651660 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775433.626:12198): avc: denied { unlink } for pid=11843 comm="grubby" name="grub.conf" dev=sda1 ino=2010 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:boot_t:s0 tclass=file type=SYSCALL msg=audit(1163775433.626:12198): arch=40000003 syscall=38 success=yes exit=0 a0=bffadda0 a1=80d08b1 a2=80efd04 a3=0 items=0 ppid=11148 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="grubby" exe="/sbin/grubby" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.530:12199): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.530:12199): arch=40000003 syscall=4 success=yes exit=57 a0=4 a1=b7bd1000 a2=39 a3=39 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.530:12199): path="/var/log/yum.log" type=AVC msg=audit(1163775434.590:12200): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775434.590:12200): avc: denied { add_name } for pid=8303 comm="yum" name="update-mime-database;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775434.590:12200): avc: denied { create } for pid=8303 comm="yum" name="update-mime-database;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.590:12200): arch=40000003 syscall=5 success=yes exit=30 a0=ec35558 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.590:12201): avc: denied { write } for pid=8303 comm="yum" name="update-mime-database;455dcb57" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.590:12201): arch=40000003 syscall=4 success=yes exit=32768 a0=1e a1=ef73980 a2=8000 a3=9c6ab30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.590:12201): path="/usr/bin/update-mime-database;455dcb57" type=AVC msg=audit(1163775434.590:12202): avc: denied { remove_name } for pid=8303 comm="yum" name="update-mime-database;455dcb57" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775434.590:12202): avc: denied { rename } for pid=8303 comm="yum" name="update-mime-database;455dcb57" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775434.590:12202): avc: denied { unlink } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.590:12202): arch=40000003 syscall=38 success=yes exit=0 a0=ec35558 a1=edeae48 a2=d2a040 a3=ec35558 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12203): avc: denied { relabelfrom } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775434.646:12203): avc: denied { relabelto } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12203): arch=40000003 syscall=227 success=yes exit=0 a0=edeae48 a1=a2f0d3 a2=efba528 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12204): avc: denied { setattr } for pid=8303 comm="yum" name="update-mime-database" dev=dm-0 ino=10319620 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12204): arch=40000003 syscall=212 success=yes exit=0 a0=edeae48 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12205): avc: denied { create } for pid=8303 comm="yum" name="shared-mime-info.pc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12205): arch=40000003 syscall=5 success=yes exit=30 a0=f03cde8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.646:12206): avc: denied { write } for pid=8303 comm="yum" name="shared-mime-info.pc;455dcb57" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12206): arch=40000003 syscall=4 success=yes exit=177 a0=1e a1=b6dcb000 a2=b1 a3=9c6ab30 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.646:12206): path="/usr/lib/pkgconfig/shared-mime-info.pc;455dcb57" type=AVC msg=audit(1163775434.646:12207): avc: denied { rename } for pid=8303 comm="yum" name="shared-mime-info.pc;455dcb57" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775434.646:12207): avc: denied { unlink } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10319316 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.646:12207): arch=40000003 syscall=38 success=yes exit=0 a0=f03cde8 a1=ec0e498 a2=d2a040 a3=f03cde8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.662:12208): avc: denied { relabelfrom } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775434.662:12208): avc: denied { relabelto } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.662:12208): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e498 a1=a2f0d3 a2=efba660 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.666:12209): avc: denied { setattr } for pid=8303 comm="yum" name="shared-mime-info.pc" dev=dm-0 ino=10325206 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775434.666:12209): arch=40000003 syscall=212 success=yes exit=0 a0=ec0e498 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.666:12210): avc: denied { write } for pid=8303 comm="yum" name="applications" dev=dm-0 ino=10311883 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775434.666:12210): avc: denied { add_name } for pid=8303 comm="yum" name="defaults.list;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.666:12210): arch=40000003 syscall=5 success=yes exit=30 a0=f03cde8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.666:12211): avc: denied { remove_name } for pid=8303 comm="yum" name="defaults.list;455dcb57" dev=dm-0 ino=10319316 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.666:12211): arch=40000003 syscall=38 success=yes exit=0 a0=f03cde8 a1=ec0e498 a2=d2a040 a3=f03cde8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.690:12212): avc: denied { read } for pid=11015 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.690:12212): arch=40000003 syscall=3 success=yes exit=304 a0=23 a1=acbc0110 a2=400 a3=400 items=0 ppid=1 pid=11015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163775434.690:12212): path="inotify" type=AVC msg=audit(1163775434.690:12213): avc: denied { relabelfrom } for pid=8303 comm="yum" name="shared-mime-info-0.19" dev=dm-0 ino=10968927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775434.690:12213): avc: denied { relabelto } for pid=8303 comm="yum" name="shared-mime-info-0.19" dev=dm-0 ino=10968927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.690:12213): arch=40000003 syscall=227 success=yes exit=0 a0=ec0e498 a1=a2f0d3 a2=efba8d0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775434.690:12214): avc: denied { setattr } for pid=8303 comm="yum" name="shared-mime-info-0.19" dev=dm-0 ino=10968927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775434.690:12214): arch=40000003 syscall=212 success=yes exit=0 a0=ec0e498 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775436.302:12215): avc: denied { unlink } for pid=12108 comm="update-mime-dat" name="x-kodak-dcr.xml" dev=dm-0 ino=10216297 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775436.302:12215): arch=40000003 syscall=38 success=yes exit=0 a0=95cf988 a1=95e7190 a2=95cf988 a3=95e7190 items=0 ppid=12107 pid=12108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-mime-dat" exe="/usr/bin/update-mime-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.202:12216): avc: denied { write } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775437.202:12216): avc: denied { add_name } for pid=8303 comm="yum" name="gsf-office-thumbnailer.schemas;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.202:12216): arch=40000003 syscall=5 success=yes exit=30 a0=f03d5b8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.254:12217): avc: denied { remove_name } for pid=8303 comm="yum" name="gsf-office-thumbnailer.schemas;455dcb57" dev=dm-0 ino=9330705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.254:12217): arch=40000003 syscall=38 success=yes exit=0 a0=f03d5b8 a1=f03d4e0 a2=d2a040 a3=f03d5b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.342:12218): avc: denied { create } for pid=8303 comm="yum" name="libgsf-1.14.3" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.342:12218): arch=40000003 syscall=39 success=yes exit=0 a0=edeae60 a1=1c0 a2=d2a040 a3=edeae60 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.346:12219): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgsf-1.14.3" dev=dm-0 ino=12050786 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775437.346:12219): arch=40000003 syscall=227 success=yes exit=0 a0=edeae60 a1=a2f0d3 a2=f034840 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.354:12220): avc: denied { create } for pid=8303 comm="yum" name="libgsf.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.354:12220): arch=40000003 syscall=5 success=yes exit=30 a0=f03d4e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.362:12221): avc: denied { write } for pid=8303 comm="yum" name="libgsf.mo;455dcb57" dev=dm-0 ino=10333883 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.362:12221): arch=40000003 syscall=4 success=yes exit=1933 a0=1e a1=b6dcb000 a2=78d a3=9c6ae78 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775437.362:12221): path="/usr/share/locale/es/LC_MESSAGES/libgsf.mo;455dcb57" type=AVC msg=audit(1163775437.362:12222): avc: denied { rename } for pid=8303 comm="yum" name="libgsf.mo;455dcb57" dev=dm-0 ino=10333883 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.362:12222): arch=40000003 syscall=38 success=yes exit=0 a0=f03d4e0 a1=ec14750 a2=d2a040 a3=f03d4e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775437.390:12223): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgsf.mo" dev=dm-0 ino=10333883 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775437.390:12223): arch=40000003 syscall=227 success=yes exit=0 a0=ec14750 a1=a2f0d3 a2=edeae60 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775438.722:12224): avc: denied { write } for pid=8303 comm="yum" name="lib" dev=dm-0 ino=10311854 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775438.722:12224): avc: denied { add_name } for pid=8303 comm="yum" name="libboost_date_time.so.1.33.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775438.722:12224): arch=40000003 syscall=5 success=yes exit=30 a0=f03d4e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775438.722:12225): avc: denied { remove_name } for pid=8303 comm="yum" name="libboost_date_time.so.1.33.1;455dcb57" dev=dm-0 ino=10333915 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775438.722:12225): arch=40000003 syscall=38 success=yes exit=0 a0=f03d4e0 a1=ec8dab0 a2=d2a040 a3=f03d4e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775442.898:12226): avc: denied { relabelfrom } for pid=8303 comm="yum" name="subversion" dev=dm-0 ino=13063900 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775442.898:12226): avc: denied { relabelto } for pid=8303 comm="yum" name="subversion" dev=dm-0 ino=13063900 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775442.898:12226): arch=40000003 syscall=227 success=yes exit=0 a0=efc2ac8 a1=a2f0d3 a2=f03b0c0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775442.898:12227): avc: denied { setattr } for pid=8303 comm="yum" name="subversion" dev=dm-0 ino=13063900 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775442.898:12227): arch=40000003 syscall=212 success=yes exit=0 a0=efc2ac8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775443.238:12228): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libsvn" dev=dm-0 ino=11690863 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775443.238:12228): avc: denied { relabelto } for pid=8303 comm="yum" name="libsvn" dev=dm-0 ino=11690863 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775443.238:12228): arch=40000003 syscall=227 success=yes exit=0 a0=eeea900 a1=a2f0d3 a2=eee9460 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775443.238:12229): avc: denied { setattr } for pid=8303 comm="yum" name="libsvn" dev=dm-0 ino=11690863 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775443.238:12229): arch=40000003 syscall=212 success=yes exit=0 a0=eeea900 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775449.427:12230): avc: denied { unlink } for pid=8303 comm="yum" name="virsh" dev=dm-0 ino=10317042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775449.427:12230): arch=40000003 syscall=38 success=yes exit=0 a0=eee9688 a1=f0383b0 a2=d2a040 a3=eee9688 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775449.471:12231): avc: denied { relabelto } for pid=8303 comm="yum" name="virsh" dev=dm-0 ino=10321258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775449.471:12231): arch=40000003 syscall=227 success=yes exit=0 a0=f0383b0 a1=a2f0d3 a2=eee9688 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775449.471:12232): avc: denied { setattr } for pid=8303 comm="yum" name="virsh" dev=dm-0 ino=10321258 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775449.471:12232): arch=40000003 syscall=212 success=yes exit=0 a0=f0383b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.036:12233): avc: denied { write } for pid=8303 comm="yum" name="model" dev=dm-0 ino=10738101 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775467.036:12233): avc: denied { add_name } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775467.036:12233): avc: denied { create } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.036:12233): arch=40000003 syscall=5 success=yes exit=30 a0=eda4c40 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.048:12234): avc: denied { write } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.048:12234): arch=40000003 syscall=4 success=yes exit=8192 a0=1e a1=ef4a310 a2=2000 a3=eda4d10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775467.048:12234): path="/usr/share/cups/model/pxlcolor.ppd;455dcb57" type=AVC msg=audit(1163775467.048:12235): avc: denied { remove_name } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775467.048:12235): avc: denied { rename } for pid=8303 comm="yum" name="pxlcolor.ppd;455dcb57" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=AVC msg=audit(1163775467.048:12235): avc: denied { unlink } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738344 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.048:12235): arch=40000003 syscall=38 success=yes exit=0 a0=eda4c40 a1=ef83438 a2=d2a040 a3=eda4c40 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.064:12236): avc: denied { relabelfrom } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=AVC msg=audit(1163775467.064:12236): avc: denied { relabelto } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.064:12236): arch=40000003 syscall=227 success=yes exit=0 a0=ef83438 a1=a2f0d3 a2=eda4c40 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775467.064:12237): avc: denied { setattr } for pid=8303 comm="yum" name="pxlcolor.ppd" dev=dm-0 ino=10738705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775467.064:12237): arch=40000003 syscall=212 success=yes exit=0 a0=ef83438 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775469.972:12238): avc: denied { write } for pid=8303 comm="yum" name="cjkv" dev=dm-0 ino=10836419 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775469.972:12238): avc: denied { add_name } for pid=8303 comm="yum" name="baseutil.ps;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775469.972:12238): arch=40000003 syscall=5 success=yes exit=30 a0=eda9710 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775469.992:12239): avc: denied { remove_name } for pid=8303 comm="yum" name="baseutil.ps;455dcb57" dev=dm-0 ino=10835826 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775469.992:12239): arch=40000003 syscall=38 success=yes exit=0 a0=eda9710 a1=eda6060 a2=d2a040 a3=eda9710 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.412:12240): avc: denied { relabelfrom } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10543757 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775470.412:12240): avc: denied { relabelto } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10543757 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775470.412:12240): arch=40000003 syscall=227 success=yes exit=0 a0=efa1e38 a1=a2f0d3 a2=eda6040 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.412:12241): avc: denied { setattr } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10543757 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775470.412:12241): arch=40000003 syscall=212 success=yes exit=0 a0=efa1e38 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.508:12242): avc: denied { create } for pid=8303 comm="yum" name="eps2eps.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.508:12242): arch=40000003 syscall=83 success=yes exit=0 a0=ef4a310 a1=eda96a0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.508:12243): avc: denied { rename } for pid=8303 comm="yum" name="eps2eps.1.gz;455dcb57" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775470.508:12243): avc: denied { unlink } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10321889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.508:12243): arch=40000003 syscall=38 success=yes exit=0 a0=eda96a0 a1=ef83438 a2=d2a040 a3=eda96a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.512:12244): avc: denied { relabelfrom } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=lnk_file type=AVC msg=audit(1163775470.512:12244): avc: denied { relabelto } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.512:12244): arch=40000003 syscall=227 success=yes exit=0 a0=ef83438 a1=a2f0d3 a2=efa1ff8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775470.512:12245): avc: denied { setattr } for pid=8303 comm="yum" name="eps2eps.1.gz" dev=dm-0 ino=10331611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775470.512:12245): arch=40000003 syscall=198 success=yes exit=0 a0=ef83438 a1=0 a2=0 a3=f030f04 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775475.524:12246): avc: denied { create } for pid=8303 comm="yum" name="2.17.0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775475.524:12246): arch=40000003 syscall=39 success=yes exit=0 a0=eda97b0 a1=1c0 a2=d2a040 a3=eda97b0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775475.528:12247): avc: denied { relabelfrom } for pid=8303 comm="yum" name="2.17.0" dev=dm-0 ino=12051054 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775475.528:12247): arch=40000003 syscall=227 success=yes exit=0 a0=eda97b0 a1=a2f0d3 a2=eda9710 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775485.721:12248): avc: denied { unlink } for pid=8303 comm="yum" name="checkpolicy" dev=dm-0 ino=10325702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775485.721:12248): arch=40000003 syscall=38 success=yes exit=0 a0=eed1500 a1=ef7c388 a2=d2a040 a3=eed1500 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775486.109:12249): avc: denied { relabelto } for pid=8303 comm="yum" name="checkpolicy" dev=dm-0 ino=10320741 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775486.109:12249): arch=40000003 syscall=227 success=yes exit=0 a0=ef7c388 a1=a2f0d3 a2=ea06aa0 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775486.109:12250): avc: denied { setattr } for pid=8303 comm="yum" name="checkpolicy" dev=dm-0 ino=10320741 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775486.109:12250): arch=40000003 syscall=212 success=yes exit=0 a0=ef7c388 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775497.898:12251): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775497.898:12251): arch=40000003 syscall=195 success=yes exit=0 a0=c36800 a1=bfae855c a2=c4eff4 a3=0 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163775497.898:12251): path="/etc/localtime" type=AVC msg=audit(1163775526.272:12252): avc: denied { write } for pid=8303 comm="yum" name="panel" dev=dm-0 ino=9331729 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775526.272:12252): avc: denied { add_name } for pid=8303 comm="yum" name="clock-14.rc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775526.272:12252): arch=40000003 syscall=5 success=yes exit=30 a0=f05f818 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.292:12253): avc: denied { remove_name } for pid=8303 comm="yum" name="clock-14.rc;455dcb57" dev=dm-0 ino=9331515 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775526.292:12253): avc: denied { unlink } for pid=8303 comm="yum" name="clock-14.rc" dev=dm-0 ino=9334405 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775526.292:12253): arch=40000003 syscall=38 success=yes exit=0 a0=f05f818 a1=f00ac58 a2=d2a040 a3=f05f818 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.296:12254): avc: denied { relabelto } for pid=8303 comm="yum" name="clock-14.rc" dev=dm-0 ino=9331515 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775526.296:12254): arch=40000003 syscall=227 success=yes exit=0 a0=f00ac58 a1=a2f0d3 a2=f05ec38 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.296:12255): avc: denied { setattr } for pid=8303 comm="yum" name="clock-14.rc" dev=dm-0 ino=9331515 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775526.296:12255): arch=40000003 syscall=212 success=yes exit=0 a0=f00ac58 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.364:12256): avc: denied { unlink } for pid=8303 comm="yum" name="libxfce4panel.so.1" dev=dm-0 ino=10338329 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775526.364:12256): arch=40000003 syscall=38 success=yes exit=0 a0=f05f818 a1=f05cec8 a2=d2a040 a3=f05f818 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.364:12257): avc: denied { relabelto } for pid=8303 comm="yum" name="libxfce4panel.so.1" dev=dm-0 ino=10337831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775526.364:12257): arch=40000003 syscall=227 success=yes exit=0 a0=f05cec8 a1=a2f0d3 a2=f05ce88 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.364:12258): avc: denied { setattr } for pid=8303 comm="yum" name="libxfce4panel.so.1" dev=dm-0 ino=10337831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775526.364:12258): arch=40000003 syscall=198 success=yes exit=0 a0=f05cec8 a1=0 a2=0 a3=e8ffb94 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.472:12259): avc: denied { relabelfrom } for pid=8303 comm="yum" name="panel-plugins" dev=dm-0 ino=10345319 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775526.472:12259): avc: denied { relabelto } for pid=8303 comm="yum" name="panel-plugins" dev=dm-0 ino=10345319 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775526.472:12259): arch=40000003 syscall=227 success=yes exit=0 a0=f05cf28 a1=a2f0d3 a2=f05cff0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775526.472:12260): avc: denied { setattr } for pid=8303 comm="yum" name="panel-plugins" dev=dm-0 ino=10345319 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775526.472:12260): arch=40000003 syscall=212 success=yes exit=0 a0=f05cf28 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.857:12261): avc: denied { write } for pid=8303 comm="yum" name="sbin" dev=dm-0 ino=9984481 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163775546.857:12261): avc: denied { add_name } for pid=8303 comm="yum" name="cbq;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163775546.857:12261): avc: denied { create } for pid=8303 comm="yum" name="cbq;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.857:12261): arch=40000003 syscall=5 success=yes exit=30 a0=f0fb368 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.881:12262): avc: denied { write } for pid=8303 comm="yum" name="cbq;455dcb57" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.881:12262): arch=40000003 syscall=4 success=yes exit=32768 a0=1e a1=f15f550 a2=8000 a3=f0061e8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775546.881:12262): path="/sbin/cbq;455dcb57" type=AVC msg=audit(1163775546.881:12263): avc: denied { remove_name } for pid=8303 comm="yum" name="cbq;455dcb57" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163775546.881:12263): avc: denied { rename } for pid=8303 comm="yum" name="cbq;455dcb57" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775546.881:12263): avc: denied { unlink } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984551 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.881:12263): arch=40000003 syscall=38 success=yes exit=0 a0=f0fb368 a1=af6f3f8 a2=d2a040 a3=f0fb368 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.889:12264): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775546.889:12264): avc: denied { relabelto } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.889:12264): arch=40000003 syscall=227 success=yes exit=0 a0=af6f3f8 a1=a2f0d3 a2=f0f3720 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.889:12265): avc: denied { setattr } for pid=8303 comm="yum" name="cbq" dev=dm-0 ino=9984600 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.889:12265): arch=40000003 syscall=212 success=yes exit=0 a0=af6f3f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.917:12266): avc: denied { unlink } for pid=8303 comm="yum" name="ip" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.917:12266): arch=40000003 syscall=38 success=yes exit=0 a0=f0f3810 a1=af6f3f8 a2=d2a040 a3=f0f3810 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.945:12267): avc: denied { relabelto } for pid=8303 comm="yum" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.945:12267): arch=40000003 syscall=227 success=yes exit=0 a0=af6f3f8 a1=a2f0d3 a2=f0080e0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775546.945:12268): avc: denied { setattr } for pid=8303 comm="yum" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775546.945:12268): arch=40000003 syscall=212 success=yes exit=0 a0=af6f3f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12269): avc: denied { create } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12269): arch=40000003 syscall=102 success=yes exit=20 a0=1 a1=adf061d4 a2=c4eff4 a3=0 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12270): avc: denied { bind } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12270): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=adf061d4 a2=c4eff4 a3=14 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12271): avc: denied { getattr } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12271): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=adf061d4 a2=c4eff4 a3=14 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12272): avc: denied { write } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163775547.253:12272): avc: denied { nlmsg_read } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12272): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=adf0510c a2=c4eff4 a3=0 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775547.253:12273): avc: denied { read } for pid=12153 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163775547.253:12273): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=adf0510c a2=c4eff4 a3=0 items=0 ppid=8363 pid=12153 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775548.961:12274): avc: denied { execute } for pid=12155 comm="sh" name="groupadd" dev=dm-0 ino=10321803 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=AVC msg=audit(1163775548.961:12274): avc: denied { execute_no_trans } for pid=12155 comm="sh" name="groupadd" dev=dm-0 ino=10321803 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=AVC msg=audit(1163775548.961:12274): avc: denied { read } for pid=12155 comm="sh" name="groupadd" dev=dm-0 ino=10321803 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:groupadd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775548.961:12274): arch=40000003 syscall=11 success=yes exit=0 a0=9129d48 a1=9129168 a2=9129ea8 a3=9129b40 items=0 ppid=12154 pid=12155 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="groupadd" exe="/usr/sbin/groupadd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775548.961:12274): path="/usr/sbin/groupadd" type=AVC_PATH msg=audit(1163775548.961:12274): path="/usr/sbin/groupadd" type=AVC msg=audit(1163775549.293:12275): avc: denied { unlink } for pid=8303 comm="yum" name="prefdm" dev=dm-0 ino=9330912 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.293:12275): arch=40000003 syscall=38 success=yes exit=0 a0=f110f18 a1=f0f8690 a2=d2a040 a3=f110f18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.309:12276): avc: denied { relabelto } for pid=8303 comm="yum" name="prefdm" dev=dm-0 ino=9329924 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.309:12276): arch=40000003 syscall=227 success=yes exit=0 a0=f0f8690 a1=a2f0d3 a2=f002208 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.313:12277): avc: denied { setattr } for pid=8303 comm="yum" name="prefdm" dev=dm-0 ino=9329924 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.313:12277): arch=40000003 syscall=212 success=yes exit=0 a0=f0f8690 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.317:12278): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.317:12278): avc: denied { relabelto } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.317:12278): arch=40000003 syscall=227 success=yes exit=0 a0=f16f548 a1=a2f0d3 a2=f002208 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.321:12279): avc: denied { setattr } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.321:12279): arch=40000003 syscall=212 success=yes exit=0 a0=f16f548 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.321:12280): avc: denied { write } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.321:12280): avc: denied { add_name } for pid=8303 comm="yum" name="ip-down;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.321:12280): avc: denied { create } for pid=8303 comm="yum" name="ip-down;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.321:12280): arch=40000003 syscall=5 success=yes exit=30 a0=ea06a70 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.325:12281): avc: denied { write } for pid=8303 comm="yum" name="ip-down;455dcb57" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.325:12281): arch=40000003 syscall=4 success=yes exit=386 a0=1e a1=b6dcb000 a2=182 a3=f0dd100 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775549.325:12281): path="/etc/ppp/ip-down;455dcb57" type=AVC msg=audit(1163775549.329:12282): avc: denied { remove_name } for pid=8303 comm="yum" name="ip-down;455dcb57" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775549.329:12282): avc: denied { rename } for pid=8303 comm="yum" name="ip-down;455dcb57" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775549.329:12282): avc: denied { unlink } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331766 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.329:12282): arch=40000003 syscall=38 success=yes exit=0 a0=ea06a70 a1=f0f8690 a2=d2a040 a3=ea06a70 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.329:12283): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775549.329:12283): avc: denied { relabelto } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.329:12283): arch=40000003 syscall=227 success=yes exit=0 a0=f0f8690 a1=a2f0d3 a2=f1a9ca8 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.329:12284): avc: denied { setattr } for pid=8303 comm="yum" name="ip-down" dev=dm-0 ino=9331157 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_script_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.329:12284): arch=40000003 syscall=212 success=yes exit=0 a0=f0f8690 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.373:12285): avc: denied { relabelfrom } for pid=8303 comm="yum" name="peers" dev=dm-0 ino=9330497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775549.373:12285): avc: denied { relabelto } for pid=8303 comm="yum" name="peers" dev=dm-0 ino=9330497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.373:12285): arch=40000003 syscall=227 success=yes exit=0 a0=f1ab5f0 a1=a2f0d3 a2=f1b0670 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.373:12286): avc: denied { setattr } for pid=8303 comm="yum" name="peers" dev=dm-0 ino=9330497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775549.373:12286): arch=40000003 syscall=212 success=yes exit=0 a0=f1ab5f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.377:12287): avc: denied { create } for pid=8303 comm="yum" name="rc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.377:12287): arch=40000003 syscall=83 success=yes exit=0 a0=f194088 a1=f1ab5f0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.377:12288): avc: denied { rename } for pid=8303 comm="yum" name="rc;455dcb57" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775549.377:12288): avc: denied { unlink } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331516 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.377:12288): arch=40000003 syscall=38 success=yes exit=0 a0=f1ab5f0 a1=ea06a80 a2=d2a040 a3=f1ab5f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.385:12289): avc: denied { relabelfrom } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775549.385:12289): avc: denied { relabelto } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.385:12289): arch=40000003 syscall=227 success=yes exit=0 a0=ea06a80 a1=a2f0d3 a2=f1aea08 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.385:12290): avc: denied { setattr } for pid=8303 comm="yum" name="rc" dev=dm-0 ino=9331705 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775549.385:12290): arch=40000003 syscall=198 success=yes exit=0 a0=ea06a80 a1=0 a2=0 a3=f11055c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.641:12291): avc: denied { unlink } for pid=8303 comm="yum" name="consoletype" dev=dm-0 ino=9984704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.641:12291): arch=40000003 syscall=38 success=yes exit=0 a0=f21aa78 a1=f21a418 a2=d2a040 a3=f21aa78 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.653:12292): avc: denied { relabelto } for pid=8303 comm="yum" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.653:12292): arch=40000003 syscall=227 success=yes exit=0 a0=f21a418 a1=a2f0d3 a2=f21d4c0 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.653:12293): avc: denied { setattr } for pid=8303 comm="yum" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.653:12293): arch=40000003 syscall=212 success=yes exit=0 a0=f21a418 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.869:12294): avc: denied { unlink } for pid=8303 comm="yum" name="ppp-watch" dev=dm-0 ino=9984662 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.869:12294): arch=40000003 syscall=38 success=yes exit=0 a0=f220838 a1=f21a418 a2=d2a040 a3=f220838 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.889:12295): avc: denied { relabelto } for pid=8303 comm="yum" name="ppp-watch" dev=dm-0 ino=9984568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.889:12295): arch=40000003 syscall=227 success=yes exit=0 a0=f21a418 a1=a2f0d3 a2=f222918 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.889:12296): avc: denied { setattr } for pid=8303 comm="yum" name="ppp-watch" dev=dm-0 ino=9984568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.889:12296): arch=40000003 syscall=212 success=yes exit=0 a0=f21a418 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.937:12297): avc: denied { unlink } for pid=8303 comm="yum" name="usernetctl" dev=dm-0 ino=10318051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usernetctl_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.937:12297): arch=40000003 syscall=38 success=yes exit=0 a0=f224d18 a1=f223ae0 a2=d2a040 a3=f224d18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.953:12298): avc: denied { relabelto } for pid=8303 comm="yum" name="usernetctl" dev=dm-0 ino=10337895 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usernetctl_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.953:12298): arch=40000003 syscall=227 success=yes exit=0 a0=f223ae0 a1=a2f0d3 a2=f227488 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775549.953:12299): avc: denied { setattr } for pid=8303 comm="yum" name="usernetctl" dev=dm-0 ino=10337895 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usernetctl_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775549.953:12299): arch=40000003 syscall=212 success=yes exit=0 a0=f223ae0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775551.453:12300): avc: denied { relabelfrom } for pid=8303 comm="yum" name="stateless" dev=dm-0 ino=15648201 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775551.453:12300): arch=40000003 syscall=227 success=yes exit=0 a0=f2267b8 a1=a2f0d3 a2=f226480 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775551.473:12301): avc: denied { relabelfrom } for pid=8303 comm="yum" name="netreport" dev=dm-0 ino=14437051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775551.473:12301): avc: denied { relabelto } for pid=8303 comm="yum" name="netreport" dev=dm-0 ino=14437051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775551.473:12301): arch=40000003 syscall=227 success=yes exit=0 a0=f2267b8 a1=a2f0d3 a2=f2264d8 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775551.473:12302): avc: denied { setattr } for pid=8303 comm="yum" name="netreport" dev=dm-0 ino=14437051 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775551.473:12302): arch=40000003 syscall=212 success=yes exit=0 a0=f2267b8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775553.909:12303): avc: denied { setexec } for pid=12156 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775553.909:12303): arch=40000003 syscall=4 success=no exit=-22 a0=1e a1=f16f4d8 a2=20 a3=a2f751 items=0 ppid=8303 pid=12156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775553.981:12304): avc: denied { write } for pid=12157 comm="touch" name="btmp" dev=dm-0 ino=14437055 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775553.981:12304): arch=40000003 syscall=5 success=yes exit=0 a0=bf8a6bf8 a1=8941 a2=1b6 a3=8941 items=0 ppid=12156 pid=12157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.025:12305): avc: denied { setattr } for pid=12158 comm="chown" name="wtmp" dev=dm-0 ino=6422812 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:wtmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.025:12305): arch=40000003 syscall=212 success=yes exit=0 a0=889c9d0 a1=0 a2=16 a3=0 items=0 ppid=12156 pid=12158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chown" exe="/bin/chown" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.029:12306): avc: denied { setattr } for pid=12158 comm="chown" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.029:12306): arch=40000003 syscall=212 success=yes exit=0 a0=889c9d0 a1=0 a2=16 a3=1 items=0 ppid=12156 pid=12158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chown" exe="/bin/chown" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.029:12307): avc: denied { setattr } for pid=12158 comm="chown" name="btmp" dev=dm-0 ino=14437055 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:faillog_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.029:12307): arch=40000003 syscall=212 success=yes exit=0 a0=889c9d0 a1=0 a2=16 a3=1 items=0 ppid=12156 pid=12158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chown" exe="/bin/chown" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.057:12308): avc: denied { read } for pid=12161 comm="chkconfig" name="netfs" dev=dm-0 ino=9330630 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.057:12308): arch=40000003 syscall=5 success=yes exit=3 a0=bfa3d930 a1=0 a2=ffffffff a3=bfa3dbb4 items=0 ppid=12156 pid=12161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chkconfig" exe="/sbin/chkconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.781:12309): avc: denied { unlink } for pid=12161 comm="chkconfig" name="K75netfs" dev=dm-0 ino=9330687 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775554.781:12309): arch=40000003 syscall=10 success=yes exit=0 a0=8c33078 a1=8c33068 a2=1 a3=0 items=0 ppid=12156 pid=12161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chkconfig" exe="/sbin/chkconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775554.953:12310): avc: denied { execute } for pid=12165 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775554.953:12310): avc: denied { execute_no_trans } for pid=12165 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=AVC msg=audit(1163775554.953:12310): avc: denied { read } for pid=12165 comm="sh" name="useradd" dev=dm-0 ino=10321811 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:useradd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775554.953:12310): arch=40000003 syscall=11 success=yes exit=0 a0=9007f90 a1=9007ae0 a2=90084b0 a3=9007e40 items=0 ppid=12164 pid=12165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775554.953:12310): path="/usr/sbin/useradd" type=AVC_PATH msg=audit(1163775554.953:12310): path="/usr/sbin/useradd" type=AVC msg=audit(1163775555.041:12311): avc: denied { audit_write } for pid=12165 comm="useradd" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_CHAUTHTOK msg=audit(1163775555.041:12312): user pid=12165 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='op=adding user acct=haldaemon exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/1 res=failed)' type=SYSCALL msg=audit(1163775555.041:12311): arch=40000003 syscall=102 success=yes exit=120 a0=b a1=bf93d650 a2=a47ff4 a3=bf9440a0 items=0 ppid=12164 pid=12165 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="useradd" exe="/usr/sbin/useradd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.073:12313): avc: denied { relabelfrom } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.073:12313): avc: denied { relabelto } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775555.073:12313): arch=40000003 syscall=227 success=yes exit=0 a0=f121e30 a1=a2f0d3 a2=f231150 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.073:12314): avc: denied { setattr } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775555.073:12314): arch=40000003 syscall=212 success=yes exit=0 a0=f121e30 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.073:12315): avc: denied { write } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.073:12315): avc: denied { add_name } for pid=8303 comm="yum" name="hal.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.073:12315): avc: denied { create } for pid=8303 comm="yum" name="hal.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.073:12315): arch=40000003 syscall=5 success=yes exit=30 a0=e906748 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.089:12316): avc: denied { write } for pid=8303 comm="yum" name="hal.conf;455dcb57" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.089:12316): arch=40000003 syscall=4 success=yes exit=2992 a0=1e a1=b6dcb000 a2=bb0 a3=f0facb0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775555.089:12316): path="/etc/dbus-1/system.d/hal.conf;455dcb57" type=AVC msg=audit(1163775555.089:12317): avc: denied { remove_name } for pid=8303 comm="yum" name="hal.conf;455dcb57" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775555.089:12317): avc: denied { rename } for pid=8303 comm="yum" name="hal.conf;455dcb57" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775555.089:12317): avc: denied { unlink } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9331851 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.089:12317): arch=40000003 syscall=38 success=yes exit=0 a0=e906748 a1=f231150 a2=d2a040 a3=e906748 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.097:12318): avc: denied { relabelfrom } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163775555.097:12318): avc: denied { relabelto } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.097:12318): arch=40000003 syscall=227 success=yes exit=0 a0=f231150 a1=a2f0d3 a2=e9067a0 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.097:12319): avc: denied { setattr } for pid=8303 comm="yum" name="hal.conf" dev=dm-0 ino=9330704 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775555.097:12319): arch=40000003 syscall=212 success=yes exit=0 a0=f231150 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.145:12320): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163775555.145:12320): arch=40000003 syscall=100 success=yes exit=0 a0=12 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163775555.954:12321): avc: denied { create } for pid=8303 comm="yum" name="libhal-storage.so.1;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775555.954:12321): arch=40000003 syscall=83 success=yes exit=0 a0=ef8fd20 a1=efa0e48 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.958:12322): avc: denied { rename } for pid=8303 comm="yum" name="libhal-storage.so.1;455dcb57" dev=dm-0 ino=10337394 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775555.958:12322): arch=40000003 syscall=38 success=yes exit=0 a0=efa0e48 a1=efffb00 a2=d2a040 a3=efa0e48 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775555.958:12323): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libhal-storage.so.1" dev=dm-0 ino=10337394 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775555.958:12323): arch=40000003 syscall=227 success=yes exit=0 a0=efffb00 a1=a2f0d3 a2=efffbc0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.262:12324): avc: denied { unlink } for pid=8303 comm="yum" name="hald" dev=dm-0 ino=10321480 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hald_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775556.262:12324): arch=40000003 syscall=38 success=yes exit=0 a0=f0d5ed8 a1=f0d5e60 a2=d2a040 a3=f0d5ed8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.266:12325): avc: denied { relabelto } for pid=8303 comm="yum" name="hald" dev=dm-0 ino=10337903 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hald_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775556.266:12325): arch=40000003 syscall=227 success=yes exit=0 a0=f0d5e60 a1=a2f0d3 a2=f1a3e78 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.266:12326): avc: denied { setattr } for pid=8303 comm="yum" name="hald" dev=dm-0 ino=10337903 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hald_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775556.266:12326): arch=40000003 syscall=212 success=yes exit=0 a0=f0d5e60 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.626:12327): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ca" dev=dm-0 ino=10311922 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775556.626:12327): avc: denied { relabelto } for pid=8303 comm="yum" name="ca" dev=dm-0 ino=10311922 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775556.626:12327): arch=40000003 syscall=227 success=yes exit=0 a0=f13f128 a1=a2f0d3 a2=f13f018 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775556.638:12328): avc: denied { setattr } for pid=8303 comm="yum" name="ca" dev=dm-0 ino=10311922 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775556.638:12328): arch=40000003 syscall=212 success=yes exit=0 a0=f13f128 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.642:12329): avc: denied { write } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775559.642:12329): avc: denied { add_name } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775559.642:12329): avc: denied { create } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.642:12329): arch=40000003 syscall=5 success=yes exit=30 a0=abaa280 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.662:12330): avc: denied { write } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.662:12330): arch=40000003 syscall=4 success=yes exit=129 a0=1e a1=b6dcb000 a2=81 a3=e8ff550 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775559.662:12330): path="/etc/selinux/restorecond.conf;455dcb57" type=AVC msg=audit(1163775559.662:12331): avc: denied { remove_name } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775559.662:12331): avc: denied { rename } for pid=8303 comm="yum" name="restorecond.conf;455dcb57" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163775559.662:12331): avc: denied { unlink } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330199 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.662:12331): arch=40000003 syscall=38 success=yes exit=0 a0=abaa280 a1=f13f168 a2=d2a040 a3=abaa280 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.670:12332): avc: denied { relabelfrom } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163775559.670:12332): avc: denied { relabelto } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.670:12332): arch=40000003 syscall=227 success=yes exit=0 a0=f13f168 a1=a2f0d3 a2=cb09b88 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.670:12333): avc: denied { setattr } for pid=8303 comm="yum" name="restorecond.conf" dev=dm-0 ino=9330709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.670:12333): arch=40000003 syscall=212 success=yes exit=0 a0=f13f168 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.762:12334): avc: denied { unlink } for pid=8303 comm="yum" name="restorecon" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.762:12334): arch=40000003 syscall=38 success=yes exit=0 a0=f1d9690 a1=f1d98b0 a2=d2a040 a3=f1d9690 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.762:12335): avc: denied { relabelto } for pid=8303 comm="yum" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.762:12335): arch=40000003 syscall=227 success=yes exit=0 a0=f1d98b0 a1=a2f0d3 a2=cb09b88 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.762:12336): avc: denied { setattr } for pid=8303 comm="yum" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.762:12336): arch=40000003 syscall=212 success=yes exit=0 a0=f1d98b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.766:12337): avc: denied { unlink } for pid=8303 comm="yum" name="setfiles" dev=dm-0 ino=9984633 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.766:12337): arch=40000003 syscall=38 success=yes exit=0 a0=f1d9670 a1=f1d98b0 a2=d2a040 a3=f1d9670 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.770:12338): avc: denied { relabelto } for pid=8303 comm="yum" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.770:12338): arch=40000003 syscall=227 success=yes exit=0 a0=f1d98b0 a1=a2f0d3 a2=c789798 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.770:12339): avc: denied { setattr } for pid=8303 comm="yum" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.770:12339): arch=40000003 syscall=212 success=yes exit=0 a0=f1d98b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.986:12340): avc: denied { unlink } for pid=8303 comm="yum" name="load_policy" dev=dm-0 ino=10316125 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.986:12340): arch=40000003 syscall=38 success=yes exit=0 a0=f1de218 a1=f1dcfa0 a2=d2a040 a3=f1de218 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.990:12341): avc: denied { relabelto } for pid=8303 comm="yum" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.990:12341): arch=40000003 syscall=227 success=yes exit=0 a0=f1dcfa0 a1=a2f0d3 a2=f1e0bc8 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.990:12342): avc: denied { setattr } for pid=8303 comm="yum" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.990:12342): arch=40000003 syscall=212 success=yes exit=0 a0=f1dcfa0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.990:12343): avc: denied { unlink } for pid=8303 comm="yum" name="restorecond" dev=dm-0 ino=10329701 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.990:12343): arch=40000003 syscall=38 success=yes exit=0 a0=f1e5540 a1=f1e1b80 a2=d2a040 a3=f1e5540 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.994:12344): avc: denied { relabelto } for pid=8303 comm="yum" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.994:12344): arch=40000003 syscall=227 success=yes exit=0 a0=f1e1b80 a1=a2f0d3 a2=f1e7e70 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.994:12345): avc: denied { setattr } for pid=8303 comm="yum" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.994:12345): arch=40000003 syscall=212 success=yes exit=0 a0=f1e1b80 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775559.994:12346): avc: denied { unlink } for pid=8303 comm="yum" name="run_init" dev=dm-0 ino=10337318 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775559.994:12346): arch=40000003 syscall=38 success=yes exit=0 a0=f1e1b80 a1=f1dc8a8 a2=d2a040 a3=f1e1b80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.006:12347): avc: denied { relabelto } for pid=8303 comm="yum" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.006:12347): arch=40000003 syscall=227 success=yes exit=0 a0=f1dc8a8 a1=a2f0d3 a2=f1e7ed0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.006:12348): avc: denied { setattr } for pid=8303 comm="yum" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.006:12348): arch=40000003 syscall=212 success=yes exit=0 a0=f1dc8a8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.006:12349): avc: denied { unlink } for pid=8303 comm="yum" name="semanage" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.006:12349): arch=40000003 syscall=38 success=yes exit=0 a0=f1e1b80 a1=f1dc8a8 a2=d2a040 a3=f1e1b80 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.014:12350): avc: denied { relabelto } for pid=8303 comm="yum" name="semanage" dev=dm-0 ino=10337318 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.014:12350): arch=40000003 syscall=227 success=yes exit=0 a0=f1dc8a8 a1=a2f0d3 a2=f1e7ea0 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775560.014:12351): avc: denied { setattr } for pid=8303 comm="yum" name="semanage" dev=dm-0 ino=10337318 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775560.014:12351): arch=40000003 syscall=212 success=yes exit=0 a0=f1dc8a8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.182:12352): avc: denied { execute } for pid=12171 comm="service" name="restorecond" dev=dm-0 ino=9330750 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.182:12352): arch=40000003 syscall=33 success=yes exit=0 a0=87b0b10 a1=1 a2=1 a3=87b02c0 items=0 ppid=12169 pid=12171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.222:12353): avc: denied { execute_no_trans } for pid=12178 comm="env" name="restorecond" dev=dm-0 ino=9330750 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.222:12353): arch=40000003 syscall=11 success=yes exit=0 a0=bfa2bbec a1=bfa29ca8 a2=952b858 a3=5 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.222:12353): path="/etc/rc.d/init.d/restorecond" type=AVC msg=audit(1163775562.222:12354): avc: denied { ioctl } for pid=12178 comm="restorecond" name="restorecond" dev=dm-0 ino=9330750 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.222:12354): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfa29d68 a3=bfa29da8 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.222:12354): path="/etc/rc.d/init.d/restorecond" type=AVC msg=audit(1163775562.342:12355): avc: denied { read } for pid=12178 comm="restorecond" name="restorecond.pid" dev=dm-0 ino=14436927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.342:12355): arch=40000003 syscall=5 success=yes exit=3 a0=95fa0e0 a1=8000 a2=0 a3=8000 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.342:12356): avc: denied { ioctl } for pid=12178 comm="restorecond" name="restorecond.pid" dev=dm-0 ino=14436927 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.342:12356): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bfa268b8 a3=bfa268f8 items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.342:12356): path="/var/run/restorecond.pid" type=AVC msg=audit(1163775562.406:12357): avc: denied { signal } for pid=12178 comm="restorecond" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:restorecond_t:s0 tclass=process type=SYSCALL msg=audit(1163775562.406:12357): arch=40000003 syscall=37 success=yes exit=0 a0=73d a1=f a2=73d a3=73d items=0 ppid=12171 pid=12178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.518:12358): avc: denied { write } for pid=12186 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775562.518:12358): avc: denied { remove_name } for pid=12186 comm="rm" name="restorecond" dev=dm-0 ino=14436931 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163775562.518:12358): avc: denied { unlink } for pid=12186 comm="rm" name="restorecond" dev=dm-0 ino=14436931 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.518:12358): arch=40000003 syscall=10 success=yes exit=0 a0=bf816f80 a1=0 a2=805277c a3=bf815604 items=0 ppid=12178 pid=12186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.526:12359): avc: denied { execute } for pid=12188 comm="bash" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=AVC msg=audit(1163775562.526:12359): avc: denied { execute_no_trans } for pid=12188 comm="bash" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=AVC msg=audit(1163775562.526:12359): avc: denied { read } for pid=12188 comm="bash" name="restorecond" dev=dm-0 ino=10326222 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecond_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.526:12359): arch=40000003 syscall=11 success=yes exit=0 a0=94ee878 a1=94ee808 a2=94eea90 a3=94ee610 items=0 ppid=12187 pid=12188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.526:12359): path="/usr/sbin/restorecond" type=AVC_PATH msg=audit(1163775562.526:12359): path="/usr/sbin/restorecond" type=AVC msg=audit(1163775562.526:12360): avc: denied { read } for pid=12188 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.526:12360): arch=40000003 syscall=5 success=yes exit=5 a0=8385548 a1=28000 a2=0 a3=28000 items=0 ppid=12187 pid=12188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.762:12361): avc: denied { read } for pid=12188 comm="restorecond" name="secrets.tdb" dev=dm-0 ino=9330306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:samba_secrets_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.762:12361): arch=40000003 syscall=5 success=yes exit=5 a0=8385548 a1=28000 a2=0 a3=28000 items=0 ppid=12187 pid=12188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.786:12362): avc: denied { write } for pid=12189 comm="restorecond" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775562.786:12362): avc: denied { add_name } for pid=12189 comm="restorecond" name="restorecond.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775562.786:12362): avc: denied { create } for pid=12189 comm="restorecond" name="restorecond.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.786:12362): arch=40000003 syscall=5 success=yes exit=4 a0=6842e8 a1=28241 a2=1a4 a3=28241 items=0 ppid=12188 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.786:12363): avc: denied { write } for pid=12189 comm="restorecond" name="restorecond.pid" dev=dm-0 ino=14436927 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.786:12363): arch=40000003 syscall=4 success=yes exit=6 a0=4 a1=bfedd4c4 a2=6 a3=4 items=0 ppid=12188 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775562.786:12363): path="/var/run/restorecond.pid" type=AVC msg=audit(1163775562.794:12364): avc: denied { add_name } for pid=12190 comm="touch" name="restorecond" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1163775562.794:12364): arch=40000003 syscall=5 success=yes exit=0 a0=bfacef7a a1=8941 a2=1b6 a3=8941 items=0 ppid=12178 pid=12190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775562.794:12365): avc: denied { write } for pid=12190 comm="touch" name="restorecond" dev=dm-0 ino=14436931 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163775562.794:12365): arch=40000003 syscall=271 success=yes exit=0 a0=bfacd754 a1=0 a2=7a1ff4 a3=0 items=0 ppid=12178 pid=12190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.302:12366): avc: denied { unlink } for pid=8303 comm="yum" name="Xreset" dev=dm-0 ino=9362698 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.302:12366): arch=40000003 syscall=38 success=yes exit=0 a0=f0a3908 a1=f1a1568 a2=d2a040 a3=f0a3908 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.310:12367): avc: denied { relabelto } for pid=8303 comm="yum" name="Xreset" dev=dm-0 ino=9362552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.310:12367): arch=40000003 syscall=227 success=yes exit=0 a0=f1a1568 a1=a2f0d3 a2=f13a800 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.310:12368): avc: denied { setattr } for pid=8303 comm="yum" name="Xreset" dev=dm-0 ino=9362552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xsession_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.310:12368): arch=40000003 syscall=212 success=yes exit=0 a0=f1a1568 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.710:12369): avc: denied { unlink } for pid=8303 comm="yum" name="kdesu" dev=dm-0 ino=10317497 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.710:12369): arch=40000003 syscall=38 success=yes exit=0 a0=f26a548 a1=f267d90 a2=d2a040 a3=f26a548 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.770:12370): avc: denied { relabelto } for pid=8303 comm="yum" name="kdesu" dev=dm-0 ino=10334290 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.770:12370): arch=40000003 syscall=227 success=yes exit=0 a0=f267d90 a1=a2f0d3 a2=f269f28 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.770:12371): avc: denied { setattr } for pid=8303 comm="yum" name="kdesu" dev=dm-0 ino=10334290 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.770:12371): arch=40000003 syscall=212 success=yes exit=0 a0=f267d90 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.810:12372): avc: denied { unlink } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=10324938 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.810:12372): arch=40000003 syscall=38 success=yes exit=0 a0=f26a608 a1=f267d90 a2=d2a040 a3=f26a608 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.878:12373): avc: denied { relabelto } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=10315462 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.878:12373): arch=40000003 syscall=227 success=yes exit=0 a0=f267d90 a1=a2f0d3 a2=c35a930 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775563.878:12374): avc: denied { setattr } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=10315462 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775563.878:12374): arch=40000003 syscall=212 success=yes exit=0 a0=f267d90 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.098:12375): avc: denied { create } for pid=8303 comm="yum" name="kinfocenter;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.098:12375): arch=40000003 syscall=83 success=yes exit=0 a0=f37c3a0 a1=f26af08 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.098:12376): avc: denied { rename } for pid=8303 comm="yum" name="kinfocenter;455dcb57" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775564.098:12376): avc: denied { unlink } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10334341 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.098:12376): arch=40000003 syscall=38 success=yes exit=0 a0=f26af08 a1=f26b4f8 a2=d2a040 a3=f26af08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.110:12377): avc: denied { relabelfrom } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775564.110:12377): avc: denied { relabelto } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.110:12377): arch=40000003 syscall=227 success=yes exit=0 a0=f26b4f8 a1=a2f0d3 a2=f26b538 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775564.110:12378): avc: denied { setattr } for pid=8303 comm="yum" name="kinfocenter" dev=dm-0 ino=10337328 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775564.110:12378): arch=40000003 syscall=198 success=yes exit=0 a0=f26b4f8 a1=0 a2=0 a3=e90651c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.927:12379): avc: denied { create } for pid=8303 comm="yum" name="kdm;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.927:12379): arch=40000003 syscall=83 success=yes exit=0 a0=f37c3a0 a1=f39eb68 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.931:12380): avc: denied { rename } for pid=8303 comm="yum" name="kdm;455dcb57" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775581.931:12380): avc: denied { unlink } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036193 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.931:12380): arch=40000003 syscall=38 success=yes exit=0 a0=f39eb68 a1=f39ebd0 a2=d2a040 a3=f39eb68 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.939:12381): avc: denied { relabelfrom } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163775581.939:12381): avc: denied { relabelto } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.939:12381): arch=40000003 syscall=227 success=yes exit=0 a0=f39ebd0 a1=a2f0d3 a2=f39ec10 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775581.939:12382): avc: denied { setattr } for pid=8303 comm="yum" name="kdm" dev=dm-0 ino=11036166 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775581.939:12382): arch=40000003 syscall=198 success=yes exit=0 a0=f39ebd0 a1=0 a2=0 a3=e90651c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163775602.316:12383): user pid=12195 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163775602.316:12384): login pid=12195 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163775602.440:12385): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163775602.440:12386): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775602.440:12387): avc: denied { execute } for pid=12196 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775602.440:12387): avc: denied { execute_no_trans } for pid=12196 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.440:12387): arch=40000003 syscall=11 success=yes exit=0 a0=8f9a1b0 a1=8f9a358 a2=8f9a290 a3=8f9a008 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.440:12387): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163775602.580:12388): avc: denied { execute } for pid=12196 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775602.580:12388): avc: denied { execute_no_trans } for pid=12196 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163775602.580:12388): avc: denied { read } for pid=12196 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.580:12388): arch=40000003 syscall=11 success=yes exit=0 a0=94a6d48 a1=94a6740 a2=94a6d60 a3=94a6740 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.580:12388): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163775602.580:12388): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163775602.728:12389): avc: denied { search } for pid=12196 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163775602.728:12389): avc: denied { read } for pid=12196 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.728:12389): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=817e7f8 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.728:12390): avc: denied { getattr } for pid=12196 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.728:12390): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfedd808 a2=dd0ff4 a3=817e7f8 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.728:12390): path="/proc/net/dev" type=AVC msg=audit(1163775602.728:12391): avc: denied { search } for pid=12196 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775602.728:12391): arch=40000003 syscall=33 success=yes exit=0 a0=bfeddbb4 a1=0 a2=bfeddaa8 a3=bfeddab0 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.832:12392): avc: denied { read append } for pid=12196 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.832:12392): arch=40000003 syscall=5 success=yes exit=3 a0=bfeddbb4 a1=402 a2=bfeddd78 a3=bfeddab0 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.840:12393): avc: denied { search } for pid=12196 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163775602.840:12393): avc: denied { read } for pid=12196 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.840:12393): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=817f348 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.840:12394): avc: denied { getattr } for pid=12196 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.840:12394): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfedd660 a2=dd0ff4 a3=817f348 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.840:12394): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163775602.840:12395): avc: denied { search } for pid=12196 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775602.840:12395): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=817f348 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775602.840:12396): avc: denied { lock } for pid=12196 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775602.840:12396): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfeddab0 a3=3 items=0 ppid=12195 pid=12196 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775602.840:12396): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163775603.168:12397): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163775603.168:12398): user pid=12195 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775603.212:12399): avc: denied { getattr } for pid=8368 comm="thunderbird-bin" name="nsCloseAllWindows.js" dev=dm-0 ino=10738025 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775603.212:12399): arch=40000003 syscall=195 success=yes exit=0 a0=b5eb1ff8 a1=bfae865c a2=c4eff4 a3=bfae865c items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163775603.212:12399): path="/usr/lib/thunderbird-1.5.0.7/components/nsCloseAllWindows.js" type=AVC msg=audit(1163775603.256:12400): avc: denied { read } for pid=8368 comm="thunderbird-bin" name="nsCloseAllWindows.js" dev=dm-0 ino=10738025 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775603.256:12400): arch=40000003 syscall=5 success=yes exit=20 a0=b5eb1ff8 a1=0 a2=1b6 a3=b52b9800 items=0 ppid=8363 pid=8368 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163775614.593:12401): avc: denied { read } for pid=3838 comm="nautilus" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163775614.593:12401): arch=40000003 syscall=33 success=yes exit=0 a0=bf97ae55 a1=4 a2=da3a64 a3=bf97ae55 items=0 ppid=1 pid=3838 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775623.350:12402): avc: denied { write } for pid=12202 comm="kbuildsycoca" name=".qtrc.lock" dev=dm-0 ino=10574414 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:xdm_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775623.350:12402): arch=40000003 syscall=5 success=yes exit=3 a0=9943270 a1=8042 a2=180 a3=8042 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775623.438:12403): avc: denied { write } for pid=12202 comm="kbuildsycoca" name="kdeglobals" dev=dm-0 ino=11036161 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775623.438:12403): arch=40000003 syscall=33 success=yes exit=0 a0=994c2a8 a1=2 a2=af76dc a3=bfecb290 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775623.450:12404): avc: denied { write } for pid=12202 comm="kbuildsycoca" name="ksycoca" dev=dm-0 ino=11036830 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163775623.450:12404): arch=40000003 syscall=33 success=yes exit=0 a0=994c1e8 a1=2 a2=af76dc a3=bfecb410 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.574:12405): avc: denied { rmdir } for pid=12202 comm="kbuildsycoca" name="applnk" dev=dm-0 ino=11036154 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775630.574:12405): arch=40000003 syscall=40 success=no exit=-39 a0=9949b78 a1=9949b78 a2=d73958 a3=bfecb724 items=0 ppid=12197 pid=12202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="kbuildsycoca" exe="/usr/bin/kbuildsycoca" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.906:12406): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=9330715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775630.906:12406): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=9330715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775630.906:12406): arch=40000003 syscall=227 success=yes exit=0 a0=f39c518 a1=a2f0d3 a2=f3a6fe8 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.910:12407): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=9330715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775630.910:12407): arch=40000003 syscall=212 success=yes exit=0 a0=f39c518 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.910:12408): avc: denied { create } for pid=8303 comm="yum" name="client.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.910:12408): arch=40000003 syscall=5 success=yes exit=30 a0=f3a6fe8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.918:12409): avc: denied { rename } for pid=8303 comm="yum" name="client.conf;455dcb57" dev=dm-0 ino=9329957 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.918:12409): arch=40000003 syscall=38 success=yes exit=0 a0=f3a6fe8 a1=f3af5e8 a2=d2a040 a3=f3a6fe8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.926:12410): avc: denied { relabelfrom } for pid=8303 comm="yum" name="client.conf" dev=dm-0 ino=9329957 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.926:12410): arch=40000003 syscall=227 success=yes exit=0 a0=f3af5e8 a1=a2f0d3 a2=f3a6bc8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.926:12411): avc: denied { write } for pid=8303 comm="yum" name="cupsd.conf.default;455dcb57" dev=dm-0 ino=9330232 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.926:12411): arch=40000003 syscall=4 success=yes exit=2472 a0=1e a1=b6dcb000 a2=9a8 a3=f2a44a8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775630.926:12411): path="/etc/cups/cupsd.conf.default;455dcb57" type=AVC msg=audit(1163775630.926:12412): avc: denied { unlink } for pid=8303 comm="yum" name="cupsd.conf.default" dev=dm-0 ino=9330707 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.926:12412): arch=40000003 syscall=38 success=yes exit=0 a0=f2a4478 a1=f154640 a2=d2a040 a3=f2a4478 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.934:12413): avc: denied { relabelto } for pid=8303 comm="yum" name="cupsd.conf.default" dev=dm-0 ino=9330232 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.934:12413): arch=40000003 syscall=227 success=yes exit=0 a0=f154640 a1=a2f0d3 a2=c353758 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.934:12414): avc: denied { setattr } for pid=8303 comm="yum" name="cupsd.conf.default" dev=dm-0 ino=9330232 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.934:12414): arch=40000003 syscall=212 success=yes exit=0 a0=f154640 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.954:12415): avc: denied { create } for pid=8303 comm="yum" name="cups.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.954:12415): arch=40000003 syscall=5 success=yes exit=30 a0=f3f8a90 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.954:12416): avc: denied { write } for pid=8303 comm="yum" name="cups.conf;455dcb57" dev=dm-0 ino=9331412 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.954:12416): arch=40000003 syscall=4 success=yes exit=460 a0=1e a1=b6dcb000 a2=1cc a3=f3f8ac0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775630.954:12416): path="/etc/dbus-1/system.d/cups.conf;455dcb57" type=AVC msg=audit(1163775630.958:12417): avc: denied { rename } for pid=8303 comm="yum" name="cups.conf;455dcb57" dev=dm-0 ino=9331412 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.958:12417): arch=40000003 syscall=38 success=yes exit=0 a0=f3f8a90 a1=f3f8a68 a2=d2a040 a3=f3f8a90 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.958:12418): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups.conf" dev=dm-0 ino=9331412 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.958:12418): arch=40000003 syscall=227 success=yes exit=0 a0=f3f8a68 a1=a2f0d3 a2=f3f4718 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.962:12419): avc: denied { unlink } for pid=8303 comm="yum" name="cancel.cups" dev=dm-0 ino=10334670 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lpr_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.962:12419): arch=40000003 syscall=38 success=yes exit=0 a0=f3f46f0 a1=f3f8a68 a2=d2a040 a3=f3f46f0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.978:12420): avc: denied { relabelto } for pid=8303 comm="yum" name="cancel.cups" dev=dm-0 ino=10327946 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lpr_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.978:12420): arch=40000003 syscall=227 success=yes exit=0 a0=f3f8a68 a1=a2f0d3 a2=f3f8b50 a3=20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775630.982:12421): avc: denied { setattr } for pid=8303 comm="yum" name="cancel.cups" dev=dm-0 ino=10327946 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lpr_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775630.982:12421): arch=40000003 syscall=212 success=yes exit=0 a0=f3f8a68 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.102:12422): avc: denied { unlink } for pid=8303 comm="yum" name="ipp" dev=dm-0 ino=4583583 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775631.102:12422): arch=40000003 syscall=38 success=yes exit=0 a0=f3ffda0 a1=f3ffd78 a2=d2a040 a3=f3ffda0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.122:12423): avc: denied { relabelto } for pid=8303 comm="yum" name="ipp" dev=dm-0 ino=10705026 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775631.122:12423): arch=40000003 syscall=227 success=yes exit=0 a0=f3ffd78 a1=a2f0d3 a2=f406ff0 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.122:12424): avc: denied { setattr } for pid=8303 comm="yum" name="ipp" dev=dm-0 ino=10705026 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775631.122:12424): arch=40000003 syscall=212 success=yes exit=0 a0=f3ffd78 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.470:12425): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=12345321 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775631.470:12425): avc: denied { add_name } for pid=8303 comm="yum" name="phpcups.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775631.470:12425): arch=40000003 syscall=5 success=yes exit=30 a0=f40f438 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.474:12426): avc: denied { remove_name } for pid=8303 comm="yum" name="phpcups.so;455dcb57" dev=dm-0 ino=12343179 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775631.474:12426): arch=40000003 syscall=38 success=yes exit=0 a0=f40f438 a1=b51acc8 a2=d2a040 a3=f40f438 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.514:12427): avc: denied { create } for pid=8303 comm="yum" name="cupsdisable;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.514:12427): arch=40000003 syscall=83 success=yes exit=0 a0=f27c828 a1=f4147f8 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.514:12428): avc: denied { rename } for pid=8303 comm="yum" name="cupsdisable;455dcb57" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775631.514:12428): avc: denied { unlink } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10334675 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.514:12428): arch=40000003 syscall=38 success=yes exit=0 a0=f4147f8 a1=f4156e0 a2=d2a040 a3=f4147f8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.518:12429): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=lnk_file type=AVC msg=audit(1163775631.518:12429): avc: denied { relabelto } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.518:12429): arch=40000003 syscall=227 success=yes exit=0 a0=f4156e0 a1=a2f0d3 a2=f40f3f8 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775631.518:12430): avc: denied { setattr } for pid=8303 comm="yum" name="cupsdisable" dev=dm-0 ino=10337772 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775631.518:12430): arch=40000003 syscall=198 success=yes exit=0 a0=f4156e0 a1=0 a2=0 a3=f19fdfc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.498:12431): avc: denied { create } for pid=8303 comm="yum" name="doc;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.498:12431): arch=40000003 syscall=83 success=yes exit=0 a0=f27c828 a1=f41c358 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.498:12432): avc: denied { rename } for pid=8303 comm="yum" name="doc;455dcb57" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775632.498:12432): avc: denied { unlink } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738076 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.498:12432): arch=40000003 syscall=38 success=yes exit=0 a0=f41c358 a1=f4147f8 a2=d2a040 a3=f41c358 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.502:12433): avc: denied { relabelfrom } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=AVC msg=audit(1163775632.502:12433): avc: denied { relabelto } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.502:12433): arch=40000003 syscall=227 success=yes exit=0 a0=f4147f8 a1=a2f0d3 a2=f41c570 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775632.502:12434): avc: denied { setattr } for pid=8303 comm="yum" name="doc" dev=dm-0 ino=10738075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775632.502:12434): arch=40000003 syscall=198 success=yes exit=0 a0=f4147f8 a1=0 a2=0 a3=f19fdfc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775633.462:12435): avc: denied { create } for pid=8303 comm="yum" name="it" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775633.462:12435): arch=40000003 syscall=39 success=yes exit=0 a0=f41ec98 a1=1c0 a2=d2a040 a3=f41ec98 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775633.462:12436): avc: denied { relabelfrom } for pid=8303 comm="yum" name="it" dev=dm-0 ino=12177867 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775633.462:12436): arch=40000003 syscall=227 success=yes exit=0 a0=f41ec98 a1=a2f0d3 a2=f41ed80 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.155:12437): avc: denied { write } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10311889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163775636.155:12437): avc: denied { add_name } for pid=8303 comm="yum" name="cancel-cups.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.155:12437): arch=40000003 syscall=83 success=yes exit=0 a0=f27c828 a1=f4262e0 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.163:12438): avc: denied { remove_name } for pid=8303 comm="yum" name="cancel-cups.1.gz;455dcb57" dev=dm-0 ino=10319625 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.163:12438): arch=40000003 syscall=38 success=yes exit=0 a0=f4262e0 a1=f426170 a2=d2a040 a3=f4262e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.167:12439): avc: denied { create } for pid=8303 comm="yum" name="cups-config.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12439): arch=40000003 syscall=5 success=yes exit=30 a0=f4262e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.167:12440): avc: denied { write } for pid=8303 comm="yum" name="cups-config.1.gz;455dcb57" dev=dm-0 ino=10319627 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12440): arch=40000003 syscall=4 success=yes exit=1126 a0=1e a1=b6dcb000 a2=466 a3=f426378 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775636.167:12440): path="/usr/share/man/man1/cups-config.1.gz;455dcb57" type=AVC msg=audit(1163775636.167:12441): avc: denied { rename } for pid=8303 comm="yum" name="cups-config.1.gz;455dcb57" dev=dm-0 ino=10319627 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12441): arch=40000003 syscall=38 success=yes exit=0 a0=f4262e0 a1=f426170 a2=d2a040 a3=f4262e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.167:12442): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups-config.1.gz" dev=dm-0 ino=10319627 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163775636.167:12442): arch=40000003 syscall=227 success=yes exit=0 a0=f426170 a1=a2f0d3 a2=f4262b8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.283:12443): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437052 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=AVC msg=audit(1163775636.283:12443): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437052 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.283:12443): arch=40000003 syscall=227 success=yes exit=0 a0=f421458 a1=a2f0d3 a2=f4478b8 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.315:12444): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437052 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.315:12444): arch=40000003 syscall=212 success=yes exit=0 a0=f421458 a1=4 a2=3 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.331:12445): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14534808 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775636.331:12445): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14534808 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.331:12445): arch=40000003 syscall=227 success=yes exit=0 a0=f421458 a1=a2f0d3 a2=f448c88 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.331:12446): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14534808 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.331:12446): arch=40000003 syscall=212 success=yes exit=0 a0=f421458 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.355:12447): avc: denied { relabelfrom } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437056 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=AVC msg=audit(1163775636.355:12447): avc: denied { relabelto } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437056 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.355:12447): arch=40000003 syscall=227 success=yes exit=0 a0=f421458 a1=a2f0d3 a2=f447908 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775636.355:12448): avc: denied { setattr } for pid=8303 comm="yum" name="cups" dev=dm-0 ino=14437056 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775636.355:12448): arch=40000003 syscall=212 success=yes exit=0 a0=f421458 a1=0 a2=7 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.143:12449): avc: denied { unlink } for pid=12210 comm="ln" name="smb" dev=dm-0 ino=10704859 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775640.143:12449): arch=40000003 syscall=10 success=yes exit=0 a0=bfb7dbf2 a1=34aff4 a2=804f42c a3=1 items=0 ppid=12209 pid=12210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ln" exe="/bin/ln" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.811:12450): avc: denied { unlink } for pid=8303 comm="yum" name="beh" dev=dm-0 ino=15451397 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775640.811:12450): arch=40000003 syscall=38 success=yes exit=0 a0=f1a0110 a1=ab82440 a2=d2a040 a3=f1a0110 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.859:12451): avc: denied { relabelto } for pid=8303 comm="yum" name="beh" dev=dm-0 ino=10705042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775640.859:12451): arch=40000003 syscall=227 success=yes exit=0 a0=ab82440 a1=a2f0d3 a2=f3853e8 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775640.859:12452): avc: denied { setattr } for pid=8303 comm="yum" name="beh" dev=dm-0 ino=10705042 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775640.859:12452): arch=40000003 syscall=212 success=yes exit=0 a0=ab82440 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775656.092:12453): avc: denied { relabelfrom } for pid=8303 comm="yum" name="foomatic" dev=dm-0 ino=14437080 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=AVC msg=audit(1163775656.092:12453): avc: denied { relabelto } for pid=8303 comm="yum" name="foomatic" dev=dm-0 ino=14437080 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775656.092:12453): arch=40000003 syscall=227 success=yes exit=0 a0=f5832b0 a1=a2f0d3 a2=f591e68 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775656.092:12454): avc: denied { setattr } for pid=8303 comm="yum" name="foomatic" dev=dm-0 ino=14437080 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775656.092:12454): arch=40000003 syscall=212 success=yes exit=0 a0=f5832b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163775661.176:12455): user pid=12211 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163775661.176:12456): login pid=12211 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163775661.176:12457): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163775661.176:12458): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775661.180:12459): avc: denied { getattr } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.180:12459): arch=40000003 syscall=195 success=yes exit=0 a0=886d120 a1=bfb4c400 a2=bdaff4 a3=886d120 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.180:12459): path="/usr/bin/run-parts" type=AVC msg=audit(1163775661.264:12460): avc: denied { execute } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.264:12460): arch=40000003 syscall=33 success=yes exit=0 a0=886d120 a1=1 a2=11 a3=886d120 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.264:12461): avc: denied { read } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.264:12461): arch=40000003 syscall=33 success=yes exit=0 a0=886d120 a1=4 a2=ffffffff a3=886d120 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.264:12462): avc: denied { execute_no_trans } for pid=12212 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.264:12462): arch=40000003 syscall=11 success=yes exit=0 a0=886d120 a1=886d3d8 a2=886d2f8 a3=886cf98 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.264:12462): path="/usr/bin/run-parts" type=AVC msg=audit(1163775661.272:12463): avc: denied { ioctl } for pid=12212 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.272:12463): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfcd5fb8 a3=bfcd5ff8 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.272:12463): path="/usr/bin/run-parts" type=AVC msg=audit(1163775661.288:12464): avc: denied { execute } for pid=12212 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.288:12464): arch=40000003 syscall=33 success=yes exit=0 a0=a01a990 a1=1 a2=1 a3=a01ac98 items=0 ppid=12211 pid=12212 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.288:12465): avc: denied { execute_no_trans } for pid=12213 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.288:12465): arch=40000003 syscall=11 success=yes exit=0 a0=a01aa10 a1=a01aad8 a2=a01aae8 a3=a01a758 items=0 ppid=12212 pid=12213 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.288:12465): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163775661.388:12466): avc: denied { execute } for pid=12215 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775661.388:12466): avc: denied { execute_no_trans } for pid=12215 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163775661.388:12466): avc: denied { read } for pid=12215 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.388:12466): arch=40000003 syscall=11 success=yes exit=0 a0=9392678 a1=9392808 a2=9392720 a3=9392508 items=0 ppid=12213 pid=12215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.388:12466): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163775661.388:12466): path="/sbin/chkconfig" type=AVC msg=audit(1163775661.392:12467): avc: denied { read } for pid=12215 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.392:12467): arch=40000003 syscall=5 success=yes exit=3 a0=bf82eaf0 a1=0 a2=ffffffff a3=8ba7038 items=0 ppid=12213 pid=12215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163775661.392:12468): avc: denied { getattr } for pid=12215 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775661.392:12468): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf82ea5c a2=24bff4 a3=bf82ea5c items=0 ppid=12213 pid=12215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163775661.392:12468): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163775661.672:12469): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163775661.672:12470): user pid=12211 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163775663.072:12471): avc: denied { read } for pid=12237 comm="cups" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775663.072:12471): arch=40000003 syscall=5 success=yes exit=3 a0=9beee18 a1=8000 a2=0 a3=8000 items=0 ppid=12230 pid=12237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cups" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775663.072:12472): avc: denied { ioctl } for pid=12237 comm="cups" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775663.072:12472): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bffb0478 a3=bffb04b8 items=0 ppid=12230 pid=12237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cups" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775663.072:12472): path="/var/run/cupsd.pid" type=AVC msg=audit(1163775663.076:12473): avc: denied { signal } for pid=12237 comm="cups" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775663.076:12473): arch=40000003 syscall=37 success=yes exit=0 a0=87a a1=f a2=87a a3=87a items=0 ppid=12230 pid=12237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cups" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.304:12474): avc: denied { remove_name } for pid=12244 comm="rm" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163775664.304:12474): avc: denied { unlink } for pid=12244 comm="rm" name="cupsd.pid" dev=dm-0 ino=14436994 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.304:12474): arch=40000003 syscall=10 success=yes exit=0 a0=bfc86f8a a1=0 a2=805277c a3=bfc85274 items=0 ppid=12237 pid=12244 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.316:12475): avc: denied { execute } for pid=12246 comm="bash" name="cupsd" dev=dm-0 ino=10311849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.316:12475): arch=40000003 syscall=33 success=yes exit=0 a0=8746808 a1=1 a2=11 a3=8746808 items=0 ppid=12237 pid=12246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.316:12476): avc: denied { read } for pid=12246 comm="bash" name="cupsd" dev=dm-0 ino=10311849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.316:12476): arch=40000003 syscall=33 success=yes exit=0 a0=8746808 a1=4 a2=ffffffff a3=8746808 items=0 ppid=12237 pid=12246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.316:12477): avc: denied { execute_no_trans } for pid=12247 comm="bash" name="cupsd" dev=dm-0 ino=10311849 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.316:12477): arch=40000003 syscall=11 success=yes exit=0 a0=8746808 a1=8746bf0 a2=8746b48 a3=87465a0 items=0 ppid=12246 pid=12247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775664.316:12477): path="/usr/sbin/cupsd" type=AVC msg=audit(1163775664.780:12478): avc: denied { read append } for pid=12248 comm="cupsd" name="error_log" dev=dm-0 ino=14438248 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.780:12478): arch=40000003 syscall=5 success=yes exit=2 a0=bfb130b4 a1=8442 a2=1b6 a3=8442 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.780:12479): avc: denied { setattr } for pid=12248 comm="cupsd" name="error_log" dev=dm-0 ino=14438248 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.780:12479): arch=40000003 syscall=207 success=yes exit=0 a0=2 a1=0 a2=7 a3=0 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775664.928:12480): avc: denied { ioctl } for pid=12248 comm="cupsd" name="printers.conf" dev=dm-0 ino=9329769 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.928:12480): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfb1088c a3=bfb108cc items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775664.928:12480): path="/etc/cups/printers.conf" type=AVC msg=audit(1163775664.932:12481): avc: denied { ioctl } for pid=12248 comm="cupsd" name="error_log" dev=dm-0 ino=14438248 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775664.932:12481): arch=40000003 syscall=54 success=no exit=-25 a0=2 a1=5401 a2=bfb1088c a3=bfb108cc items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775664.932:12481): path="/var/log/cups/error_log" type=LABEL_LEVEL_CHANGE msg=audit(1163775664.932:12482): user pid=12248 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='printer=ML-1740 uri=hal:///org/freedesktop/Hal/devices/usb_device_4e8_324c_2W61BKCX911232K0_if0_printer_noserial banners=none,none range=unknown: exe="/usr/sbin/cupsd" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=? res=success)' type=AVC msg=audit(1163775665.052:12483): avc: denied { write } for pid=12248 comm="cupsd" name="printcap" dev=dm-0 ino=9329785 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.052:12483): arch=40000003 syscall=5 success=yes exit=1 a0=9108640 a1=8241 a2=1b6 a3=8241 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.076:12484): avc: denied { read } for pid=12248 comm="cupsd" name="c00026" dev=dm-0 ino=14437207 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:print_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.076:12484): arch=40000003 syscall=5 success=yes exit=3 a0=bfb14e38 a1=8000 a2=0 a3=8000 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.104:12485): avc: denied { node_bind } for pid=12248 comm="cupsd" saddr=127.0.0.1 src=631 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lo_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163775665.104:12485): avc: denied { net_bind_service } for pid=12248 comm="cupsd" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163775665.104:12485): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfb16a60 a2=927ff4 a3=bfb16a94 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.104:12486): avc: denied { name_bind } for pid=12248 comm="cupsd" src=631 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ipp_port_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163775665.104:12486): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfb16b50 a2=927ff4 a3=928964 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.108:12487): avc: denied { write } for pid=12248 comm="cupsd" name="certs" dev=dm-0 ino=14534810 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775665.108:12487): avc: denied { add_name } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163775665.108:12487): avc: denied { create } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.108:12487): arch=40000003 syscall=5 success=yes exit=7 a0=bfb16788 a1=80c1 a2=100 a3=80c1 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.108:12488): avc: denied { setattr } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.108:12488): arch=40000003 syscall=94 success=yes exit=0 a0=7 a1=120 a2=927ff4 a3=21 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775665.108:12489): avc: denied { write } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163775665.108:12489): arch=40000003 syscall=4 success=yes exit=32 a0=7 a1=9139578 a2=20 a3=9139578 items=0 ppid=12247 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775665.108:12489): path="/var/run/cups/certs/0" type=AVC msg=audit(1163775666.252:12490): avc: denied { unlink } for pid=8303 comm="yum" name="hal_lpadmin" dev=dm-0 ino=10327522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_config_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775666.252:12490): arch=40000003 syscall=38 success=yes exit=0 a0=f27fe68 a1=f280838 a2=d2a040 a3=f27fe68 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775666.276:12491): avc: denied { relabelto } for pid=8303 comm="yum" name="hal_lpadmin" dev=dm-0 ino=10326729 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_config_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775666.276:12491): arch=40000003 syscall=227 success=yes exit=0 a0=f280838 a1=a2f0d3 a2=f147e60 a3=29 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775666.276:12492): avc: denied { setattr } for pid=8303 comm="yum" name="hal_lpadmin" dev=dm-0 ino=10326729 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_config_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775666.276:12492): arch=40000003 syscall=212 success=yes exit=0 a0=f280838 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775693.654:12493): avc: denied { relabelfrom } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163775693.654:12493): avc: denied { relabelto } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163775693.654:12493): arch=40000003 syscall=227 success=yes exit=0 a0=f494f10 a1=a2f0d3 a2=f148140 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775693.702:12494): avc: denied { setattr } for pid=8303 comm="yum" name="selinux" dev=dm-0 ino=9330337 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163775693.702:12494): arch=40000003 syscall=212 success=yes exit=0 a0=f494f10 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.138:12495): avc: denied { write } for pid=12273 comm="cp" name="seusers" dev=dm-0 ino=9334717 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.138:12495): arch=40000003 syscall=5 success=yes exit=4 a0=bfe4dbe1 a1=8201 a2=0 a3=8201 items=0 ppid=12272 pid=12273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.378:12496): avc: denied { unlink } for pid=8303 comm="yum" name="ssh-keygen" dev=dm-0 ino=10330013 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keygen_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.378:12496): arch=40000003 syscall=38 success=yes exit=0 a0=f57c240 a1=f0a1860 a2=d2a040 a3=f57c240 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.402:12497): avc: denied { relabelto } for pid=8303 comm="yum" name="ssh-keygen" dev=dm-0 ino=10316656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keygen_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.402:12497): arch=40000003 syscall=227 success=yes exit=0 a0=f0a1860 a1=a2f0d3 a2=f3761f0 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.402:12498): avc: denied { setattr } for pid=8303 comm="yum" name="ssh-keygen" dev=dm-0 ino=10316656 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keygen_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.402:12498): arch=40000003 syscall=212 success=yes exit=0 a0=f0a1860 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.434:12499): avc: denied { unlink } for pid=8303 comm="yum" name="ssh-keysign" dev=dm-0 ino=1014851 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.434:12499): arch=40000003 syscall=38 success=yes exit=0 a0=f147e00 a1=f54c580 a2=d2a040 a3=f147e00 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.486:12500): avc: denied { relabelto } for pid=8303 comm="yum" name="ssh-keysign" dev=dm-0 ino=10802910 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.486:12500): arch=40000003 syscall=227 success=yes exit=0 a0=f54c580 a1=a2f0d3 a2=f147e00 a3=28 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775696.486:12501): avc: denied { setattr } for pid=8303 comm="yum" name="ssh-keysign" dev=dm-0 ino=10802910 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775696.486:12501): arch=40000003 syscall=212 success=yes exit=0 a0=f54c580 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775707.375:12502): avc: denied { unlink } for pid=8303 comm="yum" name="newrole" dev=dm-0 ino=10318603 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775707.375:12502): arch=40000003 syscall=38 success=yes exit=0 a0=f375a98 a1=f4909b8 a2=d2a040 a3=f375a98 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775707.403:12503): avc: denied { relabelto } for pid=8303 comm="yum" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775707.403:12503): arch=40000003 syscall=227 success=yes exit=0 a0=f4909b8 a1=a2f0d3 a2=f4b8e20 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775707.403:12504): avc: denied { setattr } for pid=8303 comm="yum" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775707.403:12504): arch=40000003 syscall=212 success=yes exit=0 a0=f4909b8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12505): avc: denied { write } for pid=8303 comm="yum" name="ppp" dev=dm-0 ino=9330491 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775708.535:12505): avc: denied { add_name } for pid=8303 comm="yum" name="ioptions;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775708.535:12505): avc: denied { create } for pid=8303 comm="yum" name="ioptions;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12505): arch=40000003 syscall=5 success=yes exit=30 a0=f27c7a0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12506): avc: denied { remove_name } for pid=8303 comm="yum" name="ioptions;455dcb57" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_t:s0 tclass=dir type=AVC msg=audit(1163775708.535:12506): avc: denied { rename } for pid=8303 comm="yum" name="ioptions;455dcb57" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775708.535:12506): avc: denied { unlink } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12506): arch=40000003 syscall=38 success=yes exit=0 a0=f27c7a0 a1=f4b0458 a2=d2a040 a3=f27c7a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12507): avc: denied { relabelfrom } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_t:s0 tclass=file type=AVC msg=audit(1163775708.535:12507): avc: denied { relabelto } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12507): arch=40000003 syscall=227 success=yes exit=0 a0=f4b0458 a1=a2f0d3 a2=eeffe80 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.535:12508): avc: denied { setattr } for pid=8303 comm="yum" name="ioptions" dev=dm-0 ino=9330999 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.535:12508): arch=40000003 syscall=212 success=yes exit=0 a0=f4b0458 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.551:12509): avc: denied { relabelfrom } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.551:12509): avc: denied { relabelto } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775708.551:12509): arch=40000003 syscall=227 success=yes exit=0 a0=f4b0458 a1=a2f0d3 a2=f4b3278 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.551:12510): avc: denied { setattr } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=SYSCALL msg=audit(1163775708.551:12510): arch=40000003 syscall=212 success=yes exit=0 a0=f4b0458 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.555:12511): avc: denied { write } for pid=8303 comm="yum" name="isdn" dev=dm-0 ino=9331005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.555:12511): avc: denied { add_name } for pid=8303 comm="yum" name="arcor;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.555:12511): avc: denied { create } for pid=8303 comm="yum" name="arcor;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.555:12511): arch=40000003 syscall=5 success=yes exit=30 a0=ef000c0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.555:12512): avc: denied { write } for pid=8303 comm="yum" name="arcor;455dcb57" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.555:12512): arch=40000003 syscall=4 success=yes exit=180 a0=1e a1=b6dcb000 a2=b4 a3=f55d720 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775708.555:12512): path="/etc/ppp/peers/isdn/arcor;455dcb57" type=AVC msg=audit(1163775708.555:12513): avc: denied { remove_name } for pid=8303 comm="yum" name="arcor;455dcb57" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=dir type=AVC msg=audit(1163775708.555:12513): avc: denied { rename } for pid=8303 comm="yum" name="arcor;455dcb57" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.555:12513): arch=40000003 syscall=38 success=yes exit=0 a0=ef000c0 a1=f375a98 a2=d2a040 a3=ef000c0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775708.559:12514): avc: denied { relabelfrom } for pid=8303 comm="yum" name="arcor" dev=dm-0 ino=9331000 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:pppd_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163775708.559:12514): arch=40000003 syscall=227 success=yes exit=0 a0=f375a98 a1=a2f0d3 a2=f4b3278 a3=23 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.859:12515): avc: denied { relabelfrom } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437085 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163775710.859:12515): avc: denied { relabelto } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437085 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.859:12515): arch=40000003 syscall=227 success=yes exit=0 a0=f641240 a1=a2f0d3 a2=f6411e0 a3=1f items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.863:12516): avc: denied { setattr } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437085 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.863:12516): arch=40000003 syscall=212 success=yes exit=0 a0=f641240 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.863:12517): avc: denied { relabelfrom } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437086 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=AVC msg=audit(1163775710.863:12517): avc: denied { relabelto } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437086 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.863:12517): arch=40000003 syscall=227 success=yes exit=0 a0=f641240 a1=a2f0d3 a2=b4ef810 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775710.863:12518): avc: denied { setattr } for pid=8303 comm="yum" name="vbox" dev=dm-0 ino=14437086 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=SYSCALL msg=audit(1163775710.863:12518): arch=40000003 syscall=212 success=yes exit=0 a0=f641240 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775713.747:12519): avc: denied { unlink } for pid=12284 comm="chkconfig" name="K91capi" dev=dm-0 ino=7365619 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775713.747:12519): arch=40000003 syscall=10 success=yes exit=0 a0=946aba0 a1=946ab90 a2=1 a3=946aa38 items=0 ppid=12280 pid=12284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="chkconfig" exe="/sbin/chkconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12520): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12520): arch=40000003 syscall=195 success=no exit=-2 a0=9b280a0 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12521): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12521): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12522): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12522): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.816:12523): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.816:12523): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12524): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.820:12524): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12525): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12525): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12526): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12526): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12527): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12527): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12528): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12528): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12529): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12529): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12530): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12530): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12531): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12531): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12532): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.820:12532): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12533): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12533): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12534): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12534): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12535): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12535): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12536): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12536): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12537): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12537): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.820:12538): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.820:12538): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12539): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.824:12539): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12540): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163775721.824:12540): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12541): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12541): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12542): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12542): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12543): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12543): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775721.824:12544): avc: denied { ptrace } for pid=12289 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163775721.824:12544): arch=40000003 syscall=195 success=yes exit=0 a0=9b28088 a1=bfb8cbb4 a2=385ff4 a3=bfb8bf2c items=0 ppid=12288 pid=12289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.280:12545): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775724.280:12545): avc: denied { add_name } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775724.280:12545): avc: denied { create } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.280:12545): arch=40000003 syscall=5 success=yes exit=30 a0=f5a3320 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.280:12546): avc: denied { write } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.280:12546): arch=40000003 syscall=4 success=yes exit=8192 a0=1e a1=f4965d8 a2=2000 a3=ef7b798 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775724.280:12546): path="/usr/bin/gnomevfs-cat;455dcb57" type=AVC msg=audit(1163775724.280:12547): avc: denied { remove_name } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163775724.280:12547): avc: denied { rename } for pid=8303 comm="yum" name="gnomevfs-cat;455dcb57" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775724.280:12547): avc: denied { unlink } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10333891 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.280:12547): arch=40000003 syscall=38 success=yes exit=0 a0=f5a3320 a1=f384878 a2=d2a040 a3=f5a3320 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.288:12548): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163775724.288:12548): avc: denied { relabelto } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.288:12548): arch=40000003 syscall=227 success=yes exit=0 a0=f384878 a1=a2f0d3 a2=f57c2e8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775724.288:12549): avc: denied { setattr } for pid=8303 comm="yum" name="gnomevfs-cat" dev=dm-0 ino=10312124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163775724.288:12549): arch=40000003 syscall=212 success=yes exit=0 a0=f384878 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.040:12550): avc: denied { write } for pid=8303 comm="yum" name="services" dev=dm-0 ino=10543975 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775725.040:12550): avc: denied { add_name } for pid=8303 comm="yum" name="gnome-vfs-daemon.service;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.040:12550): arch=40000003 syscall=5 success=yes exit=30 a0=ef7b8e0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.120:12551): avc: denied { remove_name } for pid=8303 comm="yum" name="gnome-vfs-daemon.service;455dcb57" dev=dm-0 ino=15648912 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.120:12551): arch=40000003 syscall=38 success=yes exit=0 a0=ef7b8e0 a1=f5cd730 a2=d2a040 a3=ef7b8e0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.120:12552): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-vfs2-2.16.2" dev=dm-0 ino=12179053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.120:12552): arch=40000003 syscall=227 success=yes exit=0 a0=f2c8e90 a1=a2f0d3 a2=ef7b948 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.120:12553): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-vfs2-2.16.2" dev=dm-0 ino=12179053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775725.120:12553): arch=40000003 syscall=212 success=yes exit=0 a0=f2c8e90 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.208:12554): avc: denied { unlink } for pid=8303 comm="yum" name="gnome-vfs-2.0.mo" dev=dm-0 ino=10338227 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775725.208:12554): arch=40000003 syscall=38 success=yes exit=0 a0=f5cd768 a1=f5cd730 a2=d2a040 a3=f5cd768 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.252:12555): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-vfs-2.0.mo" dev=dm-0 ino=10337938 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775725.252:12555): arch=40000003 syscall=227 success=yes exit=0 a0=f5cd730 a1=a2f0d3 a2=f2c8e90 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775725.252:12556): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-vfs-2.0.mo" dev=dm-0 ino=10337938 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163775725.252:12556): arch=40000003 syscall=212 success=yes exit=0 a0=f5cd730 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12557): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12557): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12558): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12558): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12559): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12559): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12560): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12560): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775733.685:12561): avc: denied { ptrace } for pid=12294 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163775733.685:12561): arch=40000003 syscall=195 success=yes exit=0 a0=8874088 a1=bfaefb14 a2=24bff4 a3=bfaeee8c items=0 ppid=12293 pid=12294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775735.625:12562): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775735.625:12562): arch=40000003 syscall=4 success=yes exit=54 a0=4 a1=b7bd1000 a2=36 a3=36 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775735.625:12562): path="/var/log/yum.log" type=AVC msg=audit(1163775742.197:12563): avc: denied { ptrace } for pid=12298 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163775742.197:12563): arch=40000003 syscall=195 success=yes exit=0 a0=81890a0 a1=bf9b3284 a2=69eff4 a3=bf9b25fc items=0 ppid=12297 pid=12298 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.637:12564): avc: denied { create } for pid=8303 comm="yum" name="libmoniker_extra_2.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.637:12564): arch=40000003 syscall=5 success=yes exit=30 a0=bd495a0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.645:12565): avc: denied { write } for pid=8303 comm="yum" name="libmoniker_extra_2.so;455dcb57" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.645:12565): arch=40000003 syscall=4 success=yes exit=16384 a0=1e a1=f55fe88 a2=4000 a3=f144cc0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775744.645:12565): path="/usr/lib/bonobo/monikers/libmoniker_extra_2.so;455dcb57" type=AVC msg=audit(1163775744.645:12566): avc: denied { rename } for pid=8303 comm="yum" name="libmoniker_extra_2.so;455dcb57" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775744.645:12566): avc: denied { unlink } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10446408 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.645:12566): arch=40000003 syscall=38 success=yes exit=0 a0=bd495a0 a1=f145010 a2=d2a040 a3=bd495a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.649:12567): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775744.649:12567): avc: denied { relabelto } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.649:12567): arch=40000003 syscall=227 success=yes exit=0 a0=f145010 a1=a2f0d3 a2=f279f88 a3=1d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.649:12568): avc: denied { setattr } for pid=8303 comm="yum" name="libmoniker_extra_2.so" dev=dm-0 ino=10455193 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.649:12568): arch=40000003 syscall=212 success=yes exit=0 a0=f145010 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.729:12569): avc: denied { unlink } for pid=8303 comm="yum" name="GNOME_Moniker_std.server" dev=dm-0 ino=10447004 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.729:12569): arch=40000003 syscall=38 success=yes exit=0 a0=bd495a0 a1=f145010 a2=d2a040 a3=bd495a0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.729:12570): avc: denied { relabelto } for pid=8303 comm="yum" name="GNOME_Moniker_std.server" dev=dm-0 ino=10446408 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.729:12570): arch=40000003 syscall=227 success=yes exit=0 a0=f145010 a1=a2f0d3 a2=f5ccec8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775744.729:12571): avc: denied { setattr } for pid=8303 comm="yum" name="GNOME_Moniker_std.server" dev=dm-0 ino=10446408 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775744.729:12571): arch=40000003 syscall=212 success=yes exit=0 a0=f145010 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775753.778:12572): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnome-about" dev=dm-0 ino=10803023 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775753.778:12572): arch=40000003 syscall=227 success=yes exit=0 a0=f0f83f0 a1=a2f0d3 a2=f0f8430 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775758.842:12573): avc: denied { create } for pid=8303 comm="yum" name="openoffice.org2.1" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775758.842:12573): arch=40000003 syscall=39 success=yes exit=0 a0=f3847d0 a1=1c0 a2=d2a040 a3=f3847d0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775758.846:12574): avc: denied { relabelfrom } for pid=8303 comm="yum" name="openoffice.org2.1" dev=dm-0 ino=12179071 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775758.846:12574): arch=40000003 syscall=227 success=yes exit=0 a0=f3847d0 a1=a2f0d3 a2=f570790 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.542:12575): avc: denied { relabelto } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.542:12575): arch=40000003 syscall=227 success=yes exit=0 a0=ef7b898 a1=a2f0d3 a2=eef2670 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.546:12576): avc: denied { setattr } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.546:12576): arch=40000003 syscall=212 success=yes exit=0 a0=ef7b898 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.558:12577): avc: denied { create } for pid=8303 comm="yum" name="addin" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.558:12577): arch=40000003 syscall=39 success=yes exit=0 a0=f5ca2d8 a1=1c0 a2=d2a040 a3=f5ca2d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775759.558:12578): avc: denied { relabelfrom } for pid=8303 comm="yum" name="addin" dev=dm-0 ino=12179296 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163775759.558:12578): arch=40000003 syscall=227 success=yes exit=0 a0=f5ca2d8 a1=a2f0d3 a2=f5ca308 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775832.227:12579): avc: denied { unlink } for pid=8303 comm="yum" name="evolution-data-server-1.10" dev=dm-0 ino=10326685 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_server_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775832.227:12579): arch=40000003 syscall=38 success=yes exit=0 a0=f5dfc50 a1=f629e78 a2=d2a040 a3=f5dfc50 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775832.271:12580): avc: denied { relabelto } for pid=8303 comm="yum" name="evolution-data-server-1.10" dev=dm-0 ino=10318123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_server_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775832.271:12580): arch=40000003 syscall=227 success=yes exit=0 a0=f629e78 a1=a2f0d3 a2=f5dfc50 a3=2d items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775832.271:12581): avc: denied { setattr } for pid=8303 comm="yum" name="evolution-data-server-1.10" dev=dm-0 ino=10318123 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_server_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163775832.271:12581): arch=40000003 syscall=212 success=yes exit=0 a0=f629e78 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775843.035:12582): avc: denied { write } for pid=12315 comm="ldconfig" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775843.035:12582): avc: denied { add_name } for pid=12315 comm="ldconfig" name="ld.so.cache~" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775843.035:12582): arch=40000003 syscall=5 success=yes exit=3 a0=8aeeb20 a1=20241 a2=1a4 a3=8aeeb20 items=0 ppid=8303 pid=12315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775843.043:12583): avc: denied { remove_name } for pid=12315 comm="ldconfig" name="ld.so.cache~" dev=dm-0 ino=9331027 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775843.043:12583): arch=40000003 syscall=38 success=yes exit=0 a0=8aeeb20 a1=bf949180 a2=bf949100 a3=8aeeb20 items=0 ppid=8303 pid=12315 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775905.011:12584): avc: denied { append } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper.log" dev=dm-0 ino=14436937 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163775905.011:12584): arch=40000003 syscall=5 success=yes exit=3 a0=7385d0 a1=441 a2=1b6 a3=8acd250 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.575:12585): avc: denied { write } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper" dev=dm-0 ino=14567773 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775906.575:12585): avc: denied { add_name } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775906.575:12585): avc: denied { create } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.575:12585): arch=40000003 syscall=5 success=yes exit=4 a0=bfbe2e13 a1=241 a2=1b6 a3=8b06d18 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.591:12586): avc: denied { write } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567525 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.591:12586): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=b7ff1000 a2=1000 a3=1000 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163775906.591:12586): path="/var/lib/scrollkeeper/scrollkeeper_docs.tmp" type=AVC msg=audit(1163775906.591:12587): avc: denied { remove_name } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567874 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163775906.591:12587): avc: denied { unlink } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567874 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.591:12587): arch=40000003 syscall=10 success=yes exit=0 a0=bfbe2d13 a1=1 a2=73a338 a3=bfbe2f33 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.591:12588): avc: denied { rename } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567525 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.591:12588): arch=40000003 syscall=38 success=yes exit=0 a0=bfbe2e13 a1=bfbe2d13 a2=73a338 a3=bfbe2f33 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775906.903:12589): avc: denied { append } for pid=12351 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567525 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775906.903:12589): arch=40000003 syscall=5 success=yes exit=3 a0=bfbe2a38 a1=441 a2=1b6 a3=8adbfb8 items=0 ppid=12346 pid=12351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775915.816:12590): avc: denied { ptrace } for pid=12737 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163775915.816:12590): arch=40000003 syscall=195 success=yes exit=0 a0=9839088 a1=bffbd904 a2=fb6ff4 a3=bffbcc7c items=0 ppid=12736 pid=12737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775918.492:12591): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=10802956 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775918.492:12591): avc: denied { add_name } for pid=8303 comm="yum" name="libmapping.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775918.492:12591): arch=40000003 syscall=5 success=yes exit=30 a0=f70a6b8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775918.500:12592): avc: denied { remove_name } for pid=8303 comm="yum" name="libmapping.so;455dcb57" dev=dm-0 ino=10802957 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775918.500:12592): arch=40000003 syscall=38 success=yes exit=0 a0=f70a6b8 a1=f7ec010 a2=d2a040 a3=f70a6b8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775941.518:12593): avc: denied { write } for pid=12789 comm="update-desktop-" name="applications" dev=dm-0 ino=10936389 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163775941.518:12593): avc: denied { add_name } for pid=12789 comm="update-desktop-" name=".mimeinfo.cache.EF10IT" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775941.518:12593): arch=40000003 syscall=5 success=yes exit=3 a0=9f4ae20 a1=80c2 a2=180 a3=80c2 items=0 ppid=12749 pid=12789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775941.518:12594): avc: denied { remove_name } for pid=12789 comm="update-desktop-" name=".mimeinfo.cache.EF10IT" dev=dm-0 ino=10937705 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163775941.518:12594): arch=40000003 syscall=38 success=yes exit=0 a0=9f4ae20 a1=9f4bba8 a2=1a4 a3=9f4815c items=0 ppid=12749 pid=12789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.386:12595): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=9362524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163775949.386:12595): avc: denied { relabelto } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=9362524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.386:12595): arch=40000003 syscall=227 success=yes exit=0 a0=f569c18 a1=a2f0d3 a2=f569898 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.386:12596): avc: denied { setattr } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=9362524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.386:12596): arch=40000003 syscall=212 success=yes exit=0 a0=f569c18 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.542:12597): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=10902116 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775949.542:12597): avc: denied { relabelto } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=10902116 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.542:12597): arch=40000003 syscall=227 success=yes exit=0 a0=f70a620 a1=a2f0d3 a2=f73eaf8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775949.542:12598): avc: denied { setattr } for pid=8303 comm="yum" name="gaim" dev=dm-0 ino=10902116 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163775949.542:12598): arch=40000003 syscall=212 success=yes exit=0 a0=f70a620 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775950.890:12599): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10382818 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163775950.890:12599): avc: denied { add_name } for pid=8303 comm="yum" name="gaim.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775950.890:12599): arch=40000003 syscall=5 success=yes exit=30 a0=f2aea08 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775950.934:12600): avc: denied { remove_name } for pid=8303 comm="yum" name="gaim.mo;455dcb57" dev=dm-0 ino=10379674 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163775950.934:12600): arch=40000003 syscall=38 success=yes exit=0 a0=f2aea08 a1=f2b0398 a2=d2a040 a3=f2aea08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775963.323:12601): avc: denied { read } for pid=12798 comm="gcj-dbtool" name="[120769]" dev=pipefs ino=120769 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=AVC msg=audit(1163775963.323:12601): avc: denied { write } for pid=12798 comm="gcj-dbtool" name="[120790]" dev=pipefs ino=120790 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163775963.323:12601): arch=40000003 syscall=11 success=yes exit=0 a0=9e7a200 a1=9e79ea0 a2=9e79938 a3=9e78238 items=0 ppid=12797 pid=12798 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163775963.323:12601): path="pipe:[120790]" type=AVC_PATH msg=audit(1163775963.323:12601): path="pipe:[120769]" type=AVC msg=audit(1163775965.247:12602): avc: denied { sigchld } for pid=12797 comm="rebuild-gcj-db" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775965.247:12602): arch=40000003 syscall=7 success=yes exit=12798 a0=ffffffff a1=bf8c8768 a2=0 a3=9e79a40 items=0 ppid=8303 pid=12797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rebuild-gcj-db" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775965.531:12603): avc: denied { write } for pid=12803 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=949382 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775965.531:12603): arch=40000003 syscall=5 success=yes exit=5 a0=194e60 a1=8042 a2=1b6 a3=8042 items=0 ppid=12797 pid=12803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775966.595:12604): avc: denied { write } for pid=12807 comm="gcj-dbtool" name="gcj-4.1.1" dev=dm-0 ino=11001132 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775966.595:12604): avc: denied { add_name } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775966.595:12604): avc: denied { create } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775966.595:12604): arch=40000003 syscall=5 success=yes exit=5 a0=bfc3aea0 a1=80c0 a2=1a4 a3=80c0 items=0 ppid=12806 pid=12807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775968.391:12605): avc: denied { write } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775968.391:12605): arch=40000003 syscall=5 success=yes exit=136 a0=195cf8 a1=8042 a2=1b6 a3=8042 items=0 ppid=12806 pid=12807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775968.771:12606): avc: denied { remove_name } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163775968.771:12606): avc: denied { rename } for pid=12807 comm="gcj-dbtool" name="classmap.db70c2ys" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163775968.771:12606): avc: denied { unlink } for pid=12807 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=949382 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163775968.771:12606): arch=40000003 syscall=38 success=yes exit=0 a0=bfc3aeb0 a1=bfc3ae80 a2=227e5f4 a3=bfc3ae80 items=0 ppid=12806 pid=12807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163775969.307:12607): avc: denied { unlink } for pid=8303 comm="yum" name="libgtkhtml-3.8.so.15" dev=dm-0 ino=10333524 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775969.307:12607): arch=40000003 syscall=38 success=yes exit=0 a0=f568398 a1=f565df8 a2=d2a040 a3=f568398 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775969.311:12608): avc: denied { relabelto } for pid=8303 comm="yum" name="libgtkhtml-3.8.so.15" dev=dm-0 ino=10333827 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775969.311:12608): arch=40000003 syscall=227 success=yes exit=0 a0=f565df8 a1=a2f0d3 a2=f568580 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775969.311:12609): avc: denied { setattr } for pid=8303 comm="yum" name="libgtkhtml-3.8.so.15" dev=dm-0 ino=10333827 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163775969.311:12609): arch=40000003 syscall=198 success=yes exit=0 a0=f565df8 a1=0 a2=0 a3=f5632bc items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.504:12610): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.504:12610): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.504:12611): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.504:12611): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.508:12612): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.508:12612): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775976.512:12613): avc: denied { ptrace } for pid=12820 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163775976.512:12613): arch=40000003 syscall=195 success=yes exit=0 a0=9c25088 a1=bfe64934 a2=b82ff4 a3=bfe63cac items=0 ppid=12819 pid=12820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163775989.425:12614): avc: denied { setexec } for pid=12823 comm="yum" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163775989.425:12614): arch=40000003 syscall=4 success=no exit=-22 a0=1e a1=f5f08a0 a2=20 a3=a2f751 items=0 ppid=8303 pid=12823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.614:12615): avc: denied { write } for pid=8303 comm="yum" name="console.apps" dev=dm-0 ino=9330284 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163776017.614:12615): avc: denied { add_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163776017.614:12615): avc: denied { create } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.614:12615): arch=40000003 syscall=5 success=yes exit=30 a0=f5fca38 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.674:12616): avc: denied { write } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.674:12616): arch=40000003 syscall=4 success=yes exit=73 a0=1e a1=b6dcb000 a2=49 a3=f762860 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776017.674:12616): path="/etc/security/console.apps/gnome-system-log;455dcb57" type=AVC msg=audit(1163776017.674:12617): avc: denied { remove_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=dir type=AVC msg=audit(1163776017.674:12617): avc: denied { rename } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=AVC msg=audit(1163776017.674:12617): avc: denied { unlink } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331034 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.674:12617): arch=40000003 syscall=38 success=yes exit=0 a0=f5fca38 a1=f7d9d78 a2=d2a040 a3=f5fca38 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.682:12618): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:userhelper_conf_t:s0 tclass=file type=AVC msg=audit(1163776017.682:12618): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.682:12618): arch=40000003 syscall=227 success=yes exit=0 a0=f7d9d78 a1=a2f0d3 a2=f5fe1a8 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776017.682:12619): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=9331047 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776017.682:12619): arch=40000003 syscall=212 success=yes exit=0 a0=f7d9d78 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.162:12620): avc: denied { create } for pid=8303 comm="yum" name="libgdict-1.0.so.5;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776018.162:12620): arch=40000003 syscall=83 success=yes exit=0 a0=f829fb8 a1=f776c70 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.162:12621): avc: denied { rename } for pid=8303 comm="yum" name="libgdict-1.0.so.5;455dcb57" dev=dm-0 ino=10329922 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776018.162:12621): arch=40000003 syscall=38 success=yes exit=0 a0=f776c70 a1=f56ecb8 a2=d2a040 a3=f776c70 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.166:12622): avc: denied { relabelfrom } for pid=8303 comm="yum" name="libgdict-1.0.so.5" dev=dm-0 ino=10329922 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776018.166:12622): arch=40000003 syscall=227 success=yes exit=0 a0=f56ecb8 a1=a2f0d3 a2=f83a060 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.314:12623): avc: denied { write } for pid=8303 comm="yum" name="sbin" dev=dm-0 ino=10311842 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163776018.314:12623): avc: denied { add_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163776018.314:12623): avc: denied { create } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.314:12623): arch=40000003 syscall=5 success=yes exit=30 a0=f7628a8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.314:12624): avc: denied { write } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.314:12624): arch=40000003 syscall=4 success=yes exit=65536 a0=1e a1=f829fb8 a2=10000 a3=f763d00 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776018.314:12624): path="/usr/sbin/gnome-system-log;455dcb57" type=AVC msg=audit(1163776018.314:12625): avc: denied { remove_name } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163776018.314:12625): avc: denied { rename } for pid=8303 comm="yum" name="gnome-system-log;455dcb57" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163776018.314:12625): avc: denied { unlink } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10318824 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.314:12625): arch=40000003 syscall=38 success=yes exit=0 a0=f7628a8 a1=f839fe0 a2=d2a040 a3=f7628a8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.474:12626): avc: denied { relabelfrom } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163776018.474:12626): avc: denied { relabelto } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.474:12626): arch=40000003 syscall=227 success=yes exit=0 a0=f839fe0 a1=a2f0d3 a2=f7628d0 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776018.474:12627): avc: denied { setattr } for pid=8303 comm="yum" name="gnome-system-log" dev=dm-0 ino=10324825 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163776018.474:12627): arch=40000003 syscall=212 success=yes exit=0 a0=f839fe0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776031.787:12628): avc: denied { ptrace } for pid=12970 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776031.787:12628): arch=40000003 syscall=195 success=yes exit=0 a0=9701088 a1=bfadb304 a2=cceff4 a3=bfada67c items=0 ppid=12969 pid=12970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776035.996:12629): avc: denied { relabelfrom } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776035.996:12629): arch=40000003 syscall=227 success=yes exit=0 a0=f83a000 a1=a2f0d3 a2=f7d9d78 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776048.764:12630): avc: denied { write } for pid=8303 comm="yum" name="thunarx-1" dev=dm-0 ino=10352019 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776048.764:12630): avc: denied { add_name } for pid=8303 comm="yum" name="thunar-apr.so;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776048.764:12630): arch=40000003 syscall=5 success=yes exit=30 a0=f794a10 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776048.804:12631): avc: denied { remove_name } for pid=8303 comm="yum" name="thunar-apr.so;455dcb57" dev=dm-0 ino=16237115 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776048.804:12631): arch=40000003 syscall=38 success=yes exit=0 a0=f794a10 a1=f4a3688 a2=d2a040 a3=f794a10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776058.997:12632): avc: denied { unlink } for pid=8303 comm="yum" name="evolution-2.10" dev=dm-0 ino=10326966 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776058.997:12632): arch=40000003 syscall=38 success=yes exit=0 a0=f5faa60 a1=f7980f0 a2=d2a040 a3=f5faa60 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776059.045:12633): avc: denied { relabelto } for pid=8303 comm="yum" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776059.045:12633): arch=40000003 syscall=227 success=yes exit=0 a0=f7980f0 a1=a2f0d3 a2=de0ed50 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776059.045:12634): avc: denied { setattr } for pid=8303 comm="yum" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776059.045:12634): arch=40000003 syscall=212 success=yes exit=0 a0=f7980f0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776060.261:12635): avc: denied { unlink } for pid=8303 comm="yum" name="evolution-alarm-notify" dev=dm-0 ino=10870027 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_alarm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776060.261:12635): arch=40000003 syscall=38 success=yes exit=0 a0=f7ac8e8 a1=f86c688 a2=d2a040 a3=f7ac8e8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776060.273:12636): avc: denied { relabelto } for pid=8303 comm="yum" name="evolution-alarm-notify" dev=dm-0 ino=10868468 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_alarm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776060.273:12636): arch=40000003 syscall=227 success=yes exit=0 a0=f86c688 a1=a2f0d3 a2=f8727a0 a3=2c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776060.273:12637): avc: denied { setattr } for pid=8303 comm="yum" name="evolution-alarm-notify" dev=dm-0 ino=10868468 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:evolution_alarm_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776060.273:12637): arch=40000003 syscall=212 success=yes exit=0 a0=f86c688 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776101.364:12638): avc: denied { unlink } for pid=8303 comm="yum" name="neat-tui" dev=dm-0 ino=10320377 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776101.364:12638): arch=40000003 syscall=38 success=yes exit=0 a0=f7c6ab8 a1=f873c68 a2=d2a040 a3=f7c6ab8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776101.364:12639): avc: denied { relabelto } for pid=8303 comm="yum" name="neat-tui" dev=dm-0 ino=10315508 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776101.364:12639): arch=40000003 syscall=227 success=yes exit=0 a0=f873c68 a1=a2f0d3 a2=f7c6a98 a3=1c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776101.364:12640): avc: denied { setattr } for pid=8303 comm="yum" name="neat-tui" dev=dm-0 ino=10315508 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776101.364:12640): arch=40000003 syscall=198 success=yes exit=0 a0=f873c68 a1=0 a2=0 a3=f7c2914 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.724:12641): avc: denied { write } for pid=8303 comm="yum" name="videoaliases" dev=dm-0 ino=10607880 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=AVC msg=audit(1163776114.724:12641): avc: denied { add_name } for pid=8303 comm="yum" name="i810.xinf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=AVC msg=audit(1163776114.724:12641): avc: denied { create } for pid=8303 comm="yum" name="i810.xinf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.724:12641): arch=40000003 syscall=5 success=yes exit=30 a0=f8c7f18 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.736:12642): avc: denied { write } for pid=8303 comm="yum" name="i810.xinf;455dcb57" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.736:12642): arch=40000003 syscall=4 success=yes exit=1823 a0=1e a1=b6dcb000 a2=71f a3=f9b4f88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776114.736:12642): path="/usr/share/hwdata/videoaliases/i810.xinf;455dcb57" type=AVC msg=audit(1163776114.736:12643): avc: denied { remove_name } for pid=8303 comm="yum" name="i810.xinf;455dcb57" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=dir type=AVC msg=audit(1163776114.736:12643): avc: denied { rename } for pid=8303 comm="yum" name="i810.xinf;455dcb57" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=AVC msg=audit(1163776114.736:12643): avc: denied { unlink } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607411 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.736:12643): arch=40000003 syscall=38 success=yes exit=0 a0=f8c7f18 a1=f7c1588 a2=d2a040 a3=f8c7f18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.748:12644): avc: denied { relabelfrom } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:hwdata_t:s0 tclass=file type=AVC msg=audit(1163776114.748:12644): avc: denied { relabelto } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.748:12644): arch=40000003 syscall=227 success=yes exit=0 a0=f7c1588 a1=a2f0d3 a2=f8c7e20 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776114.752:12645): avc: denied { setattr } for pid=8303 comm="yum" name="i810.xinf" dev=dm-0 ino=10607197 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163776114.752:12645): arch=40000003 syscall=212 success=yes exit=0 a0=f7c1588 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776116.961:12646): avc: denied { write } for pid=13022 comm="update-gdk-pixb" name="gdk-pixbuf.loaders" dev=dm-0 ino=9362549 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776116.961:12646): arch=40000003 syscall=5 success=yes exit=3 a0=9ff0378 a1=8241 a2=1b6 a3=8241 items=0 ppid=13018 pid=13022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-gdk-pixb" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776144.918:12647): avc: denied { link } for pid=8303 comm="yum" name="i386-redhat-linux-gcc;455dcb57" dev=dm-0 ino=10318121 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776144.918:12647): arch=40000003 syscall=9 success=yes exit=0 a0=f5c4aa0 a1=f5c4a00 a2=d2a040 a3=0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776144.930:12648): avc: denied { rename } for pid=8303 comm="yum" name="i386-redhat-linux-gcc;455dcb57" dev=dm-0 ino=10318121 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776144.930:12648): arch=40000003 syscall=38 success=yes exit=0 a0=f5c4aa0 a1=f7b7480 a2=d2a040 a3=f5c4aa0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776144.950:12649): avc: denied { relabelfrom } for pid=8303 comm="yum" name="i386-redhat-linux-gcc" dev=dm-0 ino=10318121 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776144.950:12649): arch=40000003 syscall=227 success=yes exit=0 a0=f7b7480 a1=a2f0d3 a2=f5c4af0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776160.135:12650): avc: denied { unlink } for pid=8303 comm="yum" name="libImlib2.so.1.3.0" dev=dm-0 ino=10334610 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163776160.135:12650): arch=40000003 syscall=38 success=yes exit=0 a0=923ea10 a1=f9f43b0 a2=d2a040 a3=923ea10 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776160.167:12651): avc: denied { relabelto } for pid=8303 comm="yum" name="libImlib2.so.1.3.0" dev=dm-0 ino=10323377 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163776160.167:12651): arch=40000003 syscall=227 success=yes exit=0 a0=f9f43b0 a1=a2f0d3 a2=f9eb320 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776160.167:12652): avc: denied { setattr } for pid=8303 comm="yum" name="libImlib2.so.1.3.0" dev=dm-0 ino=10323377 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:textrel_shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163776160.167:12652): arch=40000003 syscall=212 success=yes exit=0 a0=f9f43b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776162.579:12653): avc: denied { relabelfrom } for pid=8303 comm="yum" name="fr" dev=dm-0 ino=10541414 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776162.579:12653): avc: denied { relabelto } for pid=8303 comm="yum" name="fr" dev=dm-0 ino=10541414 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163776162.579:12653): arch=40000003 syscall=227 success=yes exit=0 a0=f8c1bc0 a1=a2f0d3 a2=af72d20 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776162.579:12654): avc: denied { setattr } for pid=8303 comm="yum" name="fr" dev=dm-0 ino=10541414 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=SYSCALL msg=audit(1163776162.579:12654): arch=40000003 syscall=212 success=yes exit=0 a0=f8c1bc0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776173.620:12655): avc: denied { rmdir } for pid=8303 comm="yum" name="libgnomeprint" dev=dm-0 ino=12049646 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776173.620:12655): arch=40000003 syscall=40 success=yes exit=0 a0=b8f1fc8 a1=2d a2=d2a040 a3=b8f1fc8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776175.940:12656): avc: denied { unlink } for pid=13044 comm="ln" name="gcc" dev=dm-0 ino=12407052 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776175.940:12656): arch=40000003 syscall=10 success=yes exit=0 a0=bf9e7bf8 a1=3b2ff4 a2=804f42c a3=1 items=0 ppid=13043 pid=13044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ln" exe="/bin/ln" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776200.670:12657): avc: denied { execmem } for pid=13074 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776200.670:12657): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=3928 pid=13074 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776200.670:12658): avc: denied { execstack } for pid=13074 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776200.670:12658): arch=40000003 syscall=125 success=yes exit=0 a0=bfa8a000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=3928 pid=13074 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163776203.186:12659): user pid=13075 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163776203.186:12660): login pid=13075 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163776203.430:12661): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163776203.430:12662): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163776203.694:12663): avc: denied { execute } for pid=13076 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776203.694:12663): avc: denied { execute_no_trans } for pid=13076 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776203.694:12663): arch=40000003 syscall=11 success=yes exit=0 a0=9cf31b0 a1=9cf3358 a2=9cf3290 a3=9cf3008 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776203.694:12663): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163776204.326:12664): avc: denied { execute } for pid=13074 comm="gnome-screensav" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776204.326:12664): arch=40000003 syscall=192 success=yes exit=2637824 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=3928 pid=13074 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776204.326:12664): path="/dev/zero" type=AVC msg=audit(1163776204.410:12665): avc: denied { search } for pid=13076 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163776204.410:12665): avc: denied { read } for pid=13076 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.410:12665): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9d087f8 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776204.410:12666): avc: denied { getattr } for pid=13076 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.410:12666): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8184d8 a2=faaff4 a3=9d087f8 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776204.410:12666): path="/proc/net/dev" type=AVC msg=audit(1163776204.758:12667): avc: denied { read } for pid=13076 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.758:12667): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9d09348 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776204.758:12668): avc: denied { getattr } for pid=13076 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776204.758:12668): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf818330 a2=faaff4 a3=9d09348 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776204.758:12668): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163776204.758:12669): avc: denied { search } for pid=13076 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776204.758:12669): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9d09348 items=0 ppid=13075 pid=13076 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1163776207.066:12670): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163776207.526:12671): user pid=13075 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163776216.279:12672): avc: denied { ptrace } for pid=13085 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776216.279:12672): arch=40000003 syscall=195 success=yes exit=0 a0=867d088 a1=bfba1bc4 a2=50aff4 a3=bfba0f3c items=0 ppid=13084 pid=13085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776216.283:12673): avc: denied { ptrace } for pid=13085 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163776216.283:12673): arch=40000003 syscall=195 success=yes exit=0 a0=867d088 a1=bfba1bc4 a2=50aff4 a3=bfba0f3c items=0 ppid=13084 pid=13085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776216.283:12674): avc: denied { ptrace } for pid=13085 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163776216.283:12674): arch=40000003 syscall=195 success=yes exit=0 a0=867d088 a1=bfba1bc4 a2=50aff4 a3=bfba0f3c items=0 ppid=13084 pid=13085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776221.295:12675): avc: denied { read } for pid=13087 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776221.295:12675): arch=40000003 syscall=33 success=yes exit=0 a0=bfd24fcb a1=4 a2=842a64 a3=bfd24fcb items=0 ppid=1 pid=13087 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163776221.295:12676): avc: denied { getattr } for pid=13087 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776221.295:12676): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfd2294c a2=fb0ff4 a3=9555140 items=0 ppid=1 pid=13087 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163776221.295:12676): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163776232.044:12677): avc: denied { append } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.044:12677): arch=40000003 syscall=5 success=yes exit=3 a0=86c00e0 a1=8401 a2=0 a3=8401 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776232.064:12678): avc: denied { read } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.064:12678): arch=40000003 syscall=5 success=yes exit=3 a0=86c00e0 a1=8000 a2=0 a3=8000 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776232.072:12679): avc: denied { write } for pid=8523 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.072:12679): arch=40000003 syscall=5 success=yes exit=3 a0=86c00e0 a1=8201 a2=0 a3=8201 items=0 ppid=8520 pid=8523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163776232.412:12680): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163776232.416:12681): avc: denied { search } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776232.416:12681): avc: denied { write } for pid=8520 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776232.416:12681): avc: denied { remove_name } for pid=8520 comm="su" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776232.416:12681): avc: denied { unlink } for pid=8520 comm="su" name=".xauthb3Z41E" dev=dm-0 ino=13127387 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776232.416:12681): arch=40000003 syscall=10 success=yes exit=0 a0=96e49a8 a1=96e4a86 a2=259bc8 a3=96e1008 items=0 ppid=8500 pid=8520 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1163776232.440:12682): user pid=8520 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163776236.944:12683): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.944:12683): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.944:12684): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.944:12684): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12685): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.948:12685): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12686): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.948:12686): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12687): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.948:12687): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12688): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776236.948:12688): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.948:12689): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776236.948:12689): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776236.952:12690): avc: denied { ptrace } for pid=13109 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163776236.952:12690): arch=40000003 syscall=195 success=yes exit=0 a0=9be6088 a1=bfb70394 a2=6a3ff4 a3=bfb6f70c items=0 ppid=13105 pid=13109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776239.168:12691): avc: denied { read } for pid=3838 comm="nautilus" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776239.168:12691): arch=40000003 syscall=33 success=yes exit=0 a0=bf97ae55 a1=4 a2=da3a64 a3=bf97ae55 items=0 ppid=1 pid=3838 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776265.914:12692): avc: denied { ptrace } for pid=13126 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163776265.914:12692): arch=40000003 syscall=195 success=yes exit=0 a0=850d088 a1=bfbdac04 a2=dcaff4 a3=bfbd9f7c items=0 ppid=13125 pid=13126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776265.914:12693): avc: denied { ptrace } for pid=13126 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163776265.914:12693): arch=40000003 syscall=195 success=yes exit=0 a0=850d088 a1=bfbdac04 a2=dcaff4 a3=bfbd9f7c items=0 ppid=13125 pid=13126 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776270.686:12694): avc: denied { read } for pid=13129 comm="gcj-dbtool" name="[135348]" dev=pipefs ino=135348 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=AVC msg=audit(1163776270.686:12694): avc: denied { write } for pid=13129 comm="gcj-dbtool" name="[135369]" dev=pipefs ino=135369 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163776270.686:12694): arch=40000003 syscall=11 success=yes exit=0 a0=9eab218 a1=9eab250 a2=9eaa958 a3=9ea9258 items=0 ppid=13128 pid=13129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC_PATH msg=audit(1163776270.686:12694): path="pipe:[135369]" type=AVC_PATH msg=audit(1163776270.686:12694): path="pipe:[135348]" type=AVC msg=audit(1163776270.966:12695): avc: denied { sigchld } for pid=13128 comm="rebuild-gcj-db" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776270.966:12695): arch=40000003 syscall=7 success=yes exit=13129 a0=ffffffff a1=bfde7cb8 a2=0 a3=9eaaa60 items=0 ppid=13127 pid=13128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rebuild-gcj-db" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776271.154:12696): avc: denied { write } for pid=13135 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776271.154:12696): arch=40000003 syscall=5 success=yes exit=5 a0=2e0e60 a1=8042 a2=1b6 a3=8042 items=0 ppid=13128 pid=13135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163776271.394:12697): avc: denied { write } for pid=13139 comm="gcj-dbtool" name="gcj-4.1.1" dev=dm-0 ino=11001132 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776271.394:12697): avc: denied { add_name } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776271.394:12697): avc: denied { create } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776271.394:12697): arch=40000003 syscall=5 success=yes exit=5 a0=bfba7610 a1=80c0 a2=1a4 a3=80c0 items=0 ppid=13138 pid=13139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163776273.046:12698): avc: denied { remove_name } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" dev=dm-0 ino=11000703 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776273.046:12698): avc: denied { rename } for pid=13139 comm="gcj-dbtool" name="classmap.dbchwmlp" dev=dm-0 ino=11000703 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776273.046:12698): avc: denied { unlink } for pid=13139 comm="gcj-dbtool" name="classmap.db" dev=dm-0 ino=10999442 scontext=staff_u:staff_r:staff_javaplugin_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776273.046:12698): arch=40000003 syscall=38 success=yes exit=0 a0=bfba7620 a1=bfba75f0 a2=23dd5f4 a3=bfba75f0 items=0 ppid=13138 pid=13139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:staff_r:staff_javaplugin_t:s0 key=(null) type=AVC msg=audit(1163776273.414:12699): avc: denied { write } for pid=13146 comm="update-desktop-" name="applications" dev=dm-0 ino=10311883 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163776273.414:12699): avc: denied { add_name } for pid=13146 comm="update-desktop-" name=".mimeinfo.cache.ED02IT" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776273.414:12699): arch=40000003 syscall=5 success=yes exit=3 a0=8cf6450 a1=80c2 a2=180 a3=80c2 items=0 ppid=13127 pid=13146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776273.422:12700): avc: denied { remove_name } for pid=13146 comm="update-desktop-" name=".mimeinfo.cache.ED02IT" dev=dm-0 ino=10314902 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776273.422:12700): arch=40000003 syscall=38 success=yes exit=0 a0=8cf6450 a1=8cf5cc0 a2=1a4 a3=8ce7f50 items=0 ppid=13127 pid=13146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776274.138:12701): avc: denied { setattr } for pid=13148 comm="gtk-update-icon" name="hicolor" dev=dm-0 ino=10444975 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776274.138:12701): arch=40000003 syscall=30 success=yes exit=0 a0=bfdb2bc5 a1=bfdb0f44 a2=1 a3=8a4bc28 items=0 ppid=13127 pid=13148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gtk-update-icon" exe="/usr/bin/gtk-update-icon-cache" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.719:12702): avc: denied { unlink } for pid=8303 comm="yum" name=".eclipseproduct" dev=dm-0 ino=10704855 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163776276.719:12702): arch=40000003 syscall=38 success=yes exit=0 a0=fb15cb8 a1=fa744e0 a2=d2a040 a3=fb15cb8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.723:12703): avc: denied { relabelto } for pid=8303 comm="yum" name=".eclipseproduct" dev=dm-0 ino=12177802 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163776276.723:12703): arch=40000003 syscall=227 success=yes exit=0 a0=fa744e0 a1=a2f0d3 a2=fb43f98 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.723:12704): avc: denied { setattr } for pid=8303 comm="yum" name=".eclipseproduct" dev=dm-0 ino=12177802 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163776276.723:12704): arch=40000003 syscall=212 success=yes exit=0 a0=fa744e0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776276.731:12705): avc: denied { relabelfrom } for pid=8303 comm="yum" name="features" dev=dm-0 ino=10707976 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163776276.731:12705): avc: denied { relabelto } for pid=8303 comm="yum" name="features" dev=dm-0 ino=10707976 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776276.731:12705): arch=40000003 syscall=227 success=yes exit=0 a0=fb44018 a1=a2f0d3 a2=f9e40b8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776284.727:12706): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163776284.727:12706): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776284.727:12706): path="socket:[31406]" type=AVC msg=audit(1163776285.791:12707): avc: denied { ptrace } for pid=13168 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163776285.791:12707): arch=40000003 syscall=195 success=yes exit=0 a0=8ca0088 a1=bfde0604 a2=24bff4 a3=bfddf97c items=0 ppid=13167 pid=13168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776285.795:12708): avc: denied { ptrace } for pid=13168 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163776285.795:12708): arch=40000003 syscall=195 success=yes exit=0 a0=8ca0088 a1=bfde0604 a2=24bff4 a3=bfddf97c items=0 ppid=13167 pid=13168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.239:12709): avc: denied { write } for pid=8303 comm="yum" name="bin" dev=dm-0 ino=10311850 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163776288.239:12709): avc: denied { add_name } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163776288.239:12709): avc: denied { create } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.239:12709): arch=40000003 syscall=5 success=yes exit=30 a0=f986a18 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.239:12710): avc: denied { write } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.239:12710): arch=40000003 syscall=4 success=yes exit=16384 a0=1e a1=faac280 a2=4000 a3=f9c7408 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776288.239:12710): path="/usr/bin/nautilus-sendto;455dcb57" type=AVC msg=audit(1163776288.239:12711): avc: denied { remove_name } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=AVC msg=audit(1163776288.239:12711): avc: denied { rename } for pid=8303 comm="yum" name="nautilus-sendto;455dcb57" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163776288.239:12711): avc: denied { unlink } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10317618 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.239:12711): arch=40000003 syscall=38 success=yes exit=0 a0=f986a18 a1=fb43fd8 a2=d2a040 a3=f986a18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.367:12712): avc: denied { relabelfrom } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:bin_t:s0 tclass=file type=AVC msg=audit(1163776288.367:12712): avc: denied { relabelto } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.367:12712): arch=40000003 syscall=227 success=yes exit=0 a0=fb43fd8 a1=a2f0d3 a2=fb43fb8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.367:12713): avc: denied { setattr } for pid=8303 comm="yum" name="nautilus-sendto" dev=dm-0 ino=10321655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163776288.367:12713): arch=40000003 syscall=212 success=yes exit=0 a0=fb43fd8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.947:12714): avc: denied { write } for pid=8303 comm="yum" name="LC_MESSAGES" dev=dm-0 ino=10311917 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163776288.947:12714): avc: denied { add_name } for pid=8303 comm="yum" name="nautilus-sendto.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163776288.947:12714): arch=40000003 syscall=5 success=yes exit=30 a0=f934028 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776288.951:12715): avc: denied { remove_name } for pid=8303 comm="yum" name="nautilus-sendto.mo;455dcb57" dev=dm-0 ino=10317618 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163776288.951:12715): arch=40000003 syscall=38 success=yes exit=0 a0=f934028 a1=f9e4978 a2=d2a040 a3=f934028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.203:12716): avc: denied { write } for pid=8303 comm="yum" name="man1" dev=dm-0 ino=10311889 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776289.203:12716): avc: denied { add_name } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776289.203:12716): avc: denied { create } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.203:12716): arch=40000003 syscall=5 success=yes exit=30 a0=f9e4978 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.283:12717): avc: denied { write } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.283:12717): arch=40000003 syscall=4 success=yes exit=648 a0=1e a1=b6dcb000 a2=288 a3=f9c79c8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776289.283:12717): path="/usr/share/man/man1/nautilus-sendto.1.gz;455dcb57" type=AVC msg=audit(1163776289.283:12718): avc: denied { remove_name } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=dir type=AVC msg=audit(1163776289.283:12718): avc: denied { rename } for pid=8303 comm="yum" name="nautilus-sendto.1.gz;455dcb57" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163776289.283:12718): avc: denied { unlink } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331547 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.283:12718): arch=40000003 syscall=38 success=yes exit=0 a0=f9e4978 a1=fb43ab8 a2=d2a040 a3=f9e4978 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.295:12719): avc: denied { relabelfrom } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:man_t:s0 tclass=file type=AVC msg=audit(1163776289.295:12719): avc: denied { relabelto } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.295:12719): arch=40000003 syscall=227 success=yes exit=0 a0=fb43ab8 a1=a2f0d3 a2=f9c7428 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776289.295:12720): avc: denied { setattr } for pid=8303 comm="yum" name="nautilus-sendto.1.gz" dev=dm-0 ino=10331542 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:man_t:s0 tclass=file type=SYSCALL msg=audit(1163776289.295:12720): arch=40000003 syscall=212 success=yes exit=0 a0=fb43ab8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776290.935:12721): avc: denied { ptrace } for pid=13172 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163776290.935:12721): arch=40000003 syscall=195 success=yes exit=0 a0=9d6d088 a1=bfde8614 a2=d8aff4 a3=bfde798c items=0 ppid=13171 pid=13172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776290.935:12722): avc: denied { ptrace } for pid=13172 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163776290.935:12722): arch=40000003 syscall=195 success=yes exit=0 a0=9d6d088 a1=bfde8614 a2=d8aff4 a3=bfde798c items=0 ppid=13171 pid=13172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776290.943:12723): avc: denied { ptrace } for pid=13172 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163776290.943:12723): arch=40000003 syscall=195 success=yes exit=0 a0=9d6d088 a1=bfde8614 a2=d8aff4 a3=bfde798c items=0 ppid=13171 pid=13172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776296.688:12724): avc: denied { execute } for pid=13174 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776296.688:12724): avc: denied { execute_no_trans } for pid=13174 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776296.688:12724): avc: denied { read } for pid=13174 comm="sh" name="ldconfig" dev=dm-0 ino=9984490 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776296.688:12724): arch=40000003 syscall=11 success=yes exit=0 a0=87a4c70 a1=87a4e00 a2=87a4cf0 a3=87a4120 items=0 ppid=13173 pid=13174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="ldconfig" exe="/sbin/ldconfig" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776296.688:12724): path="/sbin/ldconfig" type=AVC_PATH msg=audit(1163776296.688:12724): path="/sbin/ldconfig" type=AVC msg=audit(1163776297.520:12725): avc: denied { write } for pid=13178 comm="update-desktop-" name="applications" dev=dm-0 ino=10936389 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=AVC msg=audit(1163776297.520:12725): avc: denied { add_name } for pid=13178 comm="update-desktop-" name=".mimeinfo.cache.GETUIT" scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776297.520:12725): arch=40000003 syscall=5 success=yes exit=3 a0=9803e20 a1=80c2 a2=180 a3=80c2 items=0 ppid=13173 pid=13178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.524:12726): avc: denied { remove_name } for pid=13178 comm="update-desktop-" name=".mimeinfo.cache.GETUIT" dev=dm-0 ino=10935284 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776297.524:12726): arch=40000003 syscall=38 success=yes exit=0 a0=9803e20 a1=9804ba8 a2=1a4 a3=980115c items=0 ppid=13173 pid=13178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="update-desktop-" exe="/usr/bin/update-desktop-database" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.716:12727): avc: denied { append } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper.log" dev=dm-0 ino=14436937 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.716:12727): arch=40000003 syscall=5 success=yes exit=3 a0=87c5d0 a1=441 a2=1b6 a3=9de1638 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.760:12728): avc: denied { write } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper" dev=dm-0 ino=14567773 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163776297.760:12728): avc: denied { add_name } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163776297.760:12728): avc: denied { create } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.760:12728): arch=40000003 syscall=5 success=yes exit=4 a0=bf8146a3 a1=241 a2=1b6 a3=9e1bcf8 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.784:12729): avc: denied { write } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567669 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.784:12729): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=b7f70000 a2=1000 a3=1000 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776297.784:12729): path="/var/lib/scrollkeeper/scrollkeeper_docs.tmp" type=AVC msg=audit(1163776297.788:12730): avc: denied { remove_name } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567553 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=dir type=AVC msg=audit(1163776297.788:12730): avc: denied { unlink } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567553 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.788:12730): arch=40000003 syscall=10 success=yes exit=0 a0=bf8145a3 a1=1 a2=87e338 a3=bf8147c3 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.796:12731): avc: denied { rename } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14567669 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.796:12731): arch=40000003 syscall=38 success=yes exit=0 a0=bf8146a3 a1=bf8145a3 a2=87e338 a3=bf8147c3 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776297.944:12732): avc: denied { append } for pid=13179 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567669 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776297.944:12732): arch=40000003 syscall=5 success=yes exit=3 a0=bf8142c8 a1=441 a2=1b6 a3=9de2320 items=0 ppid=13173 pid=13179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.553:12733): avc: denied { relabelto } for pid=8303 comm="yum" name="file-roller" dev=dm-0 ino=12343447 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.553:12733): arch=40000003 syscall=227 success=yes exit=0 a0=fb40618 a1=a2f0d3 a2=fa942a8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.553:12734): avc: denied { setattr } for pid=8303 comm="yum" name="file-roller" dev=dm-0 ino=12343447 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.553:12734): arch=40000003 syscall=212 success=yes exit=0 a0=fb40618 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.581:12735): avc: denied { create } for pid=8303 comm="yum" name="file-roller-2.17.2" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.581:12735): arch=40000003 syscall=39 success=yes exit=0 a0=fa93118 a1=1c0 a2=d2a040 a3=fa93118 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776313.585:12736): avc: denied { relabelfrom } for pid=8303 comm="yum" name="file-roller-2.17.2" dev=dm-0 ino=12343560 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163776313.585:12736): arch=40000003 syscall=227 success=yes exit=0 a0=fa93118 a1=a2f0d3 a2=fa92ff0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776314.381:12737): avc: denied { create } for pid=8303 comm="yum" name="file-roller.mo;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.381:12737): arch=40000003 syscall=5 success=yes exit=30 a0=faa23d0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776314.381:12738): avc: denied { write } for pid=8303 comm="yum" name="file-roller.mo;455dcb57" dev=dm-0 ino=10327037 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.381:12738): arch=40000003 syscall=4 success=yes exit=4015 a0=1e a1=b6dcb000 a2=faf a3=faaaaf8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776314.381:12738): path="/usr/share/locale/am/LC_MESSAGES/file-roller.mo;455dcb57" type=AVC msg=audit(1163776314.381:12739): avc: denied { rename } for pid=8303 comm="yum" name="file-roller.mo;455dcb57" dev=dm-0 ino=10327037 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.381:12739): arch=40000003 syscall=38 success=yes exit=0 a0=faa23d0 a1=fa95f90 a2=d2a040 a3=faa23d0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776314.397:12740): avc: denied { relabelfrom } for pid=8303 comm="yum" name="file-roller.mo" dev=dm-0 ino=10327037 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163776314.397:12740): arch=40000003 syscall=227 success=yes exit=0 a0=fa95f90 a1=a2f0d3 a2=fb0e208 a3=1e items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776321.953:12741): avc: denied { relabelfrom } for pid=8303 comm="yum" name="program" dev=dm-0 ino=12179293 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=dir type=SYSCALL msg=audit(1163776321.953:12741): arch=40000003 syscall=227 success=yes exit=0 a0=fa92168 a1=a2f0d3 a2=fb15500 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776346.791:12742): avc: denied { read } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776346.791:12742): arch=40000003 syscall=3 success=yes exit=59 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776346.791:12742): path="/dev/net/tun" type=AVC msg=audit(1163776346.839:12743): avc: denied { write } for pid=8137 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776346.839:12743): arch=40000003 syscall=4 success=yes exit=127 a0=4 a1=805c570 a2=7f a3=bfa20a54 items=0 ppid=8135 pid=8137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776346.839:12743): path="/dev/net/tun" type=AVC msg=audit(1163776347.947:12744): avc: denied { write } for pid=13312 comm="gconftool-2" name="gconf.xml.defaults" dev=dm-0 ino=9330097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776347.947:12744): avc: denied { add_name } for pid=13312 comm="gconftool-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776347.947:12744): arch=40000003 syscall=5 success=yes exit=3 a0=80b2ce0 a1=41 a2=1c0 a3=80b2ce0 items=0 ppid=13309 pid=13312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776347.947:12745): avc: denied { remove_name } for pid=13312 comm="gconftool-2" name=".testing.writeability" dev=dm-0 ino=9330048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776347.947:12745): arch=40000003 syscall=10 success=yes exit=0 a0=80b2ce0 a1=41 a2=412708 a3=80b2ce0 items=0 ppid=13309 pid=13312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.943:12746): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.943:12746): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b0a0 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.943:12747): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.943:12747): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.947:12748): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.947:12748): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.947:12749): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.947:12749): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776350.951:12750): avc: denied { ptrace } for pid=13314 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_t:s0 tclass=process type=SYSCALL msg=audit(1163776350.951:12750): arch=40000003 syscall=195 success=yes exit=0 a0=9f6b088 a1=bf8890b4 a2=3b8ff4 a3=bf88842c items=0 ppid=13312 pid=13314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776354.243:12751): avc: denied { append } for pid=8303 comm="yum" name="yum.log" dev=dm-0 ino=8707846 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:rpm_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776354.243:12751): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=b7bd1000 a2=34 a3=34 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776354.243:12751): path="/var/log/yum.log" type=AVC msg=audit(1163776357.444:12752): avc: denied { ptrace } for pid=13368 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163776357.444:12752): arch=40000003 syscall=195 success=yes exit=0 a0=8ac1088 a1=bf970994 a2=364ff4 a3=bf96fd0c items=0 ppid=13367 pid=13368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.444:12753): avc: denied { ptrace } for pid=13368 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163776357.444:12753): arch=40000003 syscall=195 success=yes exit=0 a0=8ac1088 a1=bf970994 a2=364ff4 a3=bf96fd0c items=0 ppid=13367 pid=13368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.452:12754): avc: denied { ptrace } for pid=13368 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163776357.452:12754): arch=40000003 syscall=195 success=no exit=-2 a0=8ac1088 a1=bf970994 a2=364ff4 a3=bf96fd0c items=0 ppid=13367 pid=13368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.620:12755): avc: denied { write } for pid=8303 comm="yum" name="servers" dev=dm-0 ino=10443133 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776357.620:12755): avc: denied { add_name } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776357.620:12755): avc: denied { create } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.620:12755): arch=40000003 syscall=5 success=yes exit=30 a0=f928fe8 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.620:12756): avc: denied { write } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.620:12756): arch=40000003 syscall=4 success=yes exit=507 a0=1e a1=b6dcb000 a2=1fb a3=f929178 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776357.620:12756): path="/usr/lib/bonobo/servers/GNOME_RemoteDesktop.server;455dcb57" type=AVC msg=audit(1163776357.624:12757): avc: denied { remove_name } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776357.624:12757): avc: denied { rename } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server;455dcb57" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776357.624:12757): avc: denied { unlink } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=10446189 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.624:12757): arch=40000003 syscall=38 success=yes exit=0 a0=f928fe8 a1=fbbfa10 a2=d2a040 a3=f928fe8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.644:12758): avc: denied { relabelfrom } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776357.644:12758): avc: denied { relabelto } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.644:12758): arch=40000003 syscall=227 success=yes exit=0 a0=fbbfa10 a1=a2f0d3 a2=b700d48 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776357.644:12759): avc: denied { setattr } for pid=8303 comm="yum" name="GNOME_RemoteDesktop.server" dev=dm-0 ino=18103017 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776357.644:12759): arch=40000003 syscall=212 success=yes exit=0 a0=fbbfa10 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776362.156:12760): avc: denied { ptrace } for pid=13373 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163776362.156:12760): arch=40000003 syscall=195 success=yes exit=0 a0=9977088 a1=bfca9cd4 a2=ef4ff4 a3=bfca904c items=0 ppid=13371 pid=13373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.224:12761): avc: denied { write } for pid=8303 comm="yum" name="system.d" dev=dm-0 ino=9330036 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.224:12761): avc: denied { add_name } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.224:12761): avc: denied { create } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.224:12761): arch=40000003 syscall=5 success=yes exit=30 a0=faa7098 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.248:12762): avc: denied { write } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.248:12762): arch=40000003 syscall=4 success=yes exit=783 a0=1e a1=b6dcb000 a2=30f a3=fb0b740 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776366.248:12762): path="/etc/dbus-1/system.d/printdriverselector.conf;455dcb57" type=AVC msg=audit(1163776366.248:12763): avc: denied { remove_name } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.248:12763): avc: denied { rename } for pid=8303 comm="yum" name="printdriverselector.conf;455dcb57" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163776366.248:12763): avc: denied { unlink } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331681 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.248:12763): arch=40000003 syscall=38 success=yes exit=0 a0=faa7098 a1=fac6400 a2=d2a040 a3=faa7098 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.256:12764): avc: denied { relabelfrom } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:dbusd_etc_t:s0 tclass=file type=AVC msg=audit(1163776366.256:12764): avc: denied { relabelto } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.256:12764): arch=40000003 syscall=227 success=yes exit=0 a0=fac6400 a1=a2f0d3 a2=b033890 a3=21 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.256:12765): avc: denied { setattr } for pid=8303 comm="yum" name="printdriverselector.conf" dev=dm-0 ino=9331097 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dbusd_etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776366.256:12765): arch=40000003 syscall=212 success=yes exit=0 a0=fac6400 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.260:12766): avc: denied { relabelfrom } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776366.260:12766): avc: denied { relabelto } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776366.260:12766): arch=40000003 syscall=227 success=yes exit=0 a0=f928380 a1=a2f0d3 a2=fa92f60 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.260:12767): avc: denied { setattr } for pid=8303 comm="yum" name="schemas" dev=dm-0 ino=9330176 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776366.260:12767): arch=40000003 syscall=212 success=yes exit=0 a0=f928380 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776366.272:12768): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163776366.272:12768): arch=40000003 syscall=100 success=yes exit=0 a0=12 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776372.853:12769): avc: denied { ptrace } for pid=13382 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163776372.853:12769): arch=40000003 syscall=195 success=yes exit=0 a0=9ae8088 a1=bfade7a4 a2=24bff4 a3=bfaddb1c items=0 ppid=13381 pid=13382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776372.857:12770): avc: denied { ptrace } for pid=13382 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163776372.857:12770): arch=40000003 syscall=195 success=yes exit=0 a0=9ae8088 a1=bfade7a4 a2=24bff4 a3=bfaddb1c items=0 ppid=13381 pid=13382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776387.505:12771): avc: denied { write } for pid=13401 comm="gnome-backgroun" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776387.505:12771): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf98f200 a2=254770 a3=15 items=0 ppid=1 pid=13401 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776387.505:12772): avc: denied { read } for pid=13401 comm="gnome-backgroun" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776387.505:12772): arch=40000003 syscall=33 success=yes exit=0 a0=99afcd8 a1=4 a2=254770 a3=99afcd8 items=0 ppid=1 pid=13401 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776389.002:12773): avc: denied { ptrace } for pid=13408 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776389.002:12773): arch=40000003 syscall=195 success=yes exit=0 a0=805f088 a1=bf862874 a2=dbcff4 a3=bf861bec items=0 ppid=13399 pid=13408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776389.002:12774): avc: denied { sys_ptrace } for pid=13408 comm="killall" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776389.002:12774): arch=40000003 syscall=195 success=yes exit=0 a0=805f088 a1=bf862874 a2=dbcff4 a3=bf861bec items=0 ppid=13399 pid=13408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776389.006:12775): avc: denied { kill } for pid=13408 comm="killall" capability=5 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776389.006:12775): arch=40000003 syscall=37 success=yes exit=0 a0=345b a1=f a2=0 a3=345b items=0 ppid=13399 pid=13408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776391.938:12776): avc: denied { unlink } for pid=8303 comm="yum" name="blackjack" dev=dm-0 ino=10326957 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776391.938:12776): arch=40000003 syscall=38 success=yes exit=0 a0=fb09ff8 a1=f99df40 a2=d2a040 a3=fb09ff8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776391.990:12777): avc: denied { relabelto } for pid=8303 comm="yum" name="blackjack" dev=dm-0 ino=10331034 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776391.990:12777): arch=40000003 syscall=227 success=yes exit=0 a0=f99df40 a1=a2f0d3 a2=fbbfa30 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776391.990:12778): avc: denied { setattr } for pid=8303 comm="yum" name="blackjack" dev=dm-0 ino=10331034 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776391.990:12778): arch=40000003 syscall=212 success=yes exit=0 a0=f99df40 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776392.402:12779): avc: denied { create } for pid=8303 comm="yum" name="glchess" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776392.402:12779): arch=40000003 syscall=39 success=yes exit=0 a0=b50e4d8 a1=1c0 a2=d2a040 a3=b50e4d8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776392.402:12780): avc: denied { relabelfrom } for pid=8303 comm="yum" name="glchess" dev=dm-0 ino=12343648 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163776392.402:12780): avc: denied { relabelto } for pid=8303 comm="yum" name="glchess" dev=dm-0 ino=12343648 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776392.402:12780): arch=40000003 syscall=227 success=yes exit=0 a0=b50e4d8 a1=a2f0d3 a2=fc50df8 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776392.402:12781): avc: denied { setattr } for pid=8303 comm="yum" name="glchess" dev=dm-0 ino=12343648 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163776392.402:12781): arch=40000003 syscall=212 success=yes exit=0 a0=b50e4d8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776393.742:12782): avc: denied { read } for pid=13464 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776393.742:12782): arch=40000003 syscall=33 success=yes exit=0 a0=bf800fcb a1=4 a2=da3a64 a3=bf800fcb items=0 ppid=1 pid=13464 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163776393.742:12783): avc: denied { getattr } for pid=13464 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776393.742:12783): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf7fec1c a2=d94ff4 a3=9546140 items=0 ppid=1 pid=13464 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163776393.742:12783): path="/tmp/.gdmV8RYIT" type=AVC msg=audit(1163776406.931:12784): avc: denied { write } for pid=8303 comm="yum" name="games" dev=dm-0 ino=14436607 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163776406.931:12784): avc: denied { add_name } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163776406.931:12784): avc: denied { create } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.931:12784): arch=40000003 syscall=5 success=yes exit=30 a0=fc58818 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.971:12785): avc: denied { remove_name } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=dir type=AVC msg=audit(1163776406.971:12785): avc: denied { rename } for pid=8303 comm="yum" name="glines.Large.scores;455dcb57" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:games_data_t:s0 tclass=file type=AVC msg=audit(1163776406.971:12785): avc: denied { unlink } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14436943 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.971:12785): arch=40000003 syscall=38 success=yes exit=0 a0=fc58818 a1=fc588e8 a2=d2a040 a3=fc58818 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.975:12786): avc: denied { relabelfrom } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:games_data_t:s0 tclass=file type=AVC msg=audit(1163776406.975:12786): avc: denied { relabelto } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.975:12786): arch=40000003 syscall=227 success=yes exit=0 a0=fc588e8 a1=a2f0d3 a2=fc5a588 a3=22 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.975:12787): avc: denied { setattr } for pid=8303 comm="yum" name="glines.Large.scores" dev=dm-0 ino=14438005 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.975:12787): arch=40000003 syscall=212 success=yes exit=0 a0=fc588e8 a1=c a2=14 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776406.975:12788): avc: denied { unlink } for pid=8303 comm="yum" name="glines.Medium.scores" dev=dm-0 ino=14437124 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:games_data_t:s0 tclass=file type=SYSCALL msg=audit(1163776406.975:12788): arch=40000003 syscall=38 success=yes exit=0 a0=fc5a600 a1=fc5a588 a2=d2a040 a3=fc5a600 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.060:12789): avc: denied { create } for pid=13541 comm="scrollkeeper-up" name="553" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.060:12789): arch=40000003 syscall=5 success=yes exit=3 a0=92ac138 a1=241 a2=1b6 a3=920fd20 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.064:12790): avc: denied { write } for pid=13541 comm="scrollkeeper-up" name="553" dev=dm-0 ino=14567911 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.064:12790): arch=40000003 syscall=4 success=yes exit=808 a0=3 a1=b7f76000 a2=328 a3=328 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776421.064:12790): path="/var/lib/scrollkeeper/TOC/553" type=AVC msg=audit(1163776421.124:12791): avc: denied { unlink } for pid=13541 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14567910 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.124:12791): arch=40000003 syscall=10 success=yes exit=0 a0=bfe62443 a1=1 a2=50c338 a3=bfe62663 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.124:12792): avc: denied { rename } for pid=13541 comm="scrollkeeper-up" name="scrollkeeper_docs.tmp" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.124:12792): arch=40000003 syscall=38 success=yes exit=0 a0=bfe62543 a1=bfe62443 a2=50c338 a3=bfe62663 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776421.152:12793): avc: denied { append } for pid=13541 comm="scrollkeeper-up" name="scrollkeeper_docs" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776421.152:12793): arch=40000003 syscall=5 success=yes exit=3 a0=bfe62168 a1=441 a2=1b6 a3=920fd20 items=0 ppid=13540 pid=13541 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="scrollkeeper-up" exe="/usr/bin/scrollkeeper-update" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776422.896:12794): avc: denied { create } for pid=13617 comm="gconftool-2" name=".testing.writeability" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776422.896:12794): arch=40000003 syscall=5 success=yes exit=3 a0=966e1a8 a1=41 a2=1c0 a3=966e1a8 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776422.896:12795): avc: denied { unlink } for pid=13617 comm="gconftool-2" name=".testing.writeability" dev=dm-0 ino=9331998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776422.896:12795): arch=40000003 syscall=10 success=yes exit=0 a0=966e1a8 a1=41 a2=412708 a3=966e1a8 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.956:12796): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776425.956:12796): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.956:12797): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.956:12797): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.956:12798): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.956:12798): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12799): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12799): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12800): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12800): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12801): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12801): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12802): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163776425.960:12802): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776425.960:12803): avc: denied { ptrace } for pid=13619 comm="killall" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163776425.960:12803): arch=40000003 syscall=195 success=yes exit=0 a0=8a24088 a1=bfffa804 a2=3b1ff4 a3=bfff9b7c items=0 ppid=13617 pid=13619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="killall" exe="/usr/bin/killall" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776426.020:12804): avc: denied { write } for pid=13617 comm="gconftool-2" name="%gconf-tree.xml.new" dev=dm-0 ino=9331998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776426.020:12804): arch=40000003 syscall=4 success=yes exit=4096 a0=3 a1=b7fec000 a2=1000 a3=1000 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776426.020:12804): path="/etc/gconf/gconf.xml.defaults/%gconf-tree.xml.new" type=AVC msg=audit(1163776426.144:12805): avc: denied { rename } for pid=13617 comm="gconftool-2" name="%gconf-tree.xml.new" dev=dm-0 ino=9331998 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776426.144:12805): arch=40000003 syscall=38 success=yes exit=0 a0=b38d1c8 a1=b38b750 a2=122820 a3=0 items=0 ppid=13616 pid=13617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="gconftool-2" exe="/usr/bin/gconftool-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.552:12806): avc: denied { write } for pid=13623 comm="cp" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.552:12806): avc: denied { add_name } for pid=13623 comm="cp" name="file_contexts.pre" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.552:12806): avc: denied { create } for pid=13623 comm="cp" name="file_contexts.pre" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.552:12806): arch=40000003 syscall=5 success=yes exit=4 a0=bfab7bd7 a1=8041 a2=81a4 a3=8041 items=0 ppid=13622 pid=13623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.572:12807): avc: denied { write } for pid=13623 comm="cp" name="file_contexts.pre" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.572:12807): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=bfab4000 a2=1000 a3=1000 items=0 ppid=13622 pid=13623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="cp" exe="/bin/cp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776431.572:12807): path="/etc/selinux/strict/contexts/files/file_contexts.pre" type=AVC msg=audit(1163776431.580:12808): avc: denied { relabelfrom } for pid=8303 comm="yum" name="strict" dev=dm-0 ino=9331930 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.580:12808): avc: denied { relabelto } for pid=8303 comm="yum" name="strict" dev=dm-0 ino=9331930 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.580:12808): arch=40000003 syscall=227 success=yes exit=0 a0=f99e4c8 a1=a2f0d3 a2=faf3e68 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.624:12809): avc: denied { setattr } for pid=8303 comm="yum" name="strict" dev=dm-0 ino=9331930 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.624:12809): arch=40000003 syscall=212 success=yes exit=0 a0=f99e4c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.624:12810): avc: denied { relabelfrom } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.624:12810): avc: denied { relabelto } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.624:12810): arch=40000003 syscall=227 success=yes exit=0 a0=fc5a5b0 a1=a2f0d3 a2=faeaea8 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12811): avc: denied { setattr } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.628:12811): arch=40000003 syscall=212 success=yes exit=0 a0=fc5a5b0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12812): avc: denied { write } for pid=8303 comm="yum" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.628:12812): avc: denied { add_name } for pid=8303 comm="yum" name="customizable_types;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.628:12812): avc: denied { create } for pid=8303 comm="yum" name="customizable_types;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12812): arch=40000003 syscall=5 success=yes exit=30 a0=fb96de0 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12813): avc: denied { write } for pid=8303 comm="yum" name="customizable_types;455dcb57" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12813): arch=40000003 syscall=4 success=yes exit=233 a0=1e a1=b6dcb000 a2=e9 a3=fb96e20 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776431.628:12813): path="/etc/selinux/strict/contexts/customizable_types;455dcb57" type=AVC msg=audit(1163776431.628:12814): avc: denied { remove_name } for pid=8303 comm="yum" name="customizable_types;455dcb57" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.628:12814): avc: denied { rename } for pid=8303 comm="yum" name="customizable_types;455dcb57" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=AVC msg=audit(1163776431.628:12814): avc: denied { unlink } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334401 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12814): arch=40000003 syscall=38 success=yes exit=0 a0=fb96de0 a1=faa64f8 a2=d2a040 a3=fb96de0 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12815): avc: denied { relabelfrom } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=AVC msg=audit(1163776431.628:12815): avc: denied { relabelto } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12815): arch=40000003 syscall=227 success=yes exit=0 a0=faa64f8 a1=a2f0d3 a2=faeaea8 a3=27 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.628:12816): avc: denied { setattr } for pid=8303 comm="yum" name="customizable_types" dev=dm-0 ino=9334567 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.628:12816): arch=40000003 syscall=212 success=yes exit=0 a0=faa64f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12817): avc: denied { relabelfrom } for pid=8303 comm="yum" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.640:12817): avc: denied { relabelto } for pid=8303 comm="yum" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.640:12817): arch=40000003 syscall=227 success=yes exit=0 a0=fb96fa0 a1=a2f0d3 a2=fc5a5d8 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12818): avc: denied { setattr } for pid=8303 comm="yum" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.640:12818): arch=40000003 syscall=212 success=yes exit=0 a0=fb96fa0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12819): avc: denied { remove_name } for pid=8303 comm="yum" name="media;455dcb57" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776431.640:12819): avc: denied { rename } for pid=8303 comm="yum" name="media;455dcb57" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=AVC msg=audit(1163776431.640:12819): avc: denied { unlink } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334528 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.640:12819): arch=40000003 syscall=38 success=yes exit=0 a0=f78a080 a1=fb96db0 a2=d2a040 a3=f78a080 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12820): avc: denied { relabelfrom } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=AVC msg=audit(1163776431.640:12820): avc: denied { relabelto } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.640:12820): arch=40000003 syscall=227 success=yes exit=0 a0=fb96db0 a1=a2f0d3 a2=fc5a5d8 a3=24 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.640:12821): avc: denied { setattr } for pid=8303 comm="yum" name="media" dev=dm-0 ino=9334434 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.640:12821): arch=40000003 syscall=212 success=yes exit=0 a0=fb96db0 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12822): avc: denied { relabelfrom } for pid=8303 comm="yum" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12822): avc: denied { relabelto } for pid=8303 comm="yum" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.664:12822): arch=40000003 syscall=227 success=yes exit=0 a0=f78a080 a1=a2f0d3 a2=cb51b80 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12823): avc: denied { setattr } for pid=8303 comm="yum" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.664:12823): arch=40000003 syscall=212 success=yes exit=0 a0=f78a080 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12824): avc: denied { write } for pid=8303 comm="yum" name="modules" dev=dm-0 ino=9334534 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12824): avc: denied { add_name } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12824): avc: denied { create } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.664:12824): arch=40000003 syscall=5 success=yes exit=30 a0=fb91c18 a1=8241 a2=1b6 a3=8241 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.664:12825): avc: denied { remove_name } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.664:12825): avc: denied { rename } for pid=8303 comm="yum" name="semanage.read.LOCK;455dcb57" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163776431.664:12825): avc: denied { unlink } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.664:12825): arch=40000003 syscall=38 success=yes exit=0 a0=fb91c18 a1=fb915c8 a2=d2a040 a3=fb91c18 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.668:12826): avc: denied { relabelfrom } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=AVC msg=audit(1163776431.668:12826): avc: denied { relabelto } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.668:12826): arch=40000003 syscall=227 success=yes exit=0 a0=fb915c8 a1=a2f0d3 a2=cb56428 a3=2a items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.668:12827): avc: denied { setattr } for pid=8303 comm="yum" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.668:12827): arch=40000003 syscall=212 success=yes exit=0 a0=fb915c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.668:12828): avc: denied { unlink } for pid=8303 comm="yum" name="semanage.trans.LOCK" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.668:12828): arch=40000003 syscall=38 success=yes exit=0 a0=fc75d08 a1=fb915c8 a2=d2a040 a3=fc75d08 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.676:12829): avc: denied { relabelto } for pid=8303 comm="yum" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.676:12829): arch=40000003 syscall=227 success=yes exit=0 a0=fb915c8 a1=a2f0d3 a2=fc75cd8 a3=2b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.676:12830): avc: denied { setattr } for pid=8303 comm="yum" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.676:12830): arch=40000003 syscall=212 success=yes exit=0 a0=fb915c8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12831): avc: denied { relabelfrom } for pid=8303 comm="yum" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776431.688:12831): avc: denied { relabelto } for pid=8303 comm="yum" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.688:12831): arch=40000003 syscall=227 success=yes exit=0 a0=fc785f8 a1=a2f0d3 a2=fc785c8 a3=25 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12832): avc: denied { setattr } for pid=8303 comm="yum" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776431.688:12832): arch=40000003 syscall=212 success=yes exit=0 a0=fc785f8 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12833): avc: denied { write } for pid=8303 comm="yum" name="setrans.conf;455dcb57" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12833): arch=40000003 syscall=4 success=yes exit=598 a0=1e a1=b6dcb000 a2=256 a3=fc79e88 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776431.688:12833): path="/etc/selinux/strict/setrans.conf;455dcb57" type=AVC msg=audit(1163776431.688:12834): avc: denied { unlink } for pid=8303 comm="yum" name="setrans.conf" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12834): arch=40000003 syscall=38 success=yes exit=0 a0=fc785c8 a1=fc79e60 a2=d2a040 a3=fc785c8 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12835): avc: denied { relabelto } for pid=8303 comm="yum" name="setrans.conf" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12835): arch=40000003 syscall=227 success=yes exit=0 a0=fc79e60 a1=a2f0d3 a2=fc75ca8 a3=26 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776431.688:12836): avc: denied { setattr } for pid=8303 comm="yum" name="setrans.conf" dev=dm-0 ino=9334537 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776431.688:12836): arch=40000003 syscall=212 success=yes exit=0 a0=fc79e60 a1=0 a2=0 a3=6028 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12837): avc: denied { create } for pid=8303 comm="yum" name="include;455dcb57" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12837): arch=40000003 syscall=83 success=yes exit=0 a0=fc5b370 a1=cb50098 a2=508a38 a3=602c items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12838): avc: denied { rename } for pid=8303 comm="yum" name="include;455dcb57" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163776432.620:12838): avc: denied { unlink } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982840 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12838): arch=40000003 syscall=38 success=yes exit=0 a0=cb50098 a1=fc7fb30 a2=d2a040 a3=cb50098 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12839): avc: denied { relabelfrom } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:usr_t:s0 tclass=lnk_file type=AVC msg=audit(1163776432.620:12839): avc: denied { relabelto } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12839): arch=40000003 syscall=227 success=yes exit=0 a0=fc7fb30 a1=a2f0d3 a2=fc7fff0 a3=1b items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776432.620:12840): avc: denied { setattr } for pid=8303 comm="yum" name="include" dev=dm-0 ino=11982828 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776432.620:12840): arch=40000003 syscall=198 success=yes exit=0 a0=fc7fb30 a1=0 a2=0 a3=a1f7554 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.513:12841): avc: denied { execute } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.513:12841): arch=40000003 syscall=33 success=yes exit=0 a0=963cd40 a1=1 a2=11 a3=963cd40 items=0 ppid=13624 pid=13625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.513:12842): avc: denied { read } for pid=13625 comm="sh" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.513:12842): arch=40000003 syscall=33 success=yes exit=0 a0=963cd40 a1=4 a2=ffffffff a3=963cd40 items=0 ppid=13624 pid=13625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="sh" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.513:12843): avc: denied { execute_no_trans } for pid=13626 comm="sh" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.513:12843): arch=40000003 syscall=11 success=yes exit=0 a0=963cd40 a1=963dcc8 a2=963f410 a3=9637b48 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776437.513:12843): path="/usr/sbin/semodule" type=AVC msg=audit(1163776437.553:12844): avc: denied { execute } for pid=13626 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.553:12844): arch=40000003 syscall=33 success=yes exit=0 a0=c75905 a1=1 a2=c7b21c a3=9988f00 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.605:12845): avc: denied { read write search } for pid=13626 comm="semodule" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.605:12845): arch=40000003 syscall=33 success=yes exit=0 a0=9989578 a1=7 a2=c7b21c a3=9989578 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12846): avc: denied { read write search } for pid=13626 comm="semodule" name="modules" dev=dm-0 ino=9334945 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.625:12846): arch=40000003 syscall=33 success=yes exit=0 a0=99895a0 a1=7 a2=c7b21c a3=99895a0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12847): avc: denied { read write } for pid=13626 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.625:12847): arch=40000003 syscall=33 success=yes exit=0 a0=9989500 a1=6 a2=c7b21c a3=9989500 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12848): avc: denied { read } for pid=13626 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.625:12848): arch=40000003 syscall=5 success=yes exit=3 a0=9989020 a1=0 a2=24d120 a3=9988dd0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.625:12849): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.625:12849): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=c7b21c a3=5 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776437.625:12849): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163776437.625:12850): avc: denied { create } for pid=13626 comm="semodule" name="tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.625:12850): arch=40000003 syscall=39 success=yes exit=0 a0=998de60 a1=1c0 a2=c7b21c a3=998de60 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.637:12851): avc: denied { read } for pid=13626 comm="semodule" name="base.linked" dev=dm-0 ino=9334715 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163776437.637:12851): arch=40000003 syscall=5 success=yes exit=4 a0=bfe11248 a1=0 a2=1 a3=81a4 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.637:12852): avc: denied { write } for pid=13626 comm="semodule" name="tmp" dev=dm-0 ino=9395239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163776437.637:12852): avc: denied { add_name } for pid=13626 comm="semodule" name="base.linked.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.637:12852): arch=40000003 syscall=5 success=yes exit=5 a0=bfe0f198 a1=241 a2=81a4 a3=81a4 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776437.941:12853): avc: denied { remove_name } for pid=13626 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9395240 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776437.941:12853): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0f198 a1=bfe10248 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776446.341:12854): avc: denied { read } for pid=13628 comm="gnome-backgroun" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776446.341:12854): arch=40000003 syscall=33 success=yes exit=0 a0=bfdbde42 a1=4 a2=da3a64 a3=bfdbde42 items=0 ppid=1 pid=13628 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776446.349:12855): avc: denied { read } for pid=13628 comm="gnome-backgroun" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776446.349:12855): arch=40000003 syscall=33 success=yes exit=0 a0=9f23cd8 a1=4 a2=df7770 a3=9f23cd8 items=0 ppid=1 pid=13628 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.069:12856): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.069:12856): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=6 a2=c7b21c a3=5 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776448.069:12856): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163776448.089:12857): avc: denied { remove_name } for pid=13626 comm="semodule" name="base.linked" dev=dm-0 ino=9334718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163776448.089:12857): avc: denied { unlink } for pid=13626 comm="semodule" name="base.linked" dev=dm-0 ino=9334718 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.089:12857): arch=40000003 syscall=10 success=yes exit=0 a0=bfe12099 a1=0 a2=24bff4 a3=bfe12099 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.497:12858): avc: denied { rmdir } for pid=13626 comm="semodule" name="modules" dev=dm-0 ino=9334726 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776448.497:12858): arch=40000003 syscall=40 success=yes exit=0 a0=bfe12099 a1=b7fa4688 a2=24bff4 a3=bfe12099 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.513:12859): avc: denied { rename } for pid=13626 comm="semodule" name="active" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163776448.513:12859): arch=40000003 syscall=38 success=yes exit=0 a0=9989578 a1=998d9d8 a2=c7b21c a3=bfe12248 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.513:12860): avc: denied { rename } for pid=13626 comm="semodule" name="tmp" dev=dm-0 ino=9395239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776448.513:12860): arch=40000003 syscall=38 success=yes exit=0 a0=998de60 a1=9989578 a2=c7b21c a3=bfe12248 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.513:12861): avc: denied { write } for pid=13626 comm="semodule" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776448.513:12861): avc: denied { add_name } for pid=13626 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776448.513:12861): avc: denied { create } for pid=13626 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.513:12861): arch=40000003 syscall=5 success=yes exit=6 a0=bfe0b058 a1=241 a2=1a4 a3=1a4 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.521:12862): avc: denied { write } for pid=13626 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.521:12862): arch=40000003 syscall=4 success=yes exit=4192 a0=6 a1=bfe09ff8 a2=1060 a3=1060 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776448.521:12862): path="/etc/selinux/strict/policy/policy.21.tmp" type=AVC msg=audit(1163776448.537:12863): avc: denied { remove_name } for pid=13626 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163776448.537:12863): avc: denied { rename } for pid=13626 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=AVC msg=audit(1163776448.537:12863): avc: denied { unlink } for pid=13626 comm="semodule" name="policy.21" dev=dm-0 ino=9330752 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.537:12863): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0e198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.593:12864): avc: denied { unlink } for pid=13626 comm="semodule" name="homedir_template" dev=dm-0 ino=9331333 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.593:12864): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0f198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.593:12865): avc: denied { unlink } for pid=13626 comm="semodule" name="seusers" dev=dm-0 ino=9334535 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.593:12865): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0d198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.665:12866): avc: denied { unlink } for pid=13626 comm="semodule" name="netfilter_contexts" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.665:12866): arch=40000003 syscall=38 success=yes exit=0 a0=bfe0b058 a1=bfe0c198 a2=c7b21c a3=0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.749:12867): avc: denied { execute } for pid=13658 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163776448.749:12867): avc: denied { execute_no_trans } for pid=13658 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163776448.749:12867): avc: denied { read } for pid=13658 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.749:12867): arch=40000003 syscall=11 success=yes exit=0 a0=9988f10 a1=dba7c68 a2=0 a3=0 items=0 ppid=13626 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776448.749:12867): path="/usr/sbin/load_policy" type=AVC_PATH msg=audit(1163776448.749:12867): path="/usr/sbin/load_policy" type=AVC msg=audit(1163776448.829:12868): avc: denied { read } for pid=13658 comm="load_policy" name="policy.21" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776448.829:12868): arch=40000003 syscall=5 success=yes exit=3 a0=bfb09148 a1=8000 a2=0 a3=8000 items=0 ppid=13626 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776448.949:12869): avc: denied { load_policy } for pid=13658 comm="load_policy" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=AVC msg=audit(1163776449.073:12870): avc: denied { read } for pid=13663 comm="gnome_segv2" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.073:12870): arch=40000003 syscall=33 success=yes exit=0 a0=bfe4de4e a1=4 a2=843a64 a3=bfe4de4e items=0 ppid=13662 pid=13663 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome_segv2" exe="/usr/libexec/gnome_segv2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=MAC_POLICY_LOAD msg=audit(1163776448.949:12869): policy loaded auid=500 type=AVC msg=audit(1163776449.089:12871): avc: denied { ptrace } for pid=3367 comm="dbus-daemon" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776449.089:12871): arch=40000003 syscall=85 success=yes exit=35 a0=a45fce a1=b7fd1b58 a2=fff a3=b7fd4eba items=0 ppid=1 pid=3367 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1163776448.949:12869): arch=40000003 syscall=4 success=yes exit=2109187 a0=4 a1=b7da3000 a2=202f03 a3=bfb08078 items=0 ppid=13626 pid=13658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776449.097:12872): user pid=8554 uid=0 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: received policyload notice (seqno=2) : exe="/bin/dbus-daemon" (sauid=0, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776449.109:12873): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=AVC msg=audit(1163776449.109:12874): avc: denied { execute } for pid=13665 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.109:12873): arch=40000003 syscall=100 success=yes exit=0 a0=13 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776449.109:12874): avc: denied { execute_no_trans } for pid=13665 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163776449.109:12874): avc: denied { read } for pid=13665 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.109:12874): arch=40000003 syscall=11 success=yes exit=0 a0=9988f40 a1=dbe0260 a2=0 a3=0 items=0 ppid=13626 pid=13665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776449.109:12874): path="/sbin/setfiles" type=AVC_PATH msg=audit(1163776449.109:12874): path="/sbin/setfiles" type=AVC msg=audit(1163776449.357:12875): avc: denied { read } for pid=13665 comm="setfiles" name="policy.21" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.357:12875): arch=40000003 syscall=5 success=yes exit=3 a0=bf81af97 a1=8000 a2=1b6 a3=8cad3e0 items=0 ppid=13626 pid=13665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776449.689:12876): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776449.689:12876): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=8 a2=c7b21c a3=9988dd0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776449.689:12876): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163776449.689:12877): avc: denied { search } for pid=8554 comm="dbus-daemon" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776449.689:12878): avc: denied { search } for pid=3366 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776449.689:12878): avc: denied { search } for pid=3366 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163776449.689:12878): arch=40000003 syscall=5 success=no exit=-2 a0=87ef658 a1=18800 a2=0 a3=bfaf9f38 items=0 ppid=1 pid=3366 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1163776449.689:12877): arch=40000003 syscall=5 success=no exit=-2 a0=9af01c0 a1=18800 a2=39e1d8 a3=bfcccb98 items=0 ppid=1 pid=8554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776450.389:12879): avc: denied { read } for pid=13676 comm="genhomedircon" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776450.389:12879): arch=40000003 syscall=33 success=yes exit=0 a0=8952d10 a1=4 a2=c7b21c a3=8952d10 items=0 ppid=13626 pid=13676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776450.389:12880): avc: denied { write } for pid=13676 comm="genhomedircon" name="modules" dev=dm-0 ino=9395255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163776450.389:12880): arch=40000003 syscall=33 success=yes exit=0 a0=8951598 a1=7 a2=c7b21c a3=8952d10 items=0 ppid=13626 pid=13676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776450.465:12881): avc: denied { write } for pid=13676 comm="genhomedircon" name="file_contexts.homedirs" dev=dm-0 ino=9334712 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776450.465:12881): arch=40000003 syscall=5 success=yes exit=3 a0=8966508 a1=8241 a2=1b6 a3=8966548 items=0 ppid=13626 pid=13676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776450.701:12882): avc: denied { lock } for pid=13626 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163776450.701:12882): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=8 a2=c7b21c a3=9988dd0 items=0 ppid=13625 pid=13626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776450.701:12882): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163776451.141:12883): avc: denied { write } for pid=13713 comm="mktemp" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776451.141:12883): avc: denied { add_name } for pid=13713 comm="mktemp" name="file_contexts.ProyZ13713" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776451.141:12883): avc: denied { create } for pid=13713 comm="mktemp" name="file_contexts.ProyZ13713" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.141:12883): arch=40000003 syscall=5 success=yes exit=3 a0=8bc8008 a1=c2 a2=180 a3=8bc8008 items=0 ppid=13695 pid=13713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="mktemp" exe="/bin/mktemp" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776451.229:12884): avc: denied { write } for pid=13716 comm="fixfiles" name="file_contexts.pre.rVudp13714" dev=dm-0 ino=9334541 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.229:12884): arch=40000003 syscall=5 success=yes exit=3 a0=95f59a8 a1=8241 a2=1b6 a3=8241 items=0 ppid=13695 pid=13716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="fixfiles" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776451.357:12885): avc: denied { execute } for pid=13732 comm="fixfiles" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=AVC msg=audit(1163776451.357:12885): avc: denied { execute_no_trans } for pid=13732 comm="fixfiles" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=AVC msg=audit(1163776451.357:12885): avc: denied { read } for pid=13732 comm="fixfiles" name="restorecon" dev=dm-0 ino=9984525 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:restorecon_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.357:12885): arch=40000003 syscall=11 success=yes exit=0 a0=95f5910 a1=95f5b88 a2=95ea7a0 a3=95f5808 items=0 ppid=13695 pid=13732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="restorecon" exe="/sbin/restorecon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776451.357:12885): path="/sbin/restorecon" type=AVC_PATH msg=audit(1163776451.357:12885): path="/sbin/restorecon" type=AVC msg=audit(1163776451.449:12886): avc: denied { append } for pid=13738 comm="fixfiles" name="file_contexts.ProyZ13713" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776451.449:12886): arch=40000003 syscall=5 success=yes exit=3 a0=95f5e38 a1=8441 a2=1b6 a3=8441 items=0 ppid=13730 pid=13738 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="fixfiles" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776459.950:12887): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776461.782:12888): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=deactivateVPNConnection dest=org.freedesktop.NetworkManager spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776461.782:12889): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776461.782:12890): avc: denied { net_admin } for pid=6687 comm="NetworkManager" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776461.782:12890): arch=40000003 syscall=102 success=yes exit=32 a0=10 a1=bfaf3350 a2=cd036c a3=0 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776461.806:12891): avc: denied { execute } for pid=13819 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776461.806:12891): avc: denied { execute_no_trans } for pid=13819 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776461.806:12891): avc: denied { read } for pid=13819 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.806:12891): arch=40000003 syscall=11 success=yes exit=0 a0=84fe3a8 a1=8502440 a2=bfaf4160 a3=400 items=0 ppid=6687 pid=13819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ip" exe="/sbin/ip" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776461.806:12891): path="/sbin/ip" type=AVC_PATH msg=audit(1163776461.806:12891): path="/sbin/ip" type=AVC msg=audit(1163776461.854:12892): avc: denied { write } for pid=6687 comm="NetworkManager" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776461.854:12892): avc: denied { add_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776461.854:12892): avc: denied { create } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.854:12892): arch=40000003 syscall=5 success=yes exit=14 a0=80892c8 a1=241 a2=1b6 a3=8503678 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776461.854:12893): avc: denied { write } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.854:12893): arch=40000003 syscall=4 success=yes exit=125 a0=e a1=b7fa1000 a2=7d a3=7d items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776461.854:12893): path="/etc/resolv.conf.tmp" type=AVC msg=audit(1163776461.854:12894): avc: denied { remove_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776461.854:12894): avc: denied { rename } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776461.854:12894): avc: denied { unlink } for pid=6687 comm="NetworkManager" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.854:12894): arch=40000003 syscall=38 success=yes exit=0 a0=80892c8 a1=8089313 a2=8094374 a3=808930e items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776461.970:12895): avc: denied { relabelfrom } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776461.970:12895): avc: denied { relabelto } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776461.970:12895): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=ba70d3 a2=8385568 a3=20 items=0 ppid=1 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.010:12896): avc: denied { create } for pid=6687 comm="NetworkManager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=AVC msg=audit(1163776463.010:12896): avc: denied { net_raw } for pid=6687 comm="NetworkManager" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776463.010:12896): arch=40000003 syscall=102 success=yes exit=14 a0=1 a1=bfaf32f0 a2=84fed00 a3=2 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.010:12897): avc: denied { ioctl } for pid=6687 comm="NetworkManager" name="[146272]" dev=sockfs ino=146272 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163776463.010:12897): arch=40000003 syscall=54 success=yes exit=0 a0=e a1=890b a2=bfaf33a4 a3=84fed00 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776463.010:12897): path="socket:[146272]" type=USER_AVC msg=audit(1163776463.022:12898): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=3866 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12899): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=stopConnection dest=org.freedesktop.NetworkManager.vpnc spid=6687 tpid=8135 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12900): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12901): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776463.022:12902): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=8135 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776463.050:12903): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163776463.050:12903): arch=40000003 syscall=102 success=yes exit=101 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12904): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163776463.050:12904): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12905): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12905): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12905): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776463.050:12905): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12906): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12906): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776463.050:12906): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.050:12907): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=146273 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12907): avc: denied { add_name } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.050:12907): avc: denied { create } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776463.050:12907): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.930:12908): avc: denied { sendto } for pid=13826 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163776463.930:12908): arch=40000003 syscall=102 success=yes exit=126 a0=b a1=bfed27a0 a2=791234 a3=7e items=0 ppid=11049 pid=13826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.930:12909): avc: denied { remove_name } for pid=11049 comm="udevd" name="class@net@tun0" dev=tmpfs ino=146274 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776463.930:12909): avc: denied { unlink } for pid=11049 comm="udevd" name="class@net@tun0" dev=tmpfs ino=146274 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776463.930:12909): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=24bff4 a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776463.930:12910): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=146273 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776463.930:12910): arch=40000003 syscall=40 success=yes exit=0 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776467.522:12911): avc: denied { write } for pid=13836 comm="gnome-backgroun" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776467.522:12911): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfc324a0 a2=df7770 a3=15 items=0 ppid=1 pid=13836 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776467.530:12912): avc: denied { read } for pid=13836 comm="gnome-backgroun" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776467.530:12912): arch=40000003 syscall=33 success=yes exit=0 a0=8a14cd8 a1=4 a2=df7770 a3=8a14cd8 items=0 ppid=1 pid=13836 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776480.779:12913): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776486.176:12914): avc: denied { read } for pid=14002 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776486.176:12914): arch=40000003 syscall=33 success=yes exit=0 a0=bff20fcb a1=4 a2=da3a64 a3=bff20fcb items=0 ppid=1 pid=14002 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163776486.176:12915): avc: denied { getattr } for pid=14002 comm="firefox-bin" name=".gdmV8RYIT" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776486.176:12915): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff1e33c a2=ef3ff4 a3=8311140 items=0 ppid=1 pid=14002 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163776486.176:12915): path="/tmp/.gdmV8RYIT" type=USER_AVC msg=audit(1163776489.432:12916): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=3866 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776688.156:12917): avc: denied { remove_name } for pid=14116 comm="rm" name="file_contexts.ProyZ13713" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163776688.156:12917): avc: denied { unlink } for pid=14116 comm="rm" name="file_contexts.ProyZ13713" dev=dm-0 ino=9334540 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163776688.156:12917): arch=40000003 syscall=10 success=yes exit=0 a0=bff52b90 a1=0 a2=805277c a3=bff518e4 items=0 ppid=13695 pid=14116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776688.268:12918): avc: denied { dac_override } for pid=8303 comm="yum" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776688.268:12918): arch=40000003 syscall=5 success=yes exit=12 a0=f642ce0 a1=8002 a2=0 a3=8002 items=0 ppid=6537 pid=8303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="yum" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.277:12919): avc: denied { read } for pid=6537 comm="bash" name=".bash_logout" dev=dm-0 ino=13061690 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.277:12919): arch=40000003 syscall=5 success=yes exit=3 a0=884c360 a1=8000 a2=0 a3=8000 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.737:12920): avc: denied { append } for pid=6537 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.737:12920): arch=40000003 syscall=5 success=yes exit=3 a0=882b640 a1=8401 a2=0 a3=8401 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.757:12921): avc: denied { read } for pid=6537 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.757:12921): arch=40000003 syscall=5 success=yes exit=3 a0=882b640 a1=8000 a2=0 a3=8000 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776695.765:12922): avc: denied { write } for pid=6537 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.765:12922): arch=40000003 syscall=5 success=yes exit=3 a0=882b640 a1=8201 a2=0 a3=8201 items=0 ppid=6534 pid=6537 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163776695.773:12923): user pid=6534 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776695.777:12924): avc: denied { search } for pid=6534 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163776695.777:12924): avc: denied { search } for pid=6534 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=AVC msg=audit(1163776695.777:12924): avc: denied { write } for pid=6534 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=SYSCALL msg=audit(1163776695.777:12924): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=1b14edbb a2=0 a3=0 items=0 ppid=4071 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776695.777:12925): avc: denied { search } for pid=6534 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776695.777:12925): avc: denied { write } for pid=6534 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776695.777:12925): avc: denied { remove_name } for pid=6534 comm="su" name=".xauthZUyRWj" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776695.777:12925): avc: denied { unlink } for pid=6534 comm="su" name=".xauthZUyRWj" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776695.777:12925): arch=40000003 syscall=10 success=yes exit=0 a0=9a8eb48 a1=9a8ec26 a2=140bc8 a3=9a8c798 items=0 ppid=4071 pid=6534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1163776695.825:12926): user pid=6534 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_DISP msg=audit(1163776696.381:12927): user pid=4062 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_END msg=audit(1163776696.381:12928): user pid=4062 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776701.257:12929): avc: denied { read } for pid=3836 comm="gnome-panel" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776701.257:12929): arch=40000003 syscall=5 success=yes exit=28 a0=c37093 a1=0 a2=1b6 a3=9493400 items=0 ppid=1 pid=3836 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776701.433:12930): avc: denied { read } for pid=14120 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163776701.433:12930): arch=40000003 syscall=5 success=yes exit=12 a0=97a6258 a1=0 a2=1b6 a3=97a6278 items=0 ppid=1 pid=14120 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776701.645:12931): avc: denied { execheap } for pid=3852 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163776701.645:12931): avc: denied { execmem } for pid=3852 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776701.645:12931): arch=40000003 syscall=125 success=yes exit=0 a0=8c4e000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=3852 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776701.817:12932): avc: denied { read } for pid=12189 comm="restorecond" name="secrets.tdb" dev=dm-0 ino=9330306 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:samba_secrets_t:s0 tclass=file type=SYSCALL msg=audit(1163776701.817:12932): arch=40000003 syscall=5 success=yes exit=6 a0=8385460 a1=28000 a2=0 a3=28000 items=0 ppid=1 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776709.838:12933): avc: denied { write } for pid=3310 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776709.838:12933): arch=40000003 syscall=5 success=yes exit=4 a0=8602c00 a1=241 a2=1b6 a3=86279b8 items=0 ppid=3285 pid=3310 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776709.878:12934): avc: denied { write } for pid=3310 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163776709.878:12934): avc: denied { remove_name } for pid=3310 comm="gnome-session" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163776709.878:12934): avc: denied { unlink } for pid=3310 comm="gnome-session" name="3310" dev=dm-0 ino=14567721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776709.878:12934): arch=40000003 syscall=10 success=yes exit=0 a0=8602d72 a1=1 a2=df7770 a3=8602cc8 items=0 ppid=3285 pid=3310 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1163776710.834:12935): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1163776710.838:12936): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=AVC msg=audit(1163776712.422:12937): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163776712.422:12937): arch=40000003 syscall=102 success=yes exit=99 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776712.454:12938): avc: denied { getattr } for pid=14246 comm="udevd" name="vcs7" dev=tmpfs ino=12075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776712.454:12938): arch=40000003 syscall=195 success=yes exit=0 a0=bfed2dc8 a1=bfed2b68 a2=24bff4 a3=bfed2dc8 items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776712.454:12938): path="/dev/vcs7" type=AVC msg=audit(1163776712.454:12939): avc: denied { setattr } for pid=14246 comm="udevd" name="vcs7" dev=tmpfs ino=12075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776712.454:12939): arch=40000003 syscall=212 success=yes exit=0 a0=bfed2dc8 a1=0 a2=0 a3=bfed2dc8 items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776712.454:12940): avc: denied { unlink } for pid=14246 comm="udevd" name="vcs7" dev=tmpfs ino=12075 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776712.454:12940): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dc8 a1=0 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776712.494:12941): avc: denied { sendto } for pid=14246 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163776712.494:12941): arch=40000003 syscall=102 success=yes exit=142 a0=b a1=bfed27a0 a2=791234 a3=8e items=0 ppid=11049 pid=14246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776713.642:12942): avc: denied { mknod } for pid=14253 comm="udevd" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163776713.642:12942): avc: denied { create } for pid=14253 comm="udevd" name="vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776713.642:12942): arch=40000003 syscall=14 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=707 a3=180 items=0 ppid=11049 pid=14253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776713.642:12943): avc: denied { create } for pid=14253 comm="udevd" name="class@vc@vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776713.642:12943): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=14253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776713.998:12944): avc: denied { unlink } for pid=14255 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=154201 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163776713.998:12944): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=1b a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=14255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163776801.991:12945): user pid=14278 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163776801.991:12946): login pid=14278 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163776801.995:12947): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163776801.995:12948): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163776802.003:12949): avc: denied { execute } for pid=14279 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163776802.003:12949): avc: denied { execute_no_trans } for pid=14279 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.003:12949): arch=40000003 syscall=11 success=yes exit=0 a0=9d6a1b0 a1=9d6a358 a2=9d6a290 a3=9d6a008 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.003:12949): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163776802.019:12950): avc: denied { execute } for pid=14279 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163776802.019:12950): avc: denied { execute_no_trans } for pid=14279 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163776802.019:12950): avc: denied { read } for pid=14279 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.019:12950): arch=40000003 syscall=11 success=yes exit=0 a0=886cd48 a1=886c740 a2=886cd60 a3=886c740 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.019:12950): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163776802.019:12950): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163776802.035:12951): avc: denied { search } for pid=14279 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163776802.035:12951): avc: denied { read } for pid=14279 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.035:12951): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=9abc7f8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.035:12952): avc: denied { getattr } for pid=14279 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.035:12952): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfec7ff8 a2=24bff4 a3=9abc7f8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.035:12952): path="/proc/net/dev" type=AVC msg=audit(1163776802.039:12953): avc: denied { search } for pid=14279 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163776802.039:12953): arch=40000003 syscall=33 success=yes exit=0 a0=bfec83a4 a1=0 a2=bfec8298 a3=bfec82a0 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.111:12954): avc: denied { read append } for pid=14279 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.111:12954): arch=40000003 syscall=5 success=yes exit=3 a0=bfec83a4 a1=402 a2=bfec8568 a3=bfec82a0 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.123:12955): avc: denied { search } for pid=14279 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163776802.123:12955): avc: denied { read } for pid=14279 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.123:12955): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=9abd2b8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.123:12956): avc: denied { getattr } for pid=14279 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.123:12956): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfec7e50 a2=24bff4 a3=9abd2b8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.123:12956): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163776802.123:12957): avc: denied { search } for pid=14279 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163776802.123:12957): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=9abd2b8 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776802.123:12958): avc: denied { lock } for pid=14279 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776802.123:12958): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfec82a0 a3=3 items=0 ppid=14278 pid=14279 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776802.123:12958): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163776802.139:12959): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163776802.139:12960): user pid=14278 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_AUTH msg=audit(1163776857.199:12961): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1163776857.199:12962): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1163776857.199:12963): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1163776857.215:12964): login pid=3285 uid=0 old auid=500 new auid=500 type=USER_START msg=audit(1163776857.267:12965): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1163776857.267:12966): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1163776857.583:12967): avc: denied { read } for pid=14281 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776857.583:12967): arch=40000003 syscall=5 success=yes exit=10 a0=80865d5 a1=0 a2=1 a3=c items=0 ppid=3285 pid=14281 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163776857.583:12968): avc: denied { getattr } for pid=14281 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776857.583:12968): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bfd7023c a2=c4eff4 a3=bfd7023c items=0 ppid=3285 pid=14281 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163776857.583:12968): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163776857.715:12969): avc: denied { read } for pid=14294 comm="xrdb" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776857.715:12969): arch=40000003 syscall=33 success=yes exit=0 a0=bfbadfce a1=4 a2=da3a64 a3=bfbadfce items=0 ppid=14281 pid=14294 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776858.471:12970): avc: denied { getattr } for pid=14335 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163776858.471:12970): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bff76fbc a2=e7fff4 a3=ffffffb8 items=0 ppid=14334 pid=14335 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776858.639:12971): avc: denied { search } for pid=14335 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776858.639:12971): avc: denied { search } for pid=14335 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163776858.639:12971): arch=40000003 syscall=5 success=no exit=-2 a0=94e5c68 a1=18800 a2=d4925c a3=0 items=0 ppid=14334 pid=14335 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776860.535:12972): avc: denied { add_name } for pid=14281 comm="gnome-session" name="14281" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163776860.535:12972): avc: denied { create } for pid=14281 comm="gnome-session" name="14281" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776860.535:12972): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf87d4a0 a2=df7770 a3=0 items=0 ppid=3285 pid=14281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776860.535:12973): avc: denied { read } for pid=14281 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776860.535:12973): arch=40000003 syscall=5 success=yes exit=16 a0=94f7088 a1=0 a2=1b6 a3=94f70b0 items=0 ppid=3285 pid=14281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776860.535:12974): avc: denied { write } for pid=14281 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776860.535:12974): arch=40000003 syscall=5 success=yes exit=16 a0=94f7088 a1=241 a2=1b6 a3=94ff5b8 items=0 ppid=3285 pid=14281 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776860.679:12975): avc: denied { read write } for pid=14354 comm="gnome-settings-" name="[154493]" dev=sockfs ino=154493 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1163776860.679:12975): arch=40000003 syscall=11 success=yes exit=0 a0=94ec490 a1=94ec7d8 a2=94ecd90 a3=94ec4b8 items=0 ppid=14353 pid=14354 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776860.679:12975): path="socket:[154493]" type=AVC msg=audit(1163776861.147:12976): avc: denied { read } for pid=14354 comm="gnome-settings-" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776861.147:12976): arch=40000003 syscall=5 success=yes exit=24 a0=7c7e73 a1=0 a2=1b6 a3=8f98930 items=0 ppid=14353 pid=14354 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776861.159:12977): avc: denied { read } for pid=14362 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163776861.159:12977): arch=40000003 syscall=5 success=yes exit=14 a0=96a0258 a1=0 a2=1b6 a3=96a0278 items=0 ppid=1 pid=14362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776866.443:12978): avc: denied { write } for pid=14856 comm="metacity" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776866.443:12978): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe99e40 a2=df7770 a3=16 items=0 ppid=1 pid=14856 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776867.555:12979): avc: denied { execute } for pid=14873 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776867.555:12979): arch=40000003 syscall=33 success=yes exit=0 a0=8b1d880 a1=1 a2=11 a3=8b1d880 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776867.555:12980): avc: denied { read } for pid=14873 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776867.555:12980): arch=40000003 syscall=33 success=yes exit=0 a0=8b1d880 a1=4 a2=ffffffff a3=8b1d880 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776867.555:12981): avc: denied { execute_no_trans } for pid=14873 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776867.555:12981): arch=40000003 syscall=11 success=yes exit=0 a0=8b1d698 a1=8b1d868 a2=8b1df70 a3=8b1d868 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776867.555:12981): path="/usr/bin/mono" type=AVC msg=audit(1163776867.943:12982): avc: denied { execheap } for pid=14873 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163776867.943:12982): avc: denied { execmem } for pid=14873 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776867.943:12982): arch=40000003 syscall=125 success=yes exit=0 a0=9a7d000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776868.844:12983): avc: denied { sigchld } for pid=14889 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776868.844:12983): arch=40000003 syscall=7 success=yes exit=0 a0=3a2a a1=bff76bc8 a2=1 a3=3a2a items=0 ppid=14337 pid=14889 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776870.456:12984): avc: denied { ioctl } for pid=14914 comm="pam_timestamp_c" name="[154356]" dev=pipefs ino=154356 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163776870.456:12984): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bf8bcd48 a3=bf8bcd88 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163776870.456:12984): path="pipe:[154356]" type=USER_AVC msg=audit(1163776871.064:12985): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getNetworks dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.064:12986): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnections dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.072:12987): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.072:12988): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDevices dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12989): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getWirelessEnabled dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12990): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDialup dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12991): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnections dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12992): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12993): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12994): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12995): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManager.NoDialup dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12996): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.076:12997): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManagerInfo.NoNetworks dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.252:12998): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.252:12999): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776871.252:13000): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776871.172:13001): avc: denied { write } for pid=12248 comm="cupsd" name="certs" dev=dm-0 ino=14534810 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163776871.172:13001): avc: denied { remove_name } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163776871.172:13001): avc: denied { unlink } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.172:13001): arch=40000003 syscall=10 success=yes exit=0 a0=bfb167c8 a1=0 a2=927ff4 a3=bfb167c8 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.464:13002): avc: denied { add_name } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163776871.464:13002): avc: denied { create } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.464:13002): arch=40000003 syscall=5 success=yes exit=8 a0=bfb167c8 a1=80c1 a2=100 a3=80c1 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.464:13003): avc: denied { setattr } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.464:13003): arch=40000003 syscall=94 success=yes exit=0 a0=8 a1=120 a2=927ff4 a3=21 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.464:13004): avc: denied { write } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.464:13004): arch=40000003 syscall=4 success=yes exit=32 a0=8 a1=9139578 a2=20 a3=9139578 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776871.464:13004): path="/var/run/cups/certs/0" type=AVC msg=audit(1163776871.496:13005): avc: denied { read append } for pid=12248 comm="cupsd" name="access_log" dev=dm-0 ino=14437015 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.496:13005): arch=40000003 syscall=5 success=yes exit=8 a0=bfb122c4 a1=8442 a2=1b6 a3=8442 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776871.800:13006): avc: denied { setattr } for pid=12248 comm="cupsd" name="access_log" dev=dm-0 ino=14437015 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163776871.800:13006): arch=40000003 syscall=207 success=yes exit=0 a0=8 a1=0 a2=7 a3=0 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776872.780:13007): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionProperties dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.780:13008): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.780:13009): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13010): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13011): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13012): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionUpdate dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.816:13013): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.820:13014): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776872.820:13015): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.23 spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776873.740:13016): avc: denied { read write } for pid=14926 comm="nautilus" name=4C6F7720427261737320417474656E64616E636520506F6C6963792E646F63 dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776873.740:13016): arch=40000003 syscall=33 success=yes exit=0 a0=b46025e8 a1=6 a2=412708 a3=bcab59 items=0 ppid=1 pid=14926 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776875.476:13017): avc: denied { read } for pid=14886 comm="beagled" name="max_user_instances" dev=proc ino=-268435221 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163776875.476:13017): arch=40000003 syscall=5 success=yes exit=24 a0=c9533c a1=0 a2=1 a3=844dff8 items=0 ppid=1 pid=14886 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163776937.604:13018): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1163776937.604:13019): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776937.620:13020): avc: denied { write } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163776937.620:13020): avc: denied { link } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=SYSCALL msg=audit(1163776937.620:13020): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=0 items=0 ppid=14949 pid=14970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.620:13021): avc: denied { search } for pid=14970 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163776937.620:13021): arch=40000003 syscall=5 success=no exit=-2 a0=bff7b248 a1=8000 a2=1b6 a3=8797200 items=0 ppid=14949 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.664:13022): avc: denied { write } for pid=14971 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.664:13022): arch=40000003 syscall=33 success=yes exit=0 a0=bf80ef2b a1=2 a2=bf80d650 a3=0 items=0 ppid=14970 pid=14971 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.668:13023): avc: denied { read } for pid=14971 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13023): arch=40000003 syscall=5 success=yes exit=2 a0=bf80ef2b a1=0 a2=1b6 a3=92e7008 items=0 ppid=14970 pid=14971 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.668:13024): avc: denied { getattr } for pid=14971 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13024): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf80d39c a2=24bff4 a3=92e7008 items=0 ppid=14970 pid=14971 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163776937.668:13024): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163776937.668:13025): avc: denied { write } for pid=14970 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.668:13025): avc: denied { add_name } for pid=14970 comm="su" name=".xauthN5hi8W" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.668:13025): avc: denied { create } for pid=14970 comm="su" name=".xauthN5hi8W" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13025): arch=40000003 syscall=5 success=yes exit=4 a0=8797323 a1=80c2 a2=180 a3=80c2 items=0 ppid=14949 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.668:13026): avc: denied { setattr } for pid=14970 comm="su" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.668:13026): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=96b5bf items=0 ppid=14949 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts1 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13027): avc: denied { search } for pid=14972 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163776937.672:13027): arch=40000003 syscall=195 success=no exit=-2 a0=bfaafbc7 a1=bfaaf6dc a2=24bff4 a3=bfaaf6dc items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13028): avc: denied { write } for pid=14972 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.672:13028): avc: denied { add_name } for pid=14972 comm="xauth" name=".xauthN5hi8W-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.672:13028): avc: denied { create } for pid=14972 comm="xauth" name=".xauthN5hi8W-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13028): arch=40000003 syscall=5 success=yes exit=2 a0=bfaafbc7 a1=c1 a2=180 a3=ffffffff items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13029): avc: denied { link } for pid=14972 comm="xauth" name=".xauthN5hi8W-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13029): arch=40000003 syscall=9 success=yes exit=0 a0=bfaafbc7 a1=bfaaf7c6 a2=da3a64 a3=2 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13030): avc: denied { write } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13030): arch=40000003 syscall=33 success=yes exit=0 a0=bfab0f27 a1=2 a2=bfab00f0 a3=0 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13031): avc: denied { read } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13031): arch=40000003 syscall=5 success=yes exit=2 a0=bfab0f27 a1=0 a2=1b6 a3=8462008 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163776937.672:13032): avc: denied { getattr } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13032): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfaafe3c a2=24bff4 a3=8462008 items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163776937.672:13032): path="/root/.xauthN5hi8W" type=AVC msg=audit(1163776937.672:13033): avc: denied { remove_name } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163776937.672:13033): avc: denied { unlink } for pid=14972 comm="xauth" name=".xauthN5hi8W" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.672:13033): arch=40000003 syscall=10 success=yes exit=0 a0=8462008 a1=1000 a2=0 a3=846208a items=0 ppid=14970 pid=14972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163776937.672:13034): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=CRED_ACQ msg=audit(1163776937.672:13035): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776937.788:13036): avc: denied { read } for pid=14973 comm="bash" name=".bash_profile" dev=dm-0 ino=13127141 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.788:13036): arch=40000003 syscall=5 success=yes exit=3 a0=8dfef98 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776937.948:13037): avc: denied { read } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163776937.948:13037): arch=40000003 syscall=5 success=yes exit=3 a0=8dfedb8 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163776943.384:13038): user pid=15016 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1163776943.384:13039): user pid=15016 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163776949.573:13040): avc: denied { execheap } for pid=15050 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163776949.573:13040): avc: denied { execmem } for pid=15050 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163776949.573:13040): arch=40000003 syscall=125 success=yes exit=0 a0=8a42000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=15050 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776957.221:13041): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776958.733:13042): avc: denied { write } for pid=15062 comm="nm-vpnc-auth-di" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163776958.733:13042): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfda95d0 a2=df7770 a3=16 items=0 ppid=14885 pid=15062 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nm-vpnc-auth-di" exe="/usr/libexec/nm-vpnc-auth-dialog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776961.789:13043): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=activateVPNConnection dest=org.freedesktop.NetworkManager spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.789:13044): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManagerInfo member=UserInterfaceActivated dest=org.freedesktop.DBus spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.789:13045): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.793:13046): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.793:13047): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionVPNData dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776961.793:13048): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776961.941:13049): avc: denied { execute } for pid=15068 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163776961.941:13049): avc: denied { execute_no_trans } for pid=15068 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163776961.941:13049): avc: denied { read } for pid=15068 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776961.941:13049): arch=40000003 syscall=11 success=yes exit=0 a0=9a0f6c0 a1=9a0f830 a2=9a0f770 a3=9a0f548 items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776961.941:13049): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163776961.941:13049): path="/sbin/modprobe" type=AVC msg=audit(1163776962.045:13050): avc: denied { read } for pid=15068 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.045:13050): arch=40000003 syscall=5 success=yes exit=5 a0=86ae118 a1=0 a2=1b6 a3=86ae300 items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.101:13051): avc: denied { read write } for pid=15068 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.101:13051): arch=40000003 syscall=5 success=yes exit=5 a0=86ae0bc a1=2 a2=0 a3=86ae0bc items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.153:13052): avc: denied { lock } for pid=15068 comm="modprobe" name="tun.ko" dev=dm-0 ino=13719702 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.153:13052): arch=40000003 syscall=221 success=yes exit=0 a0=5 a1=7 a2=bfb395e0 a3=bfb395e0 items=0 ppid=15067 pid=15068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.153:13052): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/drivers/net/tun.ko" type=USER_AVC msg=audit(1163776962.165:13053): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.213:13054): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.213:13055): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=startConnection dest=org.freedesktop.NetworkManager.vpnc spid=6687 tpid=15067 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.213:13056): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776962.213:13057): avc: denied { execute } for pid=15069 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163776962.213:13057): avc: denied { execute_no_trans } for pid=15069 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=AVC msg=audit(1163776962.213:13057): avc: denied { read } for pid=15069 comm="nm-vpnc-service" name="vpnc" dev=dm-0 ino=10323010 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:vpnc_exec_t:s0 tclass=file type=USER_AVC msg=audit(1163776962.217:13058): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.217:13059): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=SYSCALL msg=audit(1163776962.213:13057): arch=40000003 syscall=11 success=yes exit=0 a0=804b8f3 a1=8e53518 a2=bf80aebc a3=0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.213:13057): path="/usr/sbin/vpnc" type=AVC_PATH msg=audit(1163776962.213:13057): path="/usr/sbin/vpnc" type=AVC msg=audit(1163776962.237:13060): avc: denied { ipc_lock } for pid=15069 comm="vpnc" capability=14 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.237:13060): arch=40000003 syscall=150 success=yes exit=0 a0=b7fad000 a1=4000 a2=57612c4 a3=b7fad000 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.237:13061): avc: denied { name_bind } for pid=15069 comm="vpnc" src=500 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:isakmp_port_t:s0 tclass=udp_socket type=AVC msg=audit(1163776962.237:13061): avc: denied { net_bind_service } for pid=15069 comm="vpnc" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.237:13061): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfd59130 a2=805b6e8 a3=3 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13062): avc: denied { read write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776962.257:13062): arch=40000003 syscall=5 success=yes exit=4 a0=8058da4 a1=2 a2=1 a3=805c4c4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13063): avc: denied { ioctl } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=AVC msg=audit(1163776962.257:13063): avc: denied { net_admin } for pid=15069 comm="vpnc" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.257:13063): arch=40000003 syscall=54 success=yes exit=0 a0=4 a1=400454ca a2=bfd59148 a3=4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13064): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=AVC_PATH msg=audit(1163776962.257:13063): path="/dev/net/tun" type=SYSCALL msg=audit(1163776962.257:13064): arch=40000003 syscall=102 success=yes exit=95 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13065): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13065): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13065): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.257:13065): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13066): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13066): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.257:13066): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.257:13067): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=160652 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13067): avc: denied { add_name } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163776962.257:13067): avc: denied { create } for pid=11049 comm="udevd" name="class@net@tun0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.257:13067): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.337:13068): avc: denied { write } for pid=15073 comm="rename_device" name=".rename_device.lock" dev=tmpfs ino=160657 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.337:13068): arch=40000003 syscall=4 success=yes exit=6272 a0=3 a1=8049769 a2=3ae1 a3=0 items=0 ppid=15072 pid=15073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rename_device" exe="/lib/udev/rename_device" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.337:13068): path="/dev/.rename_device.lock" type=AVC msg=audit(1163776962.365:13069): avc: denied { unlink } for pid=15073 comm="rename_device" name=".rename_device.lock" dev=tmpfs ino=160657 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163776962.365:13069): arch=40000003 syscall=10 success=yes exit=0 a0=8049750 a1=ffffffff a2=bff9ffd1 a3=6a9ca0 items=0 ppid=15072 pid=15073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rename_device" exe="/lib/udev/rename_device" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.745:13070): avc: denied { remove_name } for pid=11049 comm="udevd" name="class@net@tun0" dev=tmpfs ino=160653 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.745:13070): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=24bff4 a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.745:13071): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=160652 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163776962.745:13071): arch=40000003 syscall=40 success=yes exit=0 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776962.913:13072): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.vpnc member=signalIP4Config dest=org.freedesktop.NetworkManager.vpnc spid=15081 tpid=15067 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.917:13073): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=IP4Config dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.917:13074): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.vpnc member=StateChange dest=org.freedesktop.DBus spid=15067 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.921:13075): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionRoutes dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776962.921:13076): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=14885 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776962.921:13077): avc: denied { create } for pid=6687 comm="NetworkManager" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=AVC msg=audit(1163776962.921:13077): avc: denied { net_raw } for pid=6687 comm="NetworkManager" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163776962.921:13077): arch=40000003 syscall=102 success=yes exit=14 a0=1 a1=bfaf32b0 a2=8503fb8 a3=2 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776962.921:13078): avc: denied { ioctl } for pid=6687 comm="NetworkManager" name="[160721]" dev=sockfs ino=160721 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163776962.921:13078): arch=40000003 syscall=54 success=yes exit=0 a0=e a1=890b a2=bfaf3364 a3=8503fb8 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776962.921:13078): path="socket:[160721]" type=AVC msg=audit(1163776963.977:13079): avc: denied { execute } for pid=15082 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776963.977:13079): avc: denied { execute_no_trans } for pid=15082 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=AVC msg=audit(1163776963.977:13079): avc: denied { read } for pid=15082 comm="NetworkManager" name="ip" dev=dm-0 ino=9984563 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ifconfig_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.977:13079): arch=40000003 syscall=11 success=yes exit=0 a0=8503a98 a1=8503a78 a2=bfaf4160 a3=400 items=0 ppid=6687 pid=15082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="ip" exe="/sbin/ip" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776963.977:13079): path="/sbin/ip" type=AVC_PATH msg=audit(1163776963.977:13079): path="/sbin/ip" type=AVC msg=audit(1163776963.993:13080): avc: denied { write } for pid=6687 comm="NetworkManager" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776963.993:13080): avc: denied { add_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776963.993:13080): avc: denied { create } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13080): arch=40000003 syscall=5 success=yes exit=14 a0=80892c8 a1=241 a2=1b6 a3=8504600 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776963.993:13081): avc: denied { write } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13081): arch=40000003 syscall=4 success=yes exit=97 a0=e a1=b7fa1000 a2=61 a3=61 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776963.993:13081): path="/etc/resolv.conf.tmp" type=AVC msg=audit(1163776963.993:13082): avc: denied { remove_name } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163776963.993:13082): avc: denied { rename } for pid=6687 comm="NetworkManager" name="resolv.conf.tmp" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776963.993:13082): avc: denied { unlink } for pid=6687 comm="NetworkManager" name="resolv.conf" dev=dm-0 ino=9334568 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13082): arch=40000003 syscall=38 success=yes exit=0 a0=80892c8 a1=8089313 a2=8094374 a3=808930e items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776963.993:13083): avc: denied { relabelfrom } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163776963.993:13083): avc: denied { relabelto } for pid=12189 comm="restorecond" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163776963.993:13083): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=ba70d3 a2=83853e0 a3=20 items=0 ppid=1 pid=12189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="restorecond" exe="/usr/sbin/restorecond" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163776964.058:13084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=LoginBanner dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163776964.058:13085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionStateChange dest=org.freedesktop.DBus spid=6687 tpid=14885 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163776964.062:13086): avc: denied { sigchld } for pid=15086 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163776964.062:13086): arch=40000003 syscall=7 success=yes exit=0 a0=3aef a1=bff76c68 a2=1 a3=3aef items=0 ppid=14337 pid=15086 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163776982.831:13087): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776982.831:13087): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776982.831:13087): path="/dev/net/tun" type=AVC msg=audit(1163776982.871:13088): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163776982.871:13088): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163776982.871:13088): path="/dev/net/tun" type=AVC msg=audit(1163776983.283:13089): avc: denied { read write } for pid=15095 comm="nautilus" name="befw11s4_v4_v1.52.02_000_FCC_code.bin" dev=dm-0 ino=14469650 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776983.283:13089): arch=40000003 syscall=33 success=yes exit=0 a0=88dc870 a1=6 a2=412708 a3=9d items=0 ppid=1 pid=15095 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776987.567:13090): avc: denied { rename } for pid=15096 comm="nautilus" name="befw11s4_v4_v1.52.02_000_FCC_code.bin" dev=dm-0 ino=14469650 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776987.567:13090): arch=40000003 syscall=38 success=yes exit=0 a0=891ff70 a1=88cb070 a2=bd4320 a3=b68d8160 items=0 ppid=1 pid=15096 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163776992.283:13091): avc: denied { unlink } for pid=15097 comm="nautilus" name="befw11s4_v4_v1.52.02_000_FCC_code.bin" dev=dm-0 ino=14469650 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163776992.283:13091): arch=40000003 syscall=10 success=yes exit=0 a0=89c5160 a1=ffffffc3 a2=412708 a3=8755e91 items=0 ppid=1 pid=15097 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163777035.842:13092): user pid=15125 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1163777035.846:13093): user pid=15125 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163777043.974:13094): avc: denied { read } for pid=15158 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777043.974:13094): arch=40000003 syscall=33 success=yes exit=0 a0=bfc4afcb a1=4 a2=da3a64 a3=bfc4afcb items=0 ppid=1 pid=15158 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163777043.974:13095): avc: denied { getattr } for pid=15158 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777043.974:13095): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc4804c a2=c4cff4 a3=9a0bd70 items=0 ppid=1 pid=15158 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777043.974:13095): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777117.071:13096): avc: denied { write } for pid=15186 comm="gnome-terminal" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163777117.071:13096): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9868e0 a2=df7770 a3=16 items=0 ppid=1 pid=15186 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163777401.177:13097): user pid=15230 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163777401.181:13098): login pid=15230 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163777401.181:13099): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163777401.181:13100): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163777401.189:13101): avc: denied { execute } for pid=15231 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163777401.189:13101): avc: denied { execute_no_trans } for pid=15231 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.189:13101): arch=40000003 syscall=11 success=yes exit=0 a0=8a171b0 a1=8a17358 a2=8a17290 a3=8a17008 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.189:13101): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163777401.189:13102): avc: denied { execute } for pid=15231 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163777401.189:13102): avc: denied { execute_no_trans } for pid=15231 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163777401.189:13102): avc: denied { read } for pid=15231 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.189:13102): arch=40000003 syscall=11 success=yes exit=0 a0=812ad48 a1=812a740 a2=812ad60 a3=812a740 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.189:13102): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163777401.189:13102): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163777401.193:13103): avc: denied { search } for pid=15231 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163777401.193:13103): avc: denied { read } for pid=15231 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13103): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8b4b7f8 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13104): avc: denied { getattr } for pid=15231 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13104): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc0bd38 a2=8cdff4 a3=8b4b7f8 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.193:13104): path="/proc/net/dev" type=AVC msg=audit(1163777401.193:13105): avc: denied { search } for pid=15231 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163777401.193:13105): arch=40000003 syscall=33 success=yes exit=0 a0=bfc0c0e4 a1=0 a2=bfc0bfd8 a3=bfc0bfe0 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13106): avc: denied { read append } for pid=15231 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13106): arch=40000003 syscall=5 success=yes exit=3 a0=bfc0c0e4 a1=402 a2=bfc0c2a8 a3=bfc0bfe0 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13107): avc: denied { search } for pid=15231 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163777401.193:13107): avc: denied { read } for pid=15231 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13107): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8b4c348 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.193:13108): avc: denied { getattr } for pid=15231 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.193:13108): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc0bb90 a2=8cdff4 a3=8b4c348 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.193:13108): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163777401.197:13109): avc: denied { search } for pid=15231 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163777401.197:13109): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8b4c348 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163777401.197:13110): avc: denied { lock } for pid=15231 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163777401.197:13110): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfc0bfe0 a3=3 items=0 ppid=15230 pid=15231 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163777401.197:13110): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163777401.217:13111): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163777401.217:13112): user pid=15230 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163777414.850:13113): avc: denied { read } for pid=15233 comm="emacs-x" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777414.850:13113): arch=40000003 syscall=33 success=yes exit=0 a0=bfe5ffc2 a1=4 a2=da3a64 a3=bfe5ffc2 items=0 ppid=15101 pid=15233 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="emacs-x" exe="/usr/bin/emacs-x" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777475.445:13114): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163777475.445:13114): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163777530.661:13115): avc: denied { name_bind } for pid=15243 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163777530.661:13115): avc: denied { node_bind } for pid=15243 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163777530.661:13115): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf8243c0 a2=90170d8 a3=80b1220 items=0 ppid=15101 pid=15243 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="synergys" exe="/usr/bin/synergys" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777708.280:13116): avc: denied { read } for pid=14860 comm="gnome-panel" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777708.280:13116): arch=40000003 syscall=5 success=yes exit=29 a0=8ab6a40 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=14860 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163777716.449:13117): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163777716.449:13117): arch=40000003 syscall=11 success=yes exit=0 a0=804c35f a1=8f758c8 a2=bfeab04c a3=3 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777716.533:13118): avc: denied { ioctl } for pid=15256 comm="userhelper" name="[154356]" dev=pipefs ino=154356 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163777716.533:13118): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5401 a2=bfd276f8 a3=bfd27738 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777716.533:13118): path="pipe:[154356]" type=USER_AUTH msg=audit(1163777721.373:13119): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: authentication acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1163777721.373:13120): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: accounting acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163777721.377:13121): avc: denied { search } for pid=15256 comm="userhelper" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777721.377:13121): arch=40000003 syscall=5 success=no exit=-2 a0=bfd2a338 a1=8000 a2=1b6 a3=9ccbb98 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.377:13122): avc: denied { search } for pid=15256 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777721.377:13122): arch=40000003 syscall=5 success=no exit=-2 a0=bfd2a338 a1=8000 a2=1b6 a3=9ccbcf0 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163777721.381:13123): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=AVC msg=audit(1163777721.381:13123): avc: denied { execute_no_trans } for pid=15257 comm="userhelper" name="xauth" dev=dm-0 ino=10326959 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13123): arch=40000003 syscall=11 success=yes exit=0 a0=126681 a1=bfd2b2fc a2=9cc6608 a3=4 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777721.381:13123): path="/usr/bin/xauth" type=AVC msg=audit(1163777721.381:13124): avc: denied { search } for pid=15257 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163777721.381:13124): arch=40000003 syscall=195 success=no exit=-2 a0=bfcd15c7 a1=bfcd10dc a2=fa6ff4 a3=bfcd10dc items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13125): avc: denied { write } for pid=15257 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163777721.381:13125): avc: denied { add_name } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163777721.381:13125): avc: denied { create } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13125): arch=40000003 syscall=5 success=yes exit=2 a0=bfcd15c7 a1=c1 a2=180 a3=ffffffff items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13126): avc: denied { link } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13126): arch=40000003 syscall=9 success=yes exit=0 a0=bfcd15c7 a1=bfcd11c6 a2=da3a64 a3=2 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13127): avc: denied { write } for pid=15257 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13127): arch=40000003 syscall=33 success=yes exit=0 a0=bfcd1f0e a1=2 a2=bfcd1af0 a3=0 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13128): avc: denied { read } for pid=15257 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13128): arch=40000003 syscall=5 success=yes exit=2 a0=bfcd1f0e a1=0 a2=1b6 a3=8b8c008 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.381:13129): avc: denied { getattr } for pid=15257 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13129): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfcd183c a2=fa6ff4 a3=8b8c008 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777721.381:13129): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777721.381:13130): avc: denied { remove_name } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163777721.381:13130): avc: denied { unlink } for pid=15257 comm="xauth" name=".gdmOFJZIT-c" dev=dm-0 ino=14469399 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.381:13130): arch=40000003 syscall=10 success=yes exit=0 a0=bfcd11b7 a1=bfcd0dc6 a2=da3a64 a3=bfcd0db6 items=0 ppid=15256 pid=15257 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.389:13131): avc: denied { write } for pid=15256 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777721.389:13131): avc: denied { add_name } for pid=15256 comm="userhelper" name=".xauthfd6Dm8" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777721.389:13131): avc: denied { create } for pid=15256 comm="userhelper" name=".xauthfd6Dm8" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.389:13131): arch=40000003 syscall=5 success=yes exit=5 a0=9ccbdfb a1=80c2 a2=180 a3=80c2 items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.389:13132): avc: denied { setattr } for pid=15256 comm="userhelper" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.389:13132): arch=40000003 syscall=207 success=yes exit=0 a0=5 a1=0 a2=0 a3=1265bf items=0 ppid=15255 pid=15256 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163777721.401:13133): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163777721.401:13133): arch=40000003 syscall=11 success=yes exit=0 a0=126681 a1=bfd2b2fc a2=9cc6608 a3=4 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13134): avc: denied { link } for pid=15258 comm="xauth" name=".xauthfd6Dm8-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13134): arch=40000003 syscall=9 success=yes exit=0 a0=bf843937 a1=bf843536 a2=da3a64 a3=2 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13135): avc: denied { write } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13135): arch=40000003 syscall=33 success=yes exit=0 a0=bf844f0a a1=2 a2=bf843e60 a3=0 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13136): avc: denied { read } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13136): arch=40000003 syscall=5 success=yes exit=2 a0=bf844f0a a1=0 a2=1b6 a3=8ae8008 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163777721.401:13137): avc: denied { getattr } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.401:13137): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf843bac a2=672ff4 a3=8ae8008 items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163777721.401:13137): path="/root/.xauthfd6Dm8" type=AVC msg=audit(1163777721.405:13138): avc: denied { remove_name } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777721.405:13138): avc: denied { unlink } for pid=15258 comm="xauth" name=".xauthfd6Dm8" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.405:13138): arch=40000003 syscall=10 success=yes exit=0 a0=8ae8008 a1=1000 a2=0 a3=8ae808a items=0 ppid=15256 pid=15258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_START msg=audit(1163777721.453:13139): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session open acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163777721.597:13140): avc: denied { read } for pid=15259 comm="system-config-s" name=".xauthfd6Dm8" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777721.597:13140): arch=40000003 syscall=33 success=yes exit=0 a0=bf897fa3 a1=4 a2=2eda64 a3=bf897fa3 items=0 ppid=15256 pid=15259 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777721.721:13141): avc: denied { dac_override } for pid=15259 comm="system-config-s" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777721.721:13141): arch=40000003 syscall=5 success=no exit=-2 a0=902dc50 a1=8000 a2=1b6 a3=90211e0 items=0 ppid=15256 pid=15259 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777724.001:13142): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163777724.001:13142): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163777724.001:13142): path="/var/run/utmp" type=AVC msg=audit(1163777741.434:13143): avc: denied { write } for pid=15262 comm="lokkit" name="sysconfig" dev=dm-0 ino=9329763 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163777741.434:13143): avc: denied { add_name } for pid=15262 comm="lokkit" name="new-iptables-config" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163777741.434:13143): avc: denied { create } for pid=15262 comm="lokkit" name="new-iptables-config" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.434:13143): arch=40000003 syscall=5 success=yes exit=4 a0=805049c a1=241 a2=1b6 a3=8582f20 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.442:13144): avc: denied { write } for pid=15262 comm="lokkit" name="new-iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.442:13144): arch=40000003 syscall=4 success=yes exit=1763 a0=4 a1=b7fcf000 a2=6e3 a3=6e3 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.442:13144): path="/etc/sysconfig/new-iptables-config" type=AVC msg=audit(1163777741.442:13145): avc: denied { remove_name } for pid=15262 comm="lokkit" name="new-iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163777741.442:13145): avc: denied { rename } for pid=15262 comm="lokkit" name="new-iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163777741.442:13145): avc: denied { unlink } for pid=15262 comm="lokkit" name="iptables-config" dev=dm-0 ino=9332021 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.442:13145): arch=40000003 syscall=38 success=yes exit=0 a0=805049c a1=805047c a2=0 a3=8583092 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.486:13146): avc: denied { write } for pid=15262 comm="lokkit" name="iptables" dev=dm-0 ino=9331367 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.486:13146): arch=40000003 syscall=5 success=yes exit=3 a0=804e5a6 a1=241 a2=1b6 a3=8584038 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.494:13147): avc: denied { setattr } for pid=15262 comm="lokkit" name="iptables" dev=dm-0 ino=9331367 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.494:13147): arch=40000003 syscall=15 success=yes exit=0 a0=804e5a6 a1=180 a2=8584030 a3=8584038 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.494:13148): avc: denied { unlink } for pid=15262 comm="lokkit" name="iptables-config" dev=dm-0 ino=9330913 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.494:13148): arch=40000003 syscall=38 success=yes exit=0 a0=805049c a1=805047c a2=0 a3=8584312 items=0 ppid=15259 pid=15262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="lokkit" exe="/usr/sbin/lokkit" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.498:13149): avc: denied { execute } for pid=15264 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163777741.498:13149): avc: denied { execute_no_trans } for pid=15264 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163777741.498:13149): avc: denied { read } for pid=15264 comm="sh" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.498:13149): arch=40000003 syscall=11 success=yes exit=0 a0=89bfd90 a1=89bff30 a2=89bfe28 a3=89bfbe8 items=0 ppid=15263 pid=15264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.498:13149): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163777741.498:13149): path="/sbin/modprobe" type=AVC msg=audit(1163777741.502:13150): avc: denied { read } for pid=15264 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.502:13150): arch=40000003 syscall=5 success=yes exit=3 a0=963a118 a1=0 a2=1b6 a3=963a300 items=0 ppid=15263 pid=15264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.594:13151): avc: denied { execute } for pid=15266 comm="service" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.594:13151): arch=40000003 syscall=33 success=yes exit=0 a0=863a578 a1=1 a2=1 a3=862d718 items=0 ppid=15265 pid=15266 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.658:13152): avc: denied { execute_no_trans } for pid=15273 comm="env" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=AVC msg=audit(1163777741.658:13152): avc: denied { read } for pid=15273 comm="env" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.658:13152): arch=40000003 syscall=11 success=yes exit=0 a0=bf805efb a1=bf804dc8 a2=9700858 a3=5 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.658:13152): path="/etc/rc.d/init.d/iptables" type=AVC_PATH msg=audit(1163777741.658:13152): path="/etc/rc.d/init.d/iptables" type=AVC msg=audit(1163777741.682:13153): avc: denied { ioctl } for pid=15273 comm="iptables" name="iptables" dev=dm-0 ino=9331831 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.682:13153): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfd1f068 a3=bfd1f0a8 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.682:13153): path="/etc/rc.d/init.d/iptables" type=AVC msg=audit(1163777741.702:13154): avc: denied { execute } for pid=15273 comm="iptables" name="iptables" dev=dm-0 ino=9984709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.702:13154): arch=40000003 syscall=33 success=yes exit=0 a0=83689a0 a1=1 a2=2 a3=834f7d8 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.786:13155): avc: denied { read } for pid=15273 comm="iptables" name="iptables" dev=dm-0 ino=9984709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.786:13155): arch=40000003 syscall=33 success=yes exit=0 a0=8373188 a1=4 a2=ffffffff a3=8373188 items=0 ppid=15266 pid=15273 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.786:13156): avc: denied { execute_no_trans } for pid=15284 comm="iptables" name="iptables" dev=dm-0 ino=9984709 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.786:13156): arch=40000003 syscall=11 success=yes exit=0 a0=8373188 a1=8372d68 a2=835ab98 a3=8372d38 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777741.786:13156): path="/sbin/iptables" type=AVC msg=audit(1163777741.806:13157): avc: denied { create } for pid=15284 comm="iptables" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=rawip_socket type=AVC msg=audit(1163777741.806:13157): avc: denied { net_raw } for pid=15284 comm="iptables" capability=13 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777741.806:13157): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfcd8050 a2=8055864 a3=bfcd8f86 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.806:13158): avc: denied { getopt } for pid=15284 comm="iptables" lport=255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=rawip_socket type=AVC msg=audit(1163777741.806:13158): avc: denied { net_admin } for pid=15284 comm="iptables" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777741.806:13158): arch=40000003 syscall=102 success=yes exit=0 a0=f a1=bfcd8050 a2=8055864 a3=bfcd8f86 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.806:13159): avc: denied { setopt } for pid=15284 comm="iptables" lport=255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=rawip_socket type=SYSCALL msg=audit(1163777741.806:13159): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bfcd8250 a2=8055864 a3=9e49b28 items=0 ppid=15273 pid=15284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777741.950:13160): avc: denied { read write } for pid=15301 comm="modprobe" name="iptable_filter.ko" dev=dm-0 ino=13720289 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163777741.950:13160): arch=40000003 syscall=5 success=yes exit=3 a0=86d10bc a1=2 a2=0 a3=86d10bc items=0 ppid=15273 pid=15301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.050:13161): avc: denied { lock } for pid=15301 comm="modprobe" name="iptable_filter.ko" dev=dm-0 ino=13720289 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.050:13161): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf990460 a3=bf990460 items=0 ppid=15273 pid=15301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777742.050:13161): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/net/ipv4/netfilter/iptable_filter.ko" type=AVC msg=audit(1163777742.050:13162): avc: denied { sys_module } for pid=15301 comm="modprobe" capability=16 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163777742.098:13163): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163777742.098:13163): arch=40000003 syscall=102 success=yes exit=103 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13164): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.098:13164): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13165): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13165): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13165): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163777742.098:13165): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13166): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13166): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163777742.098:13166): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13167): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=161994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13167): avc: denied { add_name } for pid=11049 comm="udevd" name="module@iptable_filter" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13167): avc: denied { create } for pid=11049 comm="udevd" name="module@iptable_filter" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.098:13167): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13168): avc: denied { remove_name } for pid=11049 comm="udevd" name="module@iptable_filter" dev=tmpfs ino=161995 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163777742.098:13168): avc: denied { unlink } for pid=11049 comm="udevd" name="module@iptable_filter" dev=tmpfs ino=161995 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.098:13168): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=24bff4 a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.098:13169): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=161994 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163777742.098:13169): arch=40000003 syscall=40 success=yes exit=0 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SYSCALL msg=audit(1163777742.050:13162): arch=40000003 syscall=129 success=yes exit=0 a0=86d1150 a1=80 a2=86d10bc a3=0 items=0 ppid=15273 pid=15301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.258:13170): avc: denied { write } for pid=15343 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163777742.258:13170): avc: denied { remove_name } for pid=15343 comm="rm" name="iptables" dev=dm-0 ino=14436590 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163777742.258:13170): avc: denied { unlink } for pid=15343 comm="rm" name="iptables" dev=dm-0 ino=14436590 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.258:13170): arch=40000003 syscall=10 success=yes exit=0 a0=bfbabf84 a1=0 a2=805277c a3=bfbaa994 items=0 ppid=15273 pid=15343 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.270:13171): avc: denied { read } for pid=15344 comm="iptables-restor" name="modprobe" dev=proc ino=-268435399 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_modprobe_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.270:13171): arch=40000003 syscall=5 success=yes exit=4 a0=8052b9c a1=0 a2=0 a3=bf8f8ab6 items=0 ppid=15273 pid=15344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables-restor" exe="/sbin/iptables-restore" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.522:13172): avc: denied { add_name } for pid=15358 comm="touch" name="iptables" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163777742.522:13172): avc: denied { create } for pid=15358 comm="touch" name="iptables" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.522:13172): arch=40000003 syscall=5 success=yes exit=0 a0=bfe09f7e a1=8941 a2=1b6 a3=8941 items=0 ppid=15273 pid=15358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777742.522:13173): avc: denied { write } for pid=15358 comm="touch" name="iptables" dev=dm-0 ino=14436590 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163777742.522:13173): arch=40000003 syscall=271 success=yes exit=0 a0=bfe07ea4 a1=0 a2=3bfff4 a3=0 items=0 ppid=15273 pid=15358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1163777886.823:13174): user pid=15256 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session close acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163777906.000:13175): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163777906.000:13175): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163777906.000:13175): path="/var/run/utmp" type=AVC msg=audit(1163777929.238:13176): avc: denied { read } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777929.238:13176): arch=40000003 syscall=33 success=yes exit=0 a0=bfb72fcb a1=4 a2=da3a64 a3=bfb72fcb items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163777929.238:13177): avc: denied { getattr } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777929.238:13177): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfb718ac a2=d15ff4 a3=86b4d70 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777929.238:13177): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777943.743:13178): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163777943.743:13178): arch=40000003 syscall=3 success=yes exit=71 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777943.743:13178): path="/dev/net/tun" type=AVC msg=audit(1163777943.855:13179): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163777943.855:13179): arch=40000003 syscall=4 success=yes exit=150 a0=4 a1=805c570 a2=96 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163777943.855:13179): path="/dev/net/tun" type=AVC msg=audit(1163777959.560:13180): avc: denied { execute } for pid=15443 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777959.560:13180): arch=40000003 syscall=192 success=yes exit=110735360 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777959.560:13180): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163777966.268:13181): avc: denied { execstack } for pid=15443 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163777966.268:13181): avc: denied { execmem } for pid=15443 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163777966.268:13181): arch=40000003 syscall=125 success=yes exit=0 a0=bfb72000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163777966.376:13182): avc: denied { execmod } for pid=15443 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777966.376:13182): arch=40000003 syscall=125 success=yes exit=0 a0=37cd000 a1=26f000 a2=5 a3=bfb6f1b0 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163777966.376:13182): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163777981.621:13183): avc: denied { write } for pid=15476 comm="gnome-terminal" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163777981.621:13183): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbef20 a2=df7770 a3=16 items=0 ppid=1 pid=15476 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163777985.761:13184): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=USER_ACCT msg=audit(1163777985.761:13185): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163777985.761:13186): avc: denied { search } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777985.761:13186): arch=40000003 syscall=5 success=no exit=-2 a0=bf891d38 a1=8000 a2=1b6 a3=8dc69a8 items=0 ppid=15478 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts3 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163777985.769:13187): avc: denied { write } for pid=15499 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13187): arch=40000003 syscall=33 success=yes exit=0 a0=bf945987 a1=2 a2=bf945160 a3=0 items=0 ppid=15498 pid=15499 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.769:13188): avc: denied { read } for pid=15499 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13188): arch=40000003 syscall=5 success=yes exit=2 a0=bf945987 a1=0 a2=1b6 a3=95f8008 items=0 ppid=15498 pid=15499 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.769:13189): avc: denied { getattr } for pid=15499 comm="xauth" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13189): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf944eac a2=a59ff4 a3=95f8008 items=0 ppid=15498 pid=15499 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163777985.769:13189): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163777985.769:13190): avc: denied { write } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.769:13190): avc: denied { add_name } for pid=15498 comm="su" name=".xauthjIDizz" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.769:13190): avc: denied { create } for pid=15498 comm="su" name=".xauthjIDizz" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.769:13190): arch=40000003 syscall=5 success=yes exit=4 a0=8dc6acb a1=80c2 a2=180 a3=80c2 items=0 ppid=15478 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts3 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163777985.805:13191): avc: denied { setattr } for pid=15498 comm="su" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.805:13191): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=1985bf items=0 ppid=15478 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts3 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13192): avc: denied { search } for pid=15500 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163777985.809:13192): arch=40000003 syscall=195 success=no exit=-2 a0=bfa85577 a1=bfa8508c a2=34dff4 a3=bfa8508c items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13193): avc: denied { write } for pid=15500 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.809:13193): avc: denied { add_name } for pid=15500 comm="xauth" name=".xauthjIDizz-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.809:13193): avc: denied { create } for pid=15500 comm="xauth" name=".xauthjIDizz-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.809:13193): arch=40000003 syscall=5 success=yes exit=2 a0=bfa85577 a1=c1 a2=180 a3=ffffffff items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13194): avc: denied { link } for pid=15500 comm="xauth" name=".xauthjIDizz-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.809:13194): arch=40000003 syscall=9 success=yes exit=0 a0=bfa85577 a1=bfa85176 a2=da3a64 a3=2 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.809:13195): avc: denied { write } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.809:13195): arch=40000003 syscall=33 success=yes exit=0 a0=bfa87983 a1=2 a2=bfa85aa0 a3=0 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.813:13196): avc: denied { read } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.813:13196): arch=40000003 syscall=5 success=yes exit=2 a0=bfa87983 a1=0 a2=1b6 a3=9d2d008 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163777985.813:13197): avc: denied { getattr } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.813:13197): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfa857ec a2=34dff4 a3=9d2d008 items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163777985.813:13197): path="/root/.xauthjIDizz" type=AVC msg=audit(1163777985.817:13198): avc: denied { remove_name } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163777985.817:13198): avc: denied { unlink } for pid=15500 comm="xauth" name=".xauthjIDizz" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.817:13198): arch=40000003 syscall=10 success=yes exit=0 a0=9d2d008 a1=1000 a2=0 a3=9d2d08a items=0 ppid=15498 pid=15500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163777985.817:13199): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=CRED_ACQ msg=audit(1163777985.817:13200): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163777985.825:13201): avc: denied { dac_override } for pid=15501 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163777985.825:13201): arch=40000003 syscall=195 success=yes exit=0 a0=80d2437 a1=bfe6bb80 a2=24bff4 a3=bfe6bbe0 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777985.825:13202): avc: denied { read } for pid=15501 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.825:13202): arch=40000003 syscall=5 success=yes exit=3 a0=8108880 a1=8000 a2=0 a3=8000 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163777985.909:13203): avc: denied { read } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163777985.909:13203): arch=40000003 syscall=5 success=yes exit=3 a0=8108a60 a1=8000 a2=0 a3=8000 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163777994.954:13204): user pid=15521 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/3 res=failed)' type=AVC msg=audit(1163778000.802:13205): avc: denied { read } for pid=15524 comm="tail" name="messages" dev=dm-0 ino=14437053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778000.802:13205): arch=40000003 syscall=5 success=yes exit=3 a0=bfb97975 a1=8000 a2=0 a3=8000 items=0 ppid=15501 pid=15524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="tail" exe="/usr/bin/tail" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163778001.254:13206): user pid=15525 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163778001.258:13207): login pid=15525 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163778001.258:13208): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163778001.258:13209): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778001.278:13210): avc: denied { execute } for pid=15526 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163778001.278:13210): avc: denied { execute_no_trans } for pid=15526 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.278:13210): arch=40000003 syscall=11 success=yes exit=0 a0=88861b0 a1=8886358 a2=8886290 a3=8886008 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.278:13210): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163778001.310:13211): avc: denied { execute } for pid=15526 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778001.310:13211): avc: denied { execute_no_trans } for pid=15526 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778001.310:13211): avc: denied { read } for pid=15526 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.310:13211): arch=40000003 syscall=11 success=yes exit=0 a0=89aed48 a1=89ae740 a2=89aed60 a3=89ae740 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.310:13211): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163778001.310:13211): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163778001.314:13212): avc: denied { search } for pid=15526 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163778001.314:13212): avc: denied { read } for pid=15526 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13212): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=8cb17f8 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.314:13213): avc: denied { getattr } for pid=15526 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13213): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf88a9b8 a2=5f3ff4 a3=8cb17f8 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.314:13213): path="/proc/net/dev" type=AVC msg=audit(1163778001.314:13214): avc: denied { search } for pid=15526 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163778001.314:13214): arch=40000003 syscall=33 success=yes exit=0 a0=bf88ad64 a1=0 a2=bf88ac58 a3=bf88ac60 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.314:13215): avc: denied { read append } for pid=15526 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13215): arch=40000003 syscall=5 success=yes exit=3 a0=bf88ad64 a1=402 a2=bf88af28 a3=bf88ac60 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.314:13216): avc: denied { search } for pid=15526 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163778001.314:13216): avc: denied { read } for pid=15526 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.314:13216): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=8cb2348 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.318:13217): avc: denied { getattr } for pid=15526 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.318:13217): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf88a810 a2=5f3ff4 a3=8cb2348 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.318:13217): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163778001.318:13218): avc: denied { search } for pid=15526 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163778001.318:13218): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=8cb2348 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778001.318:13219): avc: denied { lock } for pid=15526 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778001.318:13219): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf88ac60 a3=3 items=0 ppid=15525 pid=15526 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778001.318:13219): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163778001.342:13220): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163778001.346:13221): user pid=15525 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778017.599:13222): avc: denied { read } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778017.599:13222): arch=40000003 syscall=33 success=yes exit=0 a0=bfb72fcb a1=4 a2=da3a64 a3=bfb72fcb items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778017.599:13223): avc: denied { getattr } for pid=15443 comm="firefox-bin" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778017.599:13223): arch=40000003 syscall=197 success=yes exit=0 a0=3a a1=bfb6f640 a2=d15ff4 a3=986ab38 items=0 ppid=1 pid=15443 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778017.599:13223): path="/tmp/.gdmOFJZIT" type=AVC msg=audit(1163778018.615:13224): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778018.615:13224): arch=40000003 syscall=4 success=yes exit=64 a0=4 a1=805c570 a2=40 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778018.615:13224): path="/dev/net/tun" type=AVC msg=audit(1163778018.615:13225): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778018.615:13225): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778018.615:13225): path="/dev/net/tun" type=AVC msg=audit(1163778073.379:13226): avc: denied { read } for pid=15558 comm="desktop-effects" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778073.379:13226): arch=40000003 syscall=33 success=yes exit=0 a0=bfa3edd3 a1=4 a2=63da64 a3=bfa3edd3 items=0 ppid=1 pid=15558 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="desktop-effects" exe="/usr/bin/desktop-effects" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778074.775:13227): avc: denied { execmem } for pid=15562 comm="compiz" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778074.775:13227): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778074.783:13228): avc: denied { execstack } for pid=15562 comm="compiz" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778074.783:13228): arch=40000003 syscall=125 success=yes exit=0 a0=bfaca000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778075.447:13229): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163778075.447:13229): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778075.863:13230): avc: denied { execute } for pid=15562 comm="compiz" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778075.863:13230): arch=40000003 syscall=192 success=yes exit=1273856 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778075.863:13230): path="/dev/zero" type=AVC msg=audit(1163778075.871:13231): avc: denied { read } for pid=15562 comm="compiz" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778075.871:13231): arch=40000003 syscall=33 success=yes exit=0 a0=8b5b4c8 a1=4 a2=df7770 a3=8b5b4c8 items=0 ppid=1 pid=15562 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="compiz" exe="/usr/bin/compiz" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778103.237:13232): avc: denied { execheap } for pid=14873 comm="beagle-search" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778103.237:13232): arch=40000003 syscall=125 success=yes exit=0 a0=9dc2000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=14873 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778117.358:13233): avc: denied { execute } for pid=15565 comm="beagle-settings" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778117.358:13233): arch=40000003 syscall=33 success=yes exit=0 a0=8e1d3d0 a1=1 a2=11 a3=8e1d3d0 items=0 ppid=14873 pid=15565 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-settings" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778117.358:13234): avc: denied { read } for pid=15565 comm="beagle-settings" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778117.358:13234): arch=40000003 syscall=33 success=yes exit=0 a0=8e1d3d0 a1=4 a2=ffffffff a3=8e1d3d0 items=0 ppid=14873 pid=15565 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-settings" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778117.358:13235): avc: denied { execute_no_trans } for pid=15565 comm="beagle-settings" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778117.358:13235): arch=40000003 syscall=11 success=yes exit=0 a0=8e1de80 a1=8e1e068 a2=8e1e630 a3=8e1e068 items=0 ppid=14873 pid=15565 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778117.358:13235): path="/usr/bin/mono" type=AVC msg=audit(1163778134.295:13236): avc: denied { getattr } for pid=15569 comm="ps" name="tty1" dev=tmpfs ino=1444 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778134.295:13236): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bfcd6e0c a2=f14ff4 a3=bfcd6e0c items=0 ppid=15533 pid=15569 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts4 comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778134.295:13236): path="/dev/tty1" type=AVC msg=audit(1163778221.000:13237): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778221.000:13237): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778221.000:13237): path="/var/run/utmp" type=USER_AUTH msg=audit(1163778226.432:13238): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_ACCT msg=audit(1163778226.432:13239): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=AVC msg=audit(1163778226.464:13240): avc: denied { create } for pid=15636 comm="su" name=".xauthpHDAX5" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.464:13240): arch=40000003 syscall=5 success=yes exit=4 a0=861bacb a1=80c2 a2=180 a3=80c2 items=0 ppid=15605 pid=15636 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts5 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778226.464:13241): avc: denied { setattr } for pid=15636 comm="su" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.464:13241): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=28b5bf items=0 ppid=15605 pid=15636 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts5 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13242): avc: denied { create } for pid=15638 comm="xauth" name=".xauthpHDAX5-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13242): arch=40000003 syscall=5 success=yes exit=2 a0=bf85db57 a1=c1 a2=180 a3=ffffffff items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13243): avc: denied { link } for pid=15638 comm="xauth" name=".xauthpHDAX5-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13243): arch=40000003 syscall=9 success=yes exit=0 a0=bf85db57 a1=bf85d756 a2=da3a64 a3=2 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13244): avc: denied { write } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13244): arch=40000003 syscall=33 success=yes exit=0 a0=bf85e983 a1=2 a2=bf85e080 a3=0 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.472:13245): avc: denied { read } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.472:13245): arch=40000003 syscall=5 success=yes exit=2 a0=bf85e983 a1=0 a2=1b6 a3=8e9c008 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778226.476:13246): avc: denied { getattr } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.476:13246): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf85ddcc a2=8aaff4 a3=8e9c008 items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163778226.476:13246): path="/root/.xauthpHDAX5" type=AVC msg=audit(1163778226.496:13247): avc: denied { unlink } for pid=15638 comm="xauth" name=".xauthpHDAX5" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.496:13247): arch=40000003 syscall=10 success=yes exit=0 a0=8e9c008 a1=1000 a2=0 a3=8e9c08a items=0 ppid=15636 pid=15638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163778226.504:13248): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=CRED_ACQ msg=audit(1163778226.504:13249): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=AVC msg=audit(1163778226.508:13250): avc: denied { read } for pid=15639 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778226.508:13250): arch=40000003 syscall=5 success=yes exit=3 a0=84ab880 a1=8000 a2=0 a3=8000 items=0 ppid=15636 pid=15639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163778234.717:13251): user pid=15662 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_ACCT msg=audit(1163778234.717:13252): user pid=15662 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/5 res=success)' type=AVC msg=audit(1163778247.402:13253): avc: denied { execute } for pid=15591 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778247.402:13253): arch=40000003 syscall=192 success=yes exit=42897408 a0=0 a1=2af6e0 a2=5 a3=802 items=0 ppid=1 pid=15591 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778247.402:13253): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163778247.402:13254): avc: denied { execstack } for pid=15591 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163778247.402:13254): avc: denied { execmem } for pid=15591 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163778247.402:13254): arch=40000003 syscall=125 success=yes exit=0 a0=bfa2f000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=15591 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778247.402:13255): avc: denied { execmod } for pid=15591 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778247.402:13255): arch=40000003 syscall=125 success=yes exit=0 a0=28e9000 a1=26f000 a2=5 a3=bfa2bf30 items=0 ppid=1 pid=15591 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778247.402:13255): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163778335.855:13256): avc: denied { read } for pid=15584 comm="tail" name="messages" dev=dm-0 ino=14437053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778335.855:13256): arch=40000003 syscall=3 success=yes exit=101 a0=3 a1=bf86d6a4 a2=2000 a3=2000 items=0 ppid=15501 pid=15584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="tail" exe="/usr/bin/tail" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778335.855:13256): path="/var/log/messages" type=AVC msg=audit(1163778366.201:13257): avc: denied { read } for pid=15715 comm="gnome-terminal" name=".gdmOFJZIT" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778366.201:13257): arch=40000003 syscall=33 success=yes exit=0 a0=bf985dd5 a1=4 a2=da3a64 a3=bf985dd5 items=0 ppid=1 pid=15715 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778366.281:13258): avc: denied { write } for pid=15715 comm="gnome-terminal" name="14281" dev=dm-0 ino=14567723 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778366.281:13258): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf9848e0 a2=df7770 a3=16 items=0 ppid=1 pid=15715 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778366.285:13259): avc: denied { read } for pid=15715 comm="gnome-terminal" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778366.285:13259): arch=40000003 syscall=33 success=yes exit=0 a0=9db9a38 a1=4 a2=df7770 a3=9db9a38 items=0 ppid=1 pid=15715 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_CHAUTHTOK msg=audit(1163778395.927:13260): user pid=15742 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=apache exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/1 res=failed)' type=AVC msg=audit(1163778415.932:13261): avc: denied { read } for pid=15584 comm="tail" name="messages" dev=dm-0 ino=14437053 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778415.932:13261): arch=40000003 syscall=3 success=yes exit=68 a0=3 a1=bf86d6a4 a2=2000 a3=2000 items=0 ppid=15501 pid=15584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 comm="tail" exe="/usr/bin/tail" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778415.932:13261): path="/var/log/messages" type=AVC msg=audit(1163778417.000:13262): avc: denied { lock } for pid=14914 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778417.000:13262): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bf8bcea8 a3=0 items=0 ppid=14912 pid=14914 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778417.000:13262): path="/var/run/utmp" type=AVC msg=audit(1163778601.220:13263): avc: denied { execute } for pid=15789 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.220:13263): avc: denied { execute_no_trans } for pid=15789 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.220:13263): avc: denied { read } for pid=15789 comm="sshd" name="sshd" dev=dm-0 ino=10315312 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.220:13263): arch=40000003 syscall=11 success=yes exit=0 a0=9f1c3e0 a1=9f20020 a2=9f1c3f8 a3=4 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778601.220:13263): path="/usr/sbin/sshd" type=AVC_PATH msg=audit(1163778601.220:13263): path="/usr/sbin/sshd" type=AVC msg=audit(1163778601.352:13264): avc: denied { read } for pid=15789 comm="sshd" name="ssh_host_rsa_key" dev=dm-0 ino=9331557 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.352:13264): arch=40000003 syscall=5 success=yes exit=3 a0=6af425 a1=8000 a2=0 a3=8000 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778601.452:13265): avc: denied { setuid } for pid=15791 comm="sshd" capability=7 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163778601.452:13265): arch=40000003 syscall=208 success=yes exit=0 a0=4a a1=4a a2=4a a3=0 items=0 ppid=15789 pid=15791 auid=500 uid=74 gid=74 euid=74 suid=74 fsuid=74 egid=74 sgid=74 fsgid=74 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163778601.492:13266): user pid=15790 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163778601.492:13267): login pid=15790 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163778601.492:13268): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163778601.492:13269): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778601.496:13270): avc: denied { execute } for pid=15792 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163778601.496:13270): avc: denied { execute_no_trans } for pid=15792 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.496:13270): arch=40000003 syscall=11 success=yes exit=0 a0=81131b0 a1=8113358 a2=8113290 a3=8113008 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.496:13270): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163778601.516:13271): avc: denied { execute } for pid=15792 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.516:13271): avc: denied { execute_no_trans } for pid=15792 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163778601.516:13271): avc: denied { read } for pid=15792 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13271): arch=40000003 syscall=11 success=yes exit=0 a0=8cb0d48 a1=8cb0740 a2=8cb0d60 a3=8cb0740 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.516:13271): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163778601.516:13271): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163778601.516:13272): avc: denied { search } for pid=15792 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163778601.516:13272): avc: denied { read } for pid=15792 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13272): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=82bd7f8 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13273): avc: denied { getattr } for pid=15792 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13273): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8b31d8 a2=24bff4 a3=82bd7f8 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.516:13273): path="/proc/net/dev" type=AVC msg=audit(1163778601.516:13274): avc: denied { search } for pid=15792 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163778601.516:13274): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b3584 a1=0 a2=bf8b3478 a3=bf8b3480 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13275): avc: denied { read append } for pid=15792 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13275): arch=40000003 syscall=5 success=yes exit=3 a0=bf8b3584 a1=402 a2=bf8b3748 a3=bf8b3480 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13276): avc: denied { search } for pid=15792 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163778601.516:13276): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=82be348 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778601.516:13277): avc: denied { lock } for pid=15792 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.516:13277): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bf8b3480 a3=3 items=0 ppid=15790 pid=15792 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778601.516:13277): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163778601.548:13278): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163778601.548:13279): user pid=15790 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163778601.820:13280): avc: denied { read } for pid=15789 comm="sshd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163778601.820:13280): arch=40000003 syscall=5 success=yes exit=4 a0=432e73 a1=0 a2=1b6 a3=93afd10 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778602.504:13281): avc: denied { audit_write } for pid=15789 comm="sshd" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_LOGIN msg=audit(1163778602.504:13282): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='acct=kmacmill: exe="/usr/sbin/sshd" (hostname=?, addr=192.168.1.106, terminal=sshd res=failed)' type=SYSCALL msg=audit(1163778602.504:13281): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bfc19c40 a2=30dff4 a3=bfc20680 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_LOGIN msg=audit(1163778602.508:13283): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='acct=kmacmill: exe="/usr/sbin/sshd" (hostname=?, addr=192.168.1.106, terminal=sshd res=failed)' type=USER_AUTH msg=audit(1163778605.384:13284): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=USER_ACCT msg=audit(1163778605.384:13285): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=AVC msg=audit(1163778605.428:13286): avc: denied { write } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1163778605.428:13286): avc: denied { link } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=key type=SYSCALL msg=audit(1163778605.428:13286): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=1f4 items=0 ppid=15789 pid=15793 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.428:13287): avc: denied { audit_control } for pid=15793 comm="sshd" capability=30 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=LOGIN msg=audit(1163778605.428:13288): login pid=15793 uid=0 old auid=500 new auid=500 type=SYSCALL msg=audit(1163778605.428:13287): arch=40000003 syscall=4 success=yes exit=3 a0=6 a1=bfc24ac8 a2=3 a3=3 items=0 ppid=15789 pid=15793 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_START msg=audit(1163778605.428:13289): user pid=15793 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=CRED_REFR msg=audit(1163778605.428:13290): user pid=15793 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=ssh res=success)' type=AVC msg=audit(1163778605.512:13291): avc: denied { setexec } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778605.512:13291): arch=40000003 syscall=4 success=yes exit=35 a0=6 a1=93a6dd8 a2=23 a3=62a751 items=0 ppid=15789 pid=15793 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.528:13292): avc: denied { relabelfrom } for pid=15789 comm="sshd" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163778605.528:13292): avc: denied { relabelto } for pid=15789 comm="sshd" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.528:13292): arch=40000003 syscall=226 success=yes exit=0 a0=6c7df4 a1=62a0d3 a2=93b8f60 a3=23 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.540:13293): avc: denied { read } for pid=15789 comm="sshd" name="lastlog" dev=dm-0 ino=14437088 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lastlog_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.540:13293): arch=40000003 syscall=5 success=yes exit=7 a0=bfc23f68 a1=8000 a2=0 a3=8000 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_LOGIN msg=audit(1163778605.544:13294): user pid=15789 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='uid=500: exe="/usr/sbin/sshd" (hostname=laptop.localdomain, addr=192.168.1.106, terminal=/dev/pts/8 res=success)' type=AVC msg=audit(1163778605.548:13295): avc: denied { write } for pid=15789 comm="sshd" name="lastlog" dev=dm-0 ino=14437088 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:lastlog_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.548:13295): arch=40000003 syscall=5 success=yes exit=7 a0=bfc24238 a1=8042 a2=180 a3=8042 items=0 ppid=8872 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778605.568:13296): avc: denied { entrypoint } for pid=15794 comm="sshd" name="bash" dev=dm-0 ino=13683670 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.568:13296): avc: denied { read write } for pid=15794 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.568:13296): arch=40000003 syscall=11 success=yes exit=0 a0=93a77e8 a1=bfc23458 a2=93a7420 a3=0 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.568:13296): path="/bin/bash" type=AVC msg=audit(1163778605.568:13297): avc: denied { search } for pid=15794 comm="bash" name="/" dev=devpts ino=1 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:devpts_t:s0 tclass=dir type=SYSCALL msg=audit(1163778605.568:13297): arch=40000003 syscall=5 success=yes exit=3 a0=80cfa3a a1=8802 a2=0 a3=8802 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778605.568:13298): avc: denied { ioctl } for pid=15794 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.568:13298): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5401 a2=bfd668f8 a3=bfd66938 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.568:13298): path="/dev/pts/8" type=AVC msg=audit(1163778605.588:13299): avc: denied { search } for pid=15794 comm="bash" name="spool" dev=dm-0 ino=14436617 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=AVC msg=audit(1163778605.588:13299): avc: denied { search } for pid=15794 comm="bash" name="mail" dev=dm-0 ino=14436619 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=AVC msg=audit(1163778605.588:13299): avc: denied { getattr } for pid=15794 comm="bash" name="kmacmill" dev=dm-0 ino=14437393 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.588:13299): arch=40000003 syscall=195 success=yes exit=0 a0=9dc9e38 a1=bfd66024 a2=457ff4 a3=bfd66024 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.588:13299): path="/var/spool/mail/kmacmill" type=AVC msg=audit(1163778605.628:13300): avc: denied { execute } for pid=15798 comm="bash" name="hostname" dev=dm-0 ino=13683750 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.628:13300): avc: denied { execute_no_trans } for pid=15798 comm="bash" name="hostname" dev=dm-0 ino=13683750 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.628:13300): avc: denied { read } for pid=15798 comm="bash" name="hostname" dev=dm-0 ino=13683750 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.628:13300): arch=40000003 syscall=11 success=yes exit=0 a0=9dcce50 a1=9dcc0a8 a2=9dccf80 a3=9dccbc0 items=0 ppid=15797 pid=15798 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="hostname" exe="/bin/hostname" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.628:13300): path="/bin/hostname" type=AVC_PATH msg=audit(1163778605.628:13300): path="/bin/hostname" type=AVC msg=audit(1163778605.648:13301): avc: denied { read } for pid=15794 comm="bash" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163778605.648:13301): arch=40000003 syscall=5 success=yes exit=3 a0=80d2437 a1=18800 a2=459120 a3=9dcdaa8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778605.684:13302): avc: denied { execute } for pid=15811 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.684:13302): avc: denied { execute_no_trans } for pid=15811 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778605.684:13302): avc: denied { read } for pid=15811 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.684:13302): arch=40000003 syscall=11 success=yes exit=0 a0=9dd54d8 a1=9dd4e48 a2=9dcf728 a3=9dd4ee0 items=0 ppid=15810 pid=15811 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.684:13302): path="/sbin/consoletype" type=AVC_PATH msg=audit(1163778605.684:13302): path="/sbin/consoletype" type=AVC msg=audit(1163778605.688:13303): avc: denied { getattr } for pid=15811 comm="consoletype" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778605.688:13303): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfeb3ffc a2=c8eff4 a3=bfeb3ffc items=0 ppid=15810 pid=15811 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.688:13303): path="/dev/pts/8" type=AVC msg=audit(1163778605.708:13304): avc: denied { read } for pid=15794 comm="bash" name=".bash_profile" dev=dm-0 ino=11884821 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.708:13304): arch=40000003 syscall=5 success=yes exit=3 a0=9dcbac0 a1=8000 a2=0 a3=8000 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778605.708:13305): avc: denied { getattr } for pid=15794 comm="bash" name=".bash_profile" dev=dm-0 ino=11884821 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778605.708:13305): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd668c4 a2=457ff4 a3=9dcbac0 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778605.708:13305): path="/home/kmacmill/.bash_profile" type=AVC msg=audit(1163778606.368:13306): avc: denied { getattr } for pid=15794 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13306): arch=40000003 syscall=195 success=yes exit=0 a0=9dd2670 a1=bfd66590 a2=457ff4 a3=9dd2670 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778606.368:13306): path="/bin/ls" type=AVC msg=audit(1163778606.368:13307): avc: denied { execute } for pid=15794 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13307): arch=40000003 syscall=33 success=yes exit=0 a0=9dd2670 a1=1 a2=11 a3=9dd2670 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778606.368:13308): avc: denied { read } for pid=15794 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13308): arch=40000003 syscall=33 success=yes exit=0 a0=9dd2670 a1=4 a2=ffffffff a3=9dd2670 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778606.368:13309): avc: denied { execute_no_trans } for pid=15818 comm="bash" name="ls" dev=dm-0 ino=13683768 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:ls_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778606.368:13309): arch=40000003 syscall=11 success=yes exit=0 a0=9dd2670 a1=9dd54f0 a2=9de05c0 a3=9de04f8 items=0 ppid=15794 pid=15818 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="ls" exe="/bin/ls" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778606.368:13309): path="/bin/ls" type=AVC msg=audit(1163778612.949:13310): avc: denied { getattr } for pid=15819 comm="top" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13310): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13310): path="/proc/1" type=AVC msg=audit(1163778612.949:13311): avc: denied { search } for pid=15819 comm="top" name="1" dev=proc ino=65538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13311): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=65549 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13311): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13312): avc: denied { getattr } for pid=15819 comm="top" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13312): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13312): path="/proc/2" type=AVC msg=audit(1163778612.949:13313): avc: denied { search } for pid=15819 comm="top" name="2" dev=proc ino=131074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13313): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=131085 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13313): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13314): avc: denied { getattr } for pid=15819 comm="top" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13314): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13314): path="/proc/1865" type=AVC msg=audit(1163778612.949:13315): avc: denied { search } for pid=15819 comm="top" name="1865" dev=proc ino=122224642 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13315): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=122224653 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13315): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13316): avc: denied { getattr } for pid=15819 comm="top" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13316): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13316): path="/proc/1881" type=AVC msg=audit(1163778612.949:13317): avc: denied { search } for pid=15819 comm="top" name="1881" dev=proc ino=123273218 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13317): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=123273229 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13317): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13318): avc: denied { getattr } for pid=15819 comm="top" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13318): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13318): path="/proc/1884" type=AVC msg=audit(1163778612.949:13319): avc: denied { search } for pid=15819 comm="top" name="1884" dev=proc ino=123469826 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13319): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=123469837 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13319): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13320): avc: denied { getattr } for pid=15819 comm="top" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13320): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13320): path="/proc/1896" type=AVC msg=audit(1163778612.949:13321): avc: denied { search } for pid=15819 comm="top" name="1896" dev=proc ino=124256258 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13321): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=124256269 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13321): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13322): avc: denied { getattr } for pid=15819 comm="top" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.949:13322): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13322): path="/proc/1912" type=AVC msg=audit(1163778612.949:13323): avc: denied { search } for pid=15819 comm="top" name="1912" dev=proc ino=125304834 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.949:13323): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=125304845 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.949:13323): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13324): avc: denied { getattr } for pid=15819 comm="top" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13324): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13324): path="/proc/1925" type=AVC msg=audit(1163778612.949:13325): avc: denied { search } for pid=15819 comm="top" name="1925" dev=proc ino=126156802 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13325): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=126156813 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13325): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13326): avc: denied { getattr } for pid=15819 comm="top" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13326): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13326): path="/proc/1959" type=AVC msg=audit(1163778612.949:13327): avc: denied { search } for pid=15819 comm="top" name="1959" dev=proc ino=128385026 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13327): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=128385037 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13327): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13328): avc: denied { getattr } for pid=15819 comm="top" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13328): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13328): path="/proc/2033" type=AVC msg=audit(1163778612.949:13329): avc: denied { search } for pid=15819 comm="top" name="2033" dev=proc ino=133234690 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13329): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=133234701 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13329): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13330): avc: denied { getattr } for pid=15819 comm="top" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13330): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13330): path="/proc/2123" type=AVC msg=audit(1163778612.949:13331): avc: denied { search } for pid=15819 comm="top" name="2123" dev=proc ino=139132930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13331): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=139132941 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13331): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13332): avc: denied { getattr } for pid=15819 comm="top" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13332): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13332): path="/proc/2142" type=AVC msg=audit(1163778612.949:13333): avc: denied { search } for pid=15819 comm="top" name="2142" dev=proc ino=140378114 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13333): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=140378125 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13333): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13334): avc: denied { getattr } for pid=15819 comm="top" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13334): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13334): path="/proc/2153" type=AVC msg=audit(1163778612.949:13335): avc: denied { search } for pid=15819 comm="top" name="2153" dev=proc ino=141099010 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13335): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=141099021 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13335): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.949:13336): avc: denied { getattr } for pid=15819 comm="top" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.949:13336): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.949:13336): path="/proc/2196" type=AVC msg=audit(1163778612.949:13337): avc: denied { search } for pid=15819 comm="top" name="2196" dev=proc ino=143917058 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=dir type=AVC msg=audit(1163778612.949:13337): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=143917069 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.949:13337): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13338): avc: denied { getattr } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13338): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13338): path="/proc/2216" type=AVC msg=audit(1163778612.957:13339): avc: denied { search } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13339): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=145227789 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13339): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13340): avc: denied { getattr } for pid=15819 comm="top" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13340): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13340): path="/proc/2237" type=AVC msg=audit(1163778612.957:13341): avc: denied { search } for pid=15819 comm="top" name="2237" dev=proc ino=146604034 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13341): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=146604045 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13341): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13342): avc: denied { getattr } for pid=15819 comm="top" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.957:13342): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13342): path="/proc/2248" type=AVC msg=audit(1163778612.957:13343): avc: denied { search } for pid=15819 comm="top" name="2248" dev=proc ino=147324930 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.957:13343): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=147324941 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.957:13343): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13344): avc: denied { getattr } for pid=15819 comm="top" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13344): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13344): path="/proc/2285" type=AVC msg=audit(1163778612.957:13345): avc: denied { search } for pid=15819 comm="top" name="2285" dev=proc ino=149749762 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13345): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=149749773 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13345): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13346): avc: denied { getattr } for pid=15819 comm="top" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13346): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13346): path="/proc/2401" type=AVC msg=audit(1163778612.957:13347): avc: denied { search } for pid=15819 comm="top" name="2401" dev=proc ino=157351938 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13347): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=157351949 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13347): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13348): avc: denied { getattr } for pid=15819 comm="top" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13348): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13348): path="/proc/2723" type=AVC msg=audit(1163778612.957:13349): avc: denied { search } for pid=15819 comm="top" name="2723" dev=proc ino=178454530 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13349): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=178454541 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13349): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13350): avc: denied { getattr } for pid=15819 comm="top" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13350): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13350): path="/proc/2732" type=AVC msg=audit(1163778612.957:13351): avc: denied { search } for pid=15819 comm="top" name="2732" dev=proc ino=179044354 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13351): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=179044365 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13351): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.957:13352): avc: denied { getattr } for pid=15819 comm="top" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.957:13352): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.957:13352): path="/proc/2735" type=AVC msg=audit(1163778612.957:13353): avc: denied { search } for pid=15819 comm="top" name="2735" dev=proc ino=179240962 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=dir type=AVC msg=audit(1163778612.957:13353): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=179240973 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.957:13353): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.965:13354): avc: denied { getattr } for pid=15819 comm="top" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.965:13354): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.965:13354): path="/proc/3150" type=AVC msg=audit(1163778612.965:13355): avc: denied { search } for pid=15819 comm="top" name="3150" dev=proc ino=206438402 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=dir type=AVC msg=audit(1163778612.965:13355): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=206438413 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.965:13355): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.965:13356): avc: denied { getattr } for pid=15819 comm="top" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.965:13356): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.965:13356): path="/proc/3172" type=AVC msg=audit(1163778612.965:13357): avc: denied { search } for pid=15819 comm="top" name="3172" dev=proc ino=207880194 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=dir type=AVC msg=audit(1163778612.965:13357): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=207880205 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.965:13357): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.965:13358): avc: denied { getattr } for pid=15819 comm="top" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.965:13358): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.965:13358): path="/proc/3201" type=AVC msg=audit(1163778612.965:13359): avc: denied { search } for pid=15819 comm="top" name="3201" dev=proc ino=209780738 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.965:13359): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=209780749 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.965:13359): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13360): avc: denied { getattr } for pid=15819 comm="top" name="6659" dev=proc ino=436404226 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13360): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13360): path="/proc/6659" type=AVC msg=audit(1163778612.969:13361): avc: denied { search } for pid=15819 comm="top" name="6659" dev=proc ino=436404226 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13361): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=436404237 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13361): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13362): avc: denied { getattr } for pid=15819 comm="top" name="6687" dev=proc ino=438239234 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13362): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13362): path="/proc/6687" type=AVC msg=audit(1163778612.969:13363): avc: denied { search } for pid=15819 comm="top" name="6687" dev=proc ino=438239234 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13363): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=438239245 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13363): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13364): avc: denied { getattr } for pid=15819 comm="top" name="14252" dev=proc ino=934019074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=SYSCALL msg=audit(1163778612.969:13364): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13364): path="/proc/14252" type=AVC msg=audit(1163778612.969:13365): avc: denied { search } for pid=15819 comm="top" name="14252" dev=proc ino=934019074 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=dir type=AVC msg=audit(1163778612.969:13365): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=934019085 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=file type=SYSCALL msg=audit(1163778612.969:13365): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13366): avc: denied { getattr } for pid=15819 comm="top" name="14333" dev=proc ino=939327490 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13366): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13366): path="/proc/14333" type=AVC msg=audit(1163778612.969:13367): avc: denied { search } for pid=15819 comm="top" name="14333" dev=proc ino=939327490 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13367): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=939327501 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13367): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13368): avc: denied { getattr } for pid=15819 comm="top" name="14914" dev=proc ino=977403906 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13368): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13368): path="/proc/14914" type=AVC msg=audit(1163778612.969:13369): avc: denied { search } for pid=15819 comm="top" name="14914" dev=proc ino=977403906 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13369): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=977403917 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13369): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13370): avc: denied { getattr } for pid=15819 comm="top" name="14970" dev=proc ino=981073922 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13370): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13370): path="/proc/14970" type=AVC msg=audit(1163778612.969:13371): avc: denied { search } for pid=15819 comm="top" name="14970" dev=proc ino=981073922 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13371): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=981073933 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13371): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13372): avc: denied { getattr } for pid=15819 comm="top" name="15125" dev=proc ino=991232002 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13372): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13372): path="/proc/15125" type=AVC msg=audit(1163778612.969:13373): avc: denied { search } for pid=15819 comm="top" name="15125" dev=proc ino=991232002 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13373): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=991232013 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:newrole_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13373): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13374): avc: denied { getattr } for pid=15819 comm="top" name="15126" dev=proc ino=991297538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13374): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13374): path="/proc/15126" type=AVC msg=audit(1163778612.969:13375): avc: denied { search } for pid=15819 comm="top" name="15126" dev=proc ino=991297538 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13375): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=991297549 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13375): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778612.969:13376): avc: denied { getattr } for pid=15819 comm="top" name="15713" dev=proc ino=1029767170 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:rpm_t:s0 tclass=dir type=SYSCALL msg=audit(1163778612.969:13376): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778612.969:13376): path="/proc/15713" type=AVC msg=audit(1163778612.969:13377): avc: denied { search } for pid=15819 comm="top" name="15713" dev=proc ino=1029767170 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:rpm_t:s0 tclass=dir type=AVC msg=audit(1163778612.969:13377): avc: denied { read } for pid=15819 comm="top" name="stat" dev=proc ino=1029767181 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:rpm_t:s0 tclass=file type=SYSCALL msg=audit(1163778612.969:13377): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778613.469:13378): avc: denied { getattr } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163778613.469:13378): arch=40000003 syscall=195 success=yes exit=0 a0=9b3783c a1=bff6335c a2=24bff4 a3=bff6335c items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.469:13378): path="/proc/2216" type=AVC msg=audit(1163778613.469:13379): avc: denied { search } for pid=15819 comm="top" name="2216" dev=proc ino=145227778 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=dir type=SYSCALL msg=audit(1163778613.469:13379): arch=40000003 syscall=5 success=yes exit=4 a0=c64780 a1=0 a2=0 a3=c64780 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778613.477:13380): avc: denied { read } for pid=15819 comm="top" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778613.477:13380): arch=40000003 syscall=5 success=yes exit=4 a0=2346d2 a1=0 a2=bff633e8 a3=2346d8 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778613.477:13381): avc: denied { lock } for pid=15819 comm="top" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778613.477:13381): arch=40000003 syscall=221 success=yes exit=0 a0=4 a1=7 a2=bff633a0 a3=0 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13381): path="/var/run/utmp" type=AVC msg=audit(1163778613.477:13382): avc: denied { write } for pid=15819 comm="top" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778613.477:13382): arch=40000003 syscall=4 success=yes exit=2048 a0=1 a1=8056ba0 a2=800 a3=800 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13382): path="/dev/pts/8" type=AVC msg=audit(1163778613.477:13383): avc: denied { read } for pid=15819 comm="top" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778613.477:13383): arch=40000003 syscall=3 success=no exit=-11 a0=0 a1=bff63c05 a2=1 a3=1 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13383): path="/dev/pts/8" type=AVC msg=audit(1163778613.477:13384): avc: denied { ioctl } for pid=15819 comm="top" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778613.477:13384): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=540b a2=0 a3=1 items=0 ppid=15794 pid=15819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="top" exe="/usr/bin/top" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778613.477:13384): path="/dev/pts/8" type=AVC msg=audit(1163778633.746:13385): avc: denied { getattr } for pid=15794 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13385): arch=40000003 syscall=195 success=yes exit=0 a0=9de04f8 a1=bfd66590 a2=457ff4 a3=9de04f8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778633.746:13385): path="/bin/su" type=AVC msg=audit(1163778633.746:13386): avc: denied { execute } for pid=15794 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13386): arch=40000003 syscall=33 success=yes exit=0 a0=9de04f8 a1=1 a2=11 a3=9de04f8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778633.746:13387): avc: denied { read } for pid=15794 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13387): arch=40000003 syscall=33 success=yes exit=0 a0=9de04f8 a1=4 a2=ffffffff a3=9de04f8 items=0 ppid=15793 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778633.746:13388): avc: denied { execute_no_trans } for pid=15820 comm="bash" name="su" dev=dm-0 ino=13683691 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:su_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.746:13388): arch=40000003 syscall=11 success=yes exit=0 a0=9de04f8 a1=9de0508 a2=9de05c0 a3=9de71b8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778633.746:13388): path="/bin/su" type=AVC msg=audit(1163778633.754:13389): avc: denied { read } for pid=15820 comm="su" name="shadow" dev=dm-0 ino=9332039 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.754:13389): arch=40000003 syscall=5 success=yes exit=3 a0=40d304 a1=0 a2=1b6 a3=8011aa8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778633.754:13390): avc: denied { getattr } for pid=15820 comm="su" name="shadow" dev=dm-0 ino=9332039 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file type=SYSCALL msg=audit(1163778633.754:13390): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bffb8de8 a2=c35ff4 a3=8011aa8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778633.754:13390): path="/etc/shadow" type=AVC msg=audit(1163778637.098:13391): avc: denied { create } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163778637.098:13391): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bffb8f50 a2=130ff4 a3=0 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.098:13392): avc: denied { write } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163778637.098:13392): avc: denied { nlmsg_relay } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163778637.098:13392): avc: denied { audit_write } for pid=15820 comm="su" capability=29 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=capability type=USER_AUTH msg=audit(1163778637.102:13393): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=SYSCALL msg=audit(1163778637.098:13392): arch=40000003 syscall=102 success=yes exit=112 a0=b a1=bffae1d0 a2=130ff4 a3=bffb4c10 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.102:13394): avc: denied { read } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163778637.102:13394): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bffae180 a2=130ff4 a3=bffb054c items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_ACCT msg=audit(1163778637.102:13395): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163778637.102:13396): avc: denied { write } for pid=15820 comm="su" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.102:13396): arch=40000003 syscall=5 success=yes exit=3 a0=c1e6d2 a1=2 a2=0 a3=c1e6d8 items=0 ppid=15794 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts8 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_START msg=audit(1163778637.102:13397): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=CRED_ACQ msg=audit(1163778637.102:13398): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163778637.106:13399): avc: denied { search } for pid=15821 comm="bash" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778637.106:13399): avc: denied { read } for pid=15821 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.106:13399): arch=40000003 syscall=5 success=yes exit=3 a0=9a6ff70 a1=8000 a2=0 a3=8000 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.106:13400): avc: denied { getattr } for pid=15821 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.106:13400): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8de094 a2=24bff4 a3=9a6ff70 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.106:13400): path="/root/.bashrc" type=AVC msg=audit(1163778637.162:13401): avc: denied { execute } for pid=15834 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778637.162:13401): avc: denied { execute_no_trans } for pid=15834 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=AVC msg=audit(1163778637.162:13401): avc: denied { read } for pid=15834 comm="bash" name="consoletype" dev=dm-0 ino=9984625 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:consoletype_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.162:13401): arch=40000003 syscall=11 success=yes exit=0 a0=9a82690 a1=9a820c0 a2=9a7cba8 a3=9a82158 items=0 ppid=15833 pid=15834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.162:13401): path="/sbin/consoletype" type=AVC_PATH msg=audit(1163778637.162:13401): path="/sbin/consoletype" type=AVC msg=audit(1163778637.162:13402): avc: denied { getattr } for pid=15834 comm="consoletype" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778637.162:13402): arch=40000003 syscall=197 success=yes exit=0 a0=0 a1=bfe386cc a2=fe9ff4 a3=bfe386cc items=0 ppid=15833 pid=15834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.162:13402): path="/dev/pts/8" type=AVC msg=audit(1163778637.190:13403): avc: denied { read } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.190:13403): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8000 a2=0 a3=8000 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778637.190:13404): avc: denied { getattr } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778637.190:13404): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8de02c a2=24bff4 a3=0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778637.190:13404): path="/root/.bash_history" type=AVC msg=audit(1163778643.866:13405): avc: denied { getattr } for pid=15821 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13405): arch=40000003 syscall=195 success=yes exit=0 a0=9a82dd0 a1=bf8ddd60 a2=24bff4 a3=9a82dd0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778643.866:13405): path="/usr/bin/newrole" type=AVC msg=audit(1163778643.866:13406): avc: denied { execute } for pid=15821 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13406): arch=40000003 syscall=33 success=yes exit=0 a0=9a82dd0 a1=1 a2=11 a3=9a82dd0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13407): avc: denied { read } for pid=15821 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13407): arch=40000003 syscall=33 success=yes exit=0 a0=9a82dd0 a1=4 a2=ffffffff a3=9a82dd0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13408): avc: denied { execute_no_trans } for pid=15841 comm="bash" name="newrole" dev=dm-0 ino=10325592 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:newrole_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13408): arch=40000003 syscall=11 success=yes exit=0 a0=9a82dd0 a1=9a819b0 a2=9a7cba8 a3=9a82d08 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778643.866:13408): path="/usr/bin/newrole" type=AVC msg=audit(1163778643.866:13409): avc: denied { search } for pid=15841 comm="newrole" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163778643.866:13409): avc: denied { read } for pid=15841 comm="newrole" name="default_type" dev=dm-0 ino=9334403 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13409): arch=40000003 syscall=5 success=yes exit=3 a0=9bc5040 a1=8000 a2=1b6 a3=9bc6c98 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13410): avc: denied { getattr } for pid=15841 comm="newrole" name="default_type" dev=dm-0 ino=9334403 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13410): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bff78d40 a2=743ff4 a3=9bc6c98 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163778643.866:13410): path="/etc/selinux/strict/contexts/default_type" type=AVC msg=audit(1163778643.866:13411): avc: denied { write } for pid=15841 comm="newrole" name="context" dev=selinuxfs ino=5 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=file type=SYSCALL msg=audit(1163778643.866:13411): arch=40000003 syscall=5 success=yes exit=3 a0=bff77f88 a1=8002 a2=0 a3=8002 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778643.866:13412): avc: denied { check_context } for pid=15841 comm="newrole" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=SYSCALL msg=audit(1163778643.866:13412): arch=40000003 syscall=4 success=yes exit=29 a0=3 a1=9bc6d28 a2=1d a3=bff77f88 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_AUTH msg=audit(1163778645.667:13413): user pid=15841 uid=0 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/8 res=success)' type=USER_ACCT msg=audit(1163778645.667:13414): user pid=15841 uid=0 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163778645.667:13415): avc: denied { compute_relabel } for pid=15841 comm="newrole" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=SYSCALL msg=audit(1163778645.667:13415): arch=40000003 syscall=4 success=yes exit=66 a0=4 a1=9bcd788 a2=42 a3=9bcd788 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.667:13416): avc: denied { fowner } for pid=15841 comm="newrole" capability=3 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=capability type=AVC msg=audit(1163778645.667:13416): avc: denied { relabelfrom } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163778645.667:13416): avc: denied { relabelto } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778645.667:13416): arch=40000003 syscall=228 success=yes exit=0 a0=3 a1=a2f0d3 a2=9bcd6a8 a3=24 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.667:13417): avc: denied { read } for pid=15842 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778645.667:13417): arch=40000003 syscall=5 success=yes exit=0 a0=9bc5c90 a1=0 a2=a a3=9bc5c90 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.667:13418): avc: denied { write } for pid=15842 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778645.667:13418): arch=40000003 syscall=5 success=yes exit=1 a0=9bc5c90 a1=1 a2=a a3=9bc5c90 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.671:13419): avc: denied { setexec } for pid=15842 comm="newrole" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=process type=SYSCALL msg=audit(1163778645.671:13419): arch=40000003 syscall=4 success=yes exit=29 a0=3 a1=9bcd658 a2=1d a3=a2f751 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163778645.671:13420): avc: denied { transition } for pid=15842 comm="newrole" name="bash" dev=dm-0 ino=13683670 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=AVC msg=audit(1163778645.671:13420): avc: denied { use } for pid=15842 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=AVC msg=audit(1163778645.671:13420): avc: denied { siginh } for pid=15842 comm="bash" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=AVC msg=audit(1163778645.671:13420): avc: denied { rlimitinh } for pid=15842 comm="bash" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=AVC msg=audit(1163778645.671:13420): avc: denied { noatsecure } for pid=15842 comm="bash" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:sysadm_r:sysadm_t:s0 tclass=process type=SYSCALL msg=audit(1163778645.671:13420): arch=40000003 syscall=11 success=yes exit=0 a0=9bc6f68 a1=bff7919c a2=9bc6d98 a3=9bc5c90 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1163778645.671:13420): path="/dev/pts/8" type=AVC_PATH msg=audit(1163778645.671:13420): path="/bin/bash" type=AVC msg=audit(1163778645.723:13421): avc: denied { use } for pid=15852 comm="hostname" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:hostname_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163778645.723:13421): arch=40000003 syscall=11 success=yes exit=0 a0=83064d0 a1=83091e8 a2=8309980 a3=8308440 items=0 ppid=15851 pid=15852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="hostname" exe="/bin/hostname" subj=staff_u:sysadm_r:hostname_t:s0 key=(null) type=AVC_PATH msg=audit(1163778645.723:13421): path="/dev/pts/8" type=AVC msg=audit(1163778645.755:13422): avc: denied { use } for pid=15865 comm="consoletype" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:consoletype_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163778645.755:13422): arch=40000003 syscall=11 success=yes exit=0 a0=8312288 a1=8311be0 a2=830bbf0 a3=8311c78 items=0 ppid=15864 pid=15865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="consoletype" exe="/sbin/consoletype" subj=staff_u:sysadm_r:consoletype_t:s0 key=(null) type=AVC_PATH msg=audit(1163778645.755:13422): path="/dev/pts/8" type=AVC msg=audit(1163778648.635:13423): avc: denied { use } for pid=15842 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163778648.635:13423): arch=40000003 syscall=54 success=yes exit=0 a0=ff a1=5410 a2=bfef9f84 a3=bfef9f8c items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1163778648.635:13423): path="/dev/pts/8" type=AVC msg=audit(1163778675.468:13424): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163778675.468:13424): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778682.377:13425): avc: denied { sigkill } for pid=15880 comm="pkill" scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163778682.377:13425): arch=40000003 syscall=37 success=yes exit=0 a0=37ac a1=9 a2=0 a3=8e790b0 items=0 ppid=15842 pid=15880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="pkill" exe="/usr/bin/pkill" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13426): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163778682.477:13426): arch=40000003 syscall=102 success=yes exit=99 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13427): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.477:13427): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13428): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13428): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13428): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778682.477:13428): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13429): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13429): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778682.477:13429): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13430): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=166623 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13430): avc: denied { add_name } for pid=11049 comm="udevd" name="class@vc@vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778682.477:13430): avc: denied { create } for pid=11049 comm="udevd" name="class@vc@vcs7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.477:13430): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13431): avc: denied { unlink } for pid=15881 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=154266 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778682.477:13431): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=1b a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13432): avc: denied { getattr } for pid=15881 comm="udevd" name="vcs7" dev=tmpfs ino=154265 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778682.477:13432): arch=40000003 syscall=195 success=yes exit=0 a0=bfed2dc8 a1=bfed2b68 a2=24bff4 a3=bfed2dc8 items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778682.477:13432): path="/dev/vcs7" type=AVC msg=audit(1163778682.477:13433): avc: denied { setattr } for pid=15881 comm="udevd" name="vcs7" dev=tmpfs ino=154265 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778682.477:13433): arch=40000003 syscall=212 success=yes exit=0 a0=bfed2dc8 a1=0 a2=0 a3=bfed2dc8 items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.477:13434): avc: denied { unlink } for pid=15881 comm="udevd" name="vcs7" dev=tmpfs ino=154265 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778682.477:13434): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dc8 a1=0 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.537:13435): avc: denied { append } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13435): arch=40000003 syscall=5 success=yes exit=3 a0=811c4e0 a1=8401 a2=0 a3=8401 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.537:13436): avc: denied { read } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13436): arch=40000003 syscall=5 success=yes exit=3 a0=811c4e0 a1=8000 a2=0 a3=8000 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778682.537:13437): avc: denied { write } for pid=15501 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13437): arch=40000003 syscall=5 success=yes exit=3 a0=811c4e0 a1=8201 a2=0 a3=8201 items=0 ppid=15498 pid=15501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163778682.537:13438): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163778682.537:13439): avc: denied { search } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778682.537:13439): avc: denied { write } for pid=15498 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778682.537:13439): avc: denied { remove_name } for pid=15498 comm="su" name=".xauthjIDizz" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778682.537:13439): avc: denied { unlink } for pid=15498 comm="su" name=".xauthjIDizz" dev=dm-0 ino=13127388 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778682.537:13439): arch=40000003 syscall=10 success=yes exit=0 a0=8dc69a8 a1=8dc6a86 a2=199ae8 a3=8dc3008 items=0 ppid=1 pid=15498 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_END msg=audit(1163778682.545:13440): user pid=15498 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/3 res=success)' type=AVC msg=audit(1163778683.001:13441): avc: denied { sendto } for pid=15881 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163778683.001:13441): arch=40000003 syscall=102 success=yes exit=142 a0=b a1=bfed27a0 a2=791234 a3=8e items=0 ppid=11049 pid=15881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.001:13442): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778683.001:13442): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778683.001:13442): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778683.001:13442): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.001:13443): avc: denied { remove_name } for pid=11049 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=166624 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163778683.001:13443): avc: denied { unlink } for pid=11049 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=166624 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163778683.001:13443): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=ffffffff a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.005:13444): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=166623 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778683.005:13444): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163778683.005:13445): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_END msg=audit(1163778683.005:13446): user pid=15636 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/5 res=success)' type=USER_END msg=audit(1163778683.381:13447): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session close acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_DISP msg=audit(1163778683.381:13448): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=AVC msg=audit(1163778683.997:13449): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163778683.997:13449): arch=40000003 syscall=102 success=yes exit=93 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778683.997:13450): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163778683.997:13450): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.001:13451): avc: denied { write } for pid=11049 comm="udevd" name="class@vc@vcs7" dev=tmpfs ino=167046 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163778684.001:13451): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.005:13452): avc: denied { mknod } for pid=15897 comm="udevd" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163778684.005:13452): avc: denied { create } for pid=15897 comm="udevd" name="vcsa7" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778684.005:13452): arch=40000003 syscall=14 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=787 a3=180 items=0 ppid=11049 pid=15897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.005:13453): avc: denied { create } for pid=15897 comm="udevd" name="class@vc@vcsa7" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778684.005:13453): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=15897 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.593:13454): avc: denied { unlink } for pid=15909 comm="udevd" name="class@vc@vcs8" dev=tmpfs ino=167555 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778684.593:13454): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=1b a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=15909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778684.745:13455): avc: denied { create } for pid=15915 comm="udevd" name="class@vc@vcs8" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163778684.745:13455): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=15915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163778701.194:13456): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=failed)' type=USER_LOGIN msg=audit(1163778701.194:13457): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=failed)' type=USER_AUTH msg=audit(1163778705.602:13458): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_ACCT msg=audit(1163778705.602:13459): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=CRED_ACQ msg=audit(1163778705.606:13460): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: setcred acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=LOGIN msg=audit(1163778705.622:13461): login pid=3285 uid=0 old auid=500 new auid=500 type=USER_START msg=audit(1163778705.670:13462): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='PAM: session open acct=kmacmill : exe="/usr/sbin/gdm-binary" (hostname=?, addr=?, terminal=:0 res=success)' type=USER_LOGIN msg=audit(1163778705.670:13463): user pid=3285 uid=0 auid=500 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 msg='uid=500: exe="/usr/sbin/gdm-binary" (hostname=localhost.localdomain, addr=127.0.0.1, terminal=:0 res=success)' type=AVC msg=audit(1163778706.358:13464): avc: denied { read } for pid=15931 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778706.358:13464): arch=40000003 syscall=5 success=yes exit=12 a0=80865d5 a1=0 a2=1 a3=d items=0 ppid=3285 pid=15931 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163778706.358:13465): avc: denied { getattr } for pid=15931 comm="gdm-binary" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778706.358:13465): arch=40000003 syscall=196 success=yes exit=0 a0=80865d5 a1=bfd7023c a2=c4eff4 a3=bfd7023c items=0 ppid=3285 pid=15931 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=500 fsgid=0 tty=(none) comm="gdm-binary" exe="/usr/sbin/gdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163778706.358:13465): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163778706.730:13466): avc: denied { read } for pid=15944 comm="xrdb" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778706.730:13466): arch=40000003 syscall=33 success=yes exit=0 a0=bf8fcfce a1=4 a2=da3a64 a3=bf8fcfce items=0 ppid=15931 pid=15944 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xrdb" exe="/usr/bin/xrdb" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778708.231:13467): avc: denied { getattr } for pid=15985 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163778708.231:13467): arch=40000003 syscall=100 success=yes exit=0 a0=5 a1=bff51e8c a2=39cff4 a3=ffffffb8 items=0 ppid=15984 pid=15985 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778709.227:13468): avc: denied { search } for pid=15985 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778709.227:13468): avc: denied { search } for pid=15985 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163778709.227:13468): arch=40000003 syscall=5 success=no exit=-2 a0=8e9ec68 a1=18800 a2=26625c a3=0 items=0 ppid=15984 pid=15985 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778709.231:13469): avc: denied { read } for pid=15986 comm="dbus-launch" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778709.231:13469): arch=40000003 syscall=33 success=yes exit=0 a0=bf87df80 a1=4 a2=112a64 a3=bf87df80 items=0 ppid=1 pid=15986 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-launch" exe="/usr/bin/dbus-launch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.215:13470): avc: denied { read } for pid=14973 comm="bash" name=".bash_logout" dev=dm-0 ino=13061690 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.215:13470): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bf08 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.267:13471): avc: denied { append } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.267:13471): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bec0 a1=8401 a2=0 a3=8401 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.267:13472): avc: denied { read } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.267:13472): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bec0 a1=8000 a2=0 a3=8000 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778716.267:13473): avc: denied { write } for pid=14973 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778716.267:13473): arch=40000003 syscall=5 success=yes exit=3 a0=8e0bec0 a1=8201 a2=0 a3=8201 items=0 ppid=14970 pid=14973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=CRED_DISP msg=audit(1163778716.267:13474): user pid=14970 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1163778716.271:13475): avc: denied { search } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163778716.271:13475): avc: denied { search } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=AVC msg=audit(1163778716.271:13475): avc: denied { write } for pid=14970 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=SYSCALL msg=audit(1163778716.271:13475): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=2abd1691 a2=1f4 a3=0 items=0 ppid=1 pid=14970 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778719.635:13476): avc: denied { write } for pid=15931 comm="gnome-session" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163778719.635:13476): avc: denied { add_name } for pid=15931 comm="gnome-session" name="15931" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163778719.635:13476): avc: denied { create } for pid=15931 comm="gnome-session" name="15931" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778719.635:13476): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf9a36d0 a2=df7770 a3=0 items=0 ppid=3285 pid=15931 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778719.643:13477): avc: denied { read } for pid=15931 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778719.643:13477): arch=40000003 syscall=5 success=yes exit=16 a0=84ee908 a1=0 a2=1b6 a3=84ee930 items=0 ppid=3285 pid=15931 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778719.643:13478): avc: denied { write } for pid=15931 comm="gnome-session" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778719.643:13478): arch=40000003 syscall=5 success=yes exit=16 a0=84ee908 a1=241 a2=1b6 a3=84f6f10 items=0 ppid=3285 pid=15931 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-session" exe="/usr/bin/gnome-session" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778719.711:13479): avc: denied { read write } for pid=16006 comm="gnome-settings-" name="[169926]" dev=sockfs ino=169926 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=netlink_selinux_socket type=SYSCALL msg=audit(1163778719.711:13479): arch=40000003 syscall=11 success=yes exit=0 a0=8ea5760 a1=8ea5098 a2=8ea58c8 a3=8ea50e0 items=0 ppid=16005 pid=16006 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-settings-" exe="/usr/libexec/gnome-settings-daemon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778719.711:13479): path="socket:[169926]" type=AVC msg=audit(1163778719.711:13480): avc: denied { sigchld } for pid=16005 comm="dbus-daemon" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163778719.711:13480): arch=40000003 syscall=7 success=yes exit=0 a0=3e86 a1=bff51b38 a2=1 a3=3e86 items=0 ppid=15987 pid=16005 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163778720.219:13481): avc: denied { read } for pid=16015 comm="esd" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163778720.219:13481): arch=40000003 syscall=5 success=yes exit=14 a0=9e6e258 a1=0 a2=1b6 a3=9e6e278 items=0 ppid=1 pid=16015 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="esd" exe="/usr/bin/esd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.264:13482): avc: denied { write } for pid=16425 comm="metacity" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778724.264:13482): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff4a550 a2=df7770 a3=16 items=0 ppid=1 pid=16425 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="metacity" exe="/usr/bin/metacity" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.784:13483): avc: denied { execute } for pid=16446 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778724.784:13483): arch=40000003 syscall=33 success=yes exit=0 a0=948f880 a1=1 a2=11 a3=948f880 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.784:13484): avc: denied { read } for pid=16446 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778724.784:13484): arch=40000003 syscall=33 success=yes exit=0 a0=948f880 a1=4 a2=ffffffff a3=948f880 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagle-search" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778724.784:13485): avc: denied { execute_no_trans } for pid=16446 comm="beagle-search" name="mono" dev=dm-0 ino=10321084 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:mono_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163778724.784:13485): arch=40000003 syscall=11 success=yes exit=0 a0=948f698 a1=948f868 a2=948ff70 a3=948f868 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778724.784:13485): path="/usr/bin/mono" type=AVC msg=audit(1163778724.788:13486): avc: denied { execheap } for pid=16446 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=AVC msg=audit(1163778724.788:13486): avc: denied { execmem } for pid=16446 comm="mono" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163778724.788:13486): arch=40000003 syscall=125 success=yes exit=0 a0=95a7000 a1=1000 a2=7 a3=1 items=0 ppid=1 pid=16446 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mono" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.308:13487): avc: denied { ioctl } for pid=16476 comm="pam_timestamp_c" name="[169789]" dev=pipefs ino=169789 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163778726.308:13487): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfded278 a3=bfded2b8 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778726.308:13487): path="pipe:[169789]" type=AVC msg=audit(1163778726.852:13488): avc: denied { dac_override } for pid=12248 comm="cupsd" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163778726.852:13488): avc: denied { write } for pid=12248 comm="cupsd" name="certs" dev=dm-0 ino=14534810 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163778726.852:13488): avc: denied { remove_name } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163778726.852:13488): avc: denied { unlink } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.852:13488): arch=40000003 syscall=10 success=yes exit=0 a0=bfb167c8 a1=0 a2=927ff4 a3=bfb167c8 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.884:13489): avc: denied { add_name } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=dir type=AVC msg=audit(1163778726.884:13489): avc: denied { create } for pid=12248 comm="cupsd" name="0" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13489): arch=40000003 syscall=5 success=yes exit=9 a0=bfb167c8 a1=80c1 a2=100 a3=80c1 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.884:13490): avc: denied { setattr } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13490): arch=40000003 syscall=94 success=yes exit=0 a0=9 a1=120 a2=927ff4 a3=21 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778726.884:13491): avc: denied { write } for pid=12248 comm="cupsd" name="0" dev=dm-0 ino=14534809 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:cupsd_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13491): arch=40000003 syscall=4 success=yes exit=32 a0=9 a1=911d500 a2=20 a3=911d500 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778726.884:13491): path="/var/run/cups/certs/0" type=AVC msg=audit(1163778726.884:13492): avc: denied { append } for pid=12248 comm="cupsd" name="access_log" dev=dm-0 ino=14437015 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:cupsd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163778726.884:13492): arch=40000003 syscall=4 success=yes exit=100 a0=8 a1=913d9b0 a2=64 a3=64 items=0 ppid=1 pid=12248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="cupsd" exe="/usr/sbin/cupsd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778726.884:13492): path="/var/log/cups/access_log" type=USER_AVC msg=audit(1163778726.952:13493): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=state dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13494): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDevices dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13495): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getWirelessEnabled dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13496): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager member=getDialup dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778726.952:13497): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnections dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.656:13498): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getNetworks dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13499): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnections dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13500): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13501): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13502): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13503): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManager.NoDialup dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13504): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.660:13505): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=error error_name=org.freedesktop.NetworkManagerInfo.NoNetworks dest=:1.6 spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.848:13506): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.848:13507): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getProperties dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778727.848:13508): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163778728.948:13509): avc: denied { net_admin } for pid=6687 comm="NetworkManager" capability=12 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163778728.948:13509): arch=40000003 syscall=54 success=no exit=-95 a0=e a1=8946 a2=bfaf3328 a3=8502ed8 items=0 ppid=1 pid=6687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="NetworkManager" exe="/usr/sbin/NetworkManager" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AVC msg=audit(1163778728.952:13510): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManagerInfo member=getVPNConnectionProperties dest=org.freedesktop.NetworkManagerInfo spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.952:13511): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.952:13512): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.980:13513): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.6 spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.980:13514): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.Devices member=getDriver dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.984:13515): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=org.freedesktop.NetworkManager.VPNConnections member=VPNConnectionUpdate dest=org.freedesktop.DBus spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.984:13516): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.984:13517): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.NetworkManager.VPNConnections member=getVPNConnectionProperties dest=org.freedesktop.NetworkManager spid=16462 tpid=6687 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=USER_AVC msg=audit(1163778728.988:13518): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.35 spid=6687 tpid=16462 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=dbus : exe="/bin/dbus-daemon" (sauid=81, hostname=?, addr=?, terminal=?)' type=AVC msg=audit(1163778782.323:13519): avc: denied { name_bind } for pid=16535 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163778782.323:13519): avc: denied { node_bind } for pid=16535 comm="synergys" src=24800 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163778782.323:13519): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bffefb90 a2=90400d8 a3=80b1220 items=0 ppid=16509 pid=16535 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts1 comm="synergys" exe="/usr/bin/synergys" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778813.085:13520): avc: denied { read } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778813.085:13520): arch=40000003 syscall=33 success=yes exit=0 a0=bfad6fcb a1=4 a2=33ea64 a3=bfad6fcb items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778813.085:13521): avc: denied { getattr } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778813.085:13521): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfad46dc a2=10b0ff4 a3=977bd70 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778813.085:13521): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163778820.602:13522): avc: denied { getattr } for pid=16583 comm="ps" name="tty1" dev=tmpfs ino=1444 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778820.602:13522): arch=40000003 syscall=195 success=yes exit=0 a0=c62840 a1=bffa615c a2=7b0ff4 a3=bffa615c items=0 ppid=16562 pid=16583 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778820.602:13522): path="/dev/tty1" type=AVC msg=audit(1163778820.606:13523): avc: denied { ptrace } for pid=16583 comm="ps" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=process type=SYSCALL msg=audit(1163778820.606:13523): arch=40000003 syscall=85 success=yes exit=10 a0=bffa6198 a1=c62840 a2=7f a3=bffa6198 items=0 ppid=16562 pid=16583 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="ps" exe="/bin/ps" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163778845.195:13524): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163778845.195:13525): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163778845.195:13526): avc: denied { search } for pid=16587 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163778845.195:13526): arch=40000003 syscall=5 success=no exit=-2 a0=bf842ce8 a1=8000 a2=1b6 a3=9a649a8 items=0 ppid=16562 pid=16587 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778845.203:13527): avc: denied { write } for pid=16588 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.203:13527): arch=40000003 syscall=33 success=yes exit=0 a0=bfffc987 a1=2 a2=bfffb020 a3=0 items=0 ppid=16587 pid=16588 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.203:13528): avc: denied { read } for pid=16588 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.203:13528): arch=40000003 syscall=5 success=yes exit=2 a0=bfffc987 a1=0 a2=1b6 a3=8cf7008 items=0 ppid=16587 pid=16588 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.203:13529): avc: denied { getattr } for pid=16588 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.203:13529): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfffad6c a2=711ff4 a3=8cf7008 items=0 ppid=16587 pid=16588 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163778845.203:13529): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163778845.207:13530): avc: denied { write } for pid=16587 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13530): avc: denied { add_name } for pid=16587 comm="su" name=".xauthI7R4Id" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13530): avc: denied { create } for pid=16587 comm="su" name=".xauthI7R4Id" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13530): arch=40000003 syscall=5 success=yes exit=4 a0=9a64acb a1=80c2 a2=180 a3=80c2 items=0 ppid=16562 pid=16587 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13531): avc: denied { setattr } for pid=16587 comm="su" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13531): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=1475bf items=0 ppid=16562 pid=16587 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13532): avc: denied { search } for pid=16589 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163778845.207:13532): arch=40000003 syscall=195 success=no exit=-2 a0=bfca0f97 a1=bfca0aac a2=24bff4 a3=bfca0aac items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13533): avc: denied { write } for pid=16589 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13533): avc: denied { add_name } for pid=16589 comm="xauth" name=".xauthI7R4Id-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.207:13533): avc: denied { create } for pid=16589 comm="xauth" name=".xauthI7R4Id-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13533): arch=40000003 syscall=5 success=yes exit=2 a0=bfca0f97 a1=c1 a2=180 a3=ffffffff items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.207:13534): avc: denied { link } for pid=16589 comm="xauth" name=".xauthI7R4Id-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.207:13534): arch=40000003 syscall=9 success=yes exit=0 a0=bfca0f97 a1=bfca0b96 a2=da3a64 a3=2 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.211:13535): avc: denied { write } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13535): arch=40000003 syscall=33 success=yes exit=0 a0=bfca2983 a1=2 a2=bfca14c0 a3=0 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.211:13536): avc: denied { read } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13536): arch=40000003 syscall=5 success=yes exit=2 a0=bfca2983 a1=0 a2=1b6 a3=8879008 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163778845.211:13537): avc: denied { getattr } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13537): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfca120c a2=24bff4 a3=8879008 items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163778845.211:13537): path="/root/.xauthI7R4Id" type=AVC msg=audit(1163778845.211:13538): avc: denied { remove_name } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163778845.211:13538): avc: denied { unlink } for pid=16589 comm="xauth" name=".xauthI7R4Id" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.211:13538): arch=40000003 syscall=10 success=yes exit=0 a0=8879008 a1=1000 a2=0 a3=887908a items=0 ppid=16587 pid=16589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163778845.211:13539): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1163778845.211:13540): user pid=16587 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163778845.215:13541): avc: denied { read } for pid=16590 comm="bash" name=".bashrc" dev=dm-0 ino=13127142 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778845.215:13541): arch=40000003 syscall=5 success=yes exit=3 a0=924a880 a1=8000 a2=0 a3=8000 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778851.459:13542): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778851.459:13542): arch=40000003 syscall=3 success=yes exit=59 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778851.459:13542): path="/dev/net/tun" type=AVC msg=audit(1163778851.483:13543): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778851.483:13543): arch=40000003 syscall=4 success=yes exit=126 a0=4 a1=805c570 a2=7e a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778851.483:13543): path="/dev/net/tun" type=USER_AUTH msg=audit(1163778852.648:13544): user pid=16610 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163778852.648:13545): user pid=16610 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163778885.902:13546): avc: denied { execute } for pid=16541 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163778885.902:13546): arch=40000003 syscall=192 success=yes exit=62861312 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778885.902:13546): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163778885.906:13547): avc: denied { read } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778885.906:13547): arch=40000003 syscall=33 success=yes exit=0 a0=bfad6fcb a1=4 a2=33ea64 a3=bfad6fcb items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163778885.906:13548): avc: denied { getattr } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778885.906:13548): arch=40000003 syscall=197 success=yes exit=0 a0=38 a1=bfad1a5c a2=10b0ff4 a3=b057cc8 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778885.906:13548): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163778908.935:13549): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163778908.935:13549): arch=40000003 syscall=3 success=yes exit=64 a0=21 a1=baaa9b0 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778908.935:13549): path="inotify" type=AVC msg=audit(1163778910.427:13550): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778910.427:13550): arch=40000003 syscall=3 success=yes exit=40 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778910.427:13550): path="/dev/net/tun" type=AVC msg=audit(1163778910.463:13551): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163778910.463:13551): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163778910.463:13551): path="/dev/net/tun" type=USER_CHAUTHTOK msg=audit(1163778947.493:13552): user pid=16655 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=rpcuser exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/2 res=failed)' type=AVC msg=audit(1163778951.302:13553): avc: denied { read } for pid=16666 comm="gnome-terminal" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163778951.302:13553): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb0dd5 a1=4 a2=da3a64 a3=bfdb0dd5 items=0 ppid=1 pid=16666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778951.522:13554): avc: denied { write } for pid=16666 comm="gnome-terminal" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778951.522:13554): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfdaed10 a2=df7770 a3=16 items=0 ppid=1 pid=16666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778951.522:13555): avc: denied { read } for pid=16666 comm="gnome-terminal" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778951.522:13555): arch=40000003 syscall=33 success=yes exit=0 a0=9feea38 a1=4 a2=df7770 a3=9feea38 items=0 ppid=1 pid=16666 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778955.538:13556): avc: denied { execmem } for pid=16690 comm="gcj-dbtool" scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=staff_u:sysadm_r:rpm_script_t:s0 tclass=process type=SYSCALL msg=audit(1163778955.538:13556): arch=40000003 syscall=192 success=yes exit=4096 a0=1000 a1=10000 a2=7 a3=22 items=0 ppid=16689 pid=16690 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:sysadm_r:rpm_script_t:s0 key=(null) type=AVC msg=audit(1163778957.002:13557): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163778957.002:13557): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163778957.002:13557): path="/var/run/utmp" type=AVC msg=audit(1163778960.194:13558): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163778960.194:13558): arch=40000003 syscall=3 success=yes exit=512 a0=21 a1=baaa9b0 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163778960.194:13558): path="inotify" type=AVC msg=audit(1163778977.619:13559): avc: denied { write } for pid=16716 comm="gnome-backgroun" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163778977.619:13559): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf97d9c0 a2=24b770 a3=16 items=0 ppid=1 pid=16716 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-backgroun" exe="/usr/bin/gnome-background-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778988.364:13560): avc: denied { write } for pid=16722 comm="nautilus" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163778988.364:13560): arch=40000003 syscall=33 success=yes exit=0 a0=8e43740 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=16722 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163778989.728:13561): avc: denied { read write } for pid=16722 comm="nautilus" name=".gnupg" dev=dm-0 ino=6814310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_gpg_secret_t:s0 tclass=dir type=SYSCALL msg=audit(1163778989.728:13561): arch=40000003 syscall=33 success=yes exit=0 a0=8e43740 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=16722 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163779140.914:13562): avc: denied { read } for pid=16431 comm="nautilus" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163779140.914:13562): arch=40000003 syscall=33 success=yes exit=0 a0=bf971e36 a1=4 a2=da3a64 a3=bf971e36 items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_CHAUTHTOK msg=audit(1163779141.706:13563): user pid=16751 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=nscd exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=? res=failed)' type=SELINUX_ERR msg=audit(1163779144.550:13564): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779144.550:13564): arch=40000003 syscall=11 success=yes exit=0 a0=bfa32bd9 a1=bfa31c98 a2=9df6858 a3=5 items=0 ppid=16756 pid=16763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="yum-updatesd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779145.310:13565): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779145.310:13565): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779145.310:13565): path="/dev/net/tun" type=AVC msg=audit(1163779145.350:13566): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779145.350:13566): arch=40000003 syscall=3 success=yes exit=40 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779145.350:13566): path="/dev/net/tun" type=AVC msg=audit(1163779174.000:13567): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779174.000:13567): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779174.000:13567): path="/var/run/utmp" type=AVC msg=audit(1163779194.521:13568): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779194.521:13568): arch=40000003 syscall=3 success=yes exit=432 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779194.521:13568): path="inotify" type=USER_ACCT msg=audit(1163779202.669:13569): user pid=16786 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163779202.669:13570): login pid=16786 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163779202.681:13571): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163779202.681:13572): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779202.685:13573): avc: denied { execute } for pid=16787 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163779202.685:13573): avc: denied { execute_no_trans } for pid=16787 comm="sh" name="sa1" dev=dm-0 ino=13061698 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163779202.685:13573): arch=40000003 syscall=11 success=yes exit=0 a0=97631b0 a1=9763358 a2=9763290 a3=9763008 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779202.685:13573): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163779202.865:13574): avc: denied { execute } for pid=16787 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779202.865:13574): avc: denied { execute_no_trans } for pid=16787 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779202.865:13574): avc: denied { read } for pid=16787 comm="sa1" name="sadc" dev=dm-0 ino=11981401 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779202.865:13574): arch=40000003 syscall=11 success=yes exit=0 a0=9a42d48 a1=9a42740 a2=9a42d60 a3=9a42740 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779202.865:13574): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163779202.865:13574): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163779203.349:13575): avc: denied { search } for pid=16787 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163779203.349:13575): avc: denied { read } for pid=16787 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.349:13575): arch=40000003 syscall=5 success=yes exit=3 a0=8050371 a1=0 a2=1b6 a3=900a7f8 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.353:13576): avc: denied { getattr } for pid=16787 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.353:13576): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfdb5fe8 a2=92cff4 a3=900a7f8 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779203.353:13576): path="/proc/net/dev" type=AVC msg=audit(1163779203.353:13577): avc: denied { search } for pid=16787 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163779203.353:13577): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb6394 a1=0 a2=bfdb6288 a3=bfdb6290 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.581:13578): avc: denied { read append } for pid=16787 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.581:13578): arch=40000003 syscall=5 success=yes exit=3 a0=bfdb6394 a1=402 a2=bfdb6558 a3=bfdb6290 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.681:13579): avc: denied { search } for pid=16787 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163779203.681:13579): avc: denied { read } for pid=16787 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.681:13579): arch=40000003 syscall=5 success=yes exit=4 a0=805037f a1=0 a2=1b6 a3=900b348 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.681:13580): avc: denied { getattr } for pid=16787 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.681:13580): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfdb5e40 a2=92cff4 a3=900b348 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779203.681:13580): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163779203.681:13581): avc: denied { search } for pid=16787 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163779203.681:13581): arch=40000003 syscall=5 success=no exit=-2 a0=80502a5 a1=0 a2=1b6 a3=900b348 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779203.681:13582): avc: denied { lock } for pid=16787 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779203.681:13582): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfdb6290 a3=3 items=0 ppid=16786 pid=16787 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779203.681:13582): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163779204.742:13583): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163779204.742:13584): user pid=16786 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_CHAUTHTOK msg=audit(1163779227.311:13585): user pid=16808 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=gdm exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=? res=failed)' type=USER_CHAUTHTOK msg=audit(1163779227.419:13586): user pid=16809 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=changing user shell acct=gdm exe="/usr/sbin/usermod" (hostname=?, addr=?, terminal=? res=success)' type=SELINUX_ERR msg=audit(1163779227.419:13587): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=AVC msg=audit(1163779227.419:13587): avc: denied { transition } for pid=16810 comm="usermod" name="nscd" dev=dm-0 ino=10327130 scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=staff_u:system_r:nscd_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.419:13587): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38ff4 a2=bfc39008 a3=0 items=0 ppid=16809 pid=16810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779227.419:13587): path="/usr/sbin/nscd" type=SELINUX_ERR msg=audit(1163779227.571:13588): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.571:13588): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38ff4 a2=bfc39008 a3=0 items=0 ppid=16809 pid=16811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779227.611:13589): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.611:13589): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38b94 a2=bfc38ba8 a3=0 items=0 ppid=16809 pid=16812 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779227.615:13590): security_compute_sid: invalid context staff_u:system_r:nscd_t:s0 for scontext=staff_u:sysadm_r:useradd_t:s0 tcontext=system_u:object_r:nscd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779227.615:13590): arch=40000003 syscall=11 success=yes exit=0 a0=8055a15 a1=bfc38b94 a2=bfc38ba8 a3=0 items=0 ppid=16809 pid=16813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/usr/sbin/nscd" subj=staff_u:system_r:nscd_t:s0 key=(null) type=USER_ACCT msg=audit(1163779261.749:13591): user pid=16823 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163779261.753:13592): login pid=16823 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163779261.753:13593): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163779261.753:13594): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779261.969:13595): avc: denied { getattr } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.969:13595): arch=40000003 syscall=195 success=yes exit=0 a0=9957120 a1=bf8ec1a0 a2=255ff4 a3=9957120 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779261.969:13595): path="/usr/bin/run-parts" type=AVC msg=audit(1163779261.997:13596): avc: denied { execute } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.997:13596): arch=40000003 syscall=33 success=yes exit=0 a0=9957120 a1=1 a2=11 a3=9957120 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779261.997:13597): avc: denied { read } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.997:13597): arch=40000003 syscall=33 success=yes exit=0 a0=9957120 a1=4 a2=ffffffff a3=9957120 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779261.997:13598): avc: denied { execute_no_trans } for pid=16824 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779261.997:13598): arch=40000003 syscall=11 success=yes exit=0 a0=9957120 a1=99573d8 a2=99572f8 a3=9956f98 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779261.997:13598): path="/usr/bin/run-parts" type=AVC msg=audit(1163779262.005:13599): avc: denied { ioctl } for pid=16824 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.005:13599): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf873358 a3=bf873398 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.005:13599): path="/usr/bin/run-parts" type=AVC msg=audit(1163779262.017:13600): avc: denied { execute } for pid=16824 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.017:13600): arch=40000003 syscall=33 success=yes exit=0 a0=8e61990 a1=1 a2=1 a3=8e61c98 items=0 ppid=16823 pid=16824 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779262.017:13601): avc: denied { execute_no_trans } for pid=16825 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.017:13601): arch=40000003 syscall=11 success=yes exit=0 a0=8e61a10 a1=8e61ad8 a2=8e61ae8 a3=8e61758 items=0 ppid=16824 pid=16825 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.017:13601): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163779262.029:13602): avc: denied { execute } for pid=16827 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163779262.029:13602): avc: denied { execute_no_trans } for pid=16827 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163779262.029:13602): avc: denied { read } for pid=16827 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.029:13602): arch=40000003 syscall=11 success=yes exit=0 a0=9563678 a1=9563808 a2=9563720 a3=9563508 items=0 ppid=16825 pid=16827 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.029:13602): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163779262.029:13602): path="/sbin/chkconfig" type=AVC msg=audit(1163779262.033:13603): avc: denied { read } for pid=16827 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.033:13603): arch=40000003 syscall=5 success=yes exit=3 a0=bfc6ff30 a1=0 a2=ffffffff a3=9971038 items=0 ppid=16825 pid=16827 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779262.033:13604): avc: denied { getattr } for pid=16827 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779262.033:13604): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfc6fe9c a2=2e8ff4 a3=bfc6fe9c items=0 ppid=16825 pid=16827 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779262.033:13604): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163779262.573:13605): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163779262.573:13606): user pid=16823 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779304.352:13607): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779304.352:13607): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779304.352:13607): path="/dev/net/tun" type=AVC msg=audit(1163779304.392:13608): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779304.392:13608): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779304.392:13608): path="/dev/net/tun" type=AVC msg=audit(1163779328.941:13609): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163779328.941:13609): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=USER_CHAUTHTOK msg=audit(1163779333.554:13610): user pid=16916 uid=0 auid=500 subj=staff_u:sysadm_r:useradd_t:s0 msg='op=adding user acct=sshd exe="/usr/sbin/useradd" (hostname=?, addr=?, terminal=pts/2 res=failed)' type=AVC msg=audit(1163779370.000:13611): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779370.000:13611): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779370.000:13611): path="/var/run/utmp" type=AVC msg=audit(1163779392.621:13612): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779392.621:13612): arch=40000003 syscall=3 success=yes exit=864 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779392.621:13612): path="inotify" type=SELINUX_ERR msg=audit(1163779436.236:13613): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.236:13613): arch=40000003 syscall=11 success=yes exit=0 a0=bf8b2bd7 a1=bf8b2318 a2=87de858 a3=5 items=0 ppid=17379 pid=17386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setroubleshoot" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.260:13614): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.260:13614): arch=40000003 syscall=11 success=yes exit=0 a0=8c5e0f0 a1=8c76418 a2=8c69620 a3=8c77300 items=0 ppid=17386 pid=17391 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="selinuxenabled" exe="/usr/sbin/selinuxenabled" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.312:13615): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.312:13615): arch=40000003 syscall=11 success=yes exit=0 a0=8c77d18 a1=8c5d0a8 a2=8c69620 a3=8c77ea8 items=0 ppid=17386 pid=17392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="id" exe="/usr/bin/id" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.420:13616): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.420:13616): arch=40000003 syscall=11 success=yes exit=0 a0=8c7b210 a1=8c5d010 a2=8c69620 a3=8c7b560 items=0 ppid=17393 pid=17394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.464:13617): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.464:13617): arch=40000003 syscall=11 success=yes exit=0 a0=8c7ba60 a1=8c7bf10 a2=8c69620 a3=8c7b560 items=0 ppid=17393 pid=17395 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.516:13618): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.516:13618): arch=40000003 syscall=11 success=yes exit=0 a0=8c7b1e0 a1=8c7aed8 a2=8c69620 a3=8c7b5c0 items=0 ppid=17386 pid=17396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rhgb-client" exe="/usr/bin/rhgb-client" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.560:13619): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.560:13619): arch=40000003 syscall=11 success=yes exit=0 a0=8c7af38 a1=8c7a9f8 a2=8c69620 a3=8c7a888 items=0 ppid=17386 pid=17397 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.584:13620): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.584:13620): arch=40000003 syscall=11 success=yes exit=0 a0=8c612b8 a1=8c61288 a2=8c69620 a3=8c611d0 items=0 ppid=17386 pid=17398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.616:13621): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.616:13621): arch=40000003 syscall=11 success=yes exit=0 a0=8c69870 a1=8c61a78 a2=8c69620 a3=8c78d80 items=0 ppid=17386 pid=17399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779436.620:13622): security_compute_sid: invalid context staff_u:system_r:setroubleshootd_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:setroubleshootd_exec_t:s0 tclass=process type=AVC msg=audit(1163779436.620:13622): avc: denied { transition } for pid=17400 comm="bash" name="setroubleshootd" dev=dm-0 ino=10317833 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:setroubleshootd_t:s0 tclass=process type=SYSCALL msg=audit(1163779436.620:13622): arch=40000003 syscall=11 success=yes exit=0 a0=85c3670 a1=85c3c38 a2=85c3b78 a3=85c35f0 items=0 ppid=17399 pid=17400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setroubleshootd" exe="/usr/bin/python" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779436.620:13622): path="/usr/sbin/setroubleshootd" type=SELINUX_ERR msg=audit(1163779437.084:13623): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779437.084:13623): arch=40000003 syscall=11 success=yes exit=0 a0=8c5f6f8 a1=8c78818 a2=8c69620 a3=8c5f4d8 items=0 ppid=17386 pid=17402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779438.396:13624): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779438.396:13624): arch=40000003 syscall=3 success=yes exit=384 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779438.396:13624): path="inotify" type=AVC msg=audit(1163779438.916:13625): avc: denied { read } for pid=16431 comm="nautilus" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163779438.916:13625): arch=40000003 syscall=33 success=yes exit=0 a0=bf971e36 a1=4 a2=da3a64 a3=bf971e36 items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163779440.000:13626): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779440.000:13626): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779440.000:13626): path="/var/run/utmp" type=AVC msg=audit(1163779467.294:13627): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779467.294:13627): arch=40000003 syscall=3 success=yes exit=63 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779467.294:13627): path="/dev/net/tun" type=AVC msg=audit(1163779467.334:13628): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779467.334:13628): arch=40000003 syscall=4 success=yes exit=133 a0=4 a1=805c570 a2=85 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779467.334:13628): path="/dev/net/tun" type=SELINUX_ERR msg=audit(1163779469.862:13629): security_compute_sid: invalid context staff_u:system_r:setroubleshootd_t:s0 for scontext=staff_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779469.862:13629): arch=40000003 syscall=11 success=yes exit=0 a0=5696a4 a1=b79fbbfc a2=bfcd0364 a3=400 items=0 ppid=17401 pid=17409 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sh" exe="/bin/bash" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779470.006:13630): security_compute_sid: invalid context staff_u:system_r:setroubleshootd_t:s0 for scontext=staff_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779470.006:13630): arch=40000003 syscall=11 success=yes exit=0 a0=855a690 a1=855a9b0 a2=855a8e0 a3=855a598 items=0 ppid=17409 pid=17410 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="uname" exe="/bin/uname" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779491.795:13631): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779491.795:13631): arch=40000003 syscall=11 success=yes exit=0 a0=bf8fcbe0 a1=bf8fb368 a2=85cd858 a3=5 items=0 ppid=17418 pid=17425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dhcpd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779491.903:13632): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779491.903:13632): arch=40000003 syscall=11 success=yes exit=0 a0=bfbedbdd a1=bfbec688 a2=977f858 a3=5 items=0 ppid=17431 pid=17438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="dhcrelay" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779492.372:13633): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779492.372:13633): arch=40000003 syscall=11 success=yes exit=0 a0=bf82dbdc a1=bf82d298 a2=9648858 a3=5 items=0 ppid=17445 pid=17452 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="mdmonitor" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779492.424:13634): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779492.424:13634): arch=40000003 syscall=11 success=yes exit=0 a0=bfeacbe0 a1=bfeac118 a2=9056858 a3=5 items=0 ppid=17457 pid=17464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="mdmpd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779496.260:13635): avc: denied { read } for pid=16431 comm="nautilus" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163779496.260:13635): arch=40000003 syscall=33 success=yes exit=0 a0=bf971e36 a1=4 a2=da3a64 a3=bf971e36 items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.453:13636): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.453:13636): arch=40000003 syscall=11 success=yes exit=0 a0=bfff4be1 a1=bfff3a68 a2=9cc9858 a3=5 items=0 ppid=17483 pid=17490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.481:13637): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.481:13637): arch=40000003 syscall=11 success=yes exit=0 a0=840de80 a1=83f63b0 a2=8402ad8 a3=83f61a8 items=0 ppid=17496 pid=17497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="runlevel" exe="/sbin/runlevel" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.541:13638): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=AVC msg=audit(1163779508.541:13638): avc: denied { transition } for pid=17498 comm="sshd" name="sshd" dev=dm-0 ino=11066006 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163779508.541:13638): arch=40000003 syscall=11 success=yes exit=0 a0=84131f8 a1=8413210 a2=8402ad8 a3=8413098 items=0 ppid=17490 pid=17498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779508.541:13638): path="/usr/sbin/sshd" type=AVC msg=audit(1163779508.693:13639): avc: denied { write } for pid=8872 comm="sshd" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163779508.693:13639): avc: denied { remove_name } for pid=8872 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163779508.693:13639): avc: denied { unlink } for pid=8872 comm="sshd" name="sshd.pid" dev=dm-0 ino=14436996 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779508.693:13639): arch=40000003 syscall=10 success=yes exit=0 a0=dd8459 a1=1 a2=dec7ac a3=ffffffff items=0 ppid=1 pid=8872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.701:13640): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.701:13640): arch=40000003 syscall=11 success=yes exit=0 a0=8417d80 a1=8417350 a2=8402ad8 a3=8417d58 items=0 ppid=17490 pid=17500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.821:13641): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.821:13641): arch=40000003 syscall=11 success=yes exit=0 a0=8416f50 a1=8413898 a2=8402ad8 a3=84167a8 items=0 ppid=17490 pid=17501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.825:13642): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.825:13642): arch=40000003 syscall=11 success=yes exit=0 a0=8416d58 a1=84137d0 a2=8402ad8 a3=8413648 items=0 ppid=17490 pid=17502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779508.841:13643): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779508.841:13643): arch=40000003 syscall=11 success=yes exit=0 a0=8416550 a1=8413490 a2=8402ad8 a3=8412d38 items=0 ppid=17490 pid=17503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sleep" exe="/bin/sleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779511.873:13644): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.873:13644): arch=40000003 syscall=11 success=yes exit=0 a0=83fa250 a1=8413068 a2=8402ad8 a3=84133d8 items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779511.905:13645): avc: denied { setfscreate } for pid=17504 comm="cp" scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:sysadm_r:initrc_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.905:13645): arch=40000003 syscall=4 success=yes exit=30 a0=3 a1=8e23088 a2=1e a3=a2f748 items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779511.905:13646): avc: denied { relabelfrom } for pid=17504 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=AVC msg=audit(1163779511.905:13646): avc: denied { relabelto } for pid=17504 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163779511.905:13646): arch=40000003 syscall=228 success=yes exit=0 a0=4 a1=a2f0d3 a2=8e23088 a3=1e items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779511.909:13647): avc: denied { setattr } for pid=17504 comm="cp" name="localtime" dev=dm-0 ino=14537075 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163779511.909:13647): arch=40000003 syscall=271 success=yes exit=0 a0=bfe1f564 a1=bfe1f5cc a2=24bff4 a3=0 items=0 ppid=17490 pid=17504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779511.909:13648): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.909:13648): arch=40000003 syscall=11 success=yes exit=0 a0=8415da0 a1=83fa1e0 a2=8402ad8 a3=83fa250 items=0 ppid=17490 pid=17505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779511.925:13649): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779511.925:13649): arch=40000003 syscall=11 success=yes exit=0 a0=84115a8 a1=83fa318 a2=8402ad8 a3=8413408 items=0 ppid=17490 pid=17507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.241:13650): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.241:13650): arch=40000003 syscall=11 success=yes exit=0 a0=bfb8cbe1 a1=bfb8b5f8 a2=893d858 a3=5 items=0 ppid=17510 pid=17517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.265:13651): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.265:13651): arch=40000003 syscall=11 success=yes exit=0 a0=8d0fe80 a1=8cf83b0 a2=8d04ad8 a3=8cf81a8 items=0 ppid=17523 pid=17524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="runlevel" exe="/sbin/runlevel" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.269:13652): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.269:13652): arch=40000003 syscall=11 success=yes exit=0 a0=8d151f8 a1=8d15210 a2=8d04ad8 a3=8d15098 items=0 ppid=17517 pid=17525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779512.285:13653): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.285:13653): arch=40000003 syscall=11 success=yes exit=0 a0=8d19d80 a1=8d19380 a2=8d04ad8 a3=8d19de0 items=0 ppid=17517 pid=17527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.393:13654): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.393:13654): arch=40000003 syscall=11 success=yes exit=0 a0=8d18cc8 a1=8d15898 a2=8d04ad8 a3=8d187a8 items=0 ppid=17517 pid=17528 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.397:13655): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.397:13655): arch=40000003 syscall=11 success=yes exit=0 a0=8d18d58 a1=8d157d0 a2=8d04ad8 a3=8d15648 items=0 ppid=17517 pid=17529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779512.401:13656): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779512.401:13656): arch=40000003 syscall=11 success=yes exit=0 a0=8d18550 a1=8d15490 a2=8d04ad8 a3=8d14d38 items=0 ppid=17517 pid=17530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sleep" exe="/bin/sleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779515.405:13657): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779515.405:13657): arch=40000003 syscall=11 success=yes exit=0 a0=8cfc250 a1=8d15068 a2=8d04ad8 a3=8d153d8 items=0 ppid=17517 pid=17531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="cp" exe="/bin/cp" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779515.409:13658): security_compute_sid: invalid context staff_u:system_r:sshd_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779515.409:13658): arch=40000003 syscall=11 success=yes exit=0 a0=8d17da0 a1=8cfc1e0 a2=8d04ad8 a3=8cfc250 items=0 ppid=17517 pid=17532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:system_r:sshd_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779515.429:13659): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779515.429:13659): arch=40000003 syscall=11 success=yes exit=0 a0=8d135a8 a1=8cfc318 a2=8d04ad8 a3=8d15408 items=0 ppid=17517 pid=17534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779535.862:13660): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779535.862:13660): arch=40000003 syscall=11 success=yes exit=0 a0=bfbd3be2 a1=bfbd2e48 a2=868e858 a3=5 items=0 ppid=17540 pid=17547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779535.894:13661): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779535.894:13661): arch=40000003 syscall=11 success=yes exit=0 a0=875d988 a1=875d308 a2=874c268 a3=875d978 items=0 ppid=17547 pid=17552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.002:13662): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.002:13662): arch=40000003 syscall=11 success=yes exit=0 a0=875daa8 a1=875d180 a2=874c268 a3=875c370 items=0 ppid=17547 pid=17553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.006:13663): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.006:13663): arch=40000003 syscall=11 success=yes exit=0 a0=8742ac0 a1=8742aa8 a2=874c268 a3=87429f0 items=0 ppid=17547 pid=17554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.010:13664): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.010:13664): arch=40000003 syscall=11 success=yes exit=0 a0=875cf48 a1=8743448 a2=874c268 a3=8744318 items=0 ppid=17547 pid=17555 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.014:13665): security_compute_sid: invalid context staff_u:system_r:crond_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:crond_exec_t:s0 tclass=process type=AVC msg=audit(1163779536.014:13665): avc: denied { transition } for pid=17556 comm="bash" name="atd" dev=dm-0 ino=10321554 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163779536.014:13665): arch=40000003 syscall=11 success=yes exit=0 a0=8152670 a1=81527e8 a2=8152a70 a3=81525f0 items=0 ppid=17555 pid=17556 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/usr/sbin/atd" subj=staff_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779536.014:13665): path="/usr/sbin/atd" type=SELINUX_ERR msg=audit(1163779536.058:13666): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.058:13666): arch=40000003 syscall=11 success=yes exit=0 a0=8744338 a1=8743d60 a2=874c268 a3=8744508 items=0 ppid=17547 pid=17558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.530:13667): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.530:13667): arch=40000003 syscall=11 success=yes exit=0 a0=bf855be2 a1=bf8552c8 a2=8a54858 a3=5 items=0 ppid=17561 pid=17568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.554:13668): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.554:13668): arch=40000003 syscall=11 success=yes exit=0 a0=8b23988 a1=8b23308 a2=8b12268 a3=8b23a00 items=0 ppid=17568 pid=17573 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.658:13669): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.658:13669): arch=40000003 syscall=11 success=yes exit=0 a0=8b23ac8 a1=8b23180 a2=8b12268 a3=8b22370 items=0 ppid=17568 pid=17574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.662:13670): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.662:13670): arch=40000003 syscall=11 success=yes exit=0 a0=8b08ac0 a1=8b08aa8 a2=8b12268 a3=8b089f0 items=0 ppid=17568 pid=17575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.666:13671): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.666:13671): arch=40000003 syscall=11 success=yes exit=0 a0=8b24198 a1=8b09448 a2=8b12268 a3=8b0a318 items=0 ppid=17568 pid=17576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779536.670:13672): security_compute_sid: invalid context staff_u:system_r:crond_t:s0-s0:c0.c1023 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:crond_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.670:13672): arch=40000003 syscall=11 success=yes exit=0 a0=8b23670 a1=8b237e8 a2=8b23a70 a3=8b235f0 items=0 ppid=17576 pid=17577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="atd" exe="/usr/sbin/atd" subj=staff_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=SELINUX_ERR msg=audit(1163779536.674:13673): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779536.674:13673): arch=40000003 syscall=11 success=yes exit=0 a0=8b0a338 a1=8b09d60 a2=8b12268 a3=8b0a508 items=0 ppid=17568 pid=17579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779538.002:13674): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163779538.002:13674): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163779538.002:13674): path="/var/run/utmp" type=AVC msg=audit(1163779545.711:13675): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779545.711:13675): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779545.711:13675): path="/dev/net/tun" type=AVC msg=audit(1163779549.167:13676): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779549.167:13676): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779549.167:13676): path="/dev/net/tun" type=SELINUX_ERR msg=audit(1163779552.803:13677): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779552.803:13677): arch=40000003 syscall=11 success=yes exit=0 a0=bf98abdf a1=bf989bf8 a2=9302858 a3=5 items=0 ppid=17597 pid=17604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="autofs" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779552.835:13678): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779552.835:13678): arch=40000003 syscall=11 success=yes exit=0 a0=9996230 a1=9996398 a2=9997418 a3=99960d0 items=0 ppid=17604 pid=17605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779555.027:13679): avc: denied { execmem } for pid=17611 comm="gcj-dbtool" scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=staff_u:sysadm_r:rpm_script_t:s0 tclass=process type=SYSCALL msg=audit(1163779555.027:13679): arch=40000003 syscall=192 success=yes exit=4096 a0=1000 a1=10000 a2=7 a3=22 items=0 ppid=17610 pid=17611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="gcj-dbtool" exe="/usr/bin/gcj-dbtool" subj=staff_u:sysadm_r:rpm_script_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779566.768:13680): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779566.768:13680): arch=40000003 syscall=11 success=yes exit=0 a0=bf9e5be1 a1=bf9e5458 a2=897c858 a3=5 items=0 ppid=17651 pid=17658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779567.416:13681): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779567.416:13681): arch=40000003 syscall=11 success=yes exit=0 a0=bfbc9be1 a1=bfbc8638 a2=95cb858 a3=5 items=0 ppid=17665 pid=17672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nscd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779569.376:13682): avc: denied { read } for pid=16541 comm="firefox-bin" name="inotify" dev=inotifyfs ino=340 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:inotifyfs_t:s0 tclass=dir type=SYSCALL msg=audit(1163779569.376:13682): arch=40000003 syscall=3 success=yes exit=416 a0=21 a1=b3f42a8 a2=400 a3=400 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163779569.376:13682): path="inotify" type=SELINUX_ERR msg=audit(1163779592.862:13683): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.862:13683): arch=40000003 syscall=11 success=yes exit=0 a0=8a13448 a1=8a122a8 a2=8a13468 a3=8a132e0 items=0 ppid=17723 pid=17724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.910:13684): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.910:13684): arch=40000003 syscall=11 success=yes exit=0 a0=95b48e0 a1=95b5dc8 a2=95bfce8 a3=95b5f58 items=0 ppid=17724 pid=17729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.930:13685): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.930:13685): arch=40000003 syscall=11 success=yes exit=0 a0=913feb8 a1=9149e98 a2=9149ce0 a3=913fe50 items=0 ppid=17729 pid=17734 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.950:13686): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.950:13686): arch=40000003 syscall=11 success=yes exit=0 a0=87d3ea8 a1=87b71f8 a2=87d4f40 a3=87d45a8 items=0 ppid=17739 pid=17740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779592.982:13687): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779592.982:13687): arch=40000003 syscall=11 success=yes exit=0 a0=87d4d18 a1=87d43e0 a2=87d4f40 a3=87d4e48 items=0 ppid=17734 pid=17741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.086:13688): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.086:13688): arch=40000003 syscall=11 success=yes exit=0 a0=87d3ac8 a1=87d46d8 a2=87d4f40 a3=87d3858 items=0 ppid=17734 pid=17742 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.090:13689): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.090:13689): arch=40000003 syscall=11 success=yes exit=0 a0=87b9f10 a1=87d3790 a2=87d4f40 a3=87b9e18 items=0 ppid=17734 pid=17743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.094:13690): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.094:13690): arch=40000003 syscall=11 success=yes exit=0 a0=913e8c0 a1=913ff40 a2=9149ce0 a3=913fe10 items=0 ppid=17729 pid=17744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.114:13691): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.114:13691): arch=40000003 syscall=11 success=yes exit=0 a0=995b9a8 a1=9973250 a2=9963ce0 a3=99727a8 items=0 ppid=17749 pid=17750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.142:13692): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.142:13692): arch=40000003 syscall=11 success=yes exit=0 a0=9972c48 a1=9972f20 a2=9963ce0 a3=99727a8 items=0 ppid=17749 pid=17751 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.162:13693): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.162:13693): arch=40000003 syscall=11 success=yes exit=0 a0=995a0e0 a1=995c588 a2=9963ce0 a3=995a010 items=0 ppid=17744 pid=17752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.194:13694): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SELINUX_ERR msg=audit(1163779593.194:13695): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.194:13695): arch=40000003 syscall=11 success=yes exit=0 a0=995a178 a1=995a2a0 a2=9963ce0 a3=995a148 items=0 ppid=17744 pid=17754 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SYSCALL msg=audit(1163779593.194:13694): arch=40000003 syscall=11 success=yes exit=0 a0=9971898 a1=995a2a0 a2=9963ce0 a3=995a158 items=0 ppid=17744 pid=17753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="lsmod" exe="/sbin/lsmod" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.238:13696): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.238:13696): arch=40000003 syscall=11 success=yes exit=0 a0=995a5c8 a1=99573d0 a2=9963ce0 a3=995a0e0 items=0 ppid=17755 pid=17756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.238:13697): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.238:13697): arch=40000003 syscall=11 success=yes exit=0 a0=9957450 a1=995a2a0 a2=9963ce0 a3=995a270 items=0 ppid=17755 pid=17757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="awk" exe="/bin/gawk" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.274:13698): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.274:13698): arch=40000003 syscall=11 success=yes exit=0 a0=9974368 a1=9959fe0 a2=9963ce0 a3=9973168 items=0 ppid=17744 pid=17758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.278:13699): security_compute_sid: invalid context staff_u:system_r:rpcd_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:rpcd_exec_t:s0 tclass=process type=AVC msg=audit(1163779593.278:13699): avc: denied { transition } for pid=17759 comm="bash" name="rpc.idmapd" dev=dm-0 ino=10327370 scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=staff_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.278:13699): arch=40000003 syscall=11 success=yes exit=0 a0=8110c08 a1=8110f38 a2=8110e08 a3=8110880 items=0 ppid=17758 pid=17759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpc.idmapd" exe="/usr/sbin/rpc.idmapd" subj=staff_u:system_r:rpcd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779593.278:13699): path="/usr/sbin/rpc.idmapd" type=SELINUX_ERR msg=audit(1163779593.398:13700): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.398:13700): arch=40000003 syscall=11 success=yes exit=0 a0=995a1f8 a1=9973848 a2=9963ce0 a3=9959e18 items=0 ppid=17744 pid=17761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.410:13701): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.410:13701): arch=40000003 syscall=11 success=yes exit=0 a0=8a13448 a1=8a13248 a2=8a13468 a3=8a131c0 items=0 ppid=17723 pid=17762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.474:13702): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.474:13702): arch=40000003 syscall=11 success=yes exit=0 a0=8a13448 a1=8a132e0 a2=8a13468 a3=8a13040 items=0 ppid=17723 pid=17767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nfs" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.530:13703): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.530:13703): arch=40000003 syscall=11 success=yes exit=0 a0=9a13160 a1=99fc040 a2=9a03760 a3=9a12fb0 items=0 ppid=17767 pid=17773 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="service" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.550:13704): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.550:13704): arch=40000003 syscall=11 success=yes exit=0 a0=9824ce0 a1=983a920 a2=98257f8 a3=983a758 items=0 ppid=17773 pid=17778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.554:13705): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.554:13705): arch=40000003 syscall=11 success=yes exit=0 a0=9824d10 a1=983a8c0 a2=98257f8 a3=9824b78 items=0 ppid=17773 pid=17779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.558:13706): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.558:13706): arch=40000003 syscall=11 success=yes exit=0 a0=9822138 a1=9833288 a2=98257f8 a3=9822188 items=0 ppid=17773 pid=17780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="env" exe="/bin/env" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779593.558:13707): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779593.558:13707): arch=40000003 syscall=11 success=yes exit=0 a0=bfe4fbdb a1=bfe4e8b8 a2=94d1858 a3=5 items=0 ppid=17773 pid=17780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcsvcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.434:13708): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.434:13708): arch=40000003 syscall=11 success=yes exit=0 a0=957f448 a1=957e2a8 a2=957f468 a3=957f2e0 items=0 ppid=17786 pid=17787 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.454:13709): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.454:13709): arch=40000003 syscall=11 success=yes exit=0 a0=9a7c8e0 a1=9a7ddc8 a2=9a87ce8 a3=9a7df58 items=0 ppid=17787 pid=17792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.474:13710): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.474:13710): arch=40000003 syscall=11 success=yes exit=0 a0=9df9eb8 a1=9e03e98 a2=9e03ce0 a3=9df9e50 items=0 ppid=17792 pid=17797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.498:13711): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.498:13711): arch=40000003 syscall=11 success=yes exit=0 a0=985eea8 a1=98421f8 a2=985ff40 a3=985f5a8 items=0 ppid=17802 pid=17803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.522:13712): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.522:13712): arch=40000003 syscall=11 success=yes exit=0 a0=985fd18 a1=985f3e0 a2=985ff40 a3=985fe48 items=0 ppid=17797 pid=17804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="usleep" exe="/bin/usleep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.630:13713): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.630:13713): arch=40000003 syscall=11 success=yes exit=0 a0=985eac8 a1=985f6d8 a2=985ff40 a3=985e858 items=0 ppid=17797 pid=17805 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.634:13714): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.634:13714): arch=40000003 syscall=11 success=yes exit=0 a0=9844f10 a1=985e790 a2=985ff40 a3=9844e18 items=0 ppid=17797 pid=17806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.638:13715): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.638:13715): arch=40000003 syscall=11 success=yes exit=0 a0=9df88c0 a1=9df9f40 a2=9e03ce0 a3=9df9e10 items=0 ppid=17792 pid=17807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcidmapd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.658:13716): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.658:13716): arch=40000003 syscall=11 success=yes exit=0 a0=929c9a8 a1=92b4250 a2=92a4ce0 a3=92b37a8 items=0 ppid=17812 pid=17813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.682:13717): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.682:13717): arch=40000003 syscall=11 success=yes exit=0 a0=92b3c48 a1=92b3f20 a2=92a4ce0 a3=92b37a8 items=0 ppid=17812 pid=17814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.702:13718): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.702:13718): arch=40000003 syscall=11 success=yes exit=0 a0=929b0e0 a1=929d588 a2=92a4ce0 a3=929b010 items=0 ppid=17807 pid=17815 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.706:13719): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.706:13719): arch=40000003 syscall=11 success=yes exit=0 a0=92b2898 a1=929b2a0 a2=92a4ce0 a3=929b158 items=0 ppid=17807 pid=17816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="lsmod" exe="/sbin/lsmod" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.706:13720): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.706:13720): arch=40000003 syscall=11 success=yes exit=0 a0=929b178 a1=929b2a0 a2=92a4ce0 a3=929b148 items=0 ppid=17807 pid=17817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.714:13721): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.714:13721): arch=40000003 syscall=11 success=yes exit=0 a0=929b5c8 a1=92983d0 a2=92a4ce0 a3=929b0e0 items=0 ppid=17818 pid=17819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.714:13722): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.714:13722): arch=40000003 syscall=11 success=yes exit=0 a0=9298450 a1=929b2a0 a2=92a4ce0 a3=929b270 items=0 ppid=17818 pid=17820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="awk" exe="/bin/gawk" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.722:13723): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:shell_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.722:13723): arch=40000003 syscall=11 success=yes exit=0 a0=92b5368 a1=929afe0 a2=92a4ce0 a3=92b4168 items=0 ppid=17807 pid=17821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.726:13724): security_compute_sid: invalid context staff_u:system_r:rpcd_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:rpcd_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.726:13724): arch=40000003 syscall=11 success=yes exit=0 a0=9628c08 a1=9628f38 a2=9628e08 a3=9628880 items=0 ppid=17821 pid=17822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpc.idmapd" exe="/usr/sbin/rpc.idmapd" subj=staff_u:system_r:rpcd_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.734:13725): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.734:13725): arch=40000003 syscall=11 success=yes exit=0 a0=929b1f8 a1=92b4848 a2=92a4ce0 a3=929ae18 items=0 ppid=17807 pid=17824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.742:13726): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.742:13726): arch=40000003 syscall=11 success=yes exit=0 a0=957f448 a1=957f248 a2=957f468 a3=957f1c0 items=0 ppid=17786 pid=17825 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.762:13727): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:rpm_script_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.762:13727): arch=40000003 syscall=11 success=yes exit=0 a0=957f448 a1=957f2e0 a2=957f468 a3=957f040 items=0 ppid=17786 pid=17830 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="nfs" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.782:13728): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.782:13728): arch=40000003 syscall=11 success=yes exit=0 a0=9393160 a1=937c040 a2=9383760 a3=9392fb0 items=0 ppid=17830 pid=17836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="service" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.802:13729): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.802:13729): arch=40000003 syscall=11 success=yes exit=0 a0=8dacce0 a1=8dc2920 a2=8dad7f8 a3=8dc2758 items=0 ppid=17836 pid=17841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.806:13730): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.806:13730): arch=40000003 syscall=11 success=yes exit=0 a0=8dacd10 a1=8dc28c0 a2=8dad7f8 a3=8dacb78 items=0 ppid=17836 pid=17842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="basename" exe="/bin/basename" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.810:13731): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:bin_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.810:13731): arch=40000003 syscall=11 success=yes exit=0 a0=8daa138 a1=8dbb288 a2=8dad7f8 a3=8daa188 items=0 ppid=17836 pid=17843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="env" exe="/bin/env" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163779594.814:13732): security_compute_sid: invalid context staff_u:sysadm_r:initrc_t:s0 for scontext=staff_u:sysadm_r:initrc_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163779594.814:13732): arch=40000003 syscall=11 success=yes exit=0 a0=bff4abdb a1=bff491b8 a2=996b858 a3=5 items=0 ppid=17836 pid=17843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rpcsvcgssd" exe="/bin/bash" subj=staff_u:sysadm_r:initrc_t:s0 key=(null) type=AVC msg=audit(1163779597.918:13733): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779597.918:13733): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779597.918:13733): path="/dev/net/tun" type=AVC msg=audit(1163779597.946:13734): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163779597.946:13734): arch=40000003 syscall=4 success=yes exit=40 a0=4 a1=805c570 a2=28 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163779597.946:13734): path="/dev/net/tun" type=USER_ACCT msg=audit(1163779801.843:13735): user pid=17860 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163779801.843:13736): login pid=17860 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163779801.855:13737): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163779801.855:13738): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779801.883:13739): avc: denied { execute } for pid=17861 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163779801.883:13739): avc: denied { execute_no_trans } for pid=17861 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.883:13739): arch=40000003 syscall=11 success=yes exit=0 a0=8ed81b0 a1=8ed8358 a2=8ed8290 a3=8ed8008 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.883:13739): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163779801.887:13740): avc: denied { execute } for pid=17861 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779801.887:13740): avc: denied { execute_no_trans } for pid=17861 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163779801.887:13740): avc: denied { read } for pid=17861 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.887:13740): arch=40000003 syscall=11 success=yes exit=0 a0=87ead48 a1=87ea740 a2=87ead60 a3=87ea740 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.887:13740): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163779801.887:13740): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163779801.891:13741): avc: denied { search } for pid=17861 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163779801.891:13741): avc: denied { read } for pid=17861 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.891:13741): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=99be7f8 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.891:13742): avc: denied { getattr } for pid=17861 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.891:13742): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfff9928 a2=362ff4 a3=99be7f8 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.891:13742): path="/proc/net/dev" type=AVC msg=audit(1163779801.891:13743): avc: denied { search } for pid=17861 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163779801.891:13743): arch=40000003 syscall=33 success=yes exit=0 a0=bfff9cd4 a1=0 a2=bfff9bc8 a3=bfff9bd0 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.919:13744): avc: denied { read append } for pid=17861 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.919:13744): arch=40000003 syscall=5 success=yes exit=3 a0=bfff9cd4 a1=402 a2=bfff9e98 a3=bfff9bd0 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.931:13745): avc: denied { search } for pid=17861 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163779801.931:13745): avc: denied { read } for pid=17861 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.931:13745): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=99bf348 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.931:13746): avc: denied { getattr } for pid=17861 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.931:13746): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfff9780 a2=362ff4 a3=99bf348 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.931:13746): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163779801.931:13747): avc: denied { search } for pid=17861 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163779801.931:13747): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=99bf348 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163779801.931:13748): avc: denied { lock } for pid=17861 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163779801.931:13748): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfff9bd0 a3=3 items=0 ppid=17860 pid=17861 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163779801.931:13748): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163779801.951:13749): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163779801.951:13750): user pid=17860 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163779805.239:13751): avc: denied { getattr } for pid=17403 comm="setroubleshootd" name="net" dev=proc ino=-268435432 scontext=staff_u:system_r:setroubleshootd_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163779805.239:13751): arch=40000003 syscall=195 success=yes exit=0 a0=b79fc1d0 a1=b79fc214 a2=582ff4 a3=b79fc1d9 items=0 ppid=1 pid=17403 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="setroubleshootd" exe="/usr/bin/python" subj=staff_u:system_r:setroubleshootd_t:s0 key=(null) type=AVC_PATH msg=audit(1163779805.239:13751): path="/proc/net" type=AVC msg=audit(1163779929.135:13752): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163779929.135:13752): arch=40000003 syscall=100 success=yes exit=0 a0=18 a1=bfcd52ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=USER_ACCT msg=audit(1163780401.988:13753): user pid=17893 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163780401.992:13754): login pid=17893 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163780401.992:13755): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163780401.992:13756): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163780402.000:13757): avc: denied { execute } for pid=17894 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163780402.000:13757): avc: denied { execute_no_trans } for pid=17894 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163780402.000:13757): avc: denied { read } for pid=17894 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163780402.000:13757): arch=40000003 syscall=11 success=yes exit=0 a0=8695d48 a1=8695740 a2=8695d60 a3=8695740 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163780402.000:13757): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163780402.000:13757): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163780402.004:13758): avc: denied { search } for pid=17894 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163780402.004:13758): arch=40000003 syscall=33 success=yes exit=0 a0=bfd52a24 a1=0 a2=bfd52918 a3=bfd52920 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163780402.004:13759): avc: denied { read append } for pid=17894 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163780402.004:13759): arch=40000003 syscall=5 success=yes exit=3 a0=bfd52a24 a1=402 a2=bfd52be8 a3=bfd52920 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163780402.004:13760): avc: denied { lock } for pid=17894 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163780402.004:13760): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfd52920 a3=3 items=0 ppid=17893 pid=17894 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163780402.004:13760): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163780402.044:13761): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163780402.044:13762): user pid=17893 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163780530.068:13763): avc: denied { execute } for pid=16541 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163780530.068:13763): arch=40000003 syscall=192 success=yes exit=62861312 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163780530.068:13763): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163780530.392:13764): avc: denied { read } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163780530.392:13764): arch=40000003 syscall=33 success=yes exit=0 a0=bfad6fcb a1=4 a2=33ea64 a3=bfad6fcb items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163780530.392:13765): avc: denied { getattr } for pid=16541 comm="firefox-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163780530.392:13765): arch=40000003 syscall=197 success=yes exit=0 a0=46 a1=bfad161c a2=10b0ff4 a3=ae80638 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163780530.392:13765): path="/tmp/.gdm0UWNIT" type=USER_ACCT msg=audit(1163781001.082:13766): user pid=17945 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163781001.082:13767): login pid=17945 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163781001.086:13768): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163781001.086:13769): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163781001.106:13770): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163781001.106:13771): user pid=17945 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163781601.151:13772): user pid=17971 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163781601.151:13773): login pid=17971 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163781601.151:13774): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163781601.151:13775): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163781601.167:13776): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163781601.167:13777): user pid=17971 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163782201.209:13778): user pid=17995 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163782201.209:13779): login pid=17995 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163782201.209:13780): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163782201.209:13781): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163782201.253:13782): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163782201.257:13783): user pid=17995 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163782454.417:13784): avc: denied { read } for pid=18033 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782454.417:13784): arch=40000003 syscall=33 success=yes exit=0 a0=bfb38f92 a1=4 a2=da3a64 a3=bfb38f92 items=0 ppid=18032 pid=18033 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163782663.570:13785): avc: denied { execute } for pid=18047 comm="firefox-bin" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=AVC msg=audit(1163782663.570:13785): avc: denied { execute_no_trans } for pid=18047 comm="firefox-bin" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=AVC msg=audit(1163782663.570:13785): avc: denied { read } for pid=18047 comm="firefox-bin" name="evolution-2.10" dev=dm-0 ino=10329292 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:evolution_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163782663.570:13785): arch=40000003 syscall=11 success=yes exit=0 a0=c32dc7c a1=c32d998 a2=97fc2c0 a3=bfad6d95 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782663.570:13785): path="/usr/bin/evolution-2.10" type=AVC_PATH msg=audit(1163782663.570:13785): path="/usr/bin/evolution-2.10" type=AVC msg=audit(1163782664.558:13786): avc: denied { search } for pid=18047 comm="evolution" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782664.558:13786): avc: denied { write } for pid=18047 comm="evolution" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782664.558:13786): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbc6c0 a2=df7770 a3=16 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782664.558:13787): avc: denied { read } for pid=18047 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782664.558:13787): arch=40000003 syscall=33 success=yes exit=0 a0=8aee240 a1=4 a2=df7770 a3=8aee240 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782664.582:13788): avc: denied { getattr } for pid=18047 comm="evolution" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782664.582:13788): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bffbc75c a2=758aff4 a3=8aeeb30 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782664.582:13788): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163782667.450:13789): avc: denied { write } for pid=18051 comm="evolution-data-" name="[214240]" dev=pipefs ino=214240 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782667.450:13789): arch=40000003 syscall=11 success=yes exit=0 a0=9770f60 a1=9771230 a2=9771248 a3=0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.450:13789): path="pipe:[214240]" type=AVC msg=audit(1163782667.626:13790): avc: denied { read } for pid=18051 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13790): arch=40000003 syscall=5 success=yes exit=3 a0=57eb3c a1=0 a2=0 a3=0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.626:13791): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13791): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf806754 a2=595ff4 a3=3 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.626:13791): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163782667.626:13792): avc: denied { getsched } for pid=18051 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1163782667.626:13792): arch=40000003 syscall=155 success=yes exit=0 a0=4683 a1=b7f228dc a2=19bff4 a3=b7f226d0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.626:13793): avc: denied { search } for pid=18051 comm="evolution-data-" name="locale" dev=dm-0 ino=10311905 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163782667.626:13793): avc: denied { read } for pid=18051 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13793): arch=40000003 syscall=5 success=yes exit=3 a0=40484c a1=8000 a2=1b6 a3=9604200 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.626:13794): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.626:13794): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf806d68 a2=595ff4 a3=9604200 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.626:13794): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1163782667.630:13795): avc: denied { read } for pid=18051 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.630:13795): arch=40000003 syscall=5 success=yes exit=3 a0=57eb60 a1=8000 a2=1 a3=bf806c50 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13796): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.630:13796): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=596aa0 a2=595ff4 a3=bf806c50 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13796): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163782667.630:13797): avc: denied { read } for pid=18051 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13797): arch=40000003 syscall=5 success=yes exit=9 a0=960a958 a1=18800 a2=abafc0 a3=960a958 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13798): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13798): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf806d6c a2=595ff4 a3=9 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13798): path="/tmp" type=AVC msg=audit(1163782667.630:13799): avc: denied { search } for pid=18051 comm="evolution-data-" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.630:13799): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13799): arch=40000003 syscall=195 success=yes exit=0 a0=960c660 a1=bf806dac a2=595ff4 a3=bf806dac items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13799): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1163782667.630:13800): avc: denied { setattr } for pid=18051 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782667.630:13800): arch=40000003 syscall=30 success=yes exit=0 a0=960c5d0 a1=bf806e04 a2=466ef80 a3=1f4 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13801): avc: denied { read } for pid=18051 comm="evolution-data-" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782667.630:13801): arch=40000003 syscall=5 success=yes exit=9 a0=3d4880 a1=8000 a2=1b6 a3=960cfc0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.630:13802): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782667.630:13802): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf806d8c a2=595ff4 a3=960cfc0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13802): path="/dev/urandom" type=AVC msg=audit(1163782667.630:13803): avc: denied { ioctl } for pid=18051 comm="evolution-data-" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782667.630:13803): arch=40000003 syscall=54 success=no exit=-22 a0=9 a1=5401 a2=bf806cec a3=bf806d2c items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.630:13803): path="/dev/urandom" type=AVC msg=audit(1163782667.634:13804): avc: denied { search } for pid=18051 comm="evolution-data-" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.634:13804): avc: denied { read } for pid=18051 comm="evolution-data-" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.634:13804): arch=40000003 syscall=5 success=yes exit=9 a0=960e8d8 a1=0 a2=1b6 a3=960e900 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.634:13805): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.634:13805): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bf806418 a2=595ff4 a3=960e900 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.634:13805): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1163782667.634:13806): avc: denied { write } for pid=18051 comm="evolution-data-" name="linc-4651-0-23d6c771c010d" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1163782667.634:13806): avc: denied { connectto } for pid=18051 comm="evolution-data-" name="linc-4651-0-23d6c771c010d" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782667.634:13806): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf806b30 a2=466ef80 a3=0 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.634:13806): path="/tmp/orbit-kmacmill/linc-4651-0-23d6c771c010d" type=AVC msg=audit(1163782667.634:13807): avc: denied { write } for pid=18051 comm="evolution-data-" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.634:13807): avc: denied { add_name } for pid=18051 comm="evolution-data-" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782667.634:13807): avc: denied { create } for pid=18051 comm="evolution-data-" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782667.634:13807): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf806b70 a2=466ef80 a3=b7f2269c items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.634:13808): avc: denied { connectto } for pid=18001 comm="gconfd-2" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782667.634:13808): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfa7bbc0 a2=466ef80 a3=0 items=0 ppid=1 pid=18001 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.634:13808): path="/tmp/orbit-kmacmill/linc-4683-0-7ad019c79b7ca" type=AVC msg=audit(1163782667.782:13809): avc: denied { write } for pid=18051 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.782:13809): arch=40000003 syscall=5 success=yes exit=16 a0=9614048 a1=42 a2=1c0 a3=9614048 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782667.782:13810): avc: denied { lock } for pid=18051 comm="evolution-data-" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782667.782:13810): arch=40000003 syscall=221 success=yes exit=0 a0=10 a1=7 a2=bf806dcc a3=bf806dcc items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.782:13810): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1163782667.866:13811): avc: denied { getattr } for pid=18051 comm="evolution-data-" name="[214240]" dev=pipefs ino=214240 scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782667.866:13811): arch=40000003 syscall=197 success=yes exit=0 a0=21 a1=bf806e04 a2=595ff4 a3=9621278 items=0 ppid=1 pid=18051 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.866:13811): path="pipe:[214240]" type=AVC msg=audit(1163782667.866:13812): avc: denied { connectto } for pid=18047 comm="evolution" name="linc-4683-0-7ad019c79b7ca" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782667.866:13812): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbcb10 a2=466ef80 a3=0 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782667.866:13812): path="/tmp/orbit-kmacmill/linc-4683-0-7ad019c79b7ca" type=AVC msg=audit(1163782668.126:13813): avc: denied { getattr } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163782668.126:13813): arch=40000003 syscall=195 success=yes exit=0 a0=8ba8e80 a1=bffbc69c a2=758aff4 a3=4 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782668.126:13813): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163782668.126:13814): avc: denied { search } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163782668.126:13814): arch=40000003 syscall=33 success=yes exit=0 a0=8ba8e80 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782668.506:13815): avc: denied { getattr } for pid=18047 comm="evolution" name="gtkrc-mail-fonts" dev=dm-0 ino=6814316 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782668.506:13815): arch=40000003 syscall=196 success=yes exit=0 a0=8ba5e08 a1=bffbc98c a2=758aff4 a3=8b019c8 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782668.506:13815): path="/home/kmacmill/.evolution/mail/config/gtkrc-mail-fonts" type=AVC msg=audit(1163782668.554:13816): avc: denied { read } for pid=18047 comm="evolution" name="gtkrc-mail-fonts" dev=dm-0 ino=6814316 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782668.554:13816): arch=40000003 syscall=5 success=yes exit=19 a0=8ba5e08 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782668.946:13817): avc: denied { write } for pid=18047 comm="evolution" name="cert8.db" dev=dm-0 ino=6778529 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782668.946:13817): arch=40000003 syscall=5 success=yes exit=19 a0=8b990c0 a1=2 a2=180 a3=2 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782669.114:13818): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782669.114:13818): arch=40000003 syscall=3 success=yes exit=60 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782669.114:13818): path="/dev/net/tun" type=AVC msg=audit(1163782669.218:13819): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782669.218:13819): arch=40000003 syscall=4 success=yes exit=60 a0=4 a1=805c570 a2=3c a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782669.218:13819): path="/dev/net/tun" type=AVC msg=audit(1163782670.122:13820): avc: denied { append } for pid=18056 comm="evolution" name="journal" dev=dm-0 ino=6782620 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782670.122:13820): arch=40000003 syscall=5 success=yes exit=29 a0=8c039e0 a1=442 a2=1b6 a3=8c03c98 items=0 ppid=1 pid=18056 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782670.866:13821): avc: denied { connectto } for pid=18062 comm="evolution-data-" name="linc-467f-0-732b5c6395bf3" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782670.866:13821): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=b7cdfe70 a2=466ef80 a3=0 items=0 ppid=1 pid=18062 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC_PATH msg=audit(1163782670.866:13821): path="/tmp/orbit-kmacmill/linc-467f-0-732b5c6395bf3" type=AVC msg=audit(1163782671.098:13822): avc: denied { create } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13822): arch=40000003 syscall=102 success=yes exit=20 a0=1 a1=b72deb04 a2=595ff4 a3=b72ded91 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13823): avc: denied { bind } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13823): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b72deb04 a2=595ff4 a3=14 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13824): avc: denied { getattr } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13824): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b72deb04 a2=595ff4 a3=14 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13825): avc: denied { write } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163782671.098:13825): avc: denied { nlmsg_read } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13825): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b72dda3c a2=595ff4 a3=0 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782671.098:13826): avc: denied { read } for pid=18063 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163782671.098:13826): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b72dda3c a2=595ff4 a3=0 items=0 ppid=1 pid=18063 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782673.558:13827): avc: denied { write } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163782673.558:13827): avc: denied { add_name } for pid=18047 comm="evolution" name=".evolution-composer.autosave-M1CUIT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163782673.558:13827): avc: denied { create } for pid=18047 comm="evolution" name=".evolution-composer.autosave-M1CUIT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782673.558:13827): arch=40000003 syscall=5 success=yes exit=39 a0=8c081e8 a1=80c2 a2=180 a3=80c2 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782673.562:13828): avc: denied { read } for pid=18047 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163782673.562:13828): arch=40000003 syscall=5 success=yes exit=40 a0=8c08230 a1=18800 a2=318bd14 a3=8c08230 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782674.022:13829): avc: denied { name_connect } for pid=18068 comm="evolution" dest=993 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163782674.022:13829): avc: denied { send_msg } for pid=18068 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782674.022:13829): arch=40000003 syscall=102 success=no exit=-115 a0=3 a1=aa35aef0 a2=4932550 a3=0 items=0 ppid=1 pid=18068 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782674.054:13830): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782674.054:13830): arch=40000003 syscall=4 success=yes exit=60 a0=4 a1=805c570 a2=3c a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163782674.442:13831): avc: denied { write } for pid=18072 comm="evolution-alarm" name="[214306]" dev=pipefs ino=214306 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782674.442:13831): arch=40000003 syscall=11 success=yes exit=0 a0=97742c0 a1=97715b0 a2=97715c8 a3=0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.442:13831): path="pipe:[214306]" type=AVC msg=audit(1163782674.658:13832): avc: denied { read } for pid=18072 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=10509693 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.658:13832): arch=40000003 syscall=5 success=yes exit=3 a0=bfd65d30 a1=0 a2=0 a3=bfd65d30 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.658:13833): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=10509693 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.658:13833): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd65d84 a2=c27fc0 a3=4 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.658:13833): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1163782674.662:13834): avc: denied { execute } for pid=18072 comm="evolution-alarm" name="libeutil.so.0.0.0" dev=dm-0 ino=10509693 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.662:13834): arch=40000003 syscall=192 success=yes exit=7815168 a0=0 a1=33cd0 a2=5 a3=802 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.662:13834): path="/usr/lib/evolution/2.10/libeutil.so.0.0.0" type=AVC msg=audit(1163782674.662:13835): avc: denied { read } for pid=18072 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.662:13835): arch=40000003 syscall=5 success=yes exit=3 a0=c25037 a1=0 a2=c28650 a3=ffffffff items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.662:13836): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.662:13836): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd65c78 a2=c27fc0 a3=ffffffff items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.662:13836): path="/etc/ld.so.cache" type=AVC msg=audit(1163782674.734:13837): avc: denied { read } for pid=18072 comm="evolution-alarm" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.734:13837): arch=40000003 syscall=125 success=yes exit=0 a0=c27000 a1=1000 a2=1 a3=380 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.734:13837): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1163782674.738:13838): avc: denied { getsched } for pid=18072 comm="evolution-alarm" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1163782674.738:13838): arch=40000003 syscall=155 success=yes exit=0 a0=4698 a1=b7fc6aec a2=1eeff4 a3=b7fc68e0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.742:13839): avc: denied { read } for pid=18072 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.742:13839): arch=40000003 syscall=5 success=yes exit=3 a0=7c58f9d a1=0 a2=1b6 a3=86fc258 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.742:13840): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.742:13840): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd65e64 a2=7c70ff4 a3=86fc258 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.742:13840): path="/etc/nsswitch.conf" type=AVC msg=audit(1163782674.746:13841): avc: denied { read } for pid=18072 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=4845049 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.746:13841): arch=40000003 syscall=5 success=yes exit=3 a0=bfd61e08 a1=0 a2=1b6 a3=8703888 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.746:13842): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="locale.alias" dev=dm-0 ino=4845049 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.746:13842): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd61a28 a2=7c70ff4 a3=8703888 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.746:13842): path="/usr/share/X11/locale/locale.alias" type=AVC msg=audit(1163782674.750:13843): avc: denied { read } for pid=18072 comm="evolution-alarm" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.750:13843): arch=40000003 syscall=33 success=yes exit=0 a0=bfd67c28 a1=4 a2=da3a64 a3=bfd67c28 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.750:13844): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.750:13844): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfd65cbc a2=7c70ff4 a3=8706cc0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.750:13844): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163782674.754:13845): avc: denied { read } for pid=18072 comm="evolution-alarm" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.754:13845): arch=40000003 syscall=5 success=yes exit=10 a0=86fc058 a1=18800 a2=c27fc0 a3=86fc058 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.754:13846): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.754:13846): arch=40000003 syscall=195 success=yes exit=0 a0=8715768 a1=bfd6631c a2=7c70ff4 a3=bfd6631c items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.754:13846): path="/tmp/orbit-kmacmill" type=AVC msg=audit(1163782674.754:13847): avc: denied { setattr } for pid=18072 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.754:13847): arch=40000003 syscall=30 success=yes exit=0 a0=8714748 a1=bfd66374 a2=466ef80 a3=1f4 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.754:13848): avc: denied { read } for pid=18072 comm="evolution-alarm" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782674.754:13848): arch=40000003 syscall=5 success=yes exit=10 a0=b7b880 a1=8000 a2=1b6 a3=87147c0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.754:13849): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782674.754:13849): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bfd662fc a2=7c70ff4 a3=87147c0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.754:13849): path="/dev/urandom" type=AVC msg=audit(1163782674.754:13850): avc: denied { ioctl } for pid=18072 comm="evolution-alarm" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163782674.754:13850): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bfd6625c a3=bfd6629c items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.754:13850): path="/dev/urandom" type=AVC msg=audit(1163782674.758:13851): avc: denied { read } for pid=18072 comm="evolution-alarm" name="modules" dev=dm-0 ino=9331073 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163782674.758:13851): arch=40000003 syscall=5 success=yes exit=10 a0=8715b30 a1=18800 a2=b25d07 a3=8715b30 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.758:13852): avc: denied { search } for pid=18072 comm="evolution-alarm" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.758:13852): avc: denied { write } for pid=18072 comm="evolution-alarm" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1163782674.758:13852): avc: denied { connectto } for pid=18072 comm="evolution-alarm" name="15931" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782674.758:13852): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd65d70 a2=df7770 a3=16 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.758:13852): path="/tmp/.ICE-unix/15931" type=AVC msg=audit(1163782674.758:13853): avc: denied { read } for pid=18072 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.758:13853): arch=40000003 syscall=33 success=yes exit=0 a0=8717ea8 a1=4 a2=df7770 a3=8717ea8 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.758:13854): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.758:13854): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfd65e0c a2=7c70ff4 a3=8718798 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.758:13854): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163782674.762:13855): avc: denied { search } for pid=18072 comm="evolution-alarm" name="gconfd-kmacmill" dev=dm-0 ino=15648282 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.762:13855): avc: denied { read } for pid=18072 comm="evolution-alarm" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.762:13855): arch=40000003 syscall=5 success=yes exit=11 a0=871b040 a1=0 a2=1b6 a3=871b068 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.766:13856): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="ior" dev=dm-0 ino=15647969 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782674.766:13856): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfd65928 a2=7c70ff4 a3=871b068 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.766:13856): path="/tmp/gconfd-kmacmill/lock/ior" type=AVC msg=audit(1163782674.766:13857): avc: denied { write } for pid=18072 comm="evolution-alarm" name="linc-4651-0-23d6c771c010d" dev=dm-0 ino=14568138 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782674.766:13857): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd66040 a2=466ef80 a3=0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.766:13858): avc: denied { write } for pid=18072 comm="evolution-alarm" name="orbit-kmacmill" dev=dm-0 ino=14567718 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.766:13858): avc: denied { add_name } for pid=18072 comm="evolution-alarm" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=dir type=AVC msg=audit(1163782674.766:13858): avc: denied { create } for pid=18072 comm="evolution-alarm" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163782674.766:13858): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfd66080 a2=466ef80 a3=b7fc68ac items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782674.774:13859): avc: denied { connectto } for pid=18001 comm="gconfd-2" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782674.774:13859): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfa7bbc0 a2=466ef80 a3=0 items=0 ppid=1 pid=18001 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gconfd-2" exe="/usr/libexec/gconfd-2" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163782674.774:13859): path="/tmp/orbit-kmacmill/linc-4698-0-45fa60dbcacd" type=AVC msg=audit(1163782675.022:13860): avc: denied { read } for pid=18072 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.022:13860): arch=40000003 syscall=5 success=yes exit=18 a0=7c58afa a1=0 a2=1b6 a3=87446e0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782675.022:13861): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.022:13861): arch=40000003 syscall=197 success=yes exit=0 a0=12 a1=bfd61b98 a2=7c70ff4 a3=87446e0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.022:13861): path="/proc/meminfo" type=AVC msg=audit(1163782675.062:13862): avc: denied { connectto } for pid=18072 comm="evolution-alarm" path=002F746D702F646275732D4F36457A564B53704F4E scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782675.062:13862): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfd65f10 a2=703454 a3=0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782675.098:13863): avc: denied { write } for pid=18072 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.098:13863): arch=40000003 syscall=5 success=yes exit=19 a0=8757da0 a1=42 a2=1c0 a3=8757da0 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC msg=audit(1163782675.098:13864): avc: denied { lock } for pid=18072 comm="evolution-alarm" name="bonobo-activation-register.lock" dev=dm-0 ino=14567728 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:object_r:staff_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.098:13864): arch=40000003 syscall=221 success=yes exit=0 a0=13 a1=7 a2=bfd65f4c a3=bfd65f4c items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.098:13864): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=AVC msg=audit(1163782675.110:13865): avc: denied { signal } for pid=18076 comm="evolution-data-" scontext=staff_u:staff_r:staff_evolution_server_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1163782675.110:13865): arch=40000003 syscall=270 success=yes exit=0 a0=4683 a1=4684 a2=21 a3=b7d21bd0 items=0 ppid=1 pid=18076 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-data-" exe="/usr/libexec/evolution-data-server-1.10" subj=staff_u:staff_r:staff_evolution_server_t:s0 key=(null) type=AVC msg=audit(1163782675.114:13866): avc: denied { getattr } for pid=18072 comm="evolution-alarm" name="[214306]" dev=pipefs ino=214306 scontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163782675.114:13866): arch=40000003 syscall=197 success=yes exit=0 a0=22 a1=bfd66314 a2=7c70ff4 a3=8762150 items=0 ppid=1 pid=18072 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution-alarm" exe="/usr/libexec/evolution/2.10/evolution-alarm-notify" subj=staff_u:staff_r:staff_evolution_alarm_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.114:13866): path="pipe:[214306]" type=AVC msg=audit(1163782675.118:13867): avc: denied { connectto } for pid=18047 comm="evolution" name="linc-4698-0-45fa60dbcacd" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782675.118:13867): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbcb00 a2=466ef80 a3=0 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782675.118:13867): path="/tmp/orbit-kmacmill/linc-4698-0-45fa60dbcacd" type=AVC msg=audit(1163782675.886:13868): avc: denied { remove_name } for pid=18066 comm="evolution" name="2289." dev=dm-0 ino=6814000 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163782675.886:13868): avc: denied { unlink } for pid=18066 comm="evolution" name="2289." dev=dm-0 ino=6814000 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782675.886:13868): arch=40000003 syscall=10 success=yes exit=0 a0=8f21198 a1=bae708 a2=bae708 a3=8f21198 items=0 ppid=1 pid=18066 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782677.135:13869): avc: denied { rename } for pid=18066 comm="evolution" name="summary~" dev=dm-0 ino=6811439 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782677.135:13869): arch=40000003 syscall=38 success=yes exit=0 a0=b4091000 a1=8dbaeb8 a2=1dcbd8 a3=8fbae74 items=0 ppid=1 pid=18066 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782677.215:13870): avc: denied { connectto } for pid=18047 comm="evolution" path=002F746D702F646275732D4F36457A564B53704F4E scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163782677.215:13870): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bffbca00 a2=64a454 a3=0 items=0 ppid=1 pid=18047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782687.191:13871): avc: denied { lock } for pid=18094 comm="evolution" name="Outbox" dev=dm-0 ino=6785198 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163782687.191:13871): arch=40000003 syscall=221 success=yes exit=0 a0=2c a1=6 a2=b2c8f15c a3=b2c8f15c items=0 ppid=1 pid=18094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163782687.191:13871): path="/home/kmacmill/.evolution/mail/local/Outbox" type=AVC msg=audit(1163782687.703:13872): avc: denied { name_connect } for pid=18094 comm="evolution" dest=25 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:smtp_port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163782687.703:13872): avc: denied { send_msg } for pid=18094 comm="evolution" saddr=10.11.14.219 src=53306 daddr=10.11.255.15 dest=25 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:smtp_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782687.703:13872): arch=40000003 syscall=102 success=no exit=-115 a0=3 a1=b2c8ef50 a2=1dcbd8 a3=0 items=0 ppid=1 pid=18094 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163782687.739:13873): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=25 daddr=10.11.14.219 dest=53306 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:smtp_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163782687.739:13873): arch=40000003 syscall=4 success=yes exit=60 a0=4 a1=805c570 a2=3c a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163782801.294:13874): user pid=18104 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163782801.298:13875): login pid=18104 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163782801.298:13876): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163782801.298:13877): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163782801.306:13878): avc: denied { read } for pid=18105 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163782801.306:13878): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=90897f8 items=0 ppid=18104 pid=18105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782801.306:13879): avc: denied { getattr } for pid=18105 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163782801.306:13879): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfb1e448 a2=99bff4 a3=90897f8 items=0 ppid=18104 pid=18105 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782801.306:13879): path="/proc/net/dev" type=CRED_DISP msg=audit(1163782801.318:13880): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163782801.318:13881): user pid=18104 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163782861.326:13882): user pid=18106 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163782861.326:13883): login pid=18106 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163782861.330:13884): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163782861.330:13885): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163782861.338:13886): avc: denied { getattr } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.338:13886): arch=40000003 syscall=195 success=yes exit=0 a0=89ef120 a1=bfa2f470 a2=bccff4 a3=89ef120 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.338:13886): path="/usr/bin/run-parts" type=AVC msg=audit(1163782861.394:13887): avc: denied { execute } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.394:13887): arch=40000003 syscall=33 success=yes exit=0 a0=89ef120 a1=1 a2=11 a3=89ef120 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.394:13888): avc: denied { read } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.394:13888): arch=40000003 syscall=33 success=yes exit=0 a0=89ef120 a1=4 a2=ffffffff a3=89ef120 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.394:13889): avc: denied { execute_no_trans } for pid=18107 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.394:13889): arch=40000003 syscall=11 success=yes exit=0 a0=89ef120 a1=89ef3d8 a2=89ef2f8 a3=89eef98 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.394:13889): path="/usr/bin/run-parts" type=AVC msg=audit(1163782861.406:13890): avc: denied { ioctl } for pid=18107 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.406:13890): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bffe5ac8 a3=bffe5b08 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.406:13890): path="/usr/bin/run-parts" type=AVC msg=audit(1163782861.406:13891): avc: denied { execute } for pid=18107 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.406:13891): arch=40000003 syscall=33 success=yes exit=0 a0=8fc6990 a1=1 a2=1 a3=8fc6c98 items=0 ppid=18106 pid=18107 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.410:13892): avc: denied { execute_no_trans } for pid=18108 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.410:13892): arch=40000003 syscall=11 success=yes exit=0 a0=8fc6a10 a1=8fc6ad8 a2=8fc6ae8 a3=8fc6758 items=0 ppid=18107 pid=18108 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.410:13892): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163782861.426:13893): avc: denied { execute } for pid=18110 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163782861.426:13893): avc: denied { execute_no_trans } for pid=18110 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163782861.426:13893): avc: denied { read } for pid=18110 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.426:13893): arch=40000003 syscall=11 success=yes exit=0 a0=8af0678 a1=8af0808 a2=8af0720 a3=8af0508 items=0 ppid=18108 pid=18110 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.426:13893): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163782861.426:13893): path="/sbin/chkconfig" type=AVC msg=audit(1163782861.426:13894): avc: denied { read } for pid=18110 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.426:13894): arch=40000003 syscall=5 success=yes exit=3 a0=bf857b20 a1=0 a2=ffffffff a3=9c48038 items=0 ppid=18108 pid=18110 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163782861.438:13895): avc: denied { getattr } for pid=18110 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163782861.438:13895): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf857a8c a2=24bff4 a3=bf857a8c items=0 ppid=18108 pid=18110 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163782861.438:13895): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163782861.462:13896): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163782861.462:13897): user pid=18106 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163783269.908:13898): avc: denied { create } for pid=18131 comm="evolution" name="commits" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163783269.908:13898): arch=40000003 syscall=39 success=yes exit=0 a0=a8415208 a1=1c0 a2=bae708 a3=0 items=0 ppid=1 pid=18131 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1163783401.496:13899): user pid=18141 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163783401.500:13900): login pid=18141 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163783401.500:13901): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163783401.500:13902): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163783401.512:13903): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163783401.512:13904): user pid=18141 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163784001.553:13905): user pid=18172 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163784001.553:13906): login pid=18172 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163784001.553:13907): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163784001.553:13908): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163784001.585:13909): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163784001.585:13910): user pid=18172 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163784601.623:13911): user pid=18208 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163784601.627:13912): login pid=18208 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163784601.627:13913): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163784601.627:13914): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163784601.647:13915): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163784601.647:13916): user pid=18208 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163784917.951:13917): avc: denied { execmem } for pid=18220 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163784917.951:13917): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=16501 pid=18220 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163784917.951:13918): avc: denied { execstack } for pid=18220 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163784917.951:13918): arch=40000003 syscall=125 success=yes exit=0 a0=bf8aa000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=16501 pid=18220 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163784918.639:13919): avc: denied { execute } for pid=18220 comm="gnome-screensav" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163784918.639:13919): arch=40000003 syscall=192 success=yes exit=2985984 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=16501 pid=18220 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163784918.639:13919): path="/dev/zero" type=USER_ACCT msg=audit(1163785201.692:13920): user pid=18235 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163785201.692:13921): login pid=18235 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163785201.692:13922): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163785201.692:13923): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163785201.712:13924): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163785201.712:13925): user pid=18235 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163785801.758:13926): user pid=18259 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163785801.758:13927): login pid=18259 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163785801.758:13928): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163785801.758:13929): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163785801.782:13930): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163785801.782:13931): user pid=18259 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163786401.823:13932): user pid=18289 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163786401.827:13933): login pid=18289 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163786401.827:13934): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163786401.827:13935): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163786401.859:13936): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163786401.859:13937): user pid=18289 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163786461.863:13938): user pid=18292 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163786461.867:13939): login pid=18292 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163786461.867:13940): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163786461.867:13941): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163786461.899:13942): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163786461.899:13943): user pid=18292 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163787001.941:13944): user pid=18329 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163787001.941:13945): login pid=18329 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163787001.941:13946): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163787001.941:13947): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787001.953:13948): avc: denied { read } for pid=18330 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163787001.953:13948): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8fa9348 items=0 ppid=18329 pid=18330 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787001.953:13949): avc: denied { getattr } for pid=18330 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163787001.953:13949): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfc593e0 a2=caaff4 a3=8fa9348 items=0 ppid=18329 pid=18330 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787001.953:13949): path="/proc/sys/fs/dentry-state" type=CRED_DISP msg=audit(1163787001.961:13950): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163787001.961:13951): user pid=18329 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787455.869:13952): avc: denied { execstack } for pid=16541 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=AVC msg=audit(1163787455.869:13952): avc: denied { execmem } for pid=16541 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163787455.869:13952): arch=40000003 syscall=125 success=yes exit=0 a0=bfad5000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787455.917:13953): avc: denied { execmod } for pid=16541 comm="firefox-bin" name="nprhapengine.so" dev=dm-0 ino=6547712 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787455.917:13953): arch=40000003 syscall=125 success=yes exit=0 a0=14c0000 a1=26f000 a2=5 a3=bfad1fe0 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787455.917:13953): path="/home/kmacmill/.mozilla/plugins/nprhapengine.so" type=AVC msg=audit(1163787469.318:13954): avc: denied { read } for pid=18362 comm="evolution" name="summary" dev=dm-0 ino=6815397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.318:13954): arch=40000003 syscall=5 success=yes exit=25 a0=91d4610 a1=0 a2=1b6 a3=8c51800 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787469.318:13955): avc: denied { getattr } for pid=18362 comm="evolution" name="summary" dev=dm-0 ino=6815397 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.318:13955): arch=40000003 syscall=197 success=yes exit=0 a0=19 a1=b4090f48 a2=758aff4 a3=8c51800 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787469.318:13955): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/summary" type=AVC msg=audit(1163787469.634:13956): avc: denied { create } for pid=18362 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.634:13956): arch=40000003 syscall=5 success=yes exit=43 a0=b4090ff0 a1=242 a2=180 a3=92401d0 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787469.634:13957): avc: denied { write } for pid=18362 comm="evolution" name="summary~" dev=dm-0 ino=9103731 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.634:13957): arch=40000003 syscall=4 success=yes exit=40 a0=2b a1=b219f000 a2=28 a3=28 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787469.634:13957): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/subfolders/Sent/summary~" type=AVC msg=audit(1163787469.658:13958): avc: denied { rename } for pid=18362 comm="evolution" name="summary~" dev=dm-0 ino=9103731 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=AVC msg=audit(1163787469.658:13958): avc: denied { unlink } for pid=18362 comm="evolution" name="summary" dev=dm-0 ino=9103670 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787469.658:13958): arch=40000003 syscall=38 success=yes exit=0 a0=b4090ff0 a1=92401d0 a2=1dcbd8 a3=923f174 items=0 ppid=1 pid=18362 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163787474.018:13959): avc: denied { lock } for pid=18369 comm="evolution" name="Inbox" dev=dm-0 ino=6778778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787474.018:13959): arch=40000003 syscall=221 success=yes exit=0 a0=19 a1=6 a2=b2c8f1fc a3=b2c8f1fc items=0 ppid=1 pid=18369 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163787474.018:13959): path="/home/kmacmill/.evolution/mail/local/Inbox" type=AVC msg=audit(1163787480.523:13960): avc: denied { read } for pid=16429 comm="gnome-panel" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787480.523:13960): arch=40000003 syscall=5 success=yes exit=29 a0=8d54aa0 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=16429 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787490.983:13961): avc: denied { write } for pid=18373 comm="gnome-sound-pro" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163787490.983:13961): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff90f80 a2=df7770 a3=16 items=0 ppid=1 pid=18373 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-sound-pro" exe="/usr/bin/gnome-sound-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787515.609:13962): avc: denied { read } for pid=18373 comm="gnome-sound-pro" name="default.conf" dev=dm-0 ino=9330152 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:alsa_etc_rw_t:s0 tclass=file type=SYSCALL msg=audit(1163787515.609:13962): arch=40000003 syscall=5 success=yes exit=20 a0=897d648 a1=0 a2=1b6 a3=89855b0 items=0 ppid=1 pid=18373 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-sound-pro" exe="/usr/bin/gnome-sound-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787515.657:13963): avc: denied { read } for pid=18373 comm="gnome-sound-pro" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163787515.657:13963): arch=40000003 syscall=5 success=yes exit=19 a0=f1de73 a1=0 a2=1b6 a3=898fa50 items=0 ppid=1 pid=18373 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-sound-pro" exe="/usr/bin/gnome-sound-properties" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163787527.434:13964): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:userhelper_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163787527.434:13964): arch=40000003 syscall=11 success=yes exit=0 a0=804c35f a1=94df8c8 a2=bf80e1ac a3=3 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787527.538:13965): avc: denied { ioctl } for pid=18382 comm="userhelper" name="[169789]" dev=pipefs ino=169789 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1163787527.538:13965): arch=40000003 syscall=54 success=no exit=-22 a0=1 a1=5401 a2=bfb54528 a3=bfb54568 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787527.538:13965): path="pipe:[169789]" type=USER_AUTH msg=audit(1163787530.250:13966): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: authentication acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1163787530.250:13967): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: accounting acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163787530.270:13968): avc: denied { search } for pid=18382 comm="userhelper" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163787530.270:13968): arch=40000003 syscall=5 success=no exit=-2 a0=bfb57168 a1=8000 a2=1b6 a3=9752c28 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.270:13969): avc: denied { search } for pid=18382 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163787530.270:13969): arch=40000003 syscall=5 success=no exit=-2 a0=bfb57168 a1=8000 a2=1b6 a3=9752d80 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163787530.286:13970): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=AVC msg=audit(1163787530.286:13970): avc: denied { execute_no_trans } for pid=18383 comm="userhelper" name="xauth" dev=dm-0 ino=10326959 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.286:13970): arch=40000003 syscall=11 success=yes exit=0 a0=156681 a1=bfb5812c a2=974cda8 a3=4 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.286:13970): path="/usr/bin/xauth" type=AVC msg=audit(1163787530.338:13971): avc: denied { search } for pid=18383 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1163787530.338:13971): arch=40000003 syscall=195 success=no exit=-2 a0=bf99da97 a1=bf99d5ac a2=256ff4 a3=bf99d5ac items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13972): avc: denied { write } for pid=18383 comm="xauth" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13972): avc: denied { add_name } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13972): avc: denied { create } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13972): arch=40000003 syscall=5 success=yes exit=2 a0=bf99da97 a1=c1 a2=180 a3=ffffffff items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13973): avc: denied { link } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13973): arch=40000003 syscall=9 success=yes exit=0 a0=bf99da97 a1=bf99d696 a2=da3a64 a3=2 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13974): avc: denied { write } for pid=18383 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13974): arch=40000003 syscall=33 success=yes exit=0 a0=bf99ef0e a1=2 a2=bf99dfc0 a3=0 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13975): avc: denied { read } for pid=18383 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13975): arch=40000003 syscall=5 success=yes exit=2 a0=bf99ef0e a1=0 a2=1b6 a3=8f3a008 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13976): avc: denied { getattr } for pid=18383 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13976): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bf99dd0c a2=256ff4 a3=8f3a008 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.338:13976): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163787530.338:13977): avc: denied { remove_name } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13977): avc: denied { unlink } for pid=18383 comm="xauth" name=".gdm0UWNIT-c" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13977): arch=40000003 syscall=10 success=yes exit=0 a0=bf99d687 a1=bf99d296 a2=da3a64 a3=bf99d286 items=0 ppid=18382 pid=18383 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.338:13978): avc: denied { write } for pid=18382 comm="userhelper" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13978): avc: denied { add_name } for pid=18382 comm="userhelper" name=".xauth6LUkFr" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163787530.338:13978): avc: denied { create } for pid=18382 comm="userhelper" name=".xauth6LUkFr" scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.338:13978): arch=40000003 syscall=5 success=yes exit=5 a0=9752ea3 a1=80c2 a2=180 a3=80c2 items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.362:13979): avc: denied { setattr } for pid=18382 comm="userhelper" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.362:13979): arch=40000003 syscall=207 success=yes exit=0 a0=5 a1=0 a2=0 a3=1565bf items=0 ppid=18381 pid=18382 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=SELINUX_ERR msg=audit(1163787530.370:13980): security_compute_sid: invalid context staff_u:staff_r:staff_userhelper_t:s0 for scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=process type=SYSCALL msg=audit(1163787530.370:13980): arch=40000003 syscall=11 success=yes exit=0 a0=156681 a1=bfb5812c a2=974cda8 a3=4 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.370:13981): avc: denied { link } for pid=18384 comm="xauth" name=".xauth6LUkFr-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.370:13981): arch=40000003 syscall=9 success=yes exit=0 a0=bff94887 a1=bff94486 a2=da3a64 a3=2 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.374:13982): avc: denied { write } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.374:13982): arch=40000003 syscall=33 success=yes exit=0 a0=bff94f0a a1=2 a2=bff94db0 a3=0 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.374:13983): avc: denied { read } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.374:13983): arch=40000003 syscall=5 success=yes exit=2 a0=bff94f0a a1=0 a2=1b6 a3=9ae4008 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC msg=audit(1163787530.374:13984): avc: denied { getattr } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.374:13984): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bff94afc a2=34dff4 a3=9ae4008 items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.374:13984): path="/root/.xauth6LUkFr" type=AVC msg=audit(1163787530.394:13985): avc: denied { remove_name } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163787530.394:13985): avc: denied { unlink } for pid=18384 comm="xauth" name=".xauth6LUkFr" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_userhelper_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.394:13985): arch=40000003 syscall=10 success=yes exit=0 a0=9ae4008 a1=1000 a2=0 a3=9ae408a items=0 ppid=18382 pid=18384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_userhelper_t:s0 key=(null) type=USER_START msg=audit(1163787530.398:13986): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session open acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163787530.474:13987): avc: denied { append } for pid=18386 comm="system-config-s" name="scsrun.log" dev=dm-0 ino=13061665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.474:13987): arch=40000003 syscall=5 success=yes exit=3 a0=83c6638 a1=8441 a2=1b6 a3=8441 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787530.522:13988): avc: denied { ioctl } for pid=18386 comm="python2" name="scsrun.log" dev=dm-0 ino=13061665 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.522:13988): arch=40000003 syscall=54 success=no exit=-25 a0=1 a1=5401 a2=bfefd968 a3=bfefd9a8 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787530.522:13988): path="/root/scsrun.log" type=AVC msg=audit(1163787530.666:13989): avc: denied { read } for pid=18386 comm="python2" name="modules.alias" dev=dm-0 ino=13720583 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.666:13989): arch=40000003 syscall=5 success=yes exit=6 a0=8183418 a1=0 a2=81e1098 a3=0 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787530.702:13990): avc: denied { read } for pid=18386 comm="python2" name="mga.xinf" dev=dm-0 ino=10607363 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:hwdata_t:s0 tclass=file type=SYSCALL msg=audit(1163787530.702:13990): arch=40000003 syscall=5 success=yes exit=7 a0=820c060 a1=0 a2=a a3=820b002 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787531.198:13991): avc: denied { read } for pid=18386 comm="python2" name=".xauth6LUkFr" dev=dm-0 ino=13127398 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163787531.198:13991): arch=40000003 syscall=33 success=yes exit=0 a0=bfefdfc5 a1=4 a2=da3a64 a3=bfefdfc5 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787531.286:13992): avc: denied { dac_override } for pid=18386 comm="python2" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163787531.286:13992): arch=40000003 syscall=5 success=no exit=-2 a0=83dce88 a1=8000 a2=1b6 a3=83d7198 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787531.682:13993): avc: denied { syslog_console } for pid=18386 comm="python2" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system type=SYSCALL msg=audit(1163787531.682:13993): arch=40000003 syscall=103 success=yes exit=0 a0=8 a1=0 a2=1 a3=aca369 items=0 ppid=18385 pid=18386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="python2" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787539.130:13994): avc: denied { execute } for pid=18392 comm="python2" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163787539.130:13994): avc: denied { execute_no_trans } for pid=18392 comm="python2" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163787539.130:13994): avc: denied { read } for pid=18392 comm="python2" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163787539.130:13994): arch=40000003 syscall=11 success=yes exit=0 a0=8750d70 a1=8750b90 a2=bfefdc90 a3=8184d18 items=0 ppid=18386 pid=18392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787539.130:13994): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163787539.130:13994): path="/sbin/modprobe" type=AVC msg=audit(1163787539.250:13995): avc: denied { read write } for pid=18392 comm="modprobe" name="snd.ko" dev=dm-0 ino=13720454 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163787539.250:13995): arch=40000003 syscall=5 success=yes exit=3 a0=9aec0bc a1=2 a2=0 a3=9aec0bc items=0 ppid=18386 pid=18392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787539.294:13996): avc: denied { lock } for pid=18392 comm="modprobe" name="snd.ko" dev=dm-0 ino=13720454 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163787539.294:13996): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfcd1ec0 a3=bfcd1ec0 items=0 ppid=18386 pid=18392 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787539.294:13996): path="/lib/modules/2.6.18-1.2849.fc6xen/kernel/sound/core/snd.ko" type=AVC msg=audit(1163787557.768:13997): avc: denied { write } for pid=18393 comm="system-config-s" name="scsconfig.log" dev=dm-0 ino=13061681 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163787557.768:13997): arch=40000003 syscall=5 success=yes exit=3 a0=84c5450 a1=8241 a2=1b6 a3=8241 items=0 ppid=18386 pid=18393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="system-config-s" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_END msg=audit(1163787563.272:13998): user pid=18382 uid=500 auid=500 subj=staff_u:staff_r:staff_userhelper_t:s0 msg='PAM: session close acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1163787586.537:13999): avc: denied { write } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331083 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.537:13999): arch=40000003 syscall=33 success=yes exit=0 a0=9da4040 a1=2 a2=1a4 a3=1 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787586.541:14000): avc: denied { write } for pid=18412 comm="vi" name="etc" dev=dm-0 ino=9329761 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163787586.541:14000): avc: denied { add_name } for pid=18412 comm="vi" name=".modprobe.conf.swp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163787586.541:14000): avc: denied { create } for pid=18412 comm="vi" name=".modprobe.conf.swp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14000): arch=40000003 syscall=5 success=yes exit=4 a0=9da6140 a1=80c2 a2=180 a3=80c2 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787586.541:14001): avc: denied { remove_name } for pid=18412 comm="vi" name=".modprobe.conf.swx" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=AVC msg=audit(1163787586.541:14001): avc: denied { unlink } for pid=18412 comm="vi" name=".modprobe.conf.swx" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14001): arch=40000003 syscall=10 success=yes exit=0 a0=9da6128 a1=2b3 a2=5 a3=9da6152 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787586.541:14002): avc: denied { write } for pid=18412 comm="vi" name=".modprobe.conf.swp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14002): arch=40000003 syscall=4 success=yes exit=4096 a0=4 a1=9db32d8 a2=1000 a3=1 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163787586.541:14002): path="/etc/.modprobe.conf.swp" type=AVC msg=audit(1163787586.541:14003): avc: denied { setattr } for pid=18412 comm="vi" name=".modprobe.conf.swp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163787586.541:14003): arch=40000003 syscall=15 success=yes exit=0 a0=9da6140 a1=1a4 a2=1a4 a3=1 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163787602.002:14004): user pid=18415 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163787602.002:14005): login pid=18415 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163787602.006:14006): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163787602.006:14007): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787602.010:14008): avc: denied { execute } for pid=18416 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163787602.010:14008): avc: denied { execute_no_trans } for pid=18416 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.010:14008): arch=40000003 syscall=11 success=yes exit=0 a0=859f1b0 a1=859f358 a2=859f290 a3=859f008 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787602.010:14008): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163787602.022:14009): avc: denied { execute } for pid=18416 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163787602.022:14009): avc: denied { execute_no_trans } for pid=18416 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163787602.022:14009): avc: denied { read } for pid=18416 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.022:14009): arch=40000003 syscall=11 success=yes exit=0 a0=859fd48 a1=859f740 a2=859fd60 a3=859f740 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787602.022:14009): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163787602.022:14009): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163787602.026:14010): avc: denied { search } for pid=18416 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163787602.026:14010): arch=40000003 syscall=33 success=yes exit=0 a0=bfadefb4 a1=0 a2=bfadeea8 a3=bfadeeb0 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.026:14011): avc: denied { read append } for pid=18416 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.026:14011): arch=40000003 syscall=5 success=yes exit=3 a0=bfadefb4 a1=402 a2=bfadf178 a3=bfadeeb0 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.026:14012): avc: denied { search } for pid=18416 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1163787602.026:14012): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8901348 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.030:14013): avc: denied { search } for pid=18416 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163787602.030:14013): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=8901348 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163787602.030:14014): avc: denied { lock } for pid=18416 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163787602.030:14014): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfadeeb0 a3=3 items=0 ppid=18415 pid=18416 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163787602.030:14014): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163787602.038:14015): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163787602.038:14016): user pid=18415 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163787610.395:14017): avc: denied { rename } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331083 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.395:14017): arch=40000003 syscall=38 success=yes exit=0 a0=9da4040 a1=9da61d8 a2=9da61d8 a3=9da4040 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787610.403:14018): avc: denied { relabelfrom } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:etc_t:s0 tclass=file type=AVC msg=audit(1163787610.403:14018): avc: denied { relabelto } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.403:14018): arch=40000003 syscall=226 success=yes exit=0 a0=9da4040 a1=a2f0d3 a2=9da5358 a3=23 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787610.403:14019): avc: denied { setattr } for pid=18412 comm="vi" name="modprobe.conf" dev=dm-0 ino=9331575 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.403:14019): arch=40000003 syscall=15 success=yes exit=0 a0=9da4040 a1=81a4 a2=1 a3=0 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163787610.403:14020): avc: denied { unlink } for pid=18412 comm="vi" name="modprobe.conz~" dev=dm-0 ino=9331083 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file type=SYSCALL msg=audit(1163787610.403:14020): arch=40000003 syscall=10 success=yes exit=0 a0=9da61d8 a1=9da61d8 a2=1 a3=0 items=0 ppid=16590 pid=18412 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="vi" exe="/bin/vi" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163788069.316:14021): avc: denied { getattr } for pid=18433 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788069.316:14021): arch=40000003 syscall=195 success=yes exit=0 a0=91f4a10 a1=b2c8f0cc a2=758aff4 a3=4 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788069.316:14021): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163788069.316:14022): avc: denied { search } for pid=18433 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788069.316:14022): arch=40000003 syscall=33 success=yes exit=0 a0=91f4a10 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788069.316:14023): avc: denied { read } for pid=18433 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788069.316:14023): arch=40000003 syscall=5 success=yes exit=25 a0=9215ed0 a1=18800 a2=758c120 a3=9215ed0 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788070.660:14024): avc: denied { write } for pid=18433 comm="evolution" name="memos" dev=dm-0 ino=6814327 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163788070.660:14024): avc: denied { add_name } for pid=18433 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788070.660:14024): arch=40000003 syscall=5 success=yes exit=43 a0=b2c8efe0 a1=242 a2=180 a3=9240268 items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788070.676:14025): avc: denied { remove_name } for pid=18433 comm="evolution" name="summary~" dev=dm-0 ino=6815422 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163788070.676:14025): arch=40000003 syscall=38 success=yes exit=0 a0=b2c8efe0 a1=9240268 a2=1dcbd8 a3=8c3c7bc items=0 ppid=1 pid=18433 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1163788201.080:14026): user pid=18445 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163788201.080:14027): login pid=18445 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163788201.080:14028): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163788201.080:14029): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163788201.100:14030): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163788201.100:14031): user pid=18445 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163788520.688:14032): avc: denied { write } for pid=16541 comm="firefox-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163788520.688:14032): avc: denied { add_name } for pid=16541 comm="firefox-bin" name="5e6k208m" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163788520.688:14032): avc: denied { create } for pid=16541 comm="firefox-bin" name="5e6k208m" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788520.688:14032): arch=40000003 syscall=5 success=yes exit=23 a0=b999b68 a1=82c1 a2=180 a3=82c1 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788520.688:14033): avc: denied { write } for pid=16541 comm="firefox-bin" name="5e6k208m" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788520.688:14033): arch=40000003 syscall=5 success=yes exit=23 a0=b999b68 a1=8041 a2=180 a3=8041 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.588:14034): avc: denied { getattr } for pid=16541 comm="firefox-bin" name="15.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.588:14034): arch=40000003 syscall=195 success=yes exit=0 a0=c76bca8 a1=bfad2d70 a2=10b0ff4 a3=bfad2d70 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788523.588:14034): path="/tmp/15.pdf" type=AVC msg=audit(1163788523.588:14035): avc: denied { remove_name } for pid=16541 comm="firefox-bin" name="15.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163788523.588:14035): avc: denied { unlink } for pid=16541 comm="firefox-bin" name="15.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.588:14035): arch=40000003 syscall=10 success=yes exit=0 a0=c76bca8 a1=0 a2=4a4e304 a3=0 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.588:14036): avc: denied { rename } for pid=16541 comm="firefox-bin" name="5e6k208m" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.588:14036): arch=40000003 syscall=38 success=yes exit=0 a0=b999b68 a1=bfad2e3c a2=4a4e304 a3=0 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.900:14037): avc: denied { read } for pid=18462 comm="evince" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.900:14037): arch=40000003 syscall=33 success=yes exit=0 a0=bf852f48 a1=4 a2=da3a64 a3=bf852f48 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788523.900:14038): avc: denied { getattr } for pid=18462 comm="evince" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788523.900:14038): arch=40000003 syscall=197 success=yes exit=0 a0=11 a1=bf85064c a2=f35ff4 a3=8800160 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788523.900:14038): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163788524.032:14039): avc: denied { search } for pid=18462 comm="evince" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163788524.032:14039): avc: denied { write } for pid=18462 comm="evince" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163788524.032:14039): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bf850750 a2=df7770 a3=16 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788524.032:14040): avc: denied { read } for pid=18462 comm="evince" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788524.032:14040): arch=40000003 syscall=33 success=yes exit=0 a0=88243f0 a1=4 a2=df7770 a3=88243f0 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788524.032:14041): avc: denied { getattr } for pid=18462 comm="evince" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788524.032:14041): arch=40000003 syscall=197 success=yes exit=0 a0=2a a1=bf8507ec a2=f35ff4 a3=8824ce0 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788524.032:14041): path="/home/kmacmill/.ICEauthority" type=AVC msg=audit(1163788524.860:14042): avc: denied { read } for pid=18463 comm="evince" name="15.pdf" dev=dm-0 ino=14469449 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163788524.860:14042): arch=40000003 syscall=5 success=yes exit=59 a0=8a07a38 a1=8000 a2=1b6 a3=8a15668 items=0 ppid=16541 pid=18463 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788525.116:14043): avc: denied { create } for pid=18462 comm="evince" name=".recently-used.xbel.Y9V8IT" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788525.116:14043): arch=40000003 syscall=5 success=yes exit=60 a0=8a531e8 a1=80c2 a2=1b6 a3=80c2 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788525.120:14044): avc: denied { write } for pid=18462 comm="evince" name=".recently-used.xbel.Y9V8IT" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788525.120:14044): arch=40000003 syscall=4 success=yes exit=102400 a0=3c a1=8a53c38 a2=19000 a3=19000 items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163788525.120:14044): path="/home/kmacmill/.recently-used.xbel.Y9V8IT" type=AVC msg=audit(1163788525.120:14045): avc: denied { rename } for pid=18462 comm="evince" name=".recently-used.xbel.Y9V8IT" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=AVC msg=audit(1163788525.120:14045): avc: denied { unlink } for pid=18462 comm="evince" name=".recently-used.xbel" dev=dm-0 ino=11885042 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788525.120:14045): arch=40000003 syscall=38 success=yes exit=0 a0=8a52d98 a1=886f550 a2=7b1708 a3=b7f9e8cc items=0 ppid=16541 pid=18462 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163788526.164:14046): avc: denied { read } for pid=16429 comm="gnome-panel" name=".recently-used.xbel" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163788526.164:14046): arch=40000003 syscall=5 success=yes exit=31 a0=8d54aa0 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=16429 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-panel" exe="/usr/bin/gnome-panel" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163788669.349:14047): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163788669.349:14047): arch=40000003 syscall=3 success=yes exit=94 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163788669.349:14047): path="/dev/net/tun" type=AVC msg=audit(1163788669.413:14048): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163788669.413:14048): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163788669.413:14048): path="/dev/net/tun" type=USER_ACCT msg=audit(1163788801.141:14049): user pid=18478 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163788801.141:14050): login pid=18478 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163788801.141:14051): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163788801.141:14052): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163788801.169:14053): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163788801.169:14054): user pid=18478 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163789401.211:14055): user pid=18502 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163789401.211:14056): login pid=18502 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163789401.211:14057): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163789401.211:14058): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163789401.231:14059): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163789401.231:14060): user pid=18502 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163789555.316:14061): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163789555.316:14061): arch=40000003 syscall=102 success=yes exit=165 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14062): avc: denied { write } for pid=11049 comm="udevd" name="uevent_seqnum" dev=tmpfs ino=1522 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.316:14062): arch=40000003 syscall=5 success=yes exit=9 a0=bfee5668 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14063): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14063): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14063): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.316:14063): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14064): avc: denied { add_name } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14064): avc: denied { create } for pid=11049 comm="udevd" name="queue" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.316:14064): arch=40000003 syscall=39 success=yes exit=0 a0=bfedae8c a1=1ed a2=791234 a3=bfedae8c items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14065): avc: denied { write } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=217561 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14065): avc: denied { add_name } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14065): avc: denied { create } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.316:14065): arch=40000003 syscall=5 success=yes exit=9 a0=bfedb2c8 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.316:14066): avc: denied { write } for pid=11049 comm="udevd" name=".udev" dev=tmpfs ino=1521 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14066): avc: denied { remove_name } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.316:14066): avc: denied { rmdir } for pid=11049 comm="udevd" name="failed" dev=tmpfs ino=3876 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.316:14066): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae88 a1=2f2f2f2f a2=791234 a3=bfedae92 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.396:14067): avc: denied { sendto } for pid=18508 comm="udevd" path=002F6F72672F667265656465736B746F702F68616C2F756465765F6576656E74 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=unix_dgram_socket type=SYSCALL msg=audit(1163789555.396:14067): arch=40000003 syscall=102 success=yes exit=201 a0=b a1=bfed27a0 a2=791234 a3=c9 items=0 ppid=11049 pid=18508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.400:14068): avc: denied { remove_name } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" dev=tmpfs ino=217562 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.400:14068): avc: denied { unlink } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1" dev=tmpfs ino=217562 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.400:14068): arch=40000003 syscall=10 success=yes exit=0 a0=bfedb2b8 a1=ffffffff a2=791234 a3=791418 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.400:14069): avc: denied { rmdir } for pid=11049 comm="udevd" name="queue" dev=tmpfs ino=217561 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=dir type=SYSCALL msg=audit(1163789555.400:14069): arch=40000003 syscall=40 success=no exit=-39 a0=bfedae78 a1=2f2f2f2f a2=791234 a3=bfedae82 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.408:14070): avc: denied { execute } for pid=18513 comm="udevd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.408:14070): avc: denied { execute_no_trans } for pid=18513 comm="udevd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.408:14070): avc: denied { read } for pid=18513 comm="udevd" name="modprobe" dev=dm-0 ino=9984520 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:insmod_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.408:14071): avc: denied { mknod } for pid=18511 comm="udevd" capability=27 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163789555.408:14071): avc: denied { add_name } for pid=18511 comm="udevd" name="usbdev4.3_ep00" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir type=AVC msg=audit(1163789555.408:14071): avc: denied { create } for pid=18511 comm="udevd" name="usbdev4.3_ep00" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163789555.408:14071): arch=40000003 syscall=14 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=181ba02 a3=180 items=0 ppid=11049 pid=18511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.408:14072): avc: denied { setattr } for pid=18511 comm="udevd" name="usbdev4.3_ep00" dev=tmpfs ino=217621 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163789555.408:14072): arch=40000003 syscall=15 success=yes exit=0 a0=bfed2dc4 a1=2180 a2=791234 a3=0 items=0 ppid=11049 pid=18511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.408:14073): avc: denied { create } for pid=18511 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1@usbdev4.3_ep00" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163789555.408:14073): arch=40000003 syscall=83 success=yes exit=0 a0=9526ccc a1=bfed2dc8 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=18511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=SYSCALL msg=audit(1163789555.408:14070): arch=40000003 syscall=11 success=yes exit=0 a0=bfed2e48 a1=bfed23ac a2=9526298 a3=3 items=0 ppid=18512 pid=18513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163789555.408:14070): path="/sbin/modprobe" type=AVC_PATH msg=audit(1163789555.408:14070): path="/sbin/modprobe" type=AVC msg=audit(1163789555.412:14074): avc: denied { read } for pid=18513 comm="modprobe" name="modules.dep" dev=dm-0 ino=13720574 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:modules_object_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.412:14074): arch=40000003 syscall=5 success=yes exit=3 a0=9fd4118 a1=0 a2=1b6 a3=9fd4300 items=0 ppid=18512 pid=18513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="modprobe" exe="/sbin/modprobe" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.496:14075): avc: denied { rename } for pid=11049 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1@4-1:1.0" dev=tmpfs ino=217572 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.496:14075): arch=40000003 syscall=38 success=yes exit=0 a0=bfedb2b8 a1=bfedb0b8 a2=791234 a3=bfedb0b8 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.484:14076): avc: denied { execute } for pid=18516 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.508:14077): avc: denied { execute } for pid=18524 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.484:14076): avc: denied { execute_no_trans } for pid=18516 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=AVC msg=audit(1163789555.484:14076): avc: denied { read } for pid=18516 comm="udevd" name="pam_console_apply" dev=dm-0 ino=9984592 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_console_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.484:14076): arch=40000003 syscall=11 success=yes exit=0 a0=bfed2e48 a1=bfed23ac a2=9526298 a3=3 items=0 ppid=18511 pid=18516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="pam_console_app" exe="/sbin/pam_console_apply" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163789555.484:14076): path="/sbin/pam_console_apply" type=AVC_PATH msg=audit(1163789555.484:14076): path="/sbin/pam_console_apply" type=SYSCALL msg=audit(1163789555.508:14077): arch=40000003 syscall=11 success=yes exit=0 a0=bfed2e48 a1=bfed23ac a2=9526298 a3=3 items=0 ppid=18519 pid=18524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="pam_console_app" exe="/sbin/pam_console_apply" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789555.740:14078): avc: denied { read } for pid=18516 comm="pam_console_app" name="console.lock" dev=dm-0 ino=14437305 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=file type=SYSCALL msg=audit(1163789555.740:14078): arch=40000003 syscall=5 success=yes exit=3 a0=804c1fc a1=8000 a2=0 a3=8000 items=0 ppid=18511 pid=18516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="pam_console_app" exe="/sbin/pam_console_apply" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789593.139:14079): avc: denied { execmem } for pid=18532 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163789593.139:14079): arch=40000003 syscall=192 success=yes exit=81354752 a0=4d96000 a1=1a000 a2=7 a3=812 items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789593.139:14080): avc: denied { execstack } for pid=18532 comm="gnome-screensav" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163789593.139:14080): arch=40000003 syscall=125 success=yes exit=0 a0=bff9b000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789593.163:14081): avc: denied { execute } for pid=18532 comm="gnome-screensav" name="zero" dev=tmpfs ino=1493 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:zero_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163789593.163:14081): arch=40000003 syscall=192 success=yes exit=2953216 a0=0 a1=2000 a2=7 a3=2 items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163789593.163:14081): path="/dev/zero" type=AVC msg=audit(1163789593.167:14082): avc: denied { read } for pid=18532 comm="gnome-screensav" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163789593.167:14082): arch=40000003 syscall=33 success=yes exit=0 a0=bff9ce8e a1=4 a2=da3a64 a3=bff9ce8e items=0 ppid=16501 pid=18532 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-screensav" exe="/usr/libexec/gnome-screensaver-gl-helper" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163789869.328:14083): avc: denied { send_msg } for pid=18541 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163789869.328:14083): arch=40000003 syscall=102 success=yes exit=42 a0=9 a1=aa35aeb0 a2=4932550 a3=0 items=0 ppid=1 pid=18541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163789869.396:14084): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163789869.396:14084): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163790001.272:14085): user pid=18550 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163790001.276:14086): login pid=18550 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163790001.276:14087): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163790001.276:14088): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163790001.292:14089): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163790001.292:14090): user pid=18550 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163790061.312:14091): user pid=18553 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163790061.312:14092): login pid=18553 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163790061.312:14093): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163790061.312:14094): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163790061.328:14095): avc: denied { getattr } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14095): arch=40000003 syscall=195 success=yes exit=0 a0=901b120 a1=bf95a210 a2=f08ff4 a3=901b120 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.328:14095): path="/usr/bin/run-parts" type=AVC msg=audit(1163790061.328:14096): avc: denied { execute } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14096): arch=40000003 syscall=33 success=yes exit=0 a0=901b120 a1=1 a2=11 a3=901b120 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.328:14097): avc: denied { read } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14097): arch=40000003 syscall=33 success=yes exit=0 a0=901b120 a1=4 a2=ffffffff a3=901b120 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.328:14098): avc: denied { execute_no_trans } for pid=18554 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14098): arch=40000003 syscall=11 success=yes exit=0 a0=901b120 a1=901b3d8 a2=901b2f8 a3=901af98 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.328:14098): path="/usr/bin/run-parts" type=AVC msg=audit(1163790061.328:14099): avc: denied { ioctl } for pid=18554 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.328:14099): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfaa9d88 a3=bfaa9dc8 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.328:14099): path="/usr/bin/run-parts" type=AVC msg=audit(1163790061.332:14100): avc: denied { execute } for pid=18554 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.332:14100): arch=40000003 syscall=33 success=yes exit=0 a0=904f990 a1=1 a2=1 a3=904fc98 items=0 ppid=18553 pid=18554 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.332:14101): avc: denied { execute_no_trans } for pid=18555 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.332:14101): arch=40000003 syscall=11 success=yes exit=0 a0=904fa10 a1=904fad8 a2=904fae8 a3=904f758 items=0 ppid=18554 pid=18555 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.332:14101): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163790061.336:14102): avc: denied { execute } for pid=18556 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163790061.336:14102): avc: denied { execute_no_trans } for pid=18556 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163790061.336:14102): avc: denied { read } for pid=18556 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.336:14102): arch=40000003 syscall=11 success=yes exit=0 a0=98fd678 a1=98fd808 a2=98fd720 a3=98fd508 items=0 ppid=18555 pid=18556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.336:14102): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163790061.336:14102): path="/sbin/chkconfig" type=AVC msg=audit(1163790061.340:14103): avc: denied { read } for pid=18556 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.340:14103): arch=40000003 syscall=5 success=yes exit=3 a0=bf98f450 a1=0 a2=ffffffff a3=899e038 items=0 ppid=18555 pid=18556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790061.340:14104): avc: denied { getattr } for pid=18556 comm="chkconfig" name="innd" dev=dm-0 ino=9331492 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163790061.340:14104): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf98f3bc a2=9d5ff4 a3=bf98f3bc items=0 ppid=18555 pid=18556 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790061.340:14104): path="/etc/rc.d/init.d/innd" type=CRED_DISP msg=audit(1163790061.360:14105): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163790061.360:14106): user pid=18553 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163790189.352:14107): avc: denied { read } for pid=8116 comm="dhclient" name="[31406]" dev=sockfs ino=31406 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=packet_socket type=SYSCALL msg=audit(1163790189.352:14107): arch=40000003 syscall=3 success=yes exit=590 a0=6 a1=bf923428 a2=600 a3=9604620 items=0 ppid=8112 pid=8116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="dhclient" exe="/sbin/dhclient" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163790189.352:14107): path="socket:[31406]" type=AVC msg=audit(1163790302.383:14108): avc: denied { search } for pid=18577 comm="thunderbird" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163790302.383:14108): avc: denied { read } for pid=18577 comm="thunderbird" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14108): arch=40000003 syscall=5 success=yes exit=3 a0=32ab60 a1=8000 a2=1 a3=bfdfd220 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.383:14109): avc: denied { getattr } for pid=18577 comm="thunderbird" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14109): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=342aa0 a2=341ff4 a3=bfdfd220 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.383:14109): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163790302.383:14110): avc: denied { read } for pid=18577 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14110): arch=40000003 syscall=5 success=yes exit=3 a0=329afa a1=0 a2=1b6 a3=812aa60 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.383:14111): avc: denied { getattr } for pid=18577 comm="thunderbird" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14111): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfdfb398 a2=341ff4 a3=812aa60 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.383:14111): path="/proc/meminfo" type=AVC msg=audit(1163790302.383:14112): avc: denied { read } for pid=18577 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14112): arch=40000003 syscall=5 success=yes exit=3 a0=32ab3c a1=0 a2=0 a3=bfdfd480 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.383:14113): avc: denied { getattr } for pid=18577 comm="thunderbird" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.383:14113): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfdfd328 a2=341ff4 a3=3 items=0 ppid=1 pid=18577 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.383:14113): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163790302.939:14114): avc: denied { read } for pid=18589 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.939:14114): arch=40000003 syscall=5 success=yes exit=3 a0=bf8c4d00 a1=0 a2=1b6 a3=8ae5f08 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.939:14115): avc: denied { getattr } for pid=18589 comm="thunderbird-bin" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.939:14115): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bf8c4b9c a2=f14ff4 a3=8ae5f08 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.939:14115): path="/usr/share/locale/locale.alias" type=AVC msg=audit(1163790302.939:14116): avc: denied { search } for pid=18589 comm="thunderbird-bin" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163790302.939:14116): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bf8c4c70 a2=f14ff4 a3=3 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.947:14117): avc: denied { read } for pid=18589 comm="thunderbird-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.947:14117): arch=40000003 syscall=33 success=yes exit=0 a0=bf8c7f72 a1=4 a2=da3a64 a3=bf8c7f72 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.947:14118): avc: denied { getattr } for pid=18589 comm="thunderbird-bin" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163790302.947:14118): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bf8c49fc a2=f14ff4 a3=8ad9558 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.947:14118): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163790302.959:14119): avc: denied { read } for pid=18589 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790302.959:14119): arch=40000003 syscall=5 success=yes exit=10 a0=249880 a1=8000 a2=1b6 a3=8b103c0 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790302.959:14120): avc: denied { getattr } for pid=18589 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790302.959:14120): arch=40000003 syscall=197 success=yes exit=0 a0=a a1=bf8c495c a2=f14ff4 a3=8b103c0 items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.959:14120): path="/dev/urandom" type=AVC msg=audit(1163790302.959:14121): avc: denied { ioctl } for pid=18589 comm="thunderbird-bin" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790302.959:14121): arch=40000003 syscall=54 success=no exit=-22 a0=a a1=5401 a2=bf8c48bc a3=bf8c48fc items=0 ppid=18584 pid=18589 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790302.959:14121): path="/dev/urandom" type=AVC msg=audit(1163790303.447:14122): avc: denied { search } for pid=18600 comm="thunderbird-bin" name=".mozilla" dev=dm-0 ino=6547337 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163790303.447:14122): arch=40000003 syscall=33 success=yes exit=0 a0=9fd2300 a1=0 a2=ab3bdc a3=bfc61b6c items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790303.743:14123): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="xpinstall.js" dev=dm-0 ino=10739315 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790303.743:14123): arch=40000003 syscall=5 success=yes exit=16 a0=9fdb320 a1=8000 a2=0 a3=8000 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790304.003:14124): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163790304.003:14124): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163790304.003:14124): path="/var/run/utmp" type=AVC msg=audit(1163790304.255:14125): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="offline.manifest" dev=dm-0 ino=10737672 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163790304.255:14125): arch=40000003 syscall=195 success=yes exit=0 a0=a02c418 a1=bfc6107c a2=1113ff4 a3=bfc6107c items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790304.255:14125): path="/usr/lib/thunderbird-1.5.0.7/chrome/offline.manifest" type=AVC msg=audit(1163790307.399:14126): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163790307.399:14126): arch=40000003 syscall=5 success=yes exit=26 a0=a3055a8 a1=0 a2=735bf000 a3=a2f9c78 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790307.399:14127): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" dev=dm-0 ino=14437317 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=user_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1163790307.399:14127): arch=40000003 syscall=197 success=yes exit=0 a0=1a a1=bfc6024c a2=1113ff4 a3=bfc6024c items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163790307.399:14127): path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-x86.cache-2" type=AVC msg=audit(1163790309.540:14128): avc: denied { search } for pid=18607 comm="netstat" name="sys" dev=proc ino=-268435429 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_t:s0 tclass=dir type=AVC msg=audit(1163790309.540:14128): avc: denied { search } for pid=18607 comm="netstat" name="net" dev=proc ino=-268435343 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir type=SYSCALL msg=audit(1163790309.540:14128): arch=40000003 syscall=33 success=no exit=-2 a0=805f53c a1=4 a2=8064740 a3=8 items=0 ppid=18600 pid=18607 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="netstat" exe="/bin/netstat" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14129): avc: denied { create } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14129): arch=40000003 syscall=102 success=yes exit=36 a0=1 a1=b2ffe1d4 a2=1113ff4 a3=0 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14130): avc: denied { bind } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14130): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b2ffe1d4 a2=1113ff4 a3=24 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14131): avc: denied { getattr } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14131): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b2ffe1d4 a2=1113ff4 a3=24 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14132): avc: denied { write } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163790309.952:14132): avc: denied { nlmsg_read } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14132): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b2ffd10c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790309.952:14133): avc: denied { read } for pid=18609 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163790309.952:14133): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b2ffd10c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18609 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163790486.511:14134): avc: denied { read } for pid=11049 comm="udevd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=netlink_kobject_uevent_socket type=SYSCALL msg=audit(1163790486.511:14134): arch=40000003 syscall=102 success=yes exit=214 a0=a a1=bfedb480 a2=791234 a3=0 items=0 ppid=1 pid=11049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163790486.511:14135): avc: denied { unlink } for pid=18623 comm="udevd" name="devices@pci0000:00@0000:00:1d.3@usb4@4-1@4-1:1.0@usbdev4.3_ep01" dev=tmpfs ino=217656 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:device_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163790486.511:14135): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dcc a1=4d a2=791234 a3=bfed2dcc items=0 ppid=11049 pid=18623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163790486.511:14136): avc: denied { getattr } for pid=18623 comm="udevd" name="usbdev4.3_ep01" dev=tmpfs ino=217655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790486.511:14136): arch=40000003 syscall=195 success=yes exit=0 a0=bfed2dc8 a1=bfed2b68 a2=24bff4 a3=bfed2dc8 items=0 ppid=11049 pid=18623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163790486.511:14136): path="/dev/usbdev4.3_ep01" type=AVC msg=audit(1163790486.511:14137): avc: denied { unlink } for pid=18623 comm="udevd" name="usbdev4.3_ep01" dev=tmpfs ino=217655 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163790486.511:14137): arch=40000003 syscall=10 success=yes exit=0 a0=bfed2dc8 a1=0 a2=791234 a3=bfed2dc8 items=0 ppid=11049 pid=18623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="udevd" exe="/sbin/udevd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163790601.398:14138): user pid=18645 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163790601.402:14139): login pid=18645 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163790601.402:14140): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163790601.402:14141): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163790601.410:14142): avc: denied { search } for pid=18646 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163790601.410:14142): avc: denied { read } for pid=18646 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163790601.410:14142): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=9ae77f8 items=0 ppid=18645 pid=18646 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163790601.410:14143): avc: denied { getattr } for pid=18646 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163790601.410:14143): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfce8e18 a2=659ff4 a3=9ae77f8 items=0 ppid=18645 pid=18646 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163790601.410:14143): path="/proc/net/dev" type=CRED_DISP msg=audit(1163790601.422:14144): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163790601.422:14145): user pid=18645 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163791047.922:14146): avc: denied { create } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14146): arch=40000003 syscall=102 success=yes exit=50 a0=1 a1=b68a61d4 a2=1113ff4 a3=0 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14147): avc: denied { bind } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14147): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=b68a61d4 a2=1113ff4 a3=32 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14148): avc: denied { getattr } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14148): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=b68a61d4 a2=1113ff4 a3=32 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14149): avc: denied { write } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163791047.922:14149): avc: denied { nlmsg_read } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14149): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=b68a510c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791047.922:14150): avc: denied { read } for pid=18662 comm="thunderbird-bin" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163791047.922:14150): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=b68a510c a2=1113ff4 a3=0 items=0 ppid=18595 pid=18662 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791086.004:14151): avc: denied { write } for pid=18600 comm="thunderbird-bin" name="tmp" dev=dm-0 ino=14469313 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163791086.004:14151): avc: denied { add_name } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163791086.004:14151): avc: denied { create } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.004:14151): arch=40000003 syscall=5 success=yes exit=52 a0=ab774e0 a1=82c1 a2=180 a3=82c1 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791086.004:14152): avc: denied { write } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.004:14152): arch=40000003 syscall=5 success=yes exit=52 a0=ade18e0 a1=8241 a2=180 a3=8241 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791086.012:14153): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.012:14153): arch=40000003 syscall=195 success=yes exit=0 a0=ade18e0 a1=bfc5ebf4 a2=1113ff4 a3=bfc5ebf4 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163791086.012:14153): path="/tmp/nsmail.eml" type=AVC msg=audit(1163791086.356:14154): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="nsmail.eml" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791086.356:14154): arch=40000003 syscall=5 success=yes exit=49 a0=ae24fd0 a1=8000 a2=0 a3=8000 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163791088.020:14155): avc: denied { remove_name } for pid=18600 comm="thunderbird-bin" name="nscopy.tmp" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir type=AVC msg=audit(1163791088.020:14155): avc: denied { unlink } for pid=18600 comm="thunderbird-bin" name="nscopy.tmp" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163791088.020:14155): arch=40000003 syscall=10 success=yes exit=0 a0=ae00688 a1=0 a2=1113ff4 a3=ae00688 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=USER_ACCT msg=audit(1163791201.487:14156): user pid=18674 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163791201.487:14157): login pid=18674 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163791201.487:14158): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163791201.487:14159): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163791201.507:14160): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163791201.507:14161): user pid=18674 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163791346.416:14162): avc: denied { write } for pid=18682 comm="nautilus" name=".recently-used.xbel" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163791346.416:14162): arch=40000003 syscall=33 success=yes exit=0 a0=8cbd4c8 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=18682 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163791347.192:14163): avc: denied { read write } for pid=18682 comm="nautilus" name=".gnupg" dev=dm-0 ino=6814310 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_gpg_secret_t:s0 tclass=dir type=SYSCALL msg=audit(1163791347.192:14163): arch=40000003 syscall=33 success=yes exit=0 a0=8cbd4c8 a1=6 a2=7a7708 a3=d8db59 items=0 ppid=1 pid=18682 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163791381.359:14164): avc: denied { unlink } for pid=16431 comm="nautilus" name=".recently-used.xbel" dev=dm-0 ino=6573261 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163791381.359:14164): arch=40000003 syscall=38 success=yes exit=0 a0=9045800 a1=8d52e38 a2=7a7708 a3=b7ef9acc items=0 ppid=1 pid=16431 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="nautilus" exe="/usr/bin/nautilus" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163791381.519:14165): avc: denied { write } for pid=18707 comm="eog" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163791381.519:14165): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe06e40 a2=df7770 a3=16 items=0 ppid=1 pid=18707 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="eog" exe="/usr/bin/eog" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163791801.585:14166): user pid=18750 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163791801.585:14167): login pid=18750 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163791801.585:14168): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163791801.585:14169): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163791801.597:14170): avc: denied { read } for pid=18751 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163791801.597:14170): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8862348 items=0 ppid=18750 pid=18751 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163791801.597:14171): avc: denied { getattr } for pid=18751 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163791801.597:14171): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe1a5a0 a2=a63ff4 a3=8862348 items=0 ppid=18750 pid=18751 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163791801.597:14171): path="/proc/sys/fs/dentry-state" type=CRED_DISP msg=audit(1163791801.653:14172): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163791801.653:14173): user pid=18750 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163792170.124:14174): avc: denied { execute } for pid=16541 comm="firefox-bin" name="libflashplayer.so" dev=dm-0 ino=6547382 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_mozilla_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792170.124:14174): arch=40000003 syscall=192 success=yes exit=62861312 a0=0 a1=738dbc a2=5 a3=802 items=0 ppid=1 pid=16541 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792170.124:14174): path="/home/kmacmill/.mozilla/plugins/libflashplayer.so" type=AVC msg=audit(1163792170.560:14175): avc: denied { execmem } for pid=16548 comm="firefox-bin" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163792170.560:14175): arch=40000003 syscall=192 success=yes exit=145154048 a0=0 a1=a01000 a2=7 a3=22 items=0 ppid=1 pid=16548 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=USER_ACCT msg=audit(1163792401.694:14176): user pid=18789 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163792401.694:14177): login pid=18789 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163792401.694:14178): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163792401.694:14179): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163792401.698:14180): avc: denied { execute } for pid=18790 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163792401.698:14180): avc: denied { execute_no_trans } for pid=18790 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163792401.698:14180): arch=40000003 syscall=11 success=yes exit=0 a0=8d111b0 a1=8d11358 a2=8d11290 a3=8d11008 items=0 ppid=18789 pid=18790 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163792401.698:14180): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163792401.702:14181): avc: denied { search } for pid=18790 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=SYSCALL msg=audit(1163792401.702:14181): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=9b3f348 items=0 ppid=18789 pid=18790 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1163792401.710:14182): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163792401.710:14183): user pid=18789 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163792590.410:14184): avc: denied { read } for pid=18800 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163792590.410:14184): arch=40000003 syscall=5 success=yes exit=23 a0=3d4880 a1=8000 a2=1b6 a3=9828bd8 items=0 ppid=18799 pid=18800 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163792590.414:14185): avc: denied { getattr } for pid=18800 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163792590.414:14185): arch=40000003 syscall=197 success=yes exit=0 a0=17 a1=bfbd0e4c a2=83fff4 a3=9828bd8 items=0 ppid=18799 pid=18800 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.414:14185): path="/dev/urandom" type=AVC msg=audit(1163792590.414:14186): avc: denied { ioctl } for pid=18800 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163792590.414:14186): arch=40000003 syscall=54 success=no exit=-22 a0=17 a1=5401 a2=bfbd0dac a3=bfbd0dec items=0 ppid=18799 pid=18800 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.414:14186): path="/dev/urandom" type=AVC msg=audit(1163792590.590:14187): avc: denied { execute } for pid=18802 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163792590.590:14187): avc: denied { execute_no_trans } for pid=18802 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163792590.590:14187): avc: denied { read } for pid=18802 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163792590.590:14187): arch=40000003 syscall=11 success=yes exit=0 a0=872bf00 a1=872c838 a2=872bbe8 a3=872c838 items=0 ppid=1 pid=18802 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.590:14187): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1163792590.590:14187): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163792590.754:14188): avc: denied { getattr } for pid=18802 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163792590.754:14188): arch=40000003 syscall=196 success=yes exit=0 a0=bfee5b18 a1=bfee560c a2=fe4ff4 a3=bfee6759 items=0 ppid=1 pid=18802 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163792590.754:14188): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163792672.087:14189): avc: denied { search } for pid=18818 comm="evince" name=".ICE-unix" dev=dm-0 ino=14567572 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:ice_tmp_t:s0 tclass=dir type=AVC msg=audit(1163792672.087:14189): avc: denied { write } for pid=18818 comm="evince" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163792672.087:14189): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff22620 a2=df7770 a3=16 items=0 ppid=1 pid=18818 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792672.127:14190): avc: denied { connectto } for pid=18818 comm="evince" path=002F746D702F646275732D4F36457A564B53704F4E scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1163792672.127:14190): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bff22c00 a2=15f454 a3=15 items=0 ppid=1 pid=18818 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792672.327:14191): avc: denied { getattr } for pid=18819 comm="evince" name="chapter2.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792672.327:14191): arch=40000003 syscall=195 success=yes exit=0 a0=8dc0f88 a1=b7dc1250 a2=5c3ff4 a3=8da3e78 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792672.327:14191): path="/tmp/chapter2.pdf" type=AVC msg=audit(1163792672.655:14192): avc: denied { read } for pid=18819 comm="evince" name="chapter2.pdf" dev=dm-0 ino=14469568 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792672.655:14192): arch=40000003 syscall=5 success=yes exit=19 a0=8e09078 a1=8000 a2=1b6 a3=8e10690 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792673.403:14193): avc: denied { create } for pid=18819 comm="evince" name="QEO7Np" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792673.403:14193): arch=40000003 syscall=5 success=yes exit=20 a0=b3101fb0 a1=80c2 a2=180 a3=80c2 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792673.407:14194): avc: denied { write } for pid=18819 comm="evince" name="QEO7Np" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792673.407:14194): arch=40000003 syscall=4 success=yes exit=4096 a0=14 a1=b29fe000 a2=1000 a3=1000 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792673.407:14194): path="/tmp/QEO7Np" type=AVC msg=audit(1163792673.411:14195): avc: denied { unlink } for pid=18819 comm="evince" name="QEO7Np" dev=dm-0 ino=14469571 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163792673.411:14195): arch=40000003 syscall=10 success=yes exit=0 a0=b3101fb0 a1=b3103c00 a2=48eeac8 a3=101 items=0 ppid=1 pid=18819 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evince" exe="/usr/bin/evince" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.360:14196): avc: denied { getattr } for pid=18828 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163792869.360:14196): arch=40000003 syscall=195 success=yes exit=0 a0=8eb8d78 a1=b40910cc a2=758aff4 a3=4 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792869.360:14196): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163792869.360:14197): avc: denied { search } for pid=18828 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163792869.360:14197): arch=40000003 syscall=33 success=yes exit=0 a0=8eb8d78 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.360:14198): avc: denied { read } for pid=18828 comm="evolution" name="summary" dev=dm-0 ino=6814004 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.360:14198): arch=40000003 syscall=5 success=yes exit=25 a0=900b940 a1=0 a2=1b6 a3=8fb12b0 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.360:14199): avc: denied { getattr } for pid=18828 comm="evolution" name="summary" dev=dm-0 ino=6814004 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.360:14199): arch=40000003 syscall=197 success=yes exit=0 a0=19 a1=b4090f48 a2=758aff4 a3=8fb12b0 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792869.360:14199): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/summary" type=AVC msg=audit(1163792869.360:14200): avc: denied { read } for pid=18828 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163792869.360:14200): arch=40000003 syscall=5 success=yes exit=25 a0=8e69830 a1=18800 a2=758c120 a3=8e69830 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.512:14201): avc: denied { write } for pid=18829 comm="evolution" name=".ev-store-summary" dev=dm-0 ino=6815187 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.512:14201): arch=40000003 syscall=5 success=yes exit=43 a0=8c05ce0 a1=242 a2=180 a3=8c0d8d8 items=0 ppid=1 pid=18829 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.520:14202): avc: denied { write } for pid=18828 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163792869.520:14202): avc: denied { add_name } for pid=18828 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163792869.520:14202): avc: denied { create } for pid=18828 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.520:14202): arch=40000003 syscall=5 success=yes exit=44 a0=b4091000 a1=242 a2=180 a3=900b940 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792869.564:14203): avc: denied { remove_name } for pid=18828 comm="evolution" name="summary~" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163792869.564:14203): avc: denied { rename } for pid=18828 comm="evolution" name="summary~" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=AVC msg=audit(1163792869.564:14203): avc: denied { unlink } for pid=18828 comm="evolution" name="summary" dev=dm-0 ino=6814004 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792869.564:14203): arch=40000003 syscall=38 success=yes exit=0 a0=b4091000 a1=900b940 a2=1dcbd8 a3=8ddc404 items=0 ppid=1 pid=18828 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163792876.880:14204): avc: denied { lock } for pid=18832 comm="evolution" name="Inbox" dev=dm-0 ino=6778778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163792876.880:14204): arch=40000003 syscall=221 success=yes exit=0 a0=19 a1=6 a2=aa35b1fc a3=aa35b1fc items=0 ppid=1 pid=18832 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163792876.880:14204): path="/home/kmacmill/.evolution/mail/local/Inbox" type=USER_ACCT msg=audit(1163793001.776:14205): user pid=18844 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163793001.780:14206): login pid=18844 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163793001.780:14207): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163793001.780:14208): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163793001.792:14209): avc: denied { search } for pid=18845 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163793001.792:14209): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=9bdc348 items=0 ppid=18844 pid=18845 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=CRED_DISP msg=audit(1163793001.800:14210): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163793001.800:14211): user pid=18844 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163793601.845:14212): user pid=18872 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163793601.849:14213): login pid=18872 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163793601.849:14214): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163793601.849:14215): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_DISP msg=audit(1163793601.869:14216): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163793601.869:14217): user pid=18872 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_ACCT msg=audit(1163793661.873:14218): user pid=18874 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163793661.877:14219): login pid=18874 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163793661.877:14220): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163793661.877:14221): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163793661.881:14222): avc: denied { getattr } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.881:14222): arch=40000003 syscall=195 success=yes exit=0 a0=82f0120 a1=bfd9fe60 a2=70dff4 a3=82f0120 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.881:14222): path="/usr/bin/run-parts" type=AVC msg=audit(1163793661.885:14223): avc: denied { execute } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14223): arch=40000003 syscall=33 success=yes exit=0 a0=82f0120 a1=1 a2=11 a3=82f0120 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163793661.885:14224): avc: denied { read } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14224): arch=40000003 syscall=33 success=yes exit=0 a0=82f0120 a1=4 a2=ffffffff a3=82f0120 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163793661.885:14225): avc: denied { execute_no_trans } for pid=18875 comm="bash" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14225): arch=40000003 syscall=11 success=yes exit=0 a0=82f0120 a1=82f03d8 a2=82f02f8 a3=82eff98 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.885:14225): path="/usr/bin/run-parts" type=AVC msg=audit(1163793661.885:14226): avc: denied { ioctl } for pid=18875 comm="run-parts" name="run-parts" dev=dm-0 ino=10331890 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.885:14226): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfbe06b8 a3=bfbe06f8 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.885:14226): path="/usr/bin/run-parts" type=AVC msg=audit(1163793661.889:14227): avc: denied { execute } for pid=18875 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.889:14227): arch=40000003 syscall=33 success=yes exit=0 a0=93b7990 a1=1 a2=1 a3=93b7c98 items=0 ppid=18874 pid=18875 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="run-parts" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163793661.889:14228): avc: denied { execute_no_trans } for pid=18876 comm="run-parts" name="inn-cron-nntpsend" dev=dm-0 ino=9331477 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.889:14228): arch=40000003 syscall=11 success=yes exit=0 a0=93b7a10 a1=93b7ad8 a2=93b7ae8 a3=93b7758 items=0 ppid=18875 pid=18876 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="inn-cron-nntpse" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.889:14228): path="/etc/cron.hourly/inn-cron-nntpsend" type=AVC msg=audit(1163793661.893:14229): avc: denied { execute } for pid=18878 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163793661.893:14229): avc: denied { execute_no_trans } for pid=18878 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=AVC msg=audit(1163793661.893:14229): avc: denied { read } for pid=18878 comm="inn-cron-nntpse" name="chkconfig" dev=dm-0 ino=9984485 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sbin_t:s0 tclass=file type=SYSCALL msg=audit(1163793661.893:14229): arch=40000003 syscall=11 success=yes exit=0 a0=8e85678 a1=8e85808 a2=8e85720 a3=8e85508 items=0 ppid=18876 pid=18878 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="chkconfig" exe="/sbin/chkconfig" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163793661.893:14229): path="/sbin/chkconfig" type=AVC_PATH msg=audit(1163793661.893:14229): path="/sbin/chkconfig" type=CRED_DISP msg=audit(1163793661.913:14230): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163793661.913:14231): user pid=18874 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163793771.128:14232): avc: denied { search } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=key type=AVC msg=audit(1163793771.128:14232): avc: denied { search } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=key type=AVC msg=audit(1163793771.128:14232): avc: denied { write } for pid=15793 comm="sshd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=key type=SYSCALL msg=audit(1163793771.128:14232): arch=40000003 syscall=288 success=yes exit=0 a0=3 a1=1556d8ee a2=1f4 a3=1f4 items=0 ppid=15789 pid=15793 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163793771.148:14233): avc: denied { setattr } for pid=15789 comm="sshd" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.148:14233): arch=40000003 syscall=212 success=yes exit=0 a0=6c7df4 a1=0 a2=0 a3=6c7df4 items=0 ppid=1 pid=15789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163793771.148:14234): avc: denied { use } for pid=15842 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:sysadm_r:sysadm_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=fd type=SYSCALL msg=audit(1163793771.148:14234): arch=40000003 syscall=54 success=yes exit=0 a0=0 a1=5403 a2=bfef9958 a3=80f9f40 items=0 ppid=15841 pid=15842 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts8 comm="bash" exe="/bin/bash" subj=staff_u:sysadm_r:sysadm_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.148:14234): path="/dev/pts/8" type=AVC msg=audit(1163793771.152:14235): avc: denied { getattr } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14235): arch=40000003 syscall=195 success=yes exit=0 a0=9dcac10 a1=bfd66564 a2=457ff4 a3=1 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.152:14235): path="/home/kmacmill/.bash_history" type=AVC msg=audit(1163793771.152:14236): avc: denied { append } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14236): arch=40000003 syscall=5 success=yes exit=3 a0=9de7320 a1=8401 a2=0 a3=8401 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.152:14237): avc: denied { read } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14237): arch=40000003 syscall=5 success=yes exit=3 a0=9de7320 a1=8000 a2=0 a3=8000 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.152:14238): avc: denied { write } for pid=15794 comm="bash" name=".bash_history" dev=dm-0 ino=6547367 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.152:14238): arch=40000003 syscall=5 success=yes exit=3 a0=9de7320 a1=8201 a2=0 a3=8201 items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.152:14239): avc: denied { ioctl } for pid=15794 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.152:14239): arch=40000003 syscall=54 success=no exit=-25 a0=ff a1=5410 a2=bfd664a4 a3=bfd664ac items=0 ppid=1 pid=15794 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.152:14239): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.316:14240): avc: denied { getattr } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.316:14240): arch=40000003 syscall=231 success=yes exit=36 a0=3 a1=a2f0d3 a2=9bcd788 a3=ff items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.316:14241): avc: denied { relabelfrom } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:sysadm_devpts_t:s0 tclass=chr_file type=AVC msg=audit(1163793771.316:14241): avc: denied { relabelto } for pid=15841 comm="newrole" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.316:14241): arch=40000003 syscall=228 success=yes exit=0 a0=3 a1=a2f0d3 a2=9bcd658 a3=23 items=0 ppid=15821 pid=15841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="newrole" exe="/usr/bin/newrole" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.320:14242): avc: denied { ioctl } for pid=15821 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.320:14242): arch=40000003 syscall=54 success=no exit=-25 a0=ff a1=5410 a2=bf8ddd04 a3=bf8ddd0c items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14242): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.320:14243): avc: denied { write } for pid=15821 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.320:14243): arch=40000003 syscall=4 success=no exit=-5 a0=1 a1=b7f89000 a2=25 a3=25 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14243): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.320:14244): avc: denied { search } for pid=15821 comm="bash" name="spool" dev=dm-0 ino=14436617 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir type=AVC msg=audit(1163793771.320:14244): avc: denied { search } for pid=15821 comm="bash" name="mail" dev=dm-0 ino=14436619 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=dir type=AVC msg=audit(1163793771.320:14244): avc: denied { getattr } for pid=15821 comm="bash" name="kmacmill" dev=dm-0 ino=14437393 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=system_u:object_r:mail_spool_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.320:14244): arch=40000003 syscall=195 success=yes exit=0 a0=9a6ff70 a1=bf8dd818 a2=24bff4 a3=bf8dd818 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14244): path="/var/spool/mail/kmacmill" type=AVC msg=audit(1163793771.320:14245): avc: denied { read } for pid=15821 comm="bash" name="8" dev=devpts ino=10 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:object_r:staff_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163793771.320:14245): arch=40000003 syscall=3 success=yes exit=0 a0=0 a1=bf8dd5cb a2=1 a3=24c420 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14245): path=2F6465762F7074732F38202864656C6574656429 type=AVC msg=audit(1163793771.320:14246): avc: denied { search } for pid=15821 comm="bash" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163793771.320:14246): avc: denied { getattr } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.320:14246): arch=40000003 syscall=195 success=yes exit=0 a0=9a6f800 a1=bf8de0d4 a2=24bff4 a3=0 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC_PATH msg=audit(1163793771.320:14246): path="/root/.bash_history" type=AVC msg=audit(1163793771.340:14247): avc: denied { append } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.340:14247): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8401 a2=0 a3=8401 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.360:14248): avc: denied { read } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.360:14248): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8000 a2=0 a3=8000 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.372:14249): avc: denied { write } for pid=15821 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163793771.372:14249): arch=40000003 syscall=5 success=yes exit=3 a0=9a70150 a1=8201 a2=0 a3=8201 items=0 ppid=15820 pid=15821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.372:14250): avc: denied { create } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163793771.372:14250): arch=40000003 syscall=102 success=yes exit=4 a0=1 a1=bffb8e00 a2=130ff4 a3=8004 items=0 ppid=1 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.376:14251): avc: denied { write } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163793771.376:14251): avc: denied { nlmsg_relay } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=AVC msg=audit(1163793771.376:14251): avc: denied { audit_write } for pid=15820 comm="su" capability=29 scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=capability type=CRED_DISP msg=audit(1163793771.376:14252): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=SYSCALL msg=audit(1163793771.376:14251): arch=40000003 syscall=102 success=yes exit=104 a0=b a1=bffae080 a2=130ff4 a3=bffb4ac0 items=0 ppid=1 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=AVC msg=audit(1163793771.376:14253): avc: denied { read } for pid=15820 comm="su" scontext=staff_u:staff_r:staff_xserver_t:s0 tcontext=staff_u:staff_r:staff_xserver_t:s0 tclass=netlink_audit_socket type=SYSCALL msg=audit(1163793771.376:14253): arch=40000003 syscall=102 success=yes exit=36 a0=c a1=bffae030 a2=130ff4 a3=bffb03fc items=0 ppid=1 pid=15820 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_xserver_t:s0 key=(null) type=USER_END msg=audit(1163793771.376:14254): user pid=15820 uid=500 auid=500 subj=staff_u:staff_r:staff_xserver_t:s0 msg='PAM: session close acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/8 res=success)' type=AVC msg=audit(1163793882.003:14255): avc: denied { read } for pid=18900 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163793882.003:14255): arch=40000003 syscall=33 success=yes exit=0 a0=bf8b0f92 a1=4 a2=da3a64 a3=bf8b0f92 items=0 ppid=18899 pid=18900 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794112.281:14256): avc: denied { execute } for pid=16590 comm="bash" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794112.281:14256): arch=40000003 syscall=33 success=yes exit=0 a0=9261e70 a1=1 a2=11 a3=9261e70 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794112.281:14257): avc: denied { read } for pid=16590 comm="bash" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794112.281:14257): arch=40000003 syscall=33 success=yes exit=0 a0=9261e70 a1=4 a2=ffffffff a3=9261e70 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794114.237:14258): avc: denied { execute_no_trans } for pid=18920 comm="bash" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794114.237:14258): arch=40000003 syscall=11 success=yes exit=0 a0=925eac8 a1=925eab8 a2=9257740 a3=925e028 items=0 ppid=16590 pid=18920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794114.237:14258): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794114.249:14259): avc: denied { ioctl } for pid=18920 comm="httpd" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794114.249:14259): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfa5ded8 a3=bfa5df18 items=0 ppid=16590 pid=18920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794114.249:14259): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794116.229:14260): avc: denied { sys_ptrace } for pid=18931 comm="pidof" capability=19 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=AVC msg=audit(1163794116.229:14260): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.229:14260): arch=40000003 syscall=85 success=yes exit=10 a0=bff11a48 a1=8b621e0 a2=1000 a3=8b62028 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.229:14261): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.229:14261): arch=40000003 syscall=85 success=no exit=-2 a0=bff11a48 a1=8b631e8 a2=1000 a3=8b62058 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14262): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:auditd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14262): arch=40000003 syscall=85 success=yes exit=12 a0=bff11a48 a1=8b84b10 a2=1000 a3=8b829c8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14263): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14263): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8b86b20 a2=1000 a3=8b82a80 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14264): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:klogd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14264): arch=40000003 syscall=85 success=yes exit=11 a0=bff11a48 a1=8b87cd0 a2=1000 a3=8b87b28 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.233:14265): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:irqbalance_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.233:14265): arch=40000003 syscall=85 success=yes exit=39 a0=bff11a48 a1=8b88cd8 a2=1000 a3=8b87b58 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14266): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:setrans_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.237:14266): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b89ce0 a2=1000 a3=8b87ba8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14267): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:portmap_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14267): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8b8ace8 a2=1000 a3=8b87bf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14268): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14268): arch=40000003 syscall=85 success=yes exit=34 a0=bff11a48 a1=8b8bcf0 a2=1000 a3=8b87c48 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14269): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:bluetooth_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14269): arch=40000003 syscall=85 success=yes exit=14 a0=bff11a48 a1=8b8cd28 a2=1000 a3=8b8ccf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14270): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:automount_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14270): arch=40000003 syscall=85 success=yes exit=38 a0=bff11a48 a1=8b90f08 a2=1000 a3=8b8ddf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14271): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:apmd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14271): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b91f10 a2=1000 a3=8b8de48 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14272): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14272): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b92f48 a2=1000 a3=8b92f18 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14273): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:inetd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14273): arch=40000003 syscall=85 success=yes exit=16 a0=bff11a48 a1=8b95120 a2=1000 a3=8b93f80 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14274): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:sendmail_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14274): arch=40000003 syscall=85 success=yes exit=27 a0=bff11a48 a1=8b96128 a2=1000 a3=8b93fe8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.237:14275): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:gpm_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.237:14275): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8b982f8 a2=1000 a3=8b98138 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14276): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.241:14276): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8b99300 a2=1000 a3=8b98168 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14277): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14277): arch=40000003 syscall=85 success=yes exit=12 a0=bff11a48 a1=8b9a308 a2=1000 a3=8b981b8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14278): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14278): arch=40000003 syscall=85 success=yes exit=33 a0=bff11a48 a1=8b9b310 a2=1000 a3=8b98208 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14279): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenstored_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14279): arch=40000003 syscall=85 success=yes exit=19 a0=bff11a48 a1=8ba16b8 a2=1000 a3=8ba0518 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14280): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xenconsoled_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14280): arch=40000003 syscall=85 success=yes exit=21 a0=bff11a48 a1=8ba26c0 a2=1000 a3=8ba0568 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14281): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xend_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14281): arch=40000003 syscall=85 success=yes exit=15 a0=bff11a48 a1=8ba36c8 a2=1000 a3=8ba05a8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14282): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:fsdaemon_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14282): arch=40000003 syscall=85 success=yes exit=35 a0=bff11a48 a1=8ba6898 a2=1000 a3=8ba5708 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.241:14283): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:getty_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.241:14283): arch=40000003 syscall=85 success=yes exit=14 a0=bff11a48 a1=8ba78a0 a2=1000 a3=8ba5770 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14284): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.245:14284): arch=40000003 syscall=85 success=yes exit=39 a0=bff11a48 a1=8badc08 a2=1000 a3=8ba99e8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14285): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.245:14285): arch=40000003 syscall=85 success=yes exit=35 a0=bff11a48 a1=8bafc18 a2=1000 a3=8badad0 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14286): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.245:14286): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8bba010 a2=1000 a3=8bb7ec0 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.245:14287): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_ssh_agent_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.245:14287): arch=40000003 syscall=85 success=yes exit=18 a0=bff11a48 a1=8bbc1a8 a2=1000 a3=8bb7f88 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14288): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:pam_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.249:14288): arch=40000003 syscall=85 success=yes exit=25 a0=bff11a48 a1=8bce950 a2=1000 a3=8bcd7a0 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14289): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_mozilla_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.249:14289): arch=40000003 syscall=85 success=yes exit=32 a0=bff11a48 a1=8bd6ce0 a2=1000 a3=8bd5b58 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14290): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.249:14290): arch=40000003 syscall=85 success=yes exit=7 a0=bff11a48 a1=8bdae88 a2=1000 a3=8bd9cf8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.249:14291): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:system_r:sshd_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.249:14291): arch=40000003 syscall=85 success=yes exit=14 a0=bff11a48 a1=8be0058 a2=1000 a3=8bdeed8 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14292): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:system_r:crond_t:s0-s0:c0.c1023 tclass=process type=SYSCALL msg=audit(1163794116.253:14292): arch=40000003 syscall=85 success=yes exit=13 a0=bff11a48 a1=8be1060 a2=1000 a3=8bdef30 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14293): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:system_r:rpcd_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14293): arch=40000003 syscall=85 success=yes exit=20 a0=bff11a48 a1=8be2068 a2=1000 a3=8bdef88 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14294): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_server_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14294): arch=40000003 syscall=85 success=yes exit=39 a0=bff11a48 a1=8be6200 a2=1000 a3=8be3160 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14295): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_evolution_alarm_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14295): arch=40000003 syscall=85 success=yes exit=50 a0=bff11a48 a1=8be83b8 a2=1000 a3=8be7238 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.253:14296): avc: denied { ptrace } for pid=18931 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_thunderbird_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.253:14296): arch=40000003 syscall=85 success=yes exit=9 a0=bff11a48 a1=8beb588 a2=1000 a3=8be7368 items=0 ppid=18930 pid=18931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.285:14297): avc: denied { ptrace } for pid=18932 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:hplip_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.285:14297): arch=40000003 syscall=85 success=yes exit=15 a0=bfb45e88 a1=88a3f48 a2=1000 a3=88a3f18 items=0 ppid=18930 pid=18932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794116.285:14298): avc: denied { ptrace } for pid=18932 comm="pidof" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:xfs_t:s0 tclass=process type=SYSCALL msg=audit(1163794116.285:14298): arch=40000003 syscall=85 success=yes exit=12 a0=bfb45e88 a1=88ab308 a2=1000 a3=88a91b8 items=0 ppid=18930 pid=18932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="pidof" exe="/sbin/killall5" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794117.818:14299): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794117.818:14299): arch=40000003 syscall=4 success=yes exit=133 a0=4 a1=805c570 a2=85 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794117.818:14299): path="/dev/net/tun" type=AVC msg=audit(1163794117.818:14300): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794117.818:14300): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794117.818:14300): path="/dev/net/tun" type=AVC msg=audit(1163794126.150:14301): avc: denied { dac_override } for pid=16590 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794126.150:14301): arch=40000003 syscall=195 success=yes exit=0 a0=9261e40 a1=bfb3fc64 a2=573ff4 a3=9261e52 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794129.714:14302): avc: denied { read } for pid=18937 comm="gnome-terminal" name=".ICEauthority" dev=dm-0 ino=6574784 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794129.714:14302): arch=40000003 syscall=33 success=yes exit=0 a0=9c66a38 a1=4 a2=df7770 a3=9c66a38 items=0 ppid=1 pid=18937 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794147.003:14303): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794147.003:14303): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163794147.003:14303): path="/var/run/utmp" type=AVC msg=audit(1163794172.261:14304): avc: denied { getattr } for pid=19009 comm="ls" name="rndc.key" dev=dm-0 ino=9330789 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:dnssec_t:s0 tclass=file type=SYSCALL msg=audit(1163794172.261:14304): arch=40000003 syscall=196 success=yes exit=0 a0=bfa889d0 a1=9063944 a2=24bff4 a3=8 items=0 ppid=16590 pid=19009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="ls" exe="/bin/ls" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794172.261:14304): path="/etc/rndc.key" type=AVC msg=audit(1163794189.118:14305): avc: denied { execute } for pid=16590 comm="bash" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794189.118:14305): arch=40000003 syscall=33 success=yes exit=0 a0=924b250 a1=1 a2=11 a3=924b250 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794189.118:14306): avc: denied { read } for pid=16590 comm="bash" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794189.118:14306): arch=40000003 syscall=33 success=yes exit=0 a0=924b250 a1=4 a2=ffffffff a3=924b250 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.550:14307): avc: denied { execute_no_trans } for pid=19011 comm="bash" name="semodule" dev=dm-0 ino=10325888 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.550:14307): arch=40000003 syscall=11 success=yes exit=0 a0=925dbe0 a1=9249808 a2=9257740 a3=9261e10 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794194.550:14307): path="/usr/sbin/semodule" type=AVC msg=audit(1163794194.594:14308): avc: denied { execute } for pid=19011 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.594:14308): arch=40000003 syscall=33 success=yes exit=0 a0=c75905 a1=1 a2=c7b21c a3=8fef510 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.646:14309): avc: denied { read } for pid=19011 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.646:14309): arch=40000003 syscall=33 success=yes exit=0 a0=8fef628 a1=4 a2=c7b21c a3=8fef628 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.650:14310): avc: denied { write } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9395255 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794194.650:14310): arch=40000003 syscall=33 success=yes exit=0 a0=8fef6c8 a1=7 a2=c7b21c a3=8fef628 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.654:14311): avc: denied { read } for pid=19011 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.654:14311): arch=40000003 syscall=5 success=yes exit=3 a0=8fef5f0 a1=0 a2=e4e120 a3=8fef3e0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.658:14312): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.658:14312): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=c7b21c a3=5 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794194.658:14312): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163794194.658:14313): avc: denied { write } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9334534 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.658:14313): avc: denied { add_name } for pid=19011 comm="semodule" name="tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.658:14313): avc: denied { create } for pid=19011 comm="semodule" name="tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794194.658:14313): arch=40000003 syscall=39 success=yes exit=0 a0=8fef6f8 a1=1c0 a2=c7b21c a3=8fef6f8 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.674:14314): avc: denied { add_name } for pid=19011 comm="semodule" name="base.linked.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.674:14314): avc: denied { create } for pid=19011 comm="semodule" name="base.linked.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.674:14314): arch=40000003 syscall=5 success=yes exit=5 a0=bff43c08 a1=241 a2=81a4 a3=81a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794194.690:14315): avc: denied { write } for pid=19011 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.690:14315): arch=40000003 syscall=4 success=yes exit=4192 a0=5 a1=bff42ba8 a2=1060 a3=1060 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794194.690:14315): path="/etc/selinux/strict/modules/tmp/base.linked.tmp" type=AVC msg=audit(1163794194.986:14316): avc: denied { remove_name } for pid=19011 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794194.986:14316): avc: denied { rename } for pid=19011 comm="semodule" name="base.linked.tmp" dev=dm-0 ino=9331140 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794194.986:14316): arch=40000003 syscall=38 success=yes exit=0 a0=bff43c08 a1=bff44cb8 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163794201.951:14317): user pid=19014 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163794201.951:14318): login pid=19014 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163794201.951:14319): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163794201.951:14320): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794201.963:14321): avc: denied { execute } for pid=19015 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794201.963:14321): avc: denied { execute_no_trans } for pid=19015 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794201.963:14321): avc: denied { read } for pid=19015 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14321): arch=40000003 syscall=11 success=yes exit=0 a0=95c5d48 a1=95c5740 a2=95c5d60 a3=95c5740 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794201.963:14321): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163794201.963:14321): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163794201.963:14322): avc: denied { search } for pid=19015 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163794201.963:14322): avc: denied { read } for pid=19015 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14322): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=9af87f8 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794201.963:14323): avc: denied { getattr } for pid=19015 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14323): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfac13e8 a2=24bff4 a3=9af87f8 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794201.963:14323): path="/proc/net/dev" type=AVC msg=audit(1163794201.963:14324): avc: denied { search } for pid=19015 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163794201.963:14324): arch=40000003 syscall=33 success=yes exit=0 a0=bfac1794 a1=0 a2=bfac1688 a3=bfac1690 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794201.963:14325): avc: denied { read append } for pid=19015 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14325): arch=40000003 syscall=5 success=yes exit=3 a0=bfac1794 a1=402 a2=bfac1958 a3=bfac1690 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794201.963:14326): avc: denied { lock } for pid=19015 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794201.963:14326): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfac1690 a3=3 items=0 ppid=19014 pid=19015 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794201.963:14326): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163794202.027:14327): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163794202.027:14328): user pid=19014 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794205.023:14329): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.023:14329): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=6 a2=c7b21c a3=5 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.023:14329): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163794205.055:14330): avc: denied { write } for pid=19011 comm="semodule" name="previous" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163794205.055:14330): avc: denied { remove_name } for pid=19011 comm="semodule" name="base.linked" dev=dm-0 ino=9334715 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163794205.055:14330): avc: denied { unlink } for pid=19011 comm="semodule" name="base.linked" dev=dm-0 ino=9334715 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.055:14330): arch=40000003 syscall=10 success=yes exit=0 a0=bff46b09 a1=0 a2=e4cff4 a3=bff46b09 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.107:14331): avc: denied { write } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9334945 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=AVC msg=audit(1163794205.107:14331): avc: denied { remove_name } for pid=19011 comm="semodule" name="thunderbird.pp" dev=dm-0 ino=9334946 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.107:14331): arch=40000003 syscall=10 success=yes exit=0 a0=bff46959 a1=0 a2=e4cff4 a3=bff46959 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.623:14332): avc: denied { rmdir } for pid=19011 comm="semodule" name="modules" dev=dm-0 ino=9334945 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.623:14332): arch=40000003 syscall=40 success=yes exit=0 a0=bff46b09 a1=b7f3d688 a2=e4cff4 a3=bff46b09 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.631:14333): avc: denied { remove_name } for pid=19011 comm="semodule" name="previous" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:selinux_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.631:14333): avc: denied { rmdir } for pid=19011 comm="semodule" name="previous" dev=dm-0 ino=9334708 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_store_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.631:14333): arch=40000003 syscall=40 success=yes exit=0 a0=8ff3b58 a1=b7f3d688 a2=e4cff4 a3=8ff3b58 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.631:14334): avc: denied { rename } for pid=19011 comm="semodule" name="active" dev=dm-0 ino=9395239 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794205.631:14334): arch=40000003 syscall=38 success=yes exit=0 a0=8fef6a0 a1=8ff3b58 a2=c7b21c a3=bff46cb8 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.631:14335): avc: denied { write } for pid=19011 comm="semodule" name="policy" dev=dm-0 ino=9334538 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.631:14335): avc: denied { add_name } for pid=19011 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.631:14335): avc: denied { create } for pid=19011 comm="semodule" name="policy.21.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.631:14335): arch=40000003 syscall=5 success=yes exit=6 a0=bff3fac8 a1=241 a2=1a4 a3=1a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.647:14336): avc: denied { write } for pid=19011 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.647:14336): arch=40000003 syscall=4 success=yes exit=4192 a0=6 a1=bff3ea68 a2=1060 a3=1060 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.647:14336): path="/etc/selinux/strict/policy/policy.21.tmp" type=AVC msg=audit(1163794205.759:14337): avc: denied { write } for pid=19017 comm="gnome-terminal" name="15931" dev=dm-0 ino=14567724 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:ice_tmp_t:s0 tclass=sock_file type=SYSCALL msg=audit(1163794205.759:14337): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe1f580 a2=df7770 a3=16 items=0 ppid=1 pid=19017 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-terminal" exe="/usr/bin/gnome-terminal" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.667:14338): avc: denied { remove_name } for pid=19011 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:policy_config_t:s0 tclass=dir type=AVC msg=audit(1163794205.667:14338): avc: denied { rename } for pid=19011 comm="semodule" name="policy.21.tmp" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=AVC msg=audit(1163794205.667:14338): avc: denied { unlink } for pid=19011 comm="semodule" name="policy.21" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.667:14338): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff42c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.783:14339): avc: denied { write } for pid=19011 comm="semodule" name="files" dev=dm-0 ino=9334527 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.783:14339): avc: denied { add_name } for pid=19011 comm="semodule" name="homedir_template.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.783:14339): avc: denied { create } for pid=19011 comm="semodule" name="homedir_template.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.783:14339): arch=40000003 syscall=5 success=yes exit=6 a0=bff3fac8 a1=241 a2=1a4 a3=1a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.799:14340): avc: denied { write } for pid=19011 comm="semodule" name="homedir_template.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.799:14340): arch=40000003 syscall=4 success=yes exit=2138 a0=6 a1=bff3ea68 a2=85a a3=85a items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.799:14340): path="/etc/selinux/strict/contexts/files/homedir_template.tmp" type=AVC msg=audit(1163794205.799:14341): avc: denied { remove_name } for pid=19011 comm="semodule" name="homedir_template.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.799:14341): avc: denied { rename } for pid=19011 comm="semodule" name="homedir_template.tmp" dev=dm-0 ino=9331805 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=AVC msg=audit(1163794205.799:14341): avc: denied { unlink } for pid=19011 comm="semodule" name="homedir_template" dev=dm-0 ino=9330752 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.799:14341): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff43c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.819:14342): avc: denied { unlink } for pid=19011 comm="semodule" name="seusers" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14342): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff41c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.819:14343): avc: denied { write } for pid=19011 comm="semodule" name="contexts" dev=dm-0 ino=9334400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.819:14343): avc: denied { add_name } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.819:14343): avc: denied { create } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14343): arch=40000003 syscall=5 success=yes exit=6 a0=bff3fac8 a1=241 a2=1a4 a3=1a4 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.819:14344): avc: denied { write } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14344): arch=40000003 syscall=4 success=yes exit=4192 a0=6 a1=bff3ea68 a2=1060 a3=1060 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.819:14344): path="/etc/selinux/strict/contexts/netfilter_contexts.tmp" type=AVC msg=audit(1163794205.819:14345): avc: denied { remove_name } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=dir type=AVC msg=audit(1163794205.819:14345): avc: denied { rename } for pid=19011 comm="semodule" name="netfilter_contexts.tmp" dev=dm-0 ino=9334539 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=AVC msg=audit(1163794205.819:14345): avc: denied { unlink } for pid=19011 comm="semodule" name="netfilter_contexts" dev=dm-0 ino=9334535 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:default_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.819:14345): arch=40000003 syscall=38 success=yes exit=0 a0=bff3fac8 a1=bff40c08 a2=c7b21c a3=0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794205.871:14346): avc: denied { execute } for pid=19018 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163794205.871:14346): avc: denied { execute_no_trans } for pid=19018 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=AVC msg=audit(1163794205.871:14346): avc: denied { read } for pid=19018 comm="semodule" name="load_policy" dev=dm-0 ino=10325048 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:load_policy_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.871:14346): arch=40000003 syscall=11 success=yes exit=0 a0=8fef520 a1=d26a0c0 a2=0 a3=0 items=0 ppid=19011 pid=19018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794205.871:14346): path="/usr/sbin/load_policy" type=AVC_PATH msg=audit(1163794205.871:14346): path="/usr/sbin/load_policy" type=AVC msg=audit(1163794205.935:14347): avc: denied { read } for pid=19018 comm="load_policy" name="policy.21" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794205.935:14347): arch=40000003 syscall=5 success=yes exit=3 a0=bfd15358 a1=8000 a2=0 a3=8000 items=0 ppid=19011 pid=19018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794206.019:14348): avc: denied { load_policy } for pid=19018 comm="load_policy" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=MAC_POLICY_LOAD msg=audit(1163794206.019:14348): policy loaded auid=500 type=SYSCALL msg=audit(1163794206.019:14348): arch=40000003 syscall=4 success=yes exit=2111036 a0=4 a1=b7d97000 a2=20363c a3=bfd14288 items=0 ppid=19011 pid=19018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="load_policy" exe="/usr/sbin/load_policy" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794206.135:14349): avc: denied { ptrace } for pid=15988 comm="dbus-daemon" scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:staff_r:staff_dbusd_t:s0 tclass=process type=SYSCALL msg=audit(1163794206.135:14349): arch=40000003 syscall=85 success=yes exit=16 a0=a45fce a1=b7edab58 a2=fff a3=b7eddeba items=0 ppid=1 pid=15988 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163794206.151:14350): avc: denied { execute } for pid=19024 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163794206.151:14350): avc: denied { execute_no_trans } for pid=19024 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163794206.151:14350): avc: denied { read } for pid=19024 comm="semodule" name="setfiles" dev=dm-0 ino=9984601 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:setfiles_exec_t:s0 tclass=file type=AVC msg=audit(1163794206.243:14351): avc: denied { getattr } for pid=6659 comm="dbus-daemon" name="/" dev=dm-0 ino=2 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem type=SYSCALL msg=audit(1163794206.243:14351): arch=40000003 syscall=100 success=yes exit=0 a0=15 a1=bfcd50ac a2=c4eff4 a3=ffffffb8 items=0 ppid=1 pid=6659 auid=500 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=SYSCALL msg=audit(1163794206.151:14350): arch=40000003 syscall=11 success=yes exit=0 a0=8fef550 a1=d292770 a2=0 a3=0 items=0 ppid=19011 pid=19024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794206.151:14350): path="/sbin/setfiles" type=AVC_PATH msg=audit(1163794206.151:14350): path="/sbin/setfiles" type=AVC msg=audit(1163794206.375:14352): avc: denied { read } for pid=19024 comm="setfiles" name="policy.21" dev=dm-0 ino=9334698 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:policy_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794206.375:14352): arch=40000003 syscall=5 success=yes exit=3 a0=bf8e8f97 a1=8000 a2=1b6 a3=8fd73e0 items=0 ppid=19011 pid=19024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="setfiles" exe="/sbin/setfiles" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794206.643:14353): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794206.643:14353): arch=40000003 syscall=143 success=yes exit=0 a0=4 a1=8 a2=c7b21c a3=8fef3e0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794206.643:14353): path="/etc/selinux/strict/modules/semanage.read.LOCK" type=AVC msg=audit(1163794207.187:14354): avc: denied { search } for pid=15987 comm="dbus-daemon" name="kmacmill" dev=dm-0 ino=6547202 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794207.187:14354): avc: denied { search } for pid=15987 comm="dbus-daemon" name=".local" dev=dm-0 ino=6815703 scontext=staff_u:staff_r:staff_dbusd_t:s0 tcontext=staff_u:object_r:staff_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794207.187:14354): arch=40000003 syscall=5 success=no exit=-2 a0=8ebe028 a1=18800 a2=0 a3=0 items=0 ppid=1 pid=15987 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="dbus-daemon" exe="/bin/dbus-daemon" subj=staff_u:staff_r:staff_dbusd_t:s0 key=(null) type=AVC msg=audit(1163794207.727:14355): avc: denied { read } for pid=19045 comm="genhomedircon" name="semanage.read.LOCK" dev=dm-0 ino=9334533 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_read_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794207.727:14355): arch=40000003 syscall=33 success=yes exit=0 a0=9207d10 a1=4 a2=28021c a3=9207d10 items=0 ppid=19011 pid=19045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794207.727:14356): avc: denied { write } for pid=19045 comm="genhomedircon" name="modules" dev=dm-0 ino=9333979 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:selinux_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794207.727:14356): arch=40000003 syscall=33 success=yes exit=0 a0=9206598 a1=7 a2=28021c a3=9207d10 items=0 ppid=19011 pid=19045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794207.855:14357): avc: denied { write } for pid=19045 comm="genhomedircon" name="file_contexts.homedirs" dev=dm-0 ino=9334712 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:file_context_t:s0 tclass=file type=SYSCALL msg=audit(1163794207.855:14357): arch=40000003 syscall=5 success=yes exit=3 a0=921b508 a1=8241 a2=1b6 a3=921b548 items=0 ppid=19011 pid=19045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="genhomedircon" exe="/usr/bin/python" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794208.071:14358): avc: denied { lock } for pid=19011 comm="semodule" name="semanage.trans.LOCK" dev=dm-0 ino=9334536 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794208.071:14358): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=8 a2=c7b21c a3=8fef3e0 items=0 ppid=16590 pid=19011 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="semodule" exe="/usr/sbin/semodule" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794208.071:14358): path="/etc/selinux/strict/modules/semanage.trans.LOCK" type=AVC msg=audit(1163794209.147:14359): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163794209.147:14359): arch=40000003 syscall=195 success=yes exit=0 a0=10fb5e0 a1=bfc616ac a2=1113ff4 a3=0 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.147:14359): path="/etc/localtime" type=AVC msg=audit(1163794209.639:14360): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794209.639:14360): arch=40000003 syscall=4 success=yes exit=105 a0=4 a1=805c570 a2=69 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.639:14360): path="/dev/net/tun" type=AVC msg=audit(1163794209.639:14361): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794209.639:14361): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.639:14361): path="/dev/net/tun" type=AVC msg=audit(1163794209.999:14362): avc: denied { lock } for pid=16476 comm="pam_timestamp_c" name="utmp" dev=dm-0 ino=14436583 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794209.999:14362): arch=40000003 syscall=221 success=yes exit=0 a0=3 a1=7 a2=bfded3d8 a3=0 items=0 ppid=16467 pid=16476 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1163794209.999:14362): path="/var/run/utmp" type=USER_AUTH msg=audit(1163794210.195:14363): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=USER_ACCT msg=audit(1163794210.195:14364): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=AVC msg=audit(1163794210.211:14365): avc: denied { write } for pid=19046 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:staff_r:staff_su_t:s0 tclass=key type=AVC msg=audit(1163794210.211:14365): avc: denied { link } for pid=19046 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key type=SYSCALL msg=audit(1163794210.211:14365): arch=40000003 syscall=288 success=yes exit=0 a0=8 a1=fffffffc a2=fffffffd a3=0 items=0 ppid=19025 pid=19046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.211:14366): avc: denied { search } for pid=19046 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163794210.211:14366): arch=40000003 syscall=5 success=no exit=-2 a0=bf8c2d58 a1=8000 a2=1b6 a3=9111200 items=0 ppid=19025 pid=19046 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.255:14367): avc: denied { write } for pid=19047 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.255:14367): arch=40000003 syscall=33 success=yes exit=0 a0=bfd8df2b a1=2 a2=bfd8cbd0 a3=0 items=0 ppid=19046 pid=19047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.255:14368): avc: denied { read } for pid=19047 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.255:14368): arch=40000003 syscall=5 success=yes exit=2 a0=bfd8df2b a1=0 a2=1b6 a3=95b7008 items=0 ppid=19046 pid=19047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.255:14369): avc: denied { getattr } for pid=19047 comm="xauth" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.255:14369): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfd8c91c a2=24fff4 a3=95b7008 items=0 ppid=19046 pid=19047 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163794210.255:14369): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163794210.259:14370): avc: denied { write } for pid=19046 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.259:14370): avc: denied { add_name } for pid=19046 comm="su" name=".xauthSGkEvM" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.259:14370): avc: denied { create } for pid=19046 comm="su" name=".xauthSGkEvM" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.259:14370): arch=40000003 syscall=5 success=yes exit=4 a0=9111323 a1=80c2 a2=180 a3=80c2 items=0 ppid=19025 pid=19046 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.259:14371): avc: denied { setattr } for pid=19046 comm="su" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.259:14371): arch=40000003 syscall=207 success=yes exit=0 a0=4 a1=0 a2=0 a3=1785bf items=0 ppid=19025 pid=19046 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts6 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14372): avc: denied { search } for pid=19048 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=SYSCALL msg=audit(1163794210.263:14372): arch=40000003 syscall=195 success=no exit=-2 a0=bfc74897 a1=bfc743ac a2=3b7ff4 a3=bfc743ac items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14373): avc: denied { write } for pid=19048 comm="xauth" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.263:14373): avc: denied { add_name } for pid=19048 comm="xauth" name=".xauthSGkEvM-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.263:14373): avc: denied { create } for pid=19048 comm="xauth" name=".xauthSGkEvM-c" scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14373): arch=40000003 syscall=5 success=yes exit=2 a0=bfc74897 a1=c1 a2=180 a3=ffffffff items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14374): avc: denied { link } for pid=19048 comm="xauth" name=".xauthSGkEvM-c" dev=dm-0 ino=13127386 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14374): arch=40000003 syscall=9 success=yes exit=0 a0=bfc74897 a1=bfc74496 a2=da3a64 a3=2 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14375): avc: denied { write } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14375): arch=40000003 syscall=33 success=yes exit=0 a0=bfc75f27 a1=2 a2=bfc74dc0 a3=0 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14376): avc: denied { read } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14376): arch=40000003 syscall=5 success=yes exit=2 a0=bfc75f27 a1=0 a2=1b6 a3=8363008 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC msg=audit(1163794210.263:14377): avc: denied { getattr } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14377): arch=40000003 syscall=197 success=yes exit=0 a0=2 a1=bfc74b0c a2=3b7ff4 a3=8363008 items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=AVC_PATH msg=audit(1163794210.263:14377): path="/root/.xauthSGkEvM" type=AVC msg=audit(1163794210.263:14378): avc: denied { remove_name } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir type=AVC msg=audit(1163794210.263:14378): avc: denied { unlink } for pid=19048 comm="xauth" name=".xauthSGkEvM" dev=dm-0 ino=13127382 scontext=staff_u:staff_r:staff_xauth_t:s0 tcontext=staff_u:object_r:user_home_dir_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.263:14378): arch=40000003 syscall=10 success=yes exit=0 a0=8363008 a1=1000 a2=0 a3=836308a items=0 ppid=19046 pid=19048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:staff_xauth_t:s0 key=(null) type=USER_START msg=audit(1163794210.263:14379): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=CRED_ACQ msg=audit(1163794210.263:14380): user pid=19046 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/6 res=success)' type=AVC msg=audit(1163794210.467:14381): avc: denied { read } for pid=19049 comm="bash" name=".bash_profile" dev=dm-0 ino=13127141 scontext=staff_u:staff_r:staff_t:s0 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.467:14381): arch=40000003 syscall=5 success=yes exit=3 a0=8946f98 a1=8000 a2=0 a3=8000 items=0 ppid=19046 pid=19049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794210.519:14382): avc: denied { read } for pid=19049 comm="bash" name=".bash_history" dev=dm-0 ino=13127151 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794210.519:14382): arch=40000003 syscall=5 success=yes exit=3 a0=8946db8 a1=8000 a2=0 a3=8000 items=0 ppid=19046 pid=19049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_AUTH msg=audit(1163794226.832:14383): user pid=19079 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/6 res=success)' type=USER_ACCT msg=audit(1163794226.832:14384): user pid=19079 uid=0 auid=500 subj=staff_u:staff_r:newrole_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/bin/newrole" (hostname=?, addr=?, terminal=pts/6 res=success)' type=AVC msg=audit(1163794274.759:14385): avc: denied { relabelfrom } for pid=19114 comm="chcon" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_exec_t:s0 tclass=file type=AVC msg=audit(1163794274.759:14385): avc: denied { relabelto } for pid=19114 comm="chcon" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794274.759:14385): arch=40000003 syscall=226 success=yes exit=0 a0=bfc8094c a1=a2f0d3 a2=980bcb0 a3=25 items=0 ppid=16590 pid=19114 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="chcon" exe="/usr/bin/chcon" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794283.224:14386): avc: denied { dac_override } for pid=16590 comm="bash" capability=1 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794283.224:14386): arch=40000003 syscall=195 success=no exit=-2 a0=925e198 a1=bfb405b0 a2=573ff4 a3=925e198 items=0 ppid=16587 pid=16590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794290.516:14387): avc: denied { write } for pid=19116 comm="su" name="access" dev=selinuxfs ino=6 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=file type=SYSCALL msg=audit(1163794290.516:14387): arch=40000003 syscall=5 success=yes exit=3 a0=bfbb4178 a1=8002 a2=0 a3=8002 items=0 ppid=16590 pid=19116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=AVC msg=audit(1163794290.516:14388): avc: denied { compute_av } for pid=19116 comm="su" scontext=staff_u:staff_r:staff_su_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security type=SYSCALL msg=audit(1163794290.516:14388): arch=40000003 syscall=4 success=yes exit=58 a0=3 a1=8f99ef0 a2=3a a3=8f99ef0 items=0 ppid=16590 pid=19116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="su" exe="/bin/su" subj=staff_u:staff_r:staff_su_t:s0 key=(null) type=USER_AUTH msg=audit(1163794290.516:14389): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163794290.516:14390): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_START msg=audit(1163794290.564:14391): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: session open acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=CRED_ACQ msg=audit(1163794290.568:14392): user pid=19116 uid=0 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: setcred acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794295.109:14393): avc: denied { execute } for pid=19149 comm="service" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.109:14393): arch=40000003 syscall=33 success=yes exit=0 a0=8333a98 a1=1 a2=1 a3=832a2b0 items=0 ppid=19119 pid=19149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="service" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794295.145:14394): avc: denied { execute_no_trans } for pid=19156 comm="env" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=AVC msg=audit(1163794295.145:14394): avc: denied { read } for pid=19156 comm="env" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.145:14394): arch=40000003 syscall=11 success=yes exit=0 a0=bfbbec09 a1=bfbbde68 a2=954e858 a3=5 items=0 ppid=19149 pid=19156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.145:14394): path="/etc/rc.d/init.d/httpd" type=AVC_PATH msg=audit(1163794295.145:14394): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794295.149:14395): avc: denied { ioctl } for pid=19156 comm="httpd" name="httpd" dev=dm-0 ino=9330356 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:initrc_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.149:14395): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bfa60da8 a3=bfa60de8 items=0 ppid=19149 pid=19156 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.149:14395): path="/etc/rc.d/init.d/httpd" type=AVC msg=audit(1163794295.217:14396): avc: denied { read } for pid=19161 comm="grep" name="httpd.conf" dev=dm-0 ino=9331739 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.217:14396): arch=40000003 syscall=5 success=yes exit=3 a0=bfd94f88 a1=8000 a2=0 a3=8000 items=0 ppid=19156 pid=19161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="grep" exe="/bin/grep" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794295.233:14397): avc: denied { execute } for pid=19163 comm="bash" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=AVC msg=audit(1163794295.233:14397): avc: denied { execute_no_trans } for pid=19163 comm="bash" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=AVC msg=audit(1163794295.233:14397): avc: denied { read } for pid=19163 comm="bash" name="httpd" dev=dm-0 ino=10321419 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:myapache_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.233:14397): arch=40000003 syscall=11 success=yes exit=0 a0=a0e5d30 a1=a0e5df8 a2=a0e6130 a3=a0e5cb0 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.233:14397): path="/usr/sbin/httpd" type=AVC_PATH msg=audit(1163794295.233:14397): path="/usr/sbin/httpd" type=AVC msg=audit(1163794295.561:14398): avc: denied { read } for pid=19163 comm="httpd" name="modules" dev=dm-0 ino=9331255 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=lnk_file type=AVC msg=audit(1163794295.561:14398): avc: denied { read } for pid=19163 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.561:14398): arch=40000003 syscall=5 success=yes exit=4 a0=88fb550 a1=0 a2=424150 a3=88fb550 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794295.617:14399): avc: denied { execute } for pid=19163 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794295.617:14399): arch=40000003 syscall=192 success=yes exit=1146880 a0=0 a1=30bc a2=5 a3=802 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794295.617:14399): path="/usr/lib/httpd/modules/mod_auth_basic.so" type=AVC msg=audit(1163794296.193:14400): avc: denied { read } for pid=19163 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.193:14400): arch=40000003 syscall=5 success=yes exit=5 a0=40ae73 a1=0 a2=1b6 a3=8943f90 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.193:14401): avc: denied { node_bind } for pid=19163 comm="httpd" src=80 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794296.193:14401): avc: denied { net_bind_service } for pid=19163 comm="httpd" capability=10 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794296.193:14401): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfa206d0 a2=1951e8 a3=88bc790 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.193:14402): avc: denied { read } for pid=19163 comm="httpd" name="logs" dev=dm-0 ino=9330432 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_log_t:s0 tclass=lnk_file type=AVC msg=audit(1163794296.193:14402): avc: denied { append } for pid=19163 comm="httpd" name="error_log" dev=dm-0 ino=14437040 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.193:14402): arch=40000003 syscall=5 success=yes exit=7 a0=88ec580 a1=8441 a2=1b6 a3=8441 items=0 ppid=19162 pid=19163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.281:14403): avc: denied { write } for pid=19164 comm="httpd" name="run" dev=dm-0 ino=14436616 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794296.281:14403): avc: denied { add_name } for pid=19164 comm="httpd" name="httpd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794296.281:14403): avc: denied { create } for pid=19164 comm="httpd" name="httpd.pid" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.281:14403): arch=40000003 syscall=5 success=yes exit=9 a0=8966818 a1=8241 a2=1a4 a3=8241 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.297:14404): avc: denied { write } for pid=19164 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.297:14404): arch=40000003 syscall=4 success=yes exit=6 a0=9 a1=899a788 a2=6 a3=6 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794296.297:14404): path="/var/run/httpd.pid" type=AVC msg=audit(1163794296.301:14405): avc: denied { setuid } for pid=19165 comm="httpd" capability=7 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794296.301:14405): arch=40000003 syscall=213 success=yes exit=0 a0=30 a1=108 a2=1 a3=bfa204d0 items=0 ppid=19164 pid=19165 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.329:14406): avc: denied { write } for pid=19168 comm="touch" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794296.329:14406): avc: denied { add_name } for pid=19168 comm="touch" name="httpd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794296.329:14406): avc: denied { create } for pid=19168 comm="touch" name="httpd" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.329:14406): arch=40000003 syscall=5 success=yes exit=0 a0=bfee1f80 a1=8941 a2=1b6 a3=8941 items=0 ppid=19156 pid=19168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794296.337:14407): avc: denied { write } for pid=19168 comm="touch" name="httpd" dev=dm-0 ino=14436997 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794296.337:14407): arch=40000003 syscall=271 success=yes exit=0 a0=bfee0b64 a1=0 a2=eb5ff4 a3=0 items=0 ppid=19156 pid=19168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794300.201:14408): avc: denied { read } for pid=19178 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794300.201:14408): arch=40000003 syscall=33 success=yes exit=0 a0=bf85af92 a1=4 a2=11ea64 a3=bf85af92 items=0 ppid=19177 pid=19178 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794307.389:14409): avc: denied { read } for pid=19165 comm="httpd" name="noindex.html" dev=dm-0 ino=14436695 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163794307.389:14409): arch=40000003 syscall=5 success=yes exit=11 a0=89afad8 a1=8000 a2=0 a3=8000 items=0 ppid=19164 pid=19165 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.622:14410): avc: denied { read } for pid=19188 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.622:14410): arch=40000003 syscall=5 success=yes exit=3 a0=90ddfc8 a1=8000 a2=0 a3=8000 items=0 ppid=19181 pid=19188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.622:14411): avc: denied { ioctl } for pid=19188 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.622:14411): arch=40000003 syscall=54 success=no exit=-25 a0=0 a1=5401 a2=bfc40298 a3=bfc402d8 items=0 ppid=19181 pid=19188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794313.622:14411): path="/var/run/httpd.pid" type=AVC msg=audit(1163794313.626:14412): avc: denied { kill } for pid=19164 comm="httpd" capability=5 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=SYSCALL msg=audit(1163794313.626:14412): arch=40000003 syscall=37 success=yes exit=0 a0=ffffb524 a1=f a2=422ff4 a3=899a788 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.646:14413): avc: denied { remove_name } for pid=19164 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794313.646:14413): avc: denied { unlink } for pid=19164 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.646:14413): arch=40000003 syscall=10 success=yes exit=0 a0=8966960 a1=8966960 a2=16a004 a3=8966960 items=0 ppid=1 pid=19164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794313.790:14414): avc: denied { write } for pid=19195 comm="rm" name="subsys" dev=dm-0 ino=14436611 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794313.790:14414): avc: denied { remove_name } for pid=19195 comm="rm" name="httpd" dev=dm-0 ino=14436997 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=AVC msg=audit(1163794313.790:14414): avc: denied { unlink } for pid=19195 comm="rm" name="httpd" dev=dm-0 ino=14436997 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:object_r:var_lock_t:s0 tclass=file type=SYSCALL msg=audit(1163794313.790:14414): arch=40000003 syscall=10 success=yes exit=0 a0=bf911f73 a1=0 a2=805277c a3=bf9116f4 items=0 ppid=19188 pid=19195 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="rm" exe="/bin/rm" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794336.055:14415): avc: denied { read } for pid=19210 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794336.055:14415): arch=40000003 syscall=5 success=yes exit=5 a0=2f3e73 a1=0 a2=1b6 a3=82ebf90 items=0 ppid=19209 pid=19210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794336.059:14416): avc: denied { node_bind } for pid=19210 comm="httpd" src=80 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794336.059:14416): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bf852d10 a2=7ff1e8 a3=8264790 items=0 ppid=19209 pid=19210 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="httpd" exe="/usr/sbin/httpd" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794336.095:14417): avc: denied { add_name } for pid=19217 comm="touch" name="httpd" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir type=SYSCALL msg=audit(1163794336.095:14417): arch=40000003 syscall=5 success=yes exit=0 a0=bfb8ef80 a1=8941 a2=1b6 a3=8941 items=0 ppid=19203 pid=19217 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="touch" exe="/bin/touch" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794345.112:14418): avc: denied { execute } for pid=19119 comm="bash" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794345.112:14418): arch=40000003 syscall=33 success=yes exit=0 a0=9464518 a1=1 a2=11 a3=9464518 items=0 ppid=19116 pid=19119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794345.112:14419): avc: denied { read } for pid=19119 comm="bash" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794345.112:14419): arch=40000003 syscall=33 success=yes exit=0 a0=9464518 a1=4 a2=ffffffff a3=9464518 items=0 ppid=19116 pid=19119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="bash" exe="/bin/bash" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794348.308:14420): avc: denied { execute_no_trans } for pid=19238 comm="bash" name="run_init" dev=dm-0 ino=10337905 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:run_init_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794348.308:14420): arch=40000003 syscall=11 success=yes exit=0 a0=9465dc0 a1=9465df0 a2=9466610 a3=9468960 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794348.308:14420): path="/usr/sbin/run_init" type=AVC msg=audit(1163794352.940:14421): avc: denied { audit_write } for pid=19238 comm="run_init" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_AUTH msg=audit(1163794352.940:14422): user pid=19238 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=SYSCALL msg=audit(1163794352.940:14421): arch=40000003 syscall=102 success=yes exit=128 a0=b a1=bff3a160 a2=a47ff4 a3=bff40ba0 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163794352.940:14423): user pid=19238 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794352.972:14424): avc: denied { setexec } for pid=19238 comm="run_init" scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=process type=SYSCALL msg=audit(1163794352.972:14424): arch=40000003 syscall=4 success=yes exit=30 a0=3 a1=8f8f4a0 a2=1e a3=a2f751 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794352.972:14425): avc: denied { transition } for pid=19238 comm="run_init" name="open_init_pty" dev=dm-0 ino=10316125 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=AVC msg=audit(1163794352.972:14425): avc: denied { siginh } for pid=19238 comm="open_init_pty" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=AVC msg=audit(1163794352.972:14425): avc: denied { rlimitinh } for pid=19238 comm="open_init_pty" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=AVC msg=audit(1163794352.972:14425): avc: denied { noatsecure } for pid=19238 comm="open_init_pty" scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process type=SYSCALL msg=audit(1163794352.972:14425): arch=40000003 syscall=11 success=yes exit=0 a0=804921d a1=bff451b4 a2=bff451c4 a3=bff451b4 items=0 ppid=19119 pid=19238 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="open_init_pty" exe="/usr/sbin/open_init_pty" subj=system_u:system_r:initrc_t:s0 key=(null) type=AVC_PATH msg=audit(1163794352.972:14425): path="/usr/sbin/open_init_pty" type=AVC msg=audit(1163794352.992:14426): avc: denied { read write } for pid=19239 comm="httpd" name="7" dev=devpts ino=9 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:initrc_devpts_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794352.992:14426): arch=40000003 syscall=11 success=yes exit=0 a0=942a08e a1=bfd85ff8 a2=bfd86004 a3=bfd86e94 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794352.992:14427): avc: denied { search } for pid=19239 comm="httpd" name="etc" dev=dm-0 ino=9329761 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163794352.992:14427): arch=40000003 syscall=33 success=no exit=-2 a0=901e4f a1=4 a2=904fc0 a3=0 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794352.992:14428): avc: denied { read } for pid=19239 comm="httpd" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=system_u:system_r:myapache_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163794352.992:14428): arch=40000003 syscall=5 success=yes exit=3 a0=902037 a1=0 a2=0 a3=ffffffff items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794352.992:14429): avc: denied { getattr } for pid=19239 comm="httpd" name="ld.so.cache" dev=dm-0 ino=9330488 scontext=system_u:system_r:myapache_t:s0 tcontext=staff_u:object_r:ld_so_cache_t:s0 tclass=file type=SYSCALL msg=audit(1163794352.992:14429): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa8a340 a2=904fc0 a3=ffffffff items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794352.992:14429): path="/etc/ld.so.cache" type=AVC msg=audit(1163794352.992:14430): avc: denied { search } for pid=19239 comm="httpd" name="lib" dev=dm-0 ino=13716385 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=AVC msg=audit(1163794352.992:14430): avc: denied { read } for pid=19239 comm="httpd" name="libm.so.6" dev=dm-0 ino=13716419 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=lnk_file type=AVC msg=audit(1163794352.992:14430): avc: denied { read } for pid=19239 comm="httpd" name="libm-2.5.90.so" dev=dm-0 ino=13716401 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163794352.992:14430): arch=40000003 syscall=5 success=yes exit=3 a0=b7f0666b a1=0 a2=19e a3=b7f0666b items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794353.008:14431): avc: denied { getattr } for pid=19239 comm="httpd" name="libm-2.5.90.so" dev=dm-0 ino=13716401 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163794353.008:14431): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa8a3a4 a2=904fc0 a3=4 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794353.008:14431): path="/lib/i686/nosegneg/libm-2.5.90.so" type=AVC msg=audit(1163794353.008:14432): avc: denied { execute } for pid=19239 comm="httpd" name="libm-2.5.90.so" dev=dm-0 ino=13716401 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:shlib_t:s0 tclass=file type=SYSCALL msg=audit(1163794353.008:14432): arch=40000003 syscall=192 success=yes exit=7204864 a0=0 a1=26080 a2=5 a3=802 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794353.008:14432): path="/lib/i686/nosegneg/libm-2.5.90.so" type=AVC msg=audit(1163794353.012:14433): avc: denied { search } for pid=19239 comm="httpd" name="usr" dev=dm-0 ino=10311841 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1163794353.012:14433): arch=40000003 syscall=5 success=yes exit=3 a0=b7f10c9f a1=0 a2=53f a3=b7f10c9f items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794353.012:14434): avc: denied { read } for pid=19239 comm="httpd" name="libldap-2.3.so.0" dev=dm-0 ino=10318754 scontext=system_u:system_r:myapache_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163794353.012:14434): arch=40000003 syscall=5 success=yes exit=3 a0=b7f069aa a1=0 a2=1b2 a3=b7f069aa items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794353.016:14435): avc: denied { read } for pid=19239 comm="httpd" name="ld-2.5.90.so" dev=dm-0 ino=13716553 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:ld_so_t:s0 tclass=file type=SYSCALL msg=audit(1163794353.016:14435): arch=40000003 syscall=125 success=yes exit=0 a0=904000 a1=1000 a2=1 a3=380 items=0 ppid=19238 pid=19239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794353.016:14435): path="/lib/ld-2.5.90.so" type=AVC msg=audit(1163794368.013:14436): avc: denied { audit_write } for pid=19240 comm="run_init" capability=29 scontext=staff_u:staff_r:staff_t:s0 tcontext=staff_u:staff_r:staff_t:s0 tclass=capability type=USER_AUTH msg=audit(1163794368.013:14437): user pid=19240 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=SYSCALL msg=audit(1163794368.013:14436): arch=40000003 syscall=102 success=yes exit=128 a0=b a1=bfd7f790 a2=a47ff4 a3=bfd861d0 items=0 ppid=19119 pid=19240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts2 comm="run_init" exe="/usr/sbin/run_init" subj=staff_u:staff_r:staff_t:s0 key=(null) type=USER_ACCT msg=audit(1163794368.013:14438): user pid=19240 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794368.065:14439): avc: denied { search } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=AVC msg=audit(1163794368.065:14439): avc: denied { getattr } for pid=19248 comm="httpd" name="httpd.conf" dev=dm-0 ino=9331739 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14439): arch=40000003 syscall=195 success=yes exit=0 a0=8e98020 a1=bfe2040c a2=b8aff4 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14439): path="/etc/httpd/conf/httpd.conf" type=AVC msg=audit(1163794368.065:14440): avc: denied { read } for pid=19248 comm="httpd" name="httpd.conf" dev=dm-0 ino=9331739 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14440): arch=40000003 syscall=5 success=yes exit=3 a0=8e98020 a1=8000 a2=1b6 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.065:14441): avc: denied { getattr } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=9330261 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.065:14441): arch=40000003 syscall=195 success=yes exit=0 a0=8e99188 a1=bfe201ec a2=b8aff4 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14441): path="/etc/httpd" type=AVC msg=audit(1163794368.065:14442): avc: denied { read } for pid=19248 comm="httpd" name="modules" dev=dm-0 ino=9331255 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=lnk_file type=AVC msg=audit(1163794368.065:14442): avc: denied { search } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=10640259 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=dir type=AVC msg=audit(1163794368.065:14442): avc: denied { read } for pid=19248 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14442): arch=40000003 syscall=5 success=yes exit=4 a0=8ea2550 a1=0 a2=b8c150 a3=8ea2550 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.065:14443): avc: denied { getattr } for pid=19248 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14443): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfe1fb20 a2=1e1fc0 a3=5 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14443): path="/usr/lib/httpd/modules/mod_auth_basic.so" type=AVC msg=audit(1163794368.065:14444): avc: denied { execute } for pid=19248 comm="httpd" name="mod_auth_basic.so" dev=dm-0 ino=10639225 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_modules_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.065:14444): arch=40000003 syscall=192 success=yes exit=6766592 a0=0 a1=30bc a2=5 a3=802 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.065:14444): path="/usr/lib/httpd/modules/mod_auth_basic.so" type=AVC msg=audit(1163794368.077:14445): avc: denied { read } for pid=19248 comm="httpd" name="conf.d" dev=dm-0 ino=9330352 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_config_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.077:14445): arch=40000003 syscall=5 success=yes exit=4 a0=8ebd788 a1=18800 a2=1e1fc0 a3=8ebd768 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14446): avc: denied { search } for pid=19248 comm="httpd" name="sbin" dev=dm-0 ino=10311842 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=AVC msg=audit(1163794368.089:14446): avc: denied { getattr } for pid=19248 comm="httpd" name="suexec" dev=dm-0 ino=10321423 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_suexec_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14446): arch=40000003 syscall=195 success=yes exit=0 a0=d76b1e a1=bfe2068c a2=b8aff4 a3=73b170 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14446): path="/usr/sbin/suexec" type=AVC msg=audit(1163794368.089:14447): avc: denied { create } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14447): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfe203f4 a2=b8aff4 a3=8e6378b items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14448): avc: denied { bind } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14448): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfe203f4 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14449): avc: denied { getattr } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14449): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=bfe203f4 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14450): avc: denied { write } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=AVC msg=audit(1163794368.089:14450): avc: denied { nlmsg_read } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14450): arch=40000003 syscall=102 success=yes exit=20 a0=b a1=bfe1f32c a2=b8aff4 a3=ffffffb8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14451): avc: denied { read } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=netlink_route_socket type=SYSCALL msg=audit(1163794368.089:14451): arch=40000003 syscall=102 success=yes exit=188 a0=11 a1=bfe1f32c a2=b8aff4 a3=ffffffb8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14452): avc: denied { create } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163794368.089:14452): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfe20300 a2=b8aff4 a3=8edd850 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14453): avc: denied { connect } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163794368.089:14453): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe20300 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14454): avc: denied { getattr } for pid=19248 comm="httpd" laddr=0000:0000:0000:0000:0000:0000:0000:0001 lport=33036 faddr=0000:0000:0000:0000:0000:0000:0000:0001 fport=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=udp_socket type=SYSCALL msg=audit(1163794368.089:14454): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=bfe20300 a2=b8aff4 a3=3 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14455): avc: denied { create } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794368.089:14455): arch=40000003 syscall=102 success=yes exit=3 a0=1 a1=bfe20560 a2=8fe1e8 a3=8e63900 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14456): avc: denied { read } for pid=19248 comm="httpd" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14456): arch=40000003 syscall=5 success=yes exit=5 a0=b72f9d a1=0 a2=1b6 a3=8eddcd0 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14457): avc: denied { getattr } for pid=19248 comm="httpd" name="nsswitch.conf" dev=dm-0 ino=9334508 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14457): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfe203a4 a2=b8aff4 a3=8eddcd0 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14457): path="/etc/nsswitch.conf" type=AVC msg=audit(1163794368.089:14458): avc: denied { search } for pid=19248 comm="httpd" name="lib" dev=dm-0 ino=13716385 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.089:14458): arch=40000003 syscall=5 success=yes exit=5 a0=b7f9495c a1=0 a2=150 a3=b7f9495c items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14459): avc: denied { search } for pid=19248 comm="httpd" name="www" dev=dm-0 ino=14436677 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=AVC msg=audit(1163794368.089:14459): avc: denied { getattr } for pid=19248 comm="httpd" name="html" dev=dm-0 ino=14436704 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.089:14459): arch=40000003 syscall=195 success=yes exit=0 a0=8ed4198 a1=bfe204bc a2=b8aff4 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14459): path="/var/www/html" type=AVC msg=audit(1163794368.089:14460): avc: denied { read } for pid=19248 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14460): arch=40000003 syscall=5 success=yes exit=5 a0=b72e73 a1=0 a2=1b6 a3=8eeaf90 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.089:14461): avc: denied { getattr } for pid=19248 comm="httpd" name="resolv.conf" dev=dm-0 ino=9330239 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:net_conf_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.089:14461): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfe1dd04 a2=b8aff4 a3=8eeaf90 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.089:14461): path="/etc/resolv.conf" type=AVC msg=audit(1163794368.097:14462): avc: denied { setopt } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794368.097:14462): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bfe206f0 a2=8fe1e8 a3=8e63900 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14463): avc: denied { bind } for pid=19248 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794368.097:14463): avc: denied { name_bind } for pid=19248 comm="httpd" src=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794368.097:14463): avc: denied { node_bind } for pid=19248 comm="httpd" src=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:unspec_node_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794368.097:14463): avc: denied { net_bind_service } for pid=19248 comm="httpd" capability=10 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=SYSCALL msg=audit(1163794368.097:14463): arch=40000003 syscall=102 success=yes exit=0 a0=2 a1=bfe20710 a2=8fe1e8 a3=8e63790 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14464): avc: denied { listen } for pid=19248 comm="httpd" lport=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794368.097:14464): arch=40000003 syscall=102 success=yes exit=0 a0=4 a1=bfe20710 a2=8fe1e8 a3=8e638e0 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14465): avc: denied { read } for pid=19248 comm="httpd" name="logs" dev=dm-0 ino=9330432 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_log_t:s0 tclass=lnk_file type=AVC msg=audit(1163794368.097:14465): avc: denied { search } for pid=19248 comm="httpd" name="log" dev=dm-0 ino=14436604 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=dir type=AVC msg=audit(1163794368.097:14465): avc: denied { search } for pid=19248 comm="httpd" name="httpd" dev=dm-0 ino=14436676 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_log_t:s0 tclass=dir type=AVC msg=audit(1163794368.097:14465): avc: denied { append } for pid=19248 comm="httpd" name="error_log" dev=dm-0 ino=14437040 scontext=system_u:system_r:myapache_t:s0 tcontext=user_u:object_r:httpd_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.097:14465): arch=40000003 syscall=5 success=yes exit=7 a0=8e93580 a1=8441 a2=1b6 a3=8441 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.097:14466): avc: denied { read } for pid=19248 comm="httpd" name="filesystems" dev=proc ino=-268435452 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.097:14466): arch=40000003 syscall=5 success=yes exit=9 a0=e870b0 a1=8000 a2=0 a3=8000 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.101:14467): avc: denied { read } for pid=19248 comm="httpd" name="localtime" dev=dm-0 ino=9331954 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.101:14467): arch=40000003 syscall=5 success=yes exit=9 a0=b725e0 a1=0 a2=1b6 a3=8f351b8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.101:14468): avc: denied { getattr } for pid=19248 comm="httpd" name="localtime" dev=dm-0 ino=9331954 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.101:14468): arch=40000003 syscall=197 success=yes exit=0 a0=9 a1=bfe1c3e8 a2=b8aff4 a3=8f351b8 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.101:14468): path="/etc/localtime" type=AVC msg=audit(1163794368.105:14469): avc: denied { create } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14469): arch=40000003 syscall=117 success=yes exit=458753 a0=2 a1=0 a2=1 a3=380 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.105:14470): avc: denied { unix_write } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=AVC msg=audit(1163794368.105:14470): avc: denied { write } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14470): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=70001 a2=0 a3=110 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.105:14471): avc: denied { setattr } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14471): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=70001 a2=0 a3=101 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.105:14472): avc: denied { destroy } for pid=19248 comm="httpd" key=0 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=sem type=SYSCALL msg=audit(1163794368.105:14472): arch=40000003 syscall=117 success=yes exit=0 a0=3 a1=70001 a2=0 a3=100 items=0 ppid=19247 pid=19248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.117:14473): avc: denied { search } for pid=19249 comm="httpd" name="sbin" dev=dm-0 ino=10311842 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sbin_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.117:14473): arch=40000003 syscall=195 success=yes exit=0 a0=d76b1e a1=bfe2068c a2=b8aff4 a3=73b170 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14474): avc: denied { read } for pid=19249 comm="httpd" name="urandom" dev=tmpfs ino=1972 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794368.125:14474): arch=40000003 syscall=5 success=yes exit=9 a0=8f7bcb a1=0 a2=8ec810 a3=14 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14475): avc: denied { read } for pid=19249 comm="httpd" name="run" dev=dm-0 ino=9330354 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1163794368.125:14475): arch=40000003 syscall=195 success=no exit=-2 a0=8f0d818 a1=bfe2053c a2=b8aff4 a3=10 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14476): avc: denied { write } for pid=19249 comm="httpd" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14476): avc: denied { add_name } for pid=19249 comm="httpd" name="httpd.pid" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14476): avc: denied { create } for pid=19249 comm="httpd" name="httpd.pid" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.125:14476): arch=40000003 syscall=5 success=yes exit=9 a0=8f0d818 a1=8241 a2=1a4 a3=8241 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14477): avc: denied { write } for pid=19249 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.125:14477): arch=40000003 syscall=4 success=yes exit=6 a0=9 a1=8f417b8 a2=6 a3=6 items=0 ppid=19248 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794368.125:14477): path="/var/run/httpd.pid" type=AVC msg=audit(1163794368.125:14478): avc: denied { setgid } for pid=19250 comm="httpd" capability=6 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=SYSCALL msg=audit(1163794368.125:14478): arch=40000003 syscall=214 success=yes exit=0 a0=30 a1=0 a2=8fe060 a3=bfe20510 items=0 ppid=19249 pid=19250 auid=500 uid=0 gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14479): avc: denied { search } for pid=19250 comm="httpd" name="sys" dev=proc ino=-268435429 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sysctl_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14479): avc: denied { search } for pid=19250 comm="httpd" name="kernel" dev=proc ino=-268435417 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sysctl_kernel_t:s0 tclass=dir type=AVC msg=audit(1163794368.125:14479): avc: denied { read } for pid=19250 comm="httpd" name="ngroups_max" dev=proc ino=-268435370 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:sysctl_kernel_t:s0 tclass=file type=SYSCALL msg=audit(1163794368.125:14479): arch=40000003 syscall=5 success=yes exit=9 a0=b72766 a1=0 a2=a a3=8ee1128 items=0 ppid=19249 pid=19250 auid=500 uid=0 gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14480): avc: denied { search } for pid=19250 comm="httpd" name="etc" dev=dm-0 ino=9329761 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir type=SYSCALL msg=audit(1163794368.125:14480): arch=40000003 syscall=5 success=yes exit=9 a0=6b42d8 a1=0 a2=1b6 a3=8f49d48 items=0 ppid=19249 pid=19250 auid=500 uid=0 gid=48 euid=0 suid=0 fsuid=0 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14481): avc: denied { setuid } for pid=19250 comm="httpd" capability=7 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=SYSCALL msg=audit(1163794368.125:14481): arch=40000003 syscall=213 success=yes exit=0 a0=30 a1=108 a2=1 a3=bfe20510 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794368.125:14482): avc: denied { accept } for pid=19250 comm="httpd" lport=80 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794376.422:14483): avc: denied { read } for pid=19263 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163794376.422:14483): arch=40000003 syscall=33 success=yes exit=0 a0=bf816f92 a1=4 a2=da3a64 a3=bf816f92 items=0 ppid=19262 pid=19263 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_recv } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=35667 daddr=127.0.0.1 dest=80 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:netif_t:s0 tclass=netif type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_recv } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=35667 daddr=127.0.0.1 dest=80 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=node type=AVC msg=audit(1163794381.358:14484): avc: denied { recv_msg } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=35667 daddr=127.0.0.1 dest=80 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_send } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=80 daddr=127.0.0.1 dest=35667 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:netif_t:s0 tclass=netif type=AVC msg=audit(1163794381.358:14484): avc: denied { tcp_send } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=80 daddr=127.0.0.1 dest=35667 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=node type=AVC msg=audit(1163794381.358:14484): avc: denied { send_msg } for pid=16548 comm="firefox-bin" saddr=127.0.0.1 src=80 daddr=127.0.0.1 dest=35667 netif=lo scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.358:14484): arch=40000003 syscall=102 success=no exit=-115 a0=3 a1=b7cdbff0 a2=4932550 a3=0 items=0 ppid=1 pid=16548 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=SYSCALL msg=audit(1163794368.125:14482): arch=40000003 syscall=102 success=yes exit=10 a0=5 a1=bfe20500 a2=8fe1e8 a3=8f47c28 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.362:14485): avc: denied { getattr } for pid=19250 comm="httpd" laddr=0000:0000:0000:0000:0000:ffff:7f00:0001 lport=80 faddr=0000:0000:0000:0000:0000:ffff:7f00:0001 fport=35667 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.362:14485): arch=40000003 syscall=102 success=yes exit=0 a0=6 a1=bfe204f0 a2=8fe1e8 a3=8f47c28 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.362:14486): avc: denied { read } for pid=19250 comm="httpd" name="[220857]" dev=sockfs ino=220857 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.362:14486): arch=40000003 syscall=3 success=yes exit=387 a0=a a1=8f53f18 a2=1f40 a3=8f47c28 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.362:14486): path="socket:[220857]" type=AVC msg=audit(1163794381.362:14487): avc: denied { getattr } for pid=19250 comm="httpd" name="noindex.html" dev=dm-0 ino=14436695 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163794381.362:14487): arch=40000003 syscall=195 success=yes exit=0 a0=8f56a78 a1=bfe2027c a2=b8aff4 a3=8170 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.362:14487): path="/var/www/error/noindex.html" type=AVC msg=audit(1163794381.366:14488): avc: denied { read } for pid=19250 comm="httpd" name="noindex.html" dev=dm-0 ino=14436695 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:httpd_sys_content_t:s0 tclass=file type=SYSCALL msg=audit(1163794381.366:14488): arch=40000003 syscall=5 success=yes exit=11 a0=8f56b00 a1=8000 a2=0 a3=8000 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.366:14489): avc: denied { write } for pid=19250 comm="httpd" name="[220857]" dev=sockfs ino=220857 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.366:14489): arch=40000003 syscall=146 success=yes exit=4153 a0=a a1=bfe1de78 a2=2 a3=2 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.366:14489): path="socket:[220857]" type=AVC msg=audit(1163794381.366:14490): avc: denied { shutdown } for pid=19250 comm="httpd" laddr=0000:0000:0000:0000:0000:ffff:7f00:0001 lport=80 faddr=0000:0000:0000:0000:0000:ffff:7f00:0001 fport=35667 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794381.366:14490): arch=40000003 syscall=102 success=yes exit=0 a0=d a1=bfe20300 a2=8fe1e8 a3=8f47dc0 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794381.370:14491): avc: denied { read } for pid=19250 comm="httpd" name="[220847]" dev=pipefs ino=220847 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1163794381.370:14491): arch=40000003 syscall=3 success=no exit=-11 a0=5 a1=bfe20563 a2=1 a3=1 items=0 ppid=19249 pid=19250 auid=500 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC_PATH msg=audit(1163794381.370:14491): path="pipe:[220847]" type=USER_AUTH msg=audit(1163794389.543:14492): user pid=19266 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: authentication acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=USER_ACCT msg=audit(1163794389.543:14493): user pid=19266 uid=0 auid=500 subj=staff_u:staff_r:staff_t:s0 msg='PAM: accounting acct=kmacmill : exe="/usr/sbin/run_init" (hostname=?, addr=?, terminal=pts/2 res=success)' type=AVC msg=audit(1163794389.559:14494): avc: denied { kill } for pid=19249 comm="httpd" capability=5 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=capability type=AVC msg=audit(1163794389.559:14494): avc: denied { signal } for pid=19249 comm="httpd" scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:system_r:myapache_t:s0 tclass=process type=SYSCALL msg=audit(1163794389.559:14494): arch=40000003 syscall=37 success=yes exit=0 a0=ffffb4cf a1=f a2=b8aff4 a3=8f417b8 items=0 ppid=1 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794389.647:14495): avc: denied { write } for pid=19249 comm="httpd" name="run" dev=dm-0 ino=14436616 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794389.647:14495): avc: denied { remove_name } for pid=19249 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir type=AVC msg=audit(1163794389.647:14495): avc: denied { unlink } for pid=19249 comm="httpd" name="httpd.pid" dev=dm-0 ino=14436960 scontext=system_u:system_r:myapache_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1163794389.647:14495): arch=40000003 syscall=10 success=yes exit=0 a0=8f0d960 a1=8f0d960 a2=d7f004 a3=8f0d960 items=0 ppid=1 pid=19249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="httpd" exe="/usr/sbin/httpd" subj=system_u:system_r:myapache_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14496): avc: denied { getattr } for pid=19286 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794669.408:14496): arch=40000003 syscall=195 success=yes exit=0 a0=8e69188 a1=aa35b0cc a2=758aff4 a3=4 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794669.408:14496): path="/home/kmacmill/.evolution" type=AVC msg=audit(1163794669.408:14497): avc: denied { search } for pid=19286 comm="evolution" name=".evolution" dev=dm-0 ino=6776355 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794669.408:14497): arch=40000003 syscall=33 success=yes exit=0 a0=8e69188 a1=0 a2=bae708 a3=10 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14498): avc: denied { read } for pid=19286 comm="evolution" name="summary" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794669.408:14498): arch=40000003 syscall=5 success=yes exit=25 a0=8fe0700 a1=0 a2=1b6 a3=9238950 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14499): avc: denied { getattr } for pid=19286 comm="evolution" name="summary" dev=dm-0 ino=6814052 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794669.408:14499): arch=40000003 syscall=197 success=yes exit=0 a0=19 a1=aa35af48 a2=758aff4 a3=9238950 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794669.408:14499): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/summary" type=AVC msg=audit(1163794669.408:14500): avc: denied { read } for pid=19286 comm="evolution" name="INBOX" dev=dm-0 ino=6809503 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=SYSCALL msg=audit(1163794669.408:14500): arch=40000003 syscall=5 success=yes exit=25 a0=91e8710 a1=18800 a2=758c120 a3=91e8710 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.408:14501): avc: denied { send_msg } for pid=19286 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794669.408:14501): arch=40000003 syscall=102 success=yes exit=42 a0=9 a1=aa35aeb0 a2=4932550 a3=0 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794669.472:14502): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163794669.472:14502): arch=40000003 syscall=4 success=yes exit=52 a0=4 a1=805c570 a2=34 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163794670.312:14503): avc: denied { write } for pid=19286 comm="evolution" name="fedora-devel" dev=dm-0 ino=6814265 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163794670.312:14503): avc: denied { add_name } for pid=19286 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163794670.312:14503): avc: denied { create } for pid=19286 comm="evolution" name="summary~" scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794670.312:14503): arch=40000003 syscall=5 success=yes exit=43 a0=aa35afd0 a1=242 a2=180 a3=9269aa8 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794670.312:14504): avc: denied { write } for pid=19286 comm="evolution" name="summary~" dev=dm-0 ino=6814465 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794670.312:14504): arch=40000003 syscall=4 success=yes exit=40 a0=2b a1=b219f000 a2=28 a3=28 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794670.312:14504): path="/home/kmacmill/.evolution/mail/imap/kmacmill@pobox-2.corp.redhat.com/folders/INBOX/subfolders/lists/subfolders/fedora-devel/summary~" type=AVC msg=audit(1163794670.320:14505): avc: denied { remove_name } for pid=19286 comm="evolution" name="summary~" dev=dm-0 ino=6814465 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=dir type=AVC msg=audit(1163794670.320:14505): avc: denied { rename } for pid=19286 comm="evolution" name="summary~" dev=dm-0 ino=6814465 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=AVC msg=audit(1163794670.320:14505): avc: denied { unlink } for pid=19286 comm="evolution" name="summary" dev=dm-0 ino=6812263 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794670.320:14505): arch=40000003 syscall=38 success=yes exit=0 a0=aa35afd0 a1=9269aa8 a2=1dcbd8 a3=8f952f0 items=0 ppid=1 pid=19286 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163794674.004:14506): avc: denied { lock } for pid=19290 comm="evolution" name="Inbox" dev=dm-0 ino=6778778 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=staff_u:object_r:staff_evolution_home_t:s0 tclass=file type=SYSCALL msg=audit(1163794674.004:14506): arch=40000003 syscall=221 success=yes exit=0 a0=19 a1=6 a2=b40911fc a3=b40911fc items=0 ppid=1 pid=19290 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC_PATH msg=audit(1163794674.004:14506): path="/home/kmacmill/.evolution/mail/local/Inbox" type=USER_ACCT msg=audit(1163794801.068:14507): user pid=19295 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163794801.068:14508): login pid=19295 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163794801.072:14509): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163794801.072:14510): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794801.076:14511): avc: denied { execute } for pid=19296 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=AVC msg=audit(1163794801.076:14511): avc: denied { execute_no_trans } for pid=19296 comm="sh" name="sa1" dev=dm-0 ino=12865251 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.076:14511): arch=40000003 syscall=11 success=yes exit=0 a0=93561b0 a1=9356358 a2=9356290 a3=9356008 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sa1" exe="/bin/bash" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.076:14511): path="/usr/lib/sa/sa1" type=AVC msg=audit(1163794801.080:14512): avc: denied { execute } for pid=19296 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794801.080:14512): avc: denied { execute_no_trans } for pid=19296 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=AVC msg=audit(1163794801.080:14512): avc: denied { read } for pid=19296 comm="sa1" name="sadc" dev=dm-0 ino=12865253 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14512): arch=40000003 syscall=11 success=yes exit=0 a0=9779d48 a1=9779740 a2=9779d60 a3=9779740 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.080:14512): path="/usr/lib/sa/sadc" type=AVC_PATH msg=audit(1163794801.080:14512): path="/usr/lib/sa/sadc" type=AVC msg=audit(1163794801.080:14513): avc: denied { search } for pid=19296 comm="sadc" name="net" dev=proc ino=-268435432 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=dir type=AVC msg=audit(1163794801.080:14513): avc: denied { read } for pid=19296 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14513): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=89747f8 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.080:14514): avc: denied { getattr } for pid=19296 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14514): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfd4be78 a2=b16ff4 a3=89747f8 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.080:14514): path="/proc/net/dev" type=AVC msg=audit(1163794801.080:14515): avc: denied { search } for pid=19296 comm="sadc" name="sa" dev=dm-0 ino=14607631 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=dir type=SYSCALL msg=audit(1163794801.080:14515): arch=40000003 syscall=33 success=yes exit=0 a0=bfd4c224 a1=0 a2=bfd4c118 a3=bfd4c120 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.080:14516): avc: denied { read append } for pid=19296 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.080:14516): arch=40000003 syscall=5 success=yes exit=3 a0=bfd4c224 a1=402 a2=bfd4c3e8 a3=bfd4c120 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.084:14517): avc: denied { search } for pid=19296 comm="sadc" name="fs" dev=proc ino=-268435428 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=dir type=AVC msg=audit(1163794801.084:14517): avc: denied { read } for pid=19296 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.084:14517): arch=40000003 syscall=5 success=yes exit=4 a0=80502ef a1=0 a2=1b6 a3=8975348 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.084:14518): avc: denied { getattr } for pid=19296 comm="sadc" name="dentry-state" dev=proc ino=-268435230 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.084:14518): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfd4bcd0 a2=b16ff4 a3=8975348 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.084:14518): path="/proc/sys/fs/dentry-state" type=AVC msg=audit(1163794801.084:14519): avc: denied { search } for pid=19296 comm="sadc" name="rpc" dev=proc ino=-268433616 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir type=SYSCALL msg=audit(1163794801.084:14519): arch=40000003 syscall=5 success=no exit=-2 a0=8050215 a1=0 a2=1b6 a3=8975348 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163794801.084:14520): avc: denied { lock } for pid=19296 comm="sadc" name="sa17" dev=dm-0 ino=14600257 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysstat_log_t:s0 tclass=file type=SYSCALL msg=audit(1163794801.084:14520): arch=40000003 syscall=143 success=yes exit=0 a0=3 a1=6 a2=bfd4c120 a3=3 items=0 ppid=19295 pid=19296 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163794801.084:14520): path="/var/log/sa/sa17" type=CRED_DISP msg=audit(1163794801.096:14521): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163794801.096:14522): user pid=19295 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163794809.593:14523): avc: denied { write } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794809.593:14523): arch=40000003 syscall=4 success=yes exit=105 a0=4 a1=805c570 a2=69 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794809.593:14523): path="/dev/net/tun" type=AVC msg=audit(1163794809.593:14524): avc: denied { read } for pid=15069 comm="vpnc" name="tun" dev=tmpfs ino=1473 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:tun_tap_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163794809.593:14524): arch=40000003 syscall=3 success=yes exit=52 a0=4 a1=805c5a0 a2=1000 a3=805c5a0 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1163794809.593:14524): path="/dev/net/tun" type=AVC msg=audit(1163795269.282:14525): avc: denied { send_msg } for pid=19323 comm="evolution" saddr=10.11.14.219 src=37722 daddr=10.11.255.15 dest=993 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163795269.282:14525): arch=40000003 syscall=102 success=yes exit=43 a0=9 a1=b2c8eee0 a2=4932550 a3=0 items=0 ppid=1 pid=19323 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="evolution" exe="/usr/bin/evolution-2.10" subj=staff_u:staff_r:staff_mozilla_t:s0 key=(null) type=AVC msg=audit(1163795269.294:14526): avc: denied { recv_msg } for pid=15069 comm="vpnc" saddr=10.11.255.15 src=993 daddr=10.11.14.219 dest=37722 netif=tun0 scontext=staff_u:staff_r:staff_mozilla_t:s0 tcontext=system_u:object_r:pop_port_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1163795269.294:14526): arch=40000003 syscall=4 success=yes exit=151 a0=4 a1=805c570 a2=97 a3=bfd587e4 items=0 ppid=15067 pid=15069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="vpnc" exe="/usr/sbin/vpnc" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1163795334.190:14527): avc: denied { search } for pid=19330 comm="open-browser.sh" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=AVC msg=audit(1163795334.190:14527): avc: denied { read } for pid=19330 comm="open-browser.sh" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.190:14527): arch=40000003 syscall=5 success=yes exit=3 a0=b72b60 a1=8000 a2=1 a3=bfab8b30 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.194:14528): avc: denied { getattr } for pid=19330 comm="open-browser.sh" name="locale-archive" dev=dm-0 ino=11588566 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14528): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=b8aaa0 a2=b89ff4 a3=bfab8b30 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.194:14528): path="/usr/lib/locale/locale-archive" type=AVC msg=audit(1163795334.194:14529): avc: denied { read } for pid=19330 comm="open-browser.sh" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14529): arch=40000003 syscall=5 success=yes exit=3 a0=b71afa a1=0 a2=1b6 a3=8e6aa60 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.194:14530): avc: denied { getattr } for pid=19330 comm="open-browser.sh" name="meminfo" dev=proc ino=-268435454 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14530): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfab6ca8 a2=b89ff4 a3=8e6aa60 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.194:14530): path="/proc/meminfo" type=AVC msg=audit(1163795334.194:14531): avc: denied { read } for pid=19330 comm="open-browser.sh" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14531): arch=40000003 syscall=5 success=yes exit=3 a0=b72b3c a1=0 a2=0 a3=bfab8d90 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.194:14532): avc: denied { getattr } for pid=19330 comm="open-browser.sh" name="gconv-modules.cache" dev=dm-0 ino=10386358 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=staff_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.194:14532): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfab8c38 a2=b89ff4 a3=3 items=0 ppid=18600 pid=19330 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="open-browser.sh" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.194:14532): path="/usr/lib/gconv/gconv-modules.cache" type=AVC msg=audit(1163795334.210:14533): avc: denied { read } for pid=19332 comm="gnome-open" name="locale.alias" dev=dm-0 ino=10314034 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.210:14533): arch=40000003 syscall=5 success=yes exit=3 a0=40484c a1=8000 a2=1b6 a3=920ec80 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.214:14534): avc: denied { search } for pid=19332 comm="gnome-open" name="nscd" dev=dm-0 ino=14436932 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1163795334.214:14534): arch=40000003 syscall=102 success=no exit=-2 a0=3 a1=bfe91640 a2=95eff4 a3=3 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.214:14535): avc: denied { read } for pid=19332 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163795334.214:14535): arch=40000003 syscall=5 success=yes exit=23 a0=3d4880 a1=8000 a2=1b6 a3=9217be8 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.214:14536): avc: denied { getattr } for pid=19332 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163795334.214:14536): arch=40000003 syscall=197 success=yes exit=0 a0=17 a1=bfe918fc a2=95eff4 a3=9217be8 items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.214:14536): path="/dev/urandom" type=AVC msg=audit(1163795334.214:14537): avc: denied { ioctl } for pid=19332 comm="gnome-open" name="urandom" dev=tmpfs ino=1972 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file type=SYSCALL msg=audit(1163795334.214:14537): arch=40000003 syscall=54 success=no exit=-22 a0=17 a1=5401 a2=bfe9185c a3=bfe9189c items=0 ppid=19331 pid=19332 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="gnome-open" exe="/usr/bin/gnome-open" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.214:14537): path="/dev/urandom" type=AVC msg=audit(1163795334.306:14538): avc: denied { read } for pid=19337 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.306:14538): arch=40000003 syscall=33 success=yes exit=0 a0=bff70f74 a1=4 a2=da3a64 a3=bff70f74 items=0 ppid=19336 pid=19337 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.306:14539): avc: denied { getattr } for pid=19337 comm="mozilla-xremote" name=".gdm0UWNIT" dev=dm-0 ino=14469400 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.306:14539): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bff6e4ac a2=4a7ff4 a3=9b2aab0 items=0 ppid=19336 pid=19337 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="mozilla-xremote" exe="/usr/lib/firefox-2.0/mozilla-xremote-client" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.306:14539): path="/tmp/.gdm0UWNIT" type=AVC msg=audit(1163795334.414:14540): avc: denied { search } for pid=19340 comm="sed" name="locale" dev=dm-0 ino=10311858 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=dir type=SYSCALL msg=audit(1163795334.414:14540): arch=40000003 syscall=5 success=yes exit=3 a0=f34b60 a1=8000 a2=1 a3=bf940af0 items=0 ppid=19338 pid=19340 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="sed" exe="/bin/sed" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC msg=audit(1163795334.418:14541): avc: denied { getattr } for pid=19334 comm="firefox" name="en-US.jar" dev=dm-0 ino=10385588 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.418:14541): arch=40000003 syscall=195 success=yes exit=0 a0=87fb608 a1=bf8cb788 a2=6b2ff4 a3=87fbaa0 items=0 ppid=1 pid=19334 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox" exe="/bin/bash" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.418:14541): path="/usr/lib/firefox-2.0/chrome/en-US.jar" type=AVC msg=audit(1163795334.418:14542): avc: denied { execute } for pid=19334 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163795334.418:14542): avc: denied { execute_no_trans } for pid=19334 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=AVC msg=audit(1163795334.418:14542): avc: denied { read } for pid=19334 comm="firefox" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.418:14542): arch=40000003 syscall=11 success=yes exit=0 a0=87fbf10 a1=87fc900 a2=87fbbf8 a3=87fc900 items=0 ppid=1 pid=19334 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.418:14542): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC_PATH msg=audit(1163795334.418:14542): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163795334.462:14543): avc: denied { getattr } for pid=19334 comm="firefox-bin" name="firefox-bin" dev=dm-0 ino=10379247 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:mozilla_exec_t:s0 tclass=file type=SYSCALL msg=audit(1163795334.462:14543): arch=40000003 syscall=196 success=yes exit=0 a0=bfb12748 a1=bfb1223c a2=f10ff4 a3=bfb14750 items=0 ppid=1 pid=19334 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="firefox-bin" exe="/usr/lib/firefox-2.0/firefox-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795334.462:14543): path="/usr/lib/firefox-2.0/firefox-bin" type=AVC msg=audit(1163795338.318:14544): avc: denied { getattr } for pid=18600 comm="thunderbird-bin" name="localtime" dev=dm-0 ino=9331954 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:locale_t:s0 tclass=file type=SYSCALL msg=audit(1163795338.318:14544): arch=40000003 syscall=195 success=yes exit=0 a0=10fb5e0 a1=bfc60370 a2=1113ff4 a3=0 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=AVC_PATH msg=audit(1163795338.318:14544): path="/etc/localtime" type=AVC msg=audit(1163795354.383:14545): avc: denied { read } for pid=18600 comm="thunderbird-bin" name="en-US.jar" dev=dm-0 ino=10737661 scontext=staff_u:staff_r:staff_thunderbird_t:s0 tcontext=system_u:object_r:lib_t:s0 tclass=file type=SYSCALL msg=audit(1163795354.383:14545): arch=40000003 syscall=5 success=yes exit=56 a0=a015638 a1=8000 a2=0 a3=8000 items=0 ppid=18595 pid=18600 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="thunderbird-bin" exe="/usr/lib/thunderbird-1.5.0.7/thunderbird-bin" subj=staff_u:staff_r:staff_thunderbird_t:s0 key=(null) type=USER_ACCT msg=audit(1163795401.162:14546): user pid=19347 uid=0 auid=4294967295 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: accounting acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=LOGIN msg=audit(1163795401.162:14547): login pid=19347 uid=0 old auid=4294967295 new auid=0 type=USER_START msg=audit(1163795401.162:14548): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session open acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=CRED_ACQ msg=audit(1163795401.162:14549): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=AVC msg=audit(1163795401.170:14550): avc: denied { read } for pid=19348 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163795401.170:14550): arch=40000003 syscall=5 success=yes exit=3 a0=80502e1 a1=0 a2=1b6 a3=90c57f8 items=0 ppid=19347 pid=19348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1163795401.170:14551): avc: denied { getattr } for pid=19348 comm="sadc" name="dev" dev=proc ino=-268434164 scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1163795401.170:14551): arch=40000003 syscall=197 success=yes exit=0 a0=3 a1=bfa14b38 a2=3baff4 a3=90c57f8 items=0 ppid=19347 pid=19348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="sadc" exe="/usr/lib/sa/sadc" subj=system_u:system_r:crond_t:s0-s0:c0.c1023 key=(null) type=AVC_PATH msg=audit(1163795401.170:14551): path="/proc/net/dev" type=CRED_DISP msg=audit(1163795401.178:14552): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: setcred acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' type=USER_END msg=audit(1163795401.182:14553): user pid=19347 uid=0 auid=0 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='PAM: session close acct=root : exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)' selinux-python-2.8/sepolgen/tests/test_data/short.log000066400000000000000000000070551330160122500231610ustar00rootroot00000000000000type=AVC msg=audit(1162850331.422:978): avc: denied { ioctl } for pid=6314 comm="pam_timestamp_c" name="[96391]" dev=pipefs ino=96391 scontext=staff_u:staff_r:pam_t:s0 tcontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tclass=fifo_file type=SYSCALL msg=audit(1162850331.422:978): arch=40000003 syscall=54 success=no exit=-22 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) comm="pam_timestamp_c" exe="/sbin/pam_timestamp_check" subj=staff_u:staff_r:pam_t:s0 key=(null) type=AVC_PATH msg=audit(1162850331.422:978): path="pipe:[96391]" type=AVC msg=audit(1162850332.318:979): avc: denied { read } for pid=6306 comm="beagled" name=".gdmDOM7HT" dev=dm-0 ino=14469552 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850332.318:979): arch=40000003 syscall=33 success=yes exit=0 a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850333.186:980): avc: denied { read } for pid=6306 comm="beagled" name="max_user_instances" dev=proc ino=-268435218 scontext=staff_u:staff_r:staff_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file type=SYSCALL msg=audit(1162850333.186:980): arch=40000003 syscall=5 success=yes exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="beagled" exe="/usr/bin/mono" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:981): avc: denied { read write } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:981): arch=40000003 syscall=5 success=yes exit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC msg=audit(1162850335.022:982): avc: denied { lock } for pid=6336 comm="clock-applet" name="bonobo-activation-register.lock" dev=dm-0 ino=5434689 scontext=staff_u:staff_r:staff_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file type=SYSCALL msg=audit(1162850335.022:982): arch=40000003 syscall=221 success=yes exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) comm="clock-applet" exe="/usr/libexec/clock-applet" subj=staff_u:staff_r:staff_t:s0 key=(null) type=AVC_PATH msg=audit(1162850335.022:982): path="/tmp/orbit-kmacmill/bonobo-activation-register.lock" type=USER_AUTH msg=audit(1162850343.419:983): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: authentication acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=USER_ACCT msg=audit(1162850343.419:984): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:staff_su_t:s0 msg='PAM: accounting acct=root : exe="/bin/su" (hostname=?, addr=?, terminal=pts/1 res=success)' type=AVC msg=audit(1162850343.419:985): avc: denied { search } for pid=6377 comm="su" name="root" dev=dm-0 ino=13127137 scontext=staff_u:staff_r:staff_su_t:s0 tcontext=root:object_r:user_home_dir_t:s0 tclass=dir selinux-python-2.8/sepolgen/tests/test_interfaces.py000066400000000000000000000204351330160122500231000ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.access as access import sepolgen.interfaces as interfaces import sepolgen.policygen as policygen import sepolgen.refparser as refparser import sepolgen.refpolicy as refpolicy class TestParam(unittest.TestCase): def test(self): p = interfaces.Param() p.name = "$1" self.assertEqual(p.name, "$1") self.assertRaises(ValueError, p.set_name, "$N") self.assertEqual(p.num, 1) self.assertEqual(p.type, refpolicy.SRC_TYPE) class TestAVExtractPerms(unittest.TestCase): def test(self): av = access.AccessVector(['foo', 'bar', 'file', 'read']) params = { } ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) self.assertEqual(params, { }) av.src_type = "$1" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) p = params["$1"] self.assertEqual(p.name, "$1") self.assertEqual(p.type, refpolicy.SRC_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["file"])) params = { } av.tgt_type = "$1" av.obj_class = "process" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) p = params["$1"] self.assertEqual(p.name, "$1") self.assertEqual(p.type, refpolicy.SRC_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["process"])) params = { } av.tgt_type = "$1" av.obj_class = "dir" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 1) p = params["$1"] self.assertEqual(p.name, "$1") self.assertEqual(p.type, refpolicy.SRC_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["dir"])) av.src_type = "bar" av.tgt_type = "$2" av.obj_class = "dir" ret = interfaces.av_extract_params(av, params) self.assertEqual(ret, 0) p = params["$2"] self.assertEqual(p.name, "$2") self.assertEqual(p.type, refpolicy.TGT_TYPE) self.assertEqual(p.obj_classes, refpolicy.IdSet(["dir"])) interface_example = """ interface(`files_search_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir search; allow { domain $1 } { usr_t usr_home_t }:{ file dir } { read write getattr }; typeattribute $1 file_type; if (foo) { allow $1 foo:bar baz; } if (bar) { allow $1 foo:bar baz; } else { allow $1 foo:bar baz; } ') interface(`files_list_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir { read getattr }; optional_policy(` search_usr($1) ') tunable_policy(`foo',` whatever($1) ') ') interface(`files_exec_usr_files',` gen_require(` type usr_t; ') allow $1 usr_t:dir read; allow $1 usr_t:lnk_file { read getattr }; can_exec($1,usr_t) can_foo($1) ') """ simple_interface = """ interface(`foo',` gen_require(` type usr_t; ') allow $1 usr_t:dir { create add_name }; allow $1 usr_t:file { read write }; ') """ test_expansion = """ interface(`foo',` gen_require(` type usr_t; ') allow $1 usr_t:dir { create add_name }; allow $1 usr_t:file { read write }; ') interface(`map', ` gen_require(` type bar_t; ') allow $1 bar_t:file read; allow $2 bar_t:file write; foo($2) ') interface(`hard_map', ` gen_require(` type baz_t; ') allow $1 baz_t:file getattr; allow $2 baz_t:file read; allow $3 baz_t:file write; map($1, $2) map($2, $3) # This should have no effect foo($2) ') """ def compare_avsets(l, avs_b): avs_a = access.AccessVectorSet() avs_a.from_list(l) a = list(avs_a) b = list(avs_b) a.sort() b.sort() if len(a) != len(b): return False for av_a, av_b in zip(a, b): if av_a != av_b: return False return True class TestInterfaceSet(unittest.TestCase): def test_simple(self): h = refparser.parse(simple_interface) i = interfaces.InterfaceSet() i.add_headers(h) self.assertEqual(len(i.interfaces), 1) for key, interface in i.interfaces.items(): self.assertEqual(key, interface.name) self.assertEqual(key, "foo") self.assertEqual(len(interface.access), 2) # Check the access vectors comp_avs = [["$1", "usr_t", "dir", "create", "add_name"], ["$1", "usr_t", "file", "read", "write"]] ret = compare_avsets(comp_avs, interface.access) self.assertTrue(ret) # Check the params self.assertEqual(len(interface.params), 1) for param in interface.params.values(): self.assertEqual(param.type, refpolicy.SRC_TYPE) self.assertEqual(param.name, "$1") self.assertEqual(param.num, 1) self.assertEqual(param.required, True) def test_expansion(self): h = refparser.parse(test_expansion) i = interfaces.InterfaceSet() i.add_headers(h) self.assertEqual(len(i.interfaces), 3) for key, interface in i.interfaces.items(): self.assertEqual(key, interface.name) if key == "foo": comp_avs = [["$1", "usr_t", "dir", "create", "add_name"], ["$1", "usr_t", "file", "read", "write"]] self.assertTrue(compare_avsets(comp_avs, interface.access)) elif key == "map": comp_avs = [["$2", "usr_t", "dir", "create", "add_name"], ["$2", "usr_t", "file", "read", "write"], ["$1", "bar_t", "file", "read"], ["$2", "bar_t", "file", "write"]] self.assertTrue(compare_avsets(comp_avs, interface.access)) elif key == "hard_map": comp_avs = [["$1", "baz_t", "file", "getattr"], ["$2", "baz_t", "file", "read"], ["$3", "baz_t", "file", "write"], ["$2", "usr_t", "dir", "create", "add_name"], ["$2", "usr_t", "file", "read", "write"], ["$1", "bar_t", "file", "read"], ["$2", "bar_t", "file", "write"], ["$3", "usr_t", "dir", "create", "add_name"], ["$3", "usr_t", "file", "read", "write"], ["$2", "bar_t", "file", "read"], ["$3", "bar_t", "file", "write"]] self.assertTrue(compare_avsets(comp_avs, interface.access)) def test_export(self): h = refparser.parse(interface_example) i = interfaces.InterfaceSet() i.add_headers(h) f = open("output", "w") i.to_file(f) f.close() i2 = interfaces.InterfaceSet() f = open("output") i2.from_file(f) f.close() if_status = [False, False, False] for ifv in i2.interfaces.values(): if ifv.name == "files_search_usr": if_status[0] = True if ifv.name == "files_list_usr": if_status[1] = True if ifv.name == "files_exec_usr_files": if_status[2] = True self.assertEqual(if_status[0], True) self.assertEqual(if_status[1], True) self.assertEqual(if_status[2], True) selinux-python-2.8/sepolgen/tests/test_matching.py000066400000000000000000000065131330160122500225500ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.matching as matching import sepolgen.refparser as refparser import sepolgen.interfaces as interfaces import sepolgen.access as access class TestMatch(unittest.TestCase): def test(self): a = matching.Match() a.dist = 100 a.info_dir_change = True b = matching.Match() b.dist = 100 b.info_dir_change = True self.assertEqual(a, b) b.info_dir_change = False self.assertTrue((a > b)) self.assertTrue((b < a)) b.dist = 200 self.assertTrue((a < b)) self.assertTrue((b > a)) class TestMatchList(unittest.TestCase): def test_append(self): ml = matching.MatchList() ml.threshold = 100 a = matching.Match() a.dist = 100 ml.append(a) self.assertEqual(len(ml), 1) a = matching.Match() a.dist = 200 ml.append(a) self.assertEqual(len(ml), 2) self.assertEqual(len(ml.bastards), 1) ml.allow_info_dir_change = False a = matching.Match() a.dist = 0 a.info_dir_change = True ml.append(a) self.assertEqual(len(ml), 3) self.assertEqual(len(ml.bastards), 2) def test_sort(self): ml = matching.MatchList() ml.threshold = 100 a = matching.Match() a.dist = 100 ml.append(a) b = matching.Match() b.dist = 5 ml.append(b) c = matching.Match() c.dist = 0 ml.append(c) l = [c, b, a] ml.sort() for x, y in zip(l, ml): self.assertEqual(x, y) self.assertEqual(ml.best(), c) test_expansion = """ interface(`foo',` gen_require(` type usr_t; ') allow $1 usr_t:dir { create add_name }; allow $1 usr_t:file { read write }; ') interface(`map', ` gen_require(` type bar_t; ') allow $1 bar_t:file read; allow $2 bar_t:file write; foo($2) ') interface(`hard_map', ` gen_require(` type baz_t; ') allow $1 baz_t:file getattr; allow $2 baz_t:file read; allow $3 baz_t:file write; map($1, $2) map($2, $3) # This should have no effect foo($2) ') """ class AccessMatcher(unittest.TestCase): def test_search(self): h = refparser.parse(test_expansion) i = interfaces.InterfaceSet() i.add_headers(h) a = access.AccessVector(["foo_t", "usr_t", "dir", "create"]) m = matching.AccessMatcher() ml = matching.MatchList() ans = m.search_ifs(i, a, ml) pass selinux-python-2.8/sepolgen/tests/test_module.py000066400000000000000000000023741330160122500222440ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.module as module import os class TestModuleCompiler(unittest.TestCase): def test(self): package = "module_compile_test.pp" mc = module.ModuleCompiler() mc.create_module_package("module_compile_test.te", refpolicy=True) os.stat(package) os.unlink(package) mc.refpolicy = True mc.create_module_package("module_compile_test.te", refpolicy=False) os.stat(package) os.unlink(package) selinux-python-2.8/sepolgen/tests/test_objectmodel.py000066400000000000000000000032131330160122500232370ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.objectmodel class TestInfoFlow(unittest.TestCase): def test_from_file(self): info = sepolgen.objectmodel.PermMappings() fd = open("perm_map") info.from_file(fd) fd.close() pm = info.get("filesystem", "mount") self.assertEqual(pm.perm, "mount") self.assertEqual(pm.dir, sepolgen.objectmodel.FLOW_WRITE) self.assertEqual(pm.weight, 1) self.assertRaises(KeyError, info.get, "filesystem", "foo") pm = info.getdefault("filesystem", "foo") self.assertEqual(pm.perm, "foo") self.assertEqual(pm.dir, sepolgen.objectmodel.FLOW_BOTH) self.assertEqual(pm.weight, 5) pm = info.getdefault("foo", "bar") self.assertEqual(pm.perm, "bar") self.assertEqual(pm.dir, sepolgen.objectmodel.FLOW_BOTH) self.assertEqual(pm.weight, 5) selinux-python-2.8/sepolgen/tests/test_policygen.py000066400000000000000000000017031330160122500227430ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.policygen as policygen class PolicyGenerator(unittest.TestCase): def __init__(self): g = policygen.PolicyGenerator() selinux-python-2.8/sepolgen/tests/test_refparser.py000066400000000000000000000054451330160122500227520ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.refparser as refparser import sepolgen.refpolicy as refpolicy interface_example = """######################################## ## ## Search the content of /etc. ## ## ## ## Domain allowed access. ## ## # interface(`files_search_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir search; allow { domain $1 } { usr_t usr_home_t }:{ file dir } { read write getattr }; typeattribute $1 file_type; if (foo) { allow $1 foo:bar baz; } if (bar) { allow $1 foo:bar baz; } else { allow $1 foo:bar baz; } ') ######################################## ## ## List the contents of generic ## directories in /usr. ## ## ## ## Domain allowed access. ## ## # interface(`files_list_usr',` gen_require(` type usr_t; ') allow $1 usr_t:dir { read getattr }; optional_policy(` search_usr($1) ') tunable_policy(`foo',` whatever($1) ') ') ######################################## ## ## Execute generic programs in /usr in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`files_exec_usr_files',` gen_require(` type usr_t; ') allow $1 usr_t:dir read; allow $1 usr_t:lnk_file { read getattr }; can_exec($1,usr_t) can_foo($1) ') """ class TestParser(unittest.TestCase): def test_interface_parsing(self): h = refparser.parse(interface_example) #print "" #refpolicy.print_tree(h) #self.assertEqual(len(h.interfaces), 3) name = "files_search_usr" #i = h.interfaces[name] #self.assertEqual(i.name, name) #self.assertEqual(len(i.rules), 1) #rule = i.rules[0] #self.assertTrue(isinstance(rule, refpolicy.AVRule)) selinux-python-2.8/sepolgen/tests/test_refpolicy.py000066400000000000000000000141151330160122500227470ustar00rootroot00000000000000# Authors: Karl MacMillan # # Copyright (C) 2006 Red Hat # see file 'COPYING' for use and warranty information # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; version 2 only # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA # import unittest import sepolgen.refpolicy as refpolicy import selinux class TestIdSet(unittest.TestCase): def test_set_to_str(self): s = refpolicy.IdSet(["read", "write", "getattr"]) s = s.to_space_str().split(' ') s.sort() expected = "{ read write getattr }".split(' ') expected.sort() self.assertEqual(s, expected) s = refpolicy.IdSet() s.add("read") self.assertEqual(s.to_space_str(), "read") class TestSecurityContext(unittest.TestCase): def test_init(self): sc = refpolicy.SecurityContext() sc = refpolicy.SecurityContext("user_u:object_r:foo_t") def test_from_string(self): context = "user_u:object_r:foo_t" sc = refpolicy.SecurityContext() sc.from_string(context) self.assertEqual(sc.user, "user_u") self.assertEqual(sc.role, "object_r") self.assertEqual(sc.type, "foo_t") self.assertEqual(sc.level, None) if selinux.is_selinux_mls_enabled(): self.assertEqual(str(sc), context + ":s0") else: self.assertEqual(str(sc), context) self.assertEqual(sc.to_string(default_level="s1"), context + ":s1") context = "user_u:object_r:foo_t:s0-s0:c0-c255" sc = refpolicy.SecurityContext() sc.from_string(context) self.assertEqual(sc.user, "user_u") self.assertEqual(sc.role, "object_r") self.assertEqual(sc.type, "foo_t") self.assertEqual(sc.level, "s0-s0:c0-c255") self.assertEqual(str(sc), context) self.assertEqual(sc.to_string(), context) sc = refpolicy.SecurityContext() self.assertRaises(ValueError, sc.from_string, "abc") def test_equal(self): sc1 = refpolicy.SecurityContext("user_u:object_r:foo_t") sc2 = refpolicy.SecurityContext("user_u:object_r:foo_t") sc3 = refpolicy.SecurityContext("user_u:object_r:foo_t:s0") sc4 = refpolicy.SecurityContext("user_u:object_r:bar_t") self.assertEqual(sc1, sc2) self.assertNotEqual(sc1, sc3) self.assertNotEqual(sc1, sc4) class TestObjecClass(unittest.TestCase): def test_init(self): o = refpolicy.ObjectClass(name="file") self.assertEqual(o.name, "file") self.assertTrue(isinstance(o.perms, set)) class TestAVRule(unittest.TestCase): def test_init(self): a = refpolicy.AVRule() self.assertEqual(a.rule_type, a.ALLOW) self.assertTrue(isinstance(a.src_types, set)) self.assertTrue(isinstance(a.tgt_types, set)) self.assertTrue(isinstance(a.obj_classes, set)) self.assertTrue(isinstance(a.perms, set)) def test_to_string(self): a = refpolicy.AVRule() a.src_types.add("foo_t") a.tgt_types.add("bar_t") a.obj_classes.add("file") a.perms.add("read") self.assertEqual(a.to_string(), "allow foo_t bar_t:file read;") a.rule_type = a.DONTAUDIT a.src_types.add("user_t") a.tgt_types.add("user_home_t") a.obj_classes.add("lnk_file") a.perms.add("write") # This test might need to go because set ordering is not guaranteed a = a.to_string().split(' ') a.sort() b = "dontaudit { foo_t user_t } { user_home_t bar_t }:{ lnk_file file } { read write };".split(' ') b.sort() self.assertEqual(a, b) class TestTypeRule(unittest.TestCase): def test_init(self): a = refpolicy.TypeRule() self.assertEqual(a.rule_type, a.TYPE_TRANSITION) self.assertTrue(isinstance(a.src_types, set)) self.assertTrue(isinstance(a.tgt_types, set)) self.assertTrue(isinstance(a.obj_classes, set)) self.assertEqual(a.dest_type, "") def test_to_string(self): a = refpolicy.TypeRule() a.src_types.add("foo_t") a.tgt_types.add("bar_exec_t") a.obj_classes.add("process") a.dest_type = "bar_t" self.assertEqual(a.to_string(), "type_transition foo_t bar_exec_t:process bar_t;") class TestParseNode(unittest.TestCase): def test_walktree(self): # Construct a small tree h = refpolicy.Headers() a = refpolicy.AVRule() a.src_types.add("foo_t") a.tgt_types.add("bar_t") a.obj_classes.add("file") a.perms.add("read") ifcall = refpolicy.InterfaceCall(ifname="allow_foobar") ifcall.args.append("foo_t") ifcall.args.append("{ file dir }") i = refpolicy.Interface(name="foo") i.children.append(a) i.children.append(ifcall) h.children.append(i) a = refpolicy.AVRule() a.rule_type = a.DONTAUDIT a.src_types.add("user_t") a.tgt_types.add("user_home_t") a.obj_classes.add("lnk_file") a.perms.add("write") i = refpolicy.Interface(name="bar") i.children.append(a) h.children.append(i) class TestHeaders(unittest.TestCase): def test_iter(self): h = refpolicy.Headers() h.children.append(refpolicy.Interface(name="foo")) h.children.append(refpolicy.Interface(name="bar")) h.children.append(refpolicy.ClassMap("file", "read write")) i = 0 for node in h: i += 1 self.assertEqual(i, 3) i = 0 for node in h.interfaces(): i += 1 self.assertEqual(i, 2) selinux-python-2.8/sepolicy/000077500000000000000000000000001330160122500162115ustar00rootroot00000000000000selinux-python-2.8/sepolicy/.gitignore000066400000000000000000000000201330160122500201710ustar00rootroot00000000000000build tmp *.bak selinux-python-2.8/sepolicy/Makefile000066400000000000000000000017601330160122500176550ustar00rootroot00000000000000PYTHON ?= python # Installation directories. PREFIX ?= /usr BINDIR ?= $(PREFIX)/bin MANDIR ?= $(PREFIX)/share/man BASHCOMPLETIONDIR ?= $(PREFIX)/share/bash-completion/completions CFLAGS ?= -Wall -Werror -Wextra -W override CFLAGS += -DPACKAGE="policycoreutils" -DSHARED -shared BASHCOMPLETIONS=sepolicy-bash-completion.sh all: python-build python-build: $(PYTHON) setup.py build clean: $(PYTHON) setup.py clean -rm -rf build *~ \#* *pyc .#* sepolgen: ln -sf sepolicy sepolgen test: @$(PYTHON) test_sepolicy.py -v install: $(PYTHON) setup.py install --prefix=$(PREFIX) `test -n "$(DESTDIR)" && echo --root $(DESTDIR)` [ -d $(DESTDIR)$(BINDIR) ] || mkdir -p $(DESTDIR)$(BINDIR) install -m 755 sepolicy.py $(DESTDIR)$(BINDIR)/sepolicy (cd $(DESTDIR)$(BINDIR); ln -sf sepolicy sepolgen) -mkdir -p $(DESTDIR)$(MANDIR)/man8 install -m 644 *.8 $(DESTDIR)$(MANDIR)/man8 -mkdir -p $(DESTDIR)$(BASHCOMPLETIONDIR) install -m 644 $(BASHCOMPLETIONS) $(DESTDIR)$(BASHCOMPLETIONDIR)/sepolicy relabel: selinux-python-2.8/sepolicy/sepolgen.8000066400000000000000000000000351330160122500201140ustar00rootroot00000000000000.so man8/sepolicy-generate.8 selinux-python-2.8/sepolicy/sepolicy-bash-completion.sh000066400000000000000000000176501330160122500234670ustar00rootroot00000000000000# This file is part of systemd. # # Copyright 2012-2013 Dan Walsh # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # systemd is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # General Public License for more details. # # You should have received a copy of the GNU General Public License # along with systemd; If not, see . __contains_word () { local word=$1; shift for w in $*; do [[ $w = $word ]] && return 0; done return 1 } __get_all_paths () { dir -1 -F $* | grep '/' | cut -d'/' -f 1 } __get_all_ftypes () { echo '-- -d -c -b -s -l -p' } __get_all_networks () { seinfo -u 2> /dev/null | tail -n +3 } __get_all_booleans () { getsebool -a 2> /dev/null } __get_all_types () { seinfo -t 2> /dev/null | tail -n +3 } __get_all_admin_interaces () { awk '/InterfaceVector.*_admin /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_admin' '{ print $1 }' } __get_all_user_role_interaces () { awk '/InterfaceVector.*_role /{ print $2 }' /var/lib/sepolgen/interface_info | awk -F '_role' '{ print $1 }' } __get_all_user_domains () { seinfo -auserdomain -x 2> /dev/null | tail -n +2 } __get_all_users () { seinfo -u 2> /dev/null | tail -n +2 } __get_all_classes () { seinfo -c 2> /dev/null | tail -n +2 } __get_all_port_types () { seinfo -aport_type -x 2> /dev/null | tail -n +2 } __get_all_domain_types () { seinfo -adomain -x 2> /dev/null | tail -n +2 } __get_all_domains () { seinfo -adomain -x 2>/dev/null | sed 's/_t$//g' } _sepolicy () { local command=${COMP_WORDS[1]} local cur=${COMP_WORDS[COMP_CWORD]} prev=${COMP_WORDS[COMP_CWORD-1]} local verb comps local -A VERBS=( [BOOLEANS]='booleans' [COMMUNICATE]='communicate' [GENERATE]='generate' [GUI]='gui' [INTERFACE]='interface' [MANPAGE]='manpage' [NETWORK]='network' [TRANSITION]='transition' ) COMMONOPTS='-P --policy -h --help' local -A OPTS=( [booleans]='-h --help -p --path -a -all -b --boolean' [communicate]='-h --help -s --source -t --target -c --class -S --sourceaccess -T --targetaccess' [generate]='-a --admin --admin_user --application --cgi --confined_admin --customize -d --domain --dbus --desktop_user -h --help --inetd --init -n --name --newtype -p --path --sandbox -T --test --term_user -u --user -w --writepath --x_user' [gui]='-h --help' [interface]='-h --help -a --list_admin -c --compile -i --interface -l --list -u --list_user -u --list_user -v --verbose' [manpage]='-h --help -p --path -a -all -o --os -d --domain -w --web -r --root' [network]='-h --help -d --domain -l --list -p --port -t --type ' [transition]='-h --help -s --source -t --target' ) for ((i=0; $i <= $COMP_CWORD; i++)); do if __contains_word "${COMP_WORDS[i]}" ${VERBS[*]} && ! __contains_word "${COMP_WORDS[i-1]}" ${OPTS[ARG}]}; then verb=${COMP_WORDS[i]} break fi done if [[ -z $verb ]]; then if [ "$prev" = "-P" -o "$prev" = "--policy" ]; then COMPREPLY=( $( compgen -f -- "$cur") ) compopt -o filenames return 0 else comps="${VERBS[*]} ${COMMONOPTS}" fi elif [ "$verb" = "booleans" ]; then if [ "$prev" = "-b" -o "$prev" = "--boolean" ]; then COMPREPLY=( $(compgen -W "$( __get_all_booleans ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "communicate" ]; then if [ "$prev" = "-s" -o "$prev" = "--source" -o "$prev" = "-t" -o "$prev" = "--target" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types ) " -- "$cur") ) return 0 elif [ "$prev" = "-c" -o "$prev" = "--class" ]; then COMPREPLY=( $(compgen -W "$( __get_all_classes ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "generate" ]; then if [ "$prev" = "--name" -o "$prev" = "-n" ]; then return 0 elif test "$prev" = "-p" || test "$prev" = "--path" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 elif test "$prev" = "-w" || test "$prev" = "--writepath" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 elif [ "$prev" = "--domain" -o "$prev" = "-d" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types ) " -- "$cur") ) return 0 elif [ "$prev" = "--newtype" ]; then COMPREPLY=( $(compgen -W "-n --name -t --type" -- "$cur") ) return 0 elif [ "$prev" = "--admin" -o "$prev" = "-a" ]; then COMPREPLY=( $(compgen -W "$( __get_all_admin_interaces ) " -- "$cur") ) return 0 elif [ "$prev" = "--user" -o "$prev" = "-u" ]; then COMPREPLY=( $(compgen -W "$( __get_all_users )" -- "$cur") ) return 0 elif [[ "$cur" == "$verb" || "$cur" == "" || "$cur" == -* ]]; then COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 fi COMPREPLY=( $( compgen -f -- "$cur") ) compopt -o filenames return 0 elif [ "$verb" = "interface" ]; then COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "manpage" ]; then if [ "$prev" = "-d" -o "$prev" = "--domain" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domains ) " -- "$cur") ) return 0 elif test "$prev" = "-r" || test "$prev" = "--root" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 elif [ "$prev" = "-o" -o "$prev" = "--os" ]; then return 0 elif test "$prev" = "-p" || test "$prev" = "--path" ; then COMPREPLY=( $( compgen -d -- "$cur") ) compopt -o filenames return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "network" ]; then if [ "$prev" = "-t" -o "$prev" = "--type" ]; then COMPREPLY=( $(compgen -W "$( __get_all_port_types )" -- "$cur") ) return 0 fi if [ "$prev" = "-d" -o "$prev" = "--domain" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types )" -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 elif [ "$verb" = "transition" ]; then if [ "$prev" = "-s" -o "$prev" = "--source" -o "$prev" = "-t" -o "$prev" = "--target" ]; then COMPREPLY=( $(compgen -W "$( __get_all_domain_types ) " -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W '${OPTS[$verb]}' -- "$cur") ) return 0 fi COMPREPLY=( $(compgen -W "$comps" -- "$cur") ) return 0 } complete -F _sepolicy sepolicy selinux-python-2.8/sepolicy/sepolicy-booleans.8000066400000000000000000000012721330160122500217330ustar00rootroot00000000000000.TH "sepolicy-booleans" "8" "20121112" "" "" .SH "NAME" sepolicy-booleans \- Query SELinux Policy to see description of booleans .SH "SYNOPSIS" .br .B sepolicy booleans [\-h] [ \-a | \-b booleanname ... ] .SH "DESCRIPTION" sepolicy booleans will show all booleans and their descriptions, or you can choose individual booleans to display .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-a, \-\-all Display all boolean descriptions .TP .I \-b, \-\-boolean boolean to get description .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8), getsebool(8), setsebool(8) selinux-python-2.8/sepolicy/sepolicy-communicate.8000066400000000000000000000026071330160122500224400ustar00rootroot00000000000000.TH "sepolicy-communicate" "8" "20121005" "" "" .SH "NAME" sepolicy-communicate \- Generate a report showing if two SELinux Policy Domains can communicate .SH "SYNOPSIS" .br .B sepolicy communicate [\-h] \-s SOURCE \-t TARGET [\-c TCLASS] [\-S SOURCEACCESS] [\-T TARGETACCESS] .SH "DESCRIPTION" Use sepolicy communicate to examine SELinux Policy to if a source SELinux Domain can communicate with a target SELinux Domain. The default command looks to see if there are any file types that the source domain can write, which the target domain can read. .SH "OPTIONS" .TP .I \-c, \-\-class Specify the SELinux class which the source domain will attempt to communicate with the target domain. (Default file) .TP .I \-h, \-\-help Display help message .TP .I \-s, \-\-source Specify the source SELinux domain type. .TP .I \-S, \-\-sourceaccess Specify the list of accesses used by the source SELinux domain type to communicate with the target domain. Default Open, Write. .TP .I \-t, \-\-target Specify the target SELinux domain type. .TP .I \-T, \-\-targetaccess Specify the list of accesses used by the target SELinux domain type to receive communications from the source domain. Default Open, Read. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-2.8/sepolicy/sepolicy-generate.8000066400000000000000000000121731330160122500217250ustar00rootroot00000000000000.TH "sepolicy-generate" "8" "20121005" "" "" .SH "NAME" sepolicy-generate \- Generate an initial SELinux policy module template. .SH "SYNOPSIS" Common options .B sepolicy generate [\-h ] [\-p PATH] .br Confined Applications .br .B sepolicy generate \-\-application [\-n NAME] [\-u USER ]command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-cgi [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-dbus [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-inetd [\-n NAME] command [\-w WRITE_PATH ] .br .B sepolicy generate \-\-init [\-n NAME] command [\-w WRITE_PATH ] Confined Users .br .B sepolicy generate \-\-admin_user [\-r TRANSITION_ROLE] \-n NAME .br .B sepolicy generate \-\-confined_admin \-n NAME [\-a ADMIN_DOMAIN] [\-u USER] [\-n NAME] [\-w WRITE_PATH] .br .B sepolicy generate \-\-desktop_user \-n NAME [\-w WRITE_PATH] .br .B sepolicy generate \-\-term_user \-n NAME [\-w WRITE_PATH] .br .B sepolicy generate \-\-x_user \-n NAME [\-w WRITE_PATH] .br Miscellaneous Policy .br .B sepolicy generate \-\-customize \-d DOMAIN \-n NAME [\-a ADMIN_DOMAIN] .br .B sepolicy generate \-\-newtype \-t type \-n NAME .br .B sepolicy generate \-\-sandbox \-n NAME .SH "DESCRIPTION" Use \fBsepolicy generate\fP to generate an SELinux policy Module. .br \fBsepolicy generate\fP will create 5 files. When specifying a \fBconfined application\fP you must specify a path. \fBsepolicy generate\fP will use the rpm payload of the application along with \fBnm \-D APPLICATION\fP to help it generate types and policy rules for your policy files. .B Type Enforcing File NAME.te .br This file can be used to define all the types rules for a particular domain. .I Note: Policy generated by \fBsepolicy generate\fP will automatically add a permissive DOMAIN to your te file. When you are satisfied that your policy works, you need to remove the permissive line from the te file to run your domain in enforcing mode. .B Interface File NAME.if .br This file defines the interfaces for the types generated in the te file, which can be used by other policy domains. .B File Context NAME.fc .br This file defines the default file context for the system, it takes the file types created in the te file and associates file paths to the types. Tools like restorecon and RPM will use these paths to put down labels. .B RPM Spec File NAME_selinux.spec .br This file is an RPM SPEC file that can be used to install the SELinux policy on to machines and setup the labeling. The spec file also installs the interface file and a man page describing the policy. You can use \fBsepolicy manpage \-d NAME\fP to generate the man page. .B Shell File NAME.sh .br This is a helper shell script to compile, install and fix the labeling on your test system. It will also generate a man page based on the installed policy, and compile and build an RPM suitable to be installed on other machines If a generate is possible, this tool will print out all generate paths from the source domain to the target domain .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-d, \-\-domain Enter domain type(s) which you will be extending .TP .I \-n, \-\-name Specify alternate name of policy. The policy will default to the executable or name specified .TP .I \-p, \-\-path Specify the directory to store the created policy files. (Default to current working directory ) optional arguments: .TP .I \-r, \-\-role Enter role(s) to which this admin user will transition. .TP .I \-t, \-\-type Enter type(s) for which you will generate new definition and rule(s) .TP .I \-u, \-\-user SELinux user(s) which will transition to this domain .TP .I \-w, \-\-writepath Path(s) which the confined processes need to write .TP .I \-a, \-\-admin Domain(s) which the confined admin will administrate .TP .I \-\-admin_user Generate Policy for Administrator Login User Role .TP .I \-\-application Generate Policy for User Application .TP .I \-\-cgi Generate Policy for Web Application/Script (CGI) .TP .I \-\-confined_admin Generate Policy for Confined Root Administrator Role .TP .I \-\-customize Generate Policy for Existing Domain Type .TP .I \-\-dbus Generate Policy for DBUS System Daemon .TP .I \-\-desktop_user Generate Policy for Desktop Login User Role .TP .I \-\-inetd Generate Policy for Internet Services Daemon .TP .I \-\-init Generate Policy for Standard Init Daemon (Default) .TP .I \-\-newtype Generate new policy for new types to add to an existing policy. .TP .I \-\-sandbox Generate Policy for Sandbox .TP .I \-\-term_user Generate Policy for Minimal Terminal Login User Role .TP .I \-\-x_user Generate Policy for Minimal X Windows Login User Role .SH "EXAMPLE" .B > sepolicy generate --init /usr/sbin/rwhod .br Generating Policy for /usr/sbin/rwhod named rwhod .br Created the following files: .br rwhod.te # Type Enforcement file .br rwhod.if # Interface file .br rwhod.fc # File Contexts file .br rwhod_selinux.spec # Spec file .br rwhod.sh # Setup Script .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-2.8/sepolicy/sepolicy-gui.8000066400000000000000000000011421330160122500207110ustar00rootroot00000000000000.TH "sepolicy-gui" "8" "20121005" "" "" .SH "NAME" sepolicy-gui \- Graphical User Interface for SELinux policy. .SH "SYNOPSIS" Common options .B sepolicy gui [\-h ] [ \-d DOMAIN ] .br .SH "DESCRIPTION" Use \fBsepolicy gui\fP to run a the graphical user interface, which allows you to explore how SELinux confines different process domains. .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-d, \-\-domain Initialize gui to the selected domain. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-2.8/sepolicy/sepolicy-interface.8000066400000000000000000000020361330160122500220700ustar00rootroot00000000000000.TH "sepolicy-interface" "8" "20121222" "" "" .SH "NAME" sepolicy-interface \- Print interface information based on the installed SELinux Policy .SH "SYNOPSIS" .br .B sepolicy interface [\-h] [\-c] [\-v] [\-a | \-u | \-l | \-i INTERFACE [INTERFACE ... ]] .SH "DESCRIPTION" Use sepolicy interface to print interfaces information based on SELinux Policy. .SH "OPTIONS" .TP .I \-a, \-\-list_admin List all domains with admin interface .TP .I \-c, \-\-compile Test compile of interfaces .TP .I \-h, \-\-help Display help message .TP .I \-i, \-\-interface Interface(s) to be displayed .TP .I \-l, \-\-list List all interfaces .TP .I \-u, \-\-list_user List all domains with SELinux user role interface .TP .I \-v, \-\-verbose Display extended information about the interface including parameters and desctiprion if available. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-2.8/sepolicy/sepolicy-manpage.8000066400000000000000000000020011330160122500215300ustar00rootroot00000000000000.TH "sepolicy-manpage" "8" "20121005" "" "" .SH "NAME" sepolicy-manpage \- Generate a man page based on the installed SELinux Policy .SH "SYNOPSIS" .br .B sepolicy manpage [\-w] [\-h] [\-p PATH ] [\-r ROOTDIR ] [\-a | \-d ] .SH "DESCRIPTION" Use sepolicy manpage to generate manpages based on SELinux Policy. .SH "OPTIONS" .TP .I \-a, \-\-all Generate Man Pages for All Domains .TP .I \-d, \-\-domain Generate a Man Page for the specified domain. (Supports multiple commands) .TP .I \-h, \-\-help Display help message .TP .I \-p, \-\-path Specify the directory to store the created man pages. (Default to /tmp) .TP .I \-r, \-\-root Specify alternate root directory to generate man pages from. (Default to /) .TP .I \-w, \-\-web Generate an additional HTML man pages for the specified domain(s). .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-2.8/sepolicy/sepolicy-network.8000066400000000000000000000041311330160122500216170ustar00rootroot00000000000000.TH "sepolicy-network" "8" "20121005" "" "" .SH "NAME" sepolicy-network \- Examine the SELinux Policy and generate a network report .SH "SYNOPSIS" .br .B sepolicy network [\-h] (\-l | \-a application [application ...] | \-p PORT [PORT ...] | \-t TYPE [TYPE ...] | \-d DOMAIN [DOMAIN ...]) .SH "DESCRIPTION" Use sepolicy network to examine SELinux Policy and generate network reports. .SH "OPTIONS" .TP .I \-a, \-\-application Generate a report listing the ports to which the specified init application is allowed to connect and or bind. .TP .I \-d, \-\-domain Generate a report listing the ports to which the specified domain is allowed to connect and or bind. .TP .I \-l, \-\-list List all Network Port Types defined in SELinux Policy .TP .I \-h, \-\-help Display help message .TP .I \-t, \-\-type Generate a report listing the port numbers associate with the specified SELinux port type. .TP .I \-p, \-\-port Generate a report listing the SELinux port types associate with the specified port number. .SH "EXAMPLES" .B sepolicy network -p 22 .br 22: tcp ssh_port_t 22 .br 22: udp reserved_port_t 1-511 .br 22: tcp reserved_port_t 1-511 .B sepolicy network -a /usr/sbin/sshd .br sshd_t: tcp name_connect .br 111 (portmap_port_t) .br 53 (dns_port_t) .br 88, 750, 4444 (kerberos_port_t) .br 9080 (ocsp_port_t) .br 9180, 9701, 9443-9447 (pki_ca_port_t) .br 32768-61000 (ephemeral_port_t) .br all ports < 1024 (reserved_port_type) .br all ports with out defined types (port_t) .br sshd_t: tcp name_bind .br 22 (ssh_port_t) .br 5900-5983, 5985-5999 (vnc_port_t) .br 6000-6020 (xserver_port_t) .br 32768-61000 (ephemeral_port_t) .br all ports > 500 and < 1024 (rpc_port_type) .br all ports with out defined types (port_t) .br sshd_t: udp name_bind .br 32768-61000 (ephemeral_port_t) .br all ports > 500 and < 1024 (rpc_port_type) .br all ports with out defined types (port_t) .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8), semanage(8) selinux-python-2.8/sepolicy/sepolicy-transition.8000066400000000000000000000020231330160122500223160ustar00rootroot00000000000000.TH "sepolicy-transition" "8" "20121005" "" "" .SH "NAME" sepolicy-transition \- Examine the SELinux Policy and generate a process transition report .SH "SYNOPSIS" .br .B sepolicy transition [\-h] \-s SOURCE .br .B sepolicy transition [\-h] \-s SOURCE \-t TARGET .SH "DESCRIPTION" sepolicy transition will show all domains that a give SELinux source domain can transition to, including the entrypoint. If a target domain is given, sepolicy transition will examine policy for all transition paths from the source domain to the target domain, and will list the paths. If a transition is possible, this tool will print out all transition paths from the source domain to the target domain .SH "OPTIONS" .TP .I \-h, \-\-help Display help message .TP .I \-s, \-\-source Specify the source SELinux domain type. .TP .I \-t, \-\-target Specify the target SELinux domain type. .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" sepolicy(8), selinux(8) selinux-python-2.8/sepolicy/sepolicy.8000066400000000000000000000034041330160122500201320ustar00rootroot00000000000000.TH "sepolicy" "8" "20121005" "" "" .SH "NAME" sepolicy \- SELinux Policy Inspection tool .SH "SYNOPSIS" .B sepolicy [-h] [-P policy_path ] {booleans,communicate,generate,interface,manpage,network,transition} OPTIONS .br Arguments: .br .B booleans .br Query SELinux policy to see description of booleans .B sepolicy-boolean(8) .br .B communicate .br Query SELinux policy to see if domains can communicate with each other .B sepolicy-communicate(8) .br .B generate .br Generate SELinux Policy module template .B sepolicy-generate(8) .br .B gui .br Launch Graphical User Interface for SELinux Policy, requires policycoreutils-gui package. .B sepolicy-gui(8) .br .B interface .br .br Print SELinux Policy interface information .B sepolicy-interface(8) .br .B manpage .br Generate SELinux man pages .B sepolicy-manpage(8) .br .B network .br Query SELinux policy network information .B sepolicy-network(8) .br .B transition .br Query SELinux Policy to see how a source process domain can transition to the target process domain .B sepolicy-transition(8) .SH "DESCRIPTION" sepolicy is a tools set that will query the installed SELinux policy and generate useful reports, man pages, or even new policy modules. See the argument specific man pages for options and descriptions. .SH "OPTIONS" .TP .I \-P, \-\-policy Alternate policy to analyze. (Defaults to currently installed policy /sys/fs/selinux/policy) .TP .I \-h, \-\-help Display help message .SH "AUTHOR" This man page was written by Daniel Walsh .SH "SEE ALSO" selinux(8), sepolicy-booleans(8), sepolicy-communicate(8), sepolicy-generate(8),sepolicy-gui(8), sepolicy-interface(8), sepolicy-network(8), sepolicy-manpage(8), sepolicy-transition(8) selinux-python-2.8/sepolicy/sepolicy.py000077500000000000000000000714501330160122500204240ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2012 Red Hat # AUTHOR: Dan Walsh # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import os import sys import selinux import sepolicy from sepolicy import get_os_version, get_conditionals, get_conditionals_format_text import argparse PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode usage = "sepolicy generate [-h] [-n NAME] [-p PATH] [" usage_dict = {' --newtype': ('-t [TYPES [TYPES ...]]',), ' --customize': ('-d DOMAIN', '-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --admin_user': ('[-r TRANSITION_ROLE ]', "[ -w WRITEPATHS ]",), ' --application': ('COMMAND', "[ -w WRITEPATHS ]",), ' --cgi': ('COMMAND', "[ -w WRITEPATHS ]",), ' --confined_admin': ('-a ADMIN_DOMAIN', "[ -w WRITEPATHS ]",), ' --dbus': ('COMMAND', "[ -w WRITEPATHS ]",), ' --desktop_user': ('', "[ -w WRITEPATHS ]",), ' --inetd': ('COMMAND', "[ -w WRITEPATHS ]",), ' --init': ('COMMAND', "[ -w WRITEPATHS ]",), ' --sandbox': ("[ -w WRITEPATHS ]",), ' --term_user': ("[ -w WRITEPATHS ]",), ' --x_user': ("[ -w WRITEPATHS ]",)} class CheckPath(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): if not os.path.exists(values): raise ValueError("%s does not exist" % values) setattr(namespace, self.dest, values) class CheckType(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): domains = sepolicy.get_all_domains() if isinstance(values, str): setattr(namespace, self.dest, values) else: newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: newval.append(v) setattr(namespace, self.dest, newval) class CheckBoolean(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): booleans = sepolicy.get_all_booleans() newval = getattr(namespace, self.dest) if not newval: newval = [] if isinstance(values, str): v = selinux.selinux_boolean_sub(values) if v not in booleans: raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (v, ", ".join(booleans))) newval.append(v) setattr(namespace, self.dest, newval) else: for value in values: v = selinux.selinux_boolean_sub(value) if v not in booleans: raise ValueError("%s must be an SELinux boolean:\nValid boolean: %s" % (v, ", ".join(booleans))) newval.append(v) setattr(namespace, self.dest, newval) class CheckDomain(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): domains = sepolicy.get_all_domains() if isinstance(values, str): if values not in domains: raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (values, ", ".join(domains))) setattr(namespace, self.dest, values) else: newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: if v not in domains: raise ValueError("%s must be an SELinux process domain:\nValid domains: %s" % (v, ", ".join(domains))) newval.append(v) setattr(namespace, self.dest, newval) all_classes = None class CheckClass(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): global all_classes if not all_classes: all_classes = map(lambda x: x['name'], sepolicy.info(sepolicy.TCLASS)) if values not in all_classes: raise ValueError("%s must be an SELinux class:\nValid classes: %s" % (values, ", ".join(all_classes))) setattr(namespace, self.dest, values) class CheckAdmin(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): from sepolicy.interface import get_admin newval = getattr(namespace, self.dest) if not newval: newval = [] admins = get_admin() if values not in admins: raise ValueError("%s must be an SELinux admin domain:\nValid admin domains: %s" % (values, ", ".join(admins))) newval.append(values) setattr(namespace, self.dest, newval) class CheckPort(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: if v < 1 or v > 65536: raise ValueError("%s must be an integer between 1 and 65536" % v) newval.append(v) setattr(namespace, self.dest, newval) class CheckPortType(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): port_types = sepolicy.get_all_port_types() newval = getattr(namespace, self.dest) if not newval: newval = [] for v in values: if v not in port_types: raise ValueError("%s must be an SELinux port type:\nValid port types: %s" % (v, ", ".join(port_types))) newval.append(v) setattr(namespace, self.dest, values) class LoadPolicy(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): import sepolicy sepolicy.policy(values) setattr(namespace, self.dest, values) class CheckPolicyType(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): from sepolicy.generate import get_poltype_desc, poltype if values not in poltype.keys(): raise ValueError("%s invalid SELinux policy type\n%s" % (values, get_poltype_desc())) newval.append(v) setattr(namespace, self.dest, values) class CheckUser(argparse.Action): def __call__(self, parser, namespace, value, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] users = sepolicy.get_all_users() if value not in users: raise ValueError("%s must be an SELinux user:\nValid users: %s" % (value, ", ".join(users))) newval.append(value) setattr(namespace, self.dest, newval) class CheckRole(argparse.Action): def __call__(self, parser, namespace, value, option_string=None): newval = getattr(namespace, self.dest) if not newval: newval = [] roles = sepolicy.get_all_roles() if value not in roles: raise ValueError("%s must be an SELinux role:\nValid roles: %s" % (value, ", ".join(roles))) newval.append(value[:-2]) setattr(namespace, self.dest, newval) class InterfaceInfo(argparse.Action): def __call__(self, parser, namespace, values, option_string=None): from sepolicy.interface import get_interface_dict interface_dict = get_interface_dict() for v in values: if v not in interface_dict.keys(): raise ValueError(_("Interface %s does not exist.") % v) setattr(namespace, self.dest, values) def generate_custom_usage(usage_text, usage_dict): sorted_keys = [] for i in usage_dict.keys(): sorted_keys.append(i) sorted_keys.sort() for k in sorted_keys: usage_text += "%s %s |" % (k, (" ".join(usage_dict[k]))) usage_text = usage_text[:-1] + "]" usage_text = _(usage_text) return usage_text # expects formats: # "22 (sshd_t)", "80, 8080 (httpd_t)", "all ports (port_type)" def port_string_to_num(val): try: return int(val.split(" ")[0].split(",")[0].split("-")[0]) except: return 99999999 def _print_net(src, protocol, perm): import sepolicy.network portdict = sepolicy.network.get_network_connect(src, protocol, perm) if len(portdict) > 0: bold_start = "\033[1m" bold_end = "\033[0;0m" print("\n" + bold_start + "%s: %s %s" % (src, protocol, perm) + bold_end) port_strings = [] boolean_text = "" for p in portdict: for t, recs in portdict[p]: cond = get_conditionals(src, t, "%s_socket" % protocol, [perm]) if cond: boolean_text = get_conditionals_format_text(cond) port_strings.append("%s (%s) %s" % (", ".join(recs), t, boolean_text)) else: port_strings.append("%s (%s)" % (", ".join(recs), t)) port_strings.sort(key=lambda param: port_string_to_num(param)) for p in port_strings: print("\t" + p) def network(args): portrecs, portrecsbynum = sepolicy.gen_port_dict() all_ports = [] if args.list_ports: for i in portrecs: if i[0] not in all_ports: all_ports.append(i[0]) all_ports.sort() print("\n".join(all_ports)) for port in args.port: found = False for i in portrecsbynum: if i[0] <= port and port <= i[1]: if i[0] == i[1]: range = i[0] else: range = "%s-%s" % (i[0], i[1]) found = True print("%d: %s %s %s" % (port, i[2], portrecsbynum[i][0], range)) if not found: if port < 500: print("Undefined reserved port type") else: print("Undefined port type") for t in args.type: if (t, 'tcp') in portrecs.keys(): print("%s: tcp: %s" % (t, ",".join(portrecs[t, 'tcp']))) if (t, 'udp') in portrecs.keys(): print( "%s: udp: %s" % (t, ",".join(portrecs[t, 'udp']))) for a in args.applications: d = sepolicy.get_init_transtype(a) if d: args.domain.append(d) for d in args.domain: _print_net(d, "tcp", "name_connect") for net in ("tcp", "udp"): _print_net(d, net, "name_bind") def gui_run(args): try: import sepolicy.gui sepolicy.gui.SELinuxGui(args.domain, args.test) pass except ImportError: raise ValueError(_("You need to install policycoreutils-gui package to use the gui option")) def gen_gui_args(parser): gui = parser.add_parser("gui", help=_('Graphical User Interface for SELinux Policy')) gui.add_argument("-d", "--domain", default=None, action=CheckDomain, help=_("Domain name(s) of man pages to be created")) gui.add_argument("-t", "--test", default=False, action="store_true", help=argparse.SUPPRESS) gui.set_defaults(func=gui_run) def manpage(args): from sepolicy.manpage import ManPage, HTMLManPages, manpage_domains, manpage_roles, gen_domains path = args.path if not args.policy and args.root != "/": sepolicy.policy(sepolicy.get_installed_policy(args.root)) if args.source_files and args.root == "/": raise ValueError(_("Alternative root needs to be setup")) if args.all: test_domains = gen_domains() else: test_domains = args.domain for domain in test_domains: m = ManPage(domain, path, args.root, args.source_files, args.web) print(m.get_man_page_path()) if args.web: HTMLManPages(manpage_roles, manpage_domains, path, args.os) def gen_manpage_args(parser): man = parser.add_parser("manpage", help=_('Generate SELinux man pages')) man.add_argument("-p", "--path", dest="path", default="/tmp", help=_("path in which the generated SELinux man pages will be stored")) man.add_argument("-o", "--os", dest="os", default=get_os_version(), help=_("name of the OS for man pages")) man.add_argument("-w", "--web", dest="web", default=False, action="store_true", help=_("Generate HTML man pages structure for selected SELinux man page")) man.add_argument("-r", "--root", dest="root", default="/", help=_("Alternate root directory, defaults to /")) man.add_argument("--source_files", dest="source_files", default=False, action="store_true", help=_("With this flag, alternative root path needs to include file context files and policy.xml file")) group = man.add_mutually_exclusive_group(required=True) group.add_argument("-a", "--all", dest="all", default=False, action="store_true", help=_("All domains")) group.add_argument("-d", "--domain", nargs="+", action=CheckDomain, help=_("Domain name(s) of man pages to be created")) man.set_defaults(func=manpage) def gen_network_args(parser): net = parser.add_parser("network", help=_('Query SELinux policy network information')) group = net.add_mutually_exclusive_group(required=True) group.add_argument("-l", "--list", dest="list_ports", action="store_true", help=_("list all SELinux port types")) group.add_argument("-p", "--port", dest="port", default=[], action=CheckPort, nargs="+", type=int, help=_("show SELinux type related to the port")) group.add_argument("-t", "--type", dest="type", default=[], action=CheckPortType, nargs="+", help=_("Show ports defined for this SELinux type")) group.add_argument("-d", "--domain", dest="domain", default=[], action=CheckDomain, nargs="+", help=_("show ports to which this domain can bind and/or connect")) group.add_argument("-a", "--application", dest="applications", default=[], nargs="+", help=_("show ports to which this application can bind and/or connect")) net.set_defaults(func=network) def communicate(args): from sepolicy.communicate import get_types writable = get_types(args.source, args.tclass, args.sourceaccess.split(",")) readable = get_types(args.target, args.tclass, args.targetaccess.split(",")) out = list(set(writable) & set(readable)) for t in out: print(t) def gen_communicate_args(parser): comm = parser.add_parser("communicate", help=_('query SELinux policy to see if domains can communicate with each other')) comm.add_argument("-s", "--source", dest="source", action=CheckDomain, required=True, help=_("Source Domain")) comm.add_argument("-t", "--target", dest="target", action=CheckDomain, required=True, help=_("Target Domain")) comm.add_argument("-c", "--class", required=False, dest="tclass", action=CheckClass, default="file", help="class to use for communications, Default 'file'") comm.add_argument("-S", "--sourceaccess", required=False, dest="sourceaccess", default="open,write", help="comma separate list of permissions for the source type to use, Default 'open,write'") comm.add_argument("-T", "--targetaccess", required=False, dest="targetaccess", default="open,read", help="comma separated list of permissions for the target type to use, Default 'open,read'") comm.set_defaults(func=communicate) def booleans(args): from sepolicy import boolean_desc if args.all: rc, args.booleans = selinux.security_get_boolean_names() args.booleans.sort() for b in args.booleans: print("%s=_(\"%s\")" % (b, boolean_desc(b))) def gen_booleans_args(parser): bools = parser.add_parser("booleans", help=_('query SELinux Policy to see description of booleans')) group = bools.add_mutually_exclusive_group(required=True) group.add_argument("-a", "--all", dest="all", default=False, action="store_true", help=_("get all booleans descriptions")) group.add_argument("-b", "--boolean", dest="booleans", nargs="+", action=CheckBoolean, required=False, help=_("boolean to get description")) bools.set_defaults(func=booleans) def transition(args): from sepolicy.transition import setrans mytrans = setrans(args.source, args.target) mytrans.output() def gen_transition_args(parser): trans = parser.add_parser("transition", help=_('query SELinux Policy to see how a source process domain can transition to the target process domain')) trans.add_argument("-s", "--source", dest="source", action=CheckDomain, required=True, help=_("source process domain")) trans.add_argument("-t", "--target", dest="target", action=CheckDomain, help=_("target process domain")) trans.set_defaults(func=transition) def print_interfaces(interfaces, args, append=""): from sepolicy.interface import get_interface_format_text, interface_compile_test for i in interfaces: if args.verbose: try: print(get_interface_format_text(i + append)) except KeyError: print(i) if args.compile: try: interface_compile_test(i) except KeyError: print(i) else: print(i) def interface(args): from sepolicy.interface import get_admin, get_user, get_interface_dict, get_all_interfaces if args.list_admin: print_interfaces(get_admin(args.file), args, "_admin") if args.list_user: print_interfaces(get_user(args.file), args, "_role") if args.list: print_interfaces(get_all_interfaces(args.file), args) if args.interfaces: print_interfaces(args.interfaces, args) def generate(args): from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE cmd = None # numbers present POLTYPE defined in sepolicy.generate conflict_args = {'TYPES': (NEWTYPE,), 'DOMAIN': (EUSER,), 'ADMIN_DOMAIN': (AUSER, RUSER, EUSER,)} error_text = "" if args.policytype is None: generate_usage = generate_custom_usage(usage, usage_dict) for k in usage_dict: error_text += "%s" % (k) print(generate_usage) print(_("sepolicy generate: error: one of the arguments %s is required") % error_text) sys.exit(1) if args.policytype in APPLICATIONS: if not args.command: raise ValueError(_("Command required for this type of policy")) cmd = os.path.realpath(args.command) if not args.name: args.name = os.path.basename(cmd).replace("-", "_") mypolicy = policy(args.name, args.policytype) if cmd: mypolicy.set_program(cmd) if args.types: if args.policytype not in conflict_args['TYPES']: raise ValueError(_("-t option can not be used with '%s' domains. Read usage for more details.") % sepolicy.generate.poltype[args.policytype]) mypolicy.set_types(args.types) if args.domain: if args.policytype not in conflict_args['DOMAIN']: raise ValueError(_("-d option can not be used with '%s' domains. Read usage for more details.") % sepolicy.generate.poltype[args.policytype]) if args.admin_domain: if args.policytype not in conflict_args['ADMIN_DOMAIN']: raise ValueError(_("-a option can not be used with '%s' domains. Read usage for more details.") % sepolicy.generate.poltype[args.policytype]) if len(args.writepaths) > 0 and args.policytype == NEWTYPE: raise ValueError(_("-w option can not be used with the --newtype option")) for p in args.writepaths: if os.path.isdir(p): mypolicy.add_dir(p) else: mypolicy.add_file(p) mypolicy.set_transition_users(args.user) mypolicy.set_admin_roles(args.role) mypolicy.set_admin_domains(args.admin_domain) mypolicy.set_existing_domains(args.domain) if args.policytype in APPLICATIONS: mypolicy.gen_writeable() mypolicy.gen_symbols() print(mypolicy.generate(args.path)) def gen_interface_args(parser): itf = parser.add_parser("interface", help=_('List SELinux Policy interfaces')) itf.add_argument("-c", "--compile", dest="compile", action="store_true", default=False, help="Run compile test for selected interface") itf.add_argument("-v", "--verbose", dest="verbose", action="store_true", default=False, help="Show verbose information") itf.add_argument("-f", "--file", dest="file", help="Interface file") group = itf.add_mutually_exclusive_group(required=True) group.add_argument("-a", "--list_admin", dest="list_admin", action="store_true", default=False, help="List all domains with admin interface - DOMAIN_admin()") group.add_argument("-u", "--list_user", dest="list_user", action="store_true", default=False, help="List all domains with SELinux user role interface - DOMAIN_role()") group.add_argument("-l", "--list", dest="list", action="store_true", default=False, help="List all interfaces") group.add_argument("-i", "--interfaces", nargs="+", dest="interfaces", action=InterfaceInfo, help=_("Enter interface names, you wish to query")) itf.set_defaults(func=interface) def gen_generate_args(parser): from sepolicy.generate import DAEMON, get_poltype_desc, poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE generate_usage = generate_custom_usage(usage, usage_dict) pol = parser.add_parser("generate", usage=generate_usage, help=_('Generate SELinux Policy module template')) pol.add_argument("-d", "--domain", dest="domain", default=[], action=CheckDomain, nargs="*", help=_("Enter domain type which you will be extending")) pol.add_argument("-u", "--user", dest="user", default=[], action=CheckUser, help=_("Enter SELinux user(s) which will transition to this domain")) pol.add_argument("-r", "--role", dest="role", default=[], action=CheckRole, help=_("Enter SELinux role(s) to which the administror domain will transition")) pol.add_argument("-a", "--admin", dest="admin_domain", default=[], action=CheckAdmin, help=_("Enter domain(s) which this confined admin will administrate")) pol.add_argument("-n", "--name", dest="name", default=None, help=_("name of policy to generate")) pol.add_argument("-T", "--test", dest="test", default=False, action="store_true", help=argparse.SUPPRESS) pol.add_argument("-t", "--type", dest="types", default=[], nargs="*", action=CheckType, help="Enter type(s) for which you will generate new definition and rule(s)") pol.add_argument("-p", "--path", dest="path", default=os.getcwd(), help=_("path in which the generated policy files will be stored")) pol.add_argument("-w", "--writepath", dest="writepaths", nargs="*", default=[], help=_("path to which the confined processes will need to write")) cmdtype = pol.add_argument_group(_("Policy types which require a command")) cmdgroup = cmdtype.add_mutually_exclusive_group(required=False) cmdgroup.add_argument("--application", dest="policytype", const=USER, action="store_const", help=_("Generate '%s' policy") % poltype[USER]) cmdgroup.add_argument("--cgi", dest="policytype", const=CGI, action="store_const", help=_("Generate '%s' policy") % poltype[CGI]) cmdgroup.add_argument("--dbus", dest="policytype", const=DBUS, action="store_const", help=_("Generate '%s' policy") % poltype[DBUS]) cmdgroup.add_argument("--inetd", dest="policytype", const=INETD, action="store_const", help=_("Generate '%s' policy") % poltype[INETD]) cmdgroup.add_argument("--init", dest="policytype", const=DAEMON, action="store_const", default=DAEMON, help=_("Generate '%s' policy") % poltype[DAEMON]) type = pol.add_argument_group("Policy types which do not require a command") group = type.add_mutually_exclusive_group(required=False) group.add_argument("--admin_user", dest="policytype", const=AUSER, action="store_const", help=_("Generate '%s' policy") % poltype[AUSER]) group.add_argument("--confined_admin", dest="policytype", const=RUSER, action="store_const", help=_("Generate '%s' policy") % poltype[RUSER]) group.add_argument("--customize", dest="policytype", const=EUSER, action="store_const", help=_("Generate '%s' policy") % poltype[EUSER]) group.add_argument("--desktop_user", dest="policytype", const=LUSER, action="store_const", help=_("Generate '%s' policy ") % poltype[LUSER]) group.add_argument("--newtype", dest="policytype", const=NEWTYPE, action="store_const", help=_("Generate '%s' policy") % poltype[NEWTYPE]) group.add_argument("--sandbox", dest="policytype", const=SANDBOX, action="store_const", help=_("Generate '%s' policy") % poltype[SANDBOX]) group.add_argument("--term_user", dest="policytype", const=TUSER, action="store_const", help=_("Generate '%s' policy") % poltype[TUSER]) group.add_argument("--x_user", dest="policytype", const=XUSER, action="store_const", help=_("Generate '%s' policy") % poltype[XUSER]) pol.add_argument("command", nargs="?", default=None, help=_("executable to confine")) pol.set_defaults(func=generate) if __name__ == '__main__': parser = argparse.ArgumentParser(description='SELinux Policy Inspection Tool') subparsers = parser.add_subparsers(help=_("commands")) parser.add_argument("-P", "--policy", dest="policy", action=LoadPolicy, default=None, help=_("Alternate SELinux policy, defaults to /sys/fs/selinux/policy")) gen_booleans_args(subparsers) gen_communicate_args(subparsers) gen_generate_args(subparsers) gen_gui_args(subparsers) gen_interface_args(subparsers) gen_manpage_args(subparsers) gen_network_args(subparsers) gen_transition_args(subparsers) try: if os.path.basename(sys.argv[0]) == "sepolgen": parser_args = [ "generate" ] + sys.argv[1:] elif len(sys.argv) > 1: parser_args = sys.argv[1:] else: parser_args = ["-h"] args = parser.parse_args(args=parser_args) args.func(args) sys.exit(0) except ValueError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) except KeyboardInterrupt: print("Out") sys.exit(0) selinux-python-2.8/sepolicy/sepolicy/000077500000000000000000000000001330160122500200405ustar00rootroot00000000000000selinux-python-2.8/sepolicy/sepolicy/__init__.py000066400000000000000000001056251330160122500221620ustar00rootroot00000000000000#!/usr/bin/python # Author: Dan Walsh # Author: Ryan Hallisey # Author: Jason Zaman import errno import selinux import setools import glob import sepolgen.defaults as defaults import sepolgen.interfaces as interfaces import sys import os import re import gzip PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode TYPE = 1 ROLE = 2 ATTRIBUTE = 3 PORT = 4 USER = 5 BOOLEAN = 6 TCLASS = 7 ALLOW = 'allow' AUDITALLOW = 'auditallow' NEVERALLOW = 'neverallow' DONTAUDIT = 'dontaudit' SOURCE = 'source' TARGET = 'target' PERMS = 'permlist' CLASS = 'class' TRANSITION = 'transition' ROLE_ALLOW = 'role_allow' # Autofill for adding files ************************* DEFAULT_DIRS = {} DEFAULT_DIRS["/etc"] = "etc_t" DEFAULT_DIRS["/tmp"] = "tmp_t" DEFAULT_DIRS["/usr/lib/systemd/system"] = "unit_file_t" DEFAULT_DIRS["/lib/systemd/system"] = "unit_file_t" DEFAULT_DIRS["/etc/systemd/system"] = "unit_file_t" DEFAULT_DIRS["/var/cache"] = "var_cache_t" DEFAULT_DIRS["/var/lib"] = "var_lib_t" DEFAULT_DIRS["/var/log"] = "log_t" DEFAULT_DIRS["/var/run"] = "var_run_t" DEFAULT_DIRS["/run"] = "var_run_t" DEFAULT_DIRS["/run/lock"] = "var_lock_t" DEFAULT_DIRS["/var/run/lock"] = "var_lock_t" DEFAULT_DIRS["/var/spool"] = "var_spool_t" DEFAULT_DIRS["/var/www"] = "content_t" file_type_str = {} file_type_str["a"] = _("all files") file_type_str["f"] = _("regular file") file_type_str["d"] = _("directory") file_type_str["c"] = _("character device") file_type_str["b"] = _("block device") file_type_str["s"] = _("socket file") file_type_str["l"] = _("symbolic link") file_type_str["p"] = _("named pipe") trans_file_type_str = {} trans_file_type_str[""] = "a" trans_file_type_str["--"] = "f" trans_file_type_str["-d"] = "d" trans_file_type_str["-c"] = "c" trans_file_type_str["-b"] = "b" trans_file_type_str["-s"] = "s" trans_file_type_str["-l"] = "l" trans_file_type_str["-p"] = "p" # the setools policy handle _pol = None # cache the lookup results file_equiv_modified = None file_equiv = None local_files = None fcdict = None methods = [] all_types = None all_types_info = None user_types = None role_allows = None portrecs = None portrecsbynum = None all_domains = None roles = None selinux_user_list = None login_mappings = None file_types = None port_types = None bools = None all_attributes = None booleans = None booleans_dict = None all_allow_rules = None all_transitions = None def get_installed_policy(root="/"): try: path = root + selinux.selinux_binary_policy_path() policies = glob.glob("%s.*" % path) policies.sort() return policies[-1] except: pass raise ValueError(_("No SELinux Policy installed")) def policy(policy_file): global all_domains global all_attributes global bools global all_types global role_allows global users global roles global file_types global port_types all_domains = None all_attributes = None bools = None all_types = None role_allows = None users = None roles = None file_types = None port_types = None global _pol try: _pol = setools.SELinuxPolicy(policy_file) except: raise ValueError(_("Failed to read %s policy file") % policy_file) try: policy_file = get_installed_policy() policy(policy_file) except ValueError as e: if selinux.is_selinux_enabled() == 1: raise e def info(setype, name=None): if setype == TYPE: q = setools.TypeQuery(_pol) if name: q.name = name return ({ 'aliases': list(map(str, x.aliases())), 'name': str(x), 'permissive': bool(x.ispermissive), 'attributes': list(map(str, x.attributes())) } for x in q.results()) elif setype == ROLE: q = setools.RoleQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'roles': list(map(str, x.expand())), 'types': list(map(str, x.types())), } for x in q.results()) elif setype == ATTRIBUTE: q = setools.TypeAttributeQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'types': list(map(str, x.expand())), } for x in q.results()) elif setype == PORT: q = setools.PortconQuery(_pol) if name: ports = [int(i) for i in name.split("-")] if len(ports) == 2: q.ports = ports elif len(ports) == 1: q.ports = (ports[0], ports[0]) if _pol.mls: return ({ 'high': x.ports.high, 'protocol': str(x.protocol), 'range': str(x.context.range_), 'type': str(x.context.type_), 'low': x.ports.low, } for x in q.results()) return ({ 'high': x.ports.high, 'protocol': str(x.protocol), 'type': str(x.context.type_), 'low': x.ports.low, } for x in q.results()) elif setype == USER: q = setools.UserQuery(_pol) if name: q.name = name if _pol.mls: return ({ 'range': str(x.mls_range), 'name': str(x), 'roles': list(map(str, x.roles)), 'level': str(x.mls_level), } for x in q.results()) return ({ 'name': str(x), 'roles': list(map(str, x.roles)), } for x in q.results()) elif setype == BOOLEAN: q = setools.BoolQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'state': x.state, } for x in q.results()) elif setype == TCLASS: q = setools.ObjClassQuery(_pol) if name: q.name = name return ({ 'name': str(x), 'permlist': list(x.perms), } for x in q.results()) else: raise ValueError("Invalid type") def _setools_rule_to_dict(rule): d = { 'type': str(rule.ruletype), 'source': str(rule.source), 'target': str(rule.target), 'class': str(rule.tclass), } try: enabled = bool(rule.qpol_symbol.is_enabled(rule.policy)) except AttributeError: enabled = True if isinstance(rule, setools.policyrep.terule.AVRule): d['enabled'] = enabled try: d['permlist'] = list(map(str, rule.perms)) except setools.policyrep.exception.RuleUseError: pass try: d['transtype'] = str(rule.default) except setools.policyrep.exception.RuleUseError: pass try: d['boolean'] = [(str(rule.conditional), enabled)] except (AttributeError, setools.policyrep.exception.RuleNotConditional): pass try: d['filename'] = rule.filename except (AttributeError, setools.policyrep.exception.RuleNotConditional, setools.policyrep.exception.TERuleNoFilename): pass return d def search(types, seinfo=None): if not seinfo: seinfo = {} valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW]) for setype in types: if setype not in valid_types: raise ValueError("Type has to be in %s" % " ".join(valid_types)) source = None if SOURCE in seinfo: source = str(seinfo[SOURCE]) target = None if TARGET in seinfo: target = str(seinfo[TARGET]) tclass = None if CLASS in seinfo: tclass = str(seinfo[CLASS]).split(',') toret = [] tertypes = [] if ALLOW in types: tertypes.append(ALLOW) if NEVERALLOW in types: tertypes.append(NEVERALLOW) if AUDITALLOW in types: tertypes.append(AUDITALLOW) if len(tertypes) > 0: q = setools.TERuleQuery(_pol, ruletype=tertypes, source=source, target=target, tclass=tclass) if PERMS in seinfo: q.perms = seinfo[PERMS] toret += [_setools_rule_to_dict(x) for x in q.results()] if TRANSITION in types: rtypes = ['type_transition', 'type_change', 'type_member'] q = setools.TERuleQuery(_pol, ruletype=rtypes, source=source, target=target, tclass=tclass) if PERMS in seinfo: q.perms = seinfo[PERMS] toret += [_setools_rule_to_dict(x) for x in q.results()] if ROLE_ALLOW in types: ratypes = ['allow'] q = setools.RBACRuleQuery(_pol, ruletype=ratypes, source=source, target=target, tclass=tclass) for r in q.results(): toret.append({'source': str(r.source), 'target': str(r.target)}) return toret def get_conditionals(src, dest, tclass, perm): tdict = {} tlist = [] src_list = [src] dest_list = [dest] # add assigned attributes try: src_list += list(filter(lambda x: x['name'] == src, get_all_types_info()))[0]['attributes'] except: pass try: dest_list += list(filter(lambda x: x['name'] == dest, get_all_types_info()))[0]['attributes'] except: pass allows = map(lambda y: y, filter(lambda x: x['source'] in src_list and x['target'] in dest_list and set(perm).issubset(x[PERMS]) and 'boolean' in x, get_all_allow_rules())) try: for i in allows: tdict.update({'source': i['source'], 'boolean': i['boolean']}) if tdict not in tlist: tlist.append(tdict) tdict = {} except KeyError: return(tlist) return (tlist) def get_conditionals_format_text(cond): enabled = False for x in cond: if x['boolean'][0][1]: enabled = True break return _("-- Allowed %s [ %s ]") % (enabled, " || ".join(set(map(lambda x: "%s=%d" % (x['boolean'][0][0], x['boolean'][0][1]), cond)))) def get_types_from_attribute(attribute): return list(info(ATTRIBUTE, attribute))[0]["types"] def get_file_types(setype): flist = [] mpaths = {} for f in get_all_file_types(): if f.startswith(gen_short_name(setype)): flist.append(f) fcdict = get_fcdict() for f in flist: try: mpaths[f] = (fcdict[f]["regex"], file_type_str[fcdict[f]["ftype"]]) except KeyError: mpaths[f] = [] return mpaths def get_writable_files(setype): file_types = get_all_file_types() all_writes = [] mpaths = {} permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) if permlist is None or len(permlist) == 0: return mpaths fcdict = get_fcdict() attributes = ["proc_type", "sysctl_type"] for i in permlist: if i['target'] in attributes: continue if "enabled" in i: if not i["enabled"]: continue if i['target'].endswith("_t"): if i['target'] not in file_types: continue if i['target'] not in all_writes: if i['target'] != setype: all_writes.append(i['target']) else: for t in get_types_from_attribute(i['target']): if t not in all_writes: all_writes.append(t) for f in all_writes: try: mpaths[f] = (fcdict[f]["regex"], file_type_str[fcdict[f]["ftype"]]) except KeyError: mpaths[f] = [] # {"regex":[],"paths":[]} return mpaths def find_file(reg): if os.path.exists(reg): return [reg] try: pat = re.compile(r"%s$" % reg) except: print("bad reg:", reg) return [] p = reg if p.endswith("(/.*)?"): p = p[:-6] + "/" path = os.path.dirname(p) try: # Bug fix: when "all files on system" if path[-1] != "/": # is pass in it breaks without try block path += "/" except IndexError: print("try failed got an IndexError") pass try: pat = re.compile(r"%s$" % reg) return [x for x in map(lambda x: path + x, os.listdir(path)) if pat.match(x)] except: return [] def find_all_files(domain, exclude_list=[]): executable_files = get_entrypoints(domain) for exe in executable_files.keys(): if exe.endswith("_exec_t") and exe not in exclude_list: for path in executable_files[exe]: for f in find_file(path): return f return None def find_entrypoint_path(exe, exclude_list=[]): fcdict = get_fcdict() try: if exe.endswith("_exec_t") and exe not in exclude_list: for path in fcdict[exe]["regex"]: for f in find_file(path): return f except KeyError: pass return None def read_file_equiv(edict, fc_path, modify): try: with open(fc_path, "r") as fd: for e in fd: f = e.split() if f and not f[0].startswith('#'): edict[f[0]] = {"equiv": f[1], "modify": modify} except OSError as e: if e.errno != errno.ENOENT: raise return edict def get_file_equiv_modified(fc_path=selinux.selinux_file_context_path()): global file_equiv_modified if file_equiv_modified: return file_equiv_modified file_equiv_modified = {} file_equiv_modified = read_file_equiv(file_equiv_modified, fc_path + ".subs", modify=True) return file_equiv_modified def get_file_equiv(fc_path=selinux.selinux_file_context_path()): global file_equiv if file_equiv: return file_equiv file_equiv = get_file_equiv_modified(fc_path) file_equiv = read_file_equiv(file_equiv, fc_path + ".subs_dist", modify=False) return file_equiv def get_local_file_paths(fc_path=selinux.selinux_file_context_path()): global local_files if local_files: return local_files local_files = [] try: with open(fc_path + ".local", "r") as fd: fc = fd.readlines() except OSError as e: if e.errno != errno.ENOENT: raise return [] for i in fc: rec = i.split() if len(rec) == 0: continue try: if len(rec) > 2: ftype = trans_file_type_str[rec[1]] else: ftype = "a" local_files.append((rec[0], ftype)) except KeyError: pass return local_files def get_fcdict(fc_path=selinux.selinux_file_context_path()): global fcdict if fcdict: return fcdict fd = open(fc_path, "r") fc = fd.readlines() fd.close() fd = open(fc_path + ".homedirs", "r") fc += fd.readlines() fd.close() fcdict = {} try: with open(fc_path + ".local", "r") as fd: fc += fd.readlines() except OSError as e: if e.errno != errno.ENOENT: raise for i in fc: rec = i.split() try: if len(rec) > 2: ftype = trans_file_type_str[rec[1]] else: ftype = "a" t = rec[-1].split(":")[2] if t in fcdict: fcdict[t]["regex"].append(rec[0]) else: fcdict[t] = {"regex": [rec[0]], "ftype": ftype} except: pass fcdict["logfile"] = {"regex": ["all log files"]} fcdict["user_tmp_type"] = {"regex": ["all user tmp files"]} fcdict["user_home_type"] = {"regex": ["all user home files"]} fcdict["virt_image_type"] = {"regex": ["all virtual image files"]} fcdict["noxattrfs"] = {"regex": ["all files on file systems which do not support extended attributes"]} fcdict["sandbox_tmpfs_type"] = {"regex": ["all sandbox content in tmpfs file systems"]} fcdict["user_tmpfs_type"] = {"regex": ["all user content in tmpfs file systems"]} fcdict["file_type"] = {"regex": ["all files on the system"]} fcdict["samba_share_t"] = {"regex": ["use this label for random content that will be shared using samba"]} return fcdict def get_transitions_into(setype): try: return [x for x in search([TRANSITION], {'class': 'process'}) if x["transtype"] == setype] except (TypeError, AttributeError): pass return None def get_transitions(setype): try: return search([TRANSITION], {'source': setype, 'class': 'process'}) except (TypeError, AttributeError): pass return None def get_file_transitions(setype): try: return [x for x in search([TRANSITION], {'source': setype}) if x['class'] != "process"] except (TypeError, AttributeError): pass return None def get_boolean_rules(setype, boolean): boollist = [] permlist = search([ALLOW], {'source': setype}) for p in permlist: if "boolean" in p: try: for b in p["boolean"]: if boolean in b: boollist.append(p) except: pass return boollist def get_all_entrypoints(): return get_types_from_attribute("entry_type") def get_entrypoint_types(setype): q = setools.TERuleQuery(_pol, ruletype=[ALLOW], source=setype, tclass=["file"], perms=["entrypoint"]) return [str(x.target) for x in q.results() if x.source == setype] def get_init_transtype(path): entrypoint = selinux.getfilecon(path)[1].split(":")[2] try: entrypoints = list(filter(lambda x: x['target'] == entrypoint, search([TRANSITION], {'source': "init_t", 'class': 'process'}))) return entrypoints[0]["transtype"] except (TypeError, AttributeError, IndexError): pass return None def get_init_entrypoint(transtype): q = setools.TERuleQuery(_pol, ruletype=["type_transition"], source="init_t", tclass=["process"]) entrypoints = [] for i in q.results(): try: if i.default == transtype: entrypoints.append(i.target) except AttributeError: continue return entrypoints def get_init_entrypoints_str(): q = setools.TERuleQuery(_pol, ruletype=["type_transition"], source="init_t", tclass=["process"]) entrypoints = {} for i in q.results(): try: transtype = str(i.default) if transtype in entrypoints: entrypoints[transtype].append(str(i.target)) else: entrypoints[transtype] = [str(i.target)] except AttributeError: continue return entrypoints def get_init_entrypoint_target(entrypoint): try: entrypoints = map(lambda x: x['transtype'], search([TRANSITION], {'source': "init_t", 'target': entrypoint, 'class': 'process'})) return list(entrypoints)[0] except (TypeError, IndexError): pass return None def get_entrypoints(setype): fcdict = get_fcdict() mpaths = {} for f in get_entrypoint_types(setype): try: mpaths[f] = (fcdict[f]["regex"], file_type_str[fcdict[f]["ftype"]]) except KeyError: mpaths[f] = [] return mpaths def get_methods(): global methods if len(methods) > 0: return methods gen_interfaces() fn = defaults.interface_info() try: fd = open(fn) # List of per_role_template interfaces ifs = interfaces.InterfaceSet() ifs.from_file(fd) methods = list(ifs.interfaces.keys()) fd.close() except: sys.stderr.write("could not open interface info [%s]\n" % fn) sys.exit(1) methods.sort() return methods def get_all_types(): global all_types if all_types is None: all_types = [x['name'] for x in info(TYPE)] return all_types def get_all_types_info(): global all_types_info if all_types_info is None: all_types_info = list(info(TYPE)) return all_types_info def get_user_types(): global user_types if user_types is None: user_types = list(list(info(ATTRIBUTE, "userdomain"))[0]["types"]) return user_types def get_all_role_allows(): global role_allows if role_allows: return role_allows role_allows = {} q = setools.RBACRuleQuery(_pol, ruletype=[ALLOW]) for r in q.results(): src = str(r.source) tgt = str(r.target) if src == "system_r" or tgt == "system_r": continue if src in role_allows: role_allows[src].append(tgt) else: role_allows[src] = [tgt] return role_allows def get_all_entrypoint_domains(): import re all_domains = [] types = sorted(get_all_types()) for i in types: m = re.findall("(.*)%s" % "_exec_t$", i) if len(m) > 0: if len(re.findall("(.*)%s" % "_initrc$", m[0])) == 0 and m[0] not in all_domains: all_domains.append(m[0]) return all_domains def gen_interfaces(): try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput ifile = defaults.interface_info() headers = defaults.headers() try: if os.stat(headers).st_mtime <= os.stat(ifile).st_mtime: return except OSError: pass if os.getuid() != 0: raise ValueError(_("You must regenerate interface info by running /usr/bin/sepolgen-ifgen")) print(getstatusoutput("/usr/bin/sepolgen-ifgen")[1]) def gen_port_dict(): global portrecs global portrecsbynum if portrecs: return (portrecs, portrecsbynum) portrecsbynum = {} portrecs = {} for i in info(PORT): if i['low'] == i['high']: port = str(i['low']) else: port = "%s-%s" % (str(i['low']), str(i['high'])) if (i['type'], i['protocol']) in portrecs: portrecs[(i['type'], i['protocol'])].append(port) else: portrecs[(i['type'], i['protocol'])] = [port] if 'range' in i: portrecsbynum[(i['low'], i['high'], i['protocol'])] = (i['type'], i['range']) else: portrecsbynum[(i['low'], i['high'], i['protocol'])] = (i['type']) return (portrecs, portrecsbynum) def get_all_domains(): global all_domains if not all_domains: all_domains = list(list(info(ATTRIBUTE, "domain"))[0]["types"]) return all_domains def get_all_roles(): global roles if roles: return roles q = setools.RoleQuery(_pol) roles = [str(x) for x in q.results() if str(x) != "object_r"] return roles def get_selinux_users(): global selinux_user_list if not selinux_user_list: selinux_user_list = list(info(USER)) if _pol.mls: for x in selinux_user_list: x['range'] = "".join(x['range'].split(" ")) return selinux_user_list def get_login_mappings(): global login_mappings if login_mappings: return login_mappings fd = open(selinux.selinux_usersconf_path(), "r") buf = fd.read() fd.close() login_mappings = [] for b in buf.split("\n"): b = b.strip() if len(b) == 0 or b.startswith("#"): continue x = b.split(":") login_mappings.append({"name": x[0], "seuser": x[1], "mls": ":".join(x[2:])}) return login_mappings def get_all_users(): return sorted(map(lambda x: x['name'], get_selinux_users())) def get_all_file_types(): global file_types if file_types: return file_types file_types = list(sorted(info(ATTRIBUTE, "file_type"))[0]["types"]) return file_types def get_all_port_types(): global port_types if port_types: return port_types port_types = list(sorted(info(ATTRIBUTE, "port_type"))[0]["types"]) return port_types def get_all_bools(): global bools if not bools: bools = list(info(BOOLEAN)) return bools def prettyprint(f, trim): return " ".join(f[:-len(trim)].split("_")) def markup(f): return f def get_description(f, markup=markup): txt = "Set files with the %s type, if you want to " % markup(f) if f.endswith("_var_run_t"): return txt + "store the %s files under the /run or /var/run directory." % prettyprint(f, "_var_run_t") if f.endswith("_pid_t"): return txt + "store the %s files under the /run directory." % prettyprint(f, "_pid_t") if f.endswith("_var_lib_t"): return txt + "store the %s files under the /var/lib directory." % prettyprint(f, "_var_lib_t") if f.endswith("_var_t"): return txt + "store the %s files under the /var directory." % prettyprint(f, "_var_lib_t") if f.endswith("_var_spool_t"): return txt + "store the %s files under the /var/spool directory." % prettyprint(f, "_spool_t") if f.endswith("_spool_t"): return txt + "store the %s files under the /var/spool directory." % prettyprint(f, "_spool_t") if f.endswith("_cache_t") or f.endswith("_var_cache_t"): return txt + "store the files under the /var/cache directory." if f.endswith("_keytab_t"): return txt + "treat the files as kerberos keytab files." if f.endswith("_lock_t"): return txt + "treat the files as %s lock data, stored under the /var/lock directory" % prettyprint(f, "_lock_t") if f.endswith("_log_t"): return txt + "treat the data as %s log data, usually stored under the /var/log directory." % prettyprint(f, "_log_t") if f.endswith("_config_t"): return txt + "treat the files as %s configuration data, usually stored under the /etc directory." % prettyprint(f, "_config_t") if f.endswith("_conf_t"): return txt + "treat the files as %s configuration data, usually stored under the /etc directory." % prettyprint(f, "_conf_t") if f.endswith("_exec_t"): return txt + "transition an executable to the %s_t domain." % f[:-len("_exec_t")] if f.endswith("_cgi_content_t"): return txt + "treat the files as %s cgi content." % prettyprint(f, "_cgi_content_t") if f.endswith("_rw_content_t"): return txt + "treat the files as %s read/write content." % prettyprint(f, "_rw_content_t") if f.endswith("_rw_t"): return txt + "treat the files as %s read/write content." % prettyprint(f, "_rw_t") if f.endswith("_write_t"): return txt + "treat the files as %s read/write content." % prettyprint(f, "_write_t") if f.endswith("_db_t"): return txt + "treat the files as %s database content." % prettyprint(f, "_db_t") if f.endswith("_ra_content_t"): return txt + "treat the files as %s read/append content." % prettyprint(f, "_ra_content_t") if f.endswith("_cert_t"): return txt + "treat the files as %s certificate data." % prettyprint(f, "_cert_t") if f.endswith("_key_t"): return txt + "treat the files as %s key data." % prettyprint(f, "_key_t") if f.endswith("_secret_t"): return txt + "treat the files as %s secret data." % prettyprint(f, "_key_t") if f.endswith("_ra_t"): return txt + "treat the files as %s read/append content." % prettyprint(f, "_ra_t") if f.endswith("_ro_t"): return txt + "treat the files as %s read/only content." % prettyprint(f, "_ro_t") if f.endswith("_modules_t"): return txt + "treat the files as %s modules." % prettyprint(f, "_modules_t") if f.endswith("_content_t"): return txt + "treat the files as %s content." % prettyprint(f, "_content_t") if f.endswith("_state_t"): return txt + "treat the files as %s state data." % prettyprint(f, "_state_t") if f.endswith("_files_t"): return txt + "treat the files as %s content." % prettyprint(f, "_files_t") if f.endswith("_file_t"): return txt + "treat the files as %s content." % prettyprint(f, "_file_t") if f.endswith("_data_t"): return txt + "treat the files as %s content." % prettyprint(f, "_data_t") if f.endswith("_file_t"): return txt + "treat the data as %s content." % prettyprint(f, "_file_t") if f.endswith("_tmp_t"): return txt + "store %s temporary files in the /tmp directories." % prettyprint(f, "_tmp_t") if f.endswith("_etc_t"): return txt + "store %s files in the /etc directories." % prettyprint(f, "_tmp_t") if f.endswith("_home_t"): return txt + "store %s files in the users home directory." % prettyprint(f, "_home_t") if f.endswith("_tmpfs_t"): return txt + "store %s files on a tmpfs file system." % prettyprint(f, "_tmpfs_t") if f.endswith("_unit_file_t"): return txt + "treat files as a systemd unit file." if f.endswith("_htaccess_t"): return txt + "treat the file as a %s access file." % prettyprint(f, "_htaccess_t") return txt + "treat the files as %s data." % prettyprint(f, "_t") def get_all_attributes(): global all_attributes if not all_attributes: all_attributes = list(sorted(map(lambda x: x['name'], info(ATTRIBUTE)))) return all_attributes def _dict_has_perms(dict, perms): for perm in perms: if perm not in dict[PERMS]: return False return True def gen_short_name(setype): all_domains = get_all_domains() if setype.endswith("_t"): domainname = setype[:-2] else: domainname = setype if domainname + "_t" not in all_domains: raise ValueError("domain %s_t does not exist" % domainname) if domainname[-1] == 'd': short_name = domainname[:-1] + "_" else: short_name = domainname + "_" return (domainname, short_name) def get_all_allow_rules(): global all_allow_rules if not all_allow_rules: all_allow_rules = search([ALLOW]) return all_allow_rules def get_all_transitions(): global all_transitions if not all_transitions: all_transitions = list(search([TRANSITION])) return all_transitions def get_bools(setype): bools = [] domainbools = [] domainname, short_name = gen_short_name(setype) for i in map(lambda x: x['boolean'], filter(lambda x: 'boolean' in x and x['source'] == setype, get_all_allow_rules())): for b in i: if not isinstance(b, tuple): continue try: enabled = selinux.security_get_boolean_active(b[0]) except OSError: enabled = b[1] if b[0].startswith(short_name) or b[0].startswith(domainname): if (b[0], enabled) not in domainbools and (b[0], not enabled) not in domainbools: domainbools.append((b[0], enabled)) else: if (b[0], enabled) not in bools and (b[0], not enabled) not in bools: bools.append((b[0], enabled)) return (domainbools, bools) def get_all_booleans(): global booleans if not booleans: booleans = selinux.security_get_boolean_names()[1] return booleans def policy_xml(path="/usr/share/selinux/devel/policy.xml"): try: fd = gzip.open(path) buf = fd.read() fd.close() except IOError: fd = open(path) buf = fd.read() fd.close() return buf def gen_bool_dict(path="/usr/share/selinux/devel/policy.xml"): global booleans_dict if booleans_dict: return booleans_dict import xml.etree.ElementTree booleans_dict = {} try: tree = xml.etree.ElementTree.fromstring(policy_xml(path)) for l in tree.findall("layer"): for m in l.findall("module"): for b in m.findall("tunable"): desc = b.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[b.get('name')] = (m.get("name"), b.get('dftval'), desc) for b in m.findall("bool"): desc = b.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[b.get('name')] = (m.get("name"), b.get('dftval'), desc) for i in tree.findall("bool"): desc = i.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[i.get('name')] = ("global", i.get('dftval'), desc) for i in tree.findall("tunable"): desc = i.find("desc").find("p").text.strip("\n") desc = re.sub("\n", " ", desc) booleans_dict[i.get('name')] = ("global", i.get('dftval'), desc) except IOError: pass return booleans_dict def boolean_category(boolean): booleans_dict = gen_bool_dict() if boolean in booleans_dict: return _(booleans_dict[boolean][0]) else: return _("unknown") def boolean_desc(boolean): booleans_dict = gen_bool_dict() if boolean in booleans_dict: return _(booleans_dict[boolean][2]) else: desc = boolean.split("_") return "Allow %s to %s" % (desc[0], " ".join(desc[1:])) def get_os_version(): os_version = "" pkg_name = "selinux-policy" try: try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput rc, output = getstatusoutput("rpm -q '%s'" % pkg_name) if rc == 0: os_version = output.split(".")[-2] except: os_version = "" if os_version[0:2] == "fc": os_version = "Fedora" + os_version[2:] elif os_version[0:2] == "el": os_version = "RHEL" + os_version[2:] else: os_version = "" return os_version def reinit(): global all_attributes global all_domains global all_types global booleans global booleans_dict global bools global fcdict global file_types global local_files global methods global methods global portrecs global portrecsbynum global port_types global role_allows global roles global login_mappings global selinux_user_list global user_types all_attributes = None all_domains = None all_types = None booleans = None booleans_dict = None bools = None fcdict = None file_types = None local_files = None methods = None methods = None portrecs = None portrecsbynum = None port_types = None role_allows = None roles = None user_types = None login_mappings = None selinux_user_list = None selinux-python-2.8/sepolicy/sepolicy/booleans.py000066400000000000000000000031001330160122500222060ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transistions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy def expand_attribute(attribute): try: return sepolicy.info(sepolicy.ATTRIBUTE, attribute)[0]["types"] except RuntimeError: return [attribute] def get_types(src, tclass, perm): allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) if not allows: raise TypeError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) tlist = [] for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)): tlist = tlist + expand_attribute(l) return tlist selinux-python-2.8/sepolicy/sepolicy/communicate.py000077500000000000000000000033251330160122500227240ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transistions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy import sys def usage(parser, msg): parser.print_help() sys.stderr.write("\n%s\n" % msg) sys.stderr.flush() sys.exit(1) def expand_attribute(attribute): try: return list(next(sepolicy.info(sepolicy.ATTRIBUTE, attribute))["types"]) except StopIteration: return [attribute] def get_types(src, tclass, perm): allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) if not allows: raise ValueError("The %s type is not allowed to %s any types" % (src, ",".join(perm))) tlist = [] for l in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]), allows)): tlist = tlist + expand_attribute(l) return tlist selinux-python-2.8/sepolicy/sepolicy/generate.py000066400000000000000000001457461330160122500222250ustar00rootroot00000000000000#!/usr/bin/python -Es # # Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import os import sys import stat import re import sepolicy from sepolicy import get_all_types, get_all_attributes, get_all_roles import time import types import platform from .templates import executable from .templates import boolean from .templates import etc_rw from .templates import unit_file from .templates import var_cache from .templates import var_spool from .templates import var_lib from .templates import var_log from .templates import var_run from .templates import tmp from .templates import rw from .templates import network from .templates import script from .templates import spec from .templates import user import sepolgen.interfaces as interfaces import sepolgen.defaults as defaults ## ## I18N ## PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode def get_rpm_nvr_from_header(hdr): 'Given an RPM header return the package NVR as a string' name = hdr['name'] version = hdr['version'] release = hdr['release'] release_version = version + "-" + release.split(".")[0] os_version = release.split(".")[1] return [name, release_version, os_version] def get_rpm_nvr_list(package): try: import rpm nvr = None ts = rpm.ts() mi = ts.dbMatch(rpm.RPMTAG_NAME, package) for h in mi: nvr = get_rpm_nvr_from_header(h) break except: print(("Failed to retrieve rpm info for %s") % package) nvr = None return nvr def get_all_ports(): dict = {} for p in sepolicy.info(sepolicy.PORT): if p['type'] == "reserved_port_t" or \ p['type'] == "port_t" or \ p['type'] == "hi_reserved_port_t": continue dict[(p['low'], p['high'], p['protocol'])] = (p['type'], p.get('range')) return dict def get_all_users(): users = [x['name'] for x in sepolicy.info(sepolicy.USER)] users.remove("system_u") users.remove("root") users.sort() return users ALL = 0 RESERVED = 1 UNRESERVED = 2 PORTS = 3 ADMIN_TRANSITION_INTERFACE = "_admin$" USER_TRANSITION_INTERFACE = "_role$" DAEMON = 0 DBUS = 1 INETD = 2 CGI = 3 SANDBOX = 4 USER = 5 EUSER = 6 TUSER = 7 XUSER = 8 LUSER = 9 AUSER = 10 RUSER = 11 NEWTYPE = 12 poltype = {} poltype[DAEMON] = _("Standard Init Daemon") poltype[DBUS] = _("DBUS System Daemon") poltype[INETD] = _("Internet Services Daemon") poltype[CGI] = _("Web Application/Script (CGI)") poltype[SANDBOX] = _("Sandbox") poltype[USER] = _("User Application") poltype[EUSER] = _("Existing Domain Type") poltype[TUSER] = _("Minimal Terminal Login User Role") poltype[XUSER] = _("Minimal X Windows Login User Role") poltype[LUSER] = _("Desktop Login User Role") poltype[AUSER] = _("Administrator Login User Role") poltype[RUSER] = _("Confined Root Administrator Role") poltype[NEWTYPE] = _("Module information for a new type") def get_poltype_desc(): keys = poltype.keys() keys.sort() msg = _("Valid Types:\n") for k in keys: msg += "%2s: %s\n" % (k, poltype[k]) return msg APPLICATIONS = [DAEMON, DBUS, INETD, USER, CGI] USERS = [XUSER, TUSER, LUSER, AUSER, RUSER] def verify_ports(ports): if ports == "": return [] max_port = 2 ** 16 try: temp = [] for a in ports.split(","): r = a.split("-") if len(r) > 2: raise ValueError if len(r) == 1: begin = int(r[0]) end = int(r[0]) else: begin = int(r[0]) end = int(r[1]) if begin > end: raise ValueError for p in range(begin, end + 1): if p < 1 or p > max_port: raise ValueError temp.append(p) return temp except ValueError: raise ValueError(_("Ports must be numbers or ranges of numbers from 1 to %d ") % max_port) class policy: def __init__(self, name, type): self.rpms = [] self.ports = {} self.all_roles = get_all_roles() self.types = [] if type not in poltype: raise ValueError(_("You must enter a valid policy type")) if not name: raise ValueError(_("You must enter a name for your policy module for your '%s'.") % poltype[type]) try: self.ports = get_all_ports() except ValueError as e: print("Can not get port types, must be root for this information") except RuntimeError as e: print("Can not get port types", e) self.symbols = {} self.symbols["openlog"] = "set_use_kerberos(True)" self.symbols["openlog"] = "set_use_kerb_rcache(True)" self.symbols["openlog"] = "set_use_syslog(True)" self.symbols["gethostby"] = "set_use_resolve(True)" self.symbols["getaddrinfo"] = "set_use_resolve(True)" self.symbols["getnameinfo"] = "set_use_resolve(True)" self.symbols["krb"] = "set_use_kerberos(True)" self.symbols["gss_accept_sec_context"] = "set_manage_krb5_rcache(True)" self.symbols["krb5_verify_init_creds"] = "set_manage_krb5_rcache(True)" self.symbols["krb5_rd_req"] = "set_manage_krb5_rcache(True)" self.symbols["__syslog_chk"] = "set_use_syslog(True)" self.symbols["getpwnam"] = "set_use_uid(True)" self.symbols["getpwuid"] = "set_use_uid(True)" self.symbols["dbus_"] = "set_use_dbus(True)" self.symbols["pam_"] = "set_use_pam(True)" self.symbols["pam_"] = "set_use_audit(True)" self.symbols["fork"] = "add_process('fork')" self.symbols["transition"] = "add_process('transition')" self.symbols["sigchld"] = "add_process('sigchld')" self.symbols["sigkill"] = "add_process('sigkill')" self.symbols["sigstop"] = "add_process('sigstop')" self.symbols["signull"] = "add_process('signull')" self.symbols["ptrace"] = "add_process('ptrace')" self.symbols["getsched"] = "add_process('getsched')" self.symbols["setsched"] = "add_process('setsched')" self.symbols["getsession"] = "add_process('getsession')" self.symbols["getpgid"] = "add_process('getpgid')" self.symbols["setpgid"] = "add_process('setpgid')" self.symbols["getcap"] = "add_process('getcap')" self.symbols["setcap"] = "add_process('setcap')" self.symbols["share"] = "add_process('share')" self.symbols["getattr"] = "add_process('getattr')" self.symbols["setexec"] = "add_process('setexec')" self.symbols["setfscreate"] = "add_process('setfscreate')" self.symbols["noatsecure"] = "add_process('noatsecure')" self.symbols["siginh"] = "add_process('siginh')" self.symbols["kill"] = "add_process('signal_perms')" self.symbols["setrlimit"] = "add_process('setrlimit')" self.symbols["rlimitinh"] = "add_process('rlimitinh')" self.symbols["dyntransition"] = "add_process('dyntransition')" self.symbols["setcurrent"] = "add_process('setcurrent')" self.symbols["execmem"] = "add_process('execmem')" self.symbols["execstack"] = "add_process('execstack')" self.symbols["execheap"] = "add_process('execheap')" self.symbols["setkeycreate"] = "add_process('setkeycreate')" self.symbols["setsockcreate"] = "add_process('setsockcreate')" self.symbols["chown"] = "add_capability('chown')" self.symbols["dac_override"] = "add_capability('dac_override')" self.symbols["dac_read_search"] = "add_capability('dac_read_search')" self.symbols["fowner"] = "add_capability('fowner')" self.symbols["fsetid"] = "add_capability('fsetid')" self.symbols["setgid"] = "add_capability('setgid')" self.symbols["setegid"] = "add_capability('setgid')" self.symbols["setresgid"] = "add_capability('setgid')" self.symbols["setregid"] = "add_capability('setgid')" self.symbols["setresuid"] = "add_capability('setuid')" self.symbols["setuid"] = "add_capability('setuid')" self.symbols["seteuid"] = "add_capability('setuid')" self.symbols["setreuid"] = "add_capability('setuid')" self.symbols["setresuid"] = "add_capability('setuid')" self.symbols["setpcap"] = "add_capability('setpcap')" self.symbols["linux_immutable"] = "add_capability('linux_immutable')" self.symbols["net_bind_service"] = "add_capability('net_bind_service')" self.symbols["net_broadcast"] = "add_capability('net_broadcast')" self.symbols["net_admin"] = "add_capability('net_admin')" self.symbols["net_raw"] = "add_capability('net_raw')" self.symbols["ipc_lock"] = "add_capability('ipc_lock')" self.symbols["ipc_owner"] = "add_capability('ipc_owner')" self.symbols["sys_module"] = "add_capability('sys_module')" self.symbols["sys_rawio"] = "add_capability('sys_rawio')" self.symbols["chroot"] = "add_capability('sys_chroot')" self.symbols["sys_chroot"] = "add_capability('sys_chroot')" self.symbols["sys_ptrace"] = "add_capability('sys_ptrace')" self.symbols["sys_pacct"] = "add_capability('sys_pacct')" self.symbols["mount"] = "add_capability('sys_admin')" self.symbols["unshare"] = "add_capability('sys_admin')" self.symbols["sys_admin"] = "add_capability('sys_admin')" self.symbols["sys_boot"] = "add_capability('sys_boot')" self.symbols["sys_nice"] = "add_capability('sys_nice')" self.symbols["sys_resource"] = "add_capability('sys_resource')" self.symbols["sys_time"] = "add_capability('sys_time')" self.symbols["sys_tty_config"] = "add_capability('sys_tty_config')" self.symbols["mknod"] = "add_capability('mknod')" self.symbols["lease"] = "add_capability('lease')" self.symbols["audit_write"] = "add_capability('audit_write')" self.symbols["audit_control"] = "add_capability('audit_control')" self.symbols["setfcap"] = "add_capability('setfcap')" self.DEFAULT_DIRS = {} self.DEFAULT_DIRS["/etc"] = ["etc_rw", [], etc_rw] self.DEFAULT_DIRS["/tmp"] = ["tmp", [], tmp] self.DEFAULT_DIRS["rw"] = ["rw", [], rw] self.DEFAULT_DIRS["/usr/lib/systemd/system"] = ["unit_file", [], unit_file] self.DEFAULT_DIRS["/lib/systemd/system"] = ["unit_file", [], unit_file] self.DEFAULT_DIRS["/etc/systemd/system"] = ["unit_file", [], unit_file] self.DEFAULT_DIRS["/var/cache"] = ["var_cache", [], var_cache] self.DEFAULT_DIRS["/var/lib"] = ["var_lib", [], var_lib] self.DEFAULT_DIRS["/var/log"] = ["var_log", [], var_log] self.DEFAULT_DIRS["/var/run"] = ["var_run", [], var_run] self.DEFAULT_DIRS["/var/spool"] = ["var_spool", [], var_spool] self.DEFAULT_EXT = {} self.DEFAULT_EXT["_tmp_t"] = tmp self.DEFAULT_EXT["_unit_file_t"] = unit_file self.DEFAULT_EXT["_var_cache_t"] = var_cache self.DEFAULT_EXT["_var_lib_t"] = var_lib self.DEFAULT_EXT["_var_log_t"] = var_log self.DEFAULT_EXT["_var_run_t"] = var_run self.DEFAULT_EXT["_var_spool_t"] = var_spool self.DEFAULT_EXT["_port_t"] = network self.DEFAULT_KEYS = ["/etc", "/var/cache", "/var/log", "/tmp", "rw", "/var/lib", "/var/run", "/var/spool", "/etc/systemd/system", "/usr/lib/systemd/system", "/lib/systemd/system"] self.DEFAULT_TYPES = ( (self.generate_daemon_types, self.generate_daemon_rules), (self.generate_dbusd_types, self.generate_dbusd_rules), (self.generate_inetd_types, self.generate_inetd_rules), (self.generate_cgi_types, self.generate_cgi_rules), (self.generate_sandbox_types, self.generate_sandbox_rules), (self.generate_userapp_types, self.generate_userapp_rules), (self.generate_existing_user_types, self.generate_existing_user_rules), (self.generate_min_login_user_types, self.generate_login_user_rules), (self.generate_x_login_user_types, self.generate_x_login_user_rules), (self.generate_login_user_types, self.generate_login_user_rules), (self.generate_admin_user_types, self.generate_login_user_rules), (self.generate_root_user_types, self.generate_root_user_rules), (self.generate_new_types, self.generate_new_rules)) if not re.match(r"^[a-zA-Z0-9-_]+$", name): raise ValueError(_("Name must be alpha numberic with no spaces. Consider using option \"-n MODULENAME\"")) if type == CGI: self.name = "httpd_%s_script" % name else: self.name = name self.file_name = name self.capabilities = [] self.processes = [] self.type = type self.initscript = "" self.program = None self.in_tcp = [False, False, False, []] self.in_udp = [False, False, False, []] self.out_tcp = [False, False, False, []] self.out_udp = [False, False, False, []] self.use_resolve = False self.use_tmp = False self.use_uid = False self.use_syslog = False self.use_kerberos = False self.manage_krb5_rcache = False self.use_pam = False self.use_dbus = False self.use_audit = False self.use_etc = self.type not in [EUSER, NEWTYPE] self.use_localization = self.type not in [EUSER, NEWTYPE] self.use_fd = self.type not in [EUSER, NEWTYPE] self.use_terminal = False self.use_mail = False self.booleans = {} self.files = {} self.dirs = {} self.found_tcp_ports = [] self.found_udp_ports = [] self.need_tcp_type = False self.need_udp_type = False self.admin_domains = [] self.existing_domains = [] self.transition_domains = [] self.transition_users = [] self.roles = [] def __isnetset(self, l): return l[ALL] or l[RESERVED] or l[UNRESERVED] or len(l[PORTS]) > 0 def set_admin_domains(self, admin_domains): self.admin_domains = admin_domains def set_existing_domains(self, existing_domains): self.existing_domains = existing_domains def set_admin_roles(self, roles): self.roles = roles def set_transition_domains(self, transition_domains): self.transition_domains = transition_domains def set_transition_users(self, transition_users): self.transition_users = transition_users def use_in_udp(self): return self.__isnetset(self.in_udp) def use_out_udp(self): return self.__isnetset(self.out_udp) def use_udp(self): return self.use_in_udp() or self.use_out_udp() def use_in_tcp(self): return self.__isnetset(self.in_tcp) def use_out_tcp(self): return self.__isnetset(self.out_tcp) def use_tcp(self): return self.use_in_tcp() or self.use_out_tcp() def use_network(self): return self.use_tcp() or self.use_udp() def find_port(self, port, protocol="tcp"): for begin, end, p in self.ports.keys(): if port >= begin and port <= end and protocol == p: return self.ports[begin, end, protocol] return None def set_program(self, program): if self.type not in APPLICATIONS: raise ValueError(_("User Role types can not be assigned executables.")) self.program = program def set_init_script(self, initscript): if self.type != DAEMON: raise ValueError(_("Only Daemon apps can use an init script..")) self.initscript = initscript def set_in_tcp(self, all, reserved, unreserved, ports): self.in_tcp = [all, reserved, unreserved, verify_ports(ports)] def set_in_udp(self, all, reserved, unreserved, ports): self.in_udp = [all, reserved, unreserved, verify_ports(ports)] def set_out_tcp(self, all, ports): self.out_tcp = [all, False, False, verify_ports(ports)] def set_out_udp(self, all, ports): self.out_udp = [all, False, False, verify_ports(ports)] def set_use_resolve(self, val): if type(val) is not bool: raise ValueError(_("use_resolve must be a boolean value ")) self.use_resolve = val def set_use_syslog(self, val): if type(val) is not bool: raise ValueError(_("use_syslog must be a boolean value ")) self.use_syslog = val def set_use_kerberos(self, val): if type(val) is not bool: raise ValueError(_("use_kerberos must be a boolean value ")) self.use_kerberos = val def set_manage_krb5_rcache(self, val): if type(val) is not bool: raise ValueError(_("manage_krb5_rcache must be a boolean value ")) self.manage_krb5_rcache = val def set_use_pam(self, val): self.use_pam = (val is True) def set_use_dbus(self, val): self.use_dbus = (val is True) def set_use_audit(self, val): self.use_audit = (val is True) def set_use_etc(self, val): self.use_etc = (val is True) def set_use_localization(self, val): self.use_localization = (val is True) def set_use_fd(self, val): self.use_fd = (val is True) def set_use_terminal(self, val): self.use_terminal = (val is True) def set_use_mail(self, val): self.use_mail = (val is True) def set_use_tmp(self, val): if self.type in USERS: raise ValueError(_("USER Types automatically get a tmp type")) if val: self.DEFAULT_DIRS["/tmp"][1].append("/tmp") else: self.DEFAULT_DIRS["/tmp"][1] = [] def set_use_uid(self, val): self.use_uid = (val is True) def generate_uid_rules(self): if self.use_uid: return re.sub("TEMPLATETYPE", self.name, executable.te_uid_rules) else: return "" def generate_syslog_rules(self): if self.use_syslog: return re.sub("TEMPLATETYPE", self.name, executable.te_syslog_rules) else: return "" def generate_resolve_rules(self): if self.use_resolve: return re.sub("TEMPLATETYPE", self.name, executable.te_resolve_rules) else: return "" def generate_kerberos_rules(self): if self.use_kerberos: return re.sub("TEMPLATETYPE", self.name, executable.te_kerberos_rules) else: return "" def generate_manage_krb5_rcache_rules(self): if self.manage_krb5_rcache: return re.sub("TEMPLATETYPE", self.name, executable.te_manage_krb5_rcache_rules) else: return "" def generate_pam_rules(self): newte = "" if self.use_pam: newte = re.sub("TEMPLATETYPE", self.name, executable.te_pam_rules) return newte def generate_audit_rules(self): newte = "" if self.use_audit: newte = re.sub("TEMPLATETYPE", self.name, executable.te_audit_rules) return newte def generate_etc_rules(self): newte = "" if self.use_etc: newte = re.sub("TEMPLATETYPE", self.name, executable.te_etc_rules) return newte def generate_fd_rules(self): newte = "" if self.use_fd: newte = re.sub("TEMPLATETYPE", self.name, executable.te_fd_rules) return newte def generate_localization_rules(self): newte = "" if self.use_localization: newte = re.sub("TEMPLATETYPE", self.name, executable.te_localization_rules) return newte def generate_dbus_rules(self): newte = "" if self.type != DBUS and self.use_dbus: newte = re.sub("TEMPLATETYPE", self.name, executable.te_dbus_rules) return newte def generate_mail_rules(self): newte = "" if self.use_mail: newte = re.sub("TEMPLATETYPE", self.name, executable.te_mail_rules) return newte def generate_network_action(self, protocol, action, port_name): line = "" method = "corenet_%s_%s_%s" % (protocol, action, port_name) if method in sepolicy.get_methods(): line = "%s(%s_t)\n" % (method, self.name) else: line = """ gen_require(` type %s_t; ') allow %s_t %s_t:%s_socket name_%s; """ % (port_name, self.name, port_name, protocol, action) return line def generate_network_types(self): for i in self.in_tcp[PORTS]: rec = self.find_port(int(i), "tcp") if rec is None: self.need_tcp_type = True else: port_name = rec[0][:-2] line = self.generate_network_action("tcp", "bind", port_name) # line = "corenet_tcp_bind_%s(%s_t)\n" % (port_name, self.name) if line not in self.found_tcp_ports: self.found_tcp_ports.append(line) for i in self.out_tcp[PORTS]: rec = self.find_port(int(i), "tcp") if rec is None: self.need_tcp_type = True else: port_name = rec[0][:-2] line = self.generate_network_action("tcp", "connect", port_name) # line = "corenet_tcp_connect_%s(%s_t)\n" % (port_name, self.name) if line not in self.found_tcp_ports: self.found_tcp_ports.append(line) for i in self.in_udp[PORTS]: rec = self.find_port(int(i), "udp") if rec is None: self.need_udp_type = True else: port_name = rec[0][:-2] line = self.generate_network_action("udp", "bind", port_name) # line = "corenet_udp_bind_%s(%s_t)\n" % (port_name, self.name) if line not in self.found_udp_ports: self.found_udp_ports.append(line) if self.need_udp_type is True or self.need_tcp_type is True: return re.sub("TEMPLATETYPE", self.name, network.te_types) return "" def __find_path(self, file): for d in self.DEFAULT_DIRS: if file.find(d) is 0: self.DEFAULT_DIRS[d][1].append(file) return self.DEFAULT_DIRS[d] self.DEFAULT_DIRS["rw"][1].append(file) return self.DEFAULT_DIRS["rw"] def add_capability(self, capability): if capability not in self.capabilities: self.capabilities.append(capability) def set_types(self, types): self.types = types def add_process(self, process): if process not in self.processes: self.processes.append(process) def add_boolean(self, name, description): self.booleans[name] = description def add_file(self, file): self.files[file] = self.__find_path(file) def add_dir(self, file): self.dirs[file] = self.__find_path(file) def generate_capabilities(self): newte = "" self.capabilities.sort() if len(self.capabilities) > 0: newte = "allow %s_t self:capability { %s };\n" % (self.name, " ".join(self.capabilities)) return newte def generate_process(self): newte = "" self.processes.sort() if len(self.processes) > 0: newte = "allow %s_t self:process { %s };\n" % (self.name, " ".join(self.processes)) return newte def generate_network_rules(self): newte = "" if self.use_network(): newte = "\n" newte += re.sub("TEMPLATETYPE", self.name, network.te_network) if self.use_tcp(): newte += "\n" newte += re.sub("TEMPLATETYPE", self.name, network.te_tcp) if self.use_in_tcp(): newte += re.sub("TEMPLATETYPE", self.name, network.te_in_tcp) if self.need_tcp_type and len(self.in_tcp[PORTS]) > 0: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_need_port_tcp) if self.need_tcp_type and len(self.out_tcp[PORTS]) > 0: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_need_port_tcp) if self.in_tcp[ALL]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_all_ports_tcp) if self.in_tcp[RESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_reserved_ports_tcp) if self.in_tcp[UNRESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_unreserved_ports_tcp) if self.out_tcp[ALL]: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_all_ports_tcp) if self.out_tcp[RESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_reserved_ports_tcp) if self.out_tcp[UNRESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_out_unreserved_ports_tcp) for i in self.found_tcp_ports: newte += i if self.use_udp(): newte += "\n" newte += re.sub("TEMPLATETYPE", self.name, network.te_udp) if self.need_udp_type: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_need_port_udp) if self.use_in_udp(): newte += re.sub("TEMPLATETYPE", self.name, network.te_in_udp) if self.in_udp[ALL]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_all_ports_udp) if self.in_udp[RESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_reserved_ports_udp) if self.in_udp[UNRESERVED]: newte += re.sub("TEMPLATETYPE", self.name, network.te_in_unreserved_ports_udp) for i in self.found_udp_ports: newte += i return newte def generate_transition_rules(self): newte = "" for app in self.transition_domains: tmp = re.sub("TEMPLATETYPE", self.name, user.te_transition_rules) newte += re.sub("APPLICATION", app, tmp) if self.type == USER: for u in self.transition_users: temp = re.sub("TEMPLATETYPE", self.name, executable.te_run_rules) newte += re.sub("USER", u.split("_u")[0], temp) return newte def generate_admin_rules(self): newte = "" if self.type == EUSER: for d in self.existing_domains: name = d.split("_t")[0] role = name + "_r" for app in self.admin_domains: tmp = re.sub("TEMPLATETYPE", name, user.te_admin_domain_rules) if role not in self.all_roles: tmp = re.sub(role, "system_r", tmp) newte += re.sub("APPLICATION", app, tmp) return newte if self.type == RUSER: newte += re.sub("TEMPLATETYPE", self.name, user.te_admin_rules) for app in self.admin_domains: tmp = re.sub("TEMPLATETYPE", self.name, user.te_admin_domain_rules) newte += re.sub("APPLICATION", app, tmp) for u in self.transition_users: role = u.split("_u")[0] if (role + "_r") in self.all_roles: tmp = re.sub("TEMPLATETYPE", self.name, user.te_admin_trans_rules) newte += re.sub("USER", role, tmp) return newte def generate_dbus_if(self): newif = "" if self.use_dbus: newif = re.sub("TEMPLATETYPE", self.name, executable.if_dbus_rules) return newif def generate_sandbox_if(self): newif = "" if self.type != SANDBOX: return newif newif = re.sub("TEMPLATETYPE", self.name, executable.if_sandbox_rules) return newif def generate_admin_if(self): newif = "" newtypes = "" if self.initscript != "": newtypes += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_admin_types) newif += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_admin) for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: newtypes += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_admin_types) newif += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_admin_rules) if newif != "": ret = re.sub("TEMPLATETYPE", self.name, executable.if_begin_admin) ret += newtypes ret += re.sub("TEMPLATETYPE", self.name, executable.if_middle_admin) ret += newif ret += re.sub("TEMPLATETYPE", self.name, executable.if_end_admin) return ret return "" def generate_cgi_types(self): return re.sub("TEMPLATETYPE", self.file_name, executable.te_cgi_types) def generate_sandbox_types(self): return re.sub("TEMPLATETYPE", self.file_name, executable.te_sandbox_types) def generate_userapp_types(self): return re.sub("TEMPLATETYPE", self.name, executable.te_userapp_types) def generate_inetd_types(self): return re.sub("TEMPLATETYPE", self.name, executable.te_inetd_types) def generate_dbusd_types(self): return re.sub("TEMPLATETYPE", self.name, executable.te_dbusd_types) def generate_min_login_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_min_login_user_types) def generate_login_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_login_user_types) def generate_admin_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_admin_user_types) def generate_existing_user_types(self): if len(self.existing_domains) == 0: raise ValueError(_("'%s' policy modules require existing domains") % poltype[self.type]) newte = re.sub("TEMPLATETYPE", self.name, user.te_existing_user_types) newte += """gen_require(`""" for d in self.existing_domains: newte += """ type %s;""" % d role = d.split("_t")[0] + "_r" if role in self.all_roles: newte += """ role %s;""" % role newte += """ ') """ return newte def generate_x_login_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_x_login_user_types) def generate_root_user_types(self): return re.sub("TEMPLATETYPE", self.name, user.te_root_user_types) def generate_new_types(self): newte = "" if len(self.types) == 0: raise ValueError(_("Type field required")) for t in self.types: for i in self.DEFAULT_EXT: if t.endswith(i): print(t, t[:-len(i)]) newte += re.sub("TEMPLATETYPE", t[:-len(i)], self.DEFAULT_EXT[i].te_types) break if NEWTYPE and newte == "": default_ext = [] for i in self.DEFAULT_EXT: default_ext.append(i) raise ValueError(_("You need to define a new type which ends with: \n %s") % "\n ".join(default_ext)) return newte def generate_new_rules(self): return "" def generate_daemon_types(self): newte = re.sub("TEMPLATETYPE", self.name, executable.te_daemon_types) if self.initscript != "": newte += re.sub("TEMPLATETYPE", self.name, executable.te_initscript_types) return newte def generate_tmp_types(self): if self.use_tmp: return re.sub("TEMPLATETYPE", self.name, tmp.te_types) else: return "" def generate_booleans(self): newte = "" for b in self.booleans: tmp = re.sub("BOOLEAN", b, boolean.te_boolean) newte += re.sub("DESCRIPTION", self.booleans[b], tmp) return newte def generate_boolean_rules(self): newte = "" for b in self.booleans: newte += re.sub("BOOLEAN", b, boolean.te_rules) return newte def generate_sandbox_te(self): return re.sub("TEMPLATETYPE", self.name, executable.te_sandbox_types) def generate_cgi_te(self): return re.sub("TEMPLATETYPE", self.name, executable.te_cgi_types) def generate_daemon_rules(self): newif = re.sub("TEMPLATETYPE", self.name, executable.te_daemon_rules) return newif def generate_new_type_if(self): newif = "" for t in self.types: for i in self.DEFAULT_EXT: if t.endswith(i): reqtype = t[:-len(i)] + "_t" newif += re.sub("TEMPLATETYPE", t[:-len(i)], self.DEFAULT_EXT[i].if_rules) break return newif def generate_login_user_rules(self): return re.sub("TEMPLATETYPE", self.name, user.te_login_user_rules) def generate_existing_user_rules(self): nerules = re.sub("TEMPLATETYPE", self.name, user.te_existing_user_rules) return nerules def generate_x_login_user_rules(self): return re.sub("TEMPLATETYPE", self.name, user.te_x_login_user_rules) def generate_root_user_rules(self): newte = re.sub("TEMPLATETYPE", self.name, user.te_root_user_rules) return newte def generate_userapp_rules(self): return re.sub("TEMPLATETYPE", self.name, executable.te_userapp_rules) def generate_inetd_rules(self): return re.sub("TEMPLATETYPE", self.name, executable.te_inetd_rules) def generate_dbusd_rules(self): return re.sub("TEMPLATETYPE", self.name, executable.te_dbusd_rules) def generate_tmp_rules(self): if self.use_tmp: return re.sub("TEMPLATETYPE", self.name, tmp.te_rules) else: return "" def generate_cgi_rules(self): newte = "" newte += re.sub("TEMPLATETYPE", self.name, executable.te_cgi_rules) return newte def generate_sandbox_rules(self): newte = "" newte += re.sub("TEMPLATETYPE", self.name, executable.te_sandbox_rules) return newte def generate_user_if(self): newif = "" if self.use_terminal or self.type == USER: newif = re.sub("TEMPLATETYPE", self.name, executable.if_user_program_rules) if self.type in (TUSER, XUSER, AUSER, LUSER): newif += re.sub("TEMPLATETYPE", self.name, executable.if_role_change_rules) return newif def generate_if(self): newif = "" newif += re.sub("TEMPLATETYPE", self.name, executable.if_heading_rules) if self.program: newif += re.sub("TEMPLATETYPE", self.name, executable.if_program_rules) if self.initscript != "": newif += re.sub("TEMPLATETYPE", self.name, executable.if_initscript_rules) for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: newif += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_rules) for i in self.DEFAULT_DIRS[d][1]: if os.path.exists(i) and stat.S_ISSOCK(os.stat(i)[stat.ST_MODE]): newif += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].if_stream_rules) break newif += self.generate_user_if() newif += self.generate_dbus_if() newif += self.generate_admin_if() newif += self.generate_sandbox_if() newif += self.generate_new_type_if() newif += self.generate_new_rules() return newif def generate_default_types(self): return self.DEFAULT_TYPES[self.type][0]() def generate_default_rules(self): if self.DEFAULT_TYPES[self.type][1]: return self.DEFAULT_TYPES[self.type][1]() return "" def generate_roles_rules(self): newte = "" if self.type in (TUSER, XUSER, AUSER, LUSER): roles = "" if len(self.roles) > 0: newte += re.sub("TEMPLATETYPE", self.name, user.te_sudo_rules) newte += re.sub("TEMPLATETYPE", self.name, user.te_newrole_rules) for role in self.roles: tmp = re.sub("TEMPLATETYPE", self.name, user.te_roles_rules) newte += re.sub("ROLE", role, tmp) return newte def generate_te(self): newte = self.generate_default_types() for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: # CGI scripts already have a rw_t if self.type != CGI or d != "rw": newte += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].te_types) if self.type != EUSER: newte += """ ######################################## # # %s local policy # """ % self.name newte += self.generate_capabilities() newte += self.generate_process() newte += self.generate_network_types() newte += self.generate_tmp_types() newte += self.generate_booleans() newte += self.generate_default_rules() newte += self.generate_boolean_rules() for d in self.DEFAULT_KEYS: if len(self.DEFAULT_DIRS[d][1]) > 0: if self.type == EUSER: newte_tmp = "" for domain in self.existing_domains: newte_tmp += re.sub("TEMPLATETYPE_t", domain[:-2] + "_t", self.DEFAULT_DIRS[d][2].te_rules) newte += re.sub("TEMPLATETYPE_rw_t", self.name + "_rw_t", newte_tmp) else: newte += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].te_rules) for i in self.DEFAULT_DIRS[d][1]: if os.path.exists(i) and stat.S_ISSOCK(os.stat(i)[stat.ST_MODE]): if self.type == EUSER: for domain in self.existing_domains: newte += re.sub("TEMPLATETYPE", domain[:-2], self.DEFAULT_DIRS[d][2].te_stream_rules) else: newte += re.sub("TEMPLATETYPE", self.name, self.DEFAULT_DIRS[d][2].te_stream_rules) break newte += self.generate_tmp_rules() newte += self.generate_network_rules() newte += self.generate_fd_rules() newte += self.generate_etc_rules() newte += self.generate_pam_rules() newte += self.generate_uid_rules() newte += self.generate_audit_rules() newte += self.generate_syslog_rules() newte += self.generate_localization_rules() newte += self.generate_resolve_rules() newte += self.generate_roles_rules() newte += self.generate_mail_rules() newte += self.generate_transition_rules() newte += self.generate_admin_rules() newte += self.generate_dbus_rules() newte += self.generate_kerberos_rules() newte += self.generate_manage_krb5_rcache_rules() return newte def generate_fc(self): newfc = "" fclist = [] for i in self.files.keys(): if os.path.exists(i) and stat.S_ISSOCK(os.stat(i)[stat.ST_MODE]): t1 = re.sub("TEMPLATETYPE", self.name, self.files[i][2].fc_sock_file) else: t1 = re.sub("TEMPLATETYPE", self.name, self.files[i][2].fc_file) t2 = re.sub("FILENAME", i, t1) fclist.append(re.sub("FILETYPE", self.files[i][0], t2)) for i in self.dirs.keys(): t1 = re.sub("TEMPLATETYPE", self.name, self.dirs[i][2].fc_dir) t2 = re.sub("FILENAME", i, t1) fclist.append(re.sub("FILETYPE", self.dirs[i][0], t2)) if self.type in USERS + [SANDBOX]: if len(fclist) == 0: return executable.fc_user if self.type not in USERS + [SANDBOX, EUSER, NEWTYPE] and not self.program: raise ValueError(_("You must enter the executable path for your confined process")) if self.program: t1 = re.sub("EXECUTABLE", self.program, executable.fc_program) fclist.append(re.sub("TEMPLATETYPE", self.name, t1)) if self.initscript != "": t1 = re.sub("EXECUTABLE", self.initscript, executable.fc_initscript) fclist.append(re.sub("TEMPLATETYPE", self.name, t1)) fclist.sort() newfc = "\n".join(fclist) return newfc def generate_user_sh(self): newsh = "" if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER): return newsh roles = "" for role in self.roles: roles += " %s_r" % role if roles != "": roles += " system_r" tmp = re.sub("TEMPLATETYPE", self.name, script.users) newsh += re.sub("ROLES", roles, tmp) if self.type == RUSER or self.type == AUSER: for u in self.transition_users: tmp = re.sub("TEMPLATETYPE", self.name, script.admin_trans) newsh += re.sub("USER", u, tmp) if self.type == LUSER: newsh += re.sub("TEMPLATETYPE", self.name, script.min_login_user_default_context) else: newsh += re.sub("TEMPLATETYPE", self.name, script.x_login_user_default_context) return newsh def generate_sh(self): temp = re.sub("TEMPLATETYPE", self.file_name, script.compile) temp = re.sub("DOMAINTYPE", self.name, temp) if self.type == EUSER: newsh = re.sub("TEMPLATEFILE", "%s" % self.file_name, temp) else: newsh = re.sub("TEMPLATEFILE", self.file_name, temp) newsh += re.sub("DOMAINTYPE", self.name, script.manpage) if self.program: newsh += re.sub("FILENAME", self.program, script.restorecon) if self.initscript != "": newsh += re.sub("FILENAME", self.initscript, script.restorecon) for i in self.files.keys(): newsh += re.sub("FILENAME", i, script.restorecon) for i in self.dirs.keys(): newsh += re.sub("FILENAME", i, script.restorecon) for i in self.in_tcp[PORTS] + self.out_tcp[PORTS]: if self.find_port(i, "tcp") is None: t1 = re.sub("PORTNUM", "%d" % i, script.tcp_ports) newsh += re.sub("TEMPLATETYPE", self.name, t1) for i in self.in_udp[PORTS]: if self.find_port(i, "udp") is None: t1 = re.sub("PORTNUM", "%d" % i, script.udp_ports) newsh += re.sub("TEMPLATETYPE", self.name, t1) newsh += self.generate_user_sh() if (platform.linux_distribution(full_distribution_name=0)[0] in ("redhat", "centos", "SuSE", "fedora", "mandrake", "mandriva")): newsh += re.sub("TEMPLATEFILE", self.file_name, script.rpm) return newsh def generate_spec(self): newspec = "" selinux_policynvr = get_rpm_nvr_list("selinux-policy") if selinux_policynvr is None: selinux_policyver = "0.0.0" else: selinux_policyver = selinux_policynvr[1] newspec += spec.header_comment_section if self.type in APPLICATIONS: newspec += spec.define_relabel_files_begin if self.program: newspec += re.sub("FILENAME", self.program, spec.define_relabel_files_end) if self.initscript != "": newspec += re.sub("FILENAME", self.initscript, spec.define_relabel_files_end) for i in self.files.keys(): newspec += re.sub("FILENAME", i, spec.define_relabel_files_end) for i in self.dirs.keys(): newspec += re.sub("FILENAME", i, spec.define_relabel_files_end) newspec += re.sub("VERSION", selinux_policyver, spec.base_section) newspec = re.sub("MODULENAME", self.file_name, newspec) newspec = re.sub("DOMAINNAME", self.name, newspec) if len(self.rpms) > 0: newspec += "Requires(post): %s\n" % ", ".join(self.rpms) newspec += re.sub("MODULENAME", self.file_name, spec.mid_section) newspec = re.sub("DOMAINNAME", self.name, newspec) newspec = re.sub("TODAYSDATE", time.strftime("%a %b %e %Y"), newspec) if self.type not in APPLICATIONS: newspec = re.sub("%relabel_files", "", newspec) # Remove man pages from EUSER spec file if self.type == EUSER: newspec = re.sub(".*%s_selinux.8.*" % self.name, "", newspec) # Remove user context file from non users spec file if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER): newspec = re.sub(".*%s_u.*" % self.name, "", newspec) return newspec def write_spec(self, out_dir): specfile = "%s/%s_selinux.spec" % (out_dir, self.file_name) fd = open(specfile, "w") fd.write(self.generate_spec()) fd.close() return specfile def write_te(self, out_dir): tefile = "%s/%s.te" % (out_dir, self.file_name) fd = open(tefile, "w") fd.write(self.generate_te()) fd.close() return tefile def write_sh(self, out_dir): shfile = "%s/%s.sh" % (out_dir, self.file_name) fd = open(shfile, "w") fd.write(self.generate_sh()) fd.close() os.chmod(shfile, 0o750) return shfile def write_if(self, out_dir): iffile = "%s/%s.if" % (out_dir, self.file_name) fd = open(iffile, "w") fd.write(self.generate_if()) fd.close() return iffile def write_fc(self, out_dir): fcfile = "%s/%s.fc" % (out_dir, self.file_name) fd = open(fcfile, "w") fd.write(self.generate_fc()) fd.close() return fcfile def __extract_rpms(self): import yum yb = yum.YumBase() yb.setCacheDir() for pkg in yb.rpmdb.searchProvides(self.program): self.rpms.append(pkg.name) for fname in pkg.dirlist + pkg.filelist + pkg.ghostlist: for b in self.DEFAULT_DIRS: if b == "/etc": continue if fname.startswith(b): if os.path.isfile(fname): self.add_file(fname) else: self.add_dir(fname) for bpkg in yb.rpmdb.searchNames([pkg.base_package_name]): for fname in bpkg.dirlist + bpkg.filelist + bpkg.ghostlist: for b in self.DEFAULT_DIRS: if b == "/etc": continue if fname.startswith(b): if os.path.isfile(fname): self.add_file(fname) else: self.add_dir(fname) # some packages have own systemd subpackage # tor-systemd for example binary_name = self.program.split("/")[-1] for bpkg in yb.rpmdb.searchNames(["%s-systemd" % binary_name]): for fname in bpkg.filelist + bpkg.ghostlist + bpkg.dirlist: for b in self.DEFAULT_DIRS: if b == "/etc": continue if fname.startswith(b): if os.path.isfile(fname): self.add_file(fname) else: self.add_dir(fname) def gen_writeable(self): try: self.__extract_rpms() except ImportError: pass if os.path.isfile("/var/run/%s.pid" % self.name): self.add_file("/var/run/%s.pid" % self.name) if os.path.isdir("/var/run/%s" % self.name): self.add_dir("/var/run/%s" % self.name) if os.path.isdir("/var/log/%s" % self.name): self.add_dir("/var/log/%s" % self.name) if os.path.isfile("/var/log/%s.log" % self.name): self.add_file("/var/log/%s.log" % self.name) if os.path.isdir("/var/lib/%s" % self.name): self.add_dir("/var/lib/%s" % self.name) if os.path.isfile("/etc/rc.d/init.d/%s" % self.name): self.set_init_script(r"/etc/rc\.d/init\.d/%s" % self.name) # we don't want to have subdir in the .fc policy file # if we already specify labeling for parent dir temp_basepath = [] for p in self.DEFAULT_DIRS.keys(): temp_dirs = [] try: temp_basepath = self.DEFAULT_DIRS[p][1][0] + "/" except IndexError: continue for i in self.DEFAULT_DIRS[p][1]: if i.startswith(temp_basepath): temp_dirs.append(i) else: continue if len(temp_dirs) is not 0: for i in temp_dirs: if i in self.dirs.keys(): del(self.dirs[i]) elif i in self.files.keys(): del(self.files[i]) else: continue self.DEFAULT_DIRS[p][1] = list(set(self.DEFAULT_DIRS[p][1]) - set(temp_dirs)) def gen_symbols(self): if self.type not in APPLICATIONS: return if not os.path.exists(self.program): sys.stderr.write(""" *************************************** Warning %s does not exist *************************************** """ % self.program) return fd = os.popen("nm -D %s | grep U" % self.program) for s in fd.read().split(): for b in self.symbols: if s.startswith(b): exec("self.%s" % self.symbols[b]) fd.close() def generate(self, out_dir=os.getcwd()): out = "Created the following files:\n" out += "%s # %s\n" % (self.write_te(out_dir), _("Type Enforcement file")) out += "%s # %s\n" % (self.write_if(out_dir), _("Interface file")) out += "%s # %s\n" % (self.write_fc(out_dir), _("File Contexts file")) if self.type != NEWTYPE: if (platform.linux_distribution(full_distribution_name=0)[0] in ("redhat", "centos", "SuSE", "fedora", "mandrake", "mandriva")): out += "%s # %s\n" % (self.write_spec(out_dir), _("Spec file")) out += "%s # %s\n" % (self.write_sh(out_dir), _("Setup Script")) return out selinux-python-2.8/sepolicy/sepolicy/gui.py000066400000000000000000004060061330160122500212040ustar00rootroot00000000000000#!/usr/bin/python -Es # # Copyright (C) 2013 Red Hat # see file 'COPYING' for use and warranty information # # selinux gui is a tool for the examining and modifying SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # author: Ryan Hallisey rhallisey@redhat.com # author: Dan Walsh dwalsh@redhat.com # author: Miroslav Grepl mgrepl@redhat.com # # import gi gi.require_version('Gtk', '3.0') from gi.repository import Gtk from gi.repository import Gdk from gi.repository import GLib from sepolicy.sedbus import SELinuxDBus import sys import sepolicy import selinux from selinux import DISABLED, PERMISSIVE, ENFORCING import sepolicy.network import sepolicy.manpage import dbus import os import re import unicodedata PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode reverse_file_type_str = {} for f in sepolicy.file_type_str: reverse_file_type_str[sepolicy.file_type_str[f]] = f enabled = [_("No"), _("Yes")] action = [_("Disable"), _("Enable")] def cmp(a, b): if a is None and b is None: return 0 if a is None: return -1 if b is None: return 1 return (a > b) - (a < b) import distutils.sysconfig ADVANCED_LABEL = (_("Advanced >>"), _("Advanced <<")) ADVANCED_SEARCH_LABEL = (_("Advanced Search >>"), _("Advanced Search <<")) OUTBOUND_PAGE = 0 INBOUND_PAGE = 1 TRANSITIONS_FROM_PAGE = 0 TRANSITIONS_TO_PAGE = 1 TRANSITIONS_FILE_PAGE = 2 EXE_PAGE = 0 WRITABLE_PAGE = 1 APP_PAGE = 2 BOOLEANS_PAGE = 0 FILES_PAGE = 1 NETWORK_PAGE = 2 TRANSITIONS_PAGE = 3 LOGIN_PAGE = 4 USER_PAGE = 5 LOCKDOWN_PAGE = 6 SYSTEM_PAGE = 7 FILE_EQUIV_PAGE = 8 START_PAGE = 9 keys = ["boolean", "fcontext", "fcontext-equiv", "port", "login", "user", "module", "node", "interface"] DISABLED_TEXT = _(""" To change from Disabled to Enforcing mode - Change the system mode from Disabled to Permissive - Reboot, so that the system can relabel - Once the system is working as planned * Change the system mode to Enforcing """) class SELinuxGui(): def __init__(self, app=None, test=False): self.finish_init = False self.advanced_init = True self.opage = START_PAGE self.dbus = SELinuxDBus() try: customized = self.dbus.customized() except dbus.exceptions.DBusException as e: print(e) self.quit() self.init_cur() self.application = app self.filter_txt = "" builder = Gtk.Builder() # BUILDER OBJ self.code_path = distutils.sysconfig.get_python_lib(plat_specific=False) + "/sepolicy/" glade_file = self.code_path + "sepolicy.glade" builder.add_from_file(glade_file) self.outer_notebook = builder.get_object("outer_notebook") self.window = builder.get_object("SELinux_window") self.main_selection_window = builder.get_object("Main_selection_menu") self.main_advanced_label = builder.get_object("main_advanced_label") self.popup = 0 self.applications_selection_button = builder.get_object("applications_selection_button") self.revert_button = builder.get_object("Revert_button") self.busy_cursor = Gdk.Cursor(Gdk.CursorType.WATCH) self.ready_cursor = Gdk.Cursor(Gdk.CursorType.LEFT_PTR) self.initialtype = selinux.selinux_getpolicytype()[1] self.current_popup = None self.import_export = None self.clear_entry = True self.files_add = False self.network_add = False self.all_domains = [] self.installed_list = [] self.previously_modified = {} # file dialog self.file_dialog = builder.get_object("add_path_dialog") # Error check *************************************** self.error_check_window = builder.get_object("error_check_window") self.error_check_label = builder.get_object("error_check_label") self.invalid_entry = False # Advanced search window **************************** self.advanced_search_window = builder.get_object("advanced_search_window") self.advanced_search_filter = builder.get_object("advanced_filter") self.advanced_search_filter.set_visible_func(self.filter_the_data) self.advanced_search_sort = builder.get_object("advanced_sort") self.advanced_filter_entry = builder.get_object("advanced_filter_entry") self.advanced_search_treeview = builder.get_object("advanced_search_treeview") self.advanced_search = False # Login Items ************************************** self.login_label = builder.get_object("Login_label") self.login_seuser_combobox = builder.get_object("login_seuser_combobox") self.login_seuser_combolist = builder.get_object("login_seuser_liststore") self.login_name_entry = builder.get_object("login_name_entry") self.login_mls_label = builder.get_object("login_mls_label") self.login_mls_entry = builder.get_object("login_mls_entry") self.login_radio_button = builder.get_object("Login_button") self.login_treeview = builder.get_object("login_treeview") self.login_liststore = builder.get_object("login_liststore") self.login_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.login_filter = builder.get_object("login_filter") self.login_filter.set_visible_func(self.filter_the_data) self.login_popup_window = builder.get_object("login_popup_window") self.login_delete_liststore = builder.get_object("login_delete_liststore") self.login_delete_window = builder.get_object("login_delete_window") # Users Items ************************************** self.user_popup_window = builder.get_object("user_popup_window") self.user_radio_button = builder.get_object("User_button") self.user_liststore = builder.get_object("user_liststore") self.user_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.user_filter = builder.get_object("user_filter") self.user_filter.set_visible_func(self.filter_the_data) self.user_treeview = builder.get_object("user_treeview") self.user_roles_combobox = builder.get_object("user_roles_combobox") self.user_roles_combolist = builder.get_object("user_roles_liststore") self.user_label = builder.get_object("User_label") self.user_name_entry = builder.get_object("user_name_entry") self.user_mls_label = builder.get_object("user_mls_label") self.user_mls_level_entry = builder.get_object("user_mls_level_entry") self.user_mls_entry = builder.get_object("user_mls_entry") self.user_combobox = builder.get_object("selinux_user_combobox") self.user_delete_liststore = builder.get_object("user_delete_liststore") self.user_delete_window = builder.get_object("user_delete_window") # File Equiv Items ************************************** self.file_equiv_label = builder.get_object("file_equiv_label") self.file_equiv_source_entry = builder.get_object("file_equiv_source_entry") self.file_equiv_dest_entry = builder.get_object("file_equiv_dest_entry") self.file_equiv_radio_button = builder.get_object("file_equiv_button") self.file_equiv_treeview = builder.get_object("file_equiv_treeview") self.file_equiv_liststore = builder.get_object("file_equiv_liststore") self.file_equiv_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.file_equiv_popup_window = builder.get_object("file_equiv_popup_window") self.file_equiv_treefilter = builder.get_object("file_equiv_filter") self.file_equiv_treefilter.set_visible_func(self.filter_the_data) self.file_equiv_delete_liststore = builder.get_object("file_equiv_delete_liststore") self.file_equiv_delete_window = builder.get_object("file_equiv_delete_window") # System Items ************************************** self.app_system_button = builder.get_object("app_system_button") self.system_radio_button = builder.get_object("System_button") self.lockdown_radio_button = builder.get_object("Lockdown_button") self.systems_box = builder.get_object("Systems_box") self.relabel_button = builder.get_object("Relabel_button") self.relabel_button_no = builder.get_object("Relabel_button_no") self.advanced_system = builder.get_object("advanced_system") self.outer_notebook_frame = builder.get_object("outer_notebook_frame") self.system_policy_label = builder.get_object("system_policy_type_label") # Browse Items ************************************** self.select_button_browse = builder.get_object("select_button_browse") self.cancel_button_browse = builder.get_object("cancel_button_browse") # More types window items *************************** self.moreTypes_window_files = builder.get_object("moreTypes_window_files") self.more_types_files_liststore = builder.get_object("more_types_file_liststore") self.moreTypes_treeview = builder.get_object("moreTypes_treeview_files") # System policy type ******************************** self.system_policy_type_liststore = builder.get_object("system_policy_type_liststore") self.system_policy_type_combobox = builder.get_object("system_policy_type_combobox") self.policy_list = [] if self.populate_system_policy() < 2: self.advanced_system.set_visible(False) self.system_policy_label.set_visible(False) self.system_policy_type_combobox.set_visible(False) self.enforcing_button_default = builder.get_object("Enforcing_button_default") self.permissive_button_default = builder.get_object("Permissive_button_default") self.disabled_button_default = builder.get_object("Disabled_button_default") self.initialize_system_default_mode() # Lockdown Window ********************************* self.enable_unconfined_button = builder.get_object("enable_unconfined") self.disable_unconfined_button = builder.get_object("disable_unconfined") self.enable_permissive_button = builder.get_object("enable_permissive") self.disable_permissive_button = builder.get_object("disable_permissive") self.enable_ptrace_button = builder.get_object("enable_ptrace") self.disable_ptrace_button = builder.get_object("disable_ptrace") # Help Window ********************************* self.help_window = builder.get_object("help_window") self.help_text = builder.get_object("help_textv") self.info_text = builder.get_object("info_text") self.help_image = builder.get_object("help_image") self.forward_button = builder.get_object("forward_button") self.back_button = builder.get_object("back_button") # Update menu items ********************************* self.update_window = builder.get_object("update_window") self.update_treeview = builder.get_object("update_treeview") self.update_treestore = builder.get_object("Update_treestore") self.apply_button = builder.get_object("apply_button") self.update_button = builder.get_object("Update_button") # Add button objects ******************************** self.add_button = builder.get_object("Add_button") self.delete_button = builder.get_object("Delete_button") self.files_path_entry = builder.get_object("files_path_entry") self.network_ports_entry = builder.get_object("network_ports_entry") self.files_popup_window = builder.get_object("files_popup_window") self.network_popup_window = builder.get_object("network_popup_window") self.popup_network_label = builder.get_object("Network_label") self.popup_files_label = builder.get_object("files_label") self.recursive_path_toggle = builder.get_object("make_path_recursive") self.files_type_combolist = builder.get_object("files_type_combo_store") self.files_class_combolist = builder.get_object("files_class_combo_store") self.files_type_combobox = builder.get_object("files_type_combobox") self.files_class_combobox = builder.get_object("files_class_combobox") self.files_mls_label = builder.get_object("files_mls_label") self.files_mls_entry = builder.get_object("files_mls_entry") self.advanced_text_files = builder.get_object("Advanced_text_files") self.files_cancel_button = builder.get_object("cancel_delete_files") self.network_tcp_button = builder.get_object("tcp_button") self.network_udp_button = builder.get_object("udp_button") self.network_port_type_combolist = builder.get_object("network_type_combo_store") self.network_port_type_combobox = builder.get_object("network_type_combobox") self.network_mls_label = builder.get_object("network_mls_label") self.network_mls_entry = builder.get_object("network_mls_entry") self.advanced_text_network = builder.get_object("Advanced_text_network") self.network_cancel_button = builder.get_object("cancel_network_delete") # Add button objects ******************************** # Modify items ************************************** self.show_mislabeled_files_only = builder.get_object("Show_mislabeled_files") self.mislabeled_files_label = builder.get_object("mislabeled_files_label") self.warning_files = builder.get_object("warning_files") self.modify_button = builder.get_object("Modify_button") self.modify_button.set_sensitive(False) # Modify items ************************************** # Fix label ***************************************** self.fix_label_window = builder.get_object("fix_label_window") self.fixlabel_label = builder.get_object("fixlabel_label") self.fix_label_cancel = builder.get_object("fix_label_cancel") # Fix label ***************************************** # Delete items ************************************** self.files_delete_window = builder.get_object("files_delete_window") self.files_delete_treeview = builder.get_object("files_delete_treeview") self.files_delete_liststore = builder.get_object("files_delete_liststore") self.network_delete_window = builder.get_object("network_delete_window") self.network_delete_treeview = builder.get_object("network_delete_treeview") self.network_delete_liststore = builder.get_object("network_delete_liststore") # Delete items ************************************** # Progress bar ************************************** self.progress_bar = builder.get_object("progress_bar") # Progress bar ************************************** # executable_files items **************************** self.executable_files_treeview = builder.get_object("Executable_files_treeview") # Get the executable files tree view self.executable_files_filter = builder.get_object("executable_files_filter") self.executable_files_filter.set_visible_func(self.filter_the_data) self.executable_files_tab = builder.get_object("Executable_files_tab") self.executable_files_tab_tooltip_txt = self.executable_files_tab.get_tooltip_text() self.executable_files_liststore = builder.get_object("executable_files_treestore") self.executable_files_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.files_radio_button = builder.get_object("files_button") self.files_button_tooltip_txt = self.files_radio_button.get_tooltip_text() # executable_files items **************************** # writable files items ****************************** self.writable_files_treeview = builder.get_object("Writable_files_treeview") # Get the Writable files tree view self.writable_files_liststore = builder.get_object("writable_files_treestore") # Contains the tree with File Path, SELinux File Label, Class self.writable_files_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.writable_files_filter = builder.get_object("writable_files_filter") self.writable_files_filter.set_visible_func(self.filter_the_data) self.writable_files_tab = builder.get_object("Writable_files_tab") self.writable_files_tab_tooltip_txt = self.writable_files_tab.get_tooltip_text() # writable files items ****************************** # Application File Types **************************** self.application_files_treeview = builder.get_object("Application_files_treeview") # Get the Application files tree view self.application_files_filter = builder.get_object("application_files_filter") # Contains the tree with File Path, Description, Class self.application_files_filter.set_visible_func(self.filter_the_data) self.application_files_tab = builder.get_object("Application_files_tab") self.application_files_tab_tooltip_txt = self.writable_files_tab.get_tooltip_text() self.application_files_liststore = builder.get_object("application_files_treestore") self.application_files_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.application_files_tab = builder.get_object("Application_files_tab") self.application_files_tab_tooltip_txt = self.application_files_tab.get_tooltip_text() # Application File Type ***************************** # network items ************************************* self.network_radio_button = builder.get_object("network_button") self.network_button_tooltip_txt = self.network_radio_button.get_tooltip_text() self.network_out_treeview = builder.get_object("outbound_treeview") self.network_out_liststore = builder.get_object("network_out_liststore") self.network_out_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.network_out_filter = builder.get_object("network_out_filter") self.network_out_filter.set_visible_func(self.filter_the_data) self.network_out_tab = builder.get_object("network_out_tab") self.network_out_tab_tooltip_txt = self.network_out_tab.get_tooltip_text() self.network_in_treeview = builder.get_object("inbound_treeview") self.network_in_liststore = builder.get_object("network_in_liststore") self.network_in_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.network_in_filter = builder.get_object("network_in_filter") self.network_in_filter.set_visible_func(self.filter_the_data) self.network_in_tab = builder.get_object("network_in_tab") self.network_in_tab_tooltip_txt = self.network_in_tab.get_tooltip_text() # network items ************************************* # boolean items ************************************ self.boolean_treeview = builder.get_object("Boolean_treeview") # Get the booleans tree list self.boolean_liststore = builder.get_object("boolean_liststore") self.boolean_liststore.set_sort_column_id(2, Gtk.SortType.ASCENDING) self.boolean_filter = builder.get_object("boolean_filter") self.boolean_filter.set_visible_func(self.filter_the_data) self.boolean_more_detail_window = builder.get_object("booleans_more_detail_window") self.boolean_more_detail_treeview = builder.get_object("booleans_more_detail_treeview") self.boolean_more_detail_tree_data_set = builder.get_object("booleans_more_detail_liststore") self.boolean_radio_button = builder.get_object("Booleans_button") self.active_button = self.boolean_radio_button self.boolean_button_tooltip_txt = self.boolean_radio_button.get_tooltip_text() # boolean items ************************************ # transitions items ************************************ self.transitions_into_treeview = builder.get_object("transitions_into_treeview") # Get the transitions tree list Enabled, source, Executable File self.transitions_into_liststore = builder.get_object("transitions_into_liststore") # Contains the tree with self.transitions_into_liststore.set_sort_column_id(1, Gtk.SortType.ASCENDING) self.transitions_into_filter = builder.get_object("transitions_into_filter") self.transitions_into_filter.set_visible_func(self.filter_the_data) self.transitions_into_tab = builder.get_object("Transitions_into_tab") self.transitions_into_tab_tooltip_txt = self.transitions_into_tab.get_tooltip_text() self.transitions_radio_button = builder.get_object("Transitions_button") self.transitions_button_tooltip_txt = self.transitions_radio_button.get_tooltip_text() self.transitions_from_treeview = builder.get_object("transitions_from_treeview") # Get the transitions tree list self.transitions_from_treestore = builder.get_object("transitions_from_treestore") # Contains the tree with Enabled, Executable File Type, Transtype self.transitions_from_treestore.set_sort_column_id(2, Gtk.SortType.ASCENDING) self.transitions_from_filter = builder.get_object("transitions_from_filter") self.transitions_from_filter.set_visible_func(self.filter_the_data) self.transitions_from_tab = builder.get_object("Transitions_from_tab") self.transitions_from_tab_tooltip_txt = self.transitions_from_tab.get_tooltip_text() self.transitions_file_treeview = builder.get_object("file_transitions_treeview") # Get the transitions tree list self.transitions_file_liststore = builder.get_object("file_transitions_liststore") # Contains the tree with Enabled, Executable File Type, Transtype self.transitions_file_liststore.set_sort_column_id(0, Gtk.SortType.ASCENDING) self.transitions_file_filter = builder.get_object("file_transitions_filter") self.transitions_file_filter.set_visible_func(self.filter_the_data) self.transitions_file_tab = builder.get_object("file_transitions") self.transitions_file_tab_tooltip_txt = self.transitions_from_tab.get_tooltip_text() # transitions items ************************************ # Combobox and Entry items ************************** self.combobox_menu = builder.get_object("combobox_org") # This is the combobox box object, aka the arrow next to the entry text bar self.application_liststore = builder.get_object("application_liststore") self.completion_entry = builder.get_object("completion_entry") # self.combobox_menu.get_child() self.entrycompletion_obj = builder.get_object("entrycompletion_obj") #self.entrycompletion_obj = Gtk.EntryCompletion() self.entrycompletion_obj.set_minimum_key_length(0) self.entrycompletion_obj.set_text_column(0) self.entrycompletion_obj.set_match_func(self.match_func, None) self.completion_entry.set_completion(self.entrycompletion_obj) self.completion_entry.set_icon_from_stock(0, Gtk.STOCK_FIND) # Combobox and Entry items ************************** # Modify buttons ************************************ self.show_modified_only = builder.get_object("Show_modified_only_toggle") # Modify button ************************************* # status bar ***************************************** self.current_status_label = builder.get_object("Enforcing_label") self.current_status_enforcing = builder.get_object("Enforcing_button") self.current_status_permissive = builder.get_object("Permissive_button") self.status_bar = builder.get_object("status_bar") self.context_id = self.status_bar.get_context_id("SELinux status") # filters ********************************************* self.filter_entry = builder.get_object("filter_entry") self.filter_box = builder.get_object("filter_box") self.add_modify_delete_box = builder.get_object("add_modify_delete_box") # Get_model() sets the tree model filter to be the parent of the tree model (tree model has all the data in it) # Toggle button **************************************** self.cell = builder.get_object("activate") self.del_cell_files = builder.get_object("files_toggle_delete") self.del_cell_files.connect("toggled", self.on_toggle_update, self.files_delete_liststore) self.del_cell_files_equiv = builder.get_object("file_equiv_toggle_delete1") self.del_cell_files_equiv.connect("toggled", self.on_toggle_update, self.file_equiv_delete_liststore) self.del_cell_user = builder.get_object("user_toggle_delete") self.del_cell_user.connect("toggled", self.on_toggle_update, self.user_delete_liststore) self.del_cell_login = builder.get_object("login_toggle_delete") self.del_cell_login.connect("toggled", self.on_toggle_update, self.login_delete_liststore) self.del_cell_network = builder.get_object("network_toggle_delete") self.del_cell_network.connect("toggled", self.on_toggle_update, self.network_delete_liststore) self.update_cell = builder.get_object("toggle_update") # Notebook items *************************************** self.outer_notebook = builder.get_object("outer_notebook") self.inner_notebook_files = builder.get_object("files_inner_notebook") self.inner_notebook_network = builder.get_object("network_inner_notebook") self.inner_notebook_transitions = builder.get_object("transitions_inner_notebook") # logind gui *************************************** loading_gui = builder.get_object("loading_gui") self.update_cell.connect("toggled", self.on_toggle_update, self.update_treestore) self.all_entries = [] # Need to connect button on code because the tree view model is a treeviewsort self.cell.connect("toggled", self.on_toggle, self.boolean_liststore) self.loading = 1 path = None if test: self.all_domains = ["httpd_t", "abrt_t"] if app and app not in self.all_domains: self.all_domains.append(app) else: self.all_domains = sepolicy.get_all_domains() self.all_domains.sort(key=str.lower) if app and app not in self.all_domains: self.error(_("%s is not a valid domain") % app) self.quit() loading_gui.show() length = len(self.all_domains) entrypoint_dict = sepolicy.get_init_entrypoints_str() for domain in self.all_domains: # After the user selects a path in the drop down menu call # get_init_entrypoint_target(entrypoint) to get the transtype # which will give you the application self.combo_box_add(domain, domain) self.percentage = float(float(self.loading) / float(length)) self.progress_bar.set_fraction(self.percentage) self.progress_bar.set_pulse_step(self.percentage) self.idle_func() for entrypoint in entrypoint_dict.get(domain, []): path = sepolicy.find_entrypoint_path(entrypoint) if path: self.combo_box_add(path, domain) self.installed_list.append(path) self.loading += 1 loading_gui.hide() self.entrycompletion_obj.set_model(self.application_liststore) self.advanced_search_treeview.set_model(self.advanced_search_sort) dic = { "on_combo_button_clicked": self.open_combo_menu, "on_disable_ptrace_toggled": self.on_disable_ptrace, "on_SELinux_window_configure_event": self.hide_combo_menu, "on_entrycompletion_obj_match_selected": self.set_application_label, "on_filter_changed": self.get_filter_data, "on_save_changes_file_equiv_clicked": self.update_to_file_equiv, "on_save_changes_login_clicked": self.update_to_login, "on_save_changes_user_clicked": self.update_to_user, "on_save_changes_files_clicked": self.update_to_files, "on_save_changes_network_clicked": self.update_to_network, "on_Advanced_text_files_button_press_event": self.reveal_advanced, "item_in_tree_selected": self.cursor_changed, "on_Application_file_types_treeview_configure_event": self.resize_wrap, "on_save_delete_clicked": self.on_save_delete_clicked, "on_moreTypes_treeview_files_row_activated": self.populate_type_combo, "on_retry_button_files_clicked": self.invalid_entry_retry, "on_make_path_recursive_toggled": self.recursive_path, "on_files_path_entry_button_press_event": self.highlight_entry_text, "on_files_path_entry_changed": self.autofill_add_files_entry, "on_select_type_files_clicked": self.select_type_more, "on_choose_file": self.on_browse_select, "on_Enforcing_button_toggled": self.set_enforce, "on_confirmation_close": self.confirmation_close, "on_column_clicked": self.column_clicked, "on_tab_switch": self.clear_filters, "on_file_equiv_button_clicked": self.show_file_equiv_page, "on_app/system_button_clicked": self.system_interface, "on_app/users_button_clicked": self.users_interface, "on_show_advanced_search_window": self.on_show_advanced_search_window, "on_Show_mislabeled_files_toggled": self.show_mislabeled_files, "on_Browse_button_files_clicked": self.browse_for_files, "on_cancel_popup_clicked": self.close_popup, "on_treeview_cursor_changed": self.cursor_changed, "on_login_seuser_combobox_changed": self.login_seuser_combobox_change, "on_user_roles_combobox_changed": self.user_roles_combobox_change, "on_cancel_button_browse_clicked": self.close_config_window, "on_apply_button_clicked": self.apply_changes_button_press, "on_Revert_button_clicked": self.update_or_revert_changes, "on_Update_button_clicked": self.update_or_revert_changes, "on_advanced_filter_entry_changed": self.get_advanced_filter_data, "on_advanced_search_treeview_row_activated": self.advanced_item_selected, "on_Select_advanced_search_clicked": self.advanced_item_button_push, "on_info_button_button_press_event": self.on_help_button, "on_back_button_clicked": self.on_help_back_clicked, "on_forward_button_clicked": self.on_help_forward_clicked, "on_Boolean_treeview_columns_changed": self.resize_columns, "on_completion_entry_changed": self.application_selected, "on_Add_button_clicked": self.add_button_clicked, "on_Delete_button_clicked": self.delete_button_clicked, "on_Modify_button_clicked": self.modify_button_clicked, "on_Show_modified_only_toggled": self.on_show_modified_only, "on_cancel_button_config_clicked": self.close_config_window, "on_Import_button_clicked": self.import_config_show, "on_Export_button_clicked": self.export_config_show, "on_enable_unconfined_toggled": self.unconfined_toggle, "on_enable_permissive_toggled": self.permissive_toggle, "on_system_policy_type_combobox_changed": self.change_default_policy, "on_Enforcing_button_default_toggled": self.change_default_mode, "on_Permissive_button_default_toggled": self.change_default_mode, "on_Disabled_button_default_toggled": self.change_default_mode, "on_Relabel_button_toggled_cb": self.relabel_on_reboot, "on_advanced_system_button_press_event": self.reveal_advanced_system, "on_files_type_combobox_changed": self.show_more_types, "on_filter_row_changed": self.filter_the_data, "on_button_toggled": self.tab_change, "gtk_main_quit": self.closewindow } self.previously_modified_initialize(customized) builder.connect_signals(dic) self.window.show() # Show the gui to the screen GLib.timeout_add_seconds(5, self.selinux_status) self.selinux_status() self.lockdown_inited = False self.add_modify_delete_box.hide() self.filter_box.hide() if self.status == DISABLED: self.show_system_page() else: if self.application: self.applications_selection_button.set_label(self.application) self.completion_entry.set_text(self.application) self.show_applications_page() self.tab_change() else: self.clearbuttons() self.outer_notebook.set_current_page(START_PAGE) self.reinit() self.finish_init = True Gtk.main() def init_cur(self): self.cur_dict = {} for k in keys: self.cur_dict[k] = {} def remove_cur(self, ctr): i = 0 for k in self.cur_dict: for j in self.cur_dict[k]: if i == ctr: del(self.cur_dict[k][j]) return i += 1 def selinux_status(self): try: self.status = selinux.security_getenforce() except OSError: self.status = DISABLED if self.status == DISABLED: self.current_status_label.set_sensitive(False) self.current_status_enforcing.set_sensitive(False) self.current_status_permissive.set_sensitive(False) self.enforcing_button_default.set_sensitive(False) self.status_bar.push(self.context_id, _("System Status: Disabled")) self.info_text.set_label(DISABLED_TEXT) else: self.set_enforce_text(self.status) if os.path.exists('/.autorelabel'): self.relabel_button.set_active(True) else: self.relabel_button_no.set_active(True) policytype = selinux.selinux_getpolicytype()[1] mode = selinux.selinux_getenforcemode()[1] if mode == ENFORCING: self.enforcing_button_default.set_active(True) if mode == PERMISSIVE: self.permissive_button_default.set_active(True) if mode == DISABLED: self.disabled_button_default.set_active(True) return True def lockdown_init(self): if self.lockdown_inited: return self.wait_mouse() self.lockdown_inited = True self.disable_ptrace_button.set_active(selinux.security_get_boolean_active("deny_ptrace")) self.module_dict = {} for m in self.dbus.semodule_list().split("\n"): mod = m.split() if len(mod) < 3: continue self.module_dict[mod[1]] = { "priority": mod[0], "Disabled" : (len(mod) > 3) } self.enable_unconfined_button.set_active(not self.module_dict["unconfined"]["Disabled"]) self.enable_permissive_button.set_active(not self.module_dict["permissivedomains"]["Disabled"]) self.ready_mouse() def column_clicked(self, treeview, treepath, treecol, *args): iter = self.get_selected_iter() if not iter: return if self.opage == BOOLEANS_PAGE: if treecol.get_name() == "more_detail_col": self.display_more_detail(self.window, treepath) if self.opage == FILES_PAGE: visible = self.liststore.get_value(iter, 3) # If visible is true then fix mislabeled will be visible if treecol.get_name() == "restorecon_col" and visible: self.fix_mislabeled(self.liststore.get_value(iter, 0)) if self.opage == TRANSITIONS_PAGE: bool_name = self.liststore.get_value(iter, 1) if bool_name: self.boolean_radio_button.clicked() self.filter_entry.set_text(bool_name) def idle_func(self): while Gtk.events_pending(): Gtk.main_iteration() def match_func(self, completion, key_string, iter, func_data): try: if self.application_liststore.get_value(iter, 0).find(key_string) != -1: return True return False except AttributeError: pass def help_show_page(self): self.back_button.set_sensitive(self.help_page != 0) self.forward_button.set_sensitive(self.help_page < (len(self.help_list) - 1)) try: fd = open("%shelp/%s.txt" % (self.code_path, self.help_list[self.help_page]), "r") buf = fd.read() fd.close() except IOError: buf = "" help_text = self.help_text.get_buffer() help_text.set_text(buf % {"APP": self.application}) self.help_text.set_buffer(help_text) self.help_image.set_from_file("%shelp/%s.png" % (self.code_path, self.help_list[self.help_page])) self.show_popup(self.help_window) def on_help_back_clicked(self, *args): self.help_page -= 1 self.help_show_page() def on_help_forward_clicked(self, *args): self.help_page += 1 self.help_show_page() def on_help_button(self, *args): self.help_page = 0 self.help_list = [] if self.opage == START_PAGE: self.help_window.set_title(_("Help: Start Page")) self.help_list = ["start"] if self.opage == BOOLEANS_PAGE: self.help_window.set_title(_("Help: Booleans Page")) self.help_list = ["booleans", "booleans_toggled", "booleans_more", "booleans_more_show"] if self.opage == FILES_PAGE: ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: self.help_window.set_title(_("Help: Executable Files Page")) self.help_list = ["files_exec"] if ipage == WRITABLE_PAGE: self.help_window.set_title(_("Help: Writable Files Page")) self.help_list = ["files_write"] if ipage == APP_PAGE: self.help_window.set_title(_("Help: Application Types Page")) self.help_list = ["files_app"] if self.opage == NETWORK_PAGE: ipage = self.inner_notebook_network.get_current_page() if ipage == OUTBOUND_PAGE: self.help_window.set_title(_("Help: Outbound Network Connections Page")) self.help_list = ["ports_outbound"] if ipage == INBOUND_PAGE: self.help_window.set_title(_("Help: Inbound Network Connections Page")) self.help_list = ["ports_inbound"] if self.opage == TRANSITIONS_PAGE: ipage = self.inner_notebook_transitions.get_current_page() if ipage == TRANSITIONS_FROM_PAGE: self.help_window.set_title(_("Help: Transition from application Page")) self.help_list = ["transition_from", "transition_from_boolean", "transition_from_boolean_1", "transition_from_boolean_2"] if ipage == TRANSITIONS_TO_PAGE: self.help_window.set_title(_("Help: Transition into application Page")) self.help_list = ["transition_to"] if ipage == TRANSITIONS_FILE_PAGE: self.help_window.set_title(_("Help: Transition application file Page")) self.help_list = ["transition_file"] if self.opage == SYSTEM_PAGE: self.help_window.set_title(_("Help: Systems Page")) self.help_list = ["system", "system_boot_mode", "system_current_mode", "system_export", "system_policy_type", "system_relabel"] if self.opage == LOCKDOWN_PAGE: self.help_window.set_title(_("Help: Lockdown Page")) self.help_list = ["lockdown", "lockdown_unconfined", "lockdown_permissive", "lockdown_ptrace"] if self.opage == LOGIN_PAGE: self.help_window.set_title(_("Help: Login Page")) self.help_list = ["login", "login_default"] if self.opage == USER_PAGE: self.help_window.set_title(_("Help: SELinux User Page")) self.help_list = ["users"] if self.opage == FILE_EQUIV_PAGE: self.help_window.set_title(_("Help: File Equivalence Page")) self.help_list = ["file_equiv"] return self.help_show_page() def open_combo_menu(self, *args): if self.popup == 0: self.popup = 1 location = self.window.get_position() self.main_selection_window.move(location[0] + 2, location[1] + 65) self.main_selection_window.show() else: self.main_selection_window.hide() self.popup = 0 def hide_combo_menu(self, *args): self.main_selection_window.hide() self.popup = 0 def set_application_label(self, *args): self.set_application_label = True def resize_wrap(self, *args): print(args) def initialize_system_default_mode(self): self.enforce_mode = selinux.selinux_getenforcemode()[1] if self.enforce_mode == ENFORCING: self.enforce_button = self.enforcing_button_default if self.enforce_mode == PERMISSIVE: self.enforce_button = self.permissive_button_default if self.enforce_mode == DISABLED: self.enforce_button = self.disabled_button_default def populate_system_policy(self): types = next(os.walk(selinux.selinux_path(), topdown=True))[1] types.sort() ctr = 0 for item in types: iter = self.system_policy_type_liststore.append() self.system_policy_type_liststore.set_value(iter, 0, item) if item == self.initialtype: self.system_policy_type_combobox.set_active(ctr) self.typeHistory = ctr ctr += 1 return ctr def filter_the_data(self, list, iter, *args): # When there is no txt in the box show all items in the tree if self.filter_txt == "": return True try: for x in range(0, list.get_n_columns()): try: val = list.get_value(iter, x) if val is True or val is False or val is None: continue # Returns true if filter_txt exists within the val if(val.find(self.filter_txt) != -1 or val.lower().find(self.filter_txt) != -1): return True except (AttributeError, TypeError): pass except: # ValueError: pass return False def net_update(self, app, netd, protocol, direction, model): for k in netd.keys(): for t, ports in netd[k]: pkey = (",".join(ports), protocol) if pkey in self.cur_dict["port"]: if self.cur_dict["port"][pkey]["action"] == "-d": continue if t != self.cur_dict["port"][pkey]["type"]: continue self.network_initial_data_insert(model, ", ".join(ports), t, protocol) def file_equiv_initialize(self): self.wait_mouse() edict = sepolicy.get_file_equiv() self.file_equiv_liststore.clear() for f in edict: iter = self.file_equiv_liststore.append() if edict[f]["modify"]: name = self.markup(f) equiv = self.markup(edict[f]["equiv"]) else: name = f equiv = edict[f]["equiv"] self.file_equiv_liststore.set_value(iter, 0, name) self.file_equiv_liststore.set_value(iter, 1, equiv) self.file_equiv_liststore.set_value(iter, 2, edict[f]["modify"]) self.ready_mouse() def user_initialize(self): self.wait_mouse() self.user_liststore.clear() for u in sepolicy.get_selinux_users(): iter = self.user_liststore.append() self.user_liststore.set_value(iter, 0, str(u["name"])) roles = u["roles"] if "object_r" in roles: roles.remove("object_r") self.user_liststore.set_value(iter, 1, ", ".join(roles)) self.user_liststore.set_value(iter, 2, u.get("level", "")) self.user_liststore.set_value(iter, 3, u.get("range", "")) self.user_liststore.set_value(iter, 4, True) self.ready_mouse() def login_initialize(self): self.wait_mouse() self.login_liststore.clear() for u in sepolicy.get_login_mappings(): iter = self.login_liststore.append() self.login_liststore.set_value(iter, 0, u["name"]) self.login_liststore.set_value(iter, 1, u["seuser"]) self.login_liststore.set_value(iter, 2, u["mls"]) self.login_liststore.set_value(iter, 3, True) self.ready_mouse() def network_initialize(self, app): netd = sepolicy.network.get_network_connect(app, "tcp", "name_connect", check_bools=True) self.net_update(app, netd, "tcp", OUTBOUND_PAGE, self.network_out_liststore) netd = sepolicy.network.get_network_connect(app, "tcp", "name_bind", check_bools=True) self.net_update(app, netd, "tcp", INBOUND_PAGE, self.network_in_liststore) netd = sepolicy.network.get_network_connect(app, "udp", "name_bind", check_bools=True) self.net_update(app, netd, "udp", INBOUND_PAGE, self.network_in_liststore) def network_initial_data_insert(self, model, ports, portType, protocol): iter = model.append() model.set_value(iter, 0, ports) model.set_value(iter, 1, protocol) model.set_value(iter, 2, portType) model.set_value(iter, 4, True) def combo_set_active_text(self, combobox, val): ctr = 0 liststore = combobox.get_model() for i in liststore: if i[0] == val: combobox.set_active(ctr) return ctr += 1 niter = liststore.get_iter(ctr - 1) if liststore.get_value(niter, 0) == _("More..."): iter = liststore.insert_before(niter) ctr = ctr - 1 else: iter = liststore.append() liststore.set_value(iter, 0, val) combobox.set_active(ctr) def combo_get_active_text(self, combobox): liststore = combobox.get_model() index = combobox.get_active() if index < 0: return None iter = liststore.get_iter(index) return liststore.get_value(iter, 0) def combo_box_add(self, val, val1): if val is None: return iter = self.application_liststore.append() self.application_liststore.set_value(iter, 0, val) self.application_liststore.set_value(iter, 1, val1) def select_type_more(self, *args): app = self.moreTypes_treeview.get_selection() iter = app.get_selected()[1] if iter is None: return app = self.more_types_files_liststore.get_value(iter, 0) self.combo_set_active_text(self.files_type_combobox, app) self.closewindow(self.moreTypes_window_files) def advanced_item_button_push(self, *args): row = self.advanced_search_treeview.get_selection() model, iter = row.get_selected() iter = model.convert_iter_to_child_iter(iter) iter = self.advanced_search_filter.convert_iter_to_child_iter(iter) app = self.application_liststore.get_value(iter, 1) if app is None: return self.advanced_filter_entry.set_text('') self.advanced_search_window.hide() self.reveal_advanced(self.main_advanced_label) self.completion_entry.set_text(app) def advanced_item_selected(self, treeview, path, *args): iter = self.advanced_search_filter.get_iter(path) iter = self.advanced_search_filter.convert_iter_to_child_iter(iter) app = self.application_liststore.get_value(iter, 1) self.advanced_filter_entry.set_text('') self.advanced_search_window.hide() self.reveal_advanced(self.main_advanced_label) self.completion_entry.set_text(app) self.application_selected() def find_application(self, app): if app and len(app) > 0: for items in self.application_liststore: if app == items[0]: return True return False def application_selected(self, *args): self.show_mislabeled_files_only.set_visible(False) self.mislabeled_files_label.set_visible(False) self.warning_files.set_visible(False) self.filter_entry.set_text('') app = self.completion_entry.get_text() if not self.find_application(app): return self.show_applications_page() self.add_button.set_sensitive(True) self.delete_button.set_sensitive(True) # Clear the tree to prepare for a new selection otherwise self.executable_files_liststore.clear() # data will pile up everytime the user selects a new item from the drop down menu self.network_in_liststore.clear() self.network_out_liststore.clear() self.boolean_liststore.clear() self.transitions_into_liststore.clear() self.transitions_from_treestore.clear() self.application_files_liststore.clear() self.writable_files_liststore.clear() self.transitions_file_liststore.clear() try: if app[0] == '/': app = sepolicy.get_init_transtype(app) if not app: return self.application = app except IndexError: pass self.wait_mouse() self.previously_modified_initialize(self.dbus.customized()) self.reinit() self.boolean_initialize(app) self.mislabeled_files = False self.executable_files_initialize(app) self.network_initialize(app) self.writable_files_initialize(app) self.transitions_into_initialize(app) self.transitions_from_initialize(app) self.application_files_initialize(app) self.transitions_files_initialize(app) self.executable_files_tab.set_tooltip_text(_("File path used to enter the '%s' domain.") % app) self.writable_files_tab.set_tooltip_text(_("Files to which the '%s' domain can write.") % app) self.network_out_tab.set_tooltip_text(_("Network Ports to which the '%s' is allowed to connect.") % app) self.network_in_tab.set_tooltip_text(_("Network Ports to which the '%s' is allowed to listen.") % app) self.application_files_tab.set_tooltip_text(_("File Types defined for the '%s'.") % app) self.boolean_radio_button.set_tooltip_text(_("Display boolean information that can be used to modify the policy for the '%s'.") % app) self.files_radio_button.set_tooltip_text(_("Display file type information that can be used by the '%s'.") % app) self.network_radio_button.set_tooltip_text(_("Display network ports to which the '%s' can connect or listen to.") % app) self.transitions_into_tab.set_label(_("Application Transitions Into '%s'") % app) self.transitions_from_tab.set_label(_("Application Transitions From '%s'") % app) self.transitions_file_tab.set_label(_("File Transitions From '%s'") % app) self.transitions_into_tab.set_tooltip_text(_("Executables which will transition to '%s', when executing selected domains entrypoint.") % app) self.transitions_from_tab.set_tooltip_text(_("Executables which will transition to a different domain, when '%s' executes them.") % app) self.transitions_file_tab.set_tooltip_text(_("Files by '%s' with transitions to a different label.") % app) self.transitions_radio_button.set_tooltip_text(_("Display applications that can transition into or out of the '%s'.") % app) self.application = app self.applications_selection_button.set_label(self.application) self.ready_mouse() def reinit(self): sepolicy.reinit() self.fcdict = sepolicy.get_fcdict() self.local_file_paths = sepolicy.get_local_file_paths() def previously_modified_initialize(self, buf): self.cust_dict = {} for i in buf.split("\n"): rec = i.split() if len(rec) == 0: continue if rec[1] == "-D": continue if rec[0] not in self.cust_dict: self.cust_dict[rec[0]] = {} if rec[0] == "boolean": self.cust_dict["boolean"][rec[-1]] = {"active": rec[2] == "-1"} if rec[0] == "login": self.cust_dict["login"][rec[-1]] = {"seuser": rec[3], "range": rec[5]} if rec[0] == "interface": self.cust_dict["interface"][rec[-1]] = {"type": rec[3]} if rec[0] == "user": self.cust_dict["user"][rec[-1]] = {"level": "s0", "range": rec[3], "role": rec[5]} if rec[0] == "port": self.cust_dict["port"][(rec[-1], rec[-2])] = {"type": rec[3]} if rec[0] == "node": self.cust_dict["node"][rec[-1]] = {"mask": rec[3], "protocol": rec[5], "type": rec[7]} if rec[0] == "fcontext": if rec[2] == "-e": if "fcontext-equiv" not in self.cust_dict: self.cust_dict["fcontext-equiv"] = {} self.cust_dict["fcontext-equiv"][(rec[-1])] = {"equiv": rec[3]} else: self.cust_dict["fcontext"][(rec[-1], rec[3])] = {"type": rec[5]} if rec[0] == "module": self.cust_dict["module"][rec[-1]] = {"enabled": rec[2] != "-d"} if "module" not in self.cust_dict: return for semodule, button in [("unconfined", self.disable_unconfined_button), ("permissivedomains", self.disable_permissive_button)]: if semodule in self.cust_dict["module"]: button.set_active(self.cust_dict["module"][semodule]["enabled"]) for i in keys: if i not in self.cust_dict: self.cust_dict.update({i: {}}) def executable_files_initialize(self, application): self.entrypoints = sepolicy.get_entrypoints(application) for exe in self.entrypoints.keys(): if len(self.entrypoints[exe]) == 0: continue file_class = self.entrypoints[exe][1] for path in self.entrypoints[exe][0]: if (path, file_class) in self.cur_dict["fcontext"]: if self.cur_dict["fcontext"][(path, file_class)]["action"] == "-d": continue if exe != self.cur_dict["fcontext"][(path, file_class)]["type"]: continue self.files_initial_data_insert(self.executable_files_liststore, path, exe, file_class) def mislabeled(self, path): try: con = selinux.matchpathcon(path, 0)[1] cur = selinux.getfilecon(path)[1] return con != cur except OSError: return False def set_mislabeled(self, tree, path, iter, niter): if not self.mislabeled(path): return con = selinux.matchpathcon(path, 0)[1] cur = selinux.getfilecon(path)[1] self.mislabeled_files = True # Set visibility of label tree.set_value(niter, 3, True) # Has a mislabel tree.set_value(iter, 4, True) tree.set_value(niter, 4, True) tree.set_value(iter, 5, con.split(":")[2]) tree.set_value(iter, 6, cur.split(":")[2]) def writable_files_initialize(self, application): # Traversing the dictionary data struct self.writable_files = sepolicy.get_writable_files(application) for write in self.writable_files.keys(): if len(self.writable_files[write]) < 2: self.files_initial_data_insert(self.writable_files_liststore, None, write, _("all files")) continue file_class = self.writable_files[write][1] for path in self.writable_files[write][0]: if (path, file_class) in self.cur_dict["fcontext"]: if self.cur_dict["fcontext"][(path, file_class)]["action"] == "-d": continue if write != self.cur_dict["fcontext"][(path, file_class)]["type"]: continue self.files_initial_data_insert(self.writable_files_liststore, path, write, file_class) def files_initial_data_insert(self, liststore, path, seLinux_label, file_class): iter = liststore.append(None) if path is None: path = _("MISSING FILE PATH") modify = False else: modify = (path, file_class) in self.local_file_paths for p in sepolicy.find_file(path): niter = liststore.append(iter) liststore.set_value(niter, 0, p) self.set_mislabeled(liststore, p, iter, niter) if modify: path = self.markup(path) file_class = self.markup(selinux_label) file_class = self.markup(file_class) liststore.set_value(iter, 0, path) liststore.set_value(iter, 1, seLinux_label) liststore.set_value(iter, 2, file_class) liststore.set_value(iter, 7, modify) def markup(self, f): return "%s" % f def unmarkup(self, f): if f: return re.sub("$", "", re.sub("^", "", f)) return None def application_files_initialize(self, application): self.file_types = sepolicy.get_file_types(application) for app in self.file_types.keys(): if len(self.file_types[app]) == 0: continue file_class = self.file_types[app][1] for path in self.file_types[app][0]: desc = sepolicy.get_description(app, markup=self.markup) if (path, file_class) in self.cur_dict["fcontext"]: if self.cur_dict["fcontext"][(path, file_class)]["action"] == "-d": continue if app != self.cur_dict["fcontext"][(path, file_class)]["type"]: continue self.files_initial_data_insert(self.application_files_liststore, path, desc, file_class) def modified(self): i = 0 for k in self.cur_dict: if len(self.cur_dict[k]) > 0: return True return False def boolean_initialize(self, application): for blist in sepolicy.get_bools(application): for b, active in blist: if b in self.cur_dict["boolean"]: active = self.cur_dict["boolean"][b]['active'] desc = sepolicy.boolean_desc(b) self.boolean_initial_data_insert(b, desc, active) def boolean_initial_data_insert(self, val, desc, active): # Insert data from data source into tree iter = self.boolean_liststore.append() self.boolean_liststore.set_value(iter, 0, active) self.boolean_liststore.set_value(iter, 1, desc) self.boolean_liststore.set_value(iter, 2, val) self.boolean_liststore.set_value(iter, 3, _('More...')) def transitions_into_initialize(self, application): for x in sepolicy.get_transitions_into(application): active = None executable = None source = None if "boolean" in x: active = x["boolean"] if "target" in x: executable = x["target"] if "source" in x: source = x["source"] self.transitions_into_initial_data_insert(active, executable, source) def transitions_into_initial_data_insert(self, active, executable, source): iter = self.transitions_into_liststore.append() if active != None: self.transitions_into_liststore.set_value(iter, 0, enabled[active[0][1]]) # active[0][1] is either T or F (enabled is all the way at the top) else: self.transitions_into_liststore.set_value(iter, 0, "Default") self.transitions_into_liststore.set_value(iter, 2, executable) self.transitions_into_liststore.set_value(iter, 1, source) def transitions_from_initialize(self, application): for x in sepolicy.get_transitions(application): active = None executable = None transtype = None if "boolean" in x: active = x["boolean"] if "target" in x: executable_type = x["target"] if "transtype" in x: transtype = x["transtype"] self.transitions_from_initial_data_insert(active, executable_type, transtype) try: for executable in self.fcdict[executable_type]["regex"]: self.transitions_from_initial_data_insert(active, executable, transtype) except KeyError: pass def transitions_from_initial_data_insert(self, active, executable, transtype): iter = self.transitions_from_treestore.append(None) if active == None: self.transitions_from_treestore.set_value(iter, 0, "Default") self.transitions_from_treestore.set_value(iter, 5, False) else: niter = self.transitions_from_treestore.append(iter) # active[0][1] is either T or F (enabled is all the way at the top) self.transitions_from_treestore.set_value(iter, 0, enabled[active[0][1]]) markup = ('','') if active[0][1]: self.transitions_from_treestore.set_value(niter, 2, (_("To disable this transition, go to the %sBoolean section%s.") % markup)) else: self.transitions_from_treestore.set_value(niter, 2, (_("To enable this transition, go to the %sBoolean section%s.") % markup)) # active[0][0] is the Bool Name self.transitions_from_treestore.set_value(niter, 1, active[0][0]) self.transitions_from_treestore.set_value(niter, 5, True) self.transitions_from_treestore.set_value(iter, 2, executable) self.transitions_from_treestore.set_value(iter, 3, transtype) def transitions_files_initialize(self, application): for i in sepolicy.get_file_transitions(application): if 'filename' in i: filename = i['filename'] else: filename = None self.transitions_files_inital_data_insert(i['target'], i['class'], i['transtype'], filename) def transitions_files_inital_data_insert(self, path, tclass, dest, name): iter = self.transitions_file_liststore.append() self.transitions_file_liststore.set_value(iter, 0, path) self.transitions_file_liststore.set_value(iter, 1, tclass) self.transitions_file_liststore.set_value(iter, 2, dest) if name == None: name = '*' self.transitions_file_liststore.set_value(iter, 3, name) def tab_change(self, *args): self.clear_filters() self.treeview = None self.treesort = None self.treefilter = None self.liststore = None self.modify_button.set_sensitive(False) self.add_modify_delete_box.hide() self.show_modified_only.set_visible(False) self.show_mislabeled_files_only.set_visible(False) self.mislabeled_files_label.set_visible(False) self.warning_files.set_visible(False) if self.boolean_radio_button.get_active(): self.outer_notebook.set_current_page(BOOLEANS_PAGE) self.treeview = self.boolean_treeview self.show_modified_only.set_visible(True) if self.files_radio_button.get_active(): self.show_popup(self.add_modify_delete_box) self.show_modified_only.set_visible(True) self.show_mislabeled_files_only.set_visible(self.mislabeled_files) self.mislabeled_files_label.set_visible(self.mislabeled_files) self.warning_files.set_visible(self.mislabeled_files) self.outer_notebook.set_current_page(FILES_PAGE) if args[0] == self.inner_notebook_files: ipage = args[2] else: ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: self.treeview = self.executable_files_treeview category = _("executable") elif ipage == WRITABLE_PAGE: self.treeview = self.writable_files_treeview category = _("writable") elif ipage == APP_PAGE: self.treeview = self.application_files_treeview category = _("application") self.add_button.set_tooltip_text(_("Add new %(TYPE)s file path for '%(DOMAIN)s' domains.") % {"TYPE": category, "DOMAIN": self.application}) self.delete_button.set_tooltip_text(_("Delete %(TYPE)s file paths for '%(DOMAIN)s' domain.") % {"TYPE": category, "DOMAIN": self.application}) self.modify_button.set_tooltip_text(_("Modify %(TYPE)s file path for '%(DOMAIN)s' domain. Only bolded items in the list can be selected, this indicates they were modified previously.") % {"TYPE": category, "DOMAIN": self.application}) if self.network_radio_button.get_active(): self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.outer_notebook.set_current_page(NETWORK_PAGE) if args[0] == self.inner_notebook_network: ipage = args[2] else: ipage = self.inner_notebook_network.get_current_page() if ipage == OUTBOUND_PAGE: self.treeview = self.network_out_treeview category = _("connect") if ipage == INBOUND_PAGE: self.treeview = self.network_in_treeview category = _("listen for inbound connections") self.add_button.set_tooltip_text(_("Add new port definition to which the '%(APP)s' domain is allowed to %(PERM)s.") % {"APP": self.application, "PERM": category}) self.delete_button.set_tooltip_text(_("Delete modified port definitions to which the '%(APP)s' domain is allowed to %(PERM)s.") % {"APP": self.application, "PERM": category}) self.modify_button.set_tooltip_text(_("Modify port definitions to which the '%(APP)s' domain is allowed to %(PERM)s.") % {"APP": self.application, "PERM": category}) if self.transitions_radio_button.get_active(): self.outer_notebook.set_current_page(TRANSITIONS_PAGE) if args[0] == self.inner_notebook_transitions: ipage = args[2] else: ipage = self.inner_notebook_transitions.get_current_page() if ipage == TRANSITIONS_FROM_PAGE: self.treeview = self.transitions_from_treeview if ipage == TRANSITIONS_TO_PAGE: self.treeview = self.transitions_into_treeview if ipage == TRANSITIONS_FILE_PAGE: self.treeview = self.transitions_file_treeview if self.system_radio_button.get_active(): self.outer_notebook.set_current_page(SYSTEM_PAGE) self.filter_box.hide() if self.lockdown_radio_button.get_active(): self.lockdown_init() self.outer_notebook.set_current_page(LOCKDOWN_PAGE) self.filter_box.hide() if self.user_radio_button.get_active(): self.outer_notebook.set_current_page(USER_PAGE) self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.treeview = self.user_treeview self.add_button.set_tooltip_text(_("Add new SELinux User/Role definition.")) self.delete_button.set_tooltip_text(_("Delete modified SELinux User/Role definitions.")) self.modify_button.set_tooltip_text(_("Modify selected modified SELinux User/Role definitions.")) if self.login_radio_button.get_active(): self.outer_notebook.set_current_page(LOGIN_PAGE) self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.treeview = self.login_treeview self.add_button.set_tooltip_text(_("Add new Login Mapping definition.")) self.delete_button.set_tooltip_text(_("Delete modified Login Mapping definitions.")) self.modify_button.set_tooltip_text(_("Modify selected modified Login Mapping definitions.")) if self.file_equiv_radio_button.get_active(): self.outer_notebook.set_current_page(FILE_EQUIV_PAGE) self.add_modify_delete_box.show() self.show_modified_only.set_visible(True) self.treeview = self.file_equiv_treeview self.add_button.set_tooltip_text(_("Add new File Equivalence definition.")) self.delete_button.set_tooltip_text(_("Delete modified File Equivalence definitions.")) self.modify_button.set_tooltip_text(_("Modify selected modified File Equivalence definitions. Only bolded items in the list can be selected, this indicates they were modified previously.")) self.opage = self.outer_notebook.get_current_page() if self.treeview: self.filter_box.show() self.treesort = self.treeview.get_model() self.treefilter = self.treesort.get_model() self.liststore = self.treefilter.get_model() for x in range(0, self.liststore.get_n_columns()): col = self.treeview.get_column(x) if col: cell = col.get_cells()[0] if isinstance(cell, Gtk.CellRendererText): self.liststore.set_sort_func(x, self.stripsort, None) self.treeview.get_selection().unselect_all() self.modify_button.set_sensitive(False) def stripsort(self, model, row1, row2, user_data): sort_column, _ = model.get_sort_column_id() val1 = self.unmarkup(model.get_value(row1, sort_column)) val2 = self.unmarkup(model.get_value(row2, sort_column)) return cmp(val1, val2) def display_more_detail(self, windows, path): it = self.boolean_filter.get_iter(path) it = self.boolean_filter.convert_iter_to_child_iter(it) self.boolean_more_detail_tree_data_set.clear() self.boolean_more_detail_window.set_title(_("Boolean %s Allow Rules") % self.boolean_liststore.get_value(it, 2)) blist = sepolicy.get_boolean_rules(self.application, self.boolean_liststore.get_value(it, 2)) for b in blist: self.display_more_detail_init(b["source"], b["target"], b["class"], b["permlist"]) self.show_popup(self.boolean_more_detail_window) def display_more_detail_init(self, source, target, class_type, permission): iter = self.boolean_more_detail_tree_data_set.append() self.boolean_more_detail_tree_data_set.set_value(iter, 0, "allow %s %s:%s { %s };" % (source, target, class_type, " ".join(permission))) def add_button_clicked(self, *args): self.modify = False if self.opage == NETWORK_PAGE: self.popup_network_label.set_text((_("Add Network Port for %s. Ports will be created when update is applied.")) % self.application) self.network_popup_window.set_title((_("Add Network Port for %s")) % self.application) self.init_network_dialog(args) return if self.opage == FILES_PAGE: self.popup_files_label.set_text((_("Add File Labeling for %s. File labels will be created when update is applied.")) % self.application) self.files_popup_window.set_title((_("Add File Labeling for %s")) % self.application) self.init_files_dialog(args) ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: self.files_path_entry.set_text("ex: /usr/sbin/Foobar") else: self.files_path_entry.set_text("ex: /var/lib/Foobar") self.clear_entry = True if self.opage == LOGIN_PAGE: self.login_label.set_text((_("Add Login Mapping. User Mapping will be created when Update is applied."))) self.login_popup_window.set_title(_("Add Login Mapping")) self.login_init_dialog(args) self.clear_entry = True if self.opage == USER_PAGE: self.user_label.set_text((_("Add SELinux User Role. SELinux user roles will be created when update is applied."))) self.user_popup_window.set_title(_("Add SELinux Users")) self.user_init_dialog(args) self.clear_entry = True if self.opage == FILE_EQUIV_PAGE: self.file_equiv_source_entry.set_text("") self.file_equiv_dest_entry.set_text("") self.file_equiv_label.set_text((_("Add File Equivalency Mapping. Mapping will be created when update is applied."))) self.file_equiv_popup_window.set_title(_("Add SELinux File Equivalency")) self.clear_entry = True self.show_popup(self.file_equiv_popup_window) self.new_updates() def show_popup(self, window): self.current_popup = window window.show() def close_popup(self, *args): self.current_popup.hide() self.window.set_sensitive(True) return True def modify_button_clicked(self, *args): iter = None if self.treeview: iter = self.get_selected_iter() if not iter: self.modify_button.set_sensitive(False) return self.modify = True if self.opage == NETWORK_PAGE: self.modify_button_network_clicked(args) if self.opage == FILES_PAGE: self.popup_files_label.set_text((_("Modify File Labeling for %s. File labels will be created when update is applied.")) % self.application) self.files_popup_window.set_title((_("Add File Labeling for %s")) % self.application) self.delete_old_item = None self.init_files_dialog(args) self.modify = True operation = "Modify" mls = 1 ipage = self.inner_notebook_files.get_current_page() if ipage == EXE_PAGE: iter = self.executable_files_filter.convert_iter_to_child_iter(iter) self.delete_old_item = iter path = self.executable_files_liststore.get_value(iter, 0) self.files_path_entry.set_text(path) ftype = self.executable_files_liststore.get_value(iter, 1) if type != None: self.combo_set_active_text(self.files_type_combobox, ftype) tclass = self.executable_files_liststore.get_value(iter, 2) if tclass != None: self.combo_set_active_text(self.files_class_combobox, tclass) if ipage == WRITABLE_PAGE: iter = self.writable_files_filter.convert_iter_to_child_iter(iter) self.delete_old_item = iter path = self.writable_files_liststore.get_value(iter, 0) self.files_path_entry.set_text(path) type = self.writable_files_liststore.get_value(iter, 1) if type != None: self.combo_set_active_text(self.files_type_combobox, type) tclass = self.writable_files_liststore.get_value(iter, 2) if tclass != None: self.combo_set_active_text(self.files_class_combobox, tclass) if ipage == APP_PAGE: iter = self.application_files_filter.convert_iter_to_child_iter(iter) self.delete_old_item = iter path = self.application_files_liststore.get_value(iter, 0) self.files_path_entry.set_text(path) try: get_type = self.application_files_liststore.get_value(iter, 1) get_type = get_type.split("")[1].split("") except AttributeError: pass type = self.application_files_liststore.get_value(iter, 2) if type != None: self.combo_set_active_text(self.files_type_combobox, type) tclass = get_type[0] if tclass != None: self.combo_set_active_text(self.files_class_combobox, tclass) if self.opage == USER_PAGE: self.user_init_dialog(args) self.user_name_entry.set_text(self.user_liststore.get_value(iter, 0)) self.user_mls_level_entry.set_text(self.user_liststore.get_value(iter, 2)) self.user_mls_entry.set_text(self.user_liststore.get_value(iter, 3)) self.combo_set_active_text(self.user_roles_combobox, self.user_liststore.get_value(iter, 1)) self.user_label.set_text((_("Modify SELinux User Role. SELinux user roles will be modified when update is applied."))) self.user_popup_window.set_title(_("Modify SELinux Users")) self.show_popup(self.user_popup_window) if self.opage == LOGIN_PAGE: self.login_init_dialog(args) self.login_name_entry.set_text(self.login_liststore.get_value(iter, 0)) self.login_mls_entry.set_text(self.login_liststore.get_value(iter, 2)) self.combo_set_active_text(self.login_seuser_combobox, self.login_liststore.get_value(iter, 1)) self.login_label.set_text((_("Modify Login Mapping. Login Mapping will be modified when Update is applied."))) self.login_popup_window.set_title(_("Modify Login Mapping")) self.show_popup(self.login_popup_window) if self.opage == FILE_EQUIV_PAGE: self.file_equiv_source_entry.set_text(self.unmarkup(self.file_equiv_liststore.get_value(iter, 0))) self.file_equiv_dest_entry.set_text(self.unmarkup(self.file_equiv_liststore.get_value(iter, 1))) self.file_equiv_label.set_text((_("Modify File Equivalency Mapping. Mapping will be created when update is applied."))) self.file_equiv_popup_window.set_title(_("Modify SELinux File Equivalency")) self.clear_entry = True self.show_popup(self.file_equiv_popup_window) def populate_type_combo(self, tree, loc, *args): iter = self.more_types_files_liststore.get_iter(loc) ftype = self.more_types_files_liststore.get_value(iter, 0) self.combo_set_active_text(self.files_type_combobox, ftype) self.show_popup(self.files_popup_window) self.moreTypes_window_files.hide() def strip_domain(self, domain): if domain == None: return if domain.endswith("_script_t"): split_char = "_script_t" else: split_char = "_t" return domain.split(split_char)[0] def exclude_type(self, type, exclude_list): for e in exclude_list: if type.startswith(e): return True return False def init_files_dialog(self, *args): exclude_list = [] self.files_class_combobox.set_sensitive(True) self.show_popup(self.files_popup_window) ipage = self.inner_notebook_files.get_current_page() self.files_type_combolist.clear() self.files_class_combolist.clear() compare = self.strip_domain(self.application) for d in self.application_liststore: if d[0].startswith(compare) and d[0] != self.application and not d[0].startswith("httpd_sys"): exclude_list.append(self.strip_domain(d[0])) self.more_types_files_liststore.clear() try: for files in sepolicy.file_type_str: iter = self.files_class_combolist.append() self.files_class_combolist.set_value(iter, 0, sepolicy.file_type_str[files]) if ipage == EXE_PAGE and self.entrypoints != None: for exe in self.entrypoints.keys(): if exe.startswith(compare): iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, exe) iter = self.more_types_files_liststore.append() self.more_types_files_liststore.set_value(iter, 0, exe) self.files_class_combobox.set_active(4) self.files_class_combobox.set_sensitive(False) elif ipage == WRITABLE_PAGE and self.writable_files != None: for write in self.writable_files.keys(): if write.startswith(compare) and not self.exclude_type(write, exclude_list) and write in self.file_types: iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, write) iter = self.more_types_files_liststore.append() self.more_types_files_liststore.set_value(iter, 0, write) self.files_class_combobox.set_active(0) elif ipage == APP_PAGE and self.file_types != None: for app in sepolicy.get_all_file_types(): if app.startswith(compare): if app.startswith(compare) and not self.exclude_type(app, exclude_list): iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, app) iter = self.more_types_files_liststore.append() self.more_types_files_liststore.set_value(iter, 0, app) self.files_class_combobox.set_active(0) except AttributeError: print("error") pass self.files_type_combobox.set_active(0) self.files_mls_entry.set_text("s0") iter = self.files_type_combolist.append() self.files_type_combolist.set_value(iter, 0, _('More...')) def modify_button_network_clicked(self, *args): iter = self.get_selected_iter() if not iter: self.modify_button.set_sensitive(False) return self.popup_network_label.set_text((_("Modify Network Port for %s. Ports will be created when update is applied.")) % self.application) self.network_popup_window.set_title((_("Modify Network Port for %s")) % self.application) self.delete_old_item = None self.init_network_dialog(args) operation = "Modify" mls = 1 self.modify = True iter = self.get_selected_iter() port = self.liststore.get_value(iter, 0) self.network_ports_entry.set_text(port) protocol = self.liststore.get_value(iter, 1) if protocol == "tcp": self.network_tcp_button.set_active(True) elif protocol == "udp": self.network_udp_button.set_active(True) type = self.liststore.get_value(iter, 2) if type != None: self.combo_set_active_text(self.network_port_type_combobox, type) self.delete_old_item = iter def init_network_dialog(self, *args): self.show_popup(self.network_popup_window) ipage = self.inner_notebook_network.get_current_page() self.network_port_type_combolist.clear() self.network_ports_entry.set_text("") try: if ipage == OUTBOUND_PAGE: netd = sepolicy.network.get_network_connect(self.application, "tcp", "name_connect", check_bools=True) elif ipage == INBOUND_PAGE: netd = sepolicy.network.get_network_connect(self.application, "tcp", "name_bind", check_bools=True) netd += sepolicy.network.get_network_connect(self.application, "udp", "name_bind", check_bools=True) port_types = [] for k in netd.keys(): for t, ports in netd[k]: if t not in port_types + ["port_t", "unreserved_port_t"]: if t.endswith("_type"): continue port_types.append(t) port_types.sort() short_domain = self.strip_domain(self.application) if short_domain[-1] == "d": short_domain = short_domain[:-1] short_domain = short_domain + "_" ctr = 0 found = 0 for t in port_types: if t.startswith(short_domain): found = ctr iter = self.network_port_type_combolist.append() self.network_port_type_combolist.set_value(iter, 0, t) ctr += 1 self.network_port_type_combobox.set_active(found) except AttributeError: pass self.network_tcp_button.set_active(True) self.network_mls_entry.set_text("s0") def login_seuser_combobox_change(self, combo, *args): seuser = self.combo_get_active_text(combo) if self.login_mls_entry.get_text() == "": for u in sepolicy.get_selinux_users(): if seuser == u['name']: self.login_mls_entry.set_text(u.get('range', '')) def user_roles_combobox_change(self, combo, *args): serole = self.combo_get_active_text(combo) if self.user_mls_entry.get_text() == "": for u in sepolicy.get_all_roles(): if serole == u['name']: self.user_mls_entry.set_text(u.get('range', '')) def get_selected_iter(self): iter = None if not self.treeview: return None row = self.treeview.get_selection() if not row: return None treesort, iter = row.get_selected() if iter: iter = treesort.convert_iter_to_child_iter(iter) if iter: iter = self.treefilter.convert_iter_to_child_iter(iter) return iter def cursor_changed(self, *args): self.modify_button.set_sensitive(False) iter = self.get_selected_iter() if iter == None: self.modify_button.set_sensitive(False) return if not self.liststore[iter] or not self.liststore[iter][-1]: return self.modify_button.set_sensitive(self.liststore[iter][-1]) def login_init_dialog(self, *args): self.show_popup(self.login_popup_window) self.login_seuser_combolist.clear() users = sepolicy.get_all_users() users.sort() for u in users: iter = self.login_seuser_combolist.append() self.login_seuser_combolist.set_value(iter, 0, str(u)) self.login_name_entry.set_text("") self.login_mls_entry.set_text("") def user_init_dialog(self, *args): self.show_popup(self.user_popup_window) self.user_roles_combolist.clear() roles = sepolicy.get_all_roles() roles.sort() for r in roles: iter = self.user_roles_combolist.append() self.user_roles_combolist.set_value(iter, 0, str(r)) self.user_name_entry.set_text("") self.user_mls_entry.set_text("") def on_disable_ptrace(self, checkbutton): if self.finish_init: update_buffer = "boolean -m -%d deny_ptrace" % checkbutton.get_active() self.wait_mouse() try: self.dbus.semanage(update_buffer) except dbus.exceptions.DBusException as e: self.error(e) self.ready_mouse() def on_show_modified_only(self, checkbutton): length = self.liststore.get_n_columns() def dup_row(row): l = [] for i in range(0, length): l.append(row[i]) return l append_list = [] if self.opage == BOOLEANS_PAGE: if not checkbutton.get_active(): return self.boolean_initialize(self.application) for row in self.liststore: if row[2] in self.cust_dict["boolean"]: append_list.append(dup_row(row)) if self.opage == FILES_PAGE: ipage = self.inner_notebook_files.get_current_page() if not checkbutton.get_active(): if ipage == EXE_PAGE: return self.executable_files_initialize(self.application) if ipage == WRITABLE_PAGE: return self.writable_files_initialize(self.application) if ipage == APP_PAGE: return self.application_files_initialize(self.application) for row in self.liststore: if (row[0], row[2]) in self.cust_dict["fcontext"]: append_list.append(row) if self.opage == NETWORK_PAGE: if not checkbutton.get_active(): return self.network_initialize(self.application) for row in self.liststore: if (row[0], row[1]) in self.cust_dict["port"]: append_list.append(dup_row(row)) if self.opage == FILE_EQUIV_PAGE: if not checkbutton.get_active() == True: return self.file_equiv_initialize() for row in self.liststore: if row[0] in self.cust_dict["fcontext-equiv"]: append_list.append(dup_row(row)) if self.opage == USER_PAGE: if not checkbutton.get_active(): return self.user_initialize() for row in self.liststore: if row[0] in self.cust_dict["user"]: append_list.append(dup_row(row)) if self.opage == LOGIN_PAGE: if not checkbutton.get_active() == True: return self.login_initialize() for row in self.liststore: if row[0] in self.cust_dict["login"]: append_list.append(dup_row(row)) self.liststore.clear() for row in append_list: iter = self.liststore.append() for i in range(0, length): self.liststore.set_value(iter, i, row[i]) def init_modified_files_liststore(self, tree, app, ipage, operation, path, fclass, ftype): iter = tree.append(None) tree.set_value(iter, 0, path) tree.set_value(iter, 1, ftype) tree.set_value(iter, 2, fclass) def restore_to_default(self, *args): print("restore to defualt clicked...") def invalid_entry_retry(self, *args): self.closewindow(self.error_check_window) self.files_popup_window.set_sensitive(True) self.network_popup_window.set_sensitive(True) def error_check_files(self, insert_txt): if len(insert_txt) == 0 or insert_txt[0] != '/': self.error_check_window.show() self.files_popup_window.set_sensitive(False) self.network_popup_window.set_sensitive(False) self.error_check_label.set_text((_("The entry '%s' is not a valid path. Paths must begin with a '/'.")) % insert_txt) return True return False def error_check_network(self, port): try: pnum = int(port) if pnum < 1 or pnum > 65536: raise ValueError except ValueError: self.error_check_window.show() self.files_popup_window.set_sensitive(False) self.network_popup_window.set_sensitive(False) self.error_check_label.set_text((_("Port number must be between 1 and 65536"))) return True return False def show_more_types(self, *args): if self.finish_init: if self.combo_get_active_text(self.files_type_combobox) == _('More...'): self.files_popup_window.hide() self.moreTypes_window_files.show() def update_to_login(self, *args): self.close_popup() seuser = self.combo_get_active_text(self.login_seuser_combobox) mls_range = self.login_mls_entry.get_text() name = self.login_name_entry.get_text() if self.modify: iter = self.get_selected_iter() oldname = self.login_liststore.get_value(iter, 0) oldseuser = self.login_liststore.get_value(iter, 1) oldrange = self.login_liststore.get_value(iter, 2) self.liststore.set_value(iter, 0, oldname) self.liststore.set_value(iter, 1, oldseuser) self.liststore.set_value(iter, 2, oldrange) self.cur_dict["login"][name] = {"action": "-m", "range": mls_range, "seuser": seuser, "oldrange": oldrange, "oldseuser": oldseuser, "oldname": oldname} else: iter = self.liststore.append(None) self.cur_dict["login"][name] = {"action": "-a", "range": mls_range, "seuser": seuser} self.liststore.set_value(iter, 0, name) self.liststore.set_value(iter, 1, seuser) self.liststore.set_value(iter, 2, mls_range) self.new_updates() def update_to_user(self, *args): self.close_popup() roles = self.combo_get_active_text(self.user_roles_combobox) level = self.user_mls_level_entry.get_text() mls_range = self.user_mls_entry.get_text() name = self.user_name_entry.get_text() if self.modify: iter = self.get_selected_iter() oldname = self.user_liststore.get_value(iter, 0) oldroles = self.user_liststore.get_value(iter, 1) oldlevel = self.user_liststore.get_value(iter, 1) oldrange = self.user_liststore.get_value(iter, 3) self.liststore.set_value(iter, 0, oldname) self.liststore.set_value(iter, 1, oldroles) self.liststore.set_value(iter, 2, oldlevel) self.liststore.set_value(iter, 3, oldrange) self.cur_dict["user"][name] = {"action": "-m", "range": mls_range, "level": level, "role": roles, "oldrange": oldrange, "oldlevel": oldlevel, "oldroles": oldroles, "oldname": oldname} else: iter = self.liststore.append(None) if mls_range or level: self.cur_dict["user"][name] = {"action": "-a", "range": mls_range, "level": level, "role": roles} else: self.cur_dict["user"][name] = {"action": "-a", "role": roles} self.liststore.set_value(iter, 0, name) self.liststore.set_value(iter, 1, roles) self.liststore.set_value(iter, 2, level) self.liststore.set_value(iter, 3, mls_range) self.new_updates() def update_to_file_equiv(self, *args): self.close_popup() dest = self.file_equiv_dest_entry.get_text() src = self.file_equiv_source_entry.get_text() if self.modify: iter = self.get_selected_iter() olddest = self.unmarkup(self.liststore.set_value(iter, 0)) oldsrc = self.unmarkup(self.liststore.set_value(iter, 1)) self.cur_dict["fcontext-equiv"][dest] = {"action": "-m", "src": src, "oldsrc": oldsrc, "olddest": olddest} else: iter = self.liststore.append(None) self.cur_dict["fcontext-equiv"][dest] = {"action": "-a", "src": src} self.liststore.set_value(iter, 0, self.markup(dest)) self.liststore.set_value(iter, 1, self.markup(src)) def update_to_files(self, *args): self.close_popup() self.files_add = True # Insert Function will be used in the future path = self.files_path_entry.get_text() if self.error_check_files(path): return setype = self.combo_get_active_text(self.files_type_combobox) mls = self.files_mls_entry.get_text() tclass = self.combo_get_active_text(self.files_class_combobox) if self.modify: iter = self.get_selected_iter() oldpath = self.unmark(self.liststore.get_value(iter, 0)) setype = self.unmark(self.liststore.set_value(iter, 1)) oldtclass = self.liststore.get_value(iter, 2) self.cur_dict["fcontext"][(path, tclass)] = {"action": "-m", "type": setype, "oldtype": oldsetype, "oldmls": oldmls, "oldclass": oldclass} else: iter = self.liststore.append(None) self.cur_dict["fcontext"][(path, tclass)] = {"action": "-a", "type": setype} self.liststore.set_value(iter, 0, self.markup(path)) self.liststore.set_value(iter, 1, self.markup(setype)) self.liststore.set_value(iter, 2, self.markup(tclass)) self.files_add = False self.recursive_path_toggle.set_active(False) self.new_updates() def update_to_network(self, *args): self.network_add = True ports = self.network_ports_entry.get_text() if self.error_check_network(ports): return if self.network_tcp_button.get_active(): protocol = "tcp" else: protocol = "udp" setype = self.combo_get_active_text(self.network_port_type_combobox) mls = self.network_mls_entry.get_text() if self.modify: iter = self.get_selected_iter() oldports = self.unmark(self.liststore.get_value(iter, 0)) oldprotocol = self.unmark(self.liststore.get_value(iter, 1)) oldsetype = self.unmark(self.liststore.set_value(iter, 2)) self.cur_dict["port"][(ports, protocol)] = {"action": "-m", "type": setype, "mls": mls, "oldtype": oldsetype, "oldmls": oldmls, "oldprotocol": oldprotocol, "oldports": oldports} else: iter = self.liststore.append(None) self.cur_dict["port"][(ports, protocol)] = {"action": "-a", "type": setype, "mls": mls} self.liststore.set_value(iter, 0, ports) self.liststore.set_value(iter, 1, protocol) self.liststore.set_value(iter, 2, setype) self.network_add = False self.network_popup_window.hide() self.window.set_sensitive(True) self.new_updates() def delete_button_clicked(self, *args): operation = "Add" self.window.set_sensitive(False) if self.opage == NETWORK_PAGE: self.network_delete_liststore.clear() port_dict = self.cust_dict["port"] for ports, protocol in port_dict: setype = port_dict[(ports, protocol)]["type"] iter = self.network_delete_liststore.append() self.network_delete_liststore.set_value(iter, 1, ports) self.network_delete_liststore.set_value(iter, 2, protocol) self.network_delete_liststore.set_value(iter, 3, setype) self.show_popup(self.network_delete_window) return if self.opage == FILES_PAGE: self.files_delete_liststore.clear() fcontext_dict = self.cust_dict["fcontext"] for path, tclass in fcontext_dict: setype = fcontext_dict[(path, tclass)]["type"] iter = self.files_delete_liststore.append() self.files_delete_liststore.set_value(iter, 1, path) self.files_delete_liststore.set_value(iter, 2, setype) self.files_delete_liststore.set_value(iter, 3, sepolicy.file_type_str[tclass]) self.show_popup(self.files_delete_window) return if self.opage == USER_PAGE: self.user_delete_liststore.clear() user_dict = self.cust_dict["user"] for user in user_dict: roles = user_dict[user]["role"] mls = user_dict[user].get("range", "") level = user_dict[user].get("level", "") iter = self.user_delete_liststore.append() self.user_delete_liststore.set_value(iter, 1, user) self.user_delete_liststore.set_value(iter, 2, roles) self.user_delete_liststore.set_value(iter, 3, level) self.user_delete_liststore.set_value(iter, 4, mls) self.show_popup(self.user_delete_window) return if self.opage == LOGIN_PAGE: self.login_delete_liststore.clear() login_dict = self.cust_dict["login"] for login in login_dict: seuser = login_dict[login]["seuser"] mls = login_dict[login].get("range", "") iter = self.login_delete_liststore.append() self.login_delete_liststore.set_value(iter, 1, seuser) self.login_delete_liststore.set_value(iter, 2, login) self.login_delete_liststore.set_value(iter, 3, mls) self.show_popup(self.login_delete_window) return if self.opage == FILE_EQUIV_PAGE: self.file_equiv_delete_liststore.clear() for items in self.file_equiv_liststore: if items[2]: iter = self.file_equiv_delete_liststore.append() self.file_equiv_delete_liststore.set_value(iter, 1, self.unmarkup(items[0])) self.file_equiv_delete_liststore.set_value(iter, 2, self.unmarkup(items[1])) self.show_popup(self.file_equiv_delete_window) return def on_save_delete_clicked(self, *args): self.close_popup() if self.opage == NETWORK_PAGE: for delete in self.network_delete_liststore: if delete[0]: self.cur_dict["port"][(delete[1], delete[2])] = {"action": "-d", "type": delete[3]} if self.opage == FILES_PAGE: for delete in self.files_delete_liststore: if delete[0]: self.cur_dict["fcontext"][(delete[1], reverse_file_type_str[delete[3]])] = {"action": "-d", "type": delete[2]} if self.opage == USER_PAGE: for delete in self.user_delete_liststore: if delete[0]: self.cur_dict["user"][delete[1]] = {"action": "-d", "role": delete[2], "range": delete[4]} if self.opage == LOGIN_PAGE: for delete in self.login_delete_liststore: if delete[0]: self.cur_dict["login"][delete[2]] = {"action": "-d", "login": delete[2], "seuser": delete[1], "range": delete[3]} if self.opage == FILE_EQUIV_PAGE: for delete in self.file_equiv_delete_liststore: if delete[0]: self.cur_dict["fcontext-equiv"][delete[1]] = {"action": "-d", "src": delete[2]} self.new_updates() def on_save_delete_file_equiv_clicked(self, *args): for delete in self.files_delete_liststore: print(delete[0], delete[1], delete[2],) def on_toggle_update(self, cell, path, model): model[path][0] = not model[path][0] def ipage_delete(self, liststore, key): ctr = 0 for items in liststore: if items[0] == key[0] and items[2] == key[1]: iter = liststore.get_iter(ctr) liststore.remove(iter) return ctr += 1 def on_toggle(self, cell, path, model): if not path: return iter = self.boolean_filter.get_iter(path) iter = self.boolean_filter.convert_iter_to_child_iter(iter) name = model.get_value(iter, 2) model.set_value(iter, 0, not model.get_value(iter, 0)) active = model.get_value(iter, 0) if name in self.cur_dict["boolean"]: del(self.cur_dict["boolean"][name]) else: self.cur_dict["boolean"][name] = {"active": active} self.new_updates() def get_advanced_filter_data(self, entry, *args): self.filter_txt = entry.get_text() self.advanced_search_filter.refilter() def get_filter_data(self, windows, *args): #search for desired item # The txt that the use rinputs into the filter is stored in filter_txt self.filter_txt = windows.get_text() self.treefilter.refilter() def update_gui(self, *args): self.update = True self.update_treestore.clear() for bools in self.cur_dict["boolean"]: operation = self.cur_dict["boolean"][bools]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 1, sepolicy.boolean_desc(bools)) self.update_treestore.set_value(iter, 2, action[self.cur_dict["boolean"][bools]['active']]) self.update_treestore.set_value(iter, 3, True) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("SELinux name: %s")) % bools) self.update_treestore.set_value(niter, 3, False) for path, tclass in self.cur_dict["fcontext"]: operation = self.cur_dict["fcontext"][(path, tclass)]["action"] setype = self.cur_dict["fcontext"][(path, tclass)]["type"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, (_("Add file labeling for %s")) % self.application) if operation == "-d": self.update_treestore.set_value(iter, 1, (_("Delete file labeling for %s")) % self.application) if operation == "-m": self.update_treestore.set_value(iter, 1, (_("Modify file labeling for %s")) % self.application) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("File path: %s")) % path) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("File class: %s")) % sepolicy.file_type_str[tclass]) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("SELinux file type: %s")) % setype) for port, protocol in self.cur_dict["port"]: operation = self.cur_dict["port"][(port, protocol)]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 3, True) if operation == "-a": self.update_treestore.set_value(iter, 1, (_("Add ports for %s")) % self.application) if operation == "-d": self.update_treestore.set_value(iter, 1, (_("Delete ports for %s")) % self.application) if operation == "-m": self.update_treestore.set_value(iter, 1, (_("Modify ports for %s")) % self.application) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("Network ports: %s")) % port) self.update_treestore.set_value(niter, 3, False) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("Network protocol: %s")) % protocol) self.update_treestore.set_value(niter, 3, False) setype = self.cur_dict["port"][(port, protocol)]["type"] niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("SELinux file type: %s")) % setype) for user in self.cur_dict["user"]: operation = self.cur_dict["user"][user]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, _("Add user")) if operation == "-d": self.update_treestore.set_value(iter, 1, _("Delete user")) if operation == "-m": self.update_treestore.set_value(iter, 1, _("Modify user")) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 1, (_("SELinux User : %s")) % user) self.update_treestore.set_value(niter, 3, False) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) roles = self.cur_dict["user"][user]["role"] self.update_treestore.set_value(niter, 1, (_("Roles: %s")) % roles) mls = self.cur_dict["user"][user].get("range", "") niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, _("MLS/MCS Range: %s") % mls) for login in self.cur_dict["login"]: operation = self.cur_dict["login"][login]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, _("Add login mapping")) if operation == "-d": self.update_treestore.set_value(iter, 1, _("Delete login mapping")) if operation == "-m": self.update_treestore.set_value(iter, 1, _("Modify login mapping")) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("Login Name : %s")) % login) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) seuser = self.cur_dict["login"][login]["seuser"] self.update_treestore.set_value(niter, 1, (_("SELinux User: %s")) % seuser) mls = self.cur_dict["login"][login].get("range", "") niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, _("MLS/MCS Range: %s") % mls) for path in self.cur_dict["fcontext-equiv"]: operation = self.cur_dict["fcontext-equiv"][path]["action"] iter = self.update_treestore.append(None) self.update_treestore.set_value(iter, 0, True) self.update_treestore.set_value(iter, 2, operation) self.update_treestore.set_value(iter, 0, True) if operation == "-a": self.update_treestore.set_value(iter, 1, (_("Add file equiv labeling."))) if operation == "-d": self.update_treestore.set_value(iter, 1, (_("Delete file equiv labeling."))) if operation == "-m": self.update_treestore.set_value(iter, 1, (_("Modify file equiv labeling."))) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) self.update_treestore.set_value(niter, 1, (_("File path : %s")) % path) niter = self.update_treestore.append(iter) self.update_treestore.set_value(niter, 3, False) src = self.cur_dict["fcontext-equiv"][path]["src"] self.update_treestore.set_value(niter, 1, (_("Equivalence: %s")) % src) self.show_popup(self.update_window) def set_active_application_button(self): if self.boolean_radio_button.get_active(): self.active_button = self.boolean_radio_button if self.files_radio_button.get_active(): self.active_button = self.files_radio_button if self.transitions_radio_button.get_active(): self.active_button = self.transitions_radio_button if self.network_radio_button.get_active(): self.active_button = self.network_radio_button def clearbuttons(self, clear=True): self.main_selection_window.hide() self.boolean_radio_button.set_visible(False) self.files_radio_button.set_visible(False) self.network_radio_button.set_visible(False) self.transitions_radio_button.set_visible(False) self.system_radio_button.set_visible(False) self.lockdown_radio_button.set_visible(False) self.user_radio_button.set_visible(False) self.login_radio_button.set_visible(False) if clear: self.completion_entry.set_text("") def show_system_page(self): self.clearbuttons() self.system_radio_button.set_visible(True) self.lockdown_radio_button.set_visible(True) self.applications_selection_button.set_label(_("System")) self.system_radio_button.set_active(True) self.tab_change() self.idle_func() def show_file_equiv_page(self, *args): self.clearbuttons() self.file_equiv_initialize() self.file_equiv_radio_button.set_active(True) self.applications_selection_button.set_label(_("File Equivalence")) self.tab_change() self.idle_func() self.add_button.set_sensitive(True) self.delete_button.set_sensitive(True) def show_users_page(self): self.clearbuttons() self.login_radio_button.set_visible(True) self.user_radio_button.set_visible(True) self.applications_selection_button.set_label(_("Users")) self.login_radio_button.set_active(True) self.tab_change() self.user_initialize() self.login_initialize() self.idle_func() self.add_button.set_sensitive(True) self.delete_button.set_sensitive(True) def show_applications_page(self): self.clearbuttons(False) self.boolean_radio_button.set_visible(True) self.files_radio_button.set_visible(True) self.network_radio_button.set_visible(True) self.transitions_radio_button.set_visible(True) self.boolean_radio_button.set_active(True) self.tab_change() self.idle_func() def system_interface(self, *args): self.show_system_page() def users_interface(self, *args): self.show_users_page() def show_mislabeled_files(self, checkbutton, *args): iterlist = [] ctr = 0 ipage = self.inner_notebook_files.get_current_page() if checkbutton.get_active() == True: for items in self.liststore: iter = self.treesort.get_iter(ctr) iter = self.treesort.convert_iter_to_child_iter(iter) iter = self.treefilter.convert_iter_to_child_iter(iter) if iter != None: if self.liststore.get_value(iter, 4) == False: iterlist.append(iter) ctr += 1 for iters in iterlist: self.liststore.remove(iters) elif self.application != None: self.liststore.clear() if ipage == EXE_PAGE: self.executable_files_initialize(self.application) elif ipage == WRITABLE_PAGE: self.writable_files_initialize(self.application) elif ipage == APP_PAGE: self.application_files_initialize(self.application) def fix_mislabeled(self, path): cur = selinux.getfilecon(path)[1].split(":")[2] con = selinux.matchpathcon(path, 0)[1].split(":")[2] if self.verify(_("Run restorecon on %(PATH)s to change its type from %(CUR_CONTEXT)s to the default %(DEF_CONTEXT)s?") % {"PATH": path, "CUR_CONTEXT": cur, "DEF_CONTEXT": con}, title="restorecon dialog") == Gtk.ResponseType.YES: self.dbus.restorecon(path) self.application_selected() def new_updates(self, *args): self.update_button.set_sensitive(self.modified()) self.revert_button.set_sensitive(self.modified()) def update_or_revert_changes(self, button, *args): self.update_gui() self.update = (button.get_label() == _("Update")) if self.update: self.update_window.set_title(_("Update Changes")) else: self.update_window.set_title(_("Revert Changes")) def apply_changes_button_press(self, *args): self.close_popup() if self.update: self.update_the_system() else: self.revert_data() self.finish_init = False self.previously_modified_initialize(self.dbus.customized()) self.finish_init = True self.clear_filters() self.application_selected() self.new_updates() self.update_treestore.clear() def update_the_system(self, *args): self.close_popup() update_buffer = self.format_update() self.wait_mouse() try: self.dbus.semanage(update_buffer) except dbus.exceptions.DBusException as e: print(e) self.ready_mouse() self.init_cur() def ipage_value_lookup(self, lookup): ipage_values = {"Executable Files": 0, "Writable Files": 1, "Application File Type": 2, "Inbound": 1, "Outbound": 0} for value in ipage_values: if value == lookup: return ipage_values[value] return "Booleans" def get_attributes_update(self, attribute): attribute = attribute.split(": ")[1] bool_id = attribute.split(": ")[0] if bool_id == "SELinux name": self.bool_revert = attribute else: return attribute def format_update(self): self.revert_data() update_buffer = "" for k in self.cur_dict: if k in "boolean": for b in self.cur_dict[k]: update_buffer += "boolean -m -%d %s\n" % (self.cur_dict[k][b]["active"], b) if k in "login": for l in self.cur_dict[k]: if self.cur_dict[k][l]["action"] == "-d": update_buffer += "login -d %s\n" % l elif "range" in self.cur_dict[k][l]: update_buffer += "login %s -s %s -r %s %s\n" % (self.cur_dict[k][l]["action"], self.cur_dict[k][l]["seuser"], self.cur_dict[k][l]["range"], l) else: update_buffer += "login %s -s %s %s\n" % (self.cur_dict[k][l]["action"], self.cur_dict[k][l]["seuser"], l) if k in "user": for u in self.cur_dict[k]: if self.cur_dict[k][u]["action"] == "-d": update_buffer += "user -d %s\n" % u elif "level" in self.cur_dict[k][u] and "range" in self.cur_dict[k][u]: update_buffer += "user %s -L %s -r %s -R %s %s\n" % (self.cur_dict[k][u]["action"], self.cur_dict[k][u]["level"], self.cur_dict[k][u]["range"], self.cur_dict[k][u]["role"], u) else: update_buffer += "user %s -R %s %s\n" % (self.cur_dict[k][u]["action"], self.cur_dict[k][u]["role"], u) if k in "fcontext-equiv": for f in self.cur_dict[k]: if self.cur_dict[k][f]["action"] == "-d": update_buffer += "fcontext -d %s\n" % f else: update_buffer += "fcontext %s -e %s %s\n" % (self.cur_dict[k][f]["action"], self.cur_dict[k][f]["src"], f) if k in "fcontext": for f in self.cur_dict[k]: if self.cur_dict[k][f]["action"] == "-d": update_buffer += "fcontext -d %s\n" % f else: update_buffer += "fcontext %s -t %s -f %s %s\n" % (self.cur_dict[k][f]["action"], self.cur_dict[k][f]["type"], self.cur_dict[k][f]["class"], f) if k in "port": for port, protocol in self.cur_dict[k]: if self.cur_dict[k][(port, protocol)]["action"] == "-d": update_buffer += "port -d -p %s %s\n" % (protocol, port) else: update_buffer += "port %s -t %s -p %s %s\n" % (self.cur_dict[k][f]["action"], self.cur_dict[k][f]["type"], procotol, port) return update_buffer def revert_data(self): ctr = 0 remove_list = [] update_buffer = "" for items in self.update_treestore: if not self.update_treestore[ctr][0]: remove_list.append(ctr) ctr += 1 remove_list.reverse() for ctr in remove_list: self.remove_cur(ctr) def reveal_advanced_system(self, label, *args): advanced = label.get_text() == ADVANCED_LABEL[0] if advanced: label.set_text(ADVANCED_LABEL[1]) else: label.set_text(ADVANCED_LABEL[0]) self.system_policy_label.set_visible(advanced) self.system_policy_type_combobox.set_visible(advanced) def reveal_advanced(self, label, *args): advanced = label.get_text() == ADVANCED_LABEL[0] if advanced: label.set_text(ADVANCED_LABEL[1]) else: label.set_text(ADVANCED_LABEL[0]) self.files_mls_label.set_visible(advanced) self.files_mls_entry.set_visible(advanced) self.network_mls_label.set_visible(advanced) self.network_mls_entry.set_visible(advanced) def on_show_advanced_search_window(self, label, *args): if label.get_text() == ADVANCED_SEARCH_LABEL[1]: label.set_text(ADVANCED_SEARCH_LABEL[0]) self.close_popup() else: label.set_text(ADVANCED_SEARCH_LABEL[1]) self.show_popup(self.advanced_search_window) def set_enforce_text(self, value): if value: self.status_bar.push(self.context_id, _("System Status: Enforcing")) self.current_status_enforcing.set_active(True) else: self.status_bar.push(self.context_id, _("System Status: Permissive")) self.current_status_permissive.set_active(True) def set_enforce(self, button): if not self.finish_init: return self.dbus.setenforce(button.get_active()) self.set_enforce_text(button.get_active()) def on_browse_select(self, *args): filename = self.file_dialog.get_filename() if filename == None: return self.clear_entry = False self.file_dialog.hide() self.files_path_entry.set_text(filename) if self.import_export == 'Import': self.import_config(filename) elif self.import_export == 'Export': self.export_config(filename) def recursive_path(self, *args): path = self.files_path_entry.get_text() if self.recursive_path_toggle.get_active(): if not path.endswith("(/.*)?"): self.files_path_entry.set_text(path + "(/.*)?") elif path.endswith("(/.*)?"): path = path.split("(/.*)?")[0] self.files_path_entry.set_text(path) def highlight_entry_text(self, entry_obj, *args): txt = entry_obj.get_text() if self.clear_entry: entry_obj.set_text('') self.clear_entry = False def autofill_add_files_entry(self, entry): text = entry.get_text() if text == '': return if text.endswith("(/.*)?"): self.recursive_path_toggle.set_active(True) for d in sepolicy.DEFAULT_DIRS: if text.startswith(d): for t in self.files_type_combolist: if t[0].endswith(sepolicy.DEFAULT_DIRS[d]): self.combo_set_active_text(self.files_type_combobox, t[0]) def resize_columns(self, *args): self.boolean_column_1 = self.boolean_treeview.get_col(1) width = self.boolean_column_1.get_width() renderer = self.boolean_column_1.get_cell_renderers() def browse_for_files(self, *args): self.file_dialog.show() def close_config_window(self, *args): self.file_dialog.hide() def change_default_policy(self, *args): if self.typeHistory == self.system_policy_type_combobox.get_active(): return if self.verify(_("Changing the policy type will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system. Do you wish to continue?")) == Gtk.ResponseType.NO: self.system_policy_type_combobox.set_active(self.typeHistory) return None self.dbus.change_default_policy(self.combo_get_active_text(self.system_policy_type_combobox)) self.dbus.relabel_on_boot(True) self.typeHistory = self.system_policy_type_combobox.get_active() def change_default_mode(self, button): if not self.finish_init: return self.enabled_changed(button) if button.get_active(): self.dbus.change_default_mode(button.get_label().lower()) def import_config_show(self, *args): self.file_dialog.set_action(Gtk.FileChooserAction.OPEN) self.file_dialog.set_title("Import Configuration") self.file_dialog.show() #self.file_dialog.set_uri('/tmp') self.import_export = 'Import' def export_config_show(self, *args): self.file_dialog.set_action(Gtk.FileChooserAction.SAVE) self.file_dialog.set_title("Export Configuration") self.file_dialog.show() self.import_export = 'Export' def export_config(self, filename): self.wait_mouse() buf = self.dbus.customized() fd = open(filename, 'w') fd.write(buf) fd.close() self.ready_mouse() def import_config(self, filename): fd = open(filename, "r") buf = fd.read() fd.close() self.wait_mouse() try: self.dbus.semanage(buf) except OSError: pass self.ready_mouse() def init_dictionary(self, dic, app, ipage, operation, p, q, ftype, mls, changed, old): if (app, ipage, operation) not in dic: dic[app, ipage, operation] = {} if (p, q) not in dic[app, ipage, operation]: dic[app, ipage, operation][p, q] = {'type': ftype, 'mls': mls, 'changed': changed, 'old': old} def translate_bool(self, b): b = b.split('-')[1] if b == '0': return False if b == '1': return True def relabel_on_reboot(self, *args): active = self.relabel_button.get_active() exists = os.path.exists("/.autorelabel") if active and exists: return if not active and not exists: return try: self.dbus.relabel_on_boot(active) except dbus.exceptions.DBusException as e: self.error(e) def closewindow(self, window, *args): window.hide() self.recursive_path_toggle.set_active(False) self.window.set_sensitive(True) if self.moreTypes_window_files == window: self.show_popup(self.files_popup_window) if self.combo_get_active_text(self.files_type_combobox) == _('More...'): self.files_type_combobox.set_active(0) if self.error_check_window == window: if self.files_add: self.show_popup(self.files_popup_window) elif self.network_add: self.show_popup(self.network_popup_window) if self.files_mls_label.get_visible() or self.network_mls_label.get_visible(): self.advanced_text_files.set_visible(True) self.files_mls_label.set_visible(False) self.files_mls_entry.set_visible(False) self.advanced_text_network.set_visible(True) self.network_mls_label.set_visible(False) self.network_mls_entry.set_visible(False) if self.main_advanced_label.get_text() == ADVANCED_SEARCH_LABEL[1]: self.main_advanced_label.set_text(ADVANCED_SEARCH_LABEL[0]) return True def wait_mouse(self): self.window.get_window().set_cursor(self.busy_cursor) self.idle_func() def ready_mouse(self): self.window.get_window().set_cursor(self.ready_cursor) self.idle_func() def verify(self, message, title=""): dlg = Gtk.MessageDialog(None, 0, Gtk.MessageType.INFO, Gtk.ButtonsType.YES_NO, message) dlg.set_title(title) dlg.set_position(Gtk.WindowPosition.MOUSE) dlg.show_all() rc = dlg.run() dlg.destroy() return rc def error(self, message): dlg = Gtk.MessageDialog(None, 0, Gtk.MessageType.ERROR, Gtk.ButtonsType.CLOSE, message) dlg.set_position(Gtk.WindowPosition.MOUSE) dlg.show_all() dlg.run() dlg.destroy() def enabled_changed(self, radio): if not radio.get_active(): return label = radio.get_label() if label == 'Disabled' and self.enforce_mode != DISABLED: if self.verify(_("Changing to SELinux disabled requires a reboot. It is not recommended. If you later decide to turn SELinux back on, the system will be required to relabel. If you just want to see if SELinux is causing a problem on your system, you can go to permissive mode which will only log errors and not enforce SELinux policy. Permissive mode does not require a reboot. Do you wish to continue?")) == Gtk.ResponseType.NO: self.enforce_button.set_active(True) if label != 'Disabled' and self.enforce_mode == DISABLED: if self.verify(_("Changing to SELinux enabled will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system. Do you wish to continue?")) == Gtk.ResponseType.NO: self.enforce_button.set_active(True) self.enforce_button = radio def clear_filters(self, *args): self.filter_entry.set_text('') self.show_modified_only.set_active(False) def unconfined_toggle(self, *args): if not self.finish_init: return self.wait_mouse() if self.enable_unconfined_button.get_active(): self.dbus.semanage("module -e unconfined") else: self.dbus.semanage("module -d unconfined") self.ready_mouse() def permissive_toggle(self, *args): if not self.finish_init: return self.wait_mouse() if self.enable_permissive_button.get_active(): self.dbus.semanage("module -e permissivedomains") else: self.dbus.semanage("module -d permissivedomains") self.ready_mouse() def confirmation_close(self, button, *args): if len(self.update_treestore) > 0: if self.verify(_("You are attempting to close the application without applying your changes.\n * To apply changes you have made during this session, click No and click Update.\n * To leave the application without applying your changes, click Yes. All changes that you have made during this session will be lost."), _("Loss of data Dialog")) == Gtk.ResponseType.NO: return True self.quit() def quit(self, *args): sys.exit(0) if __name__ == '__main__': start = SELinuxGui() selinux-python-2.8/sepolicy/sepolicy/help/000077500000000000000000000000001330160122500207705ustar00rootroot00000000000000selinux-python-2.8/sepolicy/sepolicy/help/__init__.py000066400000000000000000000000001330160122500230670ustar00rootroot00000000000000selinux-python-2.8/sepolicy/sepolicy/help/booleans.png000066400000000000000000002160551330160122500233110ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pbKGDÿÿÿ ½§“ pHYs  šœtIMEÝ UÖD IDATxÚì½wpGšèù«êjß  áÞžÞ‹Nidgäf¤i¤ñfg÷nMÜÅ»ûâ⽈‹Ý‹Ûw;owßìíÌŽFfFcdHyŠòIÐ a„´÷Uu4ÐÐÈpD“?E‡ˆî¬¬¬¬ÌüòûòË/¥>úÈèõzïËÏÏÿ+“ÉÔ ëº@ 7’$Ec±Xëèèè¿äää¼®„B¡׬Yó‹¼¼<—¢(¢†@ ¸±p&‰CCC«ZZZ~¬üe~~¾K–et]Õ#Á †Á` °°Ð5>>þWŠ®ë ’$ ¡/Á .üM&ÓrEÓ4£ú@ ÜøèºnT愾þ@ ÜøÈBè @pó èº.¿@ 7º® Á/|4MCUUt]G6P 4]GM$Ri$IBQ≊Á€$I³×êhšÊçµ6žHÀl_–dÅ`X2]"‘À0[N]×/šîb¨ªŠ¦é(ÊùgI$€„¢D£®un0×Á•ŽDxûÃ}|xðªªR_UÉw¿ùuú‡øç'ŸÁ @‚êÒ~üoñw?ûWþ—üò‰'ŸT[™N!†,Áͬµ{ý~¼>?Ån††ÉHO'=ÍyÙþ,4~àS2tn„÷ógO?t?•e¥ÌÅáÐuÆ#ǰY­LLN±yÍ*šZZxýÝ0™Œ8í6î»óvt@Õ4Ž<Åà¹{è~žõ ú†Îa6›(ÈË¥£«›¿øîã(ŠÂ¿?û;~øØ#Íj ³qe3^ïíoäHs ›Ö¬BÓ44]c÷ž·97>Çëç;o£½ó ý#cd“¢ðÓï~‹×Þ~/•æá¯ÜE"çµw>Àj±069Åwyˆñ‰ 6àÞÛ)).âW¿ªò2²\<þµÄ҂থ¼¸˜[6ñì®WБøæW廉´ôËØE4þ+I$““•ÉÿöÓÑ~¦‹“­í¼wà ?yâQt’ëæv»Å`Àl6§ú˜Î¼‰öÜ$@×A’xôþ{1›Ìüêw¤z¦29IH¥×©ª¨`uC-?æw55sìT+V“‰›7°~õJ~ö˧:7º Íû®qß·±¼¶šŸ?ý[GFi>xtŸšæévqËúµT3åñ€É4;Á£b oèGššSiF&'±šMøf×,ãñ¤¤ÑhD—e ÜTU–#IrjÒ¢ëšh€‚›šî¾~ö|°Gﻀ=ìÃa³±¬¼ì²×Š>Á§Äãõñæûáñú°Û¬1®édee299EnnÎe矉D‚deeŠ­37›Æ¿„SŸQ1âÎw#Iñxœ©é)¢±èåg1[°YmÌxff¡ý¼{# „ÛÑh”Ó©#r³²²q¦9Ñu¯×KFFééŸèVóý…ÿÐБh”ò²2 ‡ééiÊËËõ¡¹ë>kßÒuÁ¡!ì6YYY”NRfffèïïO½ ÈÊÊ¢¨¨èS—IÓ4ÆÆÆÉÊÊL:AÎâóûA×Iÿ„u-¿àZüj"A84CQn³,¡Å-¤0¶‰X:jB½¢³w.)ÏŒðÿï?qìøñ+nôº®söl7]]„#Ž7Hí7Ö4mÁÐ;0xïƒèÀãõÒÖÞþ‰Ž%òÚ# áóùŸÏG8¾¬Æ?ÿc±X°˜-´µ·áõx)-)Ũ¥[êc±ZÈÈÈ@6ÈM£(Ê}·ÔG6È %ÛòüO àÙç~?$Ž ª*CCCœ=ÛÍÆFFFFSi‰Ä¢ëUU]ô]²ÿœwî›ÿ9~¢‰¿ÿþ‘Á¡!4MãÜÈï}ðá’ùþðü Äb±%ïq¥UU9|ø0½ýý-ó|ÁŸz^U%Žpäè1>üèãdý,‘ÿRõÇ—¬§X,ƱãÇñx<¼¸k7>ŸMÓ¢§·ï’Ïq±<Õ½c_0š®£(&â±it˜QdÙˆ¦† fä+´–*—àò͇æôé¶mÝŠ®i|¼oñxEQضu ÑXŒ£ÇŽ‹ÆHÏHgóÆ %gñ²$át8Ð4MMôôôàr¹Ø¼y3ûöíÃãñ’MuUoí}‡ÎÎ3lܰžââbl6+ñxœãMMLLLàÎÏgÕÊ•œîºó­mmlX¿žÍÍLNLŸïfåŠåœjiaÆã]ÇëKÆ[¢£³“·îHYl.fêÏt¹Ø´q±x ¿ÏϦƒ¼¹ç-TU¥¬¬ŒÁÁAü~YYÙܲy‰D ¬]³†ÊŠ ŽŸ8Áðð92³2Ù´q#‡S­­ìÙ»—p(Ȇ P ˜ pèð‚Á UUË(/+cßþý—ÌsûÖ­ ,•Bð ¾HdYÆfµ“PãL+èꢤ(‹É)ykˆ'bØlvdùòV³‹jü>Ÿ‘ÑQ6¬_G8aff†h,Fã¡ÃTVVb0ȼ±g333´¶µS__Çèè(GCŸbñ8ÇŽŸ ¯¯ŸcÇO°eËêë뱘ÍTTT°aÚOžddt”ââ"–74PQQA8¦ýtÇ›šèéíe劜íî¦ùäIººÏ¢(Fn¹e3¯¿ñ&‡Ý¯¼B^^55ÕD<‚k†M6P^ZÊ¿ýû/8täÿöï¿ ¼¤”Õ+W]VãW%õ1 ¤¥¥‘›‹ÓáÄaw`µY)+)£··—¶¶6Š‹‹IOKÇ例µ•¾Þ>ÊJËPŒ ’$a2™().áôéÓœ;w.µtÐÚÚJãÁFÌ&3N‡»ÍNGG-§Z(È/Àj±’™™É‰¦tžéD’¤óåR )!·”†x¶»›§žy–§ž}–Á¡!FFǚݠ100ÈþƃÔ×׳¿ñ }}ý47Ÿd`xˆU«VbµZ—Ô:/Ô ç¾ß°n-••ì?ÐH"G×t¦§§yq÷nªª–1?&£‘·›ì¬,4U#-ÍÉ=wÞÁGLûéÓɉޮ“––†Íf%/7»Í†®ë„BaúX½j%e¥¥”––Ð×ßwÙ<ãK,5Hb?Ÿà Äh4âÊÈ$ðWc˜Lf‚¡“SØíŽþ-ŸXð«ªÊ±ã'øéO~Ä·Ÿx‚Ÿü臜é:C $ 1ãñp¢©‰Šò2¬ ¯—é™i:ÌòúÌ }ýLMOPUYÉá£Çèëëghx˜ÑÑQNwt°uë6 ’¹ÓIgçúÑ4 EQh¨¯gßý´µ·søÈÖ¯[›Ü3=/F8ÁhTøòí·Ñu¶›™hטðÿî·Ÿàþþïøî·ŸÀf»Lhh)i–¿P¸Z­VÊËÊ©««Ãf³12:B  ¸°·ÛA60::ŠŽŽ;ÏMQaÑh”x,ŽÕjE1(x½^FFGèîîfxd£ÉˆÕj¥§·‡p$Œ4ûŸÑhLY œN'v»žÞìvûâ²É†Ù6©_ Ô4$yÖ¯`ÖDŸ ð#!ËzzzÉÊÊ"//—-[¶rçwàr¹ðz½lܰw~>--­ æœù~¾©ÿBÍÚj±ð•{ïá½?BÕTrssqçç³~ýzî¼ã*+*AJНS-­øý~ª«ª8z욦qÇí·ÑxèF£‘œœljkªÙ 1ÙcíªÕÉ86³[’$¼ÿ~Æ&Æ9ÕÒ²HÀ£'ÃÝ^ÌJ¡¥¾?o££³“[n¹…·{ö¹9?Y@Çëó‘•Ͷ­[hÅEE20ÐÏÌŒ‡ôô´dòóñxAyY&“é²×OMMŤßÿñ÷¾m[·9/<¤gn°šÿ÷ÌÌ ¿~úþìÇ?J H}ýýìۀǾù{~(Á”W÷«º®ŸwXb¡3ÐùÁòüw–kAÞºŽ$Ë©íS‚ëP8ÄÉÖ“¹nëJND£©w>·î¯ë:±X,5¹e9å¥ ¤:A8N­ËG£Q4MÃl6£( ‘H„D"ÑhÄ ÐT-5A‰Çã©4ªªb±XM^TUeÚ3M]uÝ¢&Kõ¡ùmy~š ÿ¿¤1D’˜˜œ@G'7;÷’y/êK³}o©ß—J¿ÔoöÍKõGHújôôõ›“»¤°¼Tß¾0ÍÒé’!Œå%ên©ñãÊžcaž‹Ýx W†KtVÁF0äxÓ1¶oÝÁÄä½}ÝŒŽŽñåÛîZ¤(,Egg§ÿ’^ýþ4}:xºÊ²ŒÕj]´opÉAn‰Ž?ÿ÷¥þ½T9–úw24¨ú×;skü¶§‹iŒ~o0 g§Ó¹Àú0ŸKu”¹¼/e©ÐÑ8´]MdY^d꿦ßåÜ ]Ý>êu’§@ðùô«äÕƒûñzgGÂɉõ'X†úD‘ûÒÓÓùñ¸à»’âbJŠ‹ÅÛ|nÂÂ`0\7ñúç„ÙŸbŸ÷ü{\ûÊç&&s[¯wÄv>ÁµÐãñî¼NwtàõzIOOgYE ‰x⊂÷|bÁ/ü)XJã¿f˪þdÿÜ7sûó¯At=X'®è9ÄÑ|‚k@1JOOÇétRYY™ôó}Ž>w_ ¸Ú˜Œ&t]O^¹Hè ,f ‰DâªOVR>1×É¡7ªªb2™n˜¨wªªb2›D'|á|RA¿´à×…KpM¨Tdgg‹ÅRN{׃u¢¤¸„ééé?‰0ve¸ÐI†>¾´w¾›H8B ¸î·Â™Œ&ìWxì©@p-£˜Mfzúz>ÓìA ø<Ð4Bw!™™×ÏáLsNkE…E’2ÏMЯÏò9GD‡ÝqC¶u#œ0((ùyÉ•`¯Ÿ2_õ#®Á53F£øþEû›‚H`6™Is¦ Ë“@ \¯‚?‘Hpnô&E8Ã.O("Ÿ›/*C ®KÁ¯&½óróD]ÁMûúDEÁõ*øÑÁjµ^Qì`àzÚ»/Bð_Yºø^ÃHLÅŒ¡ªŠb ÃiB1ˆõÝ›qä©@ \炉EZœ®ëœ› ñæÇC„ƒò2ÌèF°XUv®s“á4‹·r¢ëç<ÇcŒ‰„¥³X¬äææb2 K’@ |fÁ¿ÔÉXKvÅr‰ôÞ@”ß¼ÜÁxÿ4¾™vò³5"q ›oÙÊ[¢|íöe˜ŒÂ'à¦Óö% ‰dèÛ¡á! ܤ§g,:QÍëõ04r”ººZ6oÜH0Âét011AOo/SSS˜L&ÒœNdYžm§²,£( ±X³9yN@,Ãl6£i‰D"%u]g`pˆÉ×^§®¶–Œôt^{ý :»Î¦ò‹ÇãÉŽ¥( ‰þ@€©©if<Ì3yy¹ôõõ366Æ7¿ñ±X,U¦H4ŠÙdÂdJ–%âõù˜˜œ¤   õ¼@'Ÿ~š{ââ"&&&yòégøë¿ü_q:¨šF8Ân·£ë:S“$T•X,†ÑhD’$âñ8²,‹]7ÁÍ*ø¢‘½}½ØmvòòóPU•ý)).$ÚOwÐÚ~šwíâK;wâr¹xáÅ—f'2÷ßw¯¾öÃ#£deºxäë_[ ø% Ðc$T0™,˜Íf$IF1*(Š7‚„]˜$obâ‰Ä%ƒ>%â‰dÂyȲLqqûö ;+‹ªeËR­µ­¬Ì÷èéíã‰o=†Ãnçùwa2QU•{ï¹›—vïæ{ßþ6>¿ŸŸýó¿ðý·ÿƹ‘s´´¶ñЃ¤¬ÙÙÙÔTUqôè1Š‹‹‰D"lܰ]×9vü‡E–$ª«ªØ¾m+¯½ñ¡P˜@ÀÉhbbb’ƒ‡Fé`Ï[{ …B<þØ£ì~åUv;¯—o=úMÂá0¿ûãópòä)V­\™zÞÁ¡A'+W,GQ2].V­XÁ‰¦f&&ÆÇ•‘N,ç[= $—A~ÿÇçÙ¾m+¥%%üîäŽÛo[0¡7™àG’H¨‰ÙAW×uâ‰ú옼¼¡že•<òðø22ØóÖ^œiiñòk¯ñåÛnGÓ4¾´cË–U,iê_QWÀ‘cm´´ùY±|’ìì úûÇhïŒ3ž&;«Dþ›œD"~ÉÓîâ‰8KE€]»v-n·›}û°÷wyô‘G0›M¬h¨çk>Äû~Èàà Ó3Ö¬^ÉÚ5khjnæè±ã,«¬¤µ­Ñ±1$Y¦½ã4§Owp˦M –dIbçŽí<÷û?p¼©‰oë[¼ûÞ{LNM±oß~¾óÄã8þý—ÿ$ËLOÏðÄãßbhhˆSkí·lÞŒ$KÜ{ÏݼðâK´´¶áóû©«­¥ãLÃçÎq¶»‡í[·²jåŠEþ7‘H›Íšª#I’°;ì„Ãa4Mg玔——ñ?þoD# ¹erýºµì?ÐHzZþ@—Ë%œ@p3 ~»ÍƆukIKK ·¯iVè'TI’’û­“ øDc1ܹ¹¸óóøóÿ»Ý€iž©òÂÁ{ç–N¶ p쨟Ñ#æÚéôáª8lýt·'X¿rV«U¼›Ná—Ršé¥NºSÕ¥Ó5¼Ü\¾þЃ¼úÚëtž9ÃÊË1( ŠbÀb6£ªj"ÑhD6P]ש¯«ã•×^ôQ>úøct]£°p±6ìt:ùæ7!›— ©òΙø%I" IÉÉÂ… 2²”\f˜ëK¹ÙÙäädóøcß$77—öÓ§ç-—-Ì£¤¤˜wíbbb‚¬¬,ü‡á»OFÅHfffÒD.øTõüÂK»¨­©f劢B‚›Pð_ÕÑó“jìV«•ŠÊJñfnBæø@rü“LWN"‘ /7‡Ò’RQÁMÊUüâ|uÁ•7QW£ÑÈömÛD¿„à¿:B?‹Ï:i‰AFpi’¾!b½ùOèüWM³…B  ŠõXÁe ‡Ã¸ÒÅžr@ ¸®5~—˵dàBì¶dhY}©È<@ ¸ö? r@ ®5Áo4E”<@ n¢Ñ(@ࢿÇãqEQnÁ/Î7Ò˜#Æ4Á§!ã÷û/ú{,ã†qï½Tlw@ ¸ÞÆ1¦ >ëÄqjzšÁA<^ï‚e÷ÆÝ^Ó5 ˆí`àÆsĘ&ø,LMMÓÕݦi £ÔÕÖ$Ï1Gã×5áH(nŒ1GŒi‚Ï‚?àOYTUÅãñ^ZãO$¨ªšú[–åÙS.ªª¨ªºà`“¹“Ö.wý•¦»h'™=zt~ô7]׉Åb©¿ ³Ç°~.röd6EQ.EÓ4‰8F£I¬Ù 7Šà_b̹ÚùÏióDzX,Š¢E`&Áíg±|¾¤à?rô0GŽJ5¬U+×°mëöË ­ÁÁnä?ŠÁ`@×uNžlfzfš;¾|ç%¯=uª™ñ‰qî¼ã®%c½š¾x=Ìï÷óô3O"Ƀ‚;ßÍæM·àv|æJD¼òêËlß~+……‹~Ÿ˜˜ÀçóRVVŽ×ëáõ7_ãë=ŒÝî-R ¸Xj̹Úùûý~ž~öIV­\Ͷ­;Ðußýá9î¸ýN ‹ÄK\ÊÅ4ÔÚšzvlß$É †Ô‘§sž¦iiihš†ÏçÀî°§Ž(œœÄl6áp8Ñt MSggªQüþF£‘´´4$I" …ðùý¨ªö© [º¶ô•²Aæ[>Á`àØñc|øÑ<øà×0›Ìx½^4M#-͉Ñh" ‡e™ôô $IÂçóO$0Møý>ÁªªâÎ/`û¶¸\.‚Á±XlÖÚaÆf³Ñuö ýX­6œN·í¼³Ù2[g^‰6›³9YIUÕ°ÙlØl6Ñ2‚k]£Òô/$ÿD"AGgåe¢ª*:  …’ãWš3X,J,O?=w­ÃaÇb±¦Æ;‹Å‚Ãá/ôfüƒý|ðáȲD]m=º®³÷í=degã™™aÇöXm6Ž=L($++›Šò |>/ûöD àgÃúM©Æ‹ÅØûÎ^~? 5ÁŽí·âÊÈä­½o~¿ï3iâ›}KHX­V¬V›7ÝÂSÏüŠp(L÷Ù³œh:†,(**býºì}{€³ÅÂWî¹¾þ>ššŽáp8q¦¥á´;hj>AiiáPˆÓ§Ùyë—¥ùdiié„C!6mÚLÿ@ÓSS;q”ÊŠJjäAff&ÅÅ%œ9Ó œ?Ý`PÐu0* º¦a±Z0›LX­VÖ¯Û@vVŽp<¾Ù¿Édbd䯼ö2 õË),(Än³#I&“ «ÕN^^>ÇŽ¡·§‡Ó‰Q1¢Þ}ÿ¬+Û·í Òuö ¡pˆËWÒÓÛ,ˬ^µ†ªeUÌÌÌðî{ï`2™’ëêŸRë_j¶*IV‹½ï¼…Ål¡²²’•+Va·;Ø´q3ûì£ãL.W&••œj=ÅÌô4î|7Éõ³ûØÓßK~~ééX,–TÞöÙ‰ ÀÈèï¾·—ÌÌlÖ¬Y‹¦iœ9Óɇ¾O]]=‡³ÙÌ–[¶Òxð}ý},«¬¢ªªšþ~ ’,'óP ÿEÆ4gZô³Ú¸a3‡`±X(**ælwV‹‡Ã‰ÑdJW‡=9ÆHv‡ƒêêZüþgº:Q…¢¢bñBo"¤¦¦&ßêÕ«6¸ùnn&¨ë:²,/ø-#dd)©Ïÿm.íüГñx]×0™Ì©ôs×|–“ü¦g¦qe¸]?Ö|aþªª‹Å0™L †TÚùéæwa}ÌývüÄ1&&ƹû®{/zí\Ý]ø½$Ihš¶àßb[Ž@pís±1çjç?ŒXj|ðsßÍcŽã±X,eÅÿÏçcxx˜žÞ>FFGSß»óó©(/cxxØ¿¤Æ1<¿!Í·,•æby-•þsip:èè‹,—¢ƒaÁ9K¥½Ôõs£¢`6[¥ÿ÷üg¼T:!ô‚ëEå_z̹Úù_8®\j|½ÔX$I2f³E¼Ç›*dïÕ ¦qQ“‰$QSS» 8‚@ ¸ñ¹ÚcÎ5¦ „à¿~:áx …Õ*öÝ 7à‡ô®WÁÇ …B×ýƒÄb1Bá²$LåàúsĘ&ø4D£Ñ+Óøo„ƒ \.7ʳ1æˆ1Mði¸’ö¢Fì6»¨-@ ®sÔÄåýÍ„ I ‚›!ø@ ‚_ ü׉D‚¡¡!‚Á Œj566†ªªLNNÞ»>4MctlŒX,vÓ<³ÏçcÆãùÜòÓuÇCâSÆsÐ4±±1"‘ÈgÊgþó%Ϙ¸4±XŒ¡¡!FFF?—XKÝ7311qÕΠÐ4ññ KC ‚FGGùó¿ü+JJ~?O=û‚¡¯¿ñ&½}ýWå¾ÆØ¾\Lï¥~ã½÷?øÜÊp)¢Ñ(¿~êiff<ŸK~Ÿ¦>¯g¹RAÑÔÜLcãÁE{¥—º×ü°Ò{/±XŒ×ßxÏìdâbù\ìùÂá0Ïþö9†‡‡äs%eƒdøé={÷Ðu¦æfŽ?qÙºx÷½÷yq×nºÎž½"Á9¿.–ª» ï«ë:ý¼øÒ.ñøgzŸó¯k?}𦿓³‹¿øÿ  ]Ñûnv”õÁt]ç£}ûyèûimmcû¶ms¿,J×Û×Çðð0v»ÚÚZN·Ÿ¦®®³ÙÌá#GX³z5ƒ“§N±rÅJÌf‰D‚S--TWU¡é:Ýg»Y¾¼®³g!=#ƒ5«W333éS-(FeA>‰D‚üü|¢‘(cc£©ô²,£jû÷ïçƒ>Æd2²víZ4U¥µ­MU©®®"'''5øvtvðÐÑYV¹ŒÓ§OOÄihh ';›þþ~z{û°X,¬]»€–Ö6Âá%%%ädg'…‡¦rüD5ÕUØl6Nžj¡²¢œááa†‡‡ÉÍËcyCC*üg8ætG+–/gjz¯ÇCYY­mmx=^ÜnjkjâÌ™38NÖ¬^M0äLW±hŒššrss’õyª…H4Ц©,ohÀéträèQ¼/ÙÙÙ¬^³š¡ÁÁÏâõzéèè èëí»è»[ÞÐ@o_=Ý=œ9ÛEMuõ‚v°T9Owt 1›Í¬^½zÁ{Y¹b]]g‰'âX,ªª–a2™\O²¾[SuRW[›ºo äĉŒ3<<Œl0P[[ƒªª:|˜D"A»ƒb ««+•§¢(œ=ÛÍÀ@?iiéX¬Vþðü‹$âqV®X‘xýÄb1ª–-cjjš±ñ1jkje™É©)Þyï=V¯\AFF:Í'O¢ªêìqÛEœîèLµ7‡ÃASS3ÁPE1âpØ™Ÿ ¶®–ò²²Ea·çê³­­¡ás¨ªJ$áà¡C„ÃJŠ‹(//çTKKòäNEaÕÊ•©Ú‰D‚ææ“Äqv;±xœÉ‰Iì; õõ¼ýλ„B!âñU˪å½÷ßGQ6lØ@vv6g:;Sí¶¡¾žs##ŒŒŒ‹ÆXµj%N§SHÐøo$ ½½½|ù¶ÛŸÀ{³îÈÈ¿ùís(Š‘“§Zøè£äDS}ýýüÃÿ'ÚOŸætG'§ZZSB/óæž=øü~|^o¾µ‡‘‘Q~ù䯱Ù¨ªF4å™ßü–X<ÎèØ¯¾þ:¡Pˆgûáp„©éi~ùä“©ô©ÃŠH‹l±XHKKCSUžùÍo'ò«_?…ÏçK ~]çàÁC´´µ!ËÞ|kýƒƒèÀ3Ïþ×˯Ÿ~†X"b2O$xëí·iimÅ`Pxö7¿aøÜ¹ÙûJŒ±ÿ@#@€—_}•ÁAþð‹d¸\¼ðÒ.úRu ‡ycÏžYsñ0GçLW/îÚ+3“H$‚ßïç?žü56»ÃGŽräè1¦¦§yþŗЃ’<Ý0žHðÒË»™ž™f||‚_?ý ‘HUÕÈÎÉf÷«¯räèÑωFyõµ×ÆétÇ:7|Ñw72:ÊK»_¦ººš¼¼¼íÀ,YÎW^{ÜÜ\:œ:…rî½èºÎK/¿ÌÈè:ðæž·^”ÏÙîîu2‡ªjì}ûmÆÆÆY±b«•x<Î[{÷22:šj'ÁP_þêÉyŽŽŽñâ®]äæåãp:Hs:±XÌÉI€ÅÂ\œW ‰Ý/¿B(âè±c  ¥Ú°ÅlÁét’››‡Ýng×îä³hºÆSÏ<» ½ŒŽòûçŸ'33‹¦æ&ZÛÚÈw»ùÕ¯Ÿ"±Äö!¿ßϯŸz·ÛMyYYò¸iMCQ;Oÿæ·t÷ôðÛßýž„ªÒ~ºƒ×ßx3euˆÇ㩺UŒ&¢±9¹¹9vœa·Û±Ùm8ÎÔ™EEEÄâq>þx熇µÛžžÞÿàC FEœ‰!‚ÿjhÛñxœX,JtÞ'‹ÎžÎwõÍoƒCƒtžéâõ7Þ`|bœƒ‡À¢ûê´µŸfÓÆlÚ¸¯Þ{‡S[[áÃG8yêw|ùvöh¤½½å õʼ«’áÊà–M›8pàÁP©éi::;9ÕÒBW×Yf¦gp»óÙrËfV­XÁ–[nI¥O½Y¦¬¬”¼Ü\V®XA0bjzšÛnû_Úy+cããçÓdÖ­[KC}]]géíí¥©©ǃÕbáÖ;hjnfxh˜h$B[[;wßy'·lÞD]mmíí©û.¯¯§©¹™±rùr‡†˜œœ¤ñàA"áð¢¨Pó«T’ ° €Ò’öíÛ‡$Iôõ÷344Ä‘#G˜˜˜ à÷P]]ÅÖ-·•™™ÊÈb±°v;rï=„BAÆ'&ˆD"œšOµ,l·‘d»]¹r·lÚ„Ý.b—„©ÿsúããŒa4YxÂDrB››GnNîU;RUUŽ?Á÷¿÷*ÊËYµjo¿û7¬Çï066†¦i³ƒY.o¿û.UUËèîîfEC=%%%øý~öhäoÿÿÄÿø—¥`€ûïûêùŠSÐu&&&ˆÆbÄãqâ±›7mdºªŠ_þêWü—ÿüŸ)).æË·ß†;ߌ¨4ï™ãñø‚ôkV­&##=•¿Ï磷¯ÌÌLLFmíí¤Íj¶sQ½æc4)))¡²¢œúºzâñº®SYYAii ÿúócyC=EE…4l¦&TM_?wÞq§NµpnäuµI3ù‹»vñ_ÿË߆¨«­åûï sNPf“ ŸÏÇäÔ#££hšN"‘à+÷ÞCgç^Úµ›~ÿûT”—ó•{ïÅn³a±X˜ž™Yú½%TBÁ¡P$ÇËGûöñÃïP(D,£¦º:õ,+–7àÊpñøcòÛßýžÎÎNÖ¬Y}Ñw700À›oí¥¡¡ž‰ÉI¬sêÞ9ÙÙ/çÜ hzÒB1÷^²²²=CA¾{Q> U]P'sul4ÉÏÍ¥¥µ•Úš|>ÿ’õ²TÙFÇÆØûö;ÔÖÔ¢2ÒÓ±XÌôöõ!IƒÁ¡aÂá0;oÝÁ³¿}Ž·›ŒŒŒËöŸ4§sQ{ËÊÌZ0Á›³L]؇çî[\TÄàЃƒLLL¢i­mí  ñÀý÷s¶§ˆD¢„B!zûû)t»1‹ÊãõùxùÕWùÖ£’ÏïÇd6ÑÛ×ÇÀà éóÊ&ÅEE Ú­+ßďñÀðÓŸþôoóóóÍŸW†š¦q¦«“e•Udgçàr¹æ}2Is¦ÑÛÛC^^þU3·išÆ™3]ìüÿÙ{ïàÈŽ3ÁóWÞŸŸQû(åee”——ÑÞÞÁää{y˜ì¬¬ØìÑår“‘žNjJ 9ÙÙ´µ·Ó{¾—`(„Åbá½S§èéí¥¬´”m[·R\\ÌÅ‹bWýʬ1000@eE©©) vÕדœ”ŒÏ祥µ•é©irssc³%…B‰ ‘†ÆFD1J~^2™œãdz°°Àw¬ “ÉDCc###+ÊÒh4"6«5VŸ‘H„w½‹}ÌÎôô4îy„ÂÂB ôõõ¡ÓëÈ´dr¾ï|¬,ÕUU´µwÐÒÒBrRõ»êILH¸ì»KJJ"ÐÜÜŒ Ú¬d­Ö£^¯Çd2nšOkA—¤ÄòrscïÅf‚ù!® IDATµ\^Æf³¡Õjñ¸ÝÔÔT“žž—ŽßàØ±c±:ÉËË‹)çµ÷500@Jr2ååe‘y¹¹+–‘âbÌfó†¼Úl~›šX\\Âj-ÀbÉ ­½””RSSéèì$#=¬¬Löï?ÀSO~‘ÌÌÌ8%¹¸¸DNN6&“ ÛÍf#Ál¦°Ð×Þ,±vëóûIHH 5%ŸÏGEy9r¹|5D¬œŽÎN¬X­VΞmÀår‘——KMM5ÃÃ#Œ “‘‘N~^G޾ËüÂ?J;»\\kÝ_)oW*K$A¡P°¸¸Ä3¿ü%ý¿þˆ¤k˜ñ_ P(Édò·¶†¯P(p8<ý̳ü»¿ùkÌæ+ÖùÚ{þ°ýäJõsÝ-ðêáNª 3(+²09ëâpà ß~l J…üºõm6±´¬133KOo/÷Ý{‘H„úçŸóµ¯þÙYYÈårN'¿úÍoùñßü z½îªÏp¹Ý¼ýÎ;<õä“hµÚ«>}[½»‰‰IÚ;;غe }}¸ïÞ{6äUá•W_¥°ÐÆ–º-(>B]‹¢W¦Kÿ¿ôÞS§OŽÜwÏÝ+åEúûû9qâ$ßÿÞwQ«ÕWLãFâv»™œœdxd”é™™Øç™ 6k“““åêø‚¹Â÷áOm4´¾1^Ç¥‚H.—ohðk³»Ëåçz[>.}žL&»ªÀ¼R×õå~w©yv³{¯ZF™ •R…Z­Ž{/—ÖÏ¥e¹–²]kY®‡Â¿\:WzæÕêþJy»ÒïÖêÑ>6Fn^.‰«³éÍú÷wiþâÚ% T)Q«ÕW­÷òž¯V?×›åP„“-v†¤§'ðóWÛ05ˆâÚ M·ÇC&ƒ°E)—#—_]A,8tvt"DJKK1™LLMMQQ^Îðȵš†Æ&Nž:…Z¥¢¶¶¯×ËéÓï£Õj©­­Y]êc3îwO~^.—‹¶ŽĨˆÁ §´´”Ò’–\.†ÚÚb.Û·mÛ°O"ÒwáKKK,..a³Y)+-Å>6ÆÈðZ­–mÛ¶²ärÑ×ׇL&[ñ´¥¢¢FCcS[·lA¡PÐÑÙInN9ÙÙœ>ý>§ÞµJŶmÛ…Btuw †¨©­!‰ÐÒÚŠÝ>FQa!ÕÕUÚT à|_5ÕÕ8––\X­;@•-•E)œéçß^káé×[é™ã~ó>/êæ`ã¿üS:v!zõ ÏBDÀd6!Q^xé%ÆÆÆ9ÓÐ@Téîíe||³ÙŒN§#1)¥R(BjZ–L zåÕ˜ìF>Bïùó¨Tjžßû#££<ÿ‹Èd2 =o¾ý6KKK:|„ééiÞzg?‹…Ʀf†‡G6ÎòE‘Ʀ&Fícdeeñ›ßþçâ"¿ýýs„µFóÄ™œšÆœ@8ajzšsm파Žò?þñgôž_ñÄéééeÑåâlc#F“1V®¨eï‹/ …ÉÉÍA·jn7M”——ó‡_ˆóžYoŠ?pèЊÒä­çV½ö½Arj Á`(æ…d4in=GsKë•g׿ûýsdgec³YAb4ŠJ­Æd2ñÜÞï•^z™hTäÂÅ‹¼sàÀ§~ØÔQü«JMɯ¿Ö>—¸tF§Õj%7«¢`07]¾är9Z­ö¦|d«ÇO]q:·Te¡Ói«”¨Ô*ÚÏOð•‡j‰CŒO-r[u6÷ßRÈóû»Â†§Ýâ¢HXˆ"DÅM=Ÿd2è`dd„É©i‘U)QärÖ‚¯“êª*4 ZzÅ#?ŸH$óÊY^^¦÷üy|àþ¯”²29ÊÒÒ;·oÇfµÆÎTXˉÍf¥¢¼œââb|~ߦy”ËåTVVPR\„Þ`@©Pp×»ioï`||•RÉÎ;§««•RIeEMÍÍtuuóÀý÷qæìYΟ沈²µJ…R©ÄV`•Ëçóáv¹¸íÖ[(/+Ãh4!“É())&??Ä„„˞ʺ™’5?ŸS§NâŠÒä$MÍ,ÌÏáõz®ðÆEÆÆÆÈÊʤ¢¢œÜœ¼Wfgféë;ç½²}ÛVžüÂè=ßç½ò¹QüB4;ák³+*D%i,!!ñ¹AaÉåc{a*÷×òÄîN/©É&BQ8Ö0@º%w L­-JIEA2%©¿Ÿ‹ýdgemê½òIrÝwõ‹¢È¨}sB …|ƒÒ_^^fÁ±€ÍZ(Íî$$$>'+°¤%žlD._QŽuEéXRŒì(Ϥ8/…êÂtJóRH0éÐi”l/Ï";#KЉ’Üd’Ì:òÒÍd$ÑjTq–™L†N§§«»‹é™ òó©©©ÁëqÓÞÑÑ` ¨°¼Ü\þö1ûŠçÇò2Ö‚Tj5¡`ŠòrN‹‹‹N:Åèè(££vô=:­–ŒŒ Ìf3^Ÿ—ììlΞm ··—ò²Rªªªèèè ¹¥…”ädvÕï$!!¥J¹â‰SQB¡ ¨ÐFIq1¡PA¨¬¨`9°Œ}ÌNEy6k ’™iAERSRHLJÂëñ’Ÿ—Gcc}}çeff›ÕŠ^§£±© QW¼ärŽ?ŽÃáà®;wSVVŠÙl^Y²Xõ Q(ä>r„Ñ‘FGGE‘¼Ü<º»»)((Àf³ÒÐЈÛí&?/šêj†GFÁb±·ê½âXXÀíqóè#{HH0ß°¶ø©ì꘥å\3¯;þl˜Œ&¶oÝÅrc]jA ^9JU޾{Œ;¶Çù¡_o–——éêîfK]ÝuÝ¥ÿQ™˜˜ ÷üyî½çžOŃBBBâú‰Dâ6¼~¯ +y®„#¢‚À¨ÝÎëûÞà?ýýøØ²ãzxâ\®¢(~¨ œ›=û£x!­½‹5ï•h4ºêÎúñ¼W®ŸÚ®þŒŒ ö<üèeÖ©dŸÈšÞðÈGÞ=Æ~ø¢Q‘smm¢P(âŽù …B(•J EÌ*‡‘ÉåÌ1k.*k÷ÉåòXÇ[û½R©Œ¹g]šÎÚþ¥R¹ÁÅhmÄ¥;œEQŒkDkùXsq[ktkyXË_ `Áédhx˜»ïºkC×Ëå±ô"‘H,ïkéÅ™ìÖ•yÍEër÷KV ‰Ç¥Jø£x]éþ³gbn~žûï»÷ºL®‡'·-ǵæe½\ý°i_ê}t¹4e¬x]‹÷Ê'ÖŽnœéKö©mÚ‰D"ì{ãM››‰F"|õ/þŸÏÇÞ^D«ÕRYQÁÃ?Ä‘£G@áë_û*~Ÿßüþ9’q{<üðßö±¸´Ä /¾Ä÷¾óm‡†æöÛnãÅ—_F¶j»ý¶[9ÛЈZ­æ¯¼—Ž^§cïK/ffgùæ_~=¬ÅívóË_ýAˆ`ɰðµ¯}ZM4¥¥µ•“§N£×éxâ±GWδ}:­–]»ê±Ùlì]݉k-(àá‡äðÑ£\¼p—ÛMJJr\½±€)ë‘ÿ'Djj*_ùòSREHHHHH|ªHþ’â—¿„„„„„„Ägš¶Æ¿vÐÍ¥|šGùJHHHHHHŠÿàr-a³ÇK{ RI^^>‰ ‰RíKHHHHH|Ö¿Æjµ¡Óêâf÷¢(X022LMM- ¹BzŸ ×}_Œ®„µÕj4±ð´k—(Šh5Âá0bT¼á… œ|ï=ffV‚ÞøýZZ[ ƒôôô07?ÝžFci:Nzzz‰n²Ô!Š"çÏ÷1³ˆçÓæÒ¼ŸÏÇøøxìR¸ÝnN¾÷'Nždjzšîø~×Úéµr±¿Ÿññ I’HÐØ1ÊäÌ"‹î'š®s?¸ÙdÈf2 ¹¹…`0(5ˆOS¹Ë×SŽø†lî"!B4ºñ„•ë“`llœyúšZšcÖ†c'N …h=ׯüüÂÇ~F$"Ä8ki:imkC¼¤Ã‹¢Èòò2míqøÖ+ȵ´.ý]8ÙôþˇãØf ÍãñðÌ/Kûzàõz±ÛµÛyᥗ¯š‡õeÜlièJÂo­DQdßo25=ƒÌÎÎÒzî\Üû] |´þ÷—æEEö½ùƒCC×ÖÎ…(ÂðKRF‚P$Ê‹ºyãÌÞ@˜göµq´cŠ+#£â‡›Ýl2dcŸXr¹8tôÈ$‰õÁÓï/}ÖG‘.$%%¡ÕjÉ@§Ó’º.Dû YãG"W|)‘ðWü¢(râ½÷øî·¿E{G'÷Ý{ïeOCSú.`6›¹÷Þ{8~ü÷Üs7Fƒçžž¯<õ*•jõŒýÇÑët¼³?££v´Z-O<ñ8 ^Q!¾½?ósóôö§ºªŠ–ÖVš›[Éd<òðC¤¦¦òÎþ¸\.ªª*Ù¹c'Nždl|¿ÏOjZ·Fמü"*•ŠwgzfšÜœ\vßq;ïŸ9ÃÄä^¯‡ÒÒRî½ûnZZ[éêêÆ`0ðÅ/<Á`àÈÑw9xø02™Èã=†ÑhäСÃx¼jª«Ù¾m …Ax}ß—­“m[·ræìY¡0ååe,--ÑÔÔLk[áP'Ÿ|’……Ž?ŽR©âÑG&###V7‡“·÷ï'à÷së­·RR\ıã'6”kvn¥BI}ýNNž|ˆa÷w ×ë9vâ%ÅE8ØY¿3Nx;q‚ÑÑQ²2³xèÁp..rðÐ!"á»vÕS]UÀøøo¿³Ÿî®.vテÛn½•–sçbmãÁî'a݉‹ó óøý~r²³%­'Áü’Ÿ¨^ÇÄ‚Sm#$™´Tæë8?º@k§£YÏöò,ž$Ù¤¡07…¶ž1ЬܳÝ7Cû¬Èõ  qäèQ</‹‹‹,¹\>r”ÇÝÃØø8“““qààA"á*µNË¢s‘x€ì¬L^Û·!" P(xìÑ=¤¤¤lxŽßïçÀÁCÌÍÏQVZº¡Ÿ>pÿ}ØÇÆèêî& qÏÝwÓÔÜ«“]õ»P(>ÿm f3•åB¥Rö†”> YUþ›]áÈWü§“ÙÙY¶oÝJ$aþ2fßÁ¡!š›[¸ï¾{IIIáÀÁC$%'ÑÐØÈ…‹ýy÷8mítvu#CWyU•UìÙó"pêôéËŽìEQ¤¹¥•RÅ7þòël©« ''‡=šš›yâ‰Ç™™›Ã>6FcSKKK<øÀ8NÎ440>1AVV&?ö‡ÅétòÖÛïPXXÈí·ÝgîÙºu yy¹<ºg‰‰‰¼ùæ[$%'qÿ½÷ñþ™3 ®šŒä¤¥¥mZ' CEÆ'&¹÷Þ{0™ÍLNMqË®]”–”ððÃ#ö¾ø¥%¥$''óúoÆf‘H„ý`³ZùòS_Âj- ©©yÓr%&&rË®]>r”Ĥ$ÊËËyþ…IIN¦¤¤„{ÌÌLœNg¬ŒCÃôžkc×®]4·¶2<n»íVrrsxý7…Âê¡¥µ™\Æ—ŸzŠÚÚÚ ýôíýXXX`y9Ƚ÷ÜCoßù¸:ñxÜ6mR«Õ`06„‚¿!ŠÍ$´~}?þnxÇÆÆ°óÛß?Çüü<'OQ¼dR.266NEy9y¹¹TWW108„­ÀJgg|í/¾BSs3½½½TWW¡Ëc ««»›#Gât:p¹Ü±47«á‘QÊËËHHHÀd2!££vÞzg?SS“Ì/8µ¸Èùó½ÔTV¢P(Ée¤¦¦’‘žŽ9!”äd’“’ˆ„# ŒR[[Knn.å\ì@&“a±XHMIÁh4¢ÕjùÆ_þ%ƒCCì{óMÀ¦ ÄDtZ™ r™ŒÉ©)jªªÈÏÏ#?/Ÿ©©éØúP¡Í¶iÔTW¡P(ÈÈH§ ?£Á€\.'9) £Á€%# ÀÜÜCCƒ¸].r²³c›>C¡““”—•’ššŠA¯gxtóråææ’žžÆôÌ ÓÓSŒŽŒP^ZŠF£A§Ó’˜€ÉlZ÷vEìö1|^/Ý]ÝØ òÑëuìܾƒ‚¼<ö¾ð±AˆV£Ád4’ššJRRcãñmãbÿ@ì^AhhlâŽÛo“ÜS%·ÛÏÖ¿³œïì©avÁÞ CŒŠ\C¡×ã „¨/MG!—Ql1PY˜Î÷,çx»©g{§è[Àã ~&dÈn‡H$B^n.f“ •J‰LÑMör%''‘––FbRÉÉÉ$%%ެ(x³ÙDnN;·ogbb’Phc=  SUYIZj*)ÉÉúé…þ~„h”ìì,rss˜™™ÝP'îÜS4*Ž„Q©6†i ‡B7|­%‰púÌYþþïþ7òrs™šžáù½{ñùý,8œ?߇(Štvu³¥®Ž—ÿô £‹û¹ûÎ;ÈÉÍA&“ÑÙÓÍÿõÿ@OOûøÖ7¿{†Ç륹µ•'Œîînär9J…œÎ®nª«*axd„¢ÂBär9µ5Õ¢eaa¤ÄDlV+ii›—Ëh0ŸŸ‡p8˜L¦•ÙCb"– I‰ ¤§¯ÔM0¸LYiVkóóóÈ‘žžN8f||Œ””êëwb\·^™—›ƒ &£‘œœ m¶¸¶¡T®ä¶öt:-555ÒŒ_bePªVÅ­ëuj” 9“Q‹Z©@§U!~1~ø IDAT—Ë‘Éd˜ ’ôh5J :5jÕÊ÷µ¹\¾A®Þ42ÄjÅírðVÌò•¼ÕÕÕáq¯X>·ÔÕ’›“ƒÍjebb‚¼¼|ûØøué„B4KszzšÃGŽn:¸‰D";vœ‘‘‘Øï7‹ éÿëcÏ‹× H6‹Ç})>Ÿ×^ß÷‘ãa_­N®åYâuŠ›•ýãäûFçUâóƒùùÞÞ:ÝO(,ðâáþåÍ.A¼B›úhòõf‘!¥_]-ORV¬Oû£¤ÿY• 7d-,ïå|2?‰°¼¢(ròÔi¾òÔ—èéíáÎÝw\¶q b·a4©­©¦£³“Úš´Z-§N¦¾¾¥RIKK ;vl…8lniajj £ÑÈÎ;¯˜Ÿ`0HKk+““tõtSUUIÿ.^@©T²cÇÌ&-­­,--Q\\LQa!ÝÝ=ÌÍÏãõzÉÈHÇé\Ä`Ðsë-· T*éìêÆáX #=ƒòò2Î÷õát:Y\\¢¨¨êª*†††D§ÓqË®]hµÚXþÿôÚëh4jêwÖc29×Ö†ÏçÇf³Rh³ÅŽµÛ‰„#ÚhkІ? »»™LƶmÛ0 qù/).޵KŸ¥×ëhniÁívSYY‰R©Äncy9@vv6åeå±sÏ;::WηXhllÂj- --æ–rrrBˆDÈÎÉfzz—ËEZZÛ·m£­½ååe!ÊÖ-uèôzZZZ…¨TJvlߎV«¥»§‡ññq2-™ÔÕÕ2>1ÁøøÁà2%%%  )/+£  @ÒrXpð¡ Ó¾„íü$ó®»JÓ˜vxé˜ÂdÒS˜›BGß$*•‚ü¬$ÎL‘Ÿ“JuQÆU}ØoF“éá0­çÎQYQ(Šôõõ±mÛ6z{{™œš"))™]õ;YXX õÜ9T*õ;wb6›7”óãÈŠ5ƒƒÔïÜÉÌì,£££ìª¯grr‡s1Åív# fÆÆÆVêpûvü££öXúe¥¥ôõõáp. )-+%/7—ùùù¸²(•Jšš["òóó(**ºiÏ%¸a3~A6½"‘‘Hø†Ìãñ0f·s÷wáp.²¸´´é}“SSüñ•WIIIftt”ã'Nâp89×ÖÆðÈ?úizÏ÷r¾ï<ƒCCqÁT*………œï»ÀûgÎ "^vÒÑÙIïù>nÙµ‹Œ 2¹Œ‚‚Ü/o¿ó­çÎÑÖÞA†ÅÂïžû.—‹símøü~2³2ÙûÒË”––púÌYFGítttòþ™3¤¥¥sêôi::»8w®ù…Š‹‹xîù½8N~ÿü^T*5ÉÉÉq9LKKÇd4’››‹F£fÿÁƒŒŽÚINNæå?þ).êÞØØCƒD£QÎ66âp8yçý8œ‹dfeFéèìŒËÿú@—>ëÐá#8—¨ªªÂl63j·ÓÑÙIbb"ûÞ|‹Qûè•Áñ'™›Ÿç¹½{9ÛÐÈÔÔ4'N¾‡(м¶o*µ£ÑˆÁ`ÄjµrøÈQ:»º9pð‘H„P(Äoÿ‡ƒ×ÞxƒAÏääo½ý£v;o¼õ6ÙÙÙ¼ùÎ;ØívÆÆÆhni!))‰smm´wv‘——'Íú%.Ë¢ËGEQµ9&ÎôLaÍM!;ÅÀÞý”Zhì£kp†±¥ EùiüókíDE/Ÿ""\ÝÚt3Ê8+Äñãx}></ÇNœ`jzšßþáyÒÒÒÑét,ƒüþùçQ©Õ¸ÝÞxëíM-KV¬ÍhU*Þ=vœÙÙYÞ;}š?ì}…ûB¥Rr®­‘±Y§R©buøÖ;ûŒKhx˜æÖV¦gfÐhµüæw¿gjzzCY@Lnò#½oÈŒ_„+š[áÆ¯ïOpa`€W^{•™™Î64p×îÝÄ·Z‘¾ ¨ß±-uuäåæò?ñ ùµ¯òö;oc-°²ç¡‡8s¶ô´4*«*cÑÙ¢Ñ(@€îžæææ0È®`2ëîíåŽÛo#';›Œô4DQ$‰ÐØØ„ÛíÆíõâ÷Vòzö,2>naµ—“Cjj*Ö‚,,//ÓÕÓͽ÷ÜCUerœ:sÃjô*›ÕŠÑ`@©Tòà÷ÓÐÐH~~ÅEE±|ådg‘@Ey9áp˜ /ò½ï|KFvû(ƒäåænjÖR©”ÜvÛ­ì?xŸ×ˣ»gCþ/÷¬‹ýüÕ÷¿OjjêJð  ¸¸ˆ;v Ý==ÚlجV^Û÷ùl©«£«§‡ää$ÊËË1èõdd¤³}ÛVÔj5]ÝÝLNLàp:q..¢Ñj¨ªª"5%…öŽæççIKM¥¶¦†ÊÊJþñŸ~†,ÌÏóþûgˆ BÌ"UQQζ­[ÉÌÌd|b’wgÏ#KNbsµ×ÏÖÂTêŠÒßî%;9 µ!Š”+ñû‚ÜU‰Z¥ U y3e¶tÚg)ÌJbÚé%Q¯&Ù¬C¯UÝô2äƒÁ¹lÀ %9™»ï¼““ï½GmM5©©) !CFTV#tŠ\ ÷ãÈŠ5Ì&ùùù 3:jÇf³qáâæææÈÊÌD®S»ÍðÂÅ~Μ9‹Ûí&°¼L^nN\ú]+VÍòò2ª+«ãý³ ›”…˜,2¬‹øùg§ø×”ä¥#ÃhôÆšúA ©¥…ýðX ¬Üvë­¼sà »êëc‘‹¢b”±ñqr²³Ùàùùù ²µ®†ü¼\|>?gø¯?ù ?ûùÏç‹_x"ö —ËÅþùÚW¿Jÿ@?.—¹LÆØøù¹yÌÎÎ17?%#¹\N¡ÕFSs f“‰¹ùyl'ß;Ŷ­[Q©”y÷E……$''qçîÝ„B! †øQãZ÷ÉeÈrJKJhhjB­Vs®­-µµ ô¯ë‹2B¡™™™|ñ‹_àégžå–úzòóóWÌ=r9 ráâEòrs±æÐÔÜBiI ƒCÃ|ù©/ÅÒÑëõô]¼ÈÔÔsss‚€N§ã+O=ÅKü#CCCجV ýºüÐø×?+7'‡L‹…æÖVvlÛŽF£FÜn‹‹‹tvu³ûŽÛc¿5 ”³÷Å—øßòŸy÷Ø1^þÓ«üŸÿð_W|D׬7“S465óÝo  ˆÇ‹ÛíA.—“””D Àãõ2<¾¿§—g™Ü 3*•’Çî*Ãë[&%ÙD4"t D£È/Q£7“ Ùµ³­VÛ\(—ÉHKKfffX …Âjª«(ÈÏçß~ó*++)ÈÏç®;w“••⊬µÛ‰FWÊ«ÓiWÃd_»¬¸ãöÛ˜™™ÁíñÆò“••ÉîÛoçÿþoÿ‡x€ÚÚþßÿï¿óè#ÄÉ¥P(Ä‘£Gغe¥;—¤Ë®zÚÚÚñx<ÌÎÍ26>ΗŸúCƒƒqeá3tܰâG?úÑO,‹æz%(“ÉX.3:6Ììü,³s3q×Üü,i™XÖÅz¿ÞD£Q&&&¹õÖ[HMI!--`0H¦ÅBDp»\280È–º:ÒÒRé뻀ޠ瞻îB¯×£Óé(´Ù(-)A«ÓRVR‚muÍ@£Ñ —ËééíA©PRTTDnn/öSR\ŒÃé@¡P\.'==ÙÙYúúúH\ÍffZèîî!P\\Ä-·ìbvv–žž<^/ùù„Ãa2ÒWL_‚ P\TÄr @ff&ÅÅÅx½^††±Ùllß¶•P(DFz:f“‰p8LVV&çεq᪫*©®®A¥Z)•JÌ ’——OeeãããLLLpÛ­·R¼nJ§Ó1f·34+?/ŸÒ’.\¸È…‹0™Íx=N~ŸùùyJKJØRWSªr¹­NKrrÕ••«qÂS©¬¨@&“!D"Úl˜Í&¼/ýýý$%%‘ŸŸGGg'SSÓ8NÝóf“‰7Þ| ×ÒÁ`ˆ‡~ˆÜœ¢‚@gg'óóóädg#W(0 ¤§¥188DCc#r™ŒÛo¿ ƒÁ@{ge¥¥’KªÄÚ„—£µêƒÉNZ’JAz²‘ìŒD :5) z”Jr™ŒÌ43yYÉ$µ¤%1èÔ$'è1µ(•Š rõ¦‘!UUô÷ÐÓÓÃÔÔ33ÓX,rsrhmme9°Œµ Ÿ´´4Ξm`l|Œ;n¿ªŠ òóéèì`xxxµO'sêÔiÆÇÇ™ššZÙ_Th#%9éšeEmM /öÇå'-=´ÔTär[¶l!Ó²²‡bûöm$&&ÈHO'99N«ÃB› …BÁé÷ÏÄ¥ßÕÝMOO/s³sܹ{7åeeäçÅ—%###&‹6›ô~RƒÁ¸eÖM–ÁC²öövw]]ézϸÝ7BDØ8ÒP(0›ÍŸÚL)Æ\ AøXùEAâ^òZš‚ —Ë7 n.M‰D6„¡„è†Í*o6²1ŸµîDQŒ«³“ÿµÆr¹œS§OãñzyðþûQ©T«¬Ñh…BA à§?ûßþæ7ÉÎÊB¡P¬Äü~æYþößý f“)î]¬o,U‚€\&“½Ä§ÎÍ,C.ÍK4Ý`ý]ÛAÿaúÒ›åØ~Dx~ï^jkj¨©®þØe¹Ñ¬Yµ/Çää¤ç† K I‰I7e§Yÿ‚>îàC&“mèki^.íKÈfézvØËåóãÖÝõÈ¿L&C¡P¬t…•Jõ±;òZškÓ0FƒJ¥Š}&[ýL­Rm(Ï•:¯R2éKÜ„2ìf“!—Þ#—Ë7ä÷rƒëOZVl–ïË¥¯RªPªTÊ÷QÊrSX¨nÄŒ_B⣌¸/'Ä>Î,%£T*cÂgí3•J%…•dÅ5¥‡‘Ë埉==ŸÚŒ_B⣎¸¯÷,E­V_õ3 ‰?oYqµô¯§uáf@Z°”ø3BRü’â—øß5‡+E‘åååO%€ÏÚ³¯%ñZû— Ý8<¾eB¡•v¢¸<nDu߬2DâÏVñƒ DVOlŠl¸DQ@"|²gnnŽïüà‡445°¸´ÄÓÏþŸÏÇ«¯½ÆÀààu{– ±4Çìv^yíuAØô¾7Þz‹¾ >´€¿Þ÷///ÓØÔ„ ˆ¢ÈþéééýÈŠ¡««‹‡Å~/ï?Îù¾>þõég˜_X »§—sííŒÚí×\ÿÝ=+aEo¤òáù^ˆ L~ö/ÿ‚Ãé¼6aïñðê믳ärÅêój8NÚÚÛ?VžBá0¯¼öÎÅÅ«þf­ý–—%Éw#&¢Èÿó«÷8x¦!*r¸a€ÿòë3D®¡=|XYs³ÈÁz¹|(Y!qmÜ5þ•°¼‘+|ÿÉÌøÎ44²ûöÛéí=Ï-õõ«3ŠˆQQ\iÜ 8N4 YYYLNN’••…J¥bh5‹B¡Àn#7/7vþ¼Ý>†ÃéÀ 7——ûAš›tšH$‚}lŒ™é&&&VÃÌÍ1==ƒR©   FÃØØ^¯‹ÅBjj ÓÓÓ¸=|^)©)¸].´:6› …\¾z¾µ“ÉDFF333øý~–\.²²²ÈÊÌdÁá`vvµZµ  ¶¿bppˆßüþ9 zùùyƒAúûûñz½äçå’——‡Ïçctt…R‰ÍjE£ÑÄ ¬ÖòŸŸŸˆÈȨƦ&²³²ÈÊÊ¢²¼•Z›‘fggá÷û9qò$¹L¶4C†Å’×ëÅår‘™™‰\.Çívóúo²µ®–-uudeeáp8bï+'''æw …'*$$&¢P(˜šœD¯7`µ Q†† ,/“žžNvVN§“‘ÑQìcc«3üù…4*KKKè´Ú•P «áŠM&#ö±1Ì 8œ¢‚€^¯gǶmŒŒŒÄê³ÀZ€Z¥bdd”ˆ!/77{<ÒÖÞÎÑcÇÑëõX ‡Ãqõ,“Ébe1 øü~ü~?J¥½N‡Ãá$??Ÿää$êwì@©P008HhÕÂRXXˆF­‰+¯N«#*FA\wȇLF^nîMMì³À¢'ˆÓáôŬ¹sœîžf[Q*ˆ¹y­†Ô$=“³.ä2ɉ¦fIM6‘™j¾jŒ—›Q†¬ŒŒOL`ÉÈ@EfçæÈÍÉaffçâ"Fƒ‚‚‚+Ê“5ÖË¥¬¬,Nœ|€ßUY!ñ)Îø"á‚ \öºVêÇ2…\¼pG÷<¨ݎ۽yЇÃÁÓ¿ü7†FFxã­·ilj¦¡©‰îž&§¦øOÿù¿Ð?0ÈÀà ‡E\gRÄåvóê¾}4·¶Æmd¼” /òêëûÐëõ,WLt“SS,8œ>s–‡Ñ{þ<¯¾¾çâ"¿üõ¯q{<:|„Ʀffgøï?ýGüËËüaï Øívúûûyîù½ŒØíüþÏ308ÈÁÇ9vâ$^Ÿù×_°´´Ä¯~ý†‡G3º=ž•0žs³„ÃDQŸˆZ­æ«–‘_~™¡aÎkãБ#qeZŸÿƒ‡#DVÞ¯Z­á¹½/`ãÄ{ï1j·ÇÌA.\ ©¥e%ú•ËÅ‚Ãsq‘—ÿô'–——ini¡½£#¶7$Z1Á/8¸ÜnâÞWsKKlåñzù?ýG:ºº˜ššâ™gÉü‚ƒ·öï§½£ƒP(Èàð33³<óì/çÙ_ýŸÏ‡\®ˆY¡ºº»)/+cnnž'O²¸¸È?þóÏhhldnnž½/¼ˆsÑ{ÖØÄ/ýéfgçbõ †8qò$ï7œellœ^z9Îàr»ñz½ÌÎÍ …6Ô³Ç㉥oç§ÿôÏ,..ñÆ[oqøè»ø~žýÕ¯üéÕWã§?ûgÆ''ijnæôéÓÊ;¿°b5 G¼ùÖÛ4¶´2;7‡Ëí–$áuÀ±äÃfK§8EÃÛg†ØZžIq¦™ßì!yåhç.Lóvó~ñFSó^~}¨á–jnF²F(bï /à\\Äápò‹/2=3ÃÿüÅÓÌ/,04<²i;ߌõri9¸ŒÛí¾&Y!ñi+~áÊŠ³à=×›‰‰ †FFèèèÀãñÐÖÑÎF½,ÒÙÕÍöm[yèøÚ_|…c'NRS]Í™³ tvuQ¿c§Ï¼OOo/U•±SßDQ$7;×ÒQA`xx„Ëé}Ah=ׯ#=DMM56«QIOK'ð#zzÏs¶±ŸßÇÅþ~ìv;¡P¹BΖ-µÜ²ki©©lߺ•Üœ¼^/MÍ-<ºç¼ÿ~~ðŽŸ8‰\.gWýN¶oÛ†J¥BEJKKF»znýåeX22¸óŽ;HJJD.—³mëVª«*1 ŒÐÞÑÉÄÄ“S“ô÷ÄY2ÒÓ?ÈÿÀ Ñh›ÍÊÖ-uË8f–žg¥/0MÿQ[g:¼ÉEQDQàäŒò ¢³ÿªŠJJŠŠyî…HNNbÕÊ•ªý( HZ K«ÒH7G—Mª²¨+Í$qà㸮†1«›’œ «32î¦>#™ÁÁqô’ÀˆÕE’Q‹>ÇŒ^§‰kÿ_R_@Zz@`Òì =ÊäfêP8L8A”$îºó‡†xòégøÿûß̲sEQ°NLÄZerIÖb±™™ù™|…ʧCúñüw999úK™è„m»Ë†ÇëÆérÄýX'ÆÑë ä\6G‡ÙÛØÈ]wÜAqq1ùyytwwS\\Doo#£#äçå±oÿ~V¯ZM0dÏÞ½8¾u礤¤àñzIKMeÅòå8]n²³³iX¸0Ö$IbtlŒ–-ŒŒŽRZRBvV{öì¡¶º†ãÍÍÑ™UI ¢(’™™Áƒ‡8þñqœ.7 ,Àh4rìè1úÎ#77‡ë¯»–CGÓÔÔÌÐÐUU•ŒŽ’Mrr2ýý,^Ô@ÿÀyyÌ›>r„¤Ä$®½öFGGÉÉÎÆl6Ó××GIq [ßÛFëÉ“äæä°rÅòغš$IAö8@YiN‡ƒ´´tÒÓÓèë;ÇâE äææòþûÐÑÑ ”–”D‡ àñz8:)VV…œhm¥µµ­VËõ×]ËÕ"BÇ IDATèØùùù~Ž75“›“ƒÉdbÞ¼Z>Ì蘅ښjŒF#¿ûýkÜß½q ‚@JJ2íØŽ€@CÃBlvG\}M­OƒAYP_Ùl&³sç.NŸ>CZZ¹99oj¢³³ I’¸jý:L|øÑGô ’•™É„ÍNiI1ÑÓÀPp8¬_·Qñù¼¬Yµ EQbyÉ“/jXˆ"Ëì?p€ÊÊJ*ÊËùð£8y² §ÓIuUUÌ~ôz=½½½´µ·Ó°p!ÙÙÙqzÎËÍ•þ‚úz, ‰ dgeÑ××Ç¢†úûû)-)Ánw° ¾·ÛM0 ¦ºŠ¦ææXy—-YB__Ý=gæÈÑ#H’Äš5«I™ÖA¨|v²Ó“0>9¢¬ £–ŠÂ4æUäžl¤('½Nƒ$ T—fRW™Cvz¥阓 d¥™–ˆN7û¸¯ŠY¾l)Gåƒ>¤¥¥…“mm””ÄŽ»8w®sJ ¹¹¹¼½i===ÔÕÍcÅò大§ÇÙyvV/¾ô|œ––ÆÆ-ÔTW#G"ì?p€ò²2rrr>•¯P‰p¹\çýÞår/Ëé|QÜrD8ƒ^O~~Áœ›:.í\™õAbû $I" ÎyˆËÔõSÿOÿ{fd! ¢×馭IGÓœy*\,Ú19ó›J7 ÕêE!öÙôÓ㦗cêM—}®ë#‘Á`½^?+ 3³œ3ï 3N©=S§3å—e™p8a˜ª N¾p8;>´µõ$yùydLE@æHóBÏ´•™ú8_™æÒóyÓŸœÍ´‡¹®ŸYÞ)ûE‘@ €N§ûZœ8¦òÕò!3CôS÷ùý~t:¢(Æì- a0.hçs¥u>|1_ñ‡Î—v:ŸN§£¬¬üK sþ?=Üz¡ÁÇôûÏ7¢E£Á÷ÙTšs7óljA0̸æéqsÉq!ÙæúN’$ŒFãg*çô¿%Iš³s˜K~Qç”ÿ|çrOÑwîYÙÙqîg­¹®›yÒÖ\½ék–õõó?•N?MÝÌ¥ ÙèL=Úº¿Ðw3óž®óÙ„ÊW—¯Š™« ‚0˦4ͬ6x!;ÿ42]ÌW¨| ;RU òU ;+›{ï¾ûKÛ©aCÕW|ÓѨ*Pù*••©*AEEEõêŒ_EEEEEEEíøUTTTTTTÔŽ_EEEEEEEíøUTTTTTTÔŽ_EEEEEEíøUTTTTTTÔŽ_EEEEEEEíøUTTTTTTÔŽ_EEEEEEEíøUTTTTTT¾d.Ë+{].'=g{bç5Ç5t“ž–‚V£ž ¦¢¢¢¢¢òµîøeY¦»»‹¢â’ãOûµ:¼lÜv’sûOòíõŬi(¾l›:¾r I’f÷‡Ì”~ADó€E"‘ØÑž—“©£{%IšóØÜéG _Š2}ÀÚ ¶¯j©|.¹ÕȲL(Æd4‰Db?V»‡ßï8ƒ”h&$ƒ"+—µ`§Næ/ò×üìç¿àÿË¿²iË;x¼^µÆ'ëh×î=üì¿dûÎȲ|YòÂår}æû‚Á ›¶lÁn·_v]X­üê¿ÃívÏúndd” Ï>KxÚòóâr»ÙüÎ;sGÁ®0¡Pˆ³½½È²Œ¢(l{ï}ÚÚÛÕ†q èê³0áðàõéèE¾Ä¾.‘y{ÓfÚÛ;®@û°266¦Vì7 éÇ?þñßåääè/e§20pŽQ§À[»º0êE4’Àë;; ë8Ó?A¦2Êý7/F7íôKÍÈè(þ@€ýéX±|GÃírQR\ŒÓéÄîp Š"ǃÇãÁb±Äf™½^O$Áív£Õjc3B¯×˸ՊÏçC§Ó q{<Œ#G"hµZœNz}T­.— Fûý~Ü^¯Y–Ñjµx<¼>~¿FƒËåÂëó Õj …BØívG,Ý ›-&›$Ix}>ìv;`½^OpòŸÏ»Àérñä†gxðþû¨­©& âóùPY–q¹\4 ‘H§Ó‰Õj% ã÷û·b0èc3aEQ¢ò{½x}>A$‰°ñÅ—Ðj5˜ÍfAˆ•IQÀápb³Ù½^‡ßïgbb׋^¯'9)‰¤¤$¼^/.— ‡Ó‰^¯G’$<V«•`(Š‚všƒAœNgœüSùNÕ÷Ôuccc p¢õ«V®D–åÉr†Ðëõ¸Ý.öí?@A~>zŽ@ @(B£Ñàv»c:˜˜Àét …ÐjµDdëø8'šžNGRR &n»Í†ßïÇ`0 NgT¡P(î¼òH$ÂÄ„-¦+FÂétÆéÄ;9 Õh4øü~“2œO'#££üç=Æâ†…h4ZZZZGÂÈI’Ðëõ„Âa¬“6®×ëQ§Ó³­V;g½‹RT>¿ßO(BE\.>Ÿ/V®™uŽDâòE·ÛÝn'£×ëñùýq¶-ËòEíÿJÛŽÈüŸ§öàð†¨-Íäùm-|Ô4ÈõKŠEá<'ø´bʲŒÝî`ph“mmä“‘‘§Qq:x¼^¬ãVt:-áp˜`0óUSþ`¦~fú%I’øhûNwž¡° IÒàrEm@–eÜVë²,Gë1¾¨R¹ü N¸\.Wð²tüçúúhlsà’èuqüÔ0˜’éê·SŸ©P_(RY^vÉB¨s166ÆðÈ(+—/Ãh0“Ãko¾EqaÏ¿ø>¯—½û˜W[Ëko¼Á¾q¹œl{ÿÊËËyjÃ3,jh`dd”W~÷{–-[Š4Ùq=vŒ¦æfvïÙ‹ßïchd„—^y%"óêk¯±`þ|6<ûååå À¯û Ë–.A§Ó¡( ‡æÅW^e``]»÷PS]Í[›6±k×ìÖ‰ ÞÞ¼…>LMu5Ûwìäà¡Ã8œÒÓÓikoç½÷?`dd”3]”–óüÆè;×O__…lß¾ƒý1f±`6§’’ÀÙž³l}ÿ}RÍfDQä_öX,ãh4¶ïØAk[‡Ž!ð‘eþõg?GÒH<óÜó¸\nÎtv284DmMM¬Î÷ÚkìÝ·ŸööZ[O’‘‘Á;[·áv»Ñë ‚þåßþ‰‰ ;w醴¯—í;v0¯¶–ß½ö:½}}ŒŽŽ‘™•Éó/¼HFFÿ÷ßþ`0Ⱦû‘e…ô´4žxz^Ÿ—÷>øP0HYY‚  …xùÕW9Ñz2Nþ©|sr²1§¤ Ë2›¶l¡µõ$>Ÿ³½½¬\¹’—_ý–ñqvìÚMfFz½ž-ï¾KVf&ïlÝJfF&]tuwSZRÂ3Ï=O~^]Ýl~÷]ÜnO?ó,‹-bß¾ý||ü8ýƒ¼ñæ›ÔÔÔðò«¯’–šÆüâ—‚À[›6SVZŠÇíæ™ç7 yñ•W(,( ;+ ·ÛÍ›ooŠéª°°ú_ÿ{šNdzÏãlo/e¥¥¼ýö&dE&''ç¼:éï`÷ÞFôz¹9¹ôôôÐqê¢$²ióV­\Á»[·q²­­'ñûý$''ówÿŒY,$$$5g½———ñïÿñœéì" ÑÖÖÆž½tœ:EwOe¥¥¼ôÊ«±º.ÈÏçý÷?ˆË+)9™_ÿæ·x<^º{z(.*âù^ŒÙvIq1MÍÍ´ÿ’’ô:Ýu¸cv/Û[pø#$èzGœÔ¥’˜ §ñhCVz†‡»é²VöîÄ’ÉÉH¼è@ålo/ž}£ÁÀ±ãÇYP_O___œJJJø—û7é9ÛC{Gz½ž÷ÞŸúúzŽ}|œæ-ÔTWÇå7—_*-)áý>âܹ~$I"99™ø§fÌbA§Ó±go#ÃÃüµi3ÕÕU4îÛAU[S­.M|E:þËR áH˜Õué Ž!k $edÒ3ä 6-ÌíkJH4éPP®¨2DI$ и?ƒ›šðùýˆ¢Èõ×^Ã-7ߌÏçÜ’‚Ùl¦·¯ÓgN³bù2´Ó)5Õ5ÔÖÔPRTıãMDÂV­\Á·ßFNv6²,³pÁšššé;×GMUF£1np´bÙ2¾ÿ½?fÉâÅýø‚ póÍ7rë-7sôè1¼ÿ>þè;™‘Î;ÛÞ£õäIyø!îºãRRRصg ‰ ¢Àî={ˆÈ2Y–YÔЀÑhD£‘ƒTWV’™‘Ë¿¼¼ŒÂü|nºáJJJÈÏÏã»|›”äd<ß}äÛüðòáö8Nêêj¹ëŽ;(,,`ÍêU¬_·Ž3gP”h*“Žãúk¯á‡?xQðz½ÔÕÍã¦o`åŠåH’Äüº:¾÷Gße^m kW¯¦¸¨ˆÁ¡!:„"Gxà¾û¸ëÎ;HNJBVd ?/»ïº“«×¯ghhãMÍÔÕÖpÇm·±bùr%Þ1ºœ®YòOå[TX _NLÐÞÞÁ½÷ÞÃúõëHNN¦«»;Úù‰"Á@€Ó§OP]]Í ×_Ç#?Äö;…B±rËŠ‚×ëcïÞ½®»æ'ë]æÏ¯ã[wÝÉâE Œ±oÿn»åfn½ùfÌŸg·F“)NW–ññ8  ³¸¡ýûb˜àlo/ÅEE1§>—Næ×ÕQRRÌ}÷ÜCvv¢(ríµ×pí5× Ý==ìÝ·/6k;pð( yy¹|÷‘o³ ~>‚ ÌYïg:;1MÜï=,¬¯çDk+ß}äÛ<ú'ßãlo/íØW×Á`pV^D£3’Äò¥K‘$)ζ‹Û¿ÁpÅ®Í᥮"›†¢dŽ£ 7•œ4¯nogQ]Í탴ubóË̯ÊåWo4!Šoì?K$rá嶈,sèðan¿õVn¸þz.Äãñ°kw¼äH“ÑÄ·E¯¤¬´”þAÆÇÇikkcá‚svÀ3ýÒ©3§Y¾l«W®ä–›nB¯×Çl`ñ¢E\sõU"LÖÛÅ|ÔåZRTùì\–)w$"SW’É·×GxiÏ!IÇÂ,¸c])I‰FdYáJáB¡>Ÿp$ÂGÛ·sÍúõ¸\. òó™?>+–-%9)ir` ÅBÁ‚ pݵװ}ç.FFFøï?ýë¸4·¼ó9¹¹ÔÖÖÐÕÓ(H¢ˆ(Šhu:`ÉâElxîyŽû˜G~pކ¦ÄISaYI’Ðj4±ðm À`6§‡ñú|˜L&PÀ Ó³°¾ž‚ü|®Z·“ÑÈý÷ÞÃàÐ=þû×?aݺuÔÖÖòü /qÇm·²léA˜ì¢ƒdEAÅhˆ× ' £áiq²\QG¬9ÿˆ]ùd‘e´Z D0$ Å_’$qêôiÞÿð#î¾ëNRÍf<^Á`Qㆄ¢(LÖK4´¬‘$ÆÇ­ƒ!"ápœZ­vnù'óê EAD–åXØZQd4’D~^‹-bÕŠ˜L¦¨í„ÄBa\®èÒ¤Ñà±;ƒƒAQÄf³‘”˜8¹)Q  âšÜ7 (ñƒÜ¨LZ­EVÐh4Œ‡ã6¤œ9s&NWŠ¢Äë…äädJŠ‹x{Óf233IKK;¿Nô“K4ŠB @’41™$1ºÑSR’“iX¸””4’“Éfm’QïIBÔ–u:->_tùJ‘ C\] ‚8+¯ÄÄD~øƒG9}ú ÿù_ñÿ?ãlû/þìÇè/bÿÿã§?%=#%Úf®·—Åeé4Tf°a[+…Ùh•· F‡Ç`ýü\´’Hn¢DY~ó«ó8zj„ª‚4¬nRtd¤I0~±F‹Ëå& ‡&—Éâõ ÑDõ/J¢m]«ÕrÕºµ¼÷ÁŒSTT„,ËX[“bíî¿dÒ› EíG™æ+ÆÆÆxñåWxèû)**DQ”‹ú¨ËáUù*türA€ù¹üP¯ÁæðR]–MJR‘H˜P(ˆ(^ÞõI9qâýöq|~?µÕÕ\}ÕzœNÏmÜHo_ƒ‘»ïºN‡4¹¶o2™‚úúz©›7/68˜rÉ)Éœ:uŠ­­$˜LQ§6ù½A¯GÒÓÓILH`È1›iNïò÷ìmÄ61Ãéâ;ß~‹Å‚$Šèõzn»õ^ó-´Z-…ùùÜ|ã $''ñìsÏ“——Ë ×_Ï7ÜÀ››6‘—“CZZW­_Ç[›6 Ù™™h´ZÞÿàC;’(–jŽ í%&$D€ÑhDŠ ™7¯–gž{žP8Ì}÷ÞƒÉdB¯‹ÎÆ CÌéO`Dë<Â|ÈñãÇIII¡¼¬ ŸÏÇÛ›·`³Û)))Ž¥“€Ûífûöøü~jª«q¹Ülxö922Ò¹ñ†0H¢“M’¤¨³_¸€¦-<ûüsœííãúk¯Ép1ù§HKKeýºu<¿ñ’’’G"”•–Ñ]ÜæÍ[HLH`Õª•d¤g084Ä /½ÈÈèßû£ï‚¢ðáGÛ±X, bJHà–›oâÕß¿FNv6gººø^f&×_w-Ïo|„„Ǥm'Ë!LvÊ:Žõë×ñô†gèììâØñã,_¶4&ëL]I’§V‡V«eÁ‚zþùýþë—¿ˆ«çY:¹çn233¨­©áÉ Ïð퇌Úÿäú«Ñh$3#ƒ«¯ºŠM›·‘‘AEy9 Äò½P½WUV°goô:³ÙÌ-7ÝÄK¯¾Š(¬Y½ŠÕ«Va³Ùbu}Çm·ÏÊ«¼¼Œ-ヒ$Š”ãxçÝ­1ÛÎÈÈঋØB‚‰ÆÆF"™[o¹ù²;RÈÏ1“’hÄ4Ùaß¾¬˜ì̲R ø¼~p{=.·ŸÜŒ$´‰{¯›‡Ç ˨CTDRMô’€fÆžQY·f5ž}ŽŽStu÷°tñbn¼áÞš¦‡›nºÓd= ¢€ÑhDEª««yöùüÙ~ˆV£aÌbáÅ—^Ž J.X€¤‘âüÒ÷þè»LØl<µáB¡×]{m̦|ÁÞÆFºº{¸û®»ÈÌ̸ úÖ]wªëü_„¦¦&gCCCÒ%kŠB[ûIFF‡PEVb#EÈJÏaþüú˺Þ#Ë2ápPb½H’™úý~ôz}t#Ö´GÇ‘I"‰°qãF–.]JÃÂ…3"œ.Fƒ16Cšš±‡Ãá˜qïØ¹‹`0À­·Ü§Ÿ½Œ['¸jÝZRRRÐj£p¦fÖS2Æfb’„,Ëøý~dYÁdŠ6¾©Y§Á`@£Ññz=$&&F7†Ã¸ÝnLFã¬ÍNSÔ¦Ê35#žþ¤F£‰møÓh41§ô;u8áÅ_¢²²‚yóæ‘’œ§ë)ýOÝ3µ)LQ¢3À©k§6€MmÞšºgêûérø|>>øh;9ÙÙ¬Y½*V¶ É?Ó>ü~lV<&Žîºn8E‘P8L0@§ÓÅ"3¯9™\NÑÄÖÕN'¿yüq~úWErr2~¿ŸÁ¡!~÷û×øÛ¿ùilƒç”žñEîºývJJJâ6NN×Õ\:³ðÄÓOñ7?ù ³Ê:]'Sv®L¦3¥kAb¶ ( Á`p8ËwæcsÕ»(Šq×M·å©hA$‰ÕµÁ`˜•—(Šøý~IIIH’4˶§6-^Èþ§BËß”ÎFQB¡Pl£ÞT]ÎÔÃôÇF§Gõx<üü—¿äß”¼¼Üɴ±¾ ì?xë ¿ôIýE7–N¯[ŸÏG $ÁdŠÙÏ…|”ö2næVù§ÓÉààày¿t]ò¿ ÔÖÌ£°°ˆ€?æÐë $&&^öM¢(¢Ó‰sʧÕjãŒpz§0µ–ïr¹878Äw©žM$RÍæ¹C(Óv8t˜?ûÑŸÎyÑh cÚºût¦dœYž™!K½^[ÎÈõÑý “è´ZÒRSçÌÿ|åŸ|L—eêÿ™×Å+“’âò›YŽ©{Aˆ­{OgúgS×N¿'Ú!8z,º'âDk+K—,ŽÐ\Hþ‹éS’¤YŸé´ÚYOŸ$ÎèXûúÎqn ŸqËx4Ò“˜H[{.·‹ŽŽSTWWÇ ¼¦äù䉭'O …°Ù줧§ÇÉ?SW3u¢-'N°¨¡aΰöLÑðýdþÓ¿›ªã©YÝ\¶}±z¿˜-K“áüé×ÌÌËd2Å•e¦mûÿ¦Í.A@§Ó¡›±iq¦¦ëêïAÌæT²s²§¥¥Tsø¥™õ7=m£Ñ8+òw1¥ò ñS°Z'¡®¶ös=äõziïè`ႳŸÅb!‰““ó™‰ô÷÷“œœŒù<¢KE(âìÙ³x}>ÒÒÒ(,(¸âmÍe+CCCbt¹$99™Á¡!Æ-ãèô:JKK1\Àùy<úúú‡£6‘™™ñ™Ê$Ë2míäädÇmâü&ջʫ§¾sç()>ÿKÓ¾i~IñŸƯvüh,S#Þ/’Æ—Ý)©üáØ«jk*ª}¨|)¡þoL(ä4µ¡©|ìUEµ•? Ô·)¨¨¨¨¨¨¨¿ŠŠŠŠŠŠŠÚñ«¨¨¨¨¨¨¨¿ŠŠŠŠŠŠŠÚñ«¨¨¨¨¨¨¨¿ŠŠŠŠŠŠŠÚñ«¨¨¨¨¨¨¨¿ŠŠŠŠŠŠŠÚñ«¨¨¨¨¨¨|.Ë›ûü~?çúÏá÷ûf}§×ÉÏ/ˆQª¾MJEEEEEåëÝñ˲Lgç2³²(*,Š{U¤Ûä÷¶qzÛrK- Õ¹j ¨¨¨¨¨¨\A.y¨_–eü?æs\§ï „x§±·˜@Xk`|Â}Ù ‰D°Z­øØÿv»Y–qº\“g¯_E‰¥ qº\(ç¹ÖårÅdú"ƒAÁà×ÖøEÁétÆÎkÿ¼„ßÔë•Çãñ|ætdYfbÂÆøø8¯×‹×ëýÚȯré°9½ø!BáV»'îhòKÅ—åCãV+N§3V®`0ˆcÚÿ*€?@$æì -»;è¶áöúÙ¼§K@dp܃Ö=Ì’º¼Ë^¸Ñ±1¾ÿÃqðà!ìO>½·ÇÃ[o¿MWwÏ%é¼"²Kó\?ooÚ„‰ÌáäÃlyw+§OŸþT鞯1)ŠÂɶ6šššfÝs!|>?»÷î%2‡lW‚ññq:ˆ=ý̳ŒŒŽ~n§¡( ¶ ûíoq»ÝÕç\zšîÀÞ|ûm&l¶Ï¤Óöö~þŸÿɦ-[øpû>+㥒ÿÓ:ñ™òUêýYVø— {Ù¶ï4áˆÌ;§ùÇçŽ\ÚØ—åC"‘¯¿ù¯½þ'ÛÚQEQè9{–W^}•P(¤Áׄ˲Æ ‡yg_]2]}$À¥µûH=̯5`Ò_ÞƒEaßþÜxýõ´µ·±zõªèçSópå“ë†GF°X, JŠ‹9ÛÛKIq1:ŽöŽ*+*$‰Î®.*ÊËÑjµtvua±XHLH ¢¢‚éSü™í'ÓÕÙÅÐ𽽽̯›G(¢»§‡@ @vv6éétvuáñx‡Â¤¦¥2n';'›²ÒRFFFèï@£ÕPYQAnN¡P˜³½½¸Ýnìv;………12:ÊÐà :½žêªjtº¨Ì§:ØøâK$˜LTUVa2ãdÈÎÊŠEjÆÆÆOžÏ}öìYr²³ ƒôöõ!åååF:»ºp¹\äç“››»¦n‹‹‹9rô;vîÄd4PVVŽÓéäxS§N¦¶¶†¼Ü\Æ,úzûHHL ºª ŸÏGÿ¡P¢"ÒRSp8œ:}š‘‘Q</ `³Ùè@%JKKˆD"ôööât¹HJJBœN'ójkIII¡½½‡ÓAZZåee,Y¼A8y²@0@8¦¦¦š„„º»{p¹œddfÆÎ5ìml$;+‹… `NIa`pyÒ)Î,‹Fó‰ÝÏ%ÿèØXÜõ@\¾ÅEEX­VzûúE‘ÊŠ ‡GÂè´Z-\ˆ(Š´wt…‘4åå­÷Œôtººº G ô£##³ìGåüL¸üØ2:'(-¥©ÓÂòÊLìîƒCVŒ&ÙIôX‘D‘Ìô$Î Ž“™BQN*Ûòt¥}ÈÌý‡†Øµ{<ü åe¥X,:»ºèï8ï€ò‹ú•¯ÑŒ?SWœHwŸÉ”HP—„Å 9âäkJIK1—7,äõúèììä–›oâÜÀ N‡cÎë, Omx†ñq+;vìdÿƒ´œ8Aˉô ðÿôÏœ>}†346î‹“zhxE÷>øCGŽ|2¨˜cÒÞÞζ÷ß'';Ae™;w±s×n, Oox†þ^|éeÆÇ­tõtóÊï~1d’zY IDATÁÄoŸx —ËŸu‚`(DSK ïnÛF{Ç)Ž77³cçNŽ=†(Jüæñ'°ÙìlxæYFÆ,ØìvÂáP\X9‰àóùåÈ,Æ,–˜Ì§NÑÜÒ‚‰°õ½÷eó–wh=Ù†×çÇíñÐÖÞÎÖmï †xjÃ3¸=žóêöÀƒ‚ABá0>¿?6‹P%‘W^}—ËÅO=Ïïç£í;øøøqFÇÆxbÆFF‡¢Ë¡Pˆ—_}ëÄ™™™(€×ãቧž¦¿€æ-lÚ¼…þ6¾ü –§6<ÃÙÞ^&&&xãí·‘e™ÁáadYá…—^¦­½·7m¢`€ß<ñ‡““ííìmÜGgW7_z‰°,3<2+£ ¢ˆF«¡`€½û÷ÇBí^¯wVYbN|ù=n÷¬ë»ºãóõù|<ý̳¸\n"‘áp˜/¾HˉX'l¼þÖ[ô÷÷ó›ÇŸ``h»vóÁ‡.Xïý±t†FFxòé§ç´•ócux©,Ï¢&ÓÀ¶Cg™_•CyNÏmkE«×³eÏ)šN ³»m½QϽÝÄ„3À³ž&r‘¨À•ö!sÍÞEQD4Z-^Ÿ'ŸÞ€$I$%'ŸWæ/êCT¾F¿‰°¤&‡o-N¦­sˆ3ývŒ!^[JfZЬp¹—ƒúéìêfÿþØm6Ž}||ö4…­'Y±l)×\}÷Ý{»÷62¿®ŽÑÒr‚µkÖи?'ÛÚ¨««C79ÛW…ô´4úñù|ôöõw,#Ë2Ç›š¹éÆ©©©¦¸¸ÇÃñ¦&¾uç\wíµÔÖTs¢µ£ÉÈ‚õ,\°€üü<êëê0 „#Ì))ŒŽŽâq¹éî9‹,Gb rÉ’Å,\PA¯ÒÞÞN0D’¤˜,U•dfd²jåJôz=MÍÍq2´µµÏÐÐ'H’Dmm ýŒ¡Óé8vü8v‡–-ŒŒŽžæ0æÒmeE9ùù¬X¾£Ñ€Á``QÃBjª«ñûý´utÐ×wŽÖ“­Œa™ˆÔÕÖrãõד••u²Œ[Y·v-•å$˜Œtvwc6›¹áúë¸÷î»ù¸¹—ÛMey9K/¢° €Úšª««±Z­$'%ÒßßÛåbtl,VÞ¼Ü\V,_F}ý|œNéiidfdpòd©fs,$ªÓé(Èϧ´¤„êª*„˜æÎööÎY–óËß3ëúŒŒŒ¸|Ïöö’•™ÉºµkX¶t)ƒS‚‰k®¾š†… Ðjµ(@Nv6W­[Çw¾ý0MÍÍ\°ÞO´¶ÆÒY¹|9Ë—-›Ó~T.0Ùp{YT–Á×ÌãÑÛ0îð%´‘ɉ‚H¸=~nXT@’Iâñ’dÔp×ò"Î Úpzƒœq`±{ñÃ_ª™kÿSvV©æTêëêðx¼dgg±tÉ*+ÊÅów%_ć¨|:þˆA£Ñ°ra¯Lcyv˜o_WFv¦…P8tACùâkm2M--ÜwïÝ,]º”î¿#ÇŽ …ðz¼LLL +2ããVÒÓÒèìêfxx„3TV”QTXÄ„ÍÆÞ}ûxä¡äð‘£,¨Ÿ¦ýýk¯3~=+–/‹ÍþÆ­ã„CaìvGlË ädgsúôiìv;§NGvv§;;bph˜¼ÜOö=|ÒDe `Ë;ï•ÅUW­?…Š"Š,³dñbîþÖ]lÞò¬È  ‰DÈÊŠ—!7''v­^¯Ç2fÁf³áp8P€â¢"þø;ßád{;ííäde³|é2î¿ï>þñþž¤¤¤Øýyy¹³t«Õhq{<  …c¥´ÔT*ÊK¹ýÖ[ù«¿ü Ö®Y3¥8LFŠ¢ÐßßÃá$ ‘•™É˜ÅÂÀà ]ÝÝdgf¢ŸÅò˜ö{pp÷Þÿ€5kV3¯¶6~}sòQQÐh4<ôàñÊ«¿#8sC”2½$&&lh4ZÊ˦—eíåOO›Yöµ³òÕë 322ŠÝá@>Ï: è$##½NwÁzŸn{Š¢œ×~TÎ7#£AÇ’ª,²ÓÉIO¤¡(…ùeY,ž—OK{?Ü8œÌdŠsRÈ4¹ji)£VFƒ›ÕÃåÃn÷`³»‰„ãCçW܇( –ñq†GF‰†ì§mÂMM5322Êèè(v»EQ†B±ë‡GFb2~¢ry~üãÿ]NNŽþ’®uÙ&°Ú,x|. ÚÉ‘8œvÆ­ãè´úYú]ÒG$‘#G¹åæ›((ˆ® ôPXX0iÄ£røÈV­\‰(Šì;p¿ßÏ·ÝFrr¡Pˆì¬,–,YŒ?à§ ?ŸùóëbFƒÝa§¹©›ÝNYi)99Ùì?pšêjÚ;:E’âbDQ$+3“ãÍÍ||ü8ÁPˆ…õõ,jhàð‘£´žlcñ¢êë롪ª 9"ã÷û©¬¨``púº:DIäÈÑc “—›K^^.ZVKvv6)f3ÃÃ#ñá‡ÑÚÚJqqË—.E§ÓÅäFQ8|äÔÍ«“aáÂÑž  Õj9zì('ÛÚÐétÌ«­áÈÑcÎÈè(U••±=©©©x½¾8ݦ¥¥2<2©ӧ©ª¬Ä2>NeeZ«ÕÊŠåËÑiuìÞ½‡3¤¥¥“`ÂívSUU{÷ƒN§#33“?ÚÎÙÞ^Ì)fÖ¬^EVV&»vïaphˆ{îþFƒ·ÇMUe%ƒCƒ”•” Ñhp9,^¼˜Þ¾>ÚÛÚ …ÃTV”£( %ÅÅx½^êæÍÃëõ‰„‘…­Û¶222šի(/+‹Ùïøø8F£sŠ™@ @ii ûöQQ^NVvV¬,éiidffžWþµkV£×¦•= §ÓÉ»[ßå» ¾I’ؾs'===c³Ù¨ªªÂ`004[ß{Ÿ‘á¸ëÎ;ÉÊ̼`½O·=E–y÷Ý­sÚÊÜd¤&bÔ²¢(7“AKI^*U¥Y˜“ äg&£ÓjEŠ¢tjʲÉLM (7•”D¹I¤›Ði5³:þ+éCjª«øàÃ9|ä(mmíôööQRR‚Õj¥~~éiih4;vìddt”¼ÜÒÓÓyãÍ79ÙÖN[[;‘H˜ŠŠ Ž}|ìsû•ÏN Àår÷{—Ëšššœ —tˆ ÆëñÆ­{ €É”@nnî—æH¦6¡ˆ¢H8þB¦( Á`N‡ (ŠB8F£Ñ‡‘$).²¡( ‘HI’>× g*?­V{ш‰,ËC!ô“²}‘ýŠ¢ Ñhbeœ)Ãôr_ªÁÜT=],Ìüi¯»Ðý‘H­V{QÙC¡Š¢|*ÛÒ‘ ”q®ïf~6W¾ápAæLÓ:1Áo‚?ÿñH1›Ñ|Ý\*ûQ¹Ô‘…+çC>­Eñ‚i}Y>ä§ÓÉààày¿t]–­õ:Žâ¢â¯fˆcšü¢£JA¢¡äiÿO¥9WÚ‚ Äíêþ¢ù]p G£ëý_™òÎ%Ãôr_Žzº×]èþO›Æg)ãôNúBéÏõÝÌÏæÊ÷bv$‰"£ñsuú—Ò~T.udáÊùÏã¾J>Dåí[UŠÊ7 sJ ÿÏ_ü9FƒAU†ŠŠÊìÁ˜ª•o’$©¤TTTÔ¿ŠŠŠŠŠŠŠÚñ«¨¨¨¨¨¨¿ŠŠŠŠŠŠÊ7“˲ƉD˜°MðûãÞÚ$zƒ´Ô4õm`******ß„Ž?zZS7¢(‘jN{&SQlvv»ŠòJõyM•+Ì%õ˲ŒÃá /7ÄÄDb?‰‰‰äåæa·;®È™áS/Š˜z!Š¢(±—¡„B¡K.ÃTš²,_ðˆÊp8|IŽGÊër‰D_Æc\?kúS‡Ò\j™²‰ }öYÒºTur>;ù¼ò©\~‚¡HìÀYQ×%Ÿ/ÇLùÓKmwòó¥”õ2´‘ ù Ëѧ|m:þ蛥€L$žõ ²¾"NkÜjå‡ÿíÏ9zìclv;ýöqÜn7¯½þ:§Ïœ¹t 1‰¥ÙÛÛÇko¼9gÃŒD"¼õö&Ú;:¾°žO¶µÑÔÜüSˆ3ŸÊ@[OždÇŽ—¬®dY¦³«‹Àä{î?kúÍÍ-¼»í½Kj#þ@€_?ö,–ñØgSvâŸÄëõñ³ŸÿÏ%<=OQ:Dã¾ýs~!_z!¬V+¿úÕ¯q¹Ý—T÷fÇγüçtÿÿuಬñ‡BáØ+EÏ7Z½=ö1¥%Å´µµ±tÉbE!  LÊ(ËÑÇívãõzÑh4¤¤¤`w8HINF’$¬V+©©Ñ% ›Í†ÙlŽíO˜°Ùp: Ì©©±4eeö(U–e&&&³X·P-W‘eìv;‘p˜„„ŒF#6› ¿ßO8!))»ÝÙl&5ÕŒÛíÁn·!Iéééäç剄±;„‚AœNéé¤$'ãñxp:h´ZÒÓ>ÙS144Äo‚ÿñ7?%##­V‹mš Ÿ ‚!úè8ušTs ÙÙÙx<Þ8<É“º²Ùí$%&âõzq:$&&b6›cvàp8xòégøÓGÿ„ü¼<‚à¬ôe9zx’,GHKKÃ0í%4Y& …°Ùl¤¦¦áõzâòòz½øý~"‘z½ž`(„Ûå"))‰´´´Yé£(Y3þ@0€¢Dëm¦~¦×{FFFô@‹…1‹… ›-.-ǃÇãÁåv“’œL("“““ƒV«·=³âì¤*R‰Ãá@¯×£Óé°Ûíè&OOSeÒ®løý>Ìf3‰‰‰øý~ìv; ––ª¾gÿ áð´úø¨u”â‚ ^ßÓEu¡™@(„݃V«ÁdÔátù“Q‡Íá%)Ñ@JâÅ_¶t¥}Èlÿ­àóùP»ÝŽ(ŠèõzÆÇÇ‘$‰ŒŒ ì“m@§Ó †&m>Dvv6:§Ók³)))±×fÏYæi¾4ã˜<()9½NÇøø8n‡¤¤$ÒÓÒƒŒŽŽ242‚Ëíb®c`Á N‡·ÛÉ”€ DÛinn.ƒ¿ßËåBRRRÐh48NFÇÆÆd4âñz€„„„XûœòÿТĕÑl6‡±Ûí„Ãa’““ãüì—Á%?¤G–ezûÎ’•¢(³~dYfhh˜¢¢âËzB_ `ó–-Üs׷ؾs'+–-CŽ75±léR::N‘ŸŸ^§ãñ§žfÜ2ÎÎ]»IHH`ÏÞ½ÑWJ* þW?añ¢E¸\.^ó-5,н‚òƒ¶344Ä–w·bNIaÌ2F~~>Ĺþ~.¨•±»»‡ç6¾@ªÙLSs óëêèïïçÍ·7a±XØÛ¸ÒÒR~ù«_ãñøhnifǮݘLF~÷Úk¬X¶,všUã¾ý¸Ün¬t÷ôpìØ1Žý˜@0ÀæwÞeÉ¢E<ûüF,ãã  R\TsþGc÷ÞF“ÈÉÉ¡½½=N†yµµ±ÎvppÝdgfò⫯²lÉ:NŸŠÉàp8h9ÑJ$!==Ÿýâ”ñÜÆ@ØòîVjª«HLL «»›mï€Á 'ÕœŠÏïcOã¾XúK/¦©¹…»va°ÒÖÖNݼy1 12:ÊÈÈmíädgóäÓOÇòªªª¤õäI^xù\N}çαùwÑiu¼üêïX¾|Ç7Å¥_UUÅá#GX¼h‰‰ÑÆèóù8ÞÔÄŠåËhjn‰ÓOmm-{ö6Æê=55•ž³=|¸c&£‰ãMͬ[»†äääØlæõ7ßEá·O>…Édb÷Þ½èt:’’’âl/99 ·ÛÍó/¼³“ÚšjöL]Ÿ˜Ä/õk.\@SS3‹50:6Æ /½L$á£;©›WËû|ÀÇÇ›p8$''“ržóÒU.-cNúl>² '{­Ì¯Ì¢<3-ƒDÂa¶ìíD«ùýÞnÒul9ЃÏëãƒæ!VÔæ ŠÞót%}ÈÚÕ«gmÀ…BìÝ·¼Ü\~ÿÆ›TVTðÑGÛéîé¡­½—Ë…ÙlæþÃÿ‡Óé" ðË_ý $qððaB¡ ©©©üæñ'bm¶ºª «ÕŠ,+”•–Î*ó„ÍÆ¹þ~êç×±uÛ{ì?tˆ®în:::¨ª¬ä­Û°Œ[xã­·©,/gûŽtuw…é9{–«Ö¯›õzàÞÞ^þí?~NbbO?ûþ@€³½½œíí£²¢‚/¼HWwG}ŒÛí"%%…ß<þ ¦Îtu’ž–Že|œîž³”•–ðÌóÉËË¥·¯—üü|´ZM\«ª*é8uš·6m&  ÉÍͽ¬}ßÅé¹<Çò†#±QÜÌY–'Cþ——ÁÁA·Ž‰DhkoŸ+ÐDsË jª*yðûùãï~‡mïÀâE‹hÜ·Ÿ–­T”Wиo?'Z[™_7ƒá#Z²xYY™¤šÍ´µwÄ<=#4wèÈn¿í6®Z¿žúùux<öìmä¡îçá‡$/7—7a2™¸æêõ\½þ* ò¹îšk&#!*+*(,, ;;›æ–DÂ%ú^õk¯¹Šë¯½ŽP(D0$))Ú‰TOžÚ6ÅÒ%K(,,ä[wÞARR{ãeh>qâÁË–qõUë)/-Å:1Aeù'2œlï`éâÅ4îÛGëÉ“”•–ÐÓÛ›ÅŽŽŽ2>n%W]=Gü¶[o¥¢¢AãÒï`Oã^4 ~¿Ÿ}ćÔ…;wñqS3÷Þý-N>=#¯hè{ÍêU<ôàdfd°rÅrn¾éFòrs±Œ±§±qFúç!ú|>ö6îÓOKˉ¸z?tø0â¾{îaíšÕÍJgé’%Üvë-¤˜S¸úê«XÔÐÀððð,Û{óíMìÝ·?ÎN&ÍtÒ´”¸hB$"sðÐa4 ¯ÏˉÖV ¸=òóòHOKS{ä+„Çí£¡<ƒ›ÖTqûš œÞ!A$àôP_™‹ Øìn[^Li~]ÄAæç'3jóâFwøpù‚„Âò—êCÀœeæ?ýߺó zûD–eGŽE¡ ?Ÿ‡|€õõÑö~Û­¬]³†‘‘Ž77ÏÙf?Mè¾åÄ yø!þø»ßappˆááV._NzZЬpàÐaÎtvr×]w²zÕÊ ¾½rþ¼yÜzóͲjÅ V¯ZEÏÙzΞ% ððCòƒïÿ Ûwîb÷ÞF54pýuײtñ’èãi ÄZ¥¢L‹,(´œh+£u|ƒ!¥KNJ¦¤¤ä›êÈS›éæ^Ó‘#—w„,Ë´Ÿ:Eâ`ÙÒ¥4îÛOUU¡`¿Ï¢(x½>ôz=v‡¯×‹Ýá Õl¦¨°7Þz›¡¡!¾ÿ½?â¹ç7ÒÝ-ðÓ¿þI,§ËÅ /¾Ä-·ÜLݼy  !àõyÑj£K Àd2!Fƒ›ÍF $ "I&£»ÝAZZ‡œÜ@˜<íJ„è¡’D dÛ¶÷(*.¢aÁúÎcúH#zOôZFÃ]wÞÁèè(?ù4ûÓ¿¦¨¨0vŠ‚ÇëE¯Óc4šâdHœ‚EQceÚ´e3ÅÅÅ4,XÀÀÀÅÅEø~^óMyøa|>/5ÕÕ¬Y½šµkÖj6’Öäir^w²Q*qéƒ@‚)¥KSTXÈ×ßÀ‡ °páÜng{{Ñétqy¥¤¤011(бÓ˦ô¨ÑjAH0™âÓ×j‘e¯Ï‹,˱ëCÁ@ƒÞ§Ÿ@ WïÝ==“!xI‰‰„ó7"‰b´%QŒé 1!Þ¾¾˜í¥§¥aš ÕNÙ‰ ˆ’ˆ×ãÅç÷ …&mÜçó¡×éX¸ ž… °~íZÌf3+W®¤¦º†ç6¾€,Ë,_¶L}‚æ ¬ïBa–Uf‘›™Œ´uRU”Áȸ›MÛOrÃÊrFÆ]Tä™1õ,¬ÍÅê °¤8‹£'z™_™Ç¹;æå…é¤$§™þ•õ!²,ãõzcË¡‚( Ë2YY™”•–p¢µ•µkÖ–šÊŠeË1›Íˆ’‚€ qy‹“ )Š‚Aoˆk³æ”l6>Ÿ@0H8Šõ’$NîñÇ6Lºœ®X326Êö;ù禬¬iRn·ËMt/™Œ¬(x<ž¸4EA˜j““~bª} ¼^·‡`0ê¿“±Œ[¢>=@4 ׸;æç¼^fVeYæ‡>Ê;[·2<<Ìý÷Ýû¥>Ò~É;~Q1™Š›Oáø1—5̉Dh=ÙÆý>ééé¸\.òI\.áH„­ï½‡9ÕÌæwÞáÑï}îžž~æYQä¡î'55•y55ØvJKJ¨¬¬$`NI‰å¡×éHKKcÿþX­Væ×Õ‘˜Àæ-[xàÞûèêîfÿƒ\wí5ˆ¢ÈÚ5«yæù´w´Ó?0Èòe˸ýöÛxý7Dò²2-\HssK´ãÒD5@rrZæÿgï½£Û:²ïßÃC’ ÁL*KT¤rrdÉAV´-Y’³ÝîéîÙÙ4;gvgv¿³{vv¶g¾ùvz»ÝÉvÛVtT²¢•s°,‰Ê’•)‰9ÈÀKßžQjÛ=¢{ì~¿spD…ªºU·î­ºUx…ÏçãÔ©ÓÈŠ‚ÇãÁbµbS©[ØA ++‹@ Ȧ-Ÿ¡È %ÅÅdynÏ|ÆáíwÞáÅçžcæŒ'3ê0tÈÛÊa6ëa2‡ÃÕj¥ÀW ×!ËãÁn·3~ìXvìÚMå€þȲ̉“§X¹jv›Y³fâHÉa2™˜ôЃ,]¾œÙ³f"Š™ù»Ý.žxü1V®ZM~^>Ÿ§æÎшÙl¦oïÞTU ãƒ?âÙùó8uúvY3gÎÀb±èÛ·ÿN:|—ÓÙ%ÿÙ³g¥î_ÍO~ôgÉ_¢8Ȋ¶íÛyüñÇøtÝz½}ÆË•«Wo÷û! 4W®"Ï›K[»?9¹J‘®Cz¿0} ™ÍfcðàA|yéâmÝ›?Q»èÉÀÊJ6nÞÌçGŽ Ë26»¼¼I~^óŸy†õ7rùòe™2™Õkד“Ë€ý1|8Yn·îðÓ›ÍfvC‡áô™3ö!??Ÿõ6áËËãðçŸë‡+*ÊyèÁ¹|å çΟcÆ“Óùð“O˜2iƒ*+Ù»o?Û¶oçzÍ æÎFIqK–-Ãår!ÑH„%+W‹Åõ<«† KÚ$AÀårušˆ»)/+cĈἷd ª¦²`þ<*ÊËYºb¿{÷]ü&ŽGEy[·m§±±‘¦¦&, EE…|º~=/¿ðgÎÞ–qÆŒ'¹ðå—\¸pGC‡ îVÿ÷µôµºº:0|øðûz£G$áË//$OÞñ§ÓEå€8Ý{¸AQ}ÖÙù}<×1ât:õ(AçûÍUUEÓ4DQ¼ç}ê’,Dp8œÉÙ®¦éyF£Q¬VkÆU“²œÜß±Z­úLSQ4MÓï´N×3]‡tù&“ UU ‡ÃØíöŒû¸“3Øäj2V’$"Ñ(.— Ë×b*ªŠ–Êûnuè9I{Õ!=ËN·Uº­ãñf³Øåžûôχ:—s§ÜévJ—q·úȲ‚(šRaÆÛe¥Cáéº~ü%)yÉápèuÅb‚€ÕjÕåK·Ïýn$IBQ,KFßÜ­wÖñNÝ»SO´T„Æ,&e4›ÍuN¶w›Í¦ëK8Æîp`½£ý ¾Û|›6$­÷ú°ÔXï<æÓ¶F–l6«þ½´ÞÞ™>]—Œ1KòpÓáÈ(/±‹D"X­VÌfs†-xWáv»±Z­È²L<GEl6›^ç¶¶v~ö‹7ø›¿þ+œÎäY‹Îuè|)NºÎ’$aO=Ë;‘H`6›“ßKµGò£&“Iì­¢(Äb1 ù~Y–õ¼eYFQ~ñË_ñ£¾Ž/?Q3Êêü˜a»ÝNqQ!Š¢$E‰àp8î«»wóïþÍŸ#%$,fsòÎz’ÏMï܇²,c±Z±vzœrgã–ì×Xò® A âñxôG|ÊròvÉô#A‰--­¨jòñ©±{Èbðý%—8s¹™æ˜Fi±—_¯=IEaЦ!Ç%L&!õˆh9õˆf±¸„ÕbÆjùê [®\¹Jm]=¯¼ø‚þ<ûx<®?:7ýÈê´=HÛ¥»M’eY&‰àr¹ôñèv»SÃδ‡ér:Û.UU‰Å’—Ýùhmƒ?YÇ/#Iqšàq{¨9׎Õáäúµz^˜TŒkîvÁdYæðçGxñùçY¹z 3g†ï9‹~ÿÇÃD"æ=ýÛwîâñÇÅ››Ë_ý—¿á¿ÿ·ÿŠÅbáý>ä'?ú3©gJ¯\½¿ßOmm-/¾ð<÷^éÕ××óî’¥T”—ñÅÑcŒ1‚K—.³jíZv;ÞÜ\fÎx’Ÿ¿ñyyùt:!ylK+ÿöÏÂÑcÇ8uú Í--<6m*²¢ iii¡¶¶¯7I’xýµ×Xµf-Øí6ÌŸ¯_Q¹wß>N>Íâ¥Kyjî\"áHFæÏ{F¿T§¾¡¥Ë–ãËÏÇl1óôܹ¬Z½†ž½z’åÎâ‹£Gyå¥Ùð çÎGQ&Oz˜¡C†°fí§446àv»yü±ÇX¾â}^|áyTEåý?dÜØ1œ8yŠå+ÞçñÇ#/Ï˲å+ô²>û¬~OSs3»vï¡Oï^lÛ¹‹žÔÖÖòWùu¹9Â7ølË®\¹Ê^{•wÞ[LYi)míí,˜?on.ï-]JQa!>_>³gÎìÒO×®_ç¿ü5ƒVr.uçw,eXÕ0¦LšÄÆM›¹rõ*±xœG§Ne@ÿ~¼»d 9/]扨¯¯gùŠ÷ï*‹Á÷—æö0¹Å^‚º½_2~p EY6¼B,¡¶-”Ñ=ùdÏe&VJ($ÂQ&3¯Ï¦ßFw¯Hݾû¹zõk×­' 3ëÉ,Y¾œâ¢"Â᯽ú2ííí¬]·žâ¢B†ÂØ1cºDÚ>Ì–mÛ)).ââå+ XÉ­ÚZæ?ý ½{÷ʰ‡ ŸÕfã½;l×ÙsçØüÙ²²²èÝ«'N›fØþÑ-=%Ë SG•ÑÛçZCÑæàÚõz=TÀ >…Ýj®¯¯§¹¹™l«Õµk×îœãÔé3¸œN~øúxvÞ3|º~£Gdï¾ýœ:}³ÙÌÁC‡8qòdÆÝö‚ ðèÔ©L}d ={ö䋣Ǹ—ßWU•ƒ‡óÈäÉ,xöYÆG4eÓgŸ1wÖ,~ôÃ×ÑÐ8V](&¯Ô1}:^¯—… ÐÖÖF,£jXÓŒQ#G°ïÀÁÔêUAUU}t* Ÿ}–úúB¡ ñøcéLzø!úõíËk¯¼Bž×Ëæ;êpâÔ)½Î$;;›ž½z²ÿà!$YfΜÙ|¶e+ËV,gά™„#¶lÙJ¯^½ÈÏÏgÛŽܼy‹ÆÆF^}ùež_´ˆœœâ‰äÊ$¹"‰3|øpôïÏ‹/<ÏÀÊý ޝ¦æÆ ._¾Ì^}…?ûÁk¬ùôSö8HiI)‹-bêÔG…ýÜSƒï/¡`„á}|LÕ“½|$T M¹u«™éUbF£©9Àô±=7´œ-{/FAQF%dE%—IH ŠšiLDQä¡dÄð*žš;4…=*øÑ_çñÇeç®Ý´¶¶¢iƧ²²òžöhÌèQ¼üâ‹hšÆSsæ0nì8._¹ÜÅ~øÉJöìÙ›a»"Ñ([¶n£¼¼œòò26lÚüµ¶ì ¾çŽ_UU²=NæNêE/WŒúš[,˜ècHß"ýFµî<˜¢i—¯\%Ëãáø‰jò¼^vîÞ“¼ MQ“·Y¡!Ë )ÅjMÞ|fµ¢( åeå\½z•C‡?燯½Ê™3g9v¼š#†ëõŽD"|ðÑGÔÖÖ’ŸçE’$=Ò>çÞ“Ö4X,ŽÙœ¾û9}"rÍf,©›§SòÚV«%¦³˜ÍX­V$Ibë¶­TŸøèc=ìŸ~¥—ÅbÑÛÒl6§nKö©˜ÚI߸F1§ä’ûµe1øþ iàÆÓ/Ÿ CËyxxbá(eE9hf +·žfPÿ •A¹¸õñ‘íq0f`1›|ÉÕ:?{Ž_çäÅz‚¡h—2DQÄd2e„ïÍ¢«Õ†Çã!3räHž}æ6¶…={öê[S÷ÔñÔ¿6«UÓôm°´=Lo/fØ.UE’$JŠ‹èÓ»7ñ“Ÿ¡þ?õPò*EŽ€‡ÝÆìK‘$ ·Û…¬$G⺳èÎ0ÿ¾øá^£° €¶¶v~ñË_hmkcÛ¶íØ¬66lÚÄ‚ùó8^}‚ÅK—ÑÒÚʼ§æRPࣸ¸ˆ–Ö6†Âþ‡#ø|·'7©+x›š›ùòâ%úôîÃagÃÆÌxr:'OæðçGx`âDQä‰xç½Å\»~'OQ5lÓ™ÊGŸ|B~^=ú(ÇW§Ú=t–TÉ}c™úúúÔÝÙ&“pûúaAÀ$Š´ûýìۻ݆ÃaÇl¹ÝÖ6›•Ò’bÞ[¼„§çÎeÚÔG2ê0¼ªJ/sâÄ ,YºL?·PRZÊÖ­ÛxèÁ€ 6²pÁ³Œ3šRVZFaa!cFÂdxÿƒÉ÷å3eòdÊÊJùlË’D"Çd21lè–­xŸé?΄ ãYºl¹^V=ô}y”Œ&AŸx™L¦.'‹M©v2™Dàæ­ZvïÙËå+W˜2y×kj8sî,±x›ÕJ,cÕšµúY’âbz÷î…I0u*#5‰0‰ôêÙ“¼¼</]F8aæ“Ó4p ¿þí›D¢Q®^»Î¨Ãyà‰,[¾â®²|?x`D/]?~8w$&ÁDßù£A“I y(>é@ÿÓ QT«Y¤ª&A oi®nGïV†p‡M8sî;vîäxu5óŸyšcÇŽÓØÔ”š$[hmmeíºuúa`eåí…— ŠæNvÛDUÕ0޾·X·‡ æÏÃb±ðîâ%ºí6t(“'MbÇÎ ¬¬Än·Ó·oC ¾KúÚ×ò¶µµqôØ:::’ÑïÔO@²=ÙŒ5†¼”£é®8u(.}ÿyúNç`0ˆ`2a·Ùèèè /?E–‘$ “É„ÓéÔïZÖT§ÓI4Eœ©½o=´ ÑÑÑAVV–~ï¼ßïÇëõâ÷ûq:¸Ýn½N¡Pˆh4ŠÝáÀ‘:‰FÑRq¬V+‘H»ÝŽªªH²ŒÃn׳% Z[Ûp¹œú½ìéðyú`^$Áf³ ‡ ƒädgãv»3 I4E–eýëÎuè¼nÇp8‚ÓéÀét‹Å°Úl˜h4ª …BȲŒÛíÆápÇ ˆf3Ù’$ÑÜÒ’<|h±àt:‘$I¿G>]÷tY.—KŸø¤ï E °Ûlºœi¨ª*‘h§ÃA4%‰ðÆ/Ås‹Ràó‘““ƒ¬(øý~TU%7'«ÕJ8Ö·DQÔ£+N§“p8‚Í–tØñx—Ë…$IÄb1AÐÛ/ …°Ûíýx7Y þP$IB’$l6±XŒºúz6lÜÄìY3ÉÏË'+ËM<§½ÝÅj!';A0‰„;EüÌú8²¥ô?=Óõb±X†=LۺζËd2‡‰F£¸Ýn\FTë_ _çZÞnqüi§q·Ÿ_é«Sƒn¤µ­_ÿö·üå¿ÿ÷†Q2ø^rùÊvìÚÅ믾j„Ú ¾‘ãï¶x»Úã50øcà°ÛytêTýçHß7rss7fŒ±2øÆ?06ø^ât:?nœÑß[ò¼^ò¼^£! ¾1ÆÆ£áø Ço```````8~ÃñŽßÀÀÀÀÀÀÀpü†ã70000000¿áø ~ÝòÈ^Y–iim!‹v¾2A»ÝA~^~·^Ëk``````ð-9~MÓ¸rõ V«…ÜoÆš¦ÑîoãÊÕ+ôï×߸\â_9éëj~2000øþ þøÇ?þ›¢¢"ÛýÊPUUjn\£Oï>X,Výžx³ÙŒÅbÁívsóæMŠŠŠºõŽòš7ødåJNŸ>Í™sç0™DòóóîêÄdYFQ”ñm‚±XŒS§O“ïó!Þ'Ùâñ8;w怜´ô÷FITUE’$DQDQvíÞMnN‡ã—©( 'NžbË–­TŸ¨¦®¾ââbΜ9C¶Çƒ¦iˆ¢x_&‰Dà¾éBG À¶mÛ)/+3næûȲLõ‰d{<ܸy“M›?£#ÐAyYÙ]û9‘H°uÛv>L{{;&Qää©Ó”——Ý÷‰bgÝþ×N,. `2 ¨ªF,!c1wO½5Mãüù &“nî§MÕ4D"ñˆÎ¦m¯×ëåXu5»wïFC ¨°ðOn,Çãq‚Áà=?ƒ Sw(£"+hšŠª*]^š¦¢*²¾šì.-­mLœ8‘••|¼r%§ÏœAÓ4ݤëpàà!¶ï܉ªª ¯(Šþ^UUTUÕÿŽÅb(Š‚¢(Äb±äÿk²,£¥Ò& $YîbÀî”]Ó4ýÿîü[’döîÛO0"g|–H$ô:_½vw/IÕSãðçGhko' ~m¹Ò|ñÅQvìÜɘ1£™4i2>Ÿ“ $eÇyã׿¡½½ý®rȲ¬ç×ùóÎõîœæ£OVrñâ¥{Ê•®c4EUUdYÖ' w–ÇñûýTŸ8¡—‹Å3ò’$I—?Ý'ñxI’ôr:×ûÎöI×!OÜU‡E!‘Hèò'‰¤N¤ÞwÖ»}7£ª™m%wÒ¡Îù§ß§ó¿³}õñ˜ÒÓ{õWúûi]^º|ýû÷£¿~ú¤ _škׯsèóÏ;f N§“`0ÄÕk×t9ïlç ûЩ>wêHúÕ9MgÝþCúñÎ6éÎÙß¿½‡‡/¡ª{_篳IVîë$(=>TUEQ$Iê2ŽîõÝκx7›Ó9MG À?ÿü¿WßÔT_$õ6©Û¿¯¿Ê&Ü«ßÄDQ½ÞþŽ>úøFŽIyYi†<·é–©œ”2&÷šùw6dÝI~~>ýúöEœN'Ÿ®ß@qq1Ÿ¬\…,ËôéÓ›‰ãdzæÓO …B4551ïég8pè çÎCÍ,Z¸€P(Ä~„(Š ¯ªâà¡Ãde¹G¢äy½tttðØ£ÓèÓ§Ç««q¹\¬Z³·ËI4㯾‚Ífãý?ÒË}â±Çô™ô†M›(/+cð Aüö­·˜2i}ûöeñÒ¥Lò557xçÝw‰ÅãÌž9“••¬^³–––²<žyj.«×¬åð‘#H‰ , ³lù l6UUÃxüÑGÙ±k×=åzzî\úöíC,ã³m[Y´`}û$ß ¨*ÕÕ'¸xé»÷ì%‰0sÆ †W Cb±+W­¦¥µ¯×ËC>ÀÖ­ÛxíÕWhkogýú Ì›÷ 6lÔÓL?ŽÏ¶låôéÓ<2e2=ø Ÿ®[¯Ëõì¼g8sö,;wíFETUÅívá÷ûyþ¹çèÕ³§nªOœdûŽí(ŠJ[[’,ó›7ß"c³Ùxí•—¹|å ;wíÆd21gö,rssùù/ÞÀãñ ñù|D"VVòÄãqùÊ6mþ EQxø¡éÓ§¿üõoÈr¹…C<ýÔS |˜X<ÎSsæ ‡Ø½wV³³ÅÂ믽ŠÓéÔ'ªoýîdI¢¬¬ŒyÏ<ÍáÏpôØ1œN' žO}]}Fþ«V¯AM<0q"ëªØ¾cçÎ_ÀårñÜÂ…\¼t‘]»÷`·Û™;{åååºß»o¿žÿœÙ³¨®>Áµëש>q—ÓÉ´©°uûvZ[Ûðz½<·p!f³ˆ,Ëlظ‰K—/³~ÜN>ø€Þ'NžÌhçÞ½zéýtìøq½>3ŸœÎŽ]»yò‰Ç),,dõšµŒ3š––=ÍŒ'§gèö Ï?Ïõšë_»6•;wêmòÂs‹p»ÝÝboüá1vœi¢GYë]eHO/ѸLcK«ÕB–ËF›?Œ ¸]vZÛƒdg9ÉÍvòUq’Ž@€>úˆx,Fk[;ÏÎ{†‹—.ñåÅKãèÑiÓºDG®_¿Îª5k±XÌL?††ÊÊJ^UÅÞ}ûq:äçç±zí§zšË—/³gß>Ì& <‹ªªú6dð`~ûæ[h@8&×›‹,Ideyxþ¹EØm¶.«ò%K—1wîTUeÝúõ<·paŗlÂs púÌ™»êOæª6Áºõë¹yë&>ŸG¦LáØñjN>×/±mÛv{t|ô1Š,Ó»Oof>ù¤áñStK¬]–%}fx·—ô-9þÎøòóihhdßþýØl6&¤œŽ¦iL™4‰©S¦ðôSOÑÖÖÊŽ»?n<‚ päÈdYÆl±ðÊK/QZZ‚';‹¼ú*Š,óÀĉ<9}:;wïAUšš[H$¸\N^}åJJJ¸qãÊ(7 éu«6Œ]»÷póÖ-Î]ø’ýq½¦†p8‚¯ÀGQQ!/¿ø"әʩS§9sö×oÜ`âĉ\º|™ÚÚ:6ÇóÒ‹/àñx°Ûí<;óçÍã‹£G¹zíÚ½åzù%**’!ŽH$ðx<455±xéRþïÏÎÁƒ‡hjifô¨QTÀ‹/<Ï •úäÎßÑÁ‘£G™8aN›JIq1í~?7nÞ¤¦¦†¼üüàµW¹yëOÍËСC9uúôíèN0ÈÆM›X0>/<ÿ999ˆ¢ÈÜ9³yæ©§ƒì;p€•«V3bÄp***X·aª¢ É2Ï?·ˆ>½{Q^VÆs‹²}ç.Úý~>þd%3¦Oç…ç±é³Ï¸yó&‰xœE òÀÄ8“Š ¥Âg¬Û°ùÏ<Ãk¯¾BYi)CbáÂŒ=Š-Û· …èÙ£¯½ú tttè28œN.x–Y³fr¼ºš/Žãè±c¼üâ ¼ðüs˜E1#ÿŸ›6Ñ»w/†ÎGŸ¬$ qèðç 4ˆÙ3g`±˜9qòÌ3›¼ü|½¼††ÆŒüsrrhjifÄðáôíÛ‡çŸ[DAA_=¦÷—(&Í…ÙlfÊäÉŒ5ЧŸzŠŽŽ´T”¢#èÒÎé6’e9£>……… 2˜»÷‡ùòÒ%<OFš¢Â Ýíõc(Îh»ÝÞm6¦¥=LEO=YYÉz×ÔÜ   €ýð‡Œ1‚v¿?é ,V Yn·þ€ŸŸüèGœ;ž?úEQ™8a<'OfÇ®ÝL?ž‚‚;ÒÈ2öT{:ZZZ2åÊõ¦ÚÒE–ÛÓéÄíráv¹Q;Êô6@nn.6› “ÉD `Õê5œ=UUijn!‰…ÉÎÊb¸q Øí¶dž©ü]N'¢h"–ʳ°°€üü|¬+‘H»ÃŽÇ“EvvvFø<‰ (2yùy¸].Aà‹£ÇølËV¢‘(‘H4 ' ·ÛMvNr§PfSc~ô17oÞDVdjëêõr²Ün¢±XFþ­­mÈ’„,I̘þY¯¿ö‘p˜7÷¡p˜9³gQXPÀoÞz››7oêåµûÛ3ò7¥&pV«³hÆåtRZR’Ñ_±XLÿ¾ÝfÃj±àt:õÉŸ¦iD"‘.íœþÜb±0·s}nÝ¢w¯^\¿~m;v2dÐ rsrº¤q:ºnljoÔn—+£Mü~—-†ûE$axï|žxhó¦ ÀŽ# "r$Lÿž>LtÂÌ[Aia6µ×›Ðd™1½½Ôµ†’‘öpœÄÛš¦ÑÐÐ@~^N‡G§ ŒÍjÍGwn›Œ;–‰ãdzüý8yêyy^ÌfÆl6SVZÚ%ÝnÇb±àÉʺ«¾™DQSã3 ‡ÓÓéÄépZFôöNmwih uµmmíwÕŸ;ójhl¢°°€¬¬äx°Ùl˜Í".—‹ýû³èÙùlÛ¾í;v|k‘æ?]ǯ*h÷œ¹ò•{7÷‹³çϳnÝzÞ]¼„½ûðäô'˜8~<õ ØívÌf ‚ÉD¾/Ÿã'N²c×.JKJtgmµÚ0›¿Þ1!¨º~€(ŠŒ=ºK¹újÏá`ÈàÁlÞ²•±£G3h`%;vî¢rÀäï ;å7lèPBá¢(b¶˜M&\.---lØ´‰p$œQA€>½z}-¹¬V+/,ZÄÖmÛøíÛo³rõŽWŸHò"y¿Gyë7mÒ÷tÓ+Èš5”––ÐØÔ„ª* 2„mÛ·c³ZÈÉÉé’FQT*ÊËÙ±kÇŽgðÀ™r‰¦®y·-¼#Ò³GŒü£±Øí ܵO3Æ­Àí1.$uøÜùóÔÕÕQ9`À]Û9‘HpêŽúäååQPàã£O>axÕ0$Iê’¦³nÛm¶oÔ;Ú$‘H°wß~vïÙs¿×ȊƘ~ô)óÒ·<"—™=ò))ÎeãîsÌx°6›•ÞÅÙäeÙ1¸”¦öyÙN¿E]K€ ×¹z³…X4ó‹(ŠŒ7–•«×pðÐAÎ_¸ñyçqÔÚÖÆº Y·aë6làÄÉSœ9w((ôÑÚÚŠÝngذaüæÍ·x`ÂAàÜ… iÌf3n·‹µëc°õ IDATÖ …ºè[×)t²ó'OÒë°qÓf:<_=ʾýˆÆ¢444dèXNnN—þÅblúl‹ž×ƒ‡¨ìß=ûöëÛU™N]H{ºŽ¿£ƒ²²RêëŒ}þÎ-T]]>|xÖý<|røóƒ8ÝÎ.{<釡`„ ã'vë©þP8LsSSRH“‰Üœ}•VßÐ@‡¿ƒ¬¬,JJŠÑ€úº:DQ¤¨¨ˆ`0HcS…E…X-Äb1ý²sr’¡n¿_~>ÍÍÍdy9ÙÙ477SXXˆßïO­^Ü444PZZJ"‘ ±±MÓÈ÷ù°Z,zúH$B,#??_o»djQÔä„&žHpãÆ Ÿ¿ßO8ÖW¾ü|‰5é1a·“““Cmmm†ŽE"‘ŒþÍÍÉáÖ­[ºã¶Z­ÒÚÖFss3ž¬,|´·µ¥ô·…ÒÒR ·jo¡ª*¥%%x½Þ? §¨­­½ççµµµÁûîøÓ‡8._¾D$!cé/€Ãá¤oŸ¾ÐÏÌ ¾[„B!~öó7ø·ñçädg òm9”¯Œ/ü+ª«¦±öÓu2~ü¸n{fÄw©MîE4¥¥¥I–xç½Åü§ÿðïÿEÎì‹£G¹té2 žÿø©¤ÁýsüÝrªßn·3dÈP£þä0ÈàÁƒÈê¦SÔ÷ã}‡ê*I‘h„Þ}zw냢¾  …BìÝ¿h4ÊÜ9³ÉIEÿÐÈl[[#F 7œþŸ¢èŽ¿ ~3ÏlðûVü IÂj±Oˆümv¿že¶XôƒÆŠßÀà_Œ±’0øÊ•‡ `³Z†ø†mv?°íþ'‹q;Ÿáø Ço```````8~ÃñŽßÀÀÀÀÀÀÀpü†ã70000000¿áø Ço```````8~ÃñŽßÀÀÀÀÀÀÀpü†ã7000000ø×ˆ¹;2ÅbܸYC8îò™Ë墢¼v»Ýh}ƒïºãWU•K—/Rà+ ¼¬AôÏ4M#èàÒå‹ 4“©ûš¦¡išþ^„Œºtg¹÷»UU¿q[©ªŠ`2!ü äeQ1™LÝ"[wð‡´—Aæ¸ùªñ¢ªª>®:1ƒo¿¿Œ¶¿»^mroÄÿøÇSTTd»_*ŠÂ­[7©¨¨Àd2é~Ùlvêêj)*,êVãüå—ùûøGŽWW³wÿ~bñe¥e˜Í]ç:@€h4ú/ŽB„Âa¶ïØIŠò»–ó‡FYºâ}*ôÇb±Ü3],£½½—Ë…¢(,_ñ>ÅEE¸Ýîo\f,cÓæÏXµf Ÿù‚3gÏÑ·OovìÚ…Ïç#`·ÙîKÿµ¶¶‚ ü^Ù¾Y~m,^²„••Øl6c„$IbíºõlÚ¼³ÙBYié]Ó566ò«ßþ–ƒ‡‰FilläÆÍ[TT”ß÷:ݯ±ùmQ×Ô€Íj&ž©kêÀã¶w‹RU•ý"Š"²$Ý×q Ë MÍ͸\®ï„ …ü»x "??Ÿ<¯÷OrÇãq‚Áà=?ƒ‰ûîøUU¥öÖM R«µË«¡¡ž’’Ònuüõ ~ðê« ^Åî={Q™Šòr"Ñ(‘pXŸ˜ìص‹‹/ѳgÌf3’,PU‹Å‚ªªÄb1‰š¦Çéè i*‰D‚ŽŽl)Gh³Yñde‘H$ƒ$Vkr0v.WÅ G `2™ˆF£‚ ÿHH¬[¿ž+u(Š"±XLï\³ÙÌ… _òɪÕTUU!›6Fyy9‰D›Í†Ùl&!I÷”Ëd2é«ú ›6 ‡X´àYÆKß¾}Éöx°ÙlX-~ñË_S9 ¿^—Îr„Ãád´AˆÇãå˜Ífâñ¸ž`Éòج¼^/¢(f(­Åb!!IDc1ü~?‚ F ‡#X­6L&¡“‘’ñûýÔ7ÔsôØ1Ƈ’êÇt^²¢ ‘$ ‹Å‚¦iD£Q‚Á ñxUUikkÇb1c6›QU5Õ ]W£Ñ¨Þ‹%C‡E!N}&É2Á@€DBÂb1#+ ñx¿ß¯×)mPUU%  …0™LI=”$B¡P²­V4UÍÈ  émk2™H$„ÃadYÆb±èuJ$zštywÊÒÚÚÊò÷?àõW_¡g(ŠB$Ñu,ý½;wb±X™5cùùù´´´"É2½{õê¢cF纥u8o,CE$IÊH³s÷Ñhôžã±³NÞO§x×Eªñ?³“`Lb@Ï|>Úv–•û¯ðè螈¦»;N ¾vTî¶¾†ô¨–ÕbÁa·óÑÊUú8ºÛ¢CUU"‘±X A$I·9’$¡( ÑNiÚÚÚøÙÏÁ˜Ñ£ô<;ë[r<ÆtA§éÏךּŸUU%w± w§w›t(Š¢ÛÀôøúòË/9zü8/>ÿ<……$‰¤,wØ[Ãñw“㯹QCÏwǯQ_WOYYy·:þ¦¦&šš˜8aþ×OŠÛíÆãñðƯ~Mï^½X·q#ª¬pèóÏQ•ü¼<~ûö隷¯gû®ôïÛ—Í[¶päèQñ½zôdï¾}444RSsƒ .0hà@V|ðá]åº~½†¢¢"rssG"|²r%sgÏ!/?ŸŽ@EQHH+ÞŸ¶v?»÷í% “““ƒ/?AèøÍoßäæ­Z.^ºHnn.o¿ó.#GŒ ±©‘eËWзo_ÞzûwzšlO6­\Iss3¢h&7'‡7÷Ž.×€¨®®fñÒå475±tÅû¶nßFnnEEEºÎmÙº•=ûöÑÒÒÂÍ[7yðøà£¹xéë7nbÐÀJö8Èþ9zü8¢É„Ãéä¿üí% ±vÝ:Î_¸À­Ú[TŸ8IÕ°¡ìÛ¿ŸµëÖS}â$MÍMx½^þöÿùï´´´°kÏn¬V+ååºQÛ±s›·l¡®¾_¾3gϰgß~vì܉ ÀÍ›7ywé2üí~Ö|ºŽ±£GëQ‰`0È’å+8wþdÐÀ¬ùtÇ««©¹QCŠ <¤çŸŸŸÏ•«WY¹j5W¯]£®¾žòòrÞÿàCNž>Í—/Ò«gOöìÝÇ–mÛ¨¹QCž×Kvv6íííüç¿ýoº,‹…7o±kï^\.'¢(òÞÒe47·P[WÇ€þý““×H„•«VÓÔÜÌõë×ill“åÊËÊXñþ·u¬¤„ÜÜ\Ý­xÿ½nÅÅÅüöÍ·¨¬€¦iüâ—¿bàÀJV®\¥§)**bõê5_96ÿî§ÿp×ñXPàã7o¾¥ëÛ »Õæ´tDÙrômQ™\—™—šÚË/×Åñ37h İXÌ|qú·š¨À§®“PTòsœ_¹ª®ohàÍß½CKK3ËÞÿ€’â"þ9·êêØà€>ŽÊËË2äÔ4S§Ï°tù e™3gÏQWWO¬ß°‘H$JKK KWÜNsþ¶mßI"§¬´ŒËW®dê[Y?ýǤæÆMö<ÄÞ}ûéðw°é³-Œ5«ÕšIŒÇùùoзO_Á ¿{ç aVV²mÛöŒqZz—ÈÓµë×ù»ÿýSÝÆöêÕ“ƒ‡súìYlV+áp˜>þ$)‹$SZZb8þNŽ¿[F,'gw{ɲŒ”Ú;þ6±Ym„Âaöîß'+‹üü|9‚ÉdâÁ`òÃ3gö,ê8uú4>Ÿ€ÓgΠiôçG¯ÿ€Þ½z1h`% , ¤¨ˆÉ“æÑG§qúÌÐ4$YFÓ4V`ÑÂ…Œ^EC}=ûÌ(7‰êu3f4{÷ æÆ ’Ìþƒ‡¸~½†ììl|>å¥eÌ{æi¦Mʵë×8zü8Á`|_>õõ 47·0eò$ª†åùE ñx²p:Ì3›'§?Á79wáÂ=åú³×@ÏúªLU5¬6+þv?;wíâÍ·ßfßþýH²ÌØ1£é×·/‹,``e¥n¬dY& RXXÀ”I“(-)ÁétPs£†Ë—/3bx&AÈHSQQÎðª*æÌœÅC>À™sç2äj¨o@Ó4ÆÍ¢… °Z,Ìš9ƒqcÆrýúu½ýÚÛÛ9zì8Ï-\Èô'ž ';³(2óÉéŒ9Ñdbïþlß¹“ÂÂB“± è\7_~>C‡ æxu5µµµT”—ã°Û3Òø|_klª¼ûx”îÐÉî^õµù#Tö-`h‰›ÝÕ·èÛ3ŸrŸ‹¥Ÿ¡¼4Ÿ=_\åäÅ.Ô‡(+Î嫪IÈ*Ëw]FV´¯ë8ÈcÓ¦2ïé§©:MÓP•¾½{gŒ£»É‹EQU•aC‡R9`cÇŒfÏÞ}tttpñÒEzT”Ç2Ò<ôÀôéÓ‡_xœÜœ.ú¦( V›•ONgúãQXXÈÓOÍ%NF©î²HÚG4Ð’6ãN»áïèè2N;ŸÕê<™élcÛÛÚ?n,C ⩹s0™ÄN²ô7öñî [¿¢(¨ªzWÇŸþÿoE‘“¡âh”=ûöñàÄ ˆ‚‰^={0 _?þö?ÿ5YYYzXWÕ4TUÅ—ŸGïž½˜ÿÌÓLœ0^uZ­Öd˜Þ,bE, ¢(b6›“ÊÜ ³9.¶ÙìɼUåŽroï½{<²Ün¶mßÁ‚ùó0 °c×N&OzÁ$`2 ˆf3V‹MÕP…в2úôêÍ_üä'ôèQ‘¬Cªþ¤Â‡é:&EV¾R.€l‡ò²Rª«O•åfþ3Ï0fÔhd9Ùg¢(꡺Î2';›¿øÉ1‹f~þË_‰D™2y2ûbמ½ :”œœœŒ4áp³YLµŠª¨]äêÜ–f³Yo÷ζ ÝoJªNš ,^¶“ÉDχ$I8ìvúôêŤ‡â¹E AES*Os²/EñŽÕR2›<£"ЦT›Ù2äWTY‘õmI’Ø´i3/]¦¬¬4Õ~ZJ›ÝŽÚéûW®^eÕê5dggãv»ˆÇãÈŠ¬—¡j™ù§Õ­Oï^T Æ_ýÇÿ€ÛåâÅž§oŸ>üß7Þ ¥¹…ǦMcê”É,]¾‚sçÎgÔùNYL&&A@EÊËÊø7?þ17nÞdùŠ$‰ÛF#µ-¤;˜”¼’$Ý¡cnO¼m¶Œº5662räHNž:Í굟2jäHœNg—4_glÞk<Þ©“é0µÜM p(ÂÈÞùÌyd0?š;œ¦¶šÙ‚UK:»˜ÉB$cJU v«I¡8ÏÍó“ûrêZ3íÁço´Q×"“ºl (²L$éâ“[C·Ç¤ª&·<Ò/EQ6t/<·ˆÝ{ö²cç.²²²().bæÍäääâóù6,3Mò\VrÒ¡©Z}Sá|³ÙŒÅlA“:aMm©È²œQ ÐT-©+²„¦uí£ŽŽŽ®ã4µ I¿$IíN«ézi6›©ªÊ”¥óÕ ›~Χ( ª¦"Š]³WdUíþ¿ ?^M<' RVZÂSsçÒÑÑÁ{K–ÐÖÞŽY4S\TD¯^=ùÝ»ï!+23¦O§¨°ˆ»váÎÊbäˆá8ÝÈ )ØvHé¯ÅlI®1g¤E³Åƒཥ™å¦÷í6C‡ aýƼòÒ‹´µ¶²eÛvÊËʰX­øðªªä¡Å}û°X,L›6•<¯—h4Ê{K—òì3ó0§öÆ„TÝz÷îõ{åºí D-XÀÊÕkøé?ýdgyÍ&žxüq®_¿Ž(ŠŒ1‚ÅË–1ëÉ 4A¨­­c˶m˜Íf¼^/‹YßV2hç.i, 6Œ5ëÖÑî÷3¼ªŠÃG>×åš:õ}0 ‚ ‡M&&ñ¶sÎóz3z‹—.#'ÛC4Õ<9{–ËW¯òÔÜ9äd{غ};ÅÅE”—•1dȽßL&QŸüX­Vò¼^&Mz˜¥Ë–#šÍ ¯ª¢G =½`2Ú.ÏëeÔˆ‘¼»x =zT0aüx“@]}—¯\Ñ'Wé2Ìf1coW4™ˆD"=zŒ`(Ä ÊJZ[[Y²lùùù<6mZFþ=ø L™ÂÆÍ›éÛ§7n—›¬,ë7nÄb1ãñxغ}ñÔž¬ÓéÐõU褳·e¹ÝÆç/\àè±ãÄb1rsr3dÅÛ}b6'·h>øècž_¸‚‚ÂN:6Ÿ/€Ž@€uë7èu³Ùläää`2 45µRQQ~×4ßdlÞ9këêØºm»®of³™w/fÊäÉ ¬¬¼¯öFÓ /×EÿY®äAÄIƒ éQšG–M¤¡¡×žB{ BEa6V«…'ì‡?Å›ëF FIH2&UAJ$È “‹&=ô o¾õ6W¯]ãó#G¨6 QL¦Œq4h`%Ÿ¬Z­O„ª©Ô×׋Åðx²°Ùl 6”¿ûé?ð³ú’Û·néiì½zôàíwÞeÁ¼y]ômjAsÊΘÌ){Ÿ>{±ÿÀN¥¢>f³™ON§W¯ž¬[¿AþÞª­e÷ž½z1qÂøŒqêõzY¾â}=ŠPVZÊ€ý3l¬É$èú¨ªjYŒþwøÇêêêÀðáóîßÐ8}æþ޶ ãÜye”íÎeذa˜„îÛoKÏ6ÓÎÚl6ëºb±Xò œÃ#uZ8} Åf³!§fÖ‚ àp:1 ²,c³Ùt…µÙlÄâq,©}zI’°Z­ú!*EQ°ÙlúÁ°ôa¦ÎåvVÆtØ+]~úûé=›tÙŠ¢èåD",+‡“ÉD<GÓ4½Ü´Oðû}r݉$ËÈ’„¦%”Åb!cµZ“+ IÂj±èçEI®¨âq²³³±§Ê[²tUUÃ=jÔ]Ó(ŠB"‘@L­Øî”+=S·X,Äb1]MÓ2öÓ‡Ø,V«¾Ï‹Åp¹ÝɃx‚@$A–e\.WòÀcªm$IÒõ$c·ÛõHéÉ€ zútôêÎ:„BÉCJOŠ¢à÷ûq:˜ÍfÝP¥Û²óá@MÓðûýhš†ÃáÐÛ9 !ŠfÜnš¦eäŸ>ì‹Çq9X­V"‘¡pOVv»=y5ÀåúÿÛ»Ïà8ÎôÀãÿîɃÁ ™ ˜3EJ»’V”DQT\ÙÞó–wm¯Ï®rÕUomß•«îÃ]«î|·ÑaW–´Ò*K¤He‰ T¤H*0ˆI„AÆäÜÓÝ÷ÀAŠ»"ÈçW…"gº§çíwÞîçMÝíÁãvO›Ü7s_&óÃét–† LÃÀçóMÛÏ‚¦•*¢E]Ç¢ªÄb1|>ÊDO–1Û”ISÓær¹ØþÖÛÄqî¼ýö3®s®ÇæÌãÑf³VÞ&'¦¯«nÎG…á\cÒä¹+NóèãOpë†[h…ƃÿDٜ쑛ÚÕ>Yî‰6› ¯×‹Õjett”Ÿÿó?ó÷?þ1^¯—|>Ú:…B¢®ã˜(ÿSË›Ãá(&/ÿuLä±ÝnÿlÒà„É2™¸úÈfµbµÙHÏrN˜zœNû“™ÉVýÌs¬2¥,̶/—ŠD"A8>ãòp8œ<ï ¨‰Ec³v©Y­Vü~ÿ%õC\ªb±?ùù/ù¯÷cÜ'q!J•KMãŸ~òSþü‡? ¶¶V2äs§xi¢ãK¯¼ÂßþÍ.MÖü}lëmâñ8·ß¶QZÄ—Xà¿ Ñ×j±RUU%¿€œØÙ¸áœr=½˜E¡Pàê«®,Íüg§ª †¡c:ù?* çü> à¬Ì˼yô/A¤Å/È]ÅÄç—ÉI…âË'w¸”¿ç¿V)_|Nù2òUö Hпd{É!„B¿B!$ð !„B¿B!$ð !„B¿B!$ð !„B¿B!$ð !„âwwAîÜW,j  ‘Íf˜ö˜z\.7µµµãB!Ä7;ð›¦Éñ®ã¸]njkëP¦F׉®s"&[Ÿ}޽{÷•F(rù<¿ü—ettô‚¤Ó4MvîÚÍëo¾É¾ýûùxÏžó²Ý]»wóÓ_ü’7ÞÜN>Ÿ?ïéÎårüêÞ{ú½·16:Æ?ýä'<ùô&úÎò4©³‰ÅbüË¿ýŠt*ÅÓ›6ñé±c³ר?ûÅ/H¥R_¬’¦i<½y3ÑhTÎbúùÃ4ù_÷¾Å«;>E7L^ßÝÅßÿú]Š_ r|6E]?k™ß»o?/¾üÊϵãçž]¼¿c‡üx—˜ 6Æ_,gíÊ7Mó¼µjÏÞš4Y½r%öÃŒ×pT•ÁÁA²¹ñXœº`µ55ô÷÷‰Fq»Ý464 ë:ÇŽÃjµÐÔØ„ÛãoÕšã­èp8L:¦¦¦†ÊÊÊÒ÷e2FFG)‹TUU‘Íf‰Œá÷û ƒd2úúúÐuƒ`°¿ßÏÐð0áp˜“§NRYYIC(„a³¦3—ÏÓÓÓ&8NB¡z¬VëD~@Ó4***°Úll{íuV­ZÉÊåËq8Dc1 Ý ¨``p ¿Ÿx7ƒ#q~/5/Ÿ7òiáþ~‰.§“@ €a˜æøñ‰D‰ÇcØívêêê0MƒžÞ^>þä‚Á Áº:"Ñ(ÃCCX­VB¡¦ibœ¡b ëúõÞ­lZIDAT´ò\[SÃÐð0±X ÛM0dpp­XÓ¤®®—Ë%áÀòWõWÿ­®®ÎqÞj½†Á©î“ÔÖÔbÆi¦iÒ?ÐOSSó},äðð0OmÞÌÐà{÷îcn{;Ï=ÿGŽvâr»xâɧøÖ5W³ûÃH§3¼üê6œN'ÑH”bQÇívóÌÖ-,\°€½{÷±bÅrúúúØ´e+¾2Ï>ÿ<+W¬Àn·ÐÝÓÃÿûÙÏq:<úøTUWñÌÖgého'“ÉpèÈQº{ºÙ¹k7õÁ ÿþÀý´¶´ÐÓׇ¯ÌG,çÄÉSìÝ·£SÒ¹víUlÚ´™±H”T:ÅÓ›7sÕ•Wàp80M“wß{7·¿…¦i¼ôê+456²s÷n55Õvø!'»OÑÖÚÊCô[Ré4‡¦/Æf·ñ/¿¾—¦ÆFî{à7ØíFÇÆ8xð ‹-âwß%_Èóô¦ÍÔ×ÙüÌ3ÔÔÖòÓŸÿ‚ªÊ*öïßO"‘îð!j«k£¥¹YÎ0—Þá8ÉX*χŸýâ—TV¦>ä§?ÿ™l†#G;9rä‹/Âb±Haø åóy’Éä—'“ɉ¼Å¢Ž®Ÿå¯¨)°háBnÝp+6Ü‚ËåBµ¨¬½êJ®Xs9‹…|>O[[…B‹ªrüxŠ¢°`þ|®¹z-­-->|d¼B£ìþðC ù<§ºOq¼«k¼5:Å’Å‹¸ã¶D"‰'Oždxd˜XÙ³‡neÙ²¥„êƒ ÑÕu‚»ï¼ƒ{x.[½ŠÛn½•üŸÿ_YÙ´ï›ÜÇŠr?K-â–›oæ¿ÿÃ?ÐÒÜÌ»ï½Çððk×®Åa·SГH&I¥Ó§'~J:v…‚FÿÀÀiê, ~zÃaÆ"ÆÆÆ¨¬oáÏ ÷6›h4JrbÒ_i%EAÓ4¶>÷,§ƒ«®¼b¢Ë|â7,V+‹Š×ë!ÜßO:&—Ëãv»Ç‡Q††AÓ4¼žÏº-UEAa<_Ô™峊NMu5==½D¢Qúû…ê§äÃgŸ;|ä0»vÈW\NMu5ŠªË×p Ó žˆ£iãCI»Ã0Ï·¢Žßï'‹1:661ÜQŽÍf+}Çd/Ôäëp?[¶neÙ²¥ÌŸ×1m¼TQÆwAUÇ[W^‡?ûáð—ûyè·“Ëåèíëû½'.ŠoÓ/3«;jhª+§9è§5àbaK5sš«ykç1îºvee.ZƒåT•»¸|i#£i|^;]§†ޤéGF)äµÓÎ- ?ÇŽ'•J“ÍfKç›x<ÏWF8<>lîÓ ¡* Ùl–d2Ioon·›-Ï>7íWU…d"A&“!‰DJ Û=­<†Á=wßͲ¥Kù·_ßK"žÀ4 ŠÅ"‰D§Ó!…áà¼ñ«ªJ¹¯œîÞS8ìŽÓNôù|ž²2ßíæŸ úýá0÷ÝÿŠ¢pýu×R^^ŽÃnGUUjkkñz½´µµòÚ믑ÏX¸p! &~ô}ü1sÛÛY¼hâ…_ä»wÝÍó/½Hgç§”ûýüÁ=ß-³Ûl6*ü~.\ÀÑÎN{ü \n7·ß¶‘–æž{ᇠëX¾l)ƒCCÜÿÀoÐ4Ë×\†ËåÂ0 ]Ÿ–Î@ ‚»ïº“ÍÏl™ìª™¶Ÿ·oÜȦ-[øàƒ,Y²˜… °ÿÀlÓ'Ž–æfÞÜþ¿yð!4­€ÕfÃ?‘'V«•öövvïÞÅb¥®¶·ÛMQ×Q…Ê@‡ ·Ü“OoÂéªU••üÁ=ß套_Á0M6޺Ɔµ55(ªŠ×ëÅív¡ª*¡úúÓ*"•••(ŠÂÕk¯bó–­<ôÛ‡©¯¯ç–õ7óÆoà˜²Á`\.Ç3[¶ât¹TTàv»xíµ× ÖÙ¶í5ÚZZ©««¥¼ÜÇÆ[7ðÔ¦M8N|ee456pÝu×òäSO£ZT¾÷GˆªªTøý(ŠBUU6Ûø=&jªª TTPQQÁ³Ï=O"‘`ÁÂÔÖÔà°ÛKûèp8ðù|t8ɛ۷S,Y³æ2TUå±ÇŸà/ÿâGø'ʆ¸8) ,›šöÞMkÇ[å·^3¯ôÞüæÏæ}wÝLLTEaéÜ ­õþ3žW¯¹új~ôQxð78xˆµW]IsSÛ^{?ýÁëxø‘Gñx<Üuçô÷÷ÓÛÛË}üŸÏÇënÀn·•Žñú`Á`ío½M]]»vï*Íðojl¤¥µ…;>(•çh,ÆÖgŸC׋\±f ›d*Åã?ÍncýÍ7QQQ!…á›P^÷ìÙ“X¾|yÙùcèîé&—Íž¶ÌétÒÔÔ\꺽p5pó,éxσ¢(†A.—Çét”Zy†aPÔuì-ÁÉ! »ÝŽahš†Íf;­ò2¹ÍÉÿkš†ÅbÁb±`š&¹|«Å‚Õj-¥AÓ´ÒëÏKg±X¤··'žzŠ¿ýñÁn³Íº¿“ŸCQNkõ  ÃÀáp|¶Þ”Ïds¹R¥c¶tLv;êº>­¥/of; q>ŒŽŽòþŽÈòè†A ¢UUÏØˆš ˜Z&g;ÆÏÖ›Yžm6Û´ãIQÜn÷oȉo@‹_œñxœT*…Õf£28k B\| …‘HÃÐñù|x½Þ¯4=†a‰D(//?­r-.Á¿8ÿÊËË)//—Œâ5~}þ×çÞªªRUU%?Ì7!„ åk™$åk–. üB!Ä%T/’1~!„G\›¥;Ý4ÍiËf¾>Ã0PÕ/Þ6VP0sÖtM¦8/ßuN©Q$ð !„¸¸´ÓŒŽFé˜;€ð@?¦iÒj8ãvt]çà‘ÃÌm›ƒÛíž¶,—Ïc.—ëw þ3?ÑÅÐÈ0»‹ÅJG{;^÷ çÁä•z^¯÷Œ©‘®~!„-Ó4Ð }ZKÞ0 ŠÅ"ùB\.‡V,–ZáÙl–D2A>ŸÃ4M …©tš\.‡aôôÓÝÛ3^0MŠºN:“!?ñúœj#€i˜4Ö‡X¶d)UJúÂ}˜¦‰¦i¤3i Z€B¡€1±ÝB¡€a§­3u_Æ"ct?F6—==H‹_!Ä%W€ÁA†G‡q8  çÏ'28_ ÎJ§p9 ŽtÅív“J§™?·ƒîÞª*+ TØè ímmœêî.­³ c#££ ãv¹Jiíéí¥­¥›Í&_!ÄEêL­ë©-_s|5Ó4¨ TÒÔÐÈ©žn‰D£tÌiÇårO$¨«­%‘L’ËåH¦RÔTÕPÐ ´¶´OĉŢkƒ†ÁÈØèìÿ é‹FˆÄ¢8:Úç2<2L¾PÀWæ#—˒Τ©©®¡/ÜŠ‚Óá •JM['™JP]UESC#ÑX Ã4™;§ýŒó$ð !„¸h#¿Åb%›ÍR(P…T*E ¢‚‚¦1õ¾¾Š2>_Ô‹ï4M£ëä Bõõx½^ Ã@Q•Òp(8ìTUUb·ÙgI‘‚9ËýƒE¡1"PàБåôyÜn••Ü.7Š¢pâT“§NÒÒÔ‚®§­ãr¹Ì¡( ªª¢ª*æDúE9}£"—ó !„¸ˆ•û|ø|>:Ⱦƒ01©èàHçQ’©Áº ?ÑEç§äòyUÅjµ2<2B4âªøËˉÅctìÂãvSVæãTo7½}}d³ÙYë"³MîÊ*n·›†P'NÄ_îG× º{» ÷÷SдÒ÷4M#PQAe rÚ:ZAúÊx8w»\˜¦ÉÑO;ÑŠÚiÕ"eÇŽ‰yóæ•IñBñMÖÝÛMG{ûi9ÑB§Ô2îéíE+jë‚8v,ªÓ4ÑuÃ0°X,¨ªZšLg³ÙJŸÕu}¢7Á2>QP×Q¿-îÌö‰Sã÷êokiöþdzTU-¥¯´½bUU±X,(Š2mùäg§®39”1Ùµ?5}Sår9Þ}ïý¤tõ !„¸¨)ŠrZd"P»§\–§( Vëô°h±XNûìÔתªb?Ë5øgêêŸ:þ>5}ªªb·ÛÏšþ™ë̬l̶¯Óö[Š„Bˆ‹"Àÿ뾬g÷~ÝnÙ+_!Ä%ù½Ïׯ6òe$G‘ø!„¸Hج6ò…Â×&=Åbq|2 ʼn›}U&oNd³Ù¤Å/„ââP¨bxxøkóh^Ã0ñùÊDQ¿ºt™¦‰Åb¥ÜW._!ÄÅÁn·¬«ÿÚþ©WøÊ|_yº Ã`tdT¿Bˆ‹Çä¥l’®3“1~!„â"_!„À/„B üB!„À/„Bˆo†³Îê×4X,F&›¥ÂïÇëõžñù¾‚a¤R)¢Ñ(‡òòrl6Û—òÝÉd²4 SQ¼^ï¬÷?Îf³äóy®)÷|þ<º®S,q8R …B|õß4M^Ù¶pÿõÁ:É÷Üu‡ýs7‰FéîîaÅòeçœÓ4O»Æ1ÜßÏoy”¥K–0<2Âú×QWWÇ'{ö°háÂYm.Ÿgÿþý¬Z¹òsTp¶´üûý`µZ x<nøÎõ”y½Óƒ~.ÇC?‚×ëeåŠå,\°àœ¿chx˜±î;×—žÎôu¹öT!Ä%ø‹ºNg秬¿ùfæÏëÀ4MTUåäÉ“Ô××c·ÛÄ[V†i„ûûQP5„Ø·oo¿û.—“Ö–4M£»»‹ÕJkK Š¢ÐÝÝC&“Áj³âr¹ˆD"455Q]U5þB`dd„Ɔn¼á;¥'$ ðä¦ÍÜs§N[[‡ƒîž ]§>bhhˆÇž| —ËEss3Éd’2¯·ÛM__ Dc1†‡‡±Ûí´47‰D0ºÚÚÒþ[¬nY3­--¥ú±ãÇ) ‹EÚZÛèéíáhç§üðO¾OSc####D"QN¡úzÉ$ñxMÓÕ×366F4£ªª’²2sÛ‰D"Äb1‰$~¿Ÿææ& ÃàäÉSäò9œMMM8N)­B!¾°3öÛÛ¬V®¿îZ^zùe6oÙJ$Á0 ö<Äþ(‹<ñôfÒé4/¿ú*û$“L&Édsär¹RÐÛôÌzûÂF_¸Ÿ¡¡áñJIO/'Oš¶ÿ…B§žÞĽ÷ÝÏ /¾D*æ×÷ÝÏÈè(ûàƒ;1 C7ãÁ‡¡`€×^ƒ>ù„#Gްé™-„ûû9tø0Ï¿ô&&©t†Ñ±QÞ~ç]>Âó/½Œaüæá‡‰Ç㼿cïÙC¡ ñÐ#‹Ç¥¤ !„¸°`ÅòåüÇý9sÚZùçûƒƒC,]²˜Ý}Ä©înªTøý´µ¶280@2™ Ìëe^Ç\B¡k.»ŒL6ËÁC‡èéí%sòäx€­«©aùÒ¥t´Ï¥­µ… L¥0ÍÏ“¨¨àGö§Ü¼îF>üè#^yu ¡5ÕÕ\¶jõÁ ·›¢V$•JÑÓÛK[k ÕU•\±f þòñ{$¶I»ÝÎüytèBUÇŸ½¼æ²Õ\yùåÓ+>6ëÖÝÀ]wÞÁ5W¯E‚µµ¬Y½šÅ‹‘H$Õ×SQQÁ’%‹ééíeŲ¥|û[×pÇmyëw)‹¬\¾œo_s 'OusÓºY±|9óçuŒwïOÔp–,ZÄòeËh¨¯'‰²oÿn¸þ:-\Hmm”R!„çÍ»úu]§§§«ÍJuu5N§“‚V T_OQ+òä¦ÍÜtÃw°Ùl´´´ …xâ©§ð—û©¬¬$›É02:ŠÕj¥®¶–oëª*+K­ùI“ãÚÊ”ÿO‹DˆÇã8]NEÁfµ22:ŠÍfãƒ]»Éçs\½v-G;?EQ Ódxd„@E›ÕJ,#÷“Ëæ“Õ+W²`þ|î½ÿpº\`šTWWO¯©ji2ãÔÛ-*ªŠ9ã9Î5ÕÕ¼ÿÁŒŒŽÒÛÛKscãÄguE¡2àĉ.‚uµ(³MTT‹ŠÅbÁç+ãx× ÚÛçË奔 !„¸ð?ŸÏ³cçNúûÃØí¾ý­khjlÄjµ²bÅrž|z‹.¤X,²s×.Âá0n—›†ÆÊËË …êyùåW¸ëÎ;¸eýͼñævlV+ -dñ¢E„êëQUŸÏ‡ÛíBU-´45•‚¿ištw÷ðæöí¨ªJ0XÇm·nÀj±°î;×óúorýµßfNk+¯lÛÆÈÈÍMM”••±öÊ+xáÅ—¸ã¶,Y²„W^ÝÆ¡C‡©ªª"—ËóÆö7I%SÌïè "`ÿþý†1-ð×TUóÞ»ïa³Û(++ã[×\SJ³Ëé$PQÅb¡¹©EQhŸ3‡Až{þy¼Þ2Ößt#Ý==äóTUeÍe«ÙúÜó<öÄÌ›7–æfª«*ñz<:ÊDåÁãñ°þæ›ÙúìsìÝ·—ÞÞ^™ô'„â¼QvìØ‘˜7o^Ùl MÓ¤X,¢ª,–ÏZ©äxW·oÜXš‘ž/°Ûl¥òd—ýdÐ2 Ã0°X­(Ì>‹¶÷ Ã@×u¬Vë´eS×- X,TUVq˜º\UÇ[ÓŠ¢`…B‡ÃqÆ :uÈar?Î%Í3÷{溚¦a³Ùf_>Ñóaš&E]'™Hòëûþÿô×Çã‘Ò*„â éììLžõ:~EQN»n^×uvîÚÍõ×^[ òŠ¢àœq=úÌÀ6µÛüLq¶÷f~n¶uívûï´\UÕÏ%®é›ùÞÙZ犢̚ÖÒò‰»NœàÐáÃD£1æwÌ“ýB!Λßù±¼&pÓë¦]ú&ί†PŠ EÁs† !„_Jà·Z,456JÎ]@N§§Sîè'„âü“{õ !„ø…Bq1²F"‘Tgg§ä„Bq‘‹D"©ÿÛÍ¿0Ã#¶¼IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/booleans.txt000066400000000000000000000007361330160122500233410ustar00rootroot00000000000000You are viewing the booleans page for the application domain. SELinux Policy writers have written booleans, if-than-else rules, into the policy. This allows the administrator to change the way SELinux enforces policy on an application. The administrator can tighten or loosen the SELinux policy based on his needs. You can use the 'Filter Text Entry' to search for appropriate booleans. The Show Modified Only toggle, will show the booleans that your system has customized. selinux-python-2.8/sepolicy/sepolicy/help/booleans_more.png000066400000000000000000001716141330160122500243340ustar00rootroot00000000000000‰PNG  IHDRþjû˜8psBIT|dˆ pHYsNNŒ1ìtEXtSoftwarewww.inkscape.org›î< IDATxœìetUÇÚ€Ÿã9ñâF ·œb…RJÝ)Õ[ïm{o:•[§-(/Å¡ô£Xq àw×#9¶¿!§Qtžµf­söygöìygÞ™=#“$‰'N(Ž=:ÍjµÞ)“É<@p³`´ÙlG}||ž6lØ~Ù_ý¥”Éd¿EEE÷ð:_ ‚› “ÉÄÙ³gËOž<9J™››;c̘1ã°ÙlÍ-›@ ‚«ŒR©¤}ûöÎåååß*-ËÝZ­V(}@ nr;Êe2™“$IÍ-‹@ ‚&F’$µ£}@ þH’„²ê‡@ ‚›¡ø@ ø!¡ø‚+A’$1]&n„©_ ¸BÒ³²ùxêtò ‹ âíçŸÆÕÅ™ûŸ³Ùl÷·ø‡¯˜ôê[ÜÒ?šï¸ €‚âbÞýâ;¾ÿhòU‘å‘—ÿ‹Þ`@¥TÒ:¬OÜw~¾uüM_ð+Û¶Æ»e ¾ûyÞ%§¿êÏM,\¹–GîϘaƒ˜±p ©™Y|ôÚKW#+  Š_ ¸¦Î™Oçí ôó!'¯­ƒƒý}ºüX” %²jaªî;:80ö–!Wõý‹lÛš¨öm‰?~’ióå£×^lÐoKËJ¿Êû–Ý{5x¹ùù쎋'ÐÏ·IÛ‹ÕJjz&n®.hÔjœ›,-àzGg0ðÕŒ9ÜsÛhBƒ™óÛ Bü10æ¢aí«úåry“ *Ül8::¢Óëpqr$¦g7 ¹]ù F .ÎNÈd«þªû:½µ·pKÿh~Z¸„´Œ,Ê z´ž~è^^ÿø¼òÄDÌf3SYÀÏ>É/KWòæsO1Å¢Ú·å–þÑ5ä‘l‹«ÕŠ‹“'Ξã—ßVb³ÙpwuåÙG8/ä±vã†ÆôeíÆ¿Ø¾/¹\NǶ:~Š=tmÂZñåŒ9ôïÕ^]¢ªRÀ«E ÖnÚºÍ[iF¹N$Ilܱ›Í;÷ ÓëÔ·ùEŤ¦gb¶ZQÈå¼õüÓì9_ÃO›°Pæ.[…ÅbÁPQÁÈýiʬÅ˰Úlôê܉‘ƒúóßO¿ÄËÓ_ï–¼ýÂ3Müt‚ë'­–Û†å§ù¿Ra¶Ð.¼ƒúö¾hçÛnê¯ú#.÷^~ŽyËVóÃÜE8jøzò¸º8°~ÛN|}> Pùžýý®I “!I2àÖaƒÔ·7¯~øÙ9uÒ ò÷£s‡v¼úñçxº¹ñêSÕY[pâì92rrèÕ%ŠnËÔ_æàëëOObÊÔéÌ^²gGmeÚçÓONKgѪµ¼úÔ$bzuÇjµ²på;AD«`Nœ=Ç ²Ë]%þ¨Áøø»i¨U*Fêϲuë‘$‰‘ƒúÓ±mvìeû¾D¶‰ÀÉÉ‘÷ÿý¯~øûâ×ñ“”–A Ÿ¯?óïý=2™Œß7meôD¶iÍknïäÜ?~ ûôÂd2]Õg)ÜHH’Dûˆ0 ¦ ÊÊt„…£R*¥Ëí¦þê#@Ð8SÓ¸ç¶QL} “¿œÊ±3g‰îÞ€YŸ„Z­B’$¬Vk°ÕßO 0›ÍF456[åM‹Å‚D••ðõÁd2àëƒÕj­óÞÞ>bÞq›=M³Ù‚¿=Þ’Ò2œµöøLf *¥£Ñ@Ÿn]˜6o1î®D´ A©TT—€6¡!Ü6|(];v@QMŽÙK–““_€‹“#«µ²‹!IvŒFS?ÆŠ Â|ƒ¨¨¨øÛbRQÁÞƒñœ<—@ï®QTœWô‹E(}Á?³ÙÌÜe«h†Ÿ;÷ <8Ö¡­.Î>â·ÙlBñ —ˆÁXÁw³ç‘™“@d›Ötì`W\¾ò_8ÿ^ýüù‡¬Û²Õn y~.®úHZ’$ ¥§;Ãú÷cÑêßñps ;/Ÿu›·òÅÛ¯³pÕï¬ßºƒ‘ƒúשRÙÿ½¨ðÎÑ#øeéJ^Ÿò?¼Z´àÅÇfwÜ!–¬ýƒa1}hÝ*˜‡&ŒcÞòÕÈW®¥s‡¶öPQDuƒÅ}·àLb²=/2™Œ‚¢"L&S)μuüÜ1j8¿,]Ááã§È-(¤}ëpÆ Ìü«±X­¨U*´5ËI ø‡Dÿ^ÝQ«T´ o…Í&5êÝ-Z´H=z4 …⢞ÁßÈd2(×pvrÄZm$êìì\ïN§ÃÑѱFÛl6£T*Ñét888Ø•¶V«µÇSux–B¡ ¢¢•J…^¯G£Ñ “Éì#t''', 5dT«Õ(•JÌf3&“ ¥R‰F£Ál6£R©Ðétö¼Èår»¿el`õ†MÌþâTÕFüjµµZN§³72 …Fƒ^¯G¥Ra2[prÔ, Z­‹¥ÒÂPÝÁ`@£Ñ P(xã“/лûôD¥R‘[Pˆ—§V«GGG***jtn‚*²óS…U¿áââ3gΈUýÁå"Iƒ… z}{åååuüëtº:ת”tun0 S¥ðª+÷ Å/I5ü[,–¿•ïùFU^ª‡‹;rŒÆßVCéW…©mj·Z­èÏ—ÙlFöÿÕ©žFu?{Æsê\" …‚’²2zvîˆ$I˜L&<\]ìù®¯\‚*5-qÓã5¾ãÊ_ TQRVNÎ90æš´ Û¶ÆÕÅÉfãž±£Q«”Õ¦@DÛ$\M„âupsqf¨[®ÙŽ„NZ-íÃCíÿE{$4Bñ ‚:ˆö@ ¸9©±ª_¼è@ Üü(”J¥Pü@ ÜäH’„اW ‚J€s‰çš[wÔj5%¥%7ÄQ·NŽNxzxR®+or™år9^-¼P«Õ¢Ó×ý|ïzB¥Táéá @aQ!fËýí}Õ³ntì{õ‡‡†7§‡Æjµb0Ðê~~½áääDhH(&³‰Ž:ÚOãk ,V §NŸB.—ãêêJxØõýÎ+ŒœK8‡„DëðÖ8hš[¤+"#+ƒr]9ÎNÎ÷,\Ç4]+%\¥¥¥˜-æb7ÉŠŠ 223<`06« KÝu®2™ FCrJ2­Ã[×»‰Ïõ„\&G£ÑØ_ïò^ ï–Þœ9wF(~Á Pü‚늪í]›rä|µ±X,ÈårûnxMEÕ^÷U»Ø]ï r«ä•nˆi›Æp³äCðÏæÆi]ÿ d WÜXkNeTî—}­”BÕþÜ7’º‘dm¹\Ž q˜™ ù)..$7?^‡F­ÆÕÕ?Ÿ€F[I…â\w(ä׿‰¿çuÁµW?¢÷zñÃyyo’Óôn†<n|ró²‘+äxyyã§P!I6ÌfÙix·ðÁÁA{Ñ8„â\WÈ¡TÞXÕR²U޾¯É¨Vªñ_³ô®”›ÈÔo³Ù~As’™•ŽÖQ‹ÑhÄÛË­ƒ›ÍFiY j•†¼ü‚[]4ž«…ü#¸ÑFüÉrÍMïÂÔí#~As““—EpP(ŽÉ¨e*l¶d”á©ÝGž9´Ñuô‚“©V«•;é³~¾$áò xÿãO0VTðòkÿ!#3ë¢a²srHNIÀXQÁì¹ó.)MÁMÂù9þÚ®G·¸8»àíåMXhX½~êsJ•’í;4Úÿå8øÛô^ÝÝýàC¼÷ÑǼ÷ÑǬ\½†¢âbfÍù…¦ÿÄÖí;ê sQ‡dñW¿¾dÙr Il\œýÚ‹¯¾Ö`<{öôk¹™³ç°dé² Ê[eê¯îÞûècž{ùFŒÇ{}ÌŠU«¯X–•kÖž‘ÁÁøx’’“‘$É^æW#¯6›MÌñ š•R…ÍfÁQkA«µ¢–F­ÈE¡j‰FiYãêçGüããÐ/šß–-gܘ[iÙ²%k_‡ÖQ‹Ùdæ–¡CPªTlÙº•’â5b8P™¾B.§G÷n8:j9sö,{öíG.—s×ãÙ¶c'iééøùùqëÈÌ¿â’ÚµmÄñ·@Jj*{÷ÇÒÂÓ“˜è¾=~½ÞÀ¹„Ú´nMÿ~ÑóÇŸ"Iƒ Àßÿ ‹Wp58—È”Ï?çÍÿ¼NDX…EE|ýÝT´Z-o¾þZƒáê[Ñ_VVFIi eåe8hP*”Èd2¼½¼+7ü))¡´¬´r“›–^Èår 0™LX-V” %r¹? ùùùèô:|¼}Ðj+MgÙ9Ùx¸{ààà€V«¥¤´„‚‚œœ*7n1›ÍdçdבÍ,3×kzðógò›oØÿët:ÂÃÂ8~âP9 >vâûöÇâÕ²%cFB.—³kÏ^Î%$С];zöè^#Ϊ}íô$I"&:š‹¥mëÖ899•„²²2þøsZFÁ¹„¾ýáGNž>Mû¶m),*bÄ-ÃXµöwÆß6›ÍƦ-1|ØPRRSÙ‹§‡'ý¢ûrìøql6‰‰Ièõz\\\0 ü¹i3cGBV­ñ©ZÙ_»l&¿ù»÷îcêÓ˜üæ˜ÌfæÌ›Ÿ¯/®..””•’žžŸ¯/£F çÀÁƒdgç–‘ATÇHb¢£ILJbϾýxzz0jøpHNIaÖœ¹øx{sûØ1tŒì@xXf³™Ø¸8RÓÒˆìÐÈö퉋»hœÕ¹¬‚› 0ŠK‹È¥-GŽí C» ‹Šðö„U¦F¥ÊmT<ñÇ<Ä­£GѾ][ŠÇl63uÚtòò 8yú4Ͼô ½žEK~#((ˆ“§O³æ÷uöðf‹…Ys~¡°°¯¾›Jç¨NtëÒµZMAa!½zô`Ë_[Ù±k7þøÕ©#ÒùFÇf³ñÁ”O  dæÍÌ_´˜qÙ¼u+1ý¢™=¯Ò*0wÁüýéÕ‰’óß šŸˆð0 %O<ó,çùú»©ìܽ‡11 §P(ê8ooo†ΰ!Ã@VéÇÏ׃ÁÀÎ; A£ÑЩc' YYYôèÞ•Z…L&C¡PàïçÏ©S§X·n¡­BQ(äåæ±qÃF”J%Þ^Þ¸¹¹‘‘žÁÒß–âë]9‡Ö½kwbcc9uúT ™” ¥½“R¥ˆ«»ÓgÎ0xÄ(ÅÊ5k(×騴e • Ñjµ2}Æ,FNzf&‡âs.!‘%Ë–MJZZ8ϯí³@ÿ¾.áááÎÐAƒøýõç•TeϾô µšôÌLæÌ›§§'NŽŽDu숟Ÿ/‡åØñãäç0õÇi$§¤’šÆé3g°X,|øÉ§²qóf,ZLì8–­X…7 Ibî‚…8:jë‘ëï9þêÎjµ"I•ŠÔjµRQQÁÜ IHLÂÂBztïÆæ­•íClÜAÊÊ˹íÖ[™=w>……<þ̳øûÛç9÷îÛL&ÃÍÕ??ü|}íe¾~ÃF¾ûa|ñõ·ääæ^4N«ÕZCfaê47..®H6Èä†cÏ!3¥ÆvT˜U”–•àæêÞ¨x.¬øų}ÇNœ9pð ýzLß>¼ðì¿HJN&)%…  ¢ûôæ…gÿšÇëÄ“š–NÇÈHºvîLÇÈÈårúõíÑcÇ0$&%Dp`ݺtAq~q×®={èÙè>}øäÃ÷9yú4ý££iצ Þ-½ÐéôtêÔ‘í;w’””LP@@£ QÐô¼óƉç?o¾Í‰“§øèÝÉô‹î{Á0õ)þ¼ü<ÿº˜Å¿. …g \]\ÉÈÌÀßߟ”Ô<Ü=psu##3ƒÒ²RŒF#ÎNÎvÅïììL‡;f,r¹…BÉb¢_L?\]\±Z­•£UtëÑ ½AÉlâСCDGGãããSC¦ê¦þú«fÿ4Ù?McЀç•H6’d#9%^Çâß–’””Dbr2žxzx°mÇzõè^'NIª4õ×VJ¶óæèÁ°76–ŒÌL 9%•ôŒ Nœ:ERR[wìÄÓÃW¢:uÄÏ×—.£øeþBÆÇ3°æ/ZÌ¡øxºvéÌÎÝ{ˆìÐÞ={ðồ9yê4’$1lè`öïF£f×Þ½œ>{–Aýû×+oíÎ@ŽAUÙY­ :˜ˆðpz÷êÉ‘£G1*ÛÉf£g÷îøùúàÕ²%r¹œ‘ÃoaÛŽhµö´<=<ñôô 0Ð??_{™8x&¿Mïž=>l(‹–üvÑ8kËm=/£@МxzzQVVJyy)áá­‘d6Ête˜Ì&µNŠ£AÅ¿uûB[…0â–a<ÿÌÓä ÓUî ®Óë9sæ,ÎÎN´ðô¤¢ÂDEEgΜÅ××¥RIYy9ÅÅ%¸¹¹’’’BFF&……äääòèOѵKgZ·ŽÀf³¡V«ÉÌÊ"!1Éþ‚µ‰hMFV)©©lØ´_oàïùB¹\Ž$I´mÓ†§ŸxœC‡°ø·¥WT¨‚«KpP 3üžI>Âw_}qQ¥_µª¿¶S)UDEEѹsg<==ÉÌ̤°°vmÛáããC`` iii”––Ò®m;Z·nZ­¦¨¸µZ³“3¥%¥œ8q‚]»v±iË&4 C áܹsäåça³ÙËå8;;ãää„R¡Dë ÅbµKxX8*•ªŽlÕWÙWw*µ??üýüpÔj‘l !“ÉÉÌÊF’$ü|}¹÷®;yý߯0lÈ`***xì‘GðôðàñgžE¯××;ê¬OÁ"Už´ùØ#ñ¿_¥¼¼WWœØ¿?¯ÿû>ÿøÃJÿ6‰³çΑ——Gß^½HLNfÅêÕ<÷ÌSì?p€?7m¢{×®D„‡‘‘™IrJ nÜ„·7’6k¥"´I}{÷&4$„m;v\’â—lR5k@e¾¬+YÙÙ<ñ̳tŽŠ""<ü¼u Ò2PÕ9³˜-Ü6æVžxl"3~žCaaa¥\6.ÎÎddd‘——g/óÀ€þøsÉ))œ>}†Þ=z4*Î:1Å/hfœœÑéõxz¶D§+§¸¸ˆs §1U˜GƒŠÆÏ³‰‰îK`@tîÔ‰cÇ+ç&_ü÷k|ðɧüøí·xzzLj±ãøà“Oyøþûñpw§°°ˆ«WàæêF÷nÝx`âc<úÄS8h+×<÷Ò+ö8»DE±k÷>þìsLç·öôññfì­£yéÕ×Ù¹{7Ï>ýd½²þ¶l9÷<ø0±0lÈàFg^pí=rDãÖ^È*Wõ×vDvˆ$"<‚}{÷¡Õj9sö Ú¶iË¡C‡puueÁÂ8hðjáŬY³P«ÔH’D»¶í8uú1ýb¸÷Þ{4`ºrñññŒ¹u >Þ>ÈÙ­ ¹™¬òç¨ÎŒ¿}<¹9¹XÌ–:²Aý#~j›¸¥ÊÑgûvm™9{[¶m£sTOz‚‡'=Á¹„RÒRyê¹ç™6s¯¼ð<¦Î¹ú>5ìùôÚDD0é‘G0™M¸º¸ðý×_òÃôŸxxÒü¹q6›˜~ѼüúÙ²mjµš»ÆßŽ·—7NŽŽŒ5 ?__d2-[´`̨‘¼öæÛìÙ·Ÿ''MþVæPÙŸ4ñQæ/ZLQqqy*Ÿª…¶óª¸¼Z¶dÄ-ÃxéÕ×íë!j§Y\RÌÞz‡'N"$8777»Ÿî»—=û÷³eÛ6{™ßw÷]˜L&^{óm:wŽ¢{·®Š³ŽµEh~ÁuÀ¹3gqÐh ð Äj¶pæôY c£ÃË-Z$E´‰¨sHB¡¨1ÂËåèôzFÏô©ßÒ:"…BN¯çÓÿ}Á¯½ŠF£A.ÿÛôYeµ÷¨-d2yåÂ?…ƒÑˆÖáo“ZÕ®CU#¯ªpUqZ­Ö:ñW]3hµZ1wƒ³cÏZ·ªsýô©Óögîãホ»’M"55•ŠŠ ZzµÄÓÓ«ÕJzZ:V«•ÀÀ@Ô5I‰I˜Ì&ÂBÃHIIÁjµ¢uÔLff&eee¨T*\\\°Ùl¸¹»áàà@ZjÞ>Þ¤$§ IÎÎÎÖJÊÍË¥kTWŒÆš/žR©¬³oÕ{e2›Q«Õv5R½ÎV*ñÊűµ”•‘•ETdT¸år¹}  êÕ6ÂUïPõ÷ªjª£jÊ zøª÷°z\ …I’°X,ößUÏ£êw}ù-*)©òÔÅÚÈd•Öª-ˆU*Kå§‘ …‚Š šVI’P*•v9 F#ý••JeÏ[U> …=ÿU×/gíçYPX€Ÿ¯_¼×’Ím`äð[),ÊçÌÙSdegÖ*‚í#/6!!¡áUýµ+}u…ªTªìfö*´Úš»UݯjªLóÕãWŸ9ëK³êwÕ"¨êrÔöS5U æàn|dÔ¿Odd=Záá5;¬J…²ÎµÖ­[Û·k׮ƽàààe  C‡•»J™TÇdªkz«ò£Ë±^do‹­žUäç7ð©^í´kÿ¯z7ª¿3Õ•ôÅâjŒßúò{± |ª¿³Õñ©ìŒÈê³êšÕjE!—Û;ÕÓ¨WCùºXœ É*4'2™œCñq””S\ZŒÕbA¥R5:ü%màãäèÈî­[0›Íö—ÆÉÑ‘O>ü ÞE ¸n´ |®åNzUíê&êë™êS7:r¹\Ìñ šÂÂB´'.úýq ô÷çáîC²QÃbw!.IñK’TçhMI’„Ò\=ÎOÝh\«)¦ªUý7Ê”V•â¿d½7CçEpããééI÷îÝ騱#&“ ¥R‰F£A­V×°ª_±e¯àºB!WØç\o$IB­Rc2™®™rS«ÔçWºß8ÊôF’µ!*§n¼N©àæC­V£V«/;üѺ þ1¸¹ºQPT€wKïBù—DNnžîžMj­°Z­(” ‚ƒ(..ÆÕŵÉÒº˜L&JH`4Ñh4Í-ÒQZVŠÏùOŠ‚%@Qq I Í-‹@€ƒƒAA”ëÊ1[®ÿ)¤ž-pvvÆQëH¹®¼IG¶ ¥_O_û¾ÆŠÆ¾Ó8hpqv ¬¼ì†_ײEKÎ…$ÜÈ(ztíÑÜr5¨ïó¯ë›Í†J¥ºf2Ûl6qtt¼&é] Ü\Ýš[„«‚Pú‚›Æ­@pSФ“¨Ù¹Ù”––Öÿ}¯@P …B»»;~>bs@ hJšTñëõzZ·º¤ÿL$I"%-¥¹Å‚›ž&Uü憚‡4/7úªo@ ¸hRÅ/—ɽ¡€@ “‰mÑ ©iÚ¥eõ7æez3Ëw¤‘“kÆ‚nJÔúûãâ(¦þ©T?ù¬¸¤˜ââ¢:«¨U*uåÑÏõìç/‚‹Ó¤­gC#¸WBSæÄ‰C»Ø±} ¾Á|ùÉkÌþ¿³¼8áâ¢nNªêKQqÙÙ™téÜ­ŽÅ¨¤¤˜³gÏо¨'@p9ÔPüKW¬@¯7Øÿß>v …EÅøx{ÇÀþý/)òªóÍ«“–[ÆÙã¤ü‹˜žN¼´øÒ2 ˜úÃ/t‰ÉÞãÙôí(Vvÿ#9_UÅÇq˰õ. õôlAjZj½Á+**økûv’’’iÙ²%#† ÃÙÙ‰¸ƒ‡èÙ£ûUqéŠøx{3 &Æ~í·åËé×·/þþ †+-+cÕšµL¸}¹yù„¶ !!1‰ýÐÂÓ“þý¢ëœpYôŒ Ò32èÓ«—ýšÕj%þÈÎKÀÝÝ~}ûàìì\oøØ¸8ZGDàîvs|O/.Ÿéߖ¯ÀÍÍ•11 ˆ‰A¥V“”œŒN¯gëö|ûýü¹qSHjŸÁ]…L&«ãvJÆ[@LoW&=2Šn]";"†;Çõ ól&S~ÞRo8áþ ¨¨•RÕj©×Ùlõï·tÅJââŽÛÇÑ:"­Ö›ÍÆo+V`±XÐétWüÂü¶|_|óyùùlÛ±“Ÿ™GFffƒa, yyùÌ™7Ÿrޤäd¾Ÿ6Þ={PV^ŽñüáWf³¹Îô†^¯'-=={÷׸þѧŸ±gï~:vŒD&“ñàc“8pð ý~õóbãRRRrÅù7>uVÞùxûÚ*„ÐV! IlݾÃ~oåšµ¬Zû;Ÿ~ñ%S§M`ɲåŒ;ŽOþ÷‹…gÌäÛ~dÌwÚçø«;N6¾^N¸¹¹"“É‘+ä´láŠÉÙ9yÍ®|„k&w~Èo2™±Z­ *þ†:šj•Šs ‰¨ÕjºDu²[ NŸ9ÃèqãwçÝ$$&°}Ç.&Ü{?ÿy늋‹yñÕ×ìJòáI•#êÿ÷:éôîÙÃÞù]ûÇôëÛÇ.÷¿ÿû&·M¸‹¥+V•#õ'NâÉgŸ*ûÖí;xü™g‰?r”IOÿ‹ï§M§´´Ôþ.=õÜóö<.Y¶œ[ÇO`òÕA¯×“™•ÅsÏ·›ú«»°wŒ6#»˜(+Ó&“‰“gË(7›Ö3¤ùpÍâªLýf³é¼â¯ß5t ô­£F2bØP>ûâK~üi………ø0oö,>xw2[·o'+;›5¬ã«Ï?e@L?¦ÍœEû¶mùýõœKH¤´´Œí;wqôøq:wŠª“NLt4‡â³vÝøãääÀÂ_å–!ƒùñ»o8vüÇOœä…W^åùgžæ»¯¾°‡—$_|:…Ž‘‘Ìþ©²]ZVFì8fþø½{ödçîÝdfeq0>ž•¿ýÊËÏ?WC†â’¼¼¼j\‹êÔ‘¢’bü|}YøËlRRSk”×ćâÈÑcX­VfÍ™KÏb»nàŸFÅÿ=÷ðÞÛoñìSOÖº#áää„££7WWÜÜÜ8uæ z½ž=ûö1 &¯–• QXh(áaaõ6îCû´ÇÓÊt*þóþ>ûz'/½µžÍÛK(1$S‘º•ÒÒ’fWBÂ5ƒ;¯ùFãe)~'''î½û.>ýèC\\\xçýpvvÂ×Ç_oŒF#gÏ%àïçGHp0Ç %7/aC‡0mæLÖ¬[ÇË/<Ï7ßÿÀú ¹eèà:é¨Õj¸ï^Μ;Çć¶_OMK§WÏЮmŽ;FQq1:´Ç͵æIzînn¨Õ*<=+÷÷/((@¯×³s÷n”J%^-½8uú ¾>>¸»¹ááá^#¼WË–deeSXX€Ùbaþ¢Å„‡†ˆ·—®®®TTTîœ)I•'G-ü¹™LFÏîÝê-K@póÒ¨ì4²srHNIÅÏÏøÃG8uú }{÷¢\§£wth×®NãTŸ©_©TðÑk·‘iN$¯4#GsÉÎ)'©øÊ$Bü<øö믚_ ×,*çÄ%*£©í$IÂf³Õ­¤ÀÜ ù`Ê'¬Zû;mÛÆ¨ÃëõÝ—cÇO°s×nÞ~ï:Fv ", ¯–-‰;xˆýcP*;~?_ßzãèÖ¥3ÿ~ñ… ½{×.Ìž;}ûcÙ¸y cFÂ×LJ%K—súÌ™º‘T›Ê ¤\§£C»vôîÑwúõíË¡øÃœ:}šÃGŽÖªR©ÓIO?ÊÕkøäó/صg/wÜ>®^y• q‡a0èÙ£ÓgÎâÉÇ&6é1ÂàúD1a„÷"""É ²C{\«5fr¹‚vmÛ`4qpp`ÈàA”••áááA€¿?­#"صw/å:a¡­pvv"ÀßOO uw7GC@3n>Ý7ˆGoïΞmëÉ/(äı#<LFV–}~Dx»÷î#8(ˆÖáØÓíØ!’6äåçÊ+/<‡‡G¥¡ê„J œ7'Nž"ªSG¼¼Z²uûvž{ú)d2±i’@ðO¢¨¨Ù¢E‹¤#F4I…E…„¶ m´NÇ¢… 0›Lüë¹ç›D&ÁõKRJžîž$&%’™™QÇJ¥¢SÇ(±ôpäè1=ÊC÷ß×Ü¢‚kLBBBÓïÜw)899ñÄ“O5,‚ëYµ FXhX3Jsó²gÿ~õ¹¸G@pSÒä;÷‰½úE˜¯ ÝZ‡æC 4M;â—Dc.h<µ7®4 ŽØ!P Üü4ép¼ÂTAqqqS&!¸I(..¦âüîu@ h:štÄïÝÒ›¢â"ò ò›2ÁM€B¡ÀÛË»¹Å‚›ž&Uür¹7Wq(ˆ@ × bå@ ÿ ”žžžÍ-‡@ ‚«ÀÉ“'¼W^^~óŒøÚÆU š‚¦nsD›&¸R***ÈËϧ¼Ö‘äMû9ß5D| &®%MÝæˆ6Mp% FÆÇÛÿ÷èÖFÜDsü6IôŽÁµ£©ÛѦ ®„‚óÇ’WqúìYûï›FñK6Ñ;׎¦nsD›&¸¤ZDz²rûïzMý{÷íaÛö¿j\{õ•ÿ\ôϲ²2ý:Ÿ§žø—ýZffëþXË?}Á°™élß¾ûî}à‚þ¢!³Ø—_ŽÅb9¸Kg†vÕ¶^ÿçÑ1²S½òX­V”J%eeeü8}*·Ž[¯_@pãÑ\¦þ/¿þœàVÜ9ánfþü­Z…rËÐú¡jsA Ø?f fà€Á×ýžûz £ûö£w¯¾¤g¤1cæ4JKK.+ ³ÙLQqÅÅÅØl6"Â[ãííS¯ß³çÎðåןSXX€F£&¦_ÿý ‚æœãOH<ÇÉS'š4}ÁÍË÷Y,V ‰-ZR^^Îü¿àâêJyY1ýбc'æÎŸƒÙlÆÙÉ™ýRVVÆÜùs0Äôë‡{å™à’$±oÿ^Ž?ŠB¡ &fáa¬û¿µ¤§§£Ëqvv¹ìŒ\hlî=ÑjéÖµSø–cÇÌÆë±Úl´n݆As .–q±Èårz÷ꃧ§'›·lÄb±âéáAŸÞÑ,\<ooœœœpvr&00‹ÙÌŠUËqppÀl2ѯ_Š`ùÊetíÒ•»vàææNE…‘Í›7bµYqvraÌ­·±cç6òòr1 hÔ¸ÿa”Ê›fÝ¥@pSÒœ«úïœp7›7o$$¸•ýZüáƒÄŽÇl6Ó¡}$¡­BY¹z £O””ãæêÎíãî`ó–äää T*¸mìxñY÷?ˆ ã:@ìýœK¨\ P*xèG~ËHΜ;L&ãþ{¤wÏÞ¤¦¥–žŠ‹‹ <4‘q·gß¾=ö¸òòrÙ¶ý/ºvíNpp+V.#''‡ììlž~ò_Œ=æŠ2"qñÞ·ƒCåá$6›ØØ}¸»{0þö ÄÅÅb±XHÏH#²}$™Dç¨.ì݇««?ö$wŒ¿ WWWyh"wÞqw¸•J?ö$ÑÑ1ìß¿—è¾ý˜0þNÚ¶io÷·?vîLšø$ ¥‚›þ k×î<ùø3 “Q ¶8®{Óæ4Uüþ~þ„‡Gp(>Î~­KçnÜyÇÝôîÙ›ãÇ•íҤǞD!WàããÃmcÇ“–žÊ±cGÈÉÉfüø ‡püı&Í‹àúâ‚ÃÊçþõJ¥ ¨œ¿¯B¥VcµXHIIfãæ øûû`³þÝCuÐ8`2™€Ê \uË™3§qtt¤]Ûöètå8\¥ãA/¶F’$Ž=Œ$Iøûû“–žŠA¯g÷î´ŽhƒÁ §¿;~Œ_æþLû‘XÌfZ´lyIrxxx`¶˜íÿmµÌu³ÙnѨ5uÊ@­Rc±Z.)M@píiîÅ}={ôbñ’Eö¶uË_›HNIÆ×׫ÍZ#V› µª²=×éõŒFvíÚ@«V¡MÁõÊÿ·S¿¶«ûØ£OÔëÇl6SVZj_øg0˜·`¦ 11ðôlÍ&‘xŽÝ{‘˜”€ÅjÁÝÝа0Ž?Êϳgà Õ"—]þ:‚ ™Å~œþ= …__?î¾ó^BCðÙllÜ´’Ò4¸¸¸²þÏ?HLJ@.WàâìBtß6nÞÀ¬Ù?áéÑ‚>½û6˜Fyy¹}Šc@ÿAx{ûàååͲeKˆŠêl÷Ý7†Í[6ò󜙸¸¸pÛØÛÙ¾cÛeç[ 4ͽ««=»÷dãæ @åàÆh4PVZzѶ4 €¼ü\ ‹ P*UWm&¸1-Z´Hºï¾û.;‹Å È='mµZÐ ¸\Á|~}””–\Ö@eåe8jµ(—?§ž™™ÁÚu«k|Í nn.·ÍiÊø =*•ºÑíqE…“Ù|ÕÛcAóròäIÒÒÓIMK¯q½_ß>dgg_ùÎ}USE¡P6I%»\³›¨ðàrhnS}hµŽ—ä_£q@££ý×÷7z—@sîråééÉ-ÃF4[úàÚ#vîܨÜ4Š¿9÷µvpÐÞlé ‚kØ«_p£"¿@ \Bñ nT”¹y¹Í-ÇUáfɇ@ ¸1hê6G´i‚¦@ àíåÝÜr@ ¸ ä\ðþMcê@pqĆð@p ° XÏï²§ÐhPhµÍ,‘àŸŠPü@p•°èõänßNa\ÅGŽPž”„.5Sa!6³¹†_¹J…¦E œBCq‰ˆÀ³{wZöê…gÈU—¶?Š@p)Å/W€­¢‚´U«Hš?ŸìÍ›± g6cÈÎÆMþž=$ÍŸ€ÒÙŸ ;–à Ð\ây!ÁŸ©çø­V+CFŽâ«o¿@§Óѹgo“’øâ›oÙ¸yK3KxavìÚuÍÒúâ›oILJºfé57)©©|üég—¶¡ç²dÙ2ÒÒÓë½×Þxg2§Ïœ¹ìxbãâHH¬|†9¹¹¼öÆ[ “’šÊ“ÿzŽ)Ÿ}^g{ÏË¡¾tSRSéÒ«^pt)dffÙß_‹Åˆ±ã8qòÔU‹¿1Täçsdòd–ûû³óÞ{ÉX·®ÑJÿBXÊËÉX·ŽýO?Ír__¶Ý~;EññWAb ’›ZñŸMH 80ˆù‹£7®Yº‹¥Æ7¸f³Ù~RacüW1wÁ¢Ë–ÁX«²X,Wt¨ˆN§Ãjµ^Ücµôk—Á¥„¯™¶¾†ìõåÅ\ËŒz!ŠŠŠ(-+«÷ÐÓúä´Ùl”V;²¡çrÏwØ`<µË¤:¹yyö{Õ㹘l‹Åþ¬—._Ƀë¿!Ž;Θѣxó?¯T7ÍúdÐëõ@å‰ûÖÜh4V–õy6›Â¢˪‹:‹¥òäÊã'O2mÆL$ ²³³Ñôdeg× siõ¶1H '¿ü’U¡¡ýðCL……W5þiY­¤¯^Íݺ÷òËM–ŽàŸÅMmêß»o??x?ŸüïKöï¥gîõúûô_`0ÑëôÜ:z$iééñøc5v÷ß{wÝq#ÆÞƯóçÀ—ß|˘ѣhÛ¦ Ͻô ½÷.L™‚F£ÁÓÓ“×^~‰qùmÙrœ]œqsuåñ‰=h£F '²}{>\Ã_7•ÄÄDÞœü.ÿ~ñE²²³™3o...˜L&Þ{çmû›_|ó-y¹y ƒáƲxÉRB[…àììÌ‹Ï=˪5kÙ‹F£áÖQ#Ñ:h™úã4ü|}0™Í¼õŸ×íé.]±‚¤¤d^ÿ÷+¼ðÊ¿4pñ‡ ÕjÉÉÉ啟'8(¨lTû Ê’ó0›-<8ñ1¶nø“w?ü__”*%¯¾ô"3~žMBB"&³™»îO—ÎQ<<éqÚ¶nC×®]¸ëŽñ|?m:Ù99 œxï·xÿã)X­V222™üÖ>r´F^222Ù¸e ¾>>Œ~ §NŸnðÙ-ž÷ s,D­Ra0Vàäô÷¾æ’$Õ+çƒ'Ñ)2’¼ü|î»û.âªñ\æÌŸO~~>‹''Gî»ûn¶íØQ#žn]»ðß·ß±—Iõç|ààA¾ýþÚ·kÇÑãÇíõjÐÀ<öäÓŒ1œn]»RTTT#Î~Ñ}ù`ʧ˜M&4ôéÕ‹£ÇŽ‘‘™££–^=zpøèQžyþEþoÍ*yãɬY¾FÀæ¿¶RZVJü‘#¨U*ŠKJ°X¬Œ7–«VÛëÛk¯¼Ì [F0fô(23³ðòj‰»»;……E|ñé”:ï”$IÌšó ÇŽÇÑÑÉ~ý÷?@£V“”œÂGïM澇e@ÿòóóéÝ«<ør¹Ü^¯«Ê¶¿hbãâÈÉÍ¥o¯^Œ'77—7'¿Ë^ý7ó,8h4|öñG¼ûáG5ê­F£á_/¼HDx8Ï>ýt£::µ)OJbçÝwSpà@ƒ~dr9žÝºáѵ+î;â†ÖÏ¥‹ µ‹Á€©¨}Z剉ÅÇSKyCV7IâÔ7ß Ðjé2¥ny —ÂM=âÿ¿õrüÄI"ÂBY·~}½~“’0[,¼ÿÎÛ|úñ‡,Xô+ÞwÇOžä¯­Û:x0'ObãæÍÜ:j¤]é5FŒ2Yå¹×‹…è>½Jó¯RUÙ¿Ú°i³ÝÿćâÎ wÔñ_ÅË/xŸ-<™·p!o¼öï½ýááìÝ·¿†ÿèè>|öñG¬ß°¬6›==•J…Åb¡}»v´‰ˆ`ÞÂ…¼üÂs¼÷ÎÛD„‡óÍÔìñÜuÇœKHä@ÜÁʲ çÈÑc˜Íf ;ví®‘nõŸ$U–\¡°ç)19™šR¥Ä`00åóÿĔ߷+}cEÝ_~ö)...œ>{–‡î¿à  Ìf3ÿ÷ç†:y©úßÂÓ“6|v …G­–Éo½ÉÓOLªY3$$˜Þ}‡§Ÿ|œø#Gê<—ªgùŧSpqq!19©n<2Y2©Î’¥Ëy÷­·xóõ×ˆêØ±N½šøðCtïÖµNœIÉÉhÔ*>|o2oý÷? 2˜N;rÛ˜1Œ=Ú¾s§NôéÕ“õ6²îÿþϧ|dWúC dܘ1L~ó ”*•=/«×þ^o}{øû:xNNN¼ùúkÕ?ÚMJNæûiÓy÷í·j”õ°!CpwwÇl6s6!’ÒRºÿ>¾øô¾™ú=§Ïž­O•<ýûõ#8(ˆðÐ0víÙ˸±cñööfÊïãxþ`šI>¿žz’?7nâÈÑcõÖÛ   >ûø£ËRú¹;vðݻׯôe2|‡ !zÞ<îÌËcdl,½gÌ í /0f žÝ»ãÚ¦ N­ZáÔªníÛãMÈ=÷ùÆÄ,Y¸ÄDnON¦÷Ì™Œƒ¼ÚsªâäW_aÌ›ú®Œ&ñëõzNŸ9YïQ·’$áîîAHpHS$mçÏ› åÖQ#¹uÔHÞûðc»¹?-=$‰ŒÌLÚDDž‘Á¹„D ðóóE&“ѹS ÿÊÏ3¦3óçÙ¬Zû;sfL¯‘†ƒFCzF&NNN”––a³Ùxðþûpqvæ…W^¥}Û¶øxûн[ºuéBéÃe5Â×çßÓÓ³ZYÙ8sö,­BB fϾ}tŽêÄÉS§2h`½ùöñöÁÍÍ•qcÆ0ñá‡èI—ÎQ|õíT²²² fõïëÐh4œ™B`@þL|ø!4j 7F*• µJEzF¦ÝÔn³Ùxù…ç1›L¼þæÛ|÷常¸pËÐ!D¶ïpÁ)^OYY™Y•qÞûàÃÌ™ù¹¹yØl¶:y?n}z÷bã¦ÍÌ™7Ÿ—ž®Ágg4Vœ’JFf&yyy5Òõpw¿ œ ¹ÂÞÉ©þ\jS_<µË¤[—.hÏÊåëãÍïüÁý÷ÞCYYYøŠÓÉɑĤdÒÒÓÑjµ´ðôÄÍÍ•ôŒ róòP*•”••QTTÄ“ßáÅW_ÇÝÍ•ÎQQ,ÿ*j×·Þ={ØïÉ—EÕ輊ªt‘ÀÅÅ…qñôp +;›«VóÑûïRZú·ù_§×sêÌ\œiÙ¢E½ò|ûý÷Œ»m,µ†¯¾û†ââbΜ=k·@U>§JyÜÝÝëÔ[ÃÌ¿çnßÎ_£GcÑéêÜ ¾ë.:MžŒûùŽÛ•àBÄãñøã˜KK9óãy÷]lç룭¢‚ŒuëŸ8ñŠÓüsiÅŸxG­!!­Éd5îUT9söL“+þ?ÖÿIŸÞ½  U«²²³‰gÙŠtëÚ•›6ãëãCHP0ó.Â`40fô(Ú´Ž`ßþý8jµ„‡‡q(þ°½±®¢m›6¬\½†-<)--¥´´Œ9sçãæê‚—WKéÝ—‹³/önîsŽŽŽL¸}®®®¨Õj†ÄÊÕkìfóÒÒ2~ž;­V‹—WK¼¼Zrï]w²lÅ*vûï£C»v 6´Áç¶lÅJÜÝÝqÐ8èïOÛ6­Y½öwRRÓèÑ­k¼lß±ƒ”´4Š‹‹4`ÀŸF£ÁÍÍi3f¢+P«ÿþdÊÝÍ­ÑrV.µq«'ž>½{1kö{™¨ª}ªÕ/º/_÷=%¥¥deçÔ›^}²;WW¦Ï˜…»‡;Ï=ýýúöaμÄ>ÌÀþý)*.bìF ¿…\Ö`©ÆÖ·Ú8;9QT\Äé³g¹÷®;Y¹f Þ-½ÉdhµZ 3gÏá\b"ý¢û•ÏÜl6s÷ðôð¨7ÞÀÀ@V¯ý…BZ­&((­ó-æõWêÎ}»»¹Ö©· Ä}1Œ¹¹ì¸ûî:Jß94”Þ³fá;dÈeÅ{1T®®Dþ÷¿älÝJÖŸÚ¯—Õ²Š—Ì¢E‹¤«Íœ¹?Kz½N2 õº}û÷^õ4/£Ñ(I’$•——K6›íŠâÒét’Åb±ÿ·ÙlRyyy ?V«UÒë õ†¯ÏÿÕ ¢¢¢ÆÿÆäµª\êÃb±H&“¹Þ{:®FÜ&“I*++«áÇjµ6¾Šÿ}ýäˆTV«ûŸtöܹƈ~ÅTO×b±Ô(k“ÉdžåååRT^Rü‘#ÊízÐ.ToËŽ{ï•@ ÷×­·J¦ââ:~%äKÛŽeV¦mµI?­?qEiK’$ízðÁiÇ>÷Üýoß¹Óþ{öÜyÒñ'íÿ«Ê/NíQºL&«¯\.G«u¨7|}þ¯ê󋈪hLšzæ«P((õß«]*•ªÆ¨*Ë ¶Y¸>4œkÉZ;þÚyq¼ÄÐj—Mu+çŨO}eÒX™.$Û…ÂUÝÓ ¤¥§~mŽŽ®.“¢V¥©¯4šFå¿v=h ª·¡<1‘Ô¥Kk\ó=š+WÖ»ÉÎ’ ¤ä–3 Ò¯We×ÉlžѾÁøm’„L&£þ–²]JJÿñIITìÙCÏîÝùkÛvFÜ2ŒÜ¼<’’“IJJfÞÂEs’ûî¹›òòrV­YËÊ5kèÖ¥3bbìñX­VvíÙKRr2];GÕ©f‹…%K—Q\\Œ›«+·C¯=P*•,Y¶œÒÒRûZw7·:²îÞ»®rê&²};† DAa!+W¯A’$F¿GGGÖoØHii)cFâ\BžžtŽêÄ¢%¿Õ©#Úµcμy 4ˆÖüúÛÒùrÔjY¶rÙÙÙô‹îKyy9'O&%5•íÚ2jĈ:²™ÌfæÌÇãoÇj³±rõŸø(;víâØñpûmc)--eåê5hµÜ1nJå…ÕdIi)+W­&5=Ý>}µ`ñ¯äååÌØÑ£Yºb%NŽŽTTT0fô¨ËªËW“&YÜW©ôm º«ýyàæ ºOoZ40Ç+¸|Ìf3C‡ jn1ê R«yæÉ'®ëgžºt)RµöJéìLôܹ î¬Wj0#“A±ÎDRN)~žŽ˜-6æýu–ßv%°lw"³6žB_aaúú“¬Kk0}}z:y{öÔ¸–©Ö0}Æ,róòX¿a¹¹yìÛKVv6F£‘Ô´4,æÊO³srÐh4,[¹ªÆbÜ“§N³pñ¯$%%ñëÒeèt:Nž<ÅÁC‡(+/gåšµ”––2mÆL2³²øõ·¥¤¥¥sâÄIŽ9Z¯¼»÷îãÏ)*,ä·eËرs ‰‰ddf’“ÃŽ»Ø½w/ùdçäž‘ÁÖíÛÑéõLŸ1“»vSTTÌ´³(--cý† uòuâä)öîÛÁ`   rifVuòY…ÙdbÚŒ™ä››Ç´3)++gåê5”••s6!I’XüÛRŽŸ8Éî=ûØ·?¶Ág•kÖ~[¶œC‡c0ü1‡Ä, IDAT½†ää©S”••±ö÷?ÈÍÍeúŒ™ÄÆÅ±eëV–,[~EŸV_ šDñF,Kƒîb ¼ÿL¢ûôipq—àòqsueÂí·7·uP«T<ýÄã×õ3ÏÙºµÆÿ»îºàNz6›Ä€Ž~Üýù&ÆõnEk7º¼´œŽÁl=šIv±õÓ¹3:Œn/¯ >1ŸŸ76¼ñÐÑ?D:¿w€L£Á¹woŽ;ƹ„„š_IR½_Lzô^}éE\œ)¯¶N¡¾¯{,ZÌä·Þä×^¥uD¸=^¨û…KCôéÇä·ÞD&“ÿ?{çU±þñÏ&Ùlzï•ô@-tiÒ© *Š‚WW¼‚WTP±·+•jCAz‘ÞkHB $„ôBʦ’Ýdûï%›ÝP¹r>Ïsž'Ù3gærÞ9gÎÌ|©ªªúK+qBC‚Ña¼ÊiõÚµ|8ï=æ¼5›¡ƒðØ€þÌ™= {;; MÏ—ÑýÉUHq¯V¯Üoš¥ãW*hu:á_@@àš†ëê=ûõk4¬´²‰ÿÜš½ ãz™œ˜7ÜíØ—¿›9ÅUyÚcia†£­/gþoXã>ßGFá l»D…Lɺãé\ß³‡´+ Ò( `üÓ“°°°À‚ÒÒ2*++ÉÍËÓ‡©[uÒð«þ§¢œÜ<ü|ýغ}™™$%'Ó»g¼¼<9v<–òŠ ªªŒW0À­.†ôŒ ýQXh¸ÌÐÌÜ NGÛ¨(fL•“§NóÓÊ_iÅ'~€‹³3?­üÕ`Õ¬Í$8(ˆ-Û¶óï›û3˜Ê—‡»; 'O!“ɨ¨¬4ʧN§£¤´ÔÀ>N§_…TW^u+n&=5o,ÄÊR¢_A3Þ\–.ZˆN§3ʧ©Õ+u+…êV¯<÷ì3DFDÜÕê•ûE³|ã·²²¾¹±ˆ©o¯:´Z¡ãhù¨oîRX‡e½å¶ ‰`xçýÿ­ý ò°gÞS1O*`D—DÀÀö¾ØH,˜÷T g®I±0肵Ă@;s~*Ç^z]½!askkÒÚµç·ß×`gk‹¥Ø±Ø‚ÅËWPZZŠ·7pûU'b±X¿²iò3ϰü‡ V÷ØØØ°üÇŸ¸’”DvN㟠 vdwñ²[&ÑQmL†û++qdõF(êç«gî¬üm5.]¢C#KTãNrøè1ýÿo¼öêŸZ…äééa”Ï'Çk–Õ+÷ ÑêÕ«u'N¼§‘–”H‰;N•ÌxKOKKKBƒÃ騡Ó=M³)®$%ãå鉋Kó¸F£áì¹ó´iÓú®'œ5¬Y¿gŸžÔ"ìø_c{Û¶TÜÜQ ÓW_Ñú_ÿºÍ¬5kˆŸ6 uU•Áï¾þšÐéÓô$µZ-7nÜÀÁÁÁhéôíP(NæÕh4hµ:f¼9‹o¾øì¶“~ï™L†ÞFyu5æææHî`Rgch4”JU£§C.—cmm­·E¥R¡P(°³³Ó‡©™Ö"7þn¬T*‹ÅˆD"ý(vÝdV•J…J¥ÂÆÆ™LFϾýYùã ZGDÜÑDÖ¿JRR9¹¹Fú½zt§   yÞø]]Ýx|ăÿ¦8ëíwøòÓ8pè½zöÀÑÑA_A333ƒ›F§Ó¡T*ï¸Á«Õj,,,ÐhµœNL¤U«@l¬­MÆ£R©LÎîÖétÔÔ(°²’˜¼µZ­ÁŒî†ÿ×ÙPÿÿ¢"¾_ºŒq£Ÿ0èøµZmíLâzé4¼þNó, ðwÆ­{wƒŽ?eÑ"ÂÿùO̭¹ª 83cYk×ó1‚Ö3gÖ+ÔÃÌÌ G³ë›¢1ß–rõ*ë6lB&—vO:}øë+qLann޵õÝ/Ù¸W«škõÊýÀ|ìØ±ïGGG?h;î9kÖ­gÿÁƒÜ¨ª",,”ó.råJ2§Ï —Ë ¥²²’u6rõÚ5"ÂÃQk4lؼ…¸„NŸ&"< «›7¸R¥bÅO?H•LÆo¿¯¡cûö=~œ»÷ý:aa¡œ;°ÐvîÞcÏ•ädÖoÜLn^%%%Ü\µf-Gãza­##õ¿×-…9—§'Ž>z”Ý{÷¡Rªð÷÷ãðÑ£z"#"¨¨¬dÝú ÄÆÇ“”œÌsÏ<­oì%¥¥ü¾v‰gÏááD¶;9tä®®.¸8;s">žsç/pøèQ²³sˆŒˆ@$±c÷nü}}Ù¾sW£áÛDFÞvÙš€Àÿf––d®Z¥ÿ_U^ަºoËÅþ,j™Œ+_|Áñ'Ÿ¤ììY£ó^ýûÓgÓ&ÌîC§¡V©(**ÂÓÓ“!ƒáèèÐìiþ퉰07§sL§û¶ŒO*•RYYi4ÿ!Àߪªª¿ï^ýöyW†‚íÍÂîØ¡=3^ý'k7l¤¸¸˜‘cÆáêêJQQ1o½ó.*¥’]{ö0xà@B‚‚ôËQ v)È÷K—é—‚|¿tEÅÅ,Y¾‚AÕ¦µ>LþõëFñäåç³dù žš0…BÁ±ã†Ò®;´güØ1ÄžˆãJR’þ÷¥ËWzíC ÂR,æZZK–¯`È AØÚÚRZZf`Cee%OŒ’ÀÀFaT.K—¯ÀÙÙ™¡ƒkã[²|™YY è×W?ƒõD|Z–ýú’“›Ëé3‰ääærðð–ýðãmË[È­€À½ÀgÈ\b Ž’þó£µýey9W¾ü’­ÁÁœï=£¡}€ gž¡ïŽXܧÃËË‹)ÏMfòÓ“þ”ž€1-qõÊß¶ã÷öòB"‘àïç§’öñöÆÖÖggróò)¯¨àZZ´»9êáääD@€?þþT›òÕÔ›lãêâÂŒéÓY¿qÿùnÊzÒ° ã¹xñînn¸»¹áåéi§\.ç§ŸW²eÛvd2™Á’›W_y…è¶mùvá"Ξ¿@hH3¦OçÛ…‹X·q#ööv6äåçSZZJ»èh“l¼úÊ+H¥Rf½ýgÏ_ ;'…RÉ‘cÇéÑí–€Ldx8¡!!Œ;†­Û¶3ëí9Œ:´Éðbaø_àoF·¥KÕo×:±Ï‰B©`ÛŽÈärfÍœ““6mÖÛС};FzœS§Ï •J騡11ôßÝÏ_¸Àžýð÷óeÂØ±ôîÕƒ‚‚BbãâP©T„‡…àïç‡ fff8992°?ÚµmK§Žn^@àïˆ{ÏžÈsrŒ¾ÁKÈZ»»V­Èß±ƒÒÄDý9\NõõëÔ ,/‡&vkó8Þk×1}:báÛºÀŸ§©oüͲœOÀ4™™˜‰Ì˜ÿég :˜1£F=h“îFCü‹/’þË/&Ï›I$hw7 &23ÃgøpÚ¼ù&7×´ üUÈr>Óì?pìÜ\A§´9wÈÜœ?ÿŒs‡œ}ë-´ >Þi§oãç‡[÷îxõïߨQXß…\²€À½@èøï#Ó^|áæþÐw¾Ñ†€€@Ë"rÆ ¼{Œø©S‘ÆÇ› cíåE—Å‹Q–”€H„ØÑ""n»ûŸ€Àý@èøï3B§/ ð¿cTƒOœ íçŸ9?gÕç•ååø·@a$ø/çhVD"B¦Láñ´4:|ú)’zë´ƒ&O~€† Üá_@@@à/`acCÔ¿ÿMÄôé”=‹V­ÆóÑG´Y"tü÷ [[Ü{÷~Ðf4I³uüÒ)Ri±Iu¾€€@ÄÂ~î÷›féø/^º€¥Ø’VAF“ÙŠΟ?Gç˜.Í‘´€€€€€€Àmh–É}gOpSARgpH$´Mì`u/Y»aWSSZ…½%ËWPVVΉøxÒ32îiZuq*U*ö8Ðh¸ìì#‘ž¿ †kii$Ý ›6óËo¿qîüùf©_SŸp²ÙÓøßà\z G/_@£Õ±lORWü9Zº9pè0rZ'÷†/Ýõ¥›¥ãW©TètZ´ÚÆMs$k„F£aéŠؾsW­]J%‹—-§¬¼Œñ ¤¥ß뎿6N•RÉÞý —•ÍÑãÇïiÚ–c±÷Öy¨T*vïÝ×,qߎìœvïÛGzF&‡ûÓõ›Ÿý®®K¹z•”›–G¯\gs|&ɹåüt ¥YÒiI>Äû¤Z.Ðf<ÔH$ƒÿÝÜn­:i–¡~…BZ­ntÍzS‚8÷Š„“§è×§+W­f¸±8;‹Ö¤gdp">K±˜‘Çò$.Î.´oÍêµëhÝ–6‘‘ü´r%C„¯oíN[)WSÙ»?b±˜aCšÖç>áû¢¤´R®¦rððaÔj5£FŽ Àߟs.p<ömZ·¦oŸGˆ?y’ŠŠJR®^%ºm™Y(•J¦L~kkkÒ328{7WWú÷}”³çÏ#“ÉI¾z•¨Ö‘ôïÛ—’ÒR6oýNÇAáSüãÒå+|úÅW\‘DÛ¨(ztëJl\<™™tlßN¯XpèÈ‘Fˤß¾œ=w™L†¯a¡¡¬Y·ž•«VsyDŸœ€•Dšuë‘Éå ~l !ÁÁú¸U*ûâZZݺv¡kçÎ&ó¥Õh¹ššÊèQsøè1òòó:x!ÁÁ,ûáGñöò"8(ˆ —.éã?wáÇŽÇâééÁ¸Ñ£133ãðÑ£$%§Ð>:šž=ºëÃ.^¾œ²²rÚFµaÊägÉËÏ7hÖõžšö<ÄK/¾p­Qàa %¯‚ò*å2%ßï¼LÇ`7Tj-¿KÃÊÒœ ½‚Ùp"r™’I}BùùàU‚<ìãGñ·4R…BÁïk×Q$•r-- ¥JÅÒ?0nôh´Z6oýƒÉOOb˶íH¥Rlmmqws#9å*ôêIL§Ž¬ß´[ #† mTÿãJR2ÂÍÕ•'Éõ‚ƒûT«Õ²gß~ÊËËy|Äróó ÊÄÌìï¿’ÝÝÍ KKKnܸµµ5®õ6Žj–Ü×ÔÔ V«=îWÇ¿s÷^œò<£FŒ`çî=&ÃTÞ¸Áç_}C·.]ð÷ç£Ï>'4$„•«V‘rõ*?ý²’ß׬#ñì9~_·W×[…ç`oÏã#†À—ß|{[[rrsYöüðÜdºtŽÑ_?ø±ôìÑ/¿ù–œÜ\/]΀~}ù~éRö8xóÍ5'Çãû¥Ë9|NNNìÚ³—¼¼|>ÿêéÕ …BÁGŸ}Ήø®$'1~ôh~üy%*•Š¥ËWàììÌÐÁƒ°ßšTÙ*0W†BT›Ö,]ñ'ââx¤W/~ùmч½]™ØÛÛ³ùmtމ¡U«VìÚ»—Gû<¢ÛÖÆ†%ËWàêêJŸÞ½ùä‹/ Êfù?‘‘™É„±c n4_ñ'OÒ«gO~øe%™YY è×WW›Ö‘tëÒ™.cØwàÖhKee%‹—.gðc)**f߃\KKcÉò 4[[[[¢£¢hÕ†áC‡P]]cÔ6êS£PPXX„¯°åªÀM´Z}Úz3á‹ýŒêÖŠ0G:ÌØHÛg_̧ ¼šÝ‰¹ŒëL§™›8—.å‡}ÉwwKô!õYºâø¿—¦áãíƒR©äû¥Ë–”PTTÌ÷K—Q]SÃÞýxjÂxÊËË©QÔ0õ…çY´d)J¥’Ï¿ú‰Ä+++†KiY™Q:ׯ°xÙr&ŒC×.]n^gxŸVÉdlþc½zö¤´¬Ô¨Lðóõ5èô¡™:~µZN§kô¸_ßøS¯]cãæ-‘zíšÉ0R©??_ÂBCèÒ9†ÂÂ"ü|}¹QUEêµ4z÷ìI•¬ŠkiiôêÑ«zÚØ‰„=ûösþÂEäM k¥\MÅ×Çggg}%H$bãâ9|ä(r¹œä”«±~Ófjjj–”àï—ÎNÎxzxàåéAuu5I))øùùÔŠÆRXX«ëÝ*0//OìííQ(´o׎ø„bãâ ì·³³Cbe…¿ŸÎNNdfeñÄã#õ qñ ú°·+k++\]]h§‡;Þ^^ú¸-,,ÈÍËãD|<›¶n¥ ÀP–8+;›‘Æâé鉫‹K£ù %"<ŒÂÂB²srY¿i³>.[[[ìqqv6ˆ»¸¤„¢"Ö¬ßÀÅK—‘–”àêâ‚··7»öìÁÉÉÑ ¼³³3ÎÎÎøûùQZVjÔ6ꓜ’b0|&ðp£D@ÿv>¼6¢-"¸Ù[‘”[Ž‹ ­V‡½µNÇÕürxzzDI©éûÔÕÕ…ˆð0²²sL–ÉÃL³tü–––(•JD"3‡¦ Mê{Àž}û bøÐ!Ìzc&……EúÉ&9¹y Ó‘—Ÿ¹™9¹yy\KKçô™D¼½½‰D´nǪß×0ë_3  b˶íüûͤ±`Ñ":Çtbäða 333òòó)¯¨àÆdçäèr‚ƒZ‘™•MQq1ùׯ믷’H˜0n,ˆ ¸U+ü|}xyêT/üŽ‘Ã†¤gf^[]ffæè€ÈˆpróòÈÈÌdçî=x{{…×ét´ŠbÆôW9yê4?­üÕ ŒN§%åj*EÅŰuû223IJN¦wÏúpwZ& 㾚šŠR©ÄÓÓÇôçõþK}gÎÃÝMlC*-¡¢²²É|yzxÒ¦u$/OªK„ˆú+Gëê?_¦L~–ùóæ2rØPÔj53_›Ž‹³3cžœHu½IHV ¹yy¤^»†³““QÛ¨C£Ñ0ïÃØ¿£ùx¸(½Qø^Á„y;2¢K޶†tòçÄç£øíÈ5fŽŠ¦ªZÉS„àl'aû{C°´0#ÒωMqTÈ•œÍR!Wr%§Ü(þ–äCJJKIÏÈÐUUUxyzpúL"eååܸqK±K±˜Ü¼|róòŒòcfn~ëïzCï2yíg{;;\] Ò),,"0 €ôŒL¤Òróòpuumô>…¦ËäaÄ|ìØ±ïG×û–{/ 'þdb!ÁA8;;ãí텵Ċ˜N¹|å Æ áÜ… ¸º¸0°ââã©’Ë™6åy,,,ð÷óÅËˋ֑øúøâçëCdD„A­Ùµg/jµšíÛÓ«GwΜ=‡³£v¶¶$§¤Ð¡};ÌÌÌpvvÆ×ׇ»÷àêâJëˆú<Ò›„S§ÈËϧ{×®tíÒovìÞM^~>þþØÛÛàç‡ÛÍí@#ÂÃprr",4”Ö‘ÅÁÑçž~ }x"ÂÃB¹tù2{öÀßÏ— cÇ|7  âD|<övö 2­VË… 2h]»t6Èo£e"anfNhHˆÁßÁAAœIL$2<œn]»Ÿp’ظxÔj áa¡úx;vè@QqÇbc±µ±¡udÄmóÕ©c ‰‹C¥RZûvåꆫ‹ ÖÖVôìÞ3gÏáîêF×ÎÙð É))¡V«Ù¶c'2¹œY3gàíuËQøx{““CQq1í££oŽ|¶ €S§Ï°gß~þýæ¿0¯çÀ^l$yÚëÿ÷uµÅÖÊ?7[zFzâæ`…›ƒ~®µŸ—Â|y´­7öôm냕˜H?'¬Äæ´ò°7Š¿%ùk×Òˆ‹'-=ƒ´ô ÜÝÝØ¿?'â8uú aaatìÐAp,6±…Ñm£èÜ©b q­¯<=ÜqrrÒ?´üðó/èt:ª««™?o.NNެߴYŸŽB¡ Kç|}}ضc'Ò’R¢£ÚÕÖà>[X`)¶$4$geb\¾'¤Ri£çªªª­^½Z7qâÄ{žpÊÕd²³³~·´´¤sL£o«÷…BD"A&“accó—„sär¹AGZ§J¥ÂÂÂÂh‰R©ÄÒÒòÖõÕÕˆ-,×ûnÖ0̽à^äõ¯¢ÕjQ(”X[›*¬«—;¥©rªŸgFƒV«C,®í¸U*ZÉŸ,ç¤ädΞ;Ϥ§žüS× üYZ²Ñh4h4Cûär¬­­›ô=2™Œž}û³òÇ´ŽˆhÒþ{í/þN$%5¾Œ´   ùvî‹$"<²¹¢ÿKÔ5–{ñðÑpÖi]œ5°†¿ÛX kŽÆù ´ê033k´Óãå'MÑT9Õϳ¹¹9õ_ÌÅLPºSZGFÒ:²e¶o¿7-Ù‡ÔÞg†#`ÍÌo +‰äŽì¿×þâaBØ«_@@@@àckkËùS MøËüý3 è:~‡¡ãxˆ:~‡ˆf›Ü'-‘"•£«¿« µ3+[üµYÕwO³tü/]ÀRlI«À £µ› E çÏŸ£sL—æHZ@@@@@@à64ËPÿµk©xy{cfV»EoýÃÊÊšƒ÷‰féø¥%RÄæh4êFUs$k„F£¡ÿ¡|³ v?w™LFû.ÝHÏÈà«oÜs•¦º8e2³Þ~§ÑpÇŽÇòq¥·Å±ØØ¿eZ‚ï¶_bæq\Î.£Çì-Í’NKò!Íà+š—fêW(¨ÕêF·h¼_²¼ 'OѯOV®ZÍ„qcqvr2.=#Ã@Ë9þäÉFµç‡<6_ßZÖ”«©ìÝ¿±X̰!ƒ›´§¥ii_º|…O¿øŠË#’hEn]‰‹'#3“ŽíÛÑ®ž†ƒL&ãø‰8?6KW® “É a÷Þ}TVV2bØPüýüŒì¯Û²¸aZݺtfÿÁC\KK£[×.´mÓ†‡#-)ÁËÓ“ýûéw×ËÈÌ¢²²’öí¢¹xé2"3mÛ´átb"®..ìÙ·_)¯('++__ÆŒEâÙsääæ"-)¡G·n„…†˜Ôü>wáÇŽÇâééÁ¸Ñ£©®®6Ðó¾tå2IÉ)´Ž¦gî©] ü}IÉ« ¼JA¹LÉ÷;/Ó1Ø •ZËïÇÒ°²4gB¯`6œH§\¦dRŸP~>x• {†ÆøßQü-͇Ô'.>ð°P\]]Ù¹gƒ$=#ƒ#ÇŽãæêÊD¡P°fÝzdr9ƒHHp°Q<ÅWÔgë¶íŒ9€ß×­gâ„ñ¨ÕjvíÙ‹«« ZM­ˆXLj?yR_†n®®Fñ_¼t™Ê•ddfÑ­KÚ´Ž4Ê‹¿¿??þü‹ÞõéÝë.[Ïý£ÙdyµZm£‡F£iŽd¸zí½zöÀÝÝk×Ò ·nÃFR¯]ãÔé3$œ:En^‡E&—³dÙrŽÇž ¬¬œÅËVP]S£¿îzÁu ‹Š8sö,û›=Ðjµ¬ß´…RIii™þúŒÌ,2³²Ùà :ŽM[¶RQQÁÏ¿þzSÊ6}RV^ÎÊßVSTTÄÙóçIMKC§Ó±nÃF222ؾs §Nq">=ûöQVZʺ Ú·ƒ´ôtòòó)(¼%‰{£ªŠšš²sr(+/#)9…U¿¯!##ƒ5ë7 “Éôa«d2vïÝ ÔÞ˜ 'Oqìx,'âã‘–”PPXhÒþÆÒº’”ÌúM›)-+£¤¤™LÆšuëIMMeÕšµ\¸xImåJ= À‘cÇ8{€}ûPYyƒÅË–W[‰g),*bÛöddfr">žSgÎp%)‰5ëÖSSSÃ’eË9uæ fí†h46mÙJ•LƉ¸róò¨’ÉXµf )©©ä]ÏgóÖ?–”pþÂ…Û7:‡­V‡«ƒßm¿D°—.öÖÆ+ž IDATŦs%§Œ?2‘)ÔlŽÏ¤Z¡aͱ4²Šn°óŒ±¦‰é¸[ž©O/عk7nT±xÙrÒÒÓIM«õ¿/]æò•$¤%%lß¹Ëd<ÅWÔçàáÃTUUQT\Ì’eË©©©¹ùˉø¶íØIJj*Ù99eh*þññìÞ»ÔÔTÖ¬[J¥6Ê‹J©4ðE-™féøkjjôb ¦•êþ õïÚ½‡ËW’ bÇîÝ&ägd R«ùà½wùìãùü¶z ÏLœÈå¤$>€~ýHJNfß :„Ð[O¨íÚFàïOHP0±qñ·µåàá#ØX[3gö,&=5A}tÛ(|¼½ˆ‹gÿÁC\¸x VKii)ÇnvpöéÍkX,fÎ[³™8a</^âÀ¡Ã¨ÔjÞï]|ý%¿­^À#½{1÷9ˆDfTUU!‹Q«Õ´ŽŒ$<ô–*^n] æ“?`ä°a¬\µŠ™¯½Êûï½KhHß.ü¯Aê¦fèt:t:>^WÂCCµßTZ«×®åƒwç0ï9 <­N‡»‡;ŸÌÿ/?ý˜•«Vé¯mÍå¤$´Z-YÙ9$%'£R©ÈÉÍÕ×Ç”ÉÏ2~Ìhž4‘T*»öì¥F¡àÙIùúóϰ··'%5•ŠÊJž4‘¯>û”o.b÷Þ}\¸x •JEuuµÞn>ÿø#üü037ÇÕÅ…aC‡Ü¶ž^t€˜>"ŠNÁn´kåB„Ïþç3F¶ÅÖJL¹L‰‡£5Ïô eê¢#XZ˜èÂŬRª•²Šª(ª¨6Š¿%ú†ù¿õ·‘¨vŸ~µZMÏîÝX»a7…²öî?`2ž¿â+ê3pÀ>Ìû}L瘎;Î;sßgèàÚÑÙž=»óùÇñH¯^eh*þ…‚Ý»ñÉü±··gûÎæ¥Îµdš¥ã·´´D©T"™™8Dh4êæHÖ€=ûöÄð¡C˜õÆL ‹ßÔ]ÏÉÍ޼ü|ÌÍÍ´œïT{~Á¢EtŽéÄÈáÃ@tK¾¼¢‚7n“ƒV«Z––v}t:-)WS)*.&0 €­Ûw‘™IRr2½{öЇ³µµ¥´´Œb©”¼›oòm£¢øäÃpqvæ§•¿6iý´<ÜÝÙôÇ6¤Ò**+ÚODr¹œCGŽâãícpmûèvüãŸÓiÕ†à  ^žþÝ»u3s½ €±OM¢sL'"#"ôe/“˹qãù×óõÒ¤õ5¿ÃBBðóõaÊäg™?o®‘Ýjµš™¯MÇÅÙ™1ONÔ¨OéÆõ &ÌÛ‘]p´•0¤“?'>ÅoG®1sT4UÕJžz$g; Ûß‚¥…‘~NlŠË B®äl†” ¹’+9åFñ·$RRZJzF†þ¨ªªÂJ"!7/ŸÜ¼<*+o ÕjyfÒDfL•o,¤´´OOП×ÿù,Yô:Î žôŒ ”Jå]û Sö èû(?ÿºŠœœÞý÷l¾_º …RIï^= òذ MÅPyãr¹œüëùDF„åå‰fùÆß¦urò²ñññ1:§ÕêÐÞ‡iý;wï¡{·®ЪU ×  aæMtêØ‘}ûàåéI ¿®ZMuM5#nÞ(áa¡$œ<‰µ5!!Áœ=wë*X~~~lݶsss,--ñòô`ÇÎݸ»¹QV^Æ?ÿœٳ‘H, ÀÑÑ‘ÅË–#—Ëq°·ÇÏϸ„®¥§ßÜß [[[–,_ŽH$büØ1·Í£¯þüüëoHKJxrÜXNž>cîè±cääæRRZJ¿Gûœ  bÅO?ñØ€þ<Ò»‹¾_ÂÏ¿þ†DbE—Î1úp¶66ˆÅ,]ñR©” V­8zìY99”——Ó·O“ö;88˜L«gî|»ð¿TVVÒ£[7¢ÛF‘™•Åâå+¸xñ/M}ÁÀÎð°P–ýðSž{–Ò²2~üe%Ó^˜bÆÆÚšˆð0¶nÛNVv;u`æÍ899a%±ÂÅÙYÿ›J¥b¸±µºi÷ lllûÄ(œo†ÈÉËcËÛËåôéÝ ±XÌo«gðco[?®öVôowËçu sÀÝÑŠîFá‡ÅðX?Äæfô‰òà‰n­èÛÖÛ(|Kò!ñ '9|ô˜þüÄ ã‰góÖ?puu¡²²’ÊÊüô˯8:Øãîî† ½zöà·Õ¿“pê4ÎŽN¼ðüd/[aÖ¯O¿k_aÊžN; Á£}úàììŒF«a`¿þˆ- »½†eÅ">ÃGŽQTTŒ•ĊУ¼<3é©Û–uKB´zõjÝĉïyÄ)W“ÉÎ6þveiiIç˜.T&¶NÇù^hÔËårÙɺ8U*úÉmu´d-í¦Ðjµ( ƒ yu5æææºöwc]]ñé_2Þ\ìííÿ´`X'_}»€Çô'$8;[ÛÛj~k4´Zb±ñó°J¥B«ÓäS@àAÐ’}ˆ\.G"‘è¥yu:r¹ÜÀß×úåm%ºMѾBow½24ÿWß. ,$„þ}5HóÏæ¥¹IJJjô\AAAóíÜIDxËÔ+¯Óq¾ µ¦ëâlì¦kÉZÚMafff4êñWí7ÐÔ‰îÉܰN¬$ìäß”æw­–¸é8MÍx´dÒðÞ‰DF×Õú‘»ï(›ÃWÔaT†¦âaôÛŸÍ˃Æ|ìØ±ïG×[¶% ð –bKBCBîyÜþ~~·’H„…¹9c:9)–OsúŠÛÅàç§Ÿ#ÔÒ‘J¥ž«ªªj¾¡~ûOSCý‚:Ÿ€€€€€ÀC„Ðñ ÿêkjjj(,*æÉñc9x–‚‚ìíÉ¿~%‹²åm$œ:…D"aøÐ!t‰©-‡¸„“œILdÎÜyô¸)›¹ïÀAòòóIKOgÅâï9“x–u6bgo‡£ƒ¯¿úO}žÚÿÔ„ ¤¥§óÝ÷‹IJJæÅ)ÏsúÌÂêÉxVÉdìÙ·•JErJ sæÎãñáÃyã­³ë-¤¥¥óö{sùcãzýkׯ§¬¼œø“'y÷ßoñÝ¿7¨¯¾}j…‡êöá:x:v¤¬¬Œ´´t”*ãÇŒ¦WϼûþH,-ÉÈÌâë/>cãæ-\º|›[ÛŠ&œ:…N«ÃÚÚŠ‹þËë¯þ“E‹—`aaÁËÓ¦òé_2lÈ&¿8•¡ƒÑ:2’%ËW`eeePžÞž^,Y¾‚ VØÙٔݾ[¨û¯×_'#3Ó œ§Ny^Ÿ—Ö‘‘|³à;F J~þuÜÝÝprr¢´´Œ¯>û„¸ø$ † cØàÁ”WTàããÍ{oÿÛ ¿óߟ«OËÛØwð ^žž ô˜¾Mü5ÊeJÜ­øpm"¶ ¢Yuä³JÉ•V±ôŸ}xé¿Gé•)yåÈj¾Ô«É¸[¢©Ï×ß.`İ¡D„‡óêŒ7øèýy|øÉ'H$\\\˜5s§Ï$6êOêhè—öìÝwǾBàÎh–7þššýS©£¹Þ¾²k÷._I"48ˆ»w› “ž‘J­æƒ÷Þå³çóÛê5<3q"—“’8tøúõ#)9™}0|è}§µZØþþ„[[Z¢–vCÝk€ÇôgÎìYØÛÙQPXx[ýì†ö„„óö¬7Y¼p¿¯[‡høN£F‰‡‡Ÿ|øÝ»u¥{×.ìÞ»»vñÅ'ÜÈ£FŽäñ#øäÃ((,4ª¯†L™ü,1:òýÒeXˆ-¨®®æ“/¾``ÿþ899¡R©Ø·ÿ‹/aÞ»ïðò´õ×ï;pyïÌ¡s§N\NJB«Õ’•CRr2*•ŠœÜ\};˜2ùYÆ~NgTžk7lÀÞÞVkTv3_›®ëêêr[mïq£Ÿ`òÓ“Я/¶¶¶Ì™=‹Ò²R}yÖñüägxù¥©lØ´¥RißkiiúpumÂÕÅ¥Q}u»CGív¯ÓGDÑ)Øv­\ˆðqâÙÿbÆÈ¶ØZ‰)—)ñp´æ™¾¡L]tK s¢]¸˜UJµRCVQEÕFñ·DÒ0ÿ·þÖ!ÕîݯV«éyóÅâvþ¤Ž†÷ÑÝø ;£Y:~­VSëðuºF榬¼…JIvN.vvöäæåëfÃäEˆêÿƒH$ÂÑÁ‘sçÏ3t𠬬¬¸œ”İ!ƒ ®;zü8EÅŸ»»Ñà†a"jµÚ(Ý£ÇsþÂììì@T;fgk‹‡»;#† £m›ÖájiƒNo»H$2²¡NKû‘^½ aËÛˆK8ÙÀLÓuafV{­V«ÃÃÝwwFzü¶ö×G«Ó¡Ó6èð$U¿Œ1‚«©©K¥´Ž4wª¶a}™BwsxÑÃÝŽÚ3aÜXär9;vîÂÌÜ;;[ýpcÃöXTTLtÛ(9sö,ööXYYqêL"nnn¦mI­V‡§§‡É²3¶±r®™¹¹ÞÞ†Êu˜›Õ* 5ÌoÝu:<Ò«ƒ$åjªq›øS”TÖ`-± ÌÛ‘]È/•èaÇàŽ~,Úq™Vöä—Èps°B"6§K˜;"„z;ðÁš3”ÉÙ’I…LÉá‹×âo±>¤šzÃúÖÖÖ¼üˆêšj&?= €AðëªÕ¼ûö¿)’³aãfºuébF±TŠJ¥"/?KKK|¼½øyå¯(•J²sr˜7ÿ#æÌžDbÉcúsàÐa>øø½–v±TŠV«¥´¬ KKKôëÇ¡#G(**B$5ù$; _?Nž:üù!-)aòÓ“Ljioݶ’’$‰Ñ·¿  VÌz{ èo2qcFóÛêßñ÷÷ÃÙÑÉ(ÿõíÈËËgþ'Ÿq%9‰©S¦pöüy|¼½øváBfLŸ@Xh ¥‚÷>øwޚͣ}aÕš5D6Ê­ ûÛü5¤¥§ñÆk¯™¬¯†1í…)$%§àããM›ÈHT*åÔÔÔP£P\æÝ÷?ÀÃÍ‘HDaQÎÎNzE±A0õåÿcñ”–•ñÊô×Xúß…ÖIýò7f4‹/&", OO“aßûàCÞxíµÛ–óŸEÙ ¿’›:âß.\H‡öí¹^P€XlÑè»ÃÍÁН_è®ÿÿ¹þáô‰ò6×%Ì€„/G£Òh››Ñ¿/¯l À„ÞÁ4¤%ù»vsøè1ýù‰ÆÓ>:šï—,ÃÕÕ…ÜÜ<®_/àûeËqt°G«ÓbfffÔÎU*sæ¾oÖ¯O7¸ÂÃÂîØWÜÍ&Ò“r5™ììl£ß---éÓåžÈÄþYêtï…F}}íw¸¥Y­R©°°°0z+kÉZÚq;Íé»±¿®ÜãÓ/¾büØÑ÷TuK«Õ¢Ñhß^¬ÛO¢~Õ½ù›››“”œŒZ­Ñ¿ñß î´>›CÛÛT~ëêA^]¹¹9ÁyþOÑ’}ˆ\.G"‘`~SßZ§Ó!—Ë üý½hçÍá+þN4%ÒÓl;÷E„GÞ2‡aê:Ÿ{ñðÑPÚµ.ÎÆnº–¬¥Ý·Óœ¾û›zû((*ÄÏ×÷î ¼ fff_b±ØÀAz'‚¨‘!ô?ËÖgsh{›Êo]=˜ª;–OKö! ý¡H$2ºî^´óæðÍÖñ Ü ••ôéÝ +«{ÛñÝ- ;I–EKñÿË"=-GÆ>ñă6C@@ …#øŠ¿ŽÐñ thߎí»v±qóý9µZm^©T¢Óéî(n­V‹J¥2º^«Õþ5£oƒN§£¦¦Æà·†ùÐjµFy0eÓ¼ù“—ŸOT›Öw”¶J¥Òç·ªªêŽ®9{‚?¶ï0yN§ÓQ]]c`«N§Óç''7¹\®?§P(Œìù«e­V«¹qãû úfZFo“F£eÛŽÈär”Je“ñ5l­•J­ÿûtb¢>O:ÎdžLaª¬À¸Lî†Yo¿£ÿûÀ¡CÄÆÅ#“ÉÐh4·ì×h þ¿—Ô¯ëÆÒjX¿¦Úö´ÿûÉwÛ/1ó‡8.g—Ñcö–&®¸{d2™ÙY9~\ÿ›)V%“ýå²8{‚©/ÿ_£çU*•Ñ=Ü”xð4ËP¿B¡`ï©L.j9Ÿ‰¥H…ÄÆs‰ É©9<ÛÃ/›æHÚ++ áaaD„‡3õ•2æ‰QÌ›ÿKKRRSùèýy¬Û¸‰‚‚ìíÉ¿~%‹òÚo2ÿý¹8:8ðÆ¬·øô£õó=ÊÎÝ{Ñh4DµŽdø°¡¼üêktlߎ“§Ï0û™lؼ…YoÌÀßÏ7f½Å¼÷ÞÁÑÁ€ââbf¼9›À²só˜9ýU=JqQ1ˆàñÃYùÛj¼½Ñ—õ¢ÅKÈÍËÃL$ÂÂBÌ{sÞfíúõ”•—ò$3_›Î˯N'",œŽ;pîüy$––ddfñÍŸ±}çnN'&âáîÆK/¾H\|‰„C†1lð`Ê+*ðññæ½·ÿÍGŸ}ŽZ­F£Ñbm%aÎ[³õv¬]¿ÁÈþ©/¿¢Owü˜ÑœNLä×U«ñóõãâåËèt:–®ø´´t”*ãÇŒ¦k—.¤¥§³hñ yâñ‘DF„óÙ—_ñŸ/¿`Íú Ñ·Oü÷{‚Hù¹¼šŸýwwwN>¯¿dÉòtéôWþItTÅR)'Œç‘Þ½øøó/@§£¼¢g'ƒ<½ûþú²šÿþ\†?1Æ L1œ‡óÆkÓI<{ŽÄsç˜:åùFˤ[—.œILdÎÜyôèÞ €}’—ŸOZz:+ϙij¬Û°;{;˜:åyzöí_ÛN:uÒ—£©z_ðßÿ"•JQ«5Œ5’M[¶booR©äýwßaíúu•mÖK/¾À;óÞG"‘àâ⬙3ŒÚ¶Q“í¿®½ßORò*(¯RP.SòýÎËt vC¥Öòû±4¬,Í™Ð+˜ 'Ò)—)™Ô'”Ÿ^%ÈÞ¡1þMÆ­Õj™ûá|lllÈÎÎÁÏÏ—ÓgÊá«oP"-ÁÞÞŽìœ^ùÇK¼2ýuvý±…´´tÞ~o.l\o4ÏÊ”_Z»~=É))Ì™;™¯MgàÐáú6péòe4 yyùÌ}çm*+o4é£ZÍòƯV«q³“™_Np€rµ9–b.§^§w„#Žv÷bŸD"A­V“›—Gaacž…\.')9?^zñEªªd¨T*B‚ƒÈÈÌD©T¢Ö¨ n’ˆ°p^žö"“žšÀÙópttà¥_¤S‡$_½JHpA£Ñ Ö¨õ>€V§Cl)æùÉ“‰éØ£7ŸÜÝÝÝxá¹ç8}&‘ VL~æ  §NÇÈáÃxù¥itíҙظ8¢Ú´fÌ£¸péW’’èÃÔ)ÏàçÇ•¤$ÜÝÜxfâDüüôé·ŽŒÀ××—~>J÷n]èѽÚ·çÇ_VÒ§woÆŽ~‚M[¶’——‡““ÿ˜ö"Ñm£ˆnÅË/M£ °Ð |k ¼½¼x~òdŠŠ‹ÉÊΦOïÞ<Ò«¯¼4 ‰D‚-Ï>=‰>½{1é©'yáùçpqqæjê5V®ZÅÈáØ2y2..ÎÔOéûhFÆ®={)//§¨¸˜—§Meäð¡6TÞ¸aÒþúéÖq".ž'É+/M%48„Ê7X½f-}éMhH0›¶nÀ××—W¦Måé§žäXlíÐjm:NDZØXºÄtâÓ¦âåå À±ØX1œ—§¾¨ÿ­îÍÈѱ¶#9|ÉW¯’ý:EÅÅücÚT:u4ž÷R¿¬ò¯_7*“@²²²HIM%"<ì¶eâì섯¯¼4Þ={Õ¦5ÿ˜ú"†UUÄÆÅÑç‘ÞŒu«}Õµ“úåhªÞë½<íENŸI¤OïÞ¼0y2 …‚ä«WêºaZÕÕ5<|„Î11<1r„ɶ}'íÿA Õêpu°â»í—örÀÅ^ºØt®ä”ñGB&2…šÍñ™T+4¬9–FVÑ vžÉ¾£¸óòó)++ã•iSJ eÐ,¿B¡ S˜CÛX³õp2Z K.&gñöh?Æô Ö;Ìûɵ´4||¼¹|% ™LÆ‘cÇØ¿?^ž´ ÄËËG'Gjjj5rÛvìä«ÿ|KÏÝ âJ8uŠï—.»ùͶvèÖÉÉ //OZ·Ž¤ººšQ#GðÝ÷ß³ùmF××… åùgŸ%-#€°°P"ÂÃÈÍËç‰QÔŠ¶mÚŸp’ôŒ :ÇtÂÅÙW²srQ(•9vœÝjßÚ^}å¤R)³Þ~‡³ç/ðê+¯ݶ-ß.\¤@°²²ÂR,ÆÁÞ;[["ÃÃ177£ °^={Ð¥s 666ääåáè耻›^^^¸»¹ãìä„••±ãhÕ*ð›yH<{gggœœœð÷óÃÜÌ WWZGF`ogÇO?¯d˶íÈd2Ò22(*.¦sL'||¼1777Œ70€d2yù×kmñôÄÝÍÝ œT*5i]ºžú°YÙ9´‹ŽÆÎÎkŠŠ‹)¯¨àZZ´‹Ž¾YVhÝ–œœ\D"ZátzF&}û<‚»›övvúßÚ¶‰ÂÙÙYÿ[ýºð'Àߟêêj.^¼„»››>_õ‘Ëåe%“ÉŒÊÄÆÆ[[[.^¾L\|<=»ßjo¦Ê¤¼¢‰D‚¿ŸÎNékS© IDATNøx{ãêâ‚‹³3UUUdçär--ã'NèÛW];©_ަê½.\hH¹yùôêÙƒ€Ú¶iÙijFuÝ0-g¶oÞˆT*å?ß-B.—µí;iÿ÷ ¦ˆ¢S°íZ¹áãijÿ9ÄŒ‘m±µS.SâáhÍ3}C™ºè–æDºp1«”j¥†¬¢ÚÏhEÆsA._IÂÇÛç›>0YPÛ>\œqtrÄÆÆ†ÞŸÇ¶;‰‹çͯ7š‡†~ÉÙÙ ý= µukogÇê5ëøuõïÈd2 ‹îÈG ´ še¨_,£Ö¨Ñ+„ÖŽœ¸RÌ´qøz::”JͶ’POnn³Þž:PkÔÌþ׸¹ºqèÈŠŠŠ‰D.+lHNN—®$±k«áwºb©­VKiY–––^?ù™I|³à;£ëR®^åëßqñâ%^šú'âôçž}z"ß|ûÞÞ^h4ZæÌ~“ó/òö»s ¦C»vŒ3šE‹†§Gmg±uÛ6JJJô£[·m#+'±Øâ޾³ñÖ›ÿâ“ϿĜáC‡Ð£kWöìÛßäµlßɵ´t¤ÅR^}åeòòóùmþÒÒÓøÇÔ©úp*•ŠòŠ jjj¨Q( nÕŠ©SžçíwçÄ‹Ï?×h!ÁAÿÏÞyÇ5uµü VÈF6* îUWݣκºlk—¶vhëªÛjõmík[g‡³îm­{+àÞ Šƒ)K$!ÉïJJH@­bûþ¼ßÏ'Mî¹Ïóœsžsž{ν܇ò7qz;;Ùß²¿_Ÿ^ŒŸ4_ooânàïÏÛCßàêµëxzzP§V-RRR™1k6©éiôïÛW”…J¦ÍœEVVþ~~ è×—1&Y¯W®^`@¿¾Œýr"þ†ß*£Ã‹íÙ{à S¦ŽŒ{xyzVÚV•ѳ[7Þù`}{½dtád®Mš4jÄá£Ç5f,/¶kkV^ßÞ½X±ê7||¼‘;:UiÅ~ÿî‡ Ç^<³fãà`OI‰– c>§  À¨¯+êJKOgÞ pt°G§×aaaÁ–m›|ûQüëö¬XõkW­¨Òþ§EN~1}›ìáH°‡#q ™Ô÷wáø¬ž¬8tƒ{FPP¤f@Ë@äv6lŸÐ‰Ó7²¨åíÄÆ·x§SÎÞÊÂÉΚ+I¹Ôp´5’ÿb»¶ì;pÉÓgPXXˆƒ½½Ùv0Ç ­Z²rõjj…†bmmF£aì—“ Ç#ÂêбË&󒧇*µŠ “§mÕk4’’“°³“ü²O¯—:G ü;°ìӧϤˆ?W7O‹œœlôè‘ØÚ ±áWCŒÌš­•ZEZjµBí¡²'A¥Vãè與‡;m[·¦VhéªÖÕÅ…{¸ººV§6öövøz{ã¢P BDHp–––\¸x ™LFŸ—zÉu–ËIMMCáìLÃèh‚±[ˆn5jàíå…Üɉ£ÇŽóÆk¯¯T*Ù¹k7Þ^^4jЀZ¶@,¶2Ø pvÆÑÑ ‘ˆÛµÅÛË rä¢R© ¢^Ý$6T*~5KW\¹r¹—‘IHpíÛ¶E­Q“••…B¡ S‡H¥ÆÏU„†£pqÁÊÒ’ÑQH¥R‚ƒƒ(Ñ–àVþ½^B*“aiaIP` n5\qrrQése‰E­R!“ÉèÚ©>ÞÞÈd2Tj®..Ô©Uk±˜ À@$ Ê ”4ˆŠ$<<ŒèÈH ”ˆ­Ä„שƒD"Á×Ç{{{ƒmv2 DãáîNVv¶áâ±Eóf;f. ÷ïç¢×뉊¬O½ºu©S»6………XZZR»V-¼<= »S^žžtêð"666ØXÛ——G“Æ ¢~½ºHmmÑh4¤¥ß£S‡ $÷ÁÒÒÓéѵ 2™Œ†ÑÑØÛÙ•Ú#;™ ooÜjÔ #³ôbT,êT±­ÂêÔA.w2j“ÒÿÛòÓ¯Kéß·!ÁAFu­Ø&2™ ¹Ü‰âbÁAA¸»»ãíåõçnƒˆ À@¼<=ÈËËC­VãïïGpp°‘ŸTÕï>ÞÞH¥RÎΨ5jl¬­éЮžž„õµ·—‘® À@223Pk4´nÕŠÐß®éëóPÿ‹ÅÈdRê׫÷ðÉâ) µ±ÂßÍÞðÝK!C&±ÂÛEF³Zn¸8Hpqà­(½X öt¤Ym7Ühî‰DL-o'$bKüj؛ȷ°°ÀÅEAff&áuêP;4”è¨H“v€¿Ú_„ˆà  ,,,¸pñáaa„¡×ë¹}çÎr9Îr9ÞÞÞ¸»»™ÌKNŽŽ88ØcogGÝ𬭭ÿZÕ+ÜÏÍ¥Ad$aau¨W·îCç(gCVVV¥Ç ­ZµJ?pàÀ§®øÊÕËܹsÇdKßÆÆ†F cooêØÿ6>úl“Æ3l‡>.‹~úÐ3ìÍ¡F¿ßËÈà«Ùs˜;ûë§`心9s¿#8(žÝºU»®[·ocggÇÖí;ËèݳçÃOªFòòò¸—‘‰µX̤iÓùyÑòóóy—G~~³¿ù–Ÿ-0y§Eynݾ…È‚©_ͤKçŽ]§ÓgÏòŸ lÛ¸‰Dò¤Uzdže¿ <}6ŠYÓ¦Vêÿç¥ç•«W¯Vz,==½úÞÜW§vuj‡U—øjG¥RѪEó¿ôU*÷ïçðú«¯˜³“Éèôâ‹Oj⿊fMî;V77o&r=!?¿štîÐá™è¬ŠÂÂBNŸ=K~~>“¿œ€H$¢°°½ûöcieeø­*nÞLäÖ;¼ýæëiôÜÜÌ™õÕ3 úðlû]àïó /V-šWéÿç%óTÛŠÿNG±J…ÔÖöá…+9?//‡?·ìž.:]é½ßz½Þ(ÀWüþ¸ç?ÊÂB$66&F h4%hJ4{>øßâ[ñÿ¯caañDƒÄ¢ô^¸@µðo ú€IÐ~Ü þwƒ>€LZýïÅøßE,¶B,¦{Rþ}³§€€€€€€@µ!~ç!ð sÖ뻟›Ë÷ó<öyGŽ{bÝOByý¿,[Ε«×žXæ˜ _š½µô¸¬Y¿ž¤ääÇ:çÖíÛô4˜1_Ndî¼ï¹—‘Qeÿ›ãYØÿO÷ûóÀ·_âãŸNpùî}šŽÞ\-zþ©9äÐÑ£ {8+W¯1üvçî]ê7jòTüWàÙP-_£Ñ°÷ô]’òaä'ØsúÇãïãï[ƒ£çïгžwçêÏ&–pó&¾Þ>,_õ…EEÕ¢C©,¤¤¤ä‘Ëgdf¢ÓëÐWQF£Ñ™™@~~>:Îp¬¤¤¥²¹“Ãß{×p,¿ À¤lùïe,]±ê‘í­ÊÆò?ò¹åõPXTH›¨Õj#ùZ­ö¡²Š‹‹IIME¯¯ªEK/ú Ñëõ¤¥¥•W* íôrß¾øx{¥iróòóMôUÔuþâE<Ü=øjÊdFŽn¢»ªº˜³ß\ùŠzu:Ù6/oE·ß+óÊIHÍ#%[ ”^„û:WY¾D«ã!®k³œC*²ê·5tëÒ™Á^Jý2/?ÿ¡ã¯2Ëó8sˆÀ“Q-÷øÕj5Î2K6ŸºGï#8p)79;&ðR´Eau¨5!&6ŽW‡ â«Ùÿ!.î$ D›-7söŠŠ‹)TÒµK'’’“ÉɹÏ[Cß s÷ž ð2ýz÷¦c÷¬^¾Œ À>ÌÞý¸—‘AÓFª´E§Óñ唩H¥RîÞMÂÛÛ‹K—¯0ïÇùx¸»¡Öh÷ùhæ/^Âýû÷Ñëõ¤¤¤Âþƒ‡øæë™äääðû»Ñjµ„Õ®E×.™9{^^^¤§§ã`oOjZ ¾ŸÇæ­Ûˆ=yºvîDÃèÒºŸˆ#11‘±_N¤i“Æø×ô3±A&“p/#ƒ™³çðíì¯Y½n=øúø°gÿ~ÜÝÜèÔáEDE1qê4l¬­¹žÀ´Iñõñ©´mÏž;oÐÿéG°lÅ*|}}¸zíKæÿÈ¢Ÿ~ææÍDÔ ýz÷¢~½º¼úæ[„‡YŸ~½{pêÌ–¯\…·—7/_F¬Y·ž¸S§°YP£†+o }ƒ¡ÃÞ%:2’›‰‰øøxc+‘sŸ93g0qê4´Z-))©|9n 7o¡õ ­:ì]ºtìHîƒxzzðÙÈøbüÜÝܱ[1ê㑆:îÛ7o2~ÒdT*5Ÿ}\Z/½^oR—æÍþÚé2±_¯gá’ŸŒÊGEÖ7Ñ»|åoœ:s†®. {óM–®\IVV%%Zd2)=»wcä§£hÕ²YYY4nÔˆ  ‡öûüÅK rꆇqõúuÿ¨š­w¹”)kÎâéÈ}¥Š•‡npñNÉY,ü Ã~8L“7d+®§äR¨*aÞ°æ•ý¬çŠœ=wžÄ[·Ø²};¶¶n߹˥˗‘Je•Úü4æ§Oµ¬øU*QÁ.t®cË–ƒ×ÐYYsñÚÆôò¦w«ôzýߺB|\vþ±‹ËW®àÏŽ?þ0[&ñÖ-4%%Lž0ž™Ó§²bÕj† Èå«W9pðíÚ´áêµkìÙ·®;‚>@Ýð|}|ôàØ‰˜*mÙðR[[ÆŽÅ ýX¶r%8œIÆÈÜy?ðêàA̘2±XÌØÑ£hܰ!/^¢nxáaxz¸ô•µbËÍùrÜXD" ‹Å”””P»V-B‚‚ v4m܈€€fL™L÷.]*µ¡Œ2ùe}V&WáìLHP{÷àÂÅKhu:rrr8rìx•mûñ‡# úŠÒÕЛ¯¿Æg#?ÂÞÎŽ /ñãÂEX‰­(**bÆ×³ðññaÆÔɆ °fÝ&ŽǨOFR7<œ[·n1ãëÙŒ5ЙӧòÇî=ÄÄÆQ³¦/ãÇ|N»6­iÛº5cF"ç~¯ ˆ¯†»v­¢^uï{‹õ7¡Öh°°´¤¤¤„fMµQ›Ö­ ⳑûÖíÛfëR™ýfË‹DFzoݾ͜¹s™2qã¾øWWÞxõæÌœ½½=z½žyy¼2h sf~ÅÜyßã¬p~¤~/“£P(Ìú@åè0¢[Q.Ôõs&ÔÓ‰W¾=ÀÈîáÈ$br•jj8Ú2¤uo}k+K"j:sñNEj-w2 Èx`ºCù¬çŠDÖ¯‡¿Ÿ=»u#0 €ïç/`âøq¼ûö›mø{sˆ@õP-_«Õ"²° c#_†¶ræÊåD†¶ñ ,ÀKKKôzÉÓþO›Ä[·±‘ØP+4”Þ/½D›å°ì_=666«€Ò+j K D">ÞÞlݾƒÞ{¹“{àÃÞ7ÒñãÂ…4ˆŠâ‹QŸêó×ñ…µµAÏ_¿Ùp?÷PºÍåäähtܲT¦Xl…þO}zŽ‘#†WÚ~–èõzºvîÄ£>ã÷?vñóÒåFeôú¿¶òª²A$Q¢1¾Ñµs'~?~^º‰ M7â˱cؾi£a 0Û¶õÙna••%Ÿú ˜ÇŽÍÍ–°²²4Ú,ûÑbU1:Ž¥‰DR®m,teegÓgÀ DEñB«–f·8--Jϱ•HøöëY¼Ü¯/Óf~Maá_»V"Df¶kõˆ-­ª¬KEû­Ì”¯¨·¬=‹ñÖ•öÏ:‰­ÄÜï@•þ#`žø”\‚=éÖЗøÔDºðŸ¡Mˆ¹‘.Ñ>œJÈÀß͹ ïu®Ã¼—ÈxPLÝן’ËÄßNq7³€ù;¯˜ÈÖsHU”ùêöçŸt¨ªe«¿~½úܺˆ»» ë¸à€T*¥X]„N§§¨¨+«j{…ß}ÿ;väÅvmÒ›oÝúóªxQ‘‘,]¾‚WB&•2qÊ4ŠŠ‹2pM5"!á.  Ds{Ã]ÎÆ÷ëÜÜÜØ²};ÛwîÄJl…§‡;K—¯@£Ñp7)‰‰S§1vôhll¬iÖ´ [wüÎäé3(,,ÄÁÞž~}{óý øc÷n´ZcGÆ‹WZ'777Î]¸@JZVâªÛoùÊU$%'#‰ 4:àïϨ1cy±][³6”áêâBQqÓfÎ"++ ??–¯\Ť$rssiݪM7fûÎL™>‘HD¿>½© €—§§Ù¶ ð÷gÂä)|òá‡&v{{yñöÐ7ûå$<==¨S«Ú·3[Ǟݻ1õ«™øz{ŸpOOO>ÿìS¾ùnVV–¼Ü·‘õê²eûv³ç‹­¬ fËöíܹ›Dƒ¨ÈJÛ3--Ÿ–.ÅÖÖ–š¾>X[[×—»ÐsrtänR—®\1©K¯ž=*µßÛÛ´îM7bþ¢Å½þ¼õÆëLž6ƒ€Þ|ýµJm^ºb%†7_ ¿ší÷ò¾W•ÿ˜'Ôˉ©ƒ¾Ð% €0_9÷ˆ0)ÿÃ;-˜ûV3Ä–Œï_ê{¿~Ô€‰Lo­<ë9dÇÎ?8xøˆáû'0ü¿ÌW§~5“.®ˆD"ÔÑC­auxeð 'šCªѪU«ô|ꂯ\½Ì;wL®mllhÔ°1öööO]磢R©°±±A©T"•J‰D[Vaa!Ré_*–ÉÔh4XYY™\U«Õj“ ñXúŠŠ[Y!‹ZöiÔO§Ó¡R©°µµ5²ÁÒÒ›rõxÒz™Ó«Õê?dr*ûSÑ'jÓ }X•J…ÝC˪ÕjÄb1"‘¨Êº˜³¿byszµZ-z½Þì´R©¤Yë¶,ûy µCCÿvÛ< ÿxú<Ë9äa”=„jYn7­"ÿÔòJ%66OÔ/OÞ>Ïryâ‡ÿÔ"P9»úþŸ!¶¶æ½ao£P(þiSþ…Tïvg޵XÌ»o¿õO›! ð/EXñ ö#G1}Ö×O¬O©TòÇî=O,§2Š‹‹™ýíÜüÂÂ"Þÿð£‡|LæÌýŽÄ[· ßËûÉã2öˉ\*vUå'møwð˾ëL[{u‰Ž†Ÿnª=ÿĢєٸ)ç/\|b½å¹—‘Qé|ù°¹´*Æ~9‘ììì'1Í„»w“ª“O;¦TÕø5š´ÚÊ?%%š‡ y ÜËÈ ¨¨ˆE?ýl’ûùi¡Ñh+g¹R©DOÕÙ µZ­! ŒJ¥6ÉÃ^Y]ÔjÓ²æô<ê@ÒéôÜLLD©T¢V«Ɇ24YÝ3¾žÍÖí;ª”¥9ÃÍÚô§Ìò+ÓU†Z­6é£Êä?*æú]©TVê å“™¨Tj³e*Êz˜Ÿ”Ç\}Ç/žñ)¸r÷>ÿÝv oEÕo?ÔéõÉW³ÿñã'hØÀ|NñŠ9ã“’“ÉɹÏ[Cß s÷ž ð2ýz÷¦c÷¬^¾Ìš÷àáÃìÝ€{4mÔ¨J[ª+—ö®={¸tåŠI.íÍ[·{ò¤I>õ±qœ>s¦Ê¼ìå_Õš˜x‹ï~ø‘¸S§xØ0¬­ÅF6Ø;ØsëÖmFú ~ò)­_hŹó°µµåÞ½ >ùh„!·ö‰Ø8Ž=Æå+WYˆh׺‰|g¹œ‹—àïW;;;>þI[:r„…K~bÂØ1ü¶f­‘.Þÿð#‚ЯSf|Ed½ºÄ:ÍèO>F*•>T~yÌõÑÉÓ§ú½nݾûþjתÅÅ˗ο—‘Á»Ã?¤nD81q'iܰiéé¼Ð²%C0ñ½V-Z˜øÉæ~GpP=ºueøÈOøjêdƒ|½^o’ËüÌÙsFùÎËú^ úÉUªqq”0eÍd6V„Õ”³òÐ .ÞÉ!9«€…´b؇iâ†LbÅõ”\ U%ÌÖü¡²ŸõREÅEŒ;ŽæÍšâéáÁºõ±³·ÃÑÁ·Þxf­ÛÒ¹cjתÅ7ßý—.;’ûàžžŒÿâs&Nf2f…K—¯ð˲eØÛÛ£V«™4a<ÓgÎB«Õ’’’Ê—ãÆ“Ãò•«ðöò6‹e(•J†¼ñ&Ñ‘‘ÜLLÄÇÇ[‰„ìœûÌ™9ƒ5ëÖwê" jÔpåÃÞgêW3±‹)*V!“I¹—‘ÁÌÙsøvö׬^·žŒŒ ƒü²1Y¾Ž2™Œ)Ógàââ‚‹³3ï½3ì‘ê\]TËŠ_­V®Í}žtµõ¨ÄsÖ¤³³²™¿h K—,ÆÁÞÞ¬.fMŸ†§§5kúò帱ôîÙƒs.¤d+i^ÛOgC¾ÙÏ}êãêhË¥G©5¯µ áÍy‡X°ó*çm;úYÏ!•ñÃü…´nÕŠžÝº±eÛvztïFŸ^/§7^}…¾½^àõW‡0ìÍ¡¬ß¸‰ÛwîT:?<Œ5ë×3rÄp&‡·—çÎgò„ñ|9v þþìÚ³—-Û¶3fÔ(F}2ÒìX,£fM_ÆùœÖ/´¢]›ÖŒ=ЬìlRSÓ˜ñõlFŽÎô)“X¿i3¿ÿ± KKK¾7–wß~Ó ã¯4ïÆ»/©ii&uÌÍÍ%)9…wßzëúPM+þ’Mi£T²%ò,¶;îçæ’šžÆ—S¦œ’R®£þ*W¬*6$°´´D¯×caa££#ûö`äðذy3GŽgäˆáF:6oÝÆ¥+Wðpw7™©ð=;'k±qŠâbΊÒT¿¶ ié÷°¶ù«LYÚL©Ô½^Ïæ­Û8zü8ÁAAfô•#F§ÓñÁ»ïòÛÚµ zí ^2˜N^,gÚ_çš³Á¶0cƒH$¢¦¯k×oà¥ݱ·³#33“#GU¿¾‘‘³[eeò‹ŠŠ¹|õ*)©©´jÙ¤œV§ÃÙÁžÌ¬,ŠŠŠªÔe$_*%¿  Rùæ\U¯7ß>û½°°;»‡'´‘J¥èõ¥IwtzYß3ç'`~+_¯‡û÷s mP¿^=BC‚éÔ¡{öïgÚÌYtîØÁ¸ïª¬¼b¤6VtŽö¡s´K÷Çî+§S”s6§†£-)ÙJ¼2¬,D4 q¥c¤­Ã=é;k³_oÂÖ¸;¼Þ6„]g“éß"ÀHþ³žC*C&“QXTz¡¨¨˜S§O#‘HÌŽ×2Ê’LV6f«Ú>×êZ6^l%îçæòéçcËHIMA.w¢°°±õ£g‹Å†±oeeI±ªô–œ­­-–––ØÉdäæ>0iw‘H„Nk¾ÌÍKŒþô¦Íœ…ŒIãÇ=•숗j üQ‘Ñ$Þ*Í^NO‰¶úWü“¦Nçå¾}Ø¿_N™J!&°± IDATâ­[2wÞ<¢"#ùuÙr^< CÎøW Cûv,_¹Šñc¾ #+“õ6ѸaC#™YYh4RRS±¶¶ÆÓÃ_—-G­Vs7)‰‰S§1vôhll¬y±][ö8h”Kû•Áùfîñðp¤\Ú™YYèt:rîßh&«-Û¶‘IÐð÷÷3äe7gCU˜³¡÷K=ùtôü¾eVVVxyy’”œŒT*5ÙÆëܱ¿,[³Ü‰ÍL·7ûöîÅ÷óçŒ[ 7“ã5j¸òÑðxóÝ÷÷ùè*u™Ãœ|OwæÎ›ÇôÉ“qp°ÇF"1øÉ«C†˜´ÏÊÕkŒú½_Ÿ^ŒŸ4…:µkŸpã¡6”àïoâ{Í›65ñ“z|?W¯]'99ÅÈæÉ&pàÐ!222‰DØØØ°eÛ6î$%![=³Ý5pqðŸ¡M ß_k@«0£r ƒ]ˆÝ V‡ØÒ‚¶uKçʺ—®R+}à™Ï!;vþÁÁÃG ßG¼ÿ.ï¾ý6o&##“—ztcõÚõøøx#wtªR@€¿ŸÉ˜urtänRÛwìäÐÑ£Få?üà=Ã\Ú¿ofÌšƒƒ=%%ZºwíÂO¿þŠŒâ?Ÿ›)‹“ñõö&>ájÆä™¦wÞZ…}þ|þ٧̘5++KºvîÄ ý?i ã'MÆÒÂkk1®..( •L›9‹¬¬,üýü óÿàLêxæÜ9~ÿãÄb+ ÿñT×¢U«VéøÔoݶ…£ÇŽ˜¬îìííygØ{f'õg^¯'¿ {{îedàêâòHé_+#++…ÂÙБe2 ‹Š°±¶6¹ª+((x¤|î•êËÎÆVb‹LVu*Y½^OfV. ÅÕïïÚ R©Ðét&é8•Çi§¿£«¢ü¼ü|ìí ßËû‰9*öûãÚü¸öQTT„³³³Y› ÉdˆD"Ãε5ö•Ø/ð¿Ë³šC­V˃y8;ËùœŠc¶@©Djkkv®*P*ÍÎ¥edeeãâòW&JµZZ­~jcÑ`GAÖÖÖ† ¦’’òòòŒÆdù˜R±ŽÊÂBtZí3“W¯^­ôXzzzõ~gÏÿðÊ^ç!ð _x„åã:W‡zJ¨–­þŒÌ $‰QbžÌ\%ãŠÁÉÙ‘;i¹4­ã^ªMX³~=ñ ¨5,^Âýû¹‰yêùÌËdª5öìÛWi¹»w“ ïq~4 7nÞ|b9ÿv´Zí#Õ3>!Ÿ—.cíú †”¤Ï’<•~øßå\b6‡/§ ÕéY´«ò©üâøeÙr¶íøýññ§5w ü³TKà/..æÔõ4>[Ç´§¸‘’Ã7.âçïA|Ê‚lïñv·Ê3'=-îedðë²|úù˜ÒÜËj5ó-æ~î}ŽÇÄr3ñÉù¼ìe25j5»÷î7[^©Trûî“wR—çQsi«ÕjnÜL4«˜K[§Ó™MˆSñÝÕãQÞ÷n.'·^¯¯òÜ_ÏfëöÕ¥ÕéLêi.‰È¬9ßФq#ÜÝÝ(*.®Tï£Ôçïäê¾—‘aÔ¯Â{òŸ?ֽɂ¥ÁþÛ-Ùy:©Êò:}e©rÌ3kÎ74oÖ”üüü*}üQ¡—;_¥zxªtss—àãÿ›T[ZÞÛiЉ%ÔñaäüüÜÙ&gËbZ…9?\ÈS îä)^<»II\½~½Òr{÷ï§S÷žô8ˆœû÷™0y ËV® [¯>¬Y·ž’’š¾ÐšØ“' çmݱƒ†Í[Ò°yKŽ?ñP{–®XI³ÖmùxÔç@i;M›9‹vº°|ÕoÌ™û} ¢é m3a"-Ú´¥C×îääÜgëŽD7mN£­8vüJ%»÷îeÎÜï=v<ÍZ·eâÔi$ܸÁ í;ФUkŽŸˆ1ذzí:vïÝK½†™5ç³6Ù¼| ›·dü¤É”””ðÁÈÙð :Žþƒ_A©T’——G—ž½hؼ%»÷î 33‹Þ/¤m§Î$ܸɾû/×ãKw^F|ü)KW¬dͺõL˜<…Ys¾1««ŒÒ ©½ÜËȠπA4kÝ–mÛsçî]C™u6rê̾ò#>þ”´´4ºõêÃÃÞ¡ïÀÁdff0iê4¢›6çaï˜í#¥RIϾýiÔ¢Ýz÷å†Ó¼M;æÎû€üü|†}0œ¾v!–®XIã–/ðòW+m7çƒ\¥k±·3ò¹›U@Ív(‹KxñËô›U:6ÌÞGÓÑ[ÈÊ+&ú“Œ\rü‘d÷4„SgÎÐoà`fýçÒÒÒöþpÚuêB߃ ‹…IS§Ñ°yKfó­Y9÷22èÙ·?MZµæµ·†ñÎÃiÓ± 7Jý¹â|¦sW^^¯}ËhÌ üïPm¿i-Êœlb®eЫ]]b¯¤ã!Qòv— D"‹JSB>MbãNÒºU+^êÞ½Ò¼Ïyùù¬Û°‰yß~Ãg#GòŸ¹ß1ìÍ¡œ¿pëññ¨T*.\¼Ä¹óÉdÔ‹ˆ0œÛ0*š-ë×2mÒDV¯[_¥-IÉÉÄ<ÉÁÝ0~LéàYò˯XYZ²xþœ;žýðÑðؾiñ ñìܶwww>Lèh6¬^Å’?ôéþ\Ñ{yy°}ão¡ÑhX·a##?Á†Õ« ð7ØÑ­Kgꆇ³}Ó†½5´RÊl>˪¥¿píúuö8ÈG¼ÏôY³ùrÊT½Ü™LÆ/Ë–3âý÷XöÓÖ¬ß@~Aƒ^{Þ}‡ÕË–àï÷ç΃þO›utëÜ™–Í›óÞ°·öÖP³ºÊSVO{{;¶oÜ@û6mØµç¯ §[×.DÖ«ÇÞ;èÙ½:½ž¤äd^îÛ‡W¢ÿW¸qó&×âãY·j%cGª´¯œÙ½cÛ·£}»¶ܳ‹SgΗŸO߃éÚ©ŸÉ+o¼Éù ˆ;y’=¿oç×%‹*m7燦µÜöú5ð¥f {}¶‰Y¯5ÆÕQBznv¶bvNìL‹/¶Ò0È•”,å#É]øÃ<"ëÕcÃêÒE‰N¯G­Q³dÁ¼:x —üdðñõ¿­¢Cûö•ÊrvvfçÖÍÄÇÇÓ¾][†¿÷.“§O7;š›»~Y¶œÈúõXµôÖ¬ßðä&ðL©–À¯Ñhpr°elÿPlгÙyì: ~óÏ´ã#GŒ`î¼ïY»aC•>îáîŽB¡ÀÕÅO²²³ÍÎ‡ææ®»IɨÔj9JÓÆ«§Aªj üŽŽŽ*ñ¨¡`ÔËõùöµ`¶¯…Lf‡••…E…•¦X|Z¬üm5íÛ´aöWÓ™ýÕtœådçäz='OF§Ósöüyþؽ‡E?ýLýºuˆŽ¬OL\6 ¬Nο@ㆠtÄ:E×N°·³C¯×ceeÅÉS§¹s7‰ÔÔ4Ž?ŽFSºÍÛæ…VÄž<ɥ˗9uú M5äÓÑ_°ÿà!¶ïüƒao¾QeâN¢u«VDÖ«göÞ}yÎ_¼@»¶mˆ ãz|¼Éñ­ÛwpéÊ•*mhÕ¢ù´hÖ”ºáá(œ9vŒ»v1røü¼taaèt::wì@XíÚøÕôÅÓÃ%?ÿÊõøx´Z-NŽŽœ;ž˜¸8RRJsÊ{{yqòÔi.]¹bV×Ó 3+›Í[·áá“#Z­–Aú“—ŸZ­fϾýFŸü*îçûûùÆ ±è§ŸQ©Õôíý±'O{ò$—¯\­´Ýþÿãâ á?C›¾¿Ö6„VaìœØ™iC2¦o}»2®_$R+bg÷bLŸHÚÖõdýç/âïfÏGÝÃq”YÓ¿EÀ#éÌËË'//ŸÍ[·]¿>—¯\A«ÕÒ¾mvîÚmâãç/\¬Rž¿ŸŸÉ|hnîŠ ãô™3´hÖ”°Úµÿ~£ ü#XöéÓgRD¹íë§_MNžŽåÒ•‹$Þ¾Irj7oÝ >á:‰·ñóõÇÓÃó©ê¬HÂÍ›´yáœå¥9¢ÎÎ8ØÙIRr2]:uâæ­D\]\èÑ­×ãã±wp``ÿ~XYY¡P(¨éëKP` ÎÎÎøûùh<üýù}×nœår"ëÕ£Y“ÆÄ߸»›ÎÎrÒÒÒ‰¬_ ¬¬¬ áБ£øÕ¬IíÐPÚ·k‹·7wïÞeàËýñ÷óÀÇÛ©´4WvhH0 Âϯ&M7æØñ<ÈË£iãÆb-¶&(0_oo\ Dˆ ")9™ý¡P8Ó¿Oƒ<?âpws£U‹æfm‹ÅÔ åàá#äHZZo}ƒF œœB­ÐPêÔ®Åí;w8}ö,R©”Z¡!tíÔ‘¤ä$oÝ&80ÐÐŽŸˆ!;;‡QQ„‡…Q·nyyP8+ðññ6ÑeÈ[-aiaY®¾ˆáV£Þ^^F}ŒpwwgÕš5XYYbkkË„1_`+±eϾ}œ¿x‘ŽíÛȾ¸ÿ¾áS+$;;;‚p«áŠ““ˆ VH];w¢@Y€µµ Æ|Ž££#¡¡!œˆ‰E«ÕY¯A•×E@ b«Ç_{…†#‹©ÁÆÍ›Iϸ‡¥¥%ƒ¼ŒN¯çð‘£äææ2ê“‘Ôpu5òq±XLP`€a!†““#NNNÔ‹ˆ :2Òh>”H$&sWÇÛ#“Ê8wþ¶¶¶„UCëü]²²²*=VPP€hÕªUúV‹rs5YXX`a!¼0P zQ*•4kÝ–µ+—òO›# ðÔQ*•Œ›4™¹³¿þ§Mø—qõjåFšžž^=/ð)ÃʪZÅ <&Bdø‰L&ãüÉØÚ jC&“ «}¿…°ç. ð!~ç!ð ÏTËVvN6Öb1:¶Òϳ`ç®]xyz"‰7i.^2[îäéÓŒ3î‰õóæ»ï‘””ôIJÊÐjuLœ:¤ä䇖1k¶áÿûx¤sÌ¡Ñhxó÷¸ÿ>õëÕãÐá#hÔjÖ¬ß@RR?.\Äž}ûÿ–슜<}ú©É*cïþý>U™ÏeýûßçsìD gç*ËOŸù55\]Y°x ·oßa÷Þ§Ûå)ïÛÿf~ÙwikÏ .ÑÑðÓMÕªoÍú =q¢ZÆüï´{ù¹wÆ×_ã,—?ÔŸg,ûôé3)""â© ‹%"<½^^¯3ù¤¦¥âëSý+þÝ{÷ñÙÇ#©W7‚¨ú‘,]±‚íÛqîÂÖoÜDRIM__.ù‰˜Ø8Š‹‹‰£°°Õk×#ÐJ´Z¶lÛΩÓgÈÎÎ&æäI:Ìå+WINIaëöXZXàííØÊŠºüþÇ.NÄÄr<&–Ð`$‰‰^‘HÀ­Ûw¸{7 w77.^ºLfV5\]9uæ Ú’V¯[‡µµ5±§Ná¢P P(8wáë6läÎݻԮU‹5ëÖ³í÷ßÉ/( 88ˆó.réò;†RY@pPyyy•ÖëA^5}}ظy uj×â·ß¢¦¯íÛ¶ÁÆÆ"rä±zÝzRRSqppÀ×ÇÇÐÞ 7n°iËVî&%Q+4”Í[·Q+4€}ûàåéÉ­Û·Ê,X¼„sç/p7)‰ˆð0.]¹bT¯ÂÂB6lÞ¾ýH¿w„7ÙwàØ–[Ñ«T*V¬úÝûöséòeºuéÌÞؽw)©©Ô®U •JÅÊßVs<&gg9vvv,þù®'$pêô4 ›¶lE§Óáíí…V«eÇÎ?8sK äÎÎ,þùnݹÃþƒ‡pw«“££ÁFÃÚ Ù»o?–––(Y·a#1±qx¸»ceeŦ­Û8pè0.^$0 ‰Db8Åo«Ùwàié醺¯ß´™˜ØXükúaeee$ßE¡`ÛŽßÙwà …3Îr9Ù99¬Z½†ÓgÏRÃÕ•’’6mÙʱã'pwsÃÑÁÁ ¯¢|©­-J–¯\…³³œZ!!õWë6läxL,îîn„†S¯n±'OÑ¡};“vv–ÿµë”“cdÏ©ÓgÈÏÏÇÝÍ»w“¸xù 2™Ì¨ÌÎ?vù¶«+¶Iù6xÚ¬=šÈÔ<ú4óçÛ-y T3 e`¥åuz=ˆDˆQþ•k×X½v=É))dggãçë‹·ë6n4GVV¦›¹fç®ÝhÔJ´%†9çÁƒœ:s_£2òòøé×¥äP¬RáV£†‰¿‰áðÑcìÙ»Ÿ¢¢B~ß¹‹kׯŒX,6±áDL,R[[¤R)¿ïÚE€¿?7|¬*ÿ1j‹«×ذy3gÏŸ£víÚØÚÚ"“Êøc÷¼¼½9vü±q'éÙ·?®..tíÔGGù /áö;´kÓš_—®Ì.^‚\.§sÇX‹Å,\¼„„7èÔ¡ô{ù&òÅÄ`go‡««+ ¢¢ðôô0é¯2Ú·mƒ«‹ íÛ¶aþ¢ÅÜÏÍ5«ØÎFýTÁžZ!!ü¼t)Z­–O¿ƒ^¯3)SÑ·»+´Iu’«Tãâ(aÊš3ˆDVSÎÊC7øbYC¾ÙRUÂàoö3oûe~Þ{1ËâøpѱG’’šÊ‚ÅKп/*•Š#Gq,&†kñׯ‘¹€{ãæM,^B§Éd( ~^º€ßwíF¯×™”ñ«ékh÷°:µÍúÛñ˜X<=<èß·7?.\Ä€—û±gÿvîÚm¶ÇbbÈÊÎ`ÇÎ?ÈÈÌ4ñ±ªü§Œü‚æ/ZL×ÎèÚ©3ü¸pQ©ÿº¸Ð§×Kxzz°`ñ:´ooâ¿Ï;ÕøÕj5Z­¶ÒOIIIu¨­’ÂÂB$bOž"&.ޝ¼F›¤ß»‡\.G,ããíMZz:¹0nâ$ÿü gÏ@¡p¦v­PÜj¸âè耫‹ îî¸"wrB"±1Òçä䄯¯¾>>™Õ[†ƒƒJ¥á¨@Y€²°½ÊÐÓÃ/4 ‰·ïG¿ACXüó/¤ß»‡‡»;6 >ÞÞ†«}Od2Îr9‰·ï<¤^5Œì)œï {›Íšq"6{;;¤R)r¹¹““ágg9óçý—‹³yë6Z4kÆñ1lݾƒÐ³eär9r¹ÜÐöëàè耇»; …WW<=< ö•qãf"4ÀÎΩ´t' ##“A¯¾Îá#G¹w/ƒ›‰·7qƒ_ƒ+W®ÎõôpÇÝÝ…³3. …¡/¯ÅÇÓ¾m|}}hÍ›‰øÕôÅ×Ç¥Riø¯ÅÇÓ¢YSÃ6£²PÉ»Ã?äÝF T* ~áîîFíÚµ(**2ªÃÚuèúRo9ʵøëddfÒ¢YS<==°´´4‘3ñ¿._Á€W^3ÔçÕ!ƒY°h1}:Šb•ŠW‡ &>áCßy—b•Ê +99ÙD>€­D‚µXŒƒ½=¾>>&ýU†\.ÇÚÆ3÷–+kç2ûÊÛãåå‰J¥æÒå+ܹs‡Æ š”©èÛÛÛ¤ºéåCJ¶’æµÝñt–1ä›ý|ѧ>®Ž¶ÞÞ( \ ü)¬àÛ•¡pv6ñ±ªü§ŒäädüññöÆÓÓ‹?wOm%¬­­quqÁ×LJ¦›ÐoÐ`ÿ}Þ©–‡ûJJ4èôz³Çu:]u¨5A¥Rq3ñ*U1[·ï s‡DÖ­KËæÍørìXTjŽœ¿p‘ÜÜ\âpU¸`ooÏÔ‰«]ç©íN˜Ó[žºá¼7â#Z4oFnn.~ò)/´liV–»›-›7ãóÏ>ÅÆÚÆ0Áéõ:âð«izÅÝÍí‘ëÕ£k¾þf.………xyzqùêU£‡HNI!#3“®®( ‘ËøuÉ">üä3rrrˆãÇE‹INNfæô©fËHllHNI!áÆ \.&õ**.~¤ö­éëñ14lM~~>iéé|1~¿,^Èï;wàëãÃÜ9_U¿>yùù•Ìþƒ‡¨W7‚3gÏòú+Cª¶ÁLJÃGѼiJ´Z–¯\ÅÛCß IãFLš6½ÊsÓÒÓɹŸÃûö0ï‡ù†þ:|ôQ‘õQ8;›È÷õñaø{ïÒ³[7TêÒ€¦ÕêøuÉ"¾ùn›¶l¥WÏžÌûö?ìÙ»M[¶2rÄp³ò+b®¿œË—+7¼-,,ÈÏÏçnRÞ^^•¶³V«3±§IãFÌ÷=ï {kkk³eÊûöãöcÅ6éÑ­+×®ÇÓ¥SLJžû8då#µ±¢s´£}Xº?žp_9¢|˜³é<5mIÉVâ¥ae!¢Qˆ+#}hîIßY{˜ýz¶ÆÝáõ¶!ì:›LÿFò££"ÙþûN222¸Wná#¿š5žï‘IeXXˆèõRÜj¸òñ¨Ï9º/M7bƬ¯±°°ÀÚÚšÌÌL“2z½Žëñ ÈåNfý­*²srxðàá{ W×?íLE&“‘——R©4ñ±Šý«×ë¹uû¶‘l¹\ÎÕk×IJNÆd·! IDATÖÖ‰ QÒë¥tëÒ‰ÑcÇSTTdt{ðy¦Zîñ+•JŠUEØJ%”h5FµFMzz:!ÁÕ¿åþý\nÜ ý^6¤Ã‹íqv–ãéáÉŽ?þ %5_BC‚qv–“xë ¢£èÛ»§NŸáüÅ‹8:8àé鉥…%A ýõÀ­†+NNN ‚Ь,-i½ÝŸåÁN&#""ÜD¯½½½ÁVo/òòóy©Gw‚ƒ‚P*•ôêÑ©Ô DGý¹š•ÒªEs|¼}Ø»?×®_'Àß{{{üý9}æ µBB‹­ñòòÄÎÎVu½ÊáââBƒè(®'$pãf"õëÕcèk¯þi§7­Z´ %%‰w÷Ò•GqQ1»öìåäéÓtíÔ‰ð°0,--¹téVb1o½þºÙ2žÜMJ"#3“Èzõðñö6ª—ƒ½=ÖbkCÛG„‡áä䈓“u# 6GÕ¯Ïñ˜XNž:Mpp0Íš4!<,Œ±qøùV‡î]»DZ1””h ÆÊÒ’ÑQHm¥¸Õ¨QzÑôg_FÕ¯Oü®\½JçŽ ù³DG!•J±“ÉheXaEÖ¯OLl,ÇŽŸ@&•ѬibOž$%5•&h¨‹n5jàíå”î¤ä>Èåð‘cøûÑ :Š×âÔ™Ó\º|… €š6ib$¿{×Τ§ßãØ‰h4B‚ƒ8á»öîÃÇÛ‹þ}úp#»v£R«ôòËHÿ¼ dkkK¯ÝäKþ\ÝI¥RBC‚‘Ie&ýU‘ÐÒ{¹M7F¥*æÚõë¼ñê«Ä|øYoø‹EŸ³vÝw(Žú¸wô}´‹h×ÌœâB2qêtFÝsI‰‰ç:qž:’ŸÏ¼÷?`â£Îu(/½ú cFüÍuÉÏgÈ7±ê›¯=.Û‰?¿={¼_"(**jSý× ÊuC†¶VõâOÀn·SUU%I_´hÍÚuôº¤ç¹ãOá_oýG 8VTÄ”Çû]u­Y»Ža7\/I¿ jµ#~!\.«U~HG´¨ÆlÆ×××}ƒ–h™¢(î¯ÿ5f3>ƒûÆNqá8gGüB¨ÕjIúâ´ê¿~*ÎÌÙHú ë½-“‡ô!„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6D¿BцHâB!ÚIüB!D"‰_!„hC$ñ !„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6D¿BцHâB!ÚIüB!D"‰_!„hC´­UqiY)¥¥ÇQÅã}½^O\\<:­®µšB!D3Z%ñïØ¹½NOB|"*•ÊcšÕjaÛ¶ŸèÞ­Gk4-Î2»ÝŽN'Ò„âB¡6lØŒœœœ³Zé÷߯%§c'ô:=*•ÊãO«ÕQT\LûèögµMoþï¿ï°qófvïÞƒÃá$:*ªUÛs:lýñ'LÁ¦³–,].Ÿ/ZLDx¾¾¾g<ßî=?£Ñh~Õ< ÉÏç³E‹Y·~=•ÄÄÄp¬¨NwÞøvå*"#Û÷qžöÈåóE‹)¯¨ )1Ák§ÓÉò+X³v* €Õß}GrRÒªò pØíÆsÊyaÿ\/YŠ^¯'<,ì\‡sΔ––6;­ºººu®ñ—–•¢Ójp:ÍüÙ[£Ù&V¬ZÍe—ö£s§Ž,^º”O>ýÌ=Íáp¸_·î{FŽù_yNg“Ë Ùívìöºå¨®®®›ÇåbóÖ­˜ÍfEÁjµzÌ×°Ý3átº˜>k6‡Žv·Ó0††1N˜8ÙýúÛ•+9tä0åå8Î3^.€ƒyy<ñÔÓ¤§¥2tð`´Z-j•Šü‚Ìf3O=û_,þÒë¼.—ë´ËÔ°Ìwë¾oRWãå°X,î×V«Ík½‡ƒ“'OòÍ·ßR{j4®Ëétz¬ú÷ê·esu7Öx»ÖSÅ#V—Ëå®»žÍfóºžE¡¶Ö⯢(}¦qýдO¹\®&믥íÒpYæÌK¯ž=ÉÊìàµn¨ë[oüë-z÷º„ʪT×Ô°lù ÷ô–ú˜·ØZ*s¦cÓÛxlXßååÅ;yø­õì:RÁ%~vš9~½†ý)¿ €Ò²2¯ãÈ›_;>îSê5îN§Ó½Ï³Zm§Ý¾g—·qêMã}윹séÓë¢ÚµóZ¯¨Ó*§ú­V+‡£Éiþz6Û™í\/i©©¤§¥1ò¾û¹ñú¡LŸ5ƒ^ÏÞýû™=c:.XÀÏ{÷2iÚt¦<þïΟÜ܃Øìvn¾ñ:wêÈ#F’žšFzzŸ}±ˆn]º{ð ±±1øúøPV^ÁÌ©“yã_ÿ¦G÷nŒºï~r²²8^ZÊð[n¦oŸÞMÚ‹`ÛŽ¬Z½†±ÜÏ«¯¿V«ę‘<ýìs\Ýu¼ýÎ{ ƒgžœÍôY³ñõõ¥¸¸„ñcä“O?cËÖ­Lš6¿ëž'..–=?ÿÌ¿_7ßú¿f—«K—ÎÜ|ã ,Xø)÷ŽAnÝ(9~œŒô4Nœ8Éú ?°oÿ¾[»Ž]»w£R«2hµµµLž>ƒÁ@HHÇCãaÖŒi2~ÂcL<‘YO=íQæÃ ¨¨¬dÃÆLyü1æÌý»Çr Æ<ðs²Ù°q÷èα¢".íÛ—Û‡ÿŽ­7oÝÊ»óæÓ>†»v0}ÖlœN'……G™6y"eeå|ôñ'øøÈÈ»ï¢Wÿ t G#<< “ÉDyysç<ÅÎ]»ùÏ;ï€ÍfcÂø‡éå@ HeUÑÑQLø¸;†mÛwðÿ}‡vátéÜ__–|µ §ÓIV‡ ®t cxˆ.:²qóÿ0ýúöqÏ?eÆL z=y‡óü³sX¼ä+6oÝJDx£GŒàè±cõ‡‡…ñÆ¿þMbB<þþþŒ}à~>ûb?lÚ„Á`àÚk®¦°ð(߬XAd»v\}Õ•ôèÖ €ššzõà±,ƒ¯¹†ÃGŽðÑ'ŸÐ¥S'–¯XAd»H´:-çŽsÑ—K©­­å÷æaµÚè‘Ôí„÷±Þ½.qÏ×8¶wç½Ï„ñ㈉aü„ǘ>u2+W­ö(s&cóö»Gx³¦OmÒ'[ÛÞÂ**«­TÖØxmÉ.º$…aw¸xÿ»\|ônéÄÇߤ²ÆÆ­ýRx{Å>#¸¦[ìiëV…'Ÿy…ʪ„›0 ¤¦¤°lùò_ÆÑÄÇ16:ÓWV^ÎO>EXXa!!ôêu ß®\Åø‡dë?±õ§Ÿ¸aèue:wîìÞ§\Òób¢ÚE6éos_|‰ŠŠ E¡°ð(ééi¬XµšçŸCÇìì&Ëð÷_bð kHOKãqã™=c:O<õ”Ç6Ú¼e«Ç8ûÀýMê©©©áö»Gxìc÷çærøÈæ}ð!÷Üy3f?é^–ûîýÛ7ê¨UŽø.—«Ù¿3ù$w¶ ……—pãõC1›Íìùy/ýúô!88˜ûFÂj³1ÿƒé×·)ÉI,üüsŒF?î¸íVúöîÉdâÞQ#ÈÉÎ"';‹1£GQT\ àþ´T—X†\;ˆŸ÷íóÚn½ÄøxŽäçp¬¨ˆüü÷ë˜öu—D®x7^?”«VSZZJqq îJJr{~ÞË_n¹™öÑÑÜ7zAAîyî5§ÓIiii‹ËÕ¯Oow<'OžÄÀ'Ÿ~Æÿú7‹¾\‚dge’œ”DßÞ½éÓ«—{žÚZ +V­¦{·n\?d0ÉI‰ä:„ÍfÃát ¸”&eúõéCßÞ½Ýë¾ñr˜L&ÆŒɉª*r²³¸ìÒKùjÙ2íûýú \Ýî=’”¤d®|-£î¹›`6oÝʺõëé×·7Êö;Ýó^1`9ÙYÔZ,Œq{[®Y»–~}úpÏwbµZ),, ÿ¥ýrí –~½Ì£/¯[¿ž!×bÌèQ\Ô£;é©iŒ5‚[ÿr ?nÛîî£GŒ kçÎü¼oŸÇ2Üú—ÿáž»þJHH0ûöàyórí î¾óNBB‚›Ô¿nýz²2;pãõ¿,Ïî={èÞ­#ヒ¸˜vïÙCxX·N\LL“qÑpYÒRShUׇ:uìHqI Ãn¸Þ½­ê]Ô£ ñqÜuÇíïŸÙÚ\.…Ð@^^¼“¤È@B |´î »ó+øâ‡CÔX|ºáµV'|—Ëá’“,ÙräŒê>zì%Çs﨑tíÒPP<Æ‘ÁÐdÞŠŠ ŠKJ¸}øpz]r ‰ >|€½û÷“ž–Ú¤LNV¦{ŸÒ§W/¯ý êÆÏ}£GQ]SÍè÷ɹ^—Añx­Pk©m²š§5ÞÇÞxýPwÿ5×Öz,‹ðÔ*‰ßb±¸OÕxûk|êóp 7—èè(víÞCMM «¿[ËÙ.‚àà`´Z-±11”••QYUÅÜ\´Z-OÝÿB‡ŒtÚE„HxX‘‘‘„‡…l2áãã9ØL&qq±ÄÅÆR[[ëµÝz¨Õ6mÙ‚Á‡ÓÁ÷~Àd2áãã@tTí£¢°Ûí¥¦¦†«V£Õj‰lATd$ƒØ˜´Z­{???B‚ƒ)(V¯qlC‡ æå×^ãÓ/Ñë’ž^ËœÉØlnù_üüüرkë7l WÏžMÊ ÷>%ØdòÚß nüÄÆÄJXh(ÉI‰˜k›Æ_ÏÙàô{hHH“mÔÜ8m¬ñ>6Ødr÷ß´ÔTe99ç|Ö*§úõz=6› o7–)8¿î:÷oUPPÈ„‰“@‡ÓÁ£OXh+W¯¦¤¤•JuêTY2V›•©3ŸàñGaÔ=w³çç½DGG‘™‘qVb¹ü²Ëš´ÛÐUW\ÎÈ1ÿË민DyE÷=øÿüÇ+^ëJJL }ûhò 0:ó Æ?ô×yÎt¹nûË_xöù¸÷þ D£Vsçí·±aãF îLÂÞy`W]qPwvâ•×Þ (0—âB­V“O~~>;wïaéçŸy-“š’Ì{³> ÷`.ãxÐër‰›‡ÝÀ”3‰‹‰aßþØìvò òñ÷÷ÃrêºýM7ÞÀ{óß'66†à Óij„;nÎSÏ­FCnÝð÷?Uüýüˆ‹‹mÒn@@€;V£Ñ—€€úöéMhH(AAôëӣѵZM÷n]O͹¨{w"Ûµ£²²£ÑH§Ž9\7Hr²³Ðéô´o¿¿? "5%…ŒŒ–«µZMRb"Z–À€@z÷êEŸS×jccbHHHÀá°“Ÿ@ddÝ@q)”/Áf·Ó¿_?ÒÓÒØ¾c'~~~ »~¨×2~~~XmVÂÃÂÈÎ̤]„çr ×éÝë>'; “)“ÉDÇœ_®!†…†RQQ‰¢(tíÒ™‹ºw#22’ŠÊJºwéBVV&;æpâÄ l6‰‰ ¤¦¦¢ÕhèÞ­+F_#í""HˆwoËÐlv½ž«.¿œ¨¨¨_Êøûùѽ[W÷VXX•U•X­VÒRRÈÎÊäèÑc„†„У[7R““ÝË¢BE»ˆ÷¥ªkª©®®¡{×.dggÑ­KªkªÑiudgfãQ§Ž9ø|°Z­$ÄÇ“–šBeU%Å%ÇIKMኰÙm”––ÊÕW]õËÝß*•×eQ©T¤§¥¡¸æåát:¹¬_?RSRÜëZ¥‚°°PRSRÐé´¤¥¦bµX‰ißžËú_Ú¨ýòMšÆ±F‚M&Ö®ûž»ÿz‡×2ááag>6Ç´”Ô&ýÍnw|ê¬ËÙf4hIl÷˘nꇟ–˜0?ze´#,Ї°@bBýH¢W‡v$µ ¤v4þ>:2bLøè4$D4©_¥ªë3%Çët:}z÷".&†ø¸8÷8ê‘Á‘ü|B‚ƒ &&&†Ä„x %((ˆ[†ÝHDD¾>>¼õö¹å¦a¤¥¦ÔÝÓ¨Lp° ‹ÅJjJ 9Y™MúÔíêûUzZ* "!!V‹ÍfsÇ‘‘žFRR"ùùùÓ£[W²2;p¼´Ôc…‡…zŒÓ”äd>ì®'$8˜ŽÙÙø7ÚÇÖ¥ô´4¯ËÒ–œî®~Õüùó•áÇŸõ†÷îû™#Gš^»ÒëõtïÖ??¿³Þ¦8ÿŒ}d3¦Lö¸, D½7ßú 0zDËGp¢NÞ¡C¨Ujf==‡A× äÆ¡Cs][~ü‘Ç'OeÑÂÝ—Å…aÏž=ÍN+**j½_îKOË =íìœ&NV«•~}zKÒ^Y­V**ʹëÎ;Îu(¹¹É;|˜Q#îvCã·ª¬¬bî3OKÒoƒZíˆ_—Ë…ÅjmòÕ"! ®œ8q‚À  Ôr öŒ)ŠrV®Y×˜Íø h4š³•8Ÿœ³#~!Ôjµ$}Ñ,µZ]w=^ü*gëF5?ùµ¿6KžÎ'„B´!’ø…Bˆ6D¿BцHâB!ÚIüB!D"‰_!„hC$ñ !„mˆ$~!„¢ ‘Ä/„B´!­öË}¥e¥”–GiðøN¨{HO\\<:­®µšB!D3Zåˆßl6“Ÿ›Í†Ýn÷ø«®®æèÑ£­Ñ¬B!N£UŽø¿^¶”®À×Çûï´oÛ¾ø¸øÖhZ!„-h•#þÒ²RtZ N§£™?{k4ÛÄÕC†òÈãyäñ‰¼;oþÍóÊkoðÎ{ó<Þ›ûâKÌËk8|äOÎy†ŠÊJ^}ý³Vçèÿ}€§žy–#ùg¥ÎÆ&NÆÞ}û~WϽð"Óž˜ÅºõëÓü555têq1óò˜ûâK|óíŠfËNœ:²²²ßªÛ‡L~Aë¬Sñçöòâ<üV]_Þu¤‚Ký¬UÛk©Ï›ÍµÜ÷àØç/.)aÂÄÉ­š8µÊ¿ÃáÄår¡R)^§;ÎÖh¶‰ð°0ÆŒ€¿¿Ÿû}›Í†N§s?åÊn·£ÑhP«Õ€‚B]BñóóóR+8´ÚÓ¯:»ÝŽV«u·£( ‡î—û, V«Ðët¤$'7§ÓåÂåt¡Ó¾í¹ÉÎÊäú!C;mùz.— §Óé£ÍfC«ÕžZ?ujjjšÜ¿Ñ˜ÓY×t:V« ƒAߤÌÏ{÷2éÑ „ŸqŒŠ¢`±Xññ1œQy‡ÃAmmíiãµÛë>êt:ª««ñ÷÷÷˜V¿-ccbðmðÔA«ÕŠÁðK,gÚ?Ä…çX¹™âŠZ–nÉ'ÒÔòð\§±ûkž·g·Û=ÆgKEi²/ó6Æ[Ò¸?»\.}øói•½“ÕjÁáp4ûøH›ÍÖÍ6qâäI–¯¨û4|q¼÷þÀÑcÇxãÕWXµf ËW¬¤¸¤„K.º€¯¿YÎÑcÇ(++ãÉ™3Üõ)ŠÂôY³1èõìÝ¿ŸÙ3¦ Ô%Â;GŒ$=5Î;±s×.|}})..aü؉‹eÊŒ™X,VJJJxéù¹<ÿÒËèu:j-VüüŒT×Ôðõ7ß°s÷î&qnß±“·ß}—ððp6mÞ¿ßxÍ,wîÚÍ+¯½NTd;lv;“{”ÅK–râä *«ª˜8á îÓýœçæòÂsÏòÁ‚)))Áf·s¼ä8¨ WÏž¬[¿§ÓIV‡ ®t cxˆ.:²qóÿ0F?#/½ú:dd°c×.wûÿyç°ÙlLÿ0ý¯ÈàA×pôè1ÂÃÃ0™L”—W0wÎSîõùÖÛÿåð‘#ÌûàCþ6ö!æ<7‹ÅBqÉqþçæalÞú£;¶I=JP` SfÌĠדwè0³fLk±lÞº•wçÍ'¦} ;víB>\ð17oF­RÎÈ{îæžÑcèÖ¥ ¹ƒ¯e§â>k6N§“£L›<‘õ~À`0pùÕƒ4p •UUDGGñȸ±<>e*‘í"Ñê´LxxÜïïÄâO¥²ÆFXO|¸?ƒ–¬ø`æ­>ÀŽÃå”VóÏûû1úkè™Ö?-{ +1[¼2º÷iëV…'Ÿy…ʪ„›Ð7øÀ9ç¹¹ÔZ,˜kÌ\;èj.êރ܃yùµ×Ù³çgFÜ}ŠâbÉWË<Æxsjkk=úócîeòô BBB˜ðð8^}ý ŠŠ‹©­­ÅÏèÇŒ©“åCÁŸ@«l!‹Å‚Óélö¯þȪµpÅ€\1` u÷ôíÓ›i“'¡R©©®®¦cvq±±$'&±ný^y'>Ži“'ñ?7 ã§íÛùpÁ'LŸ<™IN cv¶»ý‰&0cÊdR’“ÙðÃFî¼íV.¿¬?~~~Lztååq¸ë¯$Æ'0mÒDÖÿ°»ÃÁŒ©SxéïÏñÞü·+W5©#<,Œs ³ç:šè¨HÞ~ç]î¸íVÔj5ÓŸ˜M­¥–;o»€Â£Ìzj»ÞÃÈ»ïæ`^žÇ7q$?ŸE_.aÍÚuí ¿åfþ\T\Ì«¯ÿ“ À\Ê/×ùÿûÞÔ­ÇÆë²~ûxû@y¦¬Zr&I¿¹Ø„8[òB­R³rÕ]SwÿtQÇjã1ÞÒXnÜŸU*U“ö| Iú2ò£? ³ÙÌòoW Ñj™9mj³Ÿî…®Ü܃ä>̨wÓ£[·s½z^Lhhè¹CüJ’øÿ$"##¹û¯wžë0„çЗ8×!xèÕ³çé ‰óŽ|áR!„hC$ñ !„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6D¿BцHâB!ÚIüB!D"‰_!„hC$ñ !„mˆ$~!„¢ ÑÔÖÖžë8„Bˆß­¼¢œs͹¨{jxh8z½þ«¼²Üëû~F?ôz½$~!„›ÍFqIÑ9}lxCŠ¢Px¬?£eå¥X\AA^ß·Ùí((òt>!„†Ò²R’“ÐjÏŸÔ–wè{÷ïåâî=Îy\‡ƒU«×È5~!„—ËuΓkcjµ»Ý~^Ä¥Õjq¹\’ø…BˆÖ¤R©Îu$ñ !„¸0œ_ùµÎù“J¿Bˆ „ê¼Ë²u1OGü*T’ø…B\Øò ܯ­6+%¥ÇO;ϱâ"¬VëYiß[⯨¬`ßýì;°Ÿ‚ÂBE9+m IüB!. ÍX4LüVÇ·œøÇŠŽ¹¿Ëå¢>-—/aýÆ å[LÚÍÄTQYÉÉ“'‰l‰¹ÖÌšuß¹ëq¹\-Æwº2[~ÚÚb<çþ6C!„âf±ZÙ´e3~~~˜Íf:dd€¢°gï^‚‚©¬¬ ¸¤˜cEEÔZj  §¼¼œª'øqÛOädgs0/“Õ'q¹ââ ÿUq¨Õu—ÔêºãðŸvlG£Ñ`±XÈÌè@iY)ÕÕÕduÈdã–MDFDR^YáQF£V³aóFýÐét”•—óã¶ŸÈìЃÞдÍß¿ú„Bˆ?EA­V“’”LHpÅ%Å””–JzJþ’šœB\LååDDD ×ëIKMÃåt‘wøí"ÚàïÏáüü_BÕ‰*öîßOYY©É)8,–Zâcãð÷§êDíÂ#¨®©Án·SV^ޝ¯o“2Z–”äd’1úIKMC¯óþƒA’ø…B\š»¹Ïétº_Ûív4 z½žÀ€R’’¨®®¦¦¦†ö‘Ñèõz4§¾w¼¬”ÜCyÔZjq8œôÔ*~F#V››ÍÆÉ“'Q«Õ›L^cjîæ¾°Ð0²33AU÷Úbµàp8(*.B­Vãëãƒ>ûs…¡IƒÁ@`@ ~~~hÔjüŒF¯íÊÍ}B!.x±1±lܲ‰Í?náÀÁÄÅÄpâÄ vÿ¼‡M[·Ÿ@|l?n߯¶;8yòV«ÅåÂl6£V« ÀérñÓömøúø’šœÂ‰“'±Z­èt:¯í·tW¿Ao !.Õë¾C£Ñ`ô5Rc®ÁjµºOÿÇÅÆRx´œ¬lüýü½–iÈßߟŸ¶oÃf³ymS®ñ !„¸04“_£#£P»ÝN€F£‹Å‚Z£FQb¢Û@B\<5µfbcb1 Dµ‹äHA>þ~þ„…†bôõ%-9»ÃŽZ­&)!‘üÂ'~FãÇl2ágô 4$„Øö1¨Ujâ(9^‚J¥FwêT½¿¿?i)©î$߸ŒV«¥}T”»îØö1”WV Öx9¶—›û„B\(š;Õ¯ÓéHˆ‹oò¾¿Ÿ?Y2=Þ‹‹õø¿Á` 3£ƒÇ{±11î×z½žäĤ–ãòrÄl öˆ/-%B‚ƒ=Êê´:âÄܤLtT´ûµÉdÂäå²C=9Õ/„¢Íi|”ÜZä|„BˆÖò+ò«V«õ8JnK$ñ !„¸ hÔ;øÏŠ¢ ×éÏ‹¸œN'F®ñ !„¸0„†„RPXx^<ê~]O¯7–šv^Äåp8 •Ä/„â Õj ÂbµœëPÐh´ž7qøQSm–Ä/„â ( F££·¯ÕC.—뼊K®ñ !„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6D¿Bцœ6ñ;NNœ8Ëåú#âñÊl6ãp8ÎYûB!Ä…¢Å¯ómÛ¾ƒ÷>ø€öQÑ”U”3ñ‘G0}Ϩâ 7Ñó¢¿;ÀÙsžA¯ÓSk±Ðµs'†\;ˆŸ¶mÇd2‘×jm/X¸5k×R÷ĦûÇÜKxXX“rÿøç›”••‘•Ùa×_Æõ[¬Væ½ÿ!#îºówÅ)„Bü-&þ»vqiŸ>ôîu ‡äc0è[¬Ìår¹øõ7ßx$ßú3 Ÿìr¹p:èt:l6z½gýµµµ;VÄ´É©­µàrÕýäáêï¾##=ÝøEÁáp¸Ÿ…ܸíÓÅÚœË/ëO§œŽ˜‚‚Üï7ŒõÀ\î3šÀÀÀëªg·ÛÑéthÔj~yÚ’ÍfC«ÕzÄdw8Ð'¿@%„â 6lØŒ””¯k-–~½ ^GNf&F£‘ òÝÚutïÖ•y|Èö;)Ž„øx¶üø#}ò)‡F¯Ó“œ”ÄÓÏýUkÖ°`á§ø|X´d)¹R[kaÙòo)/¯ %9‰‰S§Ñ󢋸vå*,\È›6ág4òÓöí<õÜ\†ìn{÷ž=ìùy/•••äž–ÊUƒ¯£ °¥_ÃŽ]»ð÷óç‹%K¨1›Ñëô|±øKV¯]ËòoW¢ÓéðõõáÁ‡Ç³}çNR’ù÷ÞfÃÆMlظ‰Œô4>Xð19ÙYÜ?öaòæõ7ÿMTT$'OVóԳϱwß>Þ|ë?tÊÉ&¸…G, !„g¢¢¢¢åkü÷èΤÇ& R©˜>ûIvìÜÅÍ7ÞȾ8VTÌ;óæsÕ—£Óiq:›L$%&0fäââ˜ô肃ƒù|Ñb4§Ž\W­ùÎ]ÿÍÆѷwoŒF_Æ>p?•••Mb˜3{2ÒY°ðS¦ÎœE÷®]ÉÌHçê+¯äª+.àÒ¾½iÁî=?ânûª+.G¡îŒ€rªNN‹Ãá -%…¤Ä®¾êJþï×›´•I¿>}èÛ»—û½¿Ü|3½ã6}¹„Œô4âbcøÛ؇HˆÃátðèø‡™2ñ1>þôSÚGG3uâãä>‚N§ç‘qcÿЃ}}ÝÅÆ´ç‘qc:äZvîÚÍ‚…Ÿ2~ÜC<üЃ$%&œ~K !„gè´7÷›L\}å•tïÚ•#„…„°yëVâbc áâ‹.¢¿~ä<Èæ­? ¸Ól]â  %,4”AWô¨_£V»³·Sï*•Šî]»r×í·sôØ1÷{õó”—WðÍ·+ð3Ñh4(ŠâÑ6ÐäÆÀ‹/ºˆÄ„–.[æŽ×›víHLˆ'!>Þã}Í©8ÅÛ\x}ö²ÝnwÇÜœú8¸\.,–óã·¦…B\XZ¼€<ïƒùaã&üýýQPxdÜX^u%Óž˜Í›¯¾‚F£aé²eE«Õº=Ëœ¹ç¾Q#<è>^øí££ j©I……Ì|òiÂBC±X- ¾æj\ÖŸ>Z€Éd"%9‰ª'¨¬ªÂßÏÏÝöÌ'ŸâÒ¾}ÉêзÞþ/ûppXºlåèõuJüú›å,Xø)ÿ~ýí¿ÿáG,[þ-wÝq[‹±ÆÇÅ¡V«yöù°ÔZ¸eØÓûöîÅšµkyþåWÐëõ ¿åæfëºáº!<9çYr²²Ø»oÿ¯/!„âtTóçÏWØl»ÝŽZ­F£Ñ¸ß«ªªâ…W^eÆ”Éî÷j-4ju“ôê¹\ 6›Ÿ_¤·ÿr8(Šâ¾¹ÏÛt‡ÃáѶÙl>'L°Z­ †3*k·Û™:s“›@`@@+G&„âB—››{ú§óyK¦‡ä“œ”äñžïiºZ­úMIh1é§}ƱV«mRæ\=%éL’þÉ“')-+C«ÕR[k&ÀßÿˆL!D[ð›¾+Vu¢Š«¯¼òlÇ"N©­µ°mûªkjxôoã½Þ3 „Bü¿)ñ÷íÝûlÇ!ˆˆçú놜ë0„B\€ä·ú…Bˆ6D¿Bцh¡î.?!„B\ØÊËËùzc¯ªô³‡oIEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/booleans_more.txt000066400000000000000000000003011330160122500243470ustar00rootroot00000000000000You are viewing the booleans page for the application domain. Selecting the 'More...' button will open a dialog containing the SELinux allow rules that are turned on by the selected boolean. selinux-python-2.8/sepolicy/sepolicy/help/booleans_more_show.png000066400000000000000000001042041330160122500253630ustar00rootroot00000000000000‰PNG  IHDRþjtú¯'bKGDÿÿÿ ½§“ pHYsÄÄ•+tIMEÝ  ·iTXtCommentCreated with GIMPd.e IDATxÚì½wÇ•ð™™eºL{o¦ÇÏ3ƒ%@"€è$Š"EJZ}ëÍí¹/î"ÎíÝ}ñ}÷Ïm\ì­vµ+¿Z‰”Do@x~`3×=¦½÷¦LÞ4Cù‹  »«*«*+ëåË—/߃‰D"—Ë•J%³Ù !@¸¿€ªª¦R)Aààè訪ªÝÝÝEÑO ÷1cY–/^¼H'‰‡zˆ¢(íWR5pCÓtgg']­V)Š"BŸ@ 8Ž£eYÆÑO cš¢(UU‰•Ÿ@  ѯ@ªƒ@ Ñê’Dä>@ Ëjòtí²%ú½×F'&þ»·6?²®R­&Si­MÞ <ÿç· zYQÂÑX¥\ÖqœT¯[,f›Å’Íå3ÙlG[+„c¬ªxj6tibÒl6:~Š¢(pµZ G°ªZ,žãb‰„¶:ÆãrR56Ù­–t6›Jg(Š¢(Ôâñ$RéB¡`1›­V˹á‘L.§*ê²>‡ÝFÚ á+ë±djçÁÃÏlÞxèøI½(<´|Ùö¤µ€H°iýÚ]ÿüß=¼jÅâî. Àø×xǨ×ó<ÿÝo>¯5EM#©×ëo¼}ó7ÖÕêµß}øI_w×¥ÉÀ÷¾õü…ÑKv«uÓ7ÖþôÍ·~ðí‡Î³ù¼×åjkõ_.à³£ãÿðÓ_Kå%½Ý’,ÿô·¿·YÌÉtfÅ@ŸÑhÀJ¥Ÿ½ñ‡¿ýãÌE"ïÞßîoaYF–eI’~øÊ·?Ù»Ÿç¸öV¿ö®ÐõÒÓ[ÞÚ¶Ãçv.蛞 a ²ùÂÞ#Dzù‚ª(?ºþo¾=¸¸w6ݰzåÒþ¾+›ä—Ÿ{æ÷>4 ¹b‘×qÏmÙüë·ß³Y,…bñÏ¿÷Jpvöä¹áKúÓ¹œÝf%í„ðÕ@mZÿp:›ý‡_üûâ®ö×_ze˜ÉvºÑ Š#ÜÖ¬X¶¨»+‰üþÃOV.évËfÀ#?Ôêõ! ñ<xž  Ú|Þ?}í•ß¼óÞxpƒË»šyê±ÿ÷?þ‹Aà¿ÿíoR]é<€ßí|zóFžãÜ.ÇɳçY–ý¯¾œûéoÿðä£ëµ2uIúôôÙMëÞüu€P$ú¿øõDpftrêÏ^µÑAwwM¦“ÙÜ÷¿ýâÏß|Kë¼N»$IÆ&ŠÅ’Ñ ÿá+/?söüÈ¥Á¾ÅM‡NœÒ±ì_|ÿµ¡á‹‡ŽŸ:zêL¹Rè±NMÏDã Œñò¾—Ÿ{† Á ·H¹RÉæó&ƒ¾V¯çóƒ(^×qcLC‰ÖO¸3¨ªºcÿAƒ(šQॆw`EQdIƤ²Ù±É) !DQŒc¬(²6kŹp40=[­Õ0ÆsáCÓ¹byf.¼¸§«Ñ¼­&SOçåy,§Ý–Îæ&¦Ái¿Ç¥cÙl.'UEyŽÉàt«×!t»œÝí­o~ð±Ëf³[,Ž cÙ׿ýM«’$ŒU¬8v|ljzýê•Ó3€¢(!YQöùt6ûÆêUÓ3§cl*8Fbq °ÛéÌ…l6ÛóO=î´;¦¦g1VE!-„p+Ȳòþö]"/üù'ÇNýîÃmõƒ×xŽ»®è§^{í5¿ßÿ¹­#ÉòØd`èÂðèäTOGû“›ehzzv603wibjlbª§£]’¤ÀììØTplrª.É¢Àµx=QµZ­¯§;ODqé@ßd08;,·Óqæüð–GÖ/íë=1t¶£Í¯ÙúÓ™œ$I½]šÖc6,Fãá“§1/>õ„Íjžž Uj5–¦–ö-îíêœ ‡Ïœ¿X,—uvôúwí{nËæVŸG»rEQfæBËúõ¢À2Œ$ÉÑX¬«½ÍëvML2Ù¬Q;Û[kµêÒ¾¾|¡(KÒÊ¥KÓ3Ú¦Më×z]Σ'OOLÏ ·õ±åry|*Ï÷tKeŽm÷·B¸5ƒl÷û—ö-6ôíþ–®öV£Áo „Áwß}÷‘GÑét¤âw¤u" V1BPUU@sÈXEQ „ 3MãÖV›CEÑ6aŒû¨ªŠj%ËrãDÚ!SCEŒ¯: „ª¢`ŒEA1Àª¢Œ‚¿üý;ÿóßþ•(ðÃiú²'´öU[À@‚ãÆE^L_Ù$IR21èÅvíE¾øô ÃH²L! B Ý¾Vp»ÐÜ®»IQBD,Œ„;FC7drCX_»ÏMo”ÏÍ?^[Ƹ±CóçËû_¹ YQŽž8µ~årNÇ6¿’$]=¸þì²1Í…5ŸZÛT(•~ÿÁÇÙBÁã°oÝòBHQ!Æ*yó_7‘êš­ÑO 4¿[}Ä`ÐßDiú²èáO_UUUš¦šÊ%ÜýFNbøWA!äv:Àív{ch Ãaˆ~Ò „/>R&îèÆ¼© @xP´~Œ1MÓDôƒ%ú‰­Ÿ@ ,Ñ/ËòÙóg‰_ÿò¼ý-þH,R«ÕîÖ5ˆ‚èóúdYÎd3·eý*„PE³ÉœÍfKåÒ]QbBFƒQ/êSéT¥ZYPa»ÕÎ]oI'áA†¦hJ„E=‹H]Ü÷œ½p68Ìrõzýn]C†ÎÔê5—õ¨w…nÏòl.˜t´ut´wÜ­>5–ˆÍ„fº;»EA\P]’¤àLЭs“$¬„«D¿"+šêDêâ¾GUÕR¹¤**MÑwoèr¹\‹·x»\Ëô¢>—ËéEý]ôU±P(¼°Ðüåhš&.|„ë4 bå @»®I[*ug˜®”…歷»Mt¡ÉY„ ¯øÆXQ«„ EÑ7WèiLÚŃDÁ»œ‘­²æ6ªîä®uf¸E?!ýýŽ,ËélJUdDQÚW‘ÕbÓ±7œÄ¥Y†%÷@iýÝ}IðuˆH¬â»x;Ífš2H´»ûUU©˜(êUEe†B”¢*’T'¢——¦¯Ÿ>š. v§Tß¡òˆºëZ¿–„ý6JI-®çÝ»cmöbjýDößß”Ë%–eKÅœÃn3ì!Y.g2NÇes»Íy}Ñ/Šó$Iº0<<00À2—» EQ´€þZ³¾I÷™ÙÙZ­ÖÝÕÕlfúÜ£wNëG¨Ù¯ÆßâxAÅj.ŸK$7B‹?‹ÞºwV°¦õ7Nwfh(‘H@†Y¶lY*•²X,³³³K¿H³i¬Hoˆ]I’8¸tÙR‡ÝŽ1þôØñ%ýƒaž®¤õ_êâ«Õê¹óçW®\I7¥¸¸è­Éàƒ1>|øH¥RQT•BˆfèU+WÆ/~¢\>_*•3tððá•U¯×çæB@`ž93töÀ¡Cä }Ï^’fff+•Ëå¥Rinnîº^ó!ª QÇ'ÆŸ8n6šÍf3ucBV‹@ }¥iú³m4E5cèϾ^½IC³Œ7súÌPµV÷ù|B …2™Ì©ÓgdYÖ&¯´@ùŠ¢hÝFUU!€*þìÇz½þ‹_ÿûï~ÿ‡J¥¢ªêÞýû‹Å¢¶g£¨½û÷=7¯¨yhZ|óçJ¥ràà!Y’æmj¤hët9NÇö]»¬6«ÇãaX¶qˆ,ËÚ­iÇJ’Ô¸*õ ¥b1^ûࣴ}B¡P­V»öª®=|Þ-äþ†¦éJ¥‚¡µ˜"İ ¬× *t*ŠÂÞÄÖÝ_çBáßüö UUŸØ²åÒØØÞ}û!ÆùÆGo+–Š©TêÑ ¶}²]UU„à3O=m2÷8 C¡ðºµk›‹*•JmÛ–ÏçÓ©ÔÖ­[9²vìk X,þø'?éï[üÒ7¿©¨êo¾™JgþöoþZ„ù¢"êjuÕf³Y,š¡ …˲n—›çøZ­‰EBn—›eØb©Ç"ZGû¼>«+–Š‘hÄl6;ìQ,CY,Æ88ä9Þét¢Ñh±ô™öe8Oë8ì6¯Çƒ‚%’I§Ë…1VU<33³{ï^ѦM½Ï¡ÃGÁ€ÉhzöÙ­Qée­_ÅÍûý--E¯wÛ'ÛžD¢¨7èõƒƒKvìÜåõzúûwìÜ50Я¨êáÃG0ÆyÄ ?Ú¶ «¸··GŸX,µtpð“;Óé´,Ë/¾ðB±\‡ÃCCg1À›7m²Z,¥R)›Í¬Y½z` ï‰'¶04=>1œžÞ·ÿÀ¦ûûúÞ}ÿýt&#IÒ‹/¼P®TµÃUŒ7oÞdµZ®ªâÀ}_CQ”Íb¯V+4ËçK\¶Èé8[¾Xàyá&^©fo–M¢-=þoûñÍ›¯Ø)0Ƹ\.ljp8œN§{º»ŒFÃk¯¾zaxø“í;*Õjs ZBÄf½á‰-´m[6›“$i.Êf3ÁàôòÁA†¦yž×ëE½^4™ŒƒK—Æ–-¬Öj£—. ô÷•+«óz=>¯·V¯—J%“Ñèp88žËåò3³s.—³ù.°Šê54aì6»Õj‰D#òI(4W,UE5›LzƒÞfµÊвnÝZ›ÅúÆï~ GTE…‰¢Às¼ÉhÔ*-‰z=n§ÃÑÞÖŽD¤zýªÃ×>l·i‡‡›;!2Í{ÿ+þ¢!*•JZ#Œ'cù|Π7Üä¤(êçv),Ë>z4›Í †ññ‰Óg†$YÊçó‘hôà¡C}‹¯^µò؉ç/\˜œšÂĉ£ÇŽ=vìè±ã‘hT;êÔ™3צâ#Ü. „‹z{ÿóÿùüÝÿú¿´ß@îƒ+Ó¼?D!¯ÇÛÙѹd`I<'âv»Ýép:Žh4‹Çü-~—Ó¥õ‰xBUU»ÍžÏå%Y*‹…b` õÙl¶V¯aŒD!†fB4¢ÛÚÚEÉår<Ç_uRˆæ‰þ†lº,ó &‡#‘®ÎQ¯_´¨·ÕßšÍæŠÅâÒÁ%Á™͈ÿ™ àªÆÚúªžž¯ÇÅhŠêïï£(º··§³³Bh6™Î_>?< !\²äwo¿½bù²¥KÞ~ïýþ¾>—ÓIÑÔƒwíÙëõ¸-f‹f8Çûý-¯~çåwßÿ •N_¥õ_1ø\Ýáæ ’eydtÔçó9.aÃ`¯mš››koo³Ùl¡Ðœv Çñ¡Pèø‰“ÕjÐÛÝ===säè§Û¶o_½j¥ŽÕ5>;jok³Ûísssó*‡pƒ ªTªV‹Íçó+Š‹Gãñ8ºi ê©§ŸniñÙmöf!âõzì6Çé\n—ÃnïêꤲZ­^Çf³ò/ðü‘£GMF“Ëå\³zµÙlîhkË ~_K{G;Ë0µZeY–eô¢¾­µÕf³ g±XˆŸÏ× Ïó7 ÔGY†Õ±:t…X,–Ïç ùB(’d‰¢©™é™Zµ …t:]¥R‰D#•refvÆ`4ÌÍÍÕjµj­‹ÅBµZ¢©H$0(‹±xL’¤|>¯Óé’ɤ,ËÅb«¸P(drŽç'­Õk¢ ^[cŒ-‹ÝfcYVËlîõxÜ.—ÍfEqåòåàR©l2ôz±P(KÅuk×:—ii®5ÉTÒn³7f8!„-^¯ÅbAz=žÁ%N‡£Åçx!_È‹¢h2™Ün—ÑhÁh4šŒ¦þ>·Ëe1›— ô»].š¦/Z!´˜ÌkV¯DÁír™ŒF !ÛÝÞÖæóy!„Ï_žàUÔl.k³Úšg¤µWÉjµ"E½h³Zw»\årYøeKÝn—ÓéÐëõ&£Ñj±’ÉT‹ÏÛß×'êõ»Ýçõx½^޵˜Í->ŸÛåêëëÃXõ¸ÝKyž·ÛízƒÞh4جVípŸ×ÓßßÏ2LÃÛµT*™Œ&2澿 ÍÍrœÎd4å ¹L&S«Ö:;ºn´3Æþ?ÿ÷¯]³¸wñ—:M6—ûÙÏñ—ñç×5(&gα9¾˜æg¢´^Y“žÂæ¯!ˆ ª¨²,³,«¹Üh†{Œq­VÓÌ8!Œ1¢ª\¶ÀH’DQÃ0 ¹ƒÎd2v›Ýh0Þ®û‚^¿´¸gñ]ÔpeEžž™îíî½-áHo§>ˆP<omi%¢ÿþæü…sF£Ñç󧧦§§iŠÙøèæí¬( ý•Û“Ëå¼ë‹ƒ_áÁ5{ø4þ|(À²,€¦¯j6×ñ4¿RêuƒCt›cø@ïúr*UU¶þ÷Ô‰©ÿ~cÌ鸑ы§Ïœ*•KB=ݽªªÞÄÊB³,óÎd4¾ÿúëÄsà^´ Þ®PÉ·r ×:wޢ迻bWóY`Š~òžÞ÷(ŠbµÚªÕÚìÜCéÜn·¿Å¯Ño(ú½iO¬Ö×åíÍ §^Ö»ïV›ÄkÓ¼ Г’Ló>Ð4m³Ù¬VëÀÀ@ã-ûœÈdÞõRù5î¢ÙWQÍ tE’,Ë¢ Ö¥ú]ÌC (ŠÀ ’$-´ cLÑiü_*0 «½ÕÀh4 …»¨™"„<.O]ªçr¹ÛÒê „ǵµ¶¥Óér¹|Wn B¨õþ¿æÚ´p ¢Íf#s¼„ùmã½÷Þ5Û, ͺ¸ÿµ~„z»{ï®ÖßÐ3nãe\^vÅIé® ]ƒ¶Vy¡iýdA/áÚA*MQT_oß]·ÿî˜ X Þ‡·ý2ÂëBóì$nh¸]->MW«UâF¶@õ} ™Mæ…–1œ@ ÜÛ¢?žˆË²L~-XTUÆ¢~ŸŸ%ôÂíý¥r©½µˆ• Æ8•NI²Dž@¸m¢_ó² ^ «#æ8p›EÿµÎŠŠcéJµ"!MFάgI×pÑÂ'z ·Mô7:€ÆçRUÚ~xv,Xó™8QOåÔÒ^ã`·BDüß%Ñ.§EL¥“Ùl¶Ù…¢(‹ÅjµXɸ@xàD³ó¯‚Q[pÿE|¥á´¯²¢~¼òèÑx>9Vv”ë2öx:/(=‚ö¶‘Õ%wMö Òé”,ÉýTÓÂWY–Á©\.k6[šÐRÑ"„t:Bè«å1o4­†qïÿF;k ">o€ ¢¹¨ÆºëŽD¯ÝŸ@xÐEÿî={9b1›†yþ¹g/^Y¼xÑž½û^ûî«R½®(ŠÅb¹‰FÙüf†c¹Ÿ†‹Ñ™W¿Õñ𚕬N÷Æ›N] kÕ.¿•¦ˆè¿’B@.—ëî^ÁÇ0Œ×ã››mýuIz÷½÷ãñ¸ªªkV?ôЪUï¾ÿþÚ‡nñù¾ì©Ÿ8±{ïÞÿê¯þÊl6K’ôëßüF¯×ëÅçEH’ôÖ;ï®Y½z*0µléÒ¹¹¹=ûö#_xþù®+Yp›‰F£Ûwîüî+¯rœP­VJ’täÓ£»£P(üðßß±sW(–$i ¯"T«VݰáÇÿú“¥ƒƒ¯Yýó_þêÛ/}Ëãvk¥=¶qã…á‹‹z}²}ÇsÏ>“L&SéôïßzÛd4¤Ó™—¿ýR±Pøè“í½ÝÝS€,K»vïjmm›™:wnzfæ…çž+•Š£—Ɔéìh_·ví{|X«UUkb]ëH†/^|îÙ­6› °~íÚŸýâ—}}‹ú‹_®Z±" ¾ðüsÚž³ss;wíþãþQpzúÄÉ“¯½ú*YÍNxÐ@MZ!0Œ«ÕjµÀËê!‚¸fõCk^óô“OÆâñ‹##Fƒ`<2: èéêúÁ믙MfØ„ÍbÒ+ÁYêüp(™ÊÏ…’§‡¢ ÖÛ,—ãÂ/ICä}e®-\=E1oOЯy‡Ï½Œås?|…SÜèÀëð²n=dYž'ú9ŽûË?û3k뎻ÞzçmÉÞ“[¶<¾yS2™œœšš˜œüî+¯üð?8t䨿¥åôÐÙH$R,•N …#ˆËél”æõzÝðÈ?üèGmm­ííªªž8yjp`໯¼òä–-ïøÑá£GŸßºõ‰-/^Ô Pµ§»«µµõñÇ6/éïOg2û´Y­¢ î?p(‹…ÃáŸ~ã£Ù`´ÈÉ|¤Ekvÿ¶ÖÖo¾ðüš5«cјÖ¶úýåJ%OŒ/$rŸð@kýÂÎŽŽåË–j B   Qš€ÀÛm¶î®Î¾Å‹E½X(.§ßCW M—ÃüúK+ÿñ''~ü«ñ6o´X©'ÓÕºNÀ`OO/_ß%‹ÏåTV׆šÑ2‡Ï(Š280àóxþßüÊÐcª IDATÑs[·´¤Œ! ÆXU€1BP/Š->ïî½ûžzò‰áá‹{öîÛ°~}ól*„påòå<Ïw¶wD¢­(m¨¡( MÓI–.'i×´ˆ´1"BÀ0LWg§Åb^·öa¬ÈóF*<Ïwvt {½áÐÙ³m­­&“‰Bˆ¢h–ekÕP’$À†o¬?tôÈôÌìã›7“¦Ax E?…¨ÏÞU†±X,îØµkÙÒÁ‡)ŠúÔOx<ž½ûöëõúeK— ¢ ™æMóB7¬0êù7?8˜ ë8¦€??Šæ×¿üÙÿø?ýoF£‘Tý–üB•j…ãøæÎcP®”©«ý^‘È~ü/V‹E’¤o>ÿÃ04CC„,Ëz=îþß¼ù¦"+mÞl·Ûûûú÷‡?¼ôÍo½óÎw^þv“!D1 ³tÉíJX–]½jåÞy7 Öjµ—_úV.Ÿûw[ýþ@0¸iãF†¡!‚ZR_Š¢¬ˆG¾±{ï^Ÿ×k·ÛÝðHWGçoßüMÓXUá•|ê‰'>úø“ÿëO „6«õ¹­[ëRahµ5Èd4œEQ PúW«ÕZ­vÑ¿`+ôº¢_ ÈU(jµšÕj%-@ Ü]L&S>ŸO¥R‡cÁš}jµZ<‘PUÕíri®˜ ×Îs­_!›Í6‡ „»ˆ^¯O$6›maÚýUU Ó™  P,jÉ0¨µDË"{Ýþ@UU- @ ,´hf Ù‰._(hŠÅ’¬(×Ñú1ÆZÄf›$0Â×j5†a´ø?ªªj«º®»¿¶U‹öÅeÿÕ–ª,+*VUE½ÃÞDð¹V Mô/ÀD„¸Éˆ¢( Àø:¢¿P,üìç?¡(!Ôé¸|ÿ‡œîúQm«ÕÊÛï¾µqæ–? ›Í¼ÿá{/¿ôŠ^¯¿vç\.ûÑÇ<õä3‡ó‹Weó×>þpff!¤Óqím$ö'@XhÒÿò6¤¯í hšúÞë¤Åq¤i:‘H@EÖëõ‚ ¦R)Y–t:N œ›J§†5šŒUQµ^%“ɨªj2›t¬N’¤l6“Éfê’ôÅkåZƒªª6lìíé™™ž&íŒ@ ,L¹Od §I‘H’´gÏ.šf¬VëŠå+>Þö¡ŽÓ)²ÌóÂSO=säè!I’òùÜúu¨Š:<|þâȰÀ +W>ÀX¾8<4tš¦)§Óýè†GŽž››eYæZ£Ï•ýó~c†ã¸ö¶v­!„ØÜË»hYž?eŠjoïб:žçµœë×=¢Óé>ùä£R±ØÑÑFÉx$¦hê‘Gµ˜­o¿û‡x<¨Õj/^àyÞl2_éíé Nžzò–a?üøý/W‰àºÓ¼@K¾AÙí%U*!Çq6›¦næúU­VÓ™´Ûåþjnªª&’ î°›VµZMeR.‡ëî®bQ% [,½¨WU5žˆëE= X*ºœ®/.5ò…|:“Pe1[æZ%_×K Ý5¦|‘Íf³;zƒAÓ¼!„¢„àÔñãǧÅlÁ*ÆçsùT*©ª*Ïq²"çòyš¦xž·Ùìë×>"Š"EQét*ŸÏÍËúýùç5Ñl6‰DNŸ95=C >·™p4Gs…ÜØÄØ\hîæ&ËJµ237£â¯8ö‡£á|1‡ï±Z«ÎÎÍ~­zƒ|…›T`6—ŸÎµ<ò¡H¨X*J-eñ'_Èg‚ùB>‹ ÏUk•\(HÛ¾Jår±TÒ²fs¹ûÉÁ„ž'‘‚¢^¿{Ï.˲Ï?û¢Á` ) !dÐÜnÏ\hnlì’ªbŽãô¢þâè0À`Íê‡;;»ƒÓÁ‘‘áeËV ¾46j¶X—>ºaãÉ“' „/P_FIœ§õ‹¢xiltbrÂd4¹]nÒ(o;f“Ùép–ËeY’åJY”n—Ûj±æóùP4lñµ4)WÊ3³3B¿ÏÏóüTpª\. ‚àóú´ßkµšÍjs».GƯKõ¹¹¹R¹T,vç\x.“Ͱ ÛÚÒJÑÔÌìL½^÷¸=ƒ! hƒH£ÑX©T0Æí­íE͆fËå²ÕbuØÁ™ ¶Õju;Ýáh8“ɰ,ÛÝÙ=/ë\.Ÿ …CµzMUÕ\>7=;ÝÝÙEUUåy>IK²Ä2,MÓ¥rÉasˆ¢8;7‹1¦(ÊïóÏËl#IÒ\h®X*êõúoK,Ëf³¢(ú<¾P$”L%Bmþ6†aBá˲­-­,Ë^VƱšL%MFS.—«T+ß›z(·x[jõZ6—ílïœ Í ü-þÀtÀh0:¯øJˆ‚¸¨gQ&›™ LJ²KÄhŠv9]c“c§§¡þ‡#ál.k³Ú\NW©\š Í)ªâuyÉ¢ÈÏ…¡éR¹œ/TU¥( ÞG±èyý˜^oøô'ÍÆŸ_ø–¶Lá[ßü6„°ÅçWU•¦)pu|fá3O? tvtJRaXŠ¢ÚZÛ[ým}¾”nØüõ©'ŸQUUsꟙ™!ò¶“L% ÅB­^+UJõz}tlTD£ÁxiüRWG×TpÊëöÊŠ¸œçx„P8Öt[£Á¨õSÁ)³ÉÌó¼ŠÕàt°\.;Îb©б:£ÁOÄ'“,Ë‹E£Á8ridÅÒÙ\Ö 7ð˜°[휎 L:Ú:âÉxwGw.Ÿ»4qiéÀÒF_‚1žž™.” ^·H&BáP«¿5‹J’„1¦iºµ¥B8riÄj±Š…©àÔâÞÅ—»º”H&úõ‚d*©Ò|©G/ºœ.Œñű‹‹ºÅq—ËÇTUµZ­ÉTÒåp5wiGŽÁ*îìèä9¾T*1 ƒÎf³v«]ÛG«:—Ó5˜ä8.Š—ÓEÑióŸ ˲²¢h¶PQÐ}”æá:j⊼þl‰EQ Ã@x9VQp%G#¢(ŽãoKó>_Âàsµè×f¾BQ„/ˆÏã[±tÅòÁå™L¦\.×j5—Ãåv¹išN$B—Óåv¹ëõº¶¤NªKåJ¹X*VkU`¹RŽ'ã™lFK !´˜-.§‹¢¨ºT`‹E»Ýîr¸8Ž“9•N%’ EQJåR¾¯Öªùbž¦iI– €³Åaw0 ãrº,fK¹R. v«ÝåtõÆ\>!4›ÍÚ)hšn÷·×jµd*Y¯Õç™§0Æn—Ûfµ!ˆ €óšÇrn—›çx«Õêr¸´ Q4M;N¯Ç[*—šGƪªJMƒv:œÅRÑh0ºn‡Ý¡õ(/ج6aµVÍåsŠ¢h*‹vx<¯ÖªÃ£Ã¹B.kŠÆ`€®Öªc—ÓåqydYÖêp64‹x!‹ò/êÅÆÅ˜Œ¦åƒË)šÒ±:í½ÐŠj~r¹œÖÛi¹é=.^Ô'’‰R©Dâ~.’$Õj5𢠄•jõ~ª±{)ák%‹ä ùºT·Z¬¢^4è ™Ë²c‹lblbjBQ½^/ b­^‹'ãššoÐ(Š’$©X,ºœ.I¾þZk„Åb GÂÕjµR©HzIH²$I’ÅlI¥SF½|­ˆ²Ymáh¸X.æò¹®Î®™Ù™&›l)›ËBó…|>ŸÎµþ‰¢(Ÿ×GÓôäÔ$EQ*VA$ilb¬P,˜ ¦yFÆÆˆ¡^¯O¦Jå’Íb Gù\NûÝawX-Öp4\«ÕB³e|j|lb,›ËzÜžJ¥Ò0żÀq§ã^д(Y–ã‰xGk‡Ãîdixd¸X*RˆŠÄ"&£©X*æ yíR1À/ˆ‚èt8Ï_<ßÑÖAQÔÄäÄ’þ%Í©ÖD&£©Íߦ‚A˜ Í)ŠR¯×5U)šMf†f´™dŽã´¾V–å|>ß0ÄnD½^§iZY–+•Šfö¹?núîw¿ÛÛÛ»Ð":h†kW“iKær¹Ü]É sC!JàMcõ·øY†µ˜-EéX]›¿Í 7Ø,6€^Ô·ùÛAà9žÓq>¯¨ªª^Ô[-VN‡1¶˜,&“É 7 –e†1è 4MC£¶ÞÛb¶X-V³É¬ªªÁ`°˜,n·›¦hY‘^0è 4CD˲šQQHD—ÓÅé8Š¢Z¼-f£™¦/ïÃ0ŒÉdb–eYŸ×g2šEѱ:Žã8Ž3͇ÈqœÙd¶˜-f³!d³Ø4qÉs¼^ÔSeÐX–eY–a™T:å°;Ì&s‹·cL!J+ME‡ÃÁëx€(ŠV‹Õd4œv§Óá¤(JDžç)Š2›ÍšRo4yŽ(Š‚ò¸=ÚI^`Æj±Ò m³Úô‚^Äo DP„6˲¬ŽåXÎaw¼ Š¢ÍjkLó<¯õzQOS4Ã0V³U§ÓéXÝf7MF£‘¦i‡Ía0dYfÖd4i+ê-f‹×ãe†´üϱõ3ŒVc4E±,{¹ŸÏç­V+EQ -zs&“‘d9Ž4”i¯ÇMQ|ãÍ7žyú™…fø“%¹Z«^å—†ŠUEQdIŽD"‡„k^8ã³ÛÕЈOt.Ÿ^³jÍ­».;ºWœÍï]¦§§}->†ahŠÖÌá ãå‘H¤Z«8yª1­»jÅr–ei.èZg;O%ÁCIîßÈmlå ä…¡iZ³×ß7wDäþ¨dM@A°€$¼Y#§ï‰,]Úį¢(’$‘*ákEÄÞî^". _„ Z8KÍæ³p.ìú¿“(˜Q“ \_¥el!Â$úIƒ}¯\h"‘PUlµZ4‹?yrðÕEÿ=±rJ’¤þ—Í ÿéÿ;UUkµš¢(Š¢\7º'@ Ü1´õ†÷žè—î…ÈáH¤\­:ìö™ÙÙŸOÅj8âþÚèžp§e?€÷\Âpzá$ÂOŒOlztðÌ™!Ÿ×‹1–e¹£­´:p× …C7Š_²pEÿ­‡¤Ðl/óË¥éÛ5’$ùãíÛ]NGµZKg2›6> nÈ…@ î†z î9D×omœR­V''Ç!BÍQ¥U¡(ª»«ç¶¬ ƒ.§ã›/~ð«_ÿ:"ˆLr4ÂWýºk¢$~)fgg¬V›õêUïãp8”L&ÝîÛS¥PÈoÚ¸±§»KUÕ—_z)·ú[ÊU’£‘@ Ü3¨ªšH$¬V«ŒcœN§yžŸ—èŽq«6™b©¤×ë1VUUiüa¬ê új­z[.ñ¡U«Ö¬^ €ö÷÷mÚø(YiI ,×u›¬Öj?ùÙÏ3Ù¬öU–å¶m›œšw)@ý­dTEQ !xíïX%6ð@P®Tòù¼Á`¸xq¤X*vvv¶µ¶^WI­×ëgÏ ‡Ãccã+–/Ÿš L¦†Y:8X.—ÑH­Zs»Ý_«Ïè­­¨ª,+×"˲Jr­„E–ëuièìÙ#ÇŽñ‚ð“Ÿý¼T*]w@0töìñ“'úô Z«šÍæàô̇o»82rððaYUþí7¿™› -l­_½,èçW„¢§{ð€@Q€`èì¹x,vüøñb±pÝ ª¢œ=wþñM›;:Ú½7Ƙa˜‹/&≚$9Žþ¾¾6 ˆÎž?×Úê_È¢_½6îå߉ÿ%@x0Èd3S“S->Ÿ×ã^¿n½$K‚ &’Ér¹ € I’¢±¸Ûé:wÎl1§3™J¥²{Ïž5«×,^Ü·s÷np©TÎçó—ÆÆÖ®Y³ µ~½¨O¤.§«95Æ8‘Œ»]>Ò ƒ€ÑhêêêaÇ®]ï¾÷žÝnßúÌÓÃÃÃcccš¦·lÙ²rÅòS§N=ûìÖ}ûö¿÷Þ{/8ìöukמá¡Ã‡£ÑhWgç¢E½_ëÃ÷Þ{oëÖ­_Ù¿Z­ž:}r.<«6MêÒ4ÝÑÖµ|ÙòÛ•¦V«iQ@0™ŒÆR¥¸lp)ipá®3 Åc‰¥K—j©Z0Æ×}Zjqm‡æ ï’$iûïÝ·¿Z«>¾y3˲·Ëqjjª\©\'Aã-–ËqÜúu߸ÖàsK²üÿôã|ï5‹Å’N§G/­Z¹œ´6°0¹Qˆ¡¶©ñA£áé¤iúÎäP¡o]@ÝéçOŸ>½wÿþb1ÿôSOc¬î?pP/ðím¤…„ûáúuëîØéMS ¼F– ô-^ü½×__2Ð Z³æ¡îžÒPÂ}˲쭅Wø¢¿R©,ðêÐét,Ëôzm$ "KÒ²­ˆ~Žãþ8¨­µõ£mŸLLNb²LŒ@ n™{ A#EQ¯¾òT2i2™v‡Ûí* äÉÂý,úFƒÁ ×kYy9NGD?@ Ü ˆT@ ÑO „ûº\©` î(›¨*V1VÉTïWEQˆ"Ù„¯UÅ*¸@"˜Ýø*èb©þwo°Ð½û1ÆcUUTE^eÏ-j¡®{›…|^§ÓA„*•ŠÑ`ø kÍ Å"CÓ ßñI«“|¡P«Öt:–çùJ¥b4otËñxâÓãÇ7nxÄd2ªÕ*EQÌp“•$©\.ߤä›P,)Šâyþ‹ÜK¹\žäáù<ù¢fs9“Ñx“¬ÚZ¸`Q¿Ö†ÇqÜçæøÃçòyçB²,Ï{­r¹œŽã¸¦Å«²,‹E£ÑX­ÕX†i‡ Ý¸ÙdúZ£Øeb™Ú›oN#ІˆþºW¹~q ߬ó×{ËiŠ¢ÆSrõ^Hu‹± TEUä“ ®î«0ÆB¬ªG>=¶¨·‡ã¸3CgŸzò êK>EUOŸ>ãv»õö~n›†jÿÞ|Ÿ/{›cããFƒÑívÍû=_(LLN®X¶¬Qf.—çý÷ÛÚZË¥ò’%çÏ_ØúôSוªŠ‡Îž]¶tÐh4jváâE‡ÝÞÖÚz£ËŸ˜EÑëñd²ÙOö™§o"kn$¤Îž?o6™úû?wçZ­~èðáuk׎/[º”aèÏ­ü/ò€dY:{nÙÒÁ›wr7*prjJ§Óµø|óúù Ãmm­&£±T*^[¹bù—zÐ¥rytttåŠÚQ³Ç‰D"9Ð߇1>?<Üæ÷kýôUU¯øñÇ/½ø¢^¯¿¾†áÅÑQÀêU«nKƒ¼ö@EQ9²d` Õï¿ù!ªªîÝ·Íê‡ D¡pè¡•+o Æxÿ¡Cýý]ͺŽÝ{^xvëÉS§õô¸\ÎFQ•jõƒ>þîw^þâqš/{Þ-|‘÷÷KŠ|)# …!\(‚@½Að|:Oܢƀëµo àð‚Ád2Éó|Wgç¼MÕj58=-+Šßç“d¹R©ø[Z"‘¨¢*>Ÿ/ëXÝnÈŠã‰øôì¬ÛíŠÅãsssQ]¢(‚Á\.ïõ¸].×\(”ÏÊå’ÕjÍçó,Ë.êí¥(*g³Y“Ñäõy#áH±TÌç n·«ÕïךW*N¥RµZ­£½=“Íf³Y£ÑØâóaŒ§gfÊå²Óáäþè±cV‹¥¿¯¯£½½¡à`Œ‡‡/?y!´¨·7‰ †ñ‰‰R¹l6ÝN'MQÚè®T*MLNA»»:i?1V“©Ô“©ÑÐ]§( µZ-8=-IR‹Ïg6›s¹\`z`àõ¸;n2úûôz}süít&“L&kµZ[kk"™Ìfsn·Ëëñ¤Ré附`GG‡A¯NOÇbñàô̲¥ƒÚ¡p˜eY‡Ý ƒÍj ƒ&“)O`¬ò¼ÐÚÚ:3;»ïàAŒÕîînQ&§¦ªÕjkk«Íjmt'³ss‰DÒb1»œÎ¹PH’dÛ%IR85™ŒÕjul|B–%Ÿ×W*—ö:¨ªjOw—(Š— ôûm6ÛU&“:Vçõx ýäÔT¥Zmóû9žÿôøqžã+•J[këØøD¹\¶ÛmzQðÈ‘T*ÕÓ݉F9ŠêéîŠÅã²,C»:;)ŠªKR (—Ën·ÛírÅb±P8b4;;ÚGFG:Œµ¨·'•NÇb1–e;ÚۇΞž™ÁXµZ­‡ŽIöôööôˆz1OÔëµöövC“¸Wefv¶X,Úl6Û]«Õ'§¦*•J{{›&ÑÊårpf¦·»›¦iŒñÄäd&“5ô]]áH¸Z­J’ì÷·èõú©©€,K€ÎövŽãâñø\(l4:;:Š¥R8.•J<Ï÷twC'§¦’©T8]20pYÉç ù‚Ïç G"Ï×jµL6—/äí6›ßï×(ðN‡#‹e³¹|!o³ÚÚÛZãl6K$z»»!Ô„†ú¼†eFF/ɲT©T»º:9Ž+ª:èõz§ÃˆÆbù|¾^¯·µµ…ÃáR©ÜÒâ³ÛlÓÓ3•j¥P(¶ø¼^¯wrj*“Ɉ¢ØÝÕ …‹¥R¥Z±Y­™LV…žîn­›/•J-¾‡ÃÞè’c±X"™¡ÕïÏæ²™L¦Z­9ì6·Û]«ÕÆ'&Eéìh÷`€zd³Ynåxªëmé¿HþÍàå¿¿LþI_rИEwJø×j5“É461qáâÅæg Èò®={â‰D½VÿpÛ'ù|áÈÑO‹¥ÒÑcÇ>\*9Òèò§§§Ï]8ßæoP¯×EQÌf³‡~:955tîœ(Š;vï)‹GGã‰8Çóoßa6›Ïž??;7733{äè§E?ujrjêâèÈÌìœÕbùdçÎz½®u‡‘hôÄ©ÓÂàÌìᣟR}òÔéÉ©©3CgGFG!B;÷ìN¥R,Ër:ŽÓqóôŽãh†yB(“ÉV*½( <¯ÓqÇNž”$I{öí+WÊÅbñà‘#Ú´ˆªªç/\`u¬pÅð‚1›D¢{öíD£’,¸m[*Þ¶c'‚Ðh4²:Že9Žã¸ù—‹Ç8 œ™›;uæŒ^/îܳ'_(Ô¥º ùBñà¡ÃÁééÓg†Zý-ú&›ƒT—Nž:](wíÙ{fh(—Ï>zTQ”]{÷æ EE‘?=v ÀÐ4Ï ¢Î]¸œžffÇ®ÝÚÝ‘Èñ“'m6+˰åJe÷¾ý²,ç Å{öˆ¢xâÔéé™YEUišFˆÚ¾kW½.Ñ-EQ†‡Ái†a·ïÚ­=pù¡œ²Ûl““áHäÂðp dvû®ÝŠ,ëX§Óif UUõzq÷Þ}©tŠehžçY–å8ަiA„ÇNœœ …c£@ pêÌÁ`¨TªÅbqÇîÝ¢(œ:s&8=ÍqCÓ‚ DÕjuƒÑ8 :˲,ð6>>:6Æóüö]»ªµšv‰dr×Þ}Á‘K£ç‡/Áá‹#*VwîÙO$Ž;–L¥TUÙ½o¿¢Ü{Éhi“Ѳ_ýø1ûu¿Ï‹Pcì€eYiŸ˜Ê)M×ôwÀÞÍ0ÌØØx.—›gS.–JÉTjó¦MÏON€„ñX\UUUÅÑX !¤ ¨UU — .õz=v›À2ìÈìh6—«Tª*VÓéÌ…á …BA–$a‹¯ÅëqŸ:ëoiÑT­h,¶bù²Þžžç†Îx¡£½­µÕÏs¼$I!j{[ë@_ß¾V,_¶¨§GøOOœ?¶i“ÓáÈçó±xÜfµ¶´ø|>ïUC+=·Éhìîî‚®Z¹B³Ö †Ÿ÷ôꊑ·œ™)KÍ1´UU'’:nžÅ&_,Äâ±—_zI„©@`èÜ9š¢úûú4«Ífõ¸Ý->_<‘˜Wçí­­ý}ûJg2ç/  E©^gfnv.—Ïk†©Á%>Ÿozv¶q”Ûí:pøp4uØí±x"‰:Q zý’þ~„ DÈívéõúîî.Š¢¦¦åJ¥P(f2ív0Æ@pÙà`G{; ™J¹ŽÁ%cÉTúüð…\>W*G*Îæ²ÙlÖjµè úî®Nš¦'§¥r©X,f³ÙFSÀ@__[kk8‘eùò>¥R6›aYÖn·™MfK‹$˵zmf6^(X–5™LímmN§ƒ¢(ƒÑÐÓÝ¥ª*MS}‹y½—œÓáàtº‹##+—/…#Édêüðp.—+‹---ƒ¡§» BȲÌÅ‘‰L&#Kò¢ÞžB¡Øõÿ³wßAŽi¢Ø3Ë(xthïgºg¦{¼#—\’Ë]î.ëwÏéî](Þ¤…"!)¤/tñî=]ÜÅžîÞ.·{ë¸æ¸´ÃñÞÏô˜öÞ[ e3õGÍ€`÷»ìÙ3³ß/&&ºÑ@!+³ðU"+ëËÚJ©Ó鬮ŠþL6D··µ­rÛÓÕUYQ¡*êí;wR©Ôï}õ«6«•Rнs÷^cCCSccñU,ËŽŒŽ¦3é•Õ†Áõµuáphnn~iiÉl2556˜Læÿì§ýƒËñxO_o2™Êd2.—»2®©®žœšÊæ²cã]»BÁ ÇíZó9,ÀUÑXU,ær:凧Øâ«b±ªXÌår*ŠBtrñò•ƒûöUVT<òÓm6[êêj …ÂÈØ!$žH\ºrå»ßúfñÄc|Çjnj|ç½cñD\–åT:Ete˜ÚšŸÏ{õÚuMU9ŽM§Ó‰•†a¢‘ˆÝnŽE#^G’¤Ñ±ñx<¡ÈJ*•*&7žœœjnjlmi ƒÇNœ¨«©©ŠE;¶o×5½·¯|bÂd¹l.ûM=)›½¥ËÉdƒþŒ1-¹ZÀ²Le8 ¢„Êú1B/4XDßLSŒJç¨ä …ó/>{ô¨Çã^M¦0F«É”ßÇes9UUA˜žž¶Ûí²$»\®¶–æã§NÜ¿zâÔéðgT‡Ï뙘œðù¼Æ ¯^¿^]]UW[{ùê5Ÿ×+Z,;Ú;t¢Ûíö’##„0f0Æ@`|bÂírONME*+WVW×Tô¯Á8àŒOx\îÉÉ©Úêêt:3>>Ž(ZXXܹ££P++ÉdÒjµ&S©Ÿ“‰ÁŒ,ËKËË^gaqÑöá‹x ÃäryI–—Og2®’ñ"Œ±×ë©×kwíÜI±Y­§Ïž …Bõõuç.\ôy½““¡`(›ÍG«A¨ŠEO=÷ò‹/ŒŽŽ½pþ•—_~°Aü¡úYZZòz½^¯§Æáh¨¯×4­8Rïq»ÇÆ'B¡ƒ™âçÍåtF**Ž>̲¬Ål–eyßž=óó aŒðÒò²±ÁªªXcCƒ¦iF’,Œ±×ë ‡BÙlÎ*Z×<‡çùÕÕÕ•ÕÕL&322úüsŸK&“ˆ"žç—q«UÄ VuiyÙép Ò=AˆaÙ£G _¼|åÐÁGâ8Îb6ËŠ¢ªêÒò²Íj½péÒîήŠpÅøÄÇqÙlv9w»\<Ï/'V›Ò¦2kª–Jg¼ÏØØ¸Àó³s³5ÕÕƒƒCSSS±XLàyŒð®;‰•á‘#ú§3™ËW®¼ô &“Ù8çÉŠœJ§ ø:!²¬¤3“`ª‡*Âá#qŸ·µ¹YÓu³Ùòp !Œ3™ÌÅË—_xþ9«ÕZºh"~ðùÅ Ãx½ÇÝÚÒ¢ëºåá–ý~_÷»±Htrzª2\1–d¹P(,,.Ô×Õ¥Ó麺Úh$¢kz¾¬Ã=B ƒ]gYÖØqö›ßúöý”WC¼ÖaWv·…Ð_úOVä =‰)Ï›ÀüwŸÖ„,W‡Ó²FÚI–|¯$IÑhÄfµjšv÷þ½ùùŸÏçr¹†G†ççÜnw]m­Ífëëø}U±ª¡á‘Á¡¡B¡©¬4®£8ŽD"ÑÓÛ73;[S]ÕÒÔôà9ùB¤²ÒåtŒ6æ&&&-KUU¬"îíí3›M¡`PQ•±±ñÊŠp.ŸCÅž™™¹výz:ÙÑÑ‹F)!wïÝ›ŸŸ÷z½n—KUÔѱñh4ʱlÿÀ@>Ÿ  õuKËñÅ¥¥X4âv¹z{ûL&AEBh(|ð‰eÙd*5;;³g÷î…ťѱÑH$ÒÖÒ îÞ»766æp80fûŽŽö{=½ápXžã2ÙÜÐÐ0¥$.--OÌÍÍïܹ#\½~maaqiyùÐÁá0Bøî½»ssó^‡ç8]×ì)N—³¦ªjdtthx„cÙêêj£ÿÁóüÜÜÜàÐ0ÏóÑÊJÌ`Ñ"ºÝ®Õd²²¢3¸p0è÷³,g·YEñÁŸ*Âá|!‹Æêëj{ûú£‘J–eY†1®™Ùíö€ß¯ªJ,Cˆæó…H$’Îdötue³ÙB¡àózB™LÖb6{½^¯Ç36>>08”Íf++*Ò™Œßç·XÌ©dª¾¾NRä¡¡a]×B¡ Ÿßl2e²ÙªªX2•ôû|±htl|b`p0›ÉF*+ïÇv»]QÕ¾þ–e÷tu.Çã·ïÜ››‡Bm­­Á@ §·wdtÌø¨.Æ3·ã„YÌ0Ï,5ŒÑ‘5ñHUUãlðûŒ ]ø—ÿöæ¦$ºÁKÒ{M#þõÝë§Od³Ù¿üÅØ( •eUY^èp³„¼wåâhúk5Ù¶[\¥ËHðP<›?ëºÎ|ò6 „¯¬jšVܦ±YæqjÔGÌ1xXÂ5kUt÷Þ½d*u`ß¾Ï kŒ„¬™?§Â|Ä|µÒjYSc¥•¹áѼ5;R|ÓõBŠ“êt]7zs¿qƒ”R]×Oœ:ÕÞ¶-‹~Ô›ËP¢iNF³ø’Ò–ZSo¿MµPJ›½[óW]×9ŽÓtý7ßܽ«³²²‚ã8I’~úúÏ_ùÒ]Nço,êG½;!„òñKSýöŸÁ OŽ|äQºï{¹±…›·ncŒKg‹wmfvöNßôÿÛïF Yö±šáó¿Ò¤ëz.ŸG”Š¢Èq!d³>š¦kš¶þ(ÔtM#•#N²íˆYïOæXLÕÛ®Œ¥×^•6ªÑxŸt&bqØäƒË >P6¶ÁÏR±„kÖ2imi/Žuü65ðÁ–?:‚—¾ÑšÛüüëõ;ò1mQúv¿q™¤Òy–×oÜ”eYUTc®×G½évgÍv>j ŸtÓŠŒUòõ3,Ç~ð+ÃðWúÚÙÙG¾;Ã0õ’/UYêù·i÷ߦ’?¾œ#–eJ»¹Ÿt×¶688J{Ë0Ö¯éÄ8õ­=IªZ–Å&¦5jm¥„J©°?)ç7‚ 475A=¬!Z,ûöî!ºþY®’±µ8–}ù¥‹!Ìd2}ýµßûl|raŒÛÛÛŸ¦» 7F „Íä²^·§ôEt5•RËt‡ðŽJK:§~ÿì2¥ä÷¹›ƒ&ªÁ¡Êô˜aÄßâfã§Ìšk¤–ß½ØHçééZ!j³¡ U¾{¡·6È~0» #Š˜»“Z‚©/K-,:v/9“R%ç{“²øÀÖ…~‰±žJ6ž[ùp?#ó—gdæÝ¡ÜÃ/èÂTèÚkÕú`ëB?BHǼÎÂb¹ðÄ€|ý¡<¥`™à³PÄ þ¿¾ZÁ<þ³S»„‰®©j*1‹üÈgo2ø¨L~##ùâ“2]·´Ì7®¦(ÊÍÛ·kª«›ìyÓÖG}B4Mã8n÷×è„Ðߺ ¶öv9c7?>«³ªª,ËþÆJ{Pc42Ò¹sg—åð8„ÿøÕ ŽçY–e0ƒ›{?µì<%ê#B?ÃàÚ ññ?:{u]WUu\æs…G„~BÈ™sçêëÌfóÝ{÷>ÿÜsŸôˆ!”^¹v-66ÔoÕž..-™Íæ‡9a> IÒr<DÖ×Ìõ7]n—,Ë~Ÿ¯˜\¾hxtTQ¿Ïgü:3;›Íf[[Z>ª©tºP(„‚ÁB¡ðë·ßþÊ+¯l`úãØØØìÜÜ‘C‡~cèº~ùÊÕ¶ÖÖB!ïõz7öiL§ÓFzä5//Çyžs¹\º®ÏÎÍUVT¬?©¯¬®^ºråå_ü¨O!äcÇvíØ‹F>¾‰••ÓgÎ~å•/Óä'&'ÇÆÇŸ}æ–¯×üÔŸ»p¡¡¾þcØ·ÛÍ0ÌèØXkKK¹:fž©­°òFèœnûcäGõ“Ÿ†þH*•Îæ²&Ap:º®?Ùˆ\ª¦‰ ÇqW®] ‚ÍÍMÎ’…±(¥SÓÓ/_ùÒË_ð¸Ý¹\^x³ÙœJ¥V“É•ÕU—Ë­¬L¦d2I(e0v>̶633S_WWŒkn—ËfµB2™Œñ¦¢(jš–L&Uu9}ýý ‹GL&MÓŠÓv5MËd2:!VQÔ É¤3Ñât84M[Y]Õ5Ýétˆ¢˜ËçWVV––—‹©²$IRTÕa·çóyM×v»±Œ”ªj”ŠP]m-¡ääÙ³{»º"••V«5Nçó»ÝVº I>ŸO¥RÏ[ÌfQ3™ŒñQ‡¦ffž=rØår¥Óé\>/Z,6›íúÍ»cû¶6UUß}ÿý/½ôŸÏ«išªiD×].˲”R]Ó“P:!D·Úlf“IQ”d2E(q»\š¦QJ$IÊ n·#D]YY‘dÉn³9œNE–ã‰D<‘!”Ëå++‹KKº®£/ds9E–sù¼Ýnw:Ùl6“Ép<ïq»ãª/Øí6I–1B>Ÿa˜t&“Ïåm6k1ûž¦iéL†"Z,¡t*m¶˜]N§¢(Ù\.ŸÏ[E‘"˲ßïA’¤\.Ç0ŒÃáÈårf³Y# ©®ë©‡/_°r¹œlÕfs:¹\.Îp<çv¹E)U–eŠßçc&“Éä>\TJi&›Íçó³Ùét*в²ºÊ±¬++’$Ù¬V‡Ã‘J¥(¥Ç¶¦ë·;—Ë-..©ªêóùŠý!Ji&“QTÕl2[­b&›Õ5M'Än³™L¦Ò·@¥R)UU ¡>Ÿ×ønÇq\c}ý•ë×[š›u]O§Ón·ûwmy8ö»ßýN]]ý†¿OJ––'&ÆçæWV,Ç­Oõ^–^!$™Lªšb¤oCݽoeeõæín“`J¥S>¯—㸅…źššk×o  -Å—‡‡‡M&ÓÕk×kª«Ïœ;74<\S]}üä)ÇmÜß<¿°pâÔi»Í619Tf2Ù©éé¡áád2ɱìésç0Â7owWWU]ºrelb"—ËŸ>wÖfµ]ºr%à÷Ë’tìø I’nußñxÜ·º»‡G(!®\ÞÖÚʲ,EhphèÔé3²¬JΞ;o<ÙëõÌÏÏ_¼r5—Ïuwßq»]÷{z$I6›Í>Ÿ·´{z{ÇÆÇE‹%à÷_¿yc¬jÚû'OÚl¶ÉÉ©P842:ªiÚ™sç—–– %@€a˜x"q»ûÎŽööâm;cãã“SSŠ¢\¼|9—ÏßTÞ½wohd”bLýƒƒËKËf³Åív ·67˜x"ñ“Ÿ½®j*DzgÏŸÇ_¿y3hºÞÓÛ»°¸ØÛ×W½{ì˜À ËËqžçkª«1ÆËËñÓgÎÖÕÖ^º|åν{ uugÎ3™Ì§Îž™_X”åæ­[ f†GG†µZ­ª¢?uŠa˜ë7oVWW7ÙJ’ôαc”СÁå¥e›ÕZ|N$éíë]\\2›Í¿ÿö;étæòÕk³yhd4ŸÏ›Íæl.×ÓÛg1›çÝû=Ýwîʲ yŽË SSÓ õÝwï޻߳²ºÚÛ׋FÎ]¸°K’ìv»GÇÆìvû­ÛÝ&“Éçõ•ãÖÍT:}éÊÕX¤òü¥KFŸ`euµ¾¶öÝ÷s,—XIY…K—ܹ~ãÆ{÷Ÿ¿p¡µ¥exdtqyéîý]×&¦¦zúúTU}ÿÔI«h½qó–Ýn§;~œa˜k7oTÇbÆ÷‰d*õÃÿDU5ŽåÎ_¸H½y»Ûãq¯¬&ß;~Ü,˜Þ{ÿ8ÆÌääT*øýï¾ÿ~2™’%iaiyqq) ¼ùÎ;N§óìù „›·»=n·Ãa/ý¬Ý¼}ûV÷–aÏ^¼ÐÚÜ<:6¾°´x¿§WUÕ™¹Ù{÷ïëš~ìÄIQoÝî¶Š"Ã0ï?Î0ÌÕ7b±¨±òb*•zã­·Y–‰'VBÁà©3gV“©Ññ1MU½^ïõ›·Ò™ô¥+Wà/ÿít6‹ºßÓ3¿¸¨ÈŠË韘L¥Ó,Ë\¾rµ­µÅ¨É™™™SgÏ$éVww à?ñâÔÌÌÜüüððpuUÕÙóçWWVÇ&&dE±X,?øñOxžïíï#„¿ê„ܺÝDtBÞ?q²µ¹y3cJéL&—˃Áb—ÿñ9‘¬®®–æ+-6îf¿‡.-.Æã‰ªXucCÓÕ•SS“étú³Ù·ÚêQM‚053]Ú¿Êf³Ã££Ï=òü³Ïf²Y†arù|<O§Ó©Lz9ÏåóÆZ?”Ò¡¡á®];;ÚÛ««b¡P0èv9­Vqlb¢·¿_×I.—››“$‰Á¸¥©ywç.«hÝÑÑQ®H¥ÒýƒƒíÛ<¸»s×­în„ðö¶Ö];w0—¦,ol¨?zøÐüü|Çöm‡ÜÓÙyåÚµ{÷{Ò)Šr¿§çÐGŠF*¯ß¸12:öì‘Ã]»BáPC}}uuUWç®õÃßáð³Gލš¶šLær¹L&»¼¼lµZá°(Zæú‡~ç®M Ń?ðkº¾/'IZZ^^I&á Çñ{vwíÚ¹ƒçùH¤2 vîÚ‹F‡GF5MËæ² ‹Kù܃t¸SÓÓn—{wWgSc#¥tpxDUµl.»¸¸¤(JCCCU,º»«S„úº:£Û‘Ëç«b±––æmm­ õu>¯wßÞ=>ŸcÔ¾­íðÁ–’Á¥|¡Ð?0ðÌÑ#Ï=ŠºÕÝL¦<¸»«Ófµêš~âä)¯×ÓÜô >Dz5Õ5f“)ŸÏ §R©}{ö´6·ðŒ1ZŽÇó¹|.—3²ÕVÇb»»ºœNg[kKssóÂâÒÌìœIŽ>üÂsÏݽ? ÍÎÍ1˜)¤Åå¥\>ŸÏçææ×µ¥©©s×N«h•$)‰Øm6Q´LLMQJëvwuYEÑ8WVVGFÇ$IÎæ²ñD"“É<è]²¬Ùd’e¹*I¦RCÃ#Š"+©1 SW[c6™$IN$¢Årpß¾ŠŠðr¯¯¾®nqqIL5ÕUMíÆWŒìå ÆˆeY„‘Åbɤ3²,g³Y»Í¦(ªqæg¶ôû>ƒÌ0¢ELg2²,g²Y§ÃQ¤t:ãr:óù‚ÇãI¥Ò²,+ŠÂó¼üp”ŽeYÌ0š¦$Éb6çóyŽãAH?(ó·Ôa#OúÃ\ä»»:çæ‰D0,-†ÙlI§3n—;ŸÏÛíŽÅÅ¥l.g,çÂ2Œ¢¨’$!Ju]§â1Æ&ACÛ·mëhoEqhhhvn~GG{o_¿ ðËñœ‘þƒ·c˜¶–æ‹—¯TE#&“ùâ¥Ëu55¼ `„T"Ba–a$IÒ4M0 U±X[KkG{{ñ;¾ ÉTR–eMUÆ&“`¬c<'™LeVåÄ©SÏ9©¨@±,#˲¬(Å17îÁ LéÚª¦êšn¤Ëç9^Q›Í¦¨J¡P0®1²,ÛÖÚ:5=³½-c¬o¼¸´tåÚµÏ=:2:Ær¬¦iIR5•RÊ |.Ÿ—eÙ¨BHqQ0#ćË0²"_¸x©¥¹©®¶fhx¤Xà Ã"ŒY–¡ˆ &¡*mß¶­´6ЃDóX„@ °m[ÛŽŽv‹Å2¿°ˆÆ}O†Á!³ÙT$©PÈåòf³Ùír¹œŽ3çÎïÚ¹ÃjµýíÛÚvv´[,¥ä+–‡eYQ._¹ÚP__W[Û×?PÜ †aÆ,âX4ÒÑÞÞÑÞ^Lf¶X^záóS33¿~û¯¼ò%»ÝÞÚÒ"Š"DzñxüÂ¥ËÏ=ûÌøÄ¤±ª0Ã`qº¦åóy–e™‡e`0f.ûgdžÈ¤Ó²,çr9«Í–Íæ(%š¦iºf±ˆÆ[XEñÁËb0f¦tÅ|>¯ªêÞÝ»†ùÝœð³ùÌÂT××fÕÁ‘uß26LÕ´ÿçþK&›ý_ÿçÿ‰"ÉÒ;Àq.—ëν{ЬD"«(^¾zíè‘ÃKËËCÃÃöí½pé¢hû¶m¿ŸÁÌíî;Ñh!tçÞÝh$RŒhm--ïŸ8155Édªb1·Û=<:ÂMp6»m{[ëésçççD«xøàAAX–ʼnf³±ÊÏqm--gÏ_xû½÷¬¢õÐÁ·»»4¼˃Q/ŒDzÇa„Z[šÏ^0ž,9t¨ Iç/^ºßÓ êêì6Û™³çdYnjlxȨ Œ±q=< yÜî³çÏ›L¦®],Ë‚`Gc£Ç #••ÇŽŸ@9tÈl±´¶´œ<}¦®¶V¯×ûð廞?yæŒ"[[š9–ã8Öh ŽãÜwß@?¥ÔawðaM™—¯jìœ=|è 1L\,ƃ20 ƒ±1+‘b]×Â,˨ªJ)5>Ãkʯjó0®,ËF^\£Å©¥û¾¾æKwÓ(°ñƒQ6c#¥G&!DQÕžÞ^EVöïÛ[|#ã9:!ÆÂOš¦)Šb2™ŒNoÉ6)¥¤XQ¥U$Ë2˲,ËJQICÝvžç‹×ÒÔóŠ¢èº.‚±_ªªÓ‚KË_ÜÓb;»ÒFÁŒ#­¸‘:´Œ­Óú¯i cv¯QÅÆ->ÓØeB2:¿Ρ¿æå.ªñ){dQEÕuÍl6%1Ž4£3aüÉØfqÖ×üšRé'ˆRúæÛï´µ¶D*+׿fJ4zqûŠ¢\¼t9 ´µ´\º|Ån·µoß¾™p<3;;66îrº[ZšÇÆÇ5U£ˆ664ðò9Åm¯55¶æiUÈõ›]Sf´nIH„P}]m*Z]M†BÁÒb¬yÓÒówq›k²“—–ßT2Ê·&äú ÀÜ©GîÎÛÿðF4Më „ 9tðÁÐSÉsŠ(9Ž[¿~Bˆa0Bì#«¨¸¶äOãâHfé ·Å'¬ç,ýuMù?f€5GÚGZkjcM[”¾õšÆ-õAXóòO£¨&“€ðÈ#Mx„ø5•üÈšÿ¨Œ®ë#³É\,Ûš·À%'ª‡sSf³¹¡¾cÜÙ¹‹ßÐ+k(Šò“×_ÿÖ7¿ñ‹_üòÀý¹\þÚµë_ùò—ÿñŸÿù«¯¼24<299µ££ý_òÓ/¼øÂü“?ý¯þxttôʵë‡Ø’§M‡~BÖ_A&FvýrÐ4íÝ÷߯‡ …B<‘8räŸÏóûöìyÒ÷‚a¿ß_(^|þycMŒãàþývÛ'XÜï÷ûýþÒžbYz¨™t:Oˆ¢¸wÏ·ËõÿÓZŠ/‡Cáƒtvvþí÷¿oÌ{¾qóf*•* ¡Î];>üDŽõc+ª"kzyT’%Ž-Ï“SS.§óóÏ?1úá~¼´´„1S®¯à ú„‡J®TPìãÆñ-dµZê뢺®K’4¿°À°œÝf“Y’ä‰É‰p0TS]Íf¾øòˈ"—Ë977·…Þl诩®¹ßs×év¢ÒË篮$÷îÙ_–"&≣GŽ´¶4B¾öê«SSSµ55y –k<.r¹<Çs»#“Íüôg¯ÛlÖ¯½úªÓ霜˜ü—üÀl±|å˯x<ž¥¥Å_þêWV«í‹/Áåriږű͆þ@ ¸k×ît:M?<…±©¾Õ±.ÁÆìÝ»=¼,ÞÞ¾½¥¥y||5ÀãÃëñüÙŸþ©¦i'Oúη¿Uó<ÇþðÿÀépQ¾üÊ+š¦×ÀƒÀÜëÇ{ÜÛmø]†16îÆ0 ƒë̳ k6›K/ž?& Ó § ”‡Ålþoÿâ/Š35Ý.×óçÿÞR¾ü úàqìøÛl¶ÒÉʶO2õè³¹dàw„~€ÐàiW†±þL&“J§hI6M–e]n·h¡~à)ìõ¯®®ŽŽŽ˜Áf³Ûìv›Ýn³Ù–èÏçóP¿ðöúgçf«ªª¬Ö]ÅE‘²²’XŸìiÃŒ’û! -[úEfYf}¾~ŽãäG.¼!„ÿòÿT¤¿øó¯ëz¡ AËÀ–…~#Ù÷ú¤Íº®‘ò¥"]Z^›˜0™L+‰„Ó¹&_€Of³cýºNôGÑ4­ôÂïfPJ§§¦»:;÷îÞ}ëv7´lqè'ŽüºNôrõúu]?~ò¤h±d²™;wïy®lYèGéÄXÕîCÿ4U+×ê“KKË™lÆj³U„+——WVW1ÂÐr°a›ë…ãc#áŠPi8¦”NMNµ·ï,K‡†‡8øüçž%„BîÝ»×ÜÔ$)Ð÷€- ýU±*Jéììlé²Y,Ë65µú¼¾²ñðáÃøáºäGVejj Z¶,ô3 S[S[[SûéÑXnÛX †a˜G. à„n¨€ÐB?ý ô€ÐB?ý ô€ÐB?ý6¤ 4.,.¬¬$HÉš\ ÃúýA¯×˱e>µP K3ÀV‡þ……ùT:US]Ëq\1:ßèýÁÏ{+]ôJGY¢?} ¶>ô/Ç—kk>ˆû„ÒûÃK§î/Û¼ÞÑ…TY‚µ¦iý7Ca0ãžûܳÐl°›í’kš–+(Ç/_»?-ÉJÏÈâñîyA´ My¿\>³ó _ùò—¿õÍo„BÁùÁs¹´lY¯Ÿèdr.q¬7ñн“+ñ,a,¶Ññ¹oìóøì,ÆåYD—縀?àr9]n÷¥K—Ç'&kjcÐx°5½~è+oÖri™*¼·ÚFÇæ¾¾ÏßÑ$%K6–‹Àó‚ ¨ª-[ú !n»ù÷Ÿ¯V“ñÁéäÀÈÜ×÷yw6‡X†)ãUYJ‘NtMÓç2™L(‚–€ Ûì€ÆXÓõhØó½çñõûs5íþަ Žc³Ù Ômfg&“yý¿d0ž›ŸûÂK/ú}¾¼Ãý°E¡? õ¹=nJiG=ÏrÊÌüB(_Ùµ³«,EdYö/ÿÃÿ©B)e06™L“““Ðr°e¡¿²¢Ràùx"AtÝÄYl”ãªwÖy<ž²cìv»yýš¦išÍ[ú1Æ@0BUÀ“rø„~ú@è¡„~ú@è¡„~ú”ÉfsøPJ3™L.—%%ÙùY†±;VÑ õ Oa¯euel|”ç«h}@´ÎÆóóãkï]Ò …*€§-ôÏÍÍVWÕ8QE‹h1‹ñ´öÞ­%äð¿{žèe[£Q×uH× EèWU§hhbij~UÕÔ™ÅäÏϘξх—vúX¶<×!ÿôÏÿüwÿš¦éº^( å`Ã6;Ö¯}b&þ¯}6¾½ÊÖ3žäìξх£u\mH`\–RÆãñ¡ážãV“I‡ÝNŒ#ÀÖõú‰N8eÒY*˜ïÍH‚ÓÕ7ºô¹Ë3»¢•g´‡R:==³££cïÞ=·owC›À‡~€Ûò½#¡É‰…œ†{FŸmžéŠšŽ”é/!äÄéÓ>¯GUÔ»÷î$ š ¶2ô#DÆ­u¡o¨‰…gê…g»ª,f¡ãòŒö,/lj¥ÈápÌÌÎ&W“ah9ذ͎õû}þñ‰±P( Yþà… ^àU]Je SSÓM -e)âÀàÀ¡^þÂK„„лw››%®ôÀ…þÚÚ:M׆‡F‰N(¢a„Çqõuõ¡P¨,E_p:v»=‘H¤Ri×ãõxÖ¤oÀØØØúyD„ÍöúAØÝµgwמuçÀ²ÉØívôðê¹Åbáy~uuŽ6Àãƒçx“ÉÄ0ŒÛåbÆ€<Ï—ÞÛÄó¼Ãn/þZYQaü ‹†B¡r-rõñÊÈ2õÀ“Ò·„~ú@èðd+Ãe^ã®5ÂBíðÔ†~Y–GFGdYÂ%wØJªNk]u4àµCü€§-ôOMO¹\.¿Ï_ìãËŠþƹÁ¡åé¾÷¿ýñ>žƒµºàé ýÙl& ©ª†1f,«ú{—Gg24§Ð'_Æ1ŸÛÝݺNÚ·o#„(Ÿ~FS€Ðÿ‘t]_\ÉüäÔxÈmþüžèÞ…‰$YɪZrñÙÃÍ[žËÈù|þç¿øe6—ûÿÇÿÎ0Œ¦Aè€ÛtæNB+éñU5Ìÿë¾ñ$Id5&ŸüÎsU[¾|ýssv‡cû¶¶þÁAh3ØâЯëzÐ#vUàÁÉ•p4œÈél~å;ÏU…}Žr­¥E¹sçî³G664Ü¿ßXþÀ†mvÀ‡j1ó/¨!Ç.ÜŠØÈï?_]påóyT¦N¿$IgÏŸ÷ù|”Ò¹ùù_xš ¶2ô &!I{ÜžW×v6®8րυJ¥“VÑ^–"ö tlßþ¯RúÃýhllÌáphº[ú›®ß¸ÚÓwŸJ(™Ãxc3^·¯¾®©,Eôûý/½ô¢Óé$„¼öê«ñD‚cY­¡¶(ô;ìŽgŽ|N–åÒ¥ZX–5™LeY§!‹FB”RŒ±ßïw»ÝãããÐr°e¡!Äq܆ùðÙƒôm¡„~ú@è¡„~ú@è¡„~eR†Ü;º®kšFééù1Æ<Ï3LùÏ+e\ì ôoPA*ŒŒ ¯ ôº®S„êxž‡*€§-ôOOMù}~ǃÐýqJéüü\<‡Â›/"¥trrJ×5J©`2¹].h6ØÊПËçÂápi²~ƒÕfÍåòe)¢®ëùWu`ÿ~†a††‡vwvUWÅ å`ËB?щ®« ƒ×=®SBÊUJ»ÝþÅ—¿àr:ÿúoÿ–çŸõx¡ï´Ù+±:Ñ5M_OÓ4Bi ŠÆûý>§Ó±¼¼ -[Ûë×5M[{J(k¯¿H–eEV, ´l]è§„RJ×uð !eìó+Š215iY2ßïéq:5ÕÕ:Õ ñ`c6;àc·Û—–5]Ó‰^ü§éÚâÒ‚Ål.K1Æ]»vÝéî¾zõªÙlþƒï}×\¦-ôú7¢±¡év÷­³çΖNòá8®¾®!TŽ™!–eÿ{ß5¾[躮ª*ŒõÀV†~“É´oïþ½{ö­ïªÃ·ðt†~ˆòðÄôm¡„~ú@è¡„~ú@è¡„~ú@è¡„~úB?€ßeX¥K’¤‚T „~p>aÑ* ¼õ OaèÏd2££Ã^Ÿc?Ø”¢(“ãÍÍ-f“ªž¶Ð?=3‰ÄÇšÇY–K$••›/"!äêµkŠ¢`„GMM54lÆfÇúeYžmÍ?“IPUµ,E$„üè'?•$YÕµÓçξñæ[š¦AËÀ–õúu躦ixÝã%¤\¥EqÏî.—˵£½ý¯þóÿíq»Bá4lM¯Ÿ]Ó4}M× ¥e-*F9»ÝžJ¥ å` {ýºNt]×מÊÚëG!DBÙ\.—ϯ¿´à³ ý”RJ(]×Á×uRÆ>¡Pè¾s—ø»wïÕÕÖTÅbŠ&CãÀÖ„~¯×753U#ŒKÏÓ3S -e)"Ã0ßüú×TEÑußÞ=õõõs³³ú`ËB]]]¿|çÎ]½dx‡ã¸¦†¦@ î¹7K“6Ë’ ‡àñ!IÒÈè0Ïñ,ËbcôÉB?ET×u—ÓJ'1Æ .Ûx ¡dMYt]7 æ'¦×_Úñ‡ã ðX!‰ò<ÏqÃl$pg²™¡á‘êXÌãñ”k±“GÒ4mtl Æú`ë‰Q’ V«õSû!ã䡸³Zwà øÝ¡“NÿgÔëÇsPÝPF²,çò9·ËýICùšgSJçˆN†q86«zýð8¢”æò¹™ÙYc.¢ñ?!dxtDQ”Ò§=²Û_ú!dl|L×uI*ô ôÉòF&µONO¥R©õ'èõ@y‚~<‘XŽ/+ª"ð‚¢(㓚¦y=^ŒÑÔôt.ŸE"v»czzº þ€ÏëýøoÇŽã’é´ª©¡É©I]×#•Že——ªcU…Baiy9 NMO²Y­£ãc#EQ—qÑl …B‘ŠÊÒ÷‚^?l!$›ËMLMVEc••a†a‚`(š˜œày^-•á «Õ¶°0/ÉR0›WTõã7+ËòÐèHO_¯Àó‚ ŒŽò<ïr¹GFG8Ž‹ÇãÙ\.¾’ ”Œñ<ïv¹GFGt]_ŽÇ-f±"¶ÛlÀçY{ŽyR{ýºNJ¿=ÀVÑ4UÓ´•Õ‹Ùd³Ù¥#M×çæUUUT…ãxŽãí6›Àó©t:“ÍJ²Œ1FöYÿ @øHEÅØÄD8Âg2Ù|.o$_à8ÎïóÇñ•ÕÕ†Úº¾Á|þÁŸ(¢,˺].QM‚IE‹Åò¡7zr/óf³Ù™™98æ[n5¹Êqœ×íYM®$‰Rºš\%„VWUõöç0B,Ë&V·Çáp° ©¬Ô áyþã·Ì`Æfµ5Ö×;ì‡Ýn1›}>!cøoßévØ¢(:ìv³Ùì÷ù!¥y xžO¦’f“Éf³•žZžø±~ŽãxžÿÌ&EžVº®+в±T1 ÃX­Ö†ºúx"!‚ßç÷z<ù|~iy¹2\i2›êªk≸ªi¡ðÜÂüìüœ(Šv›íczýãp(Ì0ŒÝf¯ŠF ’TWS;;?7;7çt8v‡Ùd®ŽUY­VŽãêjkgçüÉfµ…C!ŽãBÑHtn~N’%[é{=é—yAp8î9ÀãR*IR&“ÙXôÇ»]nŸ×WÌÜY_[W èf“ÙétÏŒE¢”ÒõVŒ>4Á“a˜X4jüðŒj«kНÅG*#Æã&ÁTú§XäÁ -fs]MíúÂ>Ù—yM&Ä}@Y`ŒM&Ó&ÓÛ`Œ‹1½ôçõO{ä£è·Hùù1ƒ¿åø~Ògø¬ÍC › )[˜ø“¦zÞÌ;=Ù>ù|žaAàl¥4›ÍnU‡ÒXã…~VïþĆ~ü ²2™ ²€-§ëº1Ê¿ï ”ÒDb%à¬&“,Ë~ªãØ…BaØ'/ôÃgË­&Wáh<_(¡ËË ŽçX–e0Þ@úe‹Ùâv{ R!±²ú©:±,ëóøž°ÐoÄ}žç^ÐT"X¦°•Ãa–eEQôù|<ϳ,û1WwÃùƒR‹Ù"ZÄOûD¥iÚú].—ÍfÓu}k¯É~×#?Æ Ã0 cL¢§”B†Ùp\úÌ֠垬Z6®„aFýBŠº³¸IDATèl!#ôôëïo åÒÓ„~ÀÖöG Æ à J+ðDöúÑÃ; îŸôú?õèAðX…&ô®°øé†~MӌѫO齋´ŸtëWÅðd„~I’®\½:??/Z­öíüå=CPJGFFïÜ»Kt½¡¾¡££aŒuÐtÁøeÕX\\¼tù2ð¡¶¶Ö†úúÒ¿¦R©ËW®ˆ¢¸wï^³Éôñg¦Á¡¡ªXLE8PO“G‡Ôá‘‘ÞþÇÔÕÖ™Í&„>˜=_\pR×uc~èÿ÷ƒ×~,>ŽÎs2’ jš¦ëzqû²,ÿè§?mnjÚ³g¯Õfeæöíî³çÎ_¨ªªq ÷wß)]å²ôüQ¼åºôOétztb¢¥¥¹¥¥ÅçóÛ‘ÅøáøÉSª¦ÕÔÔp,[z•¸ôg]×™£étZQUãÔ‡ëé»#N€§­×/B.—c0jlh0™„{==ËKKÏ>óÌÄääðððÞ={ÞyïX>Ÿ«©©q:œçÎ_ȤӟªØ[3ÏåëêîßúÌÙ©é)Y–퇪¨”’o~ýëFÚRc¬$ËÕÕÕ6«5ŸÏ¿ýT*_þÒ¿ø«7ÞH§ÓV«mÿ¾½ÇOž¼sçÎÁûïÞ»÷òK/]¿qÓ*Š~¿ÿÝcïQB;;;êëþå‡ÿúgú'ÅuD³Åëñ`Œ­¢xòÔ©‰É)E‘#‘hçÎç/\ N»ƒRzêôMS÷îÙ[]]õ“Ÿþ”aØöíÛyž»qó¦ ˜¾ðâ‹““çG?þ Çq…Bá¥^¨¯¯;wþÂÈ舮“öíÛìß¿É<ðÙc¿óïTVFÖÄ/‡Ãáó¸ß}ÿýÞ¾>¿ß ýÖÛííÛoÞºí÷ûu]?{þ—¿ô¥X4‡¿õ¯Ç¢±·n%SéÎ]»Þ|ç];wöõõ×××ïîê}]Ý»w=nÆxÿþ}»vå …žÞ¾ŽöíƒCCáx">9=óÅ—¿¬Vk0p»ÝÆ ÓÊÊÊñS§%Iž˜œŒE£}}ýÑXôè‘#o¾ýö³G,.-:p ©©ñg?ÿÅÑÇڷoÿõ›oÁ7o½ú•/Ûl¶ã'N¾öêïµ·o·Y­çΟFc·ïÜùÆ×^³YmCCƒQìíëíÕWE-òõuupÕðd¡”>ºÇ*ð|kkëýïþ]sSÓ;ï¾gµZkkªûúû‡†ÚZ[ª«ª^~éÅ'O]¿~CàyÁ$¸œN“IXXXP$innö྽ÏcŒ»Ó岊¢Ýf³ÛíÅñŒq0øÊ—_ù£ßÿÞ¯ßz;ŸÏÛ¬¢U´:΂$ÏcŒßñ})H­©R±8´,E–ëõ:!„±q¥R®VÕ0\PÛ. †a”$‰ÒjµÒ<}:›QJÓgQUu¹\–$I–e˲t]w!„ ‚€ÚvÅZC+Š¢mÛcA<ƨEAh6 ×u˕ʘ1Œñ|>ŸNg†æ¼¿;#çµß?ªÕ./Îa¯pX¢(Zú×F·w÷7×W¢(ré?ëzKr—$YÏ+M6ÜaË¥Õñ-Ów'Žc1>—{x4ϺÝNç–ààB¦¿y“$q=ï´ÓIãþçÞÉÆž“™+Žïw˜\ßËûÕ0 Ÿž_<×Õ4­Ý>†58D9Ó4{½Þ—Yÿb±Øu—‚~,ëçùL! úßf¬Wà÷ã!ŠÀ#ð<¿zÄ€¿-Š¢P"F¬„IõIEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/booleans_more_show.txt000066400000000000000000000000761330160122500254200ustar00rootroot00000000000000You are viewing the booleans page for the application domain. selinux-python-2.8/sepolicy/sepolicy/help/booleans_toggled.png000066400000000000000000001710061330160122500250120ustar00rootroot00000000000000‰PNG  IHDRþjû˜8psBIT|dˆ pHYsNNŒ1ìtEXtSoftwarewww.inkscape.org›î< IDATxœìetUÇÚ€Ÿã9ñâ‚[îJ©S¡¥To½·òÕ¨S¿½-m¡@¡xqk{)VÜÝ-î®Çe?B‘ AæYkÖ:gï‘wfÏžwæÙ32I’8~ü¸âÈ‘#“l6Û½2™Ì@ · F»Ý~$ à…ì–ýóÏ?J™L¶0&&f”Ðù@ Üj˜ÍfΜ9Svâĉ¡Êœœœ)Çåââ‚Ýn¯oÙ@ \c”J%-Z´p/++û^iµZï×jµBé @p‹ãêêÚZ.“ÉÜ$IªoY@ Ô1’$©•€í @p IÊŠ@ n}„âà6BBñ Wƒ$IbºL ÜS¿@p•¤efñÙÄÉäÆ{/>‹§‡;½ø:‹ÅáoþOÿaÜëï2°g,Ü}'ùEE|ðÍüøéøk"Ëc¯þzƒ•RI“ÈÆ<5ú>Bƒkø›<çwZ7k‚Ãüðë¬ËNùß똻lÝ;Šáú0eîR22ùôW®EVA"¿@pLœ1›¶-[@vn>ZÇûôШ(Jd•ÂTÜwuqaÄÀ~×ôýkÕ¬ 1-šqðØ &ÍþOßxù‚~úø\QúÞ7lßÁо½ÈÉËcû¾ƒ„Öi[bµÙHIËÀËÓZ»›k¥%Üèè þ3eÜ9Œˆ°Pf,\J£`÷Ž»dXǪ~¹\^ç‚ ·®®®èô:<Ü\‰ëÜ…BîP~Fƒ…B‡»2ÙyÕ_q_§7°jíöŒå—¹ HMϤ̠G«qáÙGäÍϾ浧Æb±X˜øÛÞ~þi~[´Œw^x†ÙKWÓ¢{ÆV‘G²KX­Vl6nn?s–ß.Ãn·ãíéÉó?|NÈ+(dÕÚ ôëΪµÿ°y×är9­›EsàØIþõèhšF6æÛ)3èÙ¥#]ÚÅT¤€_ƒ¬Z·?×o¤yt$e:=’$±vËvÖoÝN¯§O÷.ä‘’–ÅfC!—óî‹Ï²cÿÁ*~šFF0sñr¬V+“‰!½{Ò<:‚ióc³ÛéÒ¶ Cúôäÿ¾ø?__ýòÞKÏÕñÓn\Ü´ZîÔŸ_fÿŽÉb¥yTcútïzÉηÃÔ_ñG \¾ú³¯à§™ópÕºðÝø·ñôp`õ¦­„0¨W ü=;ÿ®I “!I2àŽ}èÓ½+¯ò%éYÙ5Ò ¢mËæ¼þÙWøzyñú3OÔX[püÌYÒ³³éÒ.†‡ïÁÄßfÀëÏŽcÂÄÉL_°wWmyÚçÒOJMcÞòU¼þÌ8âºtÄf³1wÙJö=NtãpŽŸ9ËKcuÈ]!þо½øì‡I¨U*†ôéÉâ?W#ICúô¤u³¦lÙ½‡Í»öÒªi4nn®|ôï—xý“/ÙuðP ?‰©é„ðæsOñÑw?"“ÉøcÝF†õëM«¦Mx㳯œ‡F §w·.˜Íækú,‚› I’h‰Ál¢´TGd£pTJE­t¹ÃÔ_yD"jGBJ*Ü9”{† dü·9zú ±Û0í«OQ«UH’„Íf«¶òû)‹£ÑˆF£Æn/¿iµZ‘¨P¸!˜ÍB°Ùl5ÞÛ»à‘»ït¤i±X pÄ[\RŠ›«Ö?€Ùb@¥T`4èÖ¡“fÍÇÇÛ“èÆP*•% iD#îÔŸö­[¢¨$ÇôKÈÎËÇÃÍ«ÍVÞÅ$‡ F£¹†£ÉDd`&“é¼ÅÄdbçþƒœ8O×ö1˜Î)z«Õ*”¾à¶Çb±0sñrZDEÀÖÝ{‰ ¥ID㋆sŒøív»PüÁeb0šøaú,2²shÕ´ í[µt(®Ç_û?8÷^ýúÕ'ü¹a£Ã0äÜ\\å‘´$I AC_oôìÁ¼àãå@Vn®ßÈ7ï½ÉÜå°zã†ôéYE¦re~Qá½ÃóÛ¢e¼9ákü4àå'ư}߬ú‹qÝhÒ8œGïɬ%+/[EÛ–Íxø®x¸»1sÑr^~âÑ*£ˆÊ‹ÑwàtB’#/2™ŒüÂBÌfs•)ÄŠ¼5üÜ=t¿-ZÊ¡c'ÉÉ/ E“(†÷ïËì¥+°Úl¨U*´..UËI ¸Í‰£g—ލU*šE5Æn—jõnÈæÍ›' 6 …BqIÏà<2™ ÊôÜÝ\±U‰º»»Wñ«Óépuu­ÒÁ¶X,(•Jt:...¥­ÕjñTž¥P(0™L¨T*ôz=™L桸¹¹aµZ1™LUdT«Õ(•J, f³¥R‰F£Áb± R©Ðét޼Èår‡¿Å­aÅšuLÿæsT•FüjµµZN§s42 …Fƒ^¯G¥Ra¶XqsÕ热V‹ÕZna¨ìÇ`0 ÑhP(¼ýù·ôêÚ‰ÞÝ:£R©ÈÉ/ÀÏכ͆««+&“©JçF ¸]‘›*¬ø —îŸ>}Z¬ê®I’0 (d`Ðë«Ü+++«á_§ÓÕ¸V¡¤++pƒÁpÁ0 ¯²r¿Xü’$a2™ªø·Z­ç•ï¹FE^*‡Ûwø(º³ŠÒ¯SÝÔn³ÙП+‹Å‚ ÿ+S9Ê~vì?Èɳ ( ŠKKéܶ5’$a6›ññôpäÛY¹ ·+U-qµÓãU¾ãÊ_ TP\ZF§¶mÒ; ­›5ÁÓÃÉnçÃP«”•¦@DÛ$\K„â5ðòpçž¡¯ÛŽ„nZ--¢"ÿE{$ÔBñ ‚ˆö@ ¸5©²ª_¼è@ Üú(”J¥Pü@ ÜâH’„اW ‚Û%ÀÙ„³õ-‡@€·jµšâ’â›â¨[7W7|}|)Ó•Õ¹Ìr¹¿~¨Õj Ðék~¾w#¡Rªðõñ  °‹õæþö¾âY 7;޽ú£"¢êS€CGa³Ù0 è 5¿¿Ñpss#¢Qf‹™Ö-[;Nã« ¬6+'OD.—ãééITäýÎMFÎÆŸEB¢IT\4.õ-ÒU‘ž™N™® w7÷K{n`ꮕ®€’’,VËM±›¤Éd"=#¾½úb·Ù1Ykn¬s­Édh4’’“hÕÄé&>7r™Fãø}£Ë{)üúsúìi¡ø7=Bñ n(*¶w­Ë‘óµÆjµ"—Ë»áÕ{ÝWìbw£/È­WBº)¦mjí’ÁíÍÍÓº nd WÜ\kNe”ï—}½”BÅþÜ7“º™d½r¹â03AýSTT@N^6:½Z§§7A!µ¶’ Å/¸áPÈo|Îé‚ë1¯|Dï>â‡sòÞ"§éÝ yÜüääf!WÈñóó'H¡B’ìX,fÒ³Rño€‹‹ö’qÅ/¸¡!C©¼¹ª¥d/}_—Q­T>â¿né]-·©ßn·#ü‚ú$#3 ­«£Ñˆ¿_ Z-v»’ÒbÔ* ¹yÙ„…6¾d<7W +¸-¸ÙFüVÉzÝMïÂÔý#~A}“›IxX>®I¨e*ìöFÈ(ÅW»‹\KD­ëèE'Sm6w?ø“§ýzYÂååçóÑgŸc4™xõ·HÏȼd˜¬ìl’’S0šLLŸ9ë²ÒÜ"œ›ã¯î:u脇»þ~þDFD:õãÌ)UJZ¶hYkÿWâà¼é½²»ÿ‘GùðÓÏøðÓÏX¶b%…EEL›ñ?Mþ…›·8 sI‡äñW¾¾`ñú ž}û×^~ý Ƴcç®+K¿š›:} -¾¨¼¦þÊîÃO?ã…W_cðˆ‘|øég,]¾âªeY¶r%iééì?xĤ$$Ir”ùµÈ«Ýnsü‚zE¥Ta·[qÕZÑjm¨e§P+rP¨¢QAV»úyÑÿþƒéÕ#–…‹—0rø4lØUü‰ÖU‹Åla`ÿ~(U*6lÜHqQ1... <(O_!—Ó©c\]µœ>s†»v#—˹ïîQlÚ²•Ô´4‚‚‚¸cÈ`fΞKQq1Í›5åžQw @rJ ;w/q±Ý9rìz½³ññ4mÒ„ž=b),,⯿ÿF’$úöîEHpðU¯àZp6> _}Å;o½Itd$……|÷ÃD´Z-ï¼ùÆÃ9[Ñ_ZZJqI1¥e¥¸h\P*”Èd2üýüË7ü).¦¤´¤|“›†~Èåròóó1›Íج6” %r¹œà ` yyyèô:üÐjËMgYÙYøxûàââ‚V«¥¸¤˜üü|ÜÜÊ7n±X,degÕÍ"³85½‡3þ·ÿu:Q‘‘;~(=~œ]»÷à×°!Ç E.—³mÇNÎÆÇÓ²ys:wêX%Ί}õô$I".6–9ó§Y“&¸¹¹å„ÒÒRþú{ Z† ÌÙøx¾ÿégNœ:E‹fÍ((,dðÀ,_õ£îÝng݆4 ?É))ìÚ³__zÄvçè±cØívÑëõxxx`0ø{ÝzF ЬRãS±²¿zÙŒçm¶ïÜÅÄŸ'1þ·1[,̘5› À@<=<(.-!-- À@†ÄÞýûÉÊÊ&5=˜Ö­ˆ‹%!1‘»vãëëÃÐAƒ !)9™i3fàïÏ]#†ÓºUK¢"#±X,ìÙ·”ÔTZµlI«-سoß%ã¬Ì­`µÜÜ4 ‹¤¨¤šqøèZ6¡ °ÿ >ØdjTªœZÅsÑÿ¾ý¸cØPZ4oÆþ±X,Lœ4™Ü¼|Nœ:Å󯼆A¯gÞ‚…„……qâÔ)Vþñ§#¼ÅjeÚŒß(((à??L¤mL:´k‡Z­&¿ €.:±áŸlÙ¶`BB‚ˆiÓé\£c·Ûùx„‡…²fÝzfÏ›ÏÞ}ûY¿q#q=b™>«Ü*0sÎB‚ƒiÓ†âsß êŸè¨H %O=÷‹Krjj8Ï­ísŒ@Ï_—ðññ¦Ÿ>üñ×êsJª<ç_y ZMZF3fÍÆ××7WWbZ·&((CGŽpôØ1òòò™øó$’’“INIåÔéÓX­V>ùü BCBY»~=sæÍgÏÞ},^ºœ€@’ÄÌ9squÕ:‘ëüeg³Ù¤rEj³Ù0™LÌœ3—ø„D||¼ÉÏ/ SǬßXÞ>ìÙ·ŸÒ²2î¼ã¦ÏœM~AO>÷ |àéáIzF:ÁÁÁ$§$ãã탗§éé””–`4qwsw(~wwwZ¶lɈá#Ëå( ÌV3=âzàéá‰Íf+­Ê C§è zÌ3 66–€€€*2U6õ;Sü5bú/“˜þË$úôêuNy€d·#Iv’’SÐéuÌ_¸ˆÄÄD’’ðõñÁ×LJM[¶Ð¥SÇqJR¹©¿ºR²Ÿ3G÷íÝ‹{öž‘$%§–žÎñ“'ILLdã–­øúøàáéAL›ÖÒ®m ¿ÍžËþƒéݳ'³çÍçÀÁƒ´o×–­ÛwЪeKºvîÄ'ŒçÄÉSH’Ä€þ}éݳ'šm;wrêÌúôìéTÞê*ƒŠ²³Ùп/ÑQQtíÒ™ÃGŽ`4”·’ÝNçŽ À¯aCär9C dÓ–-hµ.Ž´|}|ñõõ!44˜  @G™ïÝ¿ŸÇ¿G×Î4 ?ó,¼dœÕå¶“Q ¨O|}ý(--¡¬¬„¨¨&H2;¥ºRÌ3®Z·ZÅqAÅ¿qó"7bðÀ¼øÜ³äåç£Ó•ï ®Óë9}ú îîn4ðõÅd2c2™8}ú (•JJËÊ(**ÀËË“äädÒÓ3È/( ;;‡ÇŸz†öíÚÒ¤I4v»µZMFf&ñ ‰Ž¬itÒ33INIaͺõúçç år9’$ѬiSž}êI:Ìü…‹®ªP×–ð°P¦þü#ãŒþóÍ%•~ŪþêN¥TCÛ¶mñõõ%##ƒ‚‚š7kN@@¡¡¡¤¦¦RRRBófÍiÒ¤ jµšÂ¢BÔj5înî”—püøq¶mÛÆº ëÐh4ôëÓ³gÏ’›—‹ÝnG.—ãî›J…­‹«ÍÊž={ˆŠŒB¥RÕ­ò*ûÊN¥VDpP®Z-’]$d29™YH’DP` Þw/oþû5ôë‹Édâ‰ÇÃ×LJ'Ÿ{½^ïtÔéLÁ"•Ÿ´ùÄcòÒ¿_§¬¬ OOÜÝÝéݳ'oþû5¾úì“rÿv‰3gÏ’››K÷.]HHJb銼ðÜ3ìÞ»—¿×­£cûöDGE’ž‘ARr2¯]G€¿?’v[¹"´KÝ»v%¢Q#6mÙrYŠ_²K•¬åù²YmdfeñÔsÏÓ6&†è¨¨sÖrË@EçÌj±rçð;xꉱLùuårÙíx¸»“žžInn®£ÌCCBøëï5$%'sêÔiºvêT«8ktTÄ¿ žqwsG§×ãëÛ®Œ¢¢BÎÆŸÂl2×:Ž *þ)¿N'.¶;¡!!„†„жMŽ+Ÿ›|ùßoðñç_ðó÷ßãëëËž}ûÁãO=ƒ‹¶|-À ¯¼æˆ³]L Û¶ïà³/¿Â|nkÏ€FÜ1ŒW^“­Û·óü³O;•uáâ%<ðÈöìÝË€~}kyÁõcØÁµ[{!+_Õ_ÝùøøÐªe+¢£¢ÙµsZ­–ÓgNã¢q¡YÓf8pOOOæÌƒ‹Æ¿~L›6 µJ$I4oÖœ“§N×#Ž|>½ú +ÓqðàA†ß1œÿdÈÖ…\LVþ¿mL[FÝ5Šœì¬k ÙÀùˆŸê&n©|ôÙ¢y3¦NŸÁ†M›hØqO1fÜSœ'95…g^x‘IS§ñÚK/¢ÑhjŒ+oàSEÁžK¯it4ã{ ³ÅŒ§‡?~÷-?Mþ…1ãžâïµë°ÛíÄõˆåÕ7ÿ ›6¡V«¹oÔ]øûùãæêÊð¡C D&“ѰA†Âï¼ÇŽ]»yzÜXà¼2‡òŽø¸±3{Þ| ‹ŠjÈ{¡ò©Xøg?g©ˆË¯aCÀ+¯¿éXQ=Í¢â"Þz÷};ŽFááxyy9ü<<úAvìÞ͆M›e>úþû0›Í¼ñÎ{´mCÇíkg k‹Ðü‚€³§Ïà¢ÑŠÍbåô©3 ÆZ‡—Í›7OŠn]ã…BQe„!—ËÑéõ 9ŠÉ¿§It4 …^Ï_ÃÛo¼ŽF£A.?oú¬0‰:zÔV+2™¼|áŸBÁhDërÞ¤V±ëPÅÈ«"\Eœ6›­Fü׌F#Z­VÌÅÝälÙ±…Æák\?uò”ã™àåí…d—HIIÁd2ÑЯ!¾¾¾Øl6ÒRÓ°Ùl„††¢Ö¨ILHÄl1Irr26› ­«–ð°p222(--E¥RáááÝnÇËÛ RSRñð'9)I’pww'$´æTRNnícÚc4V}ñ”Jem|+Þ+³Å‚Z­v¨‘Êu¶\‰—/Ž­¾ ¬°¸Ì¬LbZÅT‰[.—;¦*þWl#\ñU~¯*¦:*¦ *‡¯x+Ç¥P($ «Õêø]ñ<*~;Ëoaq!Hå§.VG&+·îTlA¬R©°ZË?T(˜Lf\\4U¬’$¡T*rŒF\4Çÿ ?*•Ê‘·Š|* Gþ+®_*ÎêÏ3¿ Ÿ À y®'ëÿYÃAwPP˜Çé3'ÉÌÊ"²q4-[´ºdØøøø ¯ê¯^é++T¥Rå0³W ÕVÝ-¨â~ECPaš¯¿úÜËé,ÍŠß‹ *ËQÝOÅT˜ƒ»ù‘á|ŸþV­œThDEUí°*Êך4iâøÝ¼yó*÷ÂÃÃ/(KDD-[¶¼¤Üʤ2fsMÓ[……\Ží{û[íNV‘ŸÛÀ§zzÕÓ®þ¿âݨüÎTVÒ—Š«6~å÷RøT~g+âSÞ‘9³âšÍfC!—;:•Өׅòu©8/$«@PŸÈdrÜGqqE%EجVT*U­Ã_Ö>n®®l߸‹ÅâxiÜ\]ùü“¾(Á•p³màs=wÒ«èlW6QßÈTž‚¸Ù‘ËåbŽ_Pï Õ¸1wÞBvïÛOhp0cd§ŠÅîb\–â—$©ÆÑš’$ ¥/¸vœ›ºÙ¸^SL«úo–)­ Å3Èz)n…΋àæÇ××—Ž;ÒºukÌf3J¥FƒZ­®bU¿bË^Á …B®pÌ¹Þ H’„Z¥Æl6_7å¦V©Ï­t¿y”éÍ$ë…(Ÿ¸ù:¥‚[µZZ­¾âð7Gë*¸mðòô"¿0ÿ†þ7…ò/*.",4Œìœl|½}ëÔZa³ÙP(„…†QTT„§‡g¥u-0›Í(” Àh4¢Ñhê[¤«¢¤´„€sŸ 73J€Â¢Bâãë[ÂBÂ(Ó•a±ÞøSH |àî֕2]YŽlJ¾Ž} Œ¦Ú¾S¸h]ðp÷ ´¬ô¦_×°AC\Î}…$ÜÌ(:µïTßrUpöù׊ÝnG¥R]7™ív;®®®¸ºº^—ô®^ž^õ-Â5A(}Á­@íV@ ¸%¨ÓIÔ¬œ,JJJœß+TB¡PàííMP€ØE ê’:Uüz½žÆá/kcÁí‰$I$§&×·@pËS§Š_£ÑÜTó‚úåf_õ-7uªøå2y­7d2±-š@ Ô5uû¡´Ìyc^ª·°dK*Ù9vì(hà¥D­±sOÏ`<\Å´ÀíJå“ÏŠŠ‹(**¬±ŠZ¥R—ýìd?@ \š:m=/4‚ûyùI4¥n?°-›WηŸ¿Áôÿáå{.} ŠàÖ¤¢¾’••A»¶jXŒŠ‹‹8sæ4-š‹z"WBÅ¿héRôzƒãÿ]#†SPXD€¿{öí£wÏž—yÅùæ•IÍ)å̱|ROüC\g7^™ÿ1©ùLüé7ÚÅ aç±,º·+»oKÎU•÷1pÀ`§‹B}}’šâ4¸ÉdâŸÍ›ILL¢aÆ 0ww7öí?@çN¯‰ˆ‹–.%Àߟ^qqŽk —,¡G÷î„_0\Ii)ËW®âž»F’“›GDãFÄ'$²{ï^øúÒ³Gl.+“–žNZz:ݺtq\³Ùl<|˜³gãñöö¦G÷n¸»»; ¿gß>šDGãíuk|O/®œ*é…K–âååI¯¸8zÅÅ¡R«ILJB§×³qóV¾ÿñ'þ^»®J$ÕÏà®@&“Õp[$aÈÉ'®«'ãJ‡v­18Ž{Gv"ãL~Ýà4œp·‡(,,D¥T`³Y:»Ýùp‹–.cßþÜ}×HšDG£Õº`·ÛY¸t)V«NwÕ/ÌÂ%Kùæ¿?›—À¦-[ùõ·Y¤gd\0ŒÕj%77³fS¦Ó‘˜”À“&ѵs'JËÊ0ž;üÊb±Ô˜ÞÐëõ¤¦¥±cçî*×?ýâKvìÜMëÖ­Éd<òÄ8öîßï¸_ùü€=ûöS\\|Õù7?5VÞøѸ$±qóǽe+W±|Õ|ñÍ·Lœ4€‹—0xÄH>ÿú¬V+?O™Ê÷?ýÌð»ïuÌñWv:ì2ýÜðòòD&“#WÈiØÀ³²²së]ùWOîÜßl¶`³Ù.¨ø/ÔÑT«TœO@­VÓ.¦Ãbpêôi†ÅÈ{ï'>!€Í[¶qσñÖ»ïSTTÄ˯¿áP’cÆ= ”¨ÿýo×H§kçNŽÎ謹þ¢G÷n¹ÿýïpç=÷±hé2 |¤þÈØq<ýü @¹b߸y O>÷<aܳÿâÇI“)))q¼Kϼð¢# /áŽQ÷0þãO«È ×ëÉÈÌä…çž¡U‹ П§ÆŽeíº üüô3~úe ’tþ(ÊAýûÑ­KôÆ<4šŒŒLöìÝǤ¾çl|<[·o@¥Tòý7_9Lý•]dˆ7F»‘í{Í”–ê ³Ù̉3¥”YÌ èܨþpõâ*Lý‹ùœâwî.t ôC‡0x@¾üæ[~þe „‡0kú4>þ`<7o&3+‹•ýɾú‚^q=˜4u-š5ã¿Vs6>’’R6oÝÆ‘cÇhÛ&¦F:q±±8xˆUþEhH0nnnÌýýwöëËÏ?ü—£ÇŽsìø ^zíu^|îY~øÏ7Žð’dç›/&кU+¦ÿRÞ.)-eÏÞ}Lýù'ºvîÌÖíÛÉÈÌdÿÁƒ,[ø;¯¾øBŠŠ‹ñóó«r-¦Mk ‹‹ dîoÓINI©R^cÇ<Êá#G±ÙlL›1“ÎÄvÝÁíF ÅÿÐðá{ïòü3OW»#áææ†««/OO¼¼¼8yú4z½ž»vÑ+.¿†å QdDQ‘‘N÷þÝZà¥:o}´ƒ/¿ÛÊ+ï®fýæbŠ I˜R6RRR\ïJH¸zpç4¿Ñh¼"ÅïææÆƒ÷ßÇŸ~‚‡‡ïô îînàÑhäÌÙx‚ƒ‚hΠýÉÉÍe@ÿ~Lš:••þÉ«/½Èü‰ÕkÖ2°ßé¨Õjý §Ïžeì˜1Žë)©ité܉К7kÊá£G),*¢eËxyV=IÏÛË µZ…¯oùþþùùùèõz¶nߎR©Ä¯¡'O&0 o//||¼«„÷kØÌÌ, °X­Ìž7Ÿ¨ˆÂBCñ÷óÃÓÓ“©|çLI*︹jùëï5Èd2:wìà´,Á­K­>²wÑhÈÊÎ&)9…   :ÌÉS§éÞµ e:];u¢eóæ5'g¦~¥RÁ§oÜI†%Ü’\É!+»ŒÄ¢“ø(iäÃ÷ßý§þ•põâ |N\¢ü0šêN’$ìv{ÍJ Ìœ3—'|ÎòUðϦM <È©¿¸Øî=vœ­Û¶óÞ‡ÓºUK¢##ñkØ}ûлgJ…‚£ÇŽè4ŽíÚòï—_ª¢Ð;¶oÇô™³Øµ{k×o`ø°¡°`ÑN>]3’JSù¡!¡”ét´lÞœ®:áããMîÝ9pð'OâÐá#U‚ªT*zÅõ`ܳϱtÅJ>ÿê¶íØÉÝwt*¯R¡`ß :wêÄä©Óxú‰±uzŒ°@ ¸1QÜsÏ=FGG “A«–-ð¬Ô˜Éå š7kŠÑ`ÄÅÅ…~}ûPZZŠ!ÁÁ4‰ŽfÛΔétDF4ÆÝÝà`|}}0 øøøÔhܽ<\y|T!aîx@l÷0¿«#;6­&/¿€ãG3fì¸zWBÂ]_WT\„«ÖƒAÕfAëªÅj³Vqf‹™´´4…7®Q™UJ%ƒ‘’âî2„~}z—×a™œ¨È@†‹VKhH1mÚpòô)Ú´nÍð¡CQ*•DGFЬiS"7&¢qcZ·jIãFª¤!sòŽÈ(a·oÛ–2]™YYÜs×HB‚ƒد/iiiŒÚ´jEÛ˜4 ƒLFtd$J¥’íÛѦU+:Dzf¦c~tT$Ûwî"<,Œ&ÑQ„††8ÒmݲM££ÉÍË#*2‚×^zŸr BÅ;å¸€ŽŸ8IL›Öøù5dãæÍ¼ðì3ÈdbÓ$àv¢°°Ù¼yó¤Áƒ×I…D4ލµNǼ¹s°˜Íüë…ëD&ÁKbr"¾Þ¾$$&‘‘^ÃJ¥¢Më±ôUpøÈQ9£®oQÁu&>>¾îwî»ÜÜÜxêégêFÁ ¬R…‰Œˆ$2"²¥¹uÙ±{7}zÆ]Ú£@ ¸%©óûÄ^ý‚Ú"ÌÎׇGÖÅ¥¾ÅõDÝŽø%ј jOõkuƒëEv·>u:7™MÕe‚[„¢¢"Lçv¯AÝQ§#~ÿ†þ’—ŸW—Én þ~þõ-†@ ÜòÔ©â—ËåxyŠCA@ ¸Q+ï@ ¸PøúúÖ·@ ®'Nœ¸à½²²²[gÄ¡m\ .¨ë6G´i‚«Åd2‘›—GYµ#Éëös¾ëˆøL \OêºÍmšàj0Œì?xÐñ¿S‡öh4àšã·K¢w,®uÝæˆ6Mp5äŸ;–¼‚SgÎ8~ß2Š_²‹Þ±@ ¸~Ôu›#Ú4ÁÕ Uë8–––9~;5õïܵƒM›ÿ©ríõ×޺䞥¥¥Ìû}6Ï<õ/ǵŒŒtþükO=ùìEæg¤±yó&F?øðEý]ˆ ™Å¾ýî+¬Vë¹Ã]Úҿ߀k¶ðê¿ÿ"44ŒÖ­Ú8•Çf³¡T*)--åçɹcا~ÁÍG}™ú¿ýî+…7æÞ{î`꯿иqû;?†Z ¨ÎE5`ϸ^ôîÕ—Þ½úÞð{î_ì%ŒíÞƒ®]º“–žÊ”©“())¾¢4, …E…a·Û‰Žj‚¿€S¿gΞæÛï¾¢  FM\žô+n>êsŽ?>á,'N¯Óô·.]ÜgµÚP($4hHYY³çü†‡§'e¥¥ÄõèEëÖm˜9{‹w7wzõìMii)3gÏÀh4×£'>Þåg‚K’Ä®Ý;9vì …‚¸¸^DEFóçÿV‘––†B.ÇÝÝãŠ3r±°:vF«u¥CûLüé{Ž;JXX8k×®Æf·Ó¤ISúôêËÞ}{Ø»or¹œ®]ºáëëËú k±ZmøúøÐ­k,sçÏÆß?777ÜÝÜ Ãj±°tù\\\°˜ÍôèÑ“ýö°dÙbÚ·kÏÖm[ðòòÆd2²~ýZlvîn ¿ãN¶lÝDnn£ZÃÃA©¼eÖ] ·$õ¹ªÿÞ{îgýúµ4 oì¸vðÐ~:ˆÅb¡e‹VD4Ž`ÙŠ¥¸h4Œ|}P\R„—§7w¼›õÖ’R©àΣÄgÝ·Æï?°—={ws6¾|Q€B©àчcÐÀ!œ>{ ™LÆC>B×Î]IIM&5-{t,#ïÅ®];qåææ°ió?´oß‘ððF,]¶˜ììl²²²xöé1lØð«ÊˆÄ¥{ß..凓ØívöìÙ…··£îº‡}ûö`µZIKO¥U‹VŒ}lmcÚ±{Ï.<=½xò‰§¹{Ô}xzzòØ£c¹÷îû«Ä­T*xò‰§‰c÷îÄvïÀ=£î¥YÓ»÷ìÂÛLJqcŸF¡T°vÝß´oß‘§Ÿ|d2òÅÇÁ OmÚœºŠ?8(˜¨¨hÜç¸Ö®mî½û~ºvîʱcG€òviÜO£+àΣHMKáèÑÃdgg1jÔ=„‡7âØñ£ušÁÅE‡•/üë%”JP>_J­Æfµ’œœÄÚõkÀn;ßCuѸ`6›ò \qËéÓ§puu¥y³ète¸\£ãA/µF’$9„$I“š–‚A¯gûö­4‰nŠÁ §g^=v”ßfþJ‹–­°Z,4hØð²äðññÁbµ8þÛ«™ë¬‹Ã ¢Qkj”Z¥Æj³^VšàúSß‹û:wêÂüómë†Ö‘”œD`` 6»­Š_WWWlv;jUy{®Óë1lÛ¶€Æ#ê ‚•‹*þï'~ç8V÷‰ÇŸrêÇb±PZRâXøg0˜5gf“™¸¸^øú6Àn—ˆO8K§Ž]HHŒÇj³âííMDd$Gá×éSpÑj‘Ë®|ÁÅÌb?Oþ…BA``÷ßû ‘ØívÖ®[CqI1.<<øûàççÏâÅ ˆ‰iëðÛ=ŽõÖò댩xxxp爻ؼeÓç[ Ôõ½§§;vfíú5@ùàÆh4PZRrɶ4$$„ܼ óQ*U×l&¸9Í›7O=zôG`µZY­ç¤m6+zƒ«˜ÏwFqIñTZVŠ«V‹Bqåsêé¬úsE•¯Á­Í•¶9u¿Á G¥R׺=6™Œ˜-–kÞ ê—'Nš–FJjZ•ë=ºw#++ëêw ¨- …²N*Ù•šÝD…WB}›ú¡Õº^–ÆFŒöo7nìoô.ƒúÜåÊ××—×[úàú#vîܬÜ2Š¿>÷µvqÑUoé ‚ëØ«_p³"¿@ \Bñ nV”9¹9õ-Ç5áVɇ@ ¸9¨ë6G´i‚º@ àïç_ßr@ ¸äçå_ôþ-cê@pi„âà6⚟#ÙlänÛFîö픜:…)/ÉjEåíkh(>mÛØ¿?Ú  k´@ ‚KpÍ¿!3““ß}GÂÌ™s.± E&#°_?Z¾õA^+@ \‚«7õK§~ü‘•M›rüë¯J_ååEÃîÝ »ûn=ðÁC†àѤ Èd Id­_φAƒØ4r$¦¼º9Îf³ÑoÈPþóýèt:ÚvîJBb"ßü÷{Ö®ßP'é^+¶lÛvÝÒúæ¿ß“˜xÝÒ«o’SRøì‹/¯(셞˂ŋIMKsz¯6¼ýþxN>}ÅñìÙ·ø„òg˜“Ão¿{É0É))<ý¯˜ðåW5¶÷¼œ¥›œ’B».ÝÈÏ¿ø‚£Ë!##ÓñþZ­VÉñ'¯YüÁ­ÌU)~»ÉÄ–ûîcï‹/b-+C®R5v,CvíâþÂBoßN¯%KˆûýwúþïÜyú4÷ææÒeòd<›5 måJþ×±#¥gÏ^“ UæL|<á¡aÌž7½ÁpÍã¿V«µÊ7¸‹ÅqRamüW0sμ+–Áh4ÖHãjÑétØl¶K{¬”~õ2¸œðUÓÖW‘ÝY^,Kõ`¤°°’ÒR§‡ž:“Ón·SRétÊ =—î½—°ÐÐ ÆS½L*““›ë¸W9žKÉfµZÏzÑ’eìÝ¿ßiüâÈÑc 6”wÞz“ð°ši:“A¯×å'v^ê[s£ÑX^ÖçüÙív ¯¨.êtz¬Öò“+8Á¤)S$ÈÊÊBoГ™•U-ÌåÕ[àvàÊMý’͇&eÉüââè>cÑÑ ¦iЀ&Ï>W,RuvîÚ͘Gâó¯¿e÷î=tîÔÑ©¿/¾þƒÑˆ^§çŽaCHMK£  'ŸËÐ#yèÁ¸ïî»<âN~Ÿ=‹è¨H¾ýï÷ 6”fM›òÂ+¯ñé‡ðñ„ h4|}}yãÕWØ»o? /ÁÝÃ/OOžû8±}ú1tð ZµhÁC‡ªø¯à»&’À;ã?àß/¿LfV3fÍÂÃóÙ̇ï¿ç8bó›ÿ~OnN.È`ЀþÌ_°ˆˆÆpwwçåžgùÊUìÚ³FÃC‡ uÑ2ñçI`¶Xx÷­7é.Zº”ÄÄ$Þü÷k¼ôÚ¿éÓ»F«Õ’Ãk/¿HxXPÞ¨öèÛŸsfa±Xydìl\ó7|ò (UJ^åe¦ü:øøÌ ÷Ý=Švmc3îIš5iJûöí¸ïîQü8i2YÙÙ Ü\Ýøðýwùè³ Øl6ÒÓ3ÿîÛ:|¤J^ÒÓ3X»a 4“§N]ðÙÍŸõ3çÌE­Ra0šps;¿¯¹$INå|dì8Ú´jEn^£ï¿}Ty.3fÏ&//«Õ†››+£ï¿ŸM[¶T‰§Cûvüß{ï;ʤòsÞ»?ßÿø-š7çȱcŽzÕ§w/žxúY†D‡öí),,¬gØî|<á ,f3..ºué‘£GIÏHÇÕUK—N8täϽø2ÿ[¹œøøÞ~<+—,B£Ñ°þŸ””–pððaÔ*EÅÅX­6FÁÒå+õí×^¥ÏÀÁ 6”ŒŒLüüâííMAA!ß|1¡Æ;%IÓfüÆÑcÇpuus\ÿ£Ñ¨Õ$&%óé‡ã=æqzõŒ#//®]ºðØ##—Ëõº¢l{öˆeϾ}dçäнKöþ8ÿùç’J¿22¥’6ãÇ;gÈd”%$°ÿ7®T§üoõß;~‚èÈþ\½Ú©Ÿ„ÄD,V+½ÿ_|ö sæýÎ#£GsìÄ þÙ¸‰þ}ûrâäIÖ®_ÏC‡8”>PeÄ(!!“•Ÿ{mµZ‰íÖ(7ÿ*Uåý«5ëÖ;üó(÷Þsw ÿ¼úÒ‹DFF2áãhÐÀ—Ysçòöoðá{ïÅÎ]»«øíÆ—Ÿ}Êê5kñððÀf·;ÒS©TX­VZ4oNÓèhfÍË«/½À‡ï¿GtTÿø“#žûî¾›³ñ ìÝ·¿¼ì¢¢8|ä(‹ƒÁÀ–mÛ«¤[yÄ'Iåe W(yJHJâç_¦ T)1 Løêk˜ðÉG¥`4™xô¡Ñ|ûåxxxpêÌ}h4áaaX,þ÷÷šy©øßÀ×—¦ÑÑ}v …W­–ñï¾Ã³O«Z. g£Fá|üÁû<ûô“<|¸Æs©x–ß|1’kÆ#“U)“Ê,X´„Þ}—wÞ|ƒ˜Ö­kÔ«±c¥c‡ö5âLLJB£Vñɇãy÷ÿÞ¢¿¾´iÝš;‡gİaŽðmÛ´¡[—ά^³–?ÿ÷?¾šð©CéôëÓ›‘Ç3þ·QªT޼¬Xõ‡Óú6æá‡èß·nnn¼óæàŒÄ¤$~œ4™Þ{·JYè×ooo, gâã).)áчFóÍŸó߉?rêÌ™*ñTÈÓ³GÂÃÂˆŠˆdÛŽŒ1&|ü®ç¦÷øcüë™§ù{í:9ê´Þ†……ñågŸ ¥/¸­¹¢¿µ¬Œ# @@ß¾t›6 ™Bḯ×ë9uú„Ó£n%IÂÛÛ‡FáhAAÈd2Ú¶‰aîüßùuÊd¦þ:å«þ`Æ”ÉUÒpÑhHKÏÀÍÍ’’Rìv;<4ww^zíuZ4kF€;´£C»v”Œ)­Þ™__ßJeeçô™34nÔˆFááìØµ‹¶1m8qò$ýúôvšïÿ¼¼<9|8cÇ< @ëV­h×6†ÿ|?‘ÌÌL…‡³â?Ñh4œ8y’áC‡²ïàARÓÒ £_ßÞ|ôÙ¾þ|¡!!„†3vÌ£hÔ\\Î+ •J…Z¥"-=Ãaj·Ûí¼úÒ‹XÌfÞ|ç=~øö<<<Ø¿­Z´¼è”€N¯§´´”ŒÌò8|d 3¦þBNN.v»½F^FI·®]X»n=3fÍæ•_¸à³3M$%§ž‘Annn•t}¼½/*§B®ptr*?—ê8‹§z™th×­V @`€?üõ=ø¥¥¥5â»Pœnn®$$&‘š–†V«¥¯/^^ž¤¥§““›‹R©¤´´”ÂÂB>ÿ>/¿þ&Þ^ž´‰¹hùWP½¾uíÜÉqO®8_£ó *ÒEöîÛ¯7™YY,]¾‚O?ú€’’óæ^ÏÉÓ§ñpw§aƒNåùþÇyç4j ÿùá\4ŠŠŠ8}æŒÃUþœÊåñöö®Qo Õ¦¿‚Û•+RüIóçc.(™ŒÎ'VQúñ gqպѨQcd2Y•{&“‘ÓgN;?@›>àìÔ©ØŒFçÍ£Íûï_‰XUøkõßtëڅȈ7nDfVÑQQ,^º”íÛ³vÝzhÎì¹ó0 6€¦M¢Ùµ{7®Z-QQ‘8xÈÑXWЬiS–­XIƒ¾”””PRRÊŒ™³ñòôÀϯ!®®®ôˆíΜyóÙµg/>^Þ<òЃŽð%%%5üW&2"‚ÙóæóÚK/Ñ3®¿ÍšÃ¾Ðh\ všï±ÝùqÒ$233 ðà™§Æ±yËRÓÒÈ/( oï^„‡‡ñãÏ“ùmö4:wêHzf‹—.¥}Û¶´hÞƒÁ@ëV-Q*•¸¹¹1yê4\]]¹ç®‘xzz V«éß·ËV¬t˜ÍKJJùuæL´Z-~~ ñókȃ÷ÝËâ¥ËÙ¼‹–Í›3h@ÿ >·ÅK—áíí‹Æ…Ðà`š5mŠUœ’J§íkäeó–-$§¦RTTDŸ^½.úì4 ^^^Lš2…\Z}þHio/¯ZËYù¹TÇËI<ݺvaÚôŽ2Q©Î§Û#¶;ßýð#Å%%dfe;MÏ™l#G ÇÓÓƒÉS¦áíãÍ Ï>Cîݘ1k¢wÏž²{Ï^ˆB.»`qFmë[uÜÝÜ(,*äÔ™3!¡Vq é‰gž•RRS¯¹œµMâÏ“$Iªš¯êLŸ9KZ´tÙõKÊÊΖ^ÿ¿wª\KJN–Úvî*ååå]79.ÄñãÇ¥¿×¬‘¦þ:½Š;~ü¸´aÃéŠFüÆìò‘É…Lòƒ›ÍŠÝ.szßb©iîmKêòå9r%"]sœnnn—ðyiªÒe2Yxår9Z­‹ÓðÎü_ Ôju•ÿµI£òÜou Õ ;ª—J¥ª2ª…ò2¨nv†‹Fƒ{5Y«Ç_=/®Õ,1—¢zÙT¦¶r^Šêñ8+“ÚÊt1Ù.®âžÞ` 5-èk0…V*ˤ¨Viœ•ƒ‹FS«üW¯µábõ¶.X°5žäœ2zµ â»GØv"‹§·¸ »$!“ÉpÞRÖdÎüß),,¤CûvtîØ‘6mfðÀääæ’˜”Dbb³æÎãØðŒ~à~ÊÊÊX¾rËV®¤C»¶ôŠ‹sÄe³Ùضc'‰II´oCL›6X¬V,ZLQQ^žžÜ9b8]:uB©T²`ñJJJkq¼½¼jÈ·}çNtºò©›V-šÓ¯Oò X¶b%’$1dÐ@\]]Y½f-%%% 6”³ññøúøÒ6¦ ó,$¦MkZ6oÎŒY³è×§M¢£ù}á¢*ùrÕjY¼l9YYYôˆíNYY'Nž"9%…–Í›1tðಙ-f̜Ž£îÂf·³lÅJžû8[¶mãè±ã„†„p×#())aÙŠ•h]µÜ=r$JåÅÕdqI Ë–¯ %-Í1}5gþïäææÒ¨Q8#† cÑÒe¸¹ºb2™>lèÕåkɵp.”%$8½_®ôítÎ>¯q;7Og).Æzîs!ÁíEl·®4¸À¯àʱX,ôï×§¾Å¨J­æ¹§Ÿº¥žy‰Á‚LE:3‰Ù%ùºb±Ú™õÏn+o/oO`ÚÚ“èMV&¯>Áê}©µŽÿÄÉ“$%§0yÊ4rrsY½f 99¹ìÚ½‡Ì¬,ŒF#)©©X-åŸ>feg£ÑhX¼ly•Ÿ'NžbîüßILLä÷E‹Ñétœ8q’ýPZVƲ•«())aÒ”©ddfòûÂE¤¦¦qüø v>@Û¾s¯]KaA —/þÞ²uñ ¤gd•Í–­Ûؾs'yùùdeg“–žÎÆÍ›ÑéõLž2•­Û¶SXXĤ)Ó())eõš55òuüÄIvîÚÁ` ?¿|iFf&&“©F>+°˜ÍLš2•¼ü|rrr™4e*¥¥e,[±’ÒÒ2ÎÄÇ#Ió.âØñlß±‹]»÷\ôyH’ÄÂÅK8pèÃù5$'Nž¤´´”UüENN“§LeϾ}lظ‘‹—\Õ§Õׂ+Rü ºt ÷nÇè¿2F£«ÕzAçl—ÜåüˆØv¿¹Ü8ÄvëvÁÅ]‚+ÇËÓ“{¾Å¨Z¥âÙ§ž¼¥ž¹Ý.Ñ«u÷µŽ‘]Ó$Ø‹v¯,¡u¸Dð® IDATdUd`õþ4î¤Ã«K9˜Ç¯kk¿ñЀ~ý äðÑ£œ¯úe‘$9ýêdÜãñú+/ãáîN™Nçðïìëž9óæ3þÝwxû×iåˆj~ár!zÆõ`ü»ï “É)++»ª/q¢£"‘¨ù•Ó¼ øøƒ÷yç­7:xû÷ã7ßÀÃÝ,'z©r^*~×ö+¤ q­¾^¹Þ\‘â9™\Žd³qê‡jÜ7›MØ%é²FüöJê‹àF'¯Äˆ«FÉ3ƒ[°æ£aü?{gÕ±þñÏ&ÙlÜÝ=,‡R ¸m¡…ëmoKíwé½T -u»¥pñŠ/îÜIBˆ ‘’Ýdý÷GÈ’ÍnðÐÜËù<Ïyž•93ïÈyçœ93ó½^&'6Ôw;6$dàïfGNqÁžöXZ˜áh+ÆËÙ†¿Šfô—{È(¼ÁÜ­—¨)Y{Ôx4õ̹slØ´™±£Gaaa……¥¥eTVV’›—§W·ê¤áVýWE9¹yøùú±yÛŸddf’”œL÷®]ðòòäÈÑxÊ+*¨ª’aŠº.†ôŒ ýQXh¸U»™¹:ŽVÑѼ9ý5Nœ<ÅÏË£Ut4Ÿ}ü.ÎÎü¼ü7ƒUT3þï-B‚ƒÙ´uÿº¹?ƒ©|y¸»süÄId2••FùÔét””–اÓéô«êÊ«nÅÍøgÇòÝÜyXYJô+hæÌžÅâùóÐétFù4µz¥n¥PÝê•&»Ýª±X¬_Ù4ñùçYúãO«{lllXúÓÏ\IJ";çö¯ jjjX¸d™þ{LtK“ád%ެÞEý|uíÒ™å+VqáÒ%Ú6²D5ñø >¢ÿþöë¯Ý×*$OO£|>3ft“¬^yTˆV­Z¥7nÜ=ŸX}ý:ÛZ¶DY^ŽŸýŽÁ6(€’)ñ G©’oéiiiIXHíÚ¶7øýðˆälÚ„[§NôOL¼ï 5Æ•¤d¼<=qqiº×h4œ=wž–-[Ü󄳦 ¢¢‚ÕëÖ3á¹ñÍ£n¿Œº ’Z­–7nààà`´túv(ŠF'ój4´Zoþcß}õÅm'ýÞ-2™ ½òêjÌÍÍ‘ÜÅ¤ÎÆÐh4(•ªF'N7†\.ÇÚÚZo‹J¥B¡P`gg§S;2­E,nüÙX©T"‹‰DúQìºÉ¬*• •J… 2™Œ®½z³ü§e´ˆŒ¼«‰¬JRR9¹¹Fúݺt¦  àþ·ìµöö¦ÛÊ•6 yn.{zõ¢÷Î8DEáêêÆ°!wÿNQYZJþÍõ|êí:ö Ì˜ù_þ)û [×.8::è+H£Ñ`fffpÑèt:”Jå]7xµZ……­–SgΈµµÉxT*•ÉÙÝ:ŽšVV“°V«5˜ÑÝð{ õ¿±`ñFxÚ ã×jµµ3‰ë¥Óðü»Í³€€À£ÃÔjG³ëïDc¾-åêU֮߀L.#2"ü¡túðà+qLann޵õ½¿~X«šjõÊ£à<·Ï AtþñG'OF–•ÅÎÎé¾jÕ=wÞ—>ÿMM^äça°zí:._¹Â¢¥Ë÷ÌXvîÚƒíÛ¶a`ÿþFË6´:7o1¹dån–‚ 8‘H„J¥2¹ôåJr2ûöÄÇÇw7zt릷wåê5úå#‡×ÿ^RZj°ôÅß󇓔œB›˜ºvéÌÁÇ –£Ô_^Ò†Kk<ÜÝÙ¾syùù ìßÐŽ%&RRRJþõ븻¹1bø0D"îÜIï'ž`çî=†Ÿ0~Ü_¾TE@@àþptpÀÏ×s ý0¼ÀƒÑW¯<ð‚å^ ûš5˜[Y¡ª¨àÀàÁœ|í5Ô2ÓCr}Ï’ÿýoB'OƦÞö›Â={àêâÂà°½ÙµkÛ†7_{•5ëÿ ¸¸˜¡#GãêêJQQ1ÿ|ï}TJ%;ví¢ß¾„ë—£@íR‹—è—‚,X¼„¢âb-]F¿¾}‰nÙB&ÿúu£xòòóY´tÏŽB¡àÈQCi×vmÛ0fÔHâ%p%)Iÿûâ¥ËH½výúa)s--EK—1 _?lmm)--3°¡²²’§ÇgÏ_ ,4”7§OçûyóYûÇØÛÛØ—ŸOii)­cbLn°ñÚ+¯ •J™1ó=Ξ¿@vN. ¥’CGŽÒ¥Ó-™¨ˆÂBC3j$›·ncÆÌw2pàË…áfÍCéø¡vmÿà R»–Qž“ÃÑgžaw·n8 §ºqƒœ Ø×§GÆŽE-“aéäÄ[¶ yÈwD:t&—µ¸¸¸`ooO›Ö1Œ>œ>½zÝ6®:Ašë× ôKAd2>>Þ<;v4…EEz­pSDFF––NQQ… Ö˜VTV¢P*™0~~¾†wÙeååôêÙƒ.:’œ’Bqq1>>ÞtéÔ‘»÷PQQi`ƒ£ƒ#öööœ>sÖHˆ¦.¾!ƒâãíMrJ Þ^^¸º¸0røpú?Õ×(¼‡‡Ù99¤gdqÇðÍóQ£F}sói÷#“Hð6 Ï'ž ôôijŠŠçäþë¯äoßι™3¹0{6YkÖP•‘€CT½wî4Xø° æô™3DED [âëëss榈˜VÑŒ9‚S§ÏpþâEðññÁÜ̼vkSQ­àˆŸ¯omÞÌÍyò‰ž‰GlaAL«hZµlɆM›¹péƒ *2 ssâbc±·³3ˆ§Ut4ÁAAlß¹‹œÜ\Äb1Ý»uÀÞÎŽòŠr‰'$8ˆè–-q°·àü… ìØµ…RÉøgžA¡T°õÏíÈärf¼õ&NNN¬ß°QoCÛ6­1|'OF*•Ò®m[bcÛë'šœ¿p]{÷áïçËØQ£èÞ­ …Ä'$ R©ˆ¯•Vö÷óÃÆÆ333œœéÛûIZ·jEûvmo^@@@@à¯E*•RYYi´ÇA€¿UUU÷¿œïNè4Òù…‹sæ ËÊBdnŽ®ÞÆ=Ž-[ñê«„NžŒ¹Õ½-Çøo%#33‘s>ÿ‚AûLâx4Ùr¾;!27'tÊB^|‘šâbTååämߎ•»;®qq8DE5UÒÍ–½ûö×δAû¶mÿjsCš|&–ÈÜk//¬½¼Ëξ>Ó¦L¾¹?ôÝo´! ð0yh“ûî¡Óø+:~Ç¡ãxŒ:~Lj&›Ü'-‘"•›Tç Dla,T# д4IÇñÒ,Å–MfS(j8þbãš"iÛÐ$Cý§Ïœ" €Ú>_gpH$´õö»ojÖ¬_ÏÕÔT VaoÑÒe”••s,1‘ô›»>,êâTªTìÙ·¯ÑpÙÙ9F"=ÿ+h4®¥¥ý%é®ß°‘_W¬àÜùóMR¿¦(*.&ñø‰&OG࿃sé%¾|VÇ’]Iw8ãþhî>d߃ÈMh<:>t×—Bn’Ž_¥R¡ÓiÑj;4wŽä! ÑhX¼ìG¶mßQk—RÉÂ%K)+/ãXâqÒÒvÇ_§J©d÷Þý†ËÊÎæðÑ£5íûåHüÃu*•Š»÷4IÜ·#;'‡{öž‘ÉÁÃGî»~óó¯ßÓy)W¯’róÆR@àð•ëlLÌ 9·œŸ÷¥4I:Íɇ˜bïþýTËåµ5‰Äà»›Û--œ&êW(¨ÕêF׬›Íi ŽŸ8É“={²|å*ÆŽ…³““ÉpéK<Ž¥XÌÐÁƒHtþþœ»p£ñÇhÙ¢½zö ñÄ ***I¹z•˜VÑddf¡T*™4qÖÖÖ¤gdp$þn®®ôîõgÏŸG&““|õ*Ñ-¢èÝ«%¥¥lܼNÇ€~OáïW+téò>ÿê.I¢Ut4]:u$>!‘ŒÌLÚµi­W,8pèP£eÒ»W/Ξ;L&Ã×LJð°0V¯]Çò•«¸<$‰qÏŒÅJ"aõÚuÈärú?Õ—Ð}Ü*•нûp--NãèØ¡ƒÉ|i5Z®¦¦2bø0>B^~>û÷#4$„%?þ„£ƒ#Þ^^„sáÒ%}üç.\àÈÑx<===bfff<|˜¤äÚÄÄеKg}Ø…K—RVVN«è–Lš8¼ü|ƒ¶a]ï®`ïþ¼4eò]´FÇ”¼ Ê«”Ë”,Ø~™v!n¨ÔZ~?’†•¥9c»…°þX:å2%ã{†ñËþ«{Ø30öîäÈ››©B¡à÷5k)’J¹––†R¥bñ²=âi4Z-7oaâsãÙ´uR©[[[ÜÝÜHN¹Jn]‰mߎu6bkcƒB¡`È ê\IJf߸¹ºòô°¡\/(0¸NµZ-»ö쥼¼œaC†›ŸgP&ffÿûóÚÝÝܰ´´äÆX[[ãêâ¢ÿ¯Ir_SSƒZ­nôxTÿö»˜2éE†Âö»L†©¼qƒ/¿ùŽNqqøûóÉ_Êò•+I¹z•Ÿ]Îï«×ræì9~_»W×[…ç`oϰ!ƒ àë﾿­-9¹¹,ùñ'&¿0‘¸±úóû?Õ—®]:óõwß““›ËÂÅKéód/,^Ìž}ûo>¹¦ó̘Ñ,X¼„¡ƒáääÄŽ]»ÉËËçËo¾£G·n( >ùâKŽ%çJrcFŒà§_–£R©X¼tÎÎÎ ìßKñ­I•A¸º¸0xà¢[¶`ñ²9–@nÝøuÅJö<¤{»2±··gã–­tˆ%((ˆ»wóDÏú¸mmlX´t®®®ôìÞϾúÚ l–þô3™™Œ5’ÐFó•xâݺvåÇ_—“™•EŸ'{éãjÙ"ŠNqˆëËž}·F[*++Y¸x)ýŸêKQQ1{öíçZZ‹–.c@¿~ØÚÚØM«è– 8€êꣶQŸ…‚ÂÂ"|}|n[÷Z­Žž­¼ûÕ^†w "ÜÇ‘¶oþA«g^̧ ¼šgrÝ5„öomà\º”÷$ßUÜÍчÔgñ² àï/MÃÇÛ¥RÉ‚ÅK–”PTTÌ‚ÅK¨®©a÷Þ}<;v åååÔ(j˜:ùEæ/ZŒR©äËo¾E"±ÄÊÊŠÁ#FQZVf”Îõë,\²”±£FÒ1.îæy†×i•LÆÆ-[éÖµ+¥e¥Feò¸àèà€Ÿ¯¯A§MÔñ«Õjt:]£Ç£zÇŸzílÜDQq©×®™ #•Jñóó%<,”¸±áçë˪*R¯¥Ñ½kWªdU\KK£[—.XÕ’H$ìÚ³—ó."¿Ã°VÊÕT|}|pvvÖW‚D"!>!‘ƒ‡#—ËIN¹JaQë6l¤¦¦iI þþ~x{yáì䌧‡^žTWW“”’‚ŸŸ/!ÁA 4ÂÂ"‚ñòòÄÞÞ…BA›Ö­I<~œø„DûíììXYáï燳“™YY<=l¨^!0!ñ¸>ìíÊÄÚÊ WWZDEâé့——>n róò8–˜È†Í›)(0”%ÎÊÎfè xzzâêâÒh¾ÂÃÈŒ§°°ìœ\ÖmبËÖÖ{\œ â..)¡°¨ˆÕëÖsñÒe¤%%¸º¸àííÍŽ]»prr4ïì쌳³3þ~~”–•µú$§¤ Ÿ <Þèлµ¯i…HnöV$å–ããbƒF«C£Õao-F§Óq5¿O'úµóãbV)ÕJ YEUU¿oŽ>¤>9¹y´iÝ;;;ll¬M†pttÀÝÍ wwÜÝÜqvrÂÒòÖÍDpP½{=Aii)…EEFç'¥¤àç냧§'¡!Á””š¾N]]]ˆŒ'+;Çd™<Î4IÇoii‰R©D$23qˆÐh×­XìÚ³—`ÀŒ·ß¢°°H?Ù$'7t:òòó173'7/kiéœ:}oo/D"mbZ³ò÷ÕÌø¿· fÓÖmüëÿgÆÜùóéÛž¡ƒÌÌÌÈËϧ¼¢‚7n“£¿É "3+›¢âbò¯_ןo%‘0vô(AHP~¾>¼CYy97nÜÀR,ÆR,&7/ŸÜ¼<£ü˜™›ßú\oè]&¯}Í`og‡«³‹A:……Ež‘‰TZBn^®®®^§pç2y15jÔ‡1õÞå> "Â#H<‘È•äK¤^»JjÚ­#+'‹ÿ ¼½¼jš 9~ò$Æ !4$ggg¼½½°–XÛ¾—¯\aЀœ»pWúöîMBb"Ur9Ó&½ˆ……þ~¾xyyÑ"*__ü|}ˆŠŒ4H#(0»v£V«iÛ¦ ݺtæôÙs8;:agkKrJ mÛ´ÆÌÌ ggg|}}ؾs®.®´ˆŒ¤gî?y’¼ü|:wìHǸøxûðçÎäåçàï½½~~¸¹Ö>YFF„àääDxX-"£8ƒ£/<÷úð"DD„‡qéòeví݇¿Ÿ/cG2xo̱ÄDìíì4 ?Z­– .2 _?:Æu0Èo£e"anfNXh¨Áçà`NŸ9CTD:Æ‘xüñ ‰¨Õ"ÂÃôñ¶kÛ–¢â"ŽÄÇckcC‹¨ÈÛæ«}»¶Ÿ€J¥""<¬öéÊÕ W¬­­èÚ¹§ÏžÃÝÕŽ:°wÿ~’SR F­V³õÏíÈärf¼õ&Þ^·…·7Ù99Ó&&ææÈ‡aÛ8yê4»öìå_ÿø?Ìë90ljÁžöúï¾®¶ØZYàçfK×(Oܬps°ÂϵöõR¸#O´ò&ÐÞ^­|°³åç„•Øœ {£ø›“¹v-ø„DÒÒ3HKÏÀÝݾ½{s,ñ8'O&<<œvmÛÒ¯oŽÄÇ#¶° ¦U4Ú·Gl!®õ€§‡;NNNú›–ùNGuu5sfÏÂÉÉ‘u6êÓQ(ÄuˆÅ×ׇ­nGZRJLtKb¢[\§b ,Å–„…†âââl¢LŒË÷ ©TÚèUUUˆV­Z¥7nÜCO8åj2ÙÙÙF¿[ZZÒ!6ÎèÝê£D¡P ‘HÉdØØØ(Z­…B‰µµé¡Âºz¹[îTNõó¬ÑhÐjuˆÅµ·J¥B«Ó!¹ÏrNJNæì¹óŒö™û:_@à~iÎ>D£Ñ Ñh í“˱¶¶¾£ï‘ÉdtíÕ›å?-£EdäíØþ≤¤Æ—‘4ÝÎ}‘QDF4OÞºÆò0n>Î:­‹³±ÖðwkãwaMÑ8ÿÊ­:ÌÌÌíôÁxùɸS9Õϳ¹¹9õÌÅLPº[ZDEÑâ1—™økhÎ>¤ö:3klf~cXI$weÿÃöMÖñ Ü-¶¶¶œ?yüΘÿýÅŒz„Ž_@@@@@à1Bèø#„Ž_@@@@@à1¢É&÷IK¤H¥ÅèêïªBíÌÊ€€@Ä6«Z@@@@@@àÞi’Žÿ⥠XŠ- 6Z»©PÔpþü9:ÄÆ5EÒ·¡I†ú¯]KÅËÛ3³Ú-zëVVÖ4xD4IÇ/-‘"¶0G£Q7r¨š"Y#4 ½ 仹µû¹Ëd2ÚÄu"=#ƒo¾ŸûÐUšêâ”Éd̘ù^£áŽçÓJoGâãÿ'Óø+øaÛ%Þú1€ËÙetygS“¤Óœ|HS øŠ¦¥I†ú jµºÑ-•,ïñ'y²gO–¯\ÅØÑ£pvr2.=#Ã@Ë9ñĉFµç<Õ_ßZÖ”«©ìÞ»±XÌ ýïhOsÓÒ¾tù Ÿõ —‡$Ñ*:š.:ŸHFf&íÚ´¦u= ™LÆÑc ôª/—®\A&“ÊÎÝ{¨¬¬dÈ øûùÙ_·eqô:Åu`ïþ\KK£SÇ8Zµlɾ‘–”àåéIßÞOêw×ËÈÌ¢²²’6­c¸xé2"3­Z¶äÔ™3¸º¸°kÏ^|}|ptt¤¼¢œ¬¬l|}}9|8gΞ#'7iI ]:u"<,Ô¤æ÷¹ 8r4OOFAuuµž÷¥+—IJN¡ML ]»t~ v)ð¿KJ^åU ÊeJl¿L»7Tj-¿IÃÊÒœ±ÝBX,r™’ñ=ÃøeÿU‚=ìëWñ77RŸ„ÄãD„‡áêêÊö]»èß·/é:r7WWž6…BÁêµëÉåôª/¡!!Fñ<ˆ¯¨Ïæ­Û>t¿¯]Ǹ±cP«ÕìØµWW´šZ±vmÛ’xℾ Ý\]â¿xé2•7*ÉÈÌ¢S\-[DåÅßߟŸ~ùUï‹zvïv­çÑÑd²¼Z­¶ÑC£Ñ4E²F\½vn]»àîîεki†[»þR¯]ãä©Ó?y’ܼ<>ŒL.gÑ’¥?FYY9 —,£º¦FÞõ‚ëqúìYöÞaô@«Õ²nÃFJ%¥¥eúó32³ÈÌÊfï¾ýèt:6lÚLEE¿üöÛM)ÛãìÙ·Ÿ²òr–¯XEQQgÏŸ'5- NÇÚõ‘‘Á¶í;8~ò$dzkÏÊJKY»þ öé -=¼ü| oIâÞ¨ª¢¦¦†ìœÊÊËHJNaåï«ÉÈÈ`õºõÈd2}Ø*™Œ»wµæñ'9r4žc‰‰HKJ((,4ici]IJf݆”–•QRRŠL&cõÚu¤¦¦²rõ.\¼¤?·òF%àБ#?Àž½û¨¬¼ÁÂ%K‰OH¨­‹3g),*bë¶íddfr,1‘“§Os%)‰Õk×QSSâ%K9yú4ûdÍú?Ðh4lØ´™*™Œc ÇÉÍË£J&cåêÕ¤¤¦’w=Ÿ›· -)áü… ·ot5Z­W+~Øv‰/\ì%¬OçJN[Žg"S¨Ù˜˜IµBÃê#idÝ`ûicMÓq7?RŸ:_°}Ç.nܨbá’¥¤¥§“šVë/^ºÌå+IHKJض}‡ÉxÄWÔgÿÁƒTUUQT\Ì¢%K©©©¹y“ϱÄãlýs;)©©dç䔡©ø%&²s÷RSSY½v*•Ú(/*¥ÒÀ5gš¤ã¯©©Ñ‹5˜:TªG3Ô¿cç.._I",$˜?wî4&=#•ZÍG¼ÏŸÎaŪÕ&MœÀ˜‘#˜0~þþ¨T*vìÚMBÁ„ñãøöË/°··'%5•ŠÊJ&ŒÇ7_|Î÷óæ³s÷.\¼„J¥¢ººZo·¿¿?_~ú ~~˜™›ãêâ n[Ï/:@LMû7Z¹éãÄ„àÍ¡­°µS.SâáhÍó½Â˜:ÿ–æÄºp1«”j¥†¬¢*Š*ªâoŽ>¤aþo}Ö!ÕîÓ¯V«éÚ¹kÖ¯Çâ¦PÖî½ûLÆó ¾¢>}ûôaÿÁƒ|øÉ§tˆåБ£¼7ëCö¯íÚµ3_~ú =ºu3(CSñ×(téÜ‰Ïæ|Œ½½=Û¶oo4/u¾¨9Ó$¿¥¥%J¥‘ÈÌÄ!B£Q7E²ìÚ³—`ÀŒ·ß¢°°ùMÝõœÜ<ÐéÈËÏÇÜÜÜHËùnµççΟO‡Øö <D·4àË+*¸qãÙ99hµZ yii×G§Ó’r5•¢âbؼíO223IJN¦{×.úp¶¶¶”––Q,•’wóI¾Ut4Ÿ}ü.ÎÎü¼ü·;Ú_?-ww6lÙŠTZBEe%PûŠH.—sàÐa|¼} ÎmÓš¿½:VÑ- æåé¯Ó¹S'ƒ0× õìx:Ķ'*2R_ö2¹œ7n=_/MZ_ó;<4?_&MœÀœÙ³ŒìV«Õ¼õút\œùÌ8ýkú”Þ¨at·½€£­„íý9öåpVºÆ[Ãc¨ªVòlPœí$lû`–fDù9±!!ƒ ¹’³R*äJ®ä”Åßœ|HIi)éú£ªª +‰„ܼ|róò¨¬¼V«åùñãxsúk|7w¥¥¥xzxòTŸÞ¼ñêßY4ÿt:A<é(•Ê{ö¦ìéÓë ~ùm%999¼ÿ¯wX°x ¥’îݺä±ašŠ òÆ är9ù×󉊌0ÊËMòŽ¿e‹–ääeãããcôŸV«Cû¦õoß¹‹Î: @PP ×  eý† ´o׎={÷áåéI ¿­\EuM5Cn^(áa?qkkBCC8{î<Ö T°üüüؼuæææXZZâåéÁŸÛwâîæFYy?þò+ï¾ó‰%8::²pÉRär9ööøùù‘pü8×ÒÓoîo€­­-‹–.E$1fÔÈÛæÑ×LJ@ÿ~ùmÒ’ž=ЧN…;|ä9¹¹””–òä= þ fÙÏ?óTŸÞôèÞù ñËo+H¬ˆë«gkcƒXlÁâe?"•J  âð‘#dåäP^^N¯ž=MÚïàà`2­®]:óý¼ÿPYYI—NˆiMfV —.ãâÅK¼4u²áa,ùñG&½0Ò²2~úu9Ó&O2ccmMdD8›·n#+;‡íÛ°~ÃFœœœ°’Xáâì¬ÿM¥R1vô(‚ƒƒnÚ½ F==ç›áròòØ´e+r¹œžÝ»!‹Y±êwú?Õ÷¶õ#ðxájoEïÖ·|^ÇpwÜ­èéa~PlOµõClnFÏhožî@¯VÞFᛓI<~‚ƒ‡èÿ7v ‘lܼWW*++©¬¼ÁÏ¿þ†£ƒ=îînØØØÐ­kV¬úã'OáìèÄä'²pÉ2ƒ´Þ~cú=û Sö´oבžèÙggg4Z }ŸìØÂ°ÛkX†€QüÇsðÐŠŠŠ±’Xj”—çÇ?{Û²nNˆV­Z¥7nÜC8åj2ÙÙÆï®,--é÷—ÊÄÖé8? z¹\n ;Y§J¥ÂÂÂB?¹­Žæ¬¥}'´Z- …ÂàH^]¹¹¹®ý½Ø_W…EE|þÕ×Ì™= {{ûû¶ ëä›ïçòTŸÞ„†„`gk{[ÍoFƒV«C,6¾V©Thu:ƒ| ü4g"—Ë‘H$zi^N‡\.7ð÷µ~Dy[‰nS4…¯ÐÛ]¯ MÅÿÍ÷s  ¥w¯' Ҽ߼45IIIþWPPÐt;÷EFDÑ<õÊëtœÆÍGC­éº8»èš³–ö0333õxPû 4µE¢‡r!7¬+‰»ù7¥ù]«%n:NS³†þ š³ixí‰D"£ójýȽw”Má+ê0*CSñ‹0úí~óòWc>jÔ¨cê-Ûø+–bKÂBCzÜþ~~·’H„…¹9bÛ9)æOSúŠÛÅàç§Ÿ#ÔÜ‘J¥þWUUÕtCýž; õ ê|BÇ/ ð!tüM6«_Z"E*-F×`Í~íZÓ@ÄÂ,iGM“<ñËårrrj… T*•ÁQUUE~~~S$+ pšä‰×îôîÝk+ãõ¥ç/œ'0 °)’¸ MòÄ/-‘"¶0G£Q7r<‘FCïùnní>Ê2™Œ6qHÏÈà›ïç²çŠz÷J]œ2™Œ3ßk4\sÒÒ®¯{ýóòßX¿ñþõÃåòj^™þ†ÁokÖ¯'>!o¾ŸKzFeååÌ_¸ˆüüëw]þùù×IKϸo»î†¬ìlÚvìLÉMu±Ï¾úš_W˜ÿhHMM S^~…œÜÜ{ÒXšãkÖ¯''7÷Žáê·¦á‡m—xëÇ.g—Ñåû¿žnGsò!MAýkã^|…ÀÝÑD²¼š›¼“Ç£’å•–” ±”pàÐá&ST©Tz1˜»A&“¡C§W²ÒjµF¶©ÕÆ"F57å€u: …òŽéÔ ]Üš_¡Õjæ[lÙ¶]ÿ¹ªª ™L†L&3¨£:UES4´_§ÓÈùú7ØôÂR,&,4”´Œ Ö¬[Ç|¤edpùÊ•» ÛFcoNGuuÁojµ…B¡ÿM­VsôØ1½ÎÃ037'.6kkkƒò¬¿)†½]9×ý_WÖõÛ€¿ŸŸÁŽŠ …BÿÙT~ës/mWàÎ\/•SXV+¶ãt^N·ß$J«Óq¯Ê%Í͇܉†mìNí ¯{ñwG“ õ+5¨ÕêF÷tV*ïÜè;vífÆÛoòù×ß,Á@t¦>_|ý Õ55Èer@Nn.¥¥eL<‰C‡3þÙg3r$ý‡cõoËõR°fïþÑ¥cÇÛÚ¢Õj™õñlllÈÎÎÁÏÏ—ƒ‡³}çn4 Ñ-¢˜ôÂDfÏù‰¥%)©©|òálÖþ±üüëØÛÛ‘™™EdD8YYLÿû+ÄDGóå7ßRSSCaQ1όũ3g)((ÀÁÞžüë×Y4›¶låøÉ“H$@\lm9$?Áé3gxwÖlºÜ”Íܳo?yùù¤¥§³láNŸ9ËÚõ`go‡£ƒo¼öª>O ívìXÒÒÓùaÁB’’’™2éEN>Mx=Ï*™Œ]{ö R©HNIáÝY³6x0oÿó_ìØ²‰´´tf~0‹-¬ÓoѹfÝ:ÊÊËIÿêk ÀÄ)SØ¿-¢¢X´tVVVåéíéÅ¢¥Ë ÄÎÎΠìþýÃ<}Øÿ{ã 223 Êyê¤õyiÅws`È äç_ÇÝÝ '''JKËøæ‹ÏHH<ŽD"¡Ï€A êߟòŠ ||¼ù`æ¿ ò;çÃYúô7mÙÊžýûñòôd@¿§ômBàÁ(—)qs´âã5g°•XèÌÊC׸˜UJ®´ŠÅ¯öä¥ÿ¦s„'¶V¤ä•#W¨™÷R·;ÆÝ}H}¾ý~.C $2"‚×Þ|›O>œÍÇŸ}†D"ÁÅÅ…o½É©Ógõ'u4ôK»vï¹k_!pw4ÉMMþ®ÎÔÑTOß Ù±s—¯$ÌŸ;wš “ž‘J­æ£Þç‹Oç°bÕjž7ŽËII8xˆ>O>IRr2{öícðÀúNjµ°üý !>!ñ¶¶4G-톺×OõéÍ»ïÌÀÞÎŽ‚ÂÂÛêg7´ 44„™3þÁÂysù}íZt@Ãg0|èP<<<øìãèÜ©#;Ʊs÷þܱƒ¯>ûÄàB>t(Æ á³?¢ °Ð¨¾2iâbÛ·cÁâ%Xˆ-¨®®æ³¯¾ oïÞ899¡R©Ø³wó.böûïñò´)úó÷ìÛÏì÷Þ¥Cûö\NJB«Õ’•CRr2*•ŠœÜ\};˜4q£GÏË/Meý†(•Jƒü^KKÓ‡«k®..ê« Ü:j·{>$šö!n´r!Òlj ÿ>À›C[ak%¦\¦ÄÃÑšç{…1uþ!,-̉ tábV)ÕJ YEUUTÅß}HÃüßú¬C$ªÝ»_­VÓõæƒÅíüI ¯£{ñwG“tüZ­¦ÖáëtMMYy9 •’ìœ\ìììÉÍË×7̆ɋÕÿ‚H$ÂÑÁ‘sçÏ3°?¬¬¬¸œ”Ä ý Î;|ô(EÅŸ»»Ñà†a"jµÚ(ÝÃGrþÂììì@T;fgk‹‡»;C ¢UËájiƒNo»H$2²¡NK»G·n„…†²iËVŽŸh`¦éº03«=W«Õáá»;#†»­ýõÑêtè´ :üIÕoÇ ájj*ÅR)-¢ŒÅê‡mX_¦ÐÝ^ôpw§]Û6Œ= ¹\ΟÛw`fnŽ­~¸±a{,**&¦U4ŽŽœ>{{{¬¬¬8yú nnn¦mI­V‡§§‡É²3¶±r®™¹¹ÞÞ†Êu˜›Õ* 5ÌoÝy:ôèÖ~}û’r5Õ¸MÜ%•5XK,÷vdH\ù¥r=ìèßÎù^&ÈÞünVHĿą»#A˜·­>MA™œMÇ3©)9xñºQüÍÖ‡ÔCSoXßÚÚš—§M%,4”•¿¯A.—ßu;o˜Ñ{ñw¦I†úÛ·‹%=ã>>>Fÿiµ:ÔÓï<&Îù”gFfÜØ1Ìúxé„…†òý¼y´o׎_–ÿÆ„çÆcffÆì?¡º¦š‰Ï _ß>ü¶rïÏüEÒbÖÿ±‘NqqiK¥¨T*òòó±´´ÄÇÛ‹_–ÿ†R©$;'‡Ùs>áÝwÞA"±ä©>½Ùwà }ú™^K»X*E«ÕRZV†¥¥%}ž|’‡QTT„H$ºãlŸ'ŸäÄÉÓÌžó Ò’&>7Þ¤–öæ­[)))A"‘½û bÆÌwyªOo“iŒ9‚«~ÇßßgG'£ü×· //Ÿ9Ÿ}Á•ä$¦NšÄÙóçðñöâûyóxsútÂÃBQ(|ðÑǼ÷Ïwx¢gV®^MT©Üº°+æ¬&-=·_Ýd}5$$8˜i“'‘”œ‚7-£¢P©T”WTPSSCBIHHm˜÷?ü7wD"…EE8;;éÅúõíÃÔ—ÿÎÂys)-+ã•鯳ø?ó­“úå9zäæ/\Hdx8žž&Ã~ðÑǼýúë·-çûEÙ ¿’›:âßÏ›GÛ6m¸^P€XlÑè{ÃÍÁŠo'wÖ¡w=£½ ÂÅ…»püë¨4ZÄæfôní ÀC[0¶{ iN>äÏ;9xøˆþÿqcÇÐ&&†‹–àêêBnnׯ°`ÉRìÑê´˜™™µs•JÅ»³>4Hëí7¦\Gááwí+îŽ&éI¹šLvv¶Ñï–––tˆ{(2±÷K®óÃШ¯¯ý·4«U*FOeÍYK»1n§9}/öו{c|þÕ7Œ5⡪niµZ4-â›Ã‹uûIÔ¯³º'sss’’“Q«5ú'þ‡ÁÝÖgSh{›Êo]=È««177G"8Ïÿ*š³‘ËåH$Ìoê[ët:är¹¿í¼)|Åÿwéi²û"#¢ˆŒhžÃ0uÏøùh(íZgc]sÖÒnŒÛiNß‹ýwzú((*ÄÏ×÷Þ ¼ fff7_b±ØÀAz'Ѝ‘!ôûånë³)´½Må·®LÕ@ó§9û†þP$÷0ÚySøŠÇ‰&ëøî…ŠÊJzvÕÃíøî•†¤€€@ó¢¹øŠÿf‘f£ƒ£ž~ú¯6C@@ ™#øŠGèø#„Ž_@@@@@à1Bèø#„Ž_@@@@@à1Bèø#„Ž_@@@@@à1Bèø#„Ž_@@@@@à1Bèø#„Ž_@@@@@à1¢Éöê¿^OII‰Ñïb±˜ Àà; ¶<|š¤ã?uêÎÎ.DFDI8þ¶û s6¡s¤¯hÛÉ 4B“ õ§g¤ãéé…N§C«Õ꤬R.dVàíåÂɤ‚¦HÚ€Ÿ~]Îâe?²|ÅJNŸ9Ûäéý7¡R©øcã&ö8øW›b’œÜ\äÕÕ$­}šLK«ÕòçŽ% FéÓgYžî…+IÉ\KKû«Í¸²³s8r4þ¯6Cà¿”&éøKËJ©QiX{à*©¹¥h4jþ8”Ê»Squs&íjŸLéÒI°ÿà!ž|¢'mÛ´fÛŽü±q“þ?µZm^©T¢Óéî*n­V‹J¥2:_«Õ>˜Ñ·A§ÓQSScð[Ã|hµZ£<˜²iöœOÉËÏ'ºe‹»J[¥Réó[UUuWç‰?Æ–mšüO§ÓQ]]c`«N§Óç''7¹\®ÿO¡PÙó e­V«¹qã{öí£úfZFo“F£eëŸÛ‘Éå(•Ê;Æ×°=h´ZT*µþó©3gôyÒét&ód SeÆer/̘ùžþó¾ˆOHD&“¡ÑhnÙ¯Ñ|˜Ô¯ëÆÒjX¿¦ÚöÝ´ÿGÉÛ.ñÖ \Î.£Ë;›îpƽ#“ÉÈÌÎâÐÑ£úßLù³*™ìËâHü1¦¾ü÷FÿW©TF×ð|”À_O“ õ+ vŸÌäR¡–óÙ™XŠTHlì1—ØœšÃ„.6x¹Ø4EÒXYIˆ 2"‚©¯¼Êȧ‡3{Î'H,-IIMå“g³ö à`oOþõë,š?×ßþs>œ…£ƒoÏø'Ÿò±~^ÂÁÇپs7†èQ 4—_{vmZsâÔiÞyû-ÖoÜÄŒ·ßÄßÏ·gü“Ù¼‡£ƒÅÅżùw ð';7·¦¿ÆÃ‡).* 2˜å+Váíå‰R¥â½¾Ãµ´t~úu9žî´kÛw77-]FpP vvv¼ñÚ«lÚ²•ã'O"‘HÓ—õü…‹ÈÍËÃL$ÂÂBÌïÎdͺu”•—“xâo½>—_›NdxíÚµåÜùóH,-ÉÈÌ⻯¾`Ûöœ:sw7^š2…„ÄãH$ú Ä þý)¯¨ÀÇÇ›fþ‹O¾øµZF£ÅÚJ»ÿ|GoÇšuëìŸúò+útÇŒÀ©3gømå*ü|ý¸xù2:ŽÅË~$--¥JŘ‘#èGZz:ó.¢  §‡ %*2‚/¾þ†ý«×­§¨¨ˆ^={2÷?  à̹ó|õÙ'ÈåÕüòÛo¸»»sòÔiæ~û5‹–.#®C,Ó^y•˜èhŠ¥RÆCîÝøô˯@§£¼¢g'ƒ<½ÿáGú²šóá,?=Ò L† ̾yûõéœ9{Ž3çÎ1uÒ‹–I§¸8NŸ9û³fÓ¥s'öìÛO^~>iéé,[¸€ÓgβvýØÙÛáèàÀÔI/ÒµWïÚvÒ¾½¾MÕûÜÿü©TŠZ­aÄð¡lØ´{{{”J%¾ÿkÖýaP×YÙÙi½4e2ïÍþ‰D‚‹‹ 3ÞzÓ¨m‹ݱý×µ÷GIJ^åU ÊeJl¿L»7Tj-¿IÃÊÒœ±ÝBX,r™’ñ=ÃøeÿU‚=ìëǸµZ-³>žƒ ÙÙ9øùùrêô£røæû¹”HK°··#;'‡Wþö¯Lƒ[6‘––ÎÌf±åuFó¬Lù¥5ëÖ‘œ’»³fóÖëÓé;p°¾ \º|FC^^>³Þ›Ieå;ú(æA“<ñ«ÕjÜìÅdæ—à†\mŽ…¥˜Ë©×é鈣ݣŸØ'‘HP«ÕäæåQXXÄȧ‡#—ËIJNÀßß—¦L¡ªJ†J¥"4$˜ŒÌL”J%jÚà"‰ àåiSÿìXΞ¿€££/M™Bû¶mI¾z•Ð`ö8„F£A­Që;}­N‡ØRÌ‹'Û®-‡oÞ¹»»»1ù…8uú ÁAL|þy ÇOž">!¡ƒñòKÓè×ø„¢[¶`äÓùpéW’’èËÔI/àçÇ•¤$ÜÝÜx~Ü8üüôé·ˆŠÄ××—'Ÿx‚Î:Ð¥s'Ú¶iÃO¿.§g÷îŒñ46m&//'''þ6m 1­¢‰iÍË/M£ °Ð |k ¼½¼xqâDŠŠ‹ÉÊΦg÷îôèÖW^š†D"ÁÆÆ– ϧg÷nŒö&¿ø..Î\M½Æò•+:x“&NÄÅÅ™úÏ)½žèÉÐÁƒØ±k7åååóò´© <ÐÀ†Ê7LÚ_?Ý:Ž%$òô°¡¼òÒTÂBB©¼qƒU«×гGwÂBCذy3¾¾¾¼2m*Ï=û Gâk‡VëlÓétèt:ŽÄÇÛž¿M›Š——'Gâã6d0/O¢ÿ­îÉÈѱ¶#:xÉW¯’ý:EÅÅümÚTÚ·3ž÷R¿¬ò¯_7*“@²²²HIM%2"ü¶eâì섯¯¼4î]»ݲ›:Fê*âèÙ£;#‡ßj_uí¤~9šª÷ºp/O›Â©ÓgèÙ½;“'ND¡P|õªQ]7L«ºº†ýÑ!6–§‡1Ù¶ï¦ýÿhµ:\¬øaÛ%B¼p±—°6>+9el9ž‰L¡fcb&Õ «¤‘Utƒí§³ï*î¼ü|ÊÊÊxeÚTú÷ë `² ¶}¼üÒ4ªªdúûcnfFFf&)©©<ѳ‡ÉÉÕ¦üRÏîÝqvvÖ_Ãp« 2˜i“'áââÌ©3gîÊG 4š¤ãW(´wc`Kk6LFkaÉÅä,fŽðcdϽÃ|”\KKÃÇÇ›ËW’Éd:r”¾½{ãåé@P` ^^ž8:9RSSÃð¡CØúçv¾ù÷÷tíÒÙ ®ã'O²`ñ’›ïlk‡nœœðòò¤E‹(ª««>t?,XÀÆ-[ί Æ‹&–‘@xx‘áäæåóôða„ѪeKŸ =#ƒ±íqqvÆÕÅ…ìœ\J%‡Ž¥K§Ú§¶×^y©TÊŒ™ïqöü^{åbZµâûyóõ7(VVVXŠÅ8ØÛcgk @TDææfÒ­kâ:ÄbccCN^ŽŽ¸»¹áåå…»›;ÎNNXY;Ž  @"næáÌÙ³8;;ãää„¿Ÿæff¸ººÐ"*{;;~þe9›¶nC&“‘–‘AQq1bÛããã¹¹¹a¼øû#“ÉÈË¿^k‹§'înîá¤R©IûëÒõôðЇÍÊΡuL vvvØØXST\LyE×ÒÒ°°° uLÌͲ’ààà@ë˜Väää"‰Ðj ‡ Ó32éÕ³înnØÛÙékÕ2gggýoõë> ÀŸª««¹xñînnú|ÕG.—”•L&3*lmm¹xù2 ‰‰tí|«½™*“òŠ $ þ~~8;9àãí«‹ .ÎÎTUU‘“˵´4Ž;¦o_uí¤~9šª÷ºpa¡¡äæåÓ­küiÕ²%§Ïœ5ªë†i¹¸8³mãH¥RþýÃ|är¹QÛ¾›öÿ¨Ñ"`úhÚ‡¸Ñ:È…H'&üûom…­•˜r™GkžïÆÔù‡°´0'&Ð…‹Y¥T+5dÕ¾F+ª0ž rùJ>Þ>8ßô€Ér€Úöáâ쌣“#666|òál¶þ¹„ÄDþñææ¡¡_rvvÆÂÂB CmÝÚÛÙ±jõZ~[õ;2™ŒÂ¢»òQ̓&ê‹Å¨5j†t ¥E€#Ç®3mt$¾žÎ€¥R…E“­$Ô“››ÇŒ™ï‚Ô5ïüßÛ¸¹ºqàÐ!ŠŠŠ‰D.+ $''‡KW’رÙð=]±TŠV«¥´¬ KKËFÏŸøüx¾›ûƒÑù)W¯òíܸxñ/M̱Äãúÿ&<7Žï¾ÿoo/4-ï¾óÎ_¼ÈÌ÷gÂwì’ IDATBÛÖ­=ró.$2<OÚÎbóÖ­”””èG76oÝJVNb±Å]½g æŸÿø?>ûòk,,̽MÆ7zäV¬ú?œnkÃzŸûŸúÿ&<7ŽÏ¾ü{Ôj Ìü'UUUuÝ0­ëÌ[°G{´:-fffl޺ɠmßMûß²íOV¬úµ«VÜÖþ‡EéFw !ÜÛ‘poGN¤Ó6Øc_gÅ¡k¼5<†ªj%ÏöÅÙN¶púš”(?'6$dð·-9›!ÅÉÎ’+9åx8þ?{ç×ÔÕ>ðo€@HX!ì½Qw­«îQ먫ËZ»lk‡m]u[­¾­}mëìP«ÕºW­{+¸÷ň²$!Éï$%$ V°}Þïç“&÷ÜçyÎ9Ï9Ï=ç^îck$ÿ¹vmÙµg/§N£¨¨{{³í`Žg[=ò+¨޵µ5†Ñ_L0ЍGÇÏ™ÌK^žž¨Ô*ÆMœd´U¯ÑhHIMÁÎNfðËÞ½žà%ðïÀ²wïÞ¢î¯njŠœœlôè‘ØÚ ±à&ÆNfM©VƒJ­"ýv:uÂÇA¥Vãè舧§m[·¦NxÙªÖÕÅ…»¸ººQ¯.öövøùøà¢P BDXh–––œ=w™LFïç{Éu–˹};…³3q±±„c-¶&$8"ÜÝÜðñöFîäÄÁC‡yí•—ŒÎW*•lݶoo7jijϴD,¶2Ø pvÆÑÑ ‘ˆçÚµÅÇÛòîå¡R© ¡Aý($6T*þe+®¼{yÜÍÈ$,4„ömÛ¢Ö¨ÉÊÊB¡PЩC¤Rãç*ÂÃBQ¸¸`eiI£Ø¤R)¡¡!”jKqws§O¯ç‘ÊdXZX €»›+NNN *{n¢œÃñ ¨U*d2];uÂ×Ç™L†J­ÂÕÅ…zuêb-ŒD"¡PYHa¡’F1ÑDFFM¡²±•˜ÈzõH$øùúbooo°ÍN&#®Q,ždeg.[¶hn°ãAö—ã¢P››‡^¯'&º! ê×§^ݺaiiIÝ:uðöò4ìNy{yÑ©ÃsØØØ`cmC~~>M›4&48„† ê#µµE£Ñ~ç.:·¢þÂÂBŠŠ‹Hºz µZm$_«Õ>PVII i·o£×W×¢e}EEEèõzÒÓï•W*‹ íôbŸ>øúøeiró LôUÖuæÜ9<=<ùrÒDF¼7ÜDwuu1g¿¹ò•õêt:³m^ÑþÊû”¹ ‘››‹^¯'-í6ááaìÞ»¯¿šNNNü¹­VKDÝ:tíÒ™é3gáííÍ;wp°·çvz:ó¾›Ãú›H8v ºvîD\lYÝ$%99™Ñ_Œ§YÓ&ú˜Ø “ɸ›‘Áô™³øfæW¬XµšŒŒ ü|}Ù±{7îîtêðbb?y 6ÖÖ\IJbÊ„ñøùúVÙ¶§NŸ1èÿøƒXòërüü|¹tù2‹æþÀ‚âÚµdÔ }_èEÃõyùõ¡„‡†ݾ/ôàøÉ“,]¶oÎ]¸€X¹j5GÇBd››+C‡¼Æao͵äd|}}°•HÈÎÉeÖôiŒŸ<­VKZÚm¾3еë7ÐúÙV ö]:v$ïÞ=¼¼<ùdÄ|>vîX‰­ùáCwíÞËÕk×;a"*•šO>,«—^¯7©K‹æít™Ø¯×3ÑFåc¢šè]ºì7ŽŸ<‰›« Ã^ÅË–‘••Ei©™LJÏîÝññHZ=Ó’¬¬,š4nLXHÈû}îÂE9õ##¸t劉ÿTO©V‡‡\ʤ•' ór$W©bÙ¾«œ»™CjV!óßmŰï÷Ó4̙Ċ+iy©J™3¬Åe?é9¤2§NŸ!ùúu6lÞŒ­­„7oqþ¤RY•6×Ä"PóÔÊŠ_¥RêBçz¶lØ{•5ç.ßdT/^h„^¯ÿ[WˆÊÖ?·qáâ%B‚ÙòçŸfË$_¿Ž¦´”‰ãÆ2}êd~]¾‚ÁpáÒ%öìÝG»6m¸tù2;ví¢kçN† P?2 ?__‚ƒ8t$¾Z[vï݇ÔÖ–ÑŸŽd`ÿ~,Y¶Œß΄qc föœïxyÐ@¦MšˆX,fô§#iǹsç©ETd^ž}å­øLË|1f4"‘………ˆÅbJKK©[§a!!;š5iLPPÓ&M¤{—.UÚPN¹üò>+—«pv&,$„»÷pöÜy´:9998t¸Ú¶ýðý÷ úвÕÐ믾Â'#>ÀÞÎŽ³çÎóÃüX‰­(..fÚW3ðõõeÚ䉆 °rÕÆÃÈFP?2’ëׯ3í«™Œ9’éS'óçöÄ'Åßß±£>£]›Ö´mÝšQŸŽ$'7€—ÀÏ×FÃÖmÛVQ¯¾<˜·† eõÚu¨5,,-)--¥yÓ&FmÔ¦u+ÂBCødÄƾuã†ÙºTe¿Ùò"‘‘Þë7n0köl&ǘÏ?ÃÕÕ€×^~‰YÓ§aoo^¯ç^~>/ À¬é_2{Îw8+œªßËå( ³þ#P5z@¼×-‚˜ ê8îåÄKßìaD÷Hd1yJ5n޶ nÂÐïöameI”¿3çnæP¬Ör3£€Œ{¦;”Oz©LtÃг[7‚ƒ‚ønî<ÆÃ[o¼þÀv¿7‡ÔµøµZ-" :6öcH+g.^HfHO"‚<°´´D¯×™<í_Ó$_¿Ä†:áá¼ðüó$]½VÁËÿÕcccCI‰ (»¢¶°´@$áëãÃÆÍ[x÷í7‘;9±sÏÞ÷#?ÌŸO£˜>ù±¡>]Ð_ØØX[ôüõ› ¹y÷€²m.''G£ã–e2Åb+ô÷õéu:F¼7¼Êö³°´@¯×Óµs'>ù ü¹Ÿ/5*£×ÿµ•W "‘ˆRñmŒ®;1ÿ»9ØØØðÓâ¥HllhÚ¤1_ŒÅæuk [€€Ù¶­¬ßÈv ¬¬,øìã˜ÿý¶¬_k¶,€••¥Ñö`ùŸˆ–¨JÐét*•H$’ mci¤++;›ÞýÒ(&†g[=cv‹ÓÒ¢ì[‰„o¾šÁ‹}û0eúWýµk%Bdf»VØÒªÚºT¶ßÊLùÊzËÛ³ø!o]iï×Il%~è~ªõó$¦å¡pêéH·8?oß#&Ø…ÿ iJôˆµt‰õåxRîöÈílx»s=æl9Oƽê¿¿šÄ´<Æÿvœ[™…ÌÝzÑDþ“žCª£ÜW´=ÿ¸sˆ@íP+[ý 4äúd<<܉«çNTR©”u1:žâ⬬jí|ûÝ÷tîØ‘çÚµÊlJ¾~ýþUñb¢£Y¼ôW^4™TÊøIS(.)fð€þ4mܘ¤¤«¸(4jË5·P8߯swwgÃæÍlÞº+±^ž,^ú+†[))ŒŸ<…ÑŸ~Š5Í›5eã–?˜8uEEE8ØÛÓ·Ï |÷Ã<þܾ­VÇèO?ᇠ«¬“»»;§Ïž%-=+qõí·tÙrRRS‰D„† dä¨Ñ<×®­YÊquq¡¸¤˜)Óg••E`@K—-çfJ yyy´nÕŠ¦Mš°yëV&M†H$¢o切·——Ù¶ dÜÄI|ôþû&vûx{óÆ×ýż¼<©W§Ú·3[Ǟݻ1ùËéøùø˜t///>ûäc¾þvVV–¼Ø§7Ñ ê³aóf³ç‹­¬ eÃæÍܼ•B£˜è*Û3=ý?.^Œ­­-þ~¾X[[×W¸ÐsrtäVJ ç/^4©K¯ž=ª´ßÇÇ´îM›4fî‚…½ÁA }íU&N™FPP ¯¿úJ•6/þu†×_}…Àÿö{Eß«ÎÌîíÄäA ßßí@„Ÿœ{D™”ÿþÍ–ÌÚ±¥cû•ùÞ/´`|Ó[+OzÙ²õOöî?`øþÑïþ_î«“¿œŽ›‹+"‘µFcôPkTD=^4ð±æÚA´|ùrý€j\ðÅK¸yó¦É•£ ãš`oo_ã:•J… J¥©TŠH$úÛ²ŠŠŠJÿzP±\¦F£ÁÊÊÊäªZ­V›GÒW\ŒØÊ ±XüÀ²5Q?N‡J¥ÂÖÖÖÈKKKl*ÔãqëeN¯V«Cü€É©üOE«M+õaUh4T*vvv,«V«‹ÅˆD¢jëbÎþÊåÍéÕjµèõz³ÐJ¥’æ­Û²ä§EÔ ÿÛmSþ#Pó<É9äA”?„jYa7­2ÿÔò4séÒ¥*ݹs§öÞÜW¯nõêFÔ–øÇ¢|K¸ü!¶Ç¡rÀ(—Y•?®cK+ žQõ³°°0°UÙPÓÖÂÂâ¡nYZZV;é< ô¡ì­“;YVlêêbÎþÊåÍé}˜:Kll«_jÂjž'9‡<ˆ‡ñÃj¨á]ýÿÏ[[óö°7P(ÿ´)ÿBj÷F»€€ÀÇZ,æ­7†þÓfüKVüOBàxŠ¿€€€€€ÀS„øž"jåá¾¢¢"®$^ÂÒÒT¼^¯ÇÉIŽ¿Ÿm¨¨†Z üÛ¶o¥mÛöØJÌÿ½è™³g„À/ ðP+[ýÙ9ÙX‹ÅètÚ*?OŠ^À¦-eo"kׄäë×™5û[vìÚ]£ºÊe*•Êjó±8xˆ©3¾zl}J¥’?·ïxl9UQRRÂÌofÿkäóÎû<¸à#2kö·$_¿nø^ÑO•Ñ_ŒçJbbØUŸT¶YàßÁÏ»®0å÷S¨KuÄ}¼®VôüsˆFSJt“fœ9{î±õVänFF•óåƒæÒêýÅx²³³Ç4nÝJ©vLÖtL©-j%ðk4¥hµUJK5RÜÍÈ ¸¸˜?þd’û¹¦Ðh4”³\©T¢§úì„Z­ÖF¥R›äa¯ª.jµiYszv étz®%'£T*Q«ÕeC9Ƭîi_Ídãæ-Õʇ²œáfmº/³b†Çªt•£V«Mú¨*ù‹¹~W*•UúBÅd&*•Úl™Ê²ä'1WŸGñKš!1íoåðßMçñQTÿöC^Ï£æ)}’sˆ‰½|ª¼\ùk§«C¥2N.ô 1û(T–UZZJAAÁý_£ÑÚÁ\6ÂÊ”””P¢*yh»ÍÕñß2&ke«_¥*¡´´´Êw|Wžäk‹­Û¶3ò£|9ó?:|„¸FæsŠWΟ’šJNN.C‡¼Fçî=ØÿEú¾ð»÷`ÅÒ%†Ô¼{÷ïgçî=ÜÍÈ YãÆÕÚR[¹´·íØÁù‹Mri¯ß¸‰„cÇLò©I8ʉ“'«ÍË^ñU­ÉÉ×ùöû8zü8ï †µµØÈ{{®_¿Á§Äû}Lëg[qúÌYlmm¹{7ƒ>xÏ[ûHÂQ<Ä…‹Yˆh׺‰|g¹œy à פ-÷8ÀüE?2nô(~[ù»‘.ÞyÿB‚ƒéß·/“¦}Itƒú=~‚O?ú©Tú@ù1×GÇNœ0ê÷úõ£øö»ï©[§ç.\0:ÿnFo ŸúQ‘Ä=F“¸F¤ß¹Ã³Ï<ÃàýM|¯UË–&~òŸÙßBn]>â#¾œ<Ñ _¯×›ä2?yê´Q¾óò¾¨}ò”j\%LZy™þr–í»Ê¹›9¤f2ÿÝV û~?MÃÜ‘I¬¸’–G‘ª”9ÃZ@ëV­øbô(>|ï=Ç'Tkˉ“§°´´4Ê¥½rõj^<ˆ ãÆâãíÍO‹—åÒ./Ó°!çÎ_ u«V|5m }ð—¾Ê¹´õz=J¥’K—/Áø1£&þfMåe¯Ê†r‚‚ýéHÀ™sçLlèÓ«/_!5-}@AA!=ºu¥AýHâŽ鎊Œ¤G·ntïÒŬüõ›6ѳ{7žïÙƒ'O™´cvV6s,bñ¢…8ØÛ›ÕåëëËŒ©SðòòÄßß/ƌ慞=8}öìåWÆ\ûTî÷ ›6óÑûï3úÓ‘ÔŒ4‘áïïÇÄqcѨմkÓš~½{³|ÅJ³¾gÎOôü•ý¯òúðèñãò|ÏHmm‰O8ʥ˗±•HxkèP!èÿtŽñ%-[I‹ºx9Ëüõn>ïÝWG[î)Õ8J­y¥]¯ÏÙǼ­—8üpÛÑOz©ŠïçΧu«VôìÖ ›6Ó£{7z÷zÞh<½öòKôéõ<¯¾<˜a¯aõÚuܸy³ÊùáA¬\½šï gÂØ1øx{súô&ŽË£Gȶ;Ù°i3£FŽdäG#ÌŽÅrüýý;ê3Z?ÛŠvmZ3êÓ‘degsûv:Ó¾šÉˆ÷†3uÒV¯[ÏnÃÒÒ’/ÆŒæ­7^7Èø+Í»ñîËíôt“:æåå‘’šÆ[C‡þãAjiÅ_Zª)k”*¶DžÄvGn^·ï¤óŤɤ¦¥U訿ʕ¨J $,--ÑëõXXXàèèÈ®Ý{1ü]Ö¬_ÏC‡ñÞp#ë7nâüÅ‹xzx˜LÈTúž“ƒµØ8 EI‰ gEYª_[‰„ô;w±¶ù«LyÚL©Ô½^Ïú›8xø0¡!!fô•Ÿ#F§Óñî[oñÛï¿3ð•×xeð :ux®‚ikÎsØJlÀŒ "‘?_~_½†ç{tÇÞÎŽÌÌL<@LÆFrD"Ìn••Ë/..áÂ¥K¤Ý¾M«gZš”Óêt8;Ø“™•EqqqµºŒäK¥V)ßœ«êõæÛ§r¿cg÷à„6R©½¾,éŽN¯3ë{æüÌoåëõ››ghƒ† J§ر{7S¦Ï sÇÆ}/Pkdå— µ±¢s¬/c}Y¼;‘H?9b|™µî n޶¤e+ñVȰ²Ñ8Ì•ŽÑ¾´Žô¢ÏŒÌ|µ)ÞäÕ¶al;•J¿–AFòŸôR2™Œ¢â²ÛÅÅ%?q‰Dbv¼–Sždª¨¨ª1[Ýö¹ÞP×òñb+‘›—ÇÇŸB.w"ívr¹EEň­>ë X,6Œ}++KJTe·älmm±´´ÄN&#/ïžI»‹D"tZómdn^  âÓ?bÊôØÙɘ0vLdGü»ÔJà‰Ž%ùzY~ôÊètzJµµ¿âŸ0y*/öéÀ~}øbÒd’¯_'$8˜ÙsæÍ/K–òÒ XXXrÆ¿/ô⻹s  ÅÝÍÝ丛›+ —×ßz›1Ÿ}Z­.s˜“ïåéÁì9s˜:q"öØH$?yyð`“öY¶b¥Q¿÷íÝ‹±&Q¯n“®>Іr‚M|¯E³f&~Ò *ŠïæÎãÒå+¤¦¦ÙfÚŒ™XYYÒµs'öïÇØ “;a"––X[‹quqAY¤dÊôdee`˜ÿ èoRÇ“§OóÇŸ"[QTTô§º-_¾\?`À€¼qÓ:`²º³··çÍao›ÔŸz½ž‚ÂBìí¹›‘«‹ËC¥­Š¬¬l gCG–Ë,*.ÆÆÚÚ䪮°°ð¡ò¹W©/;[‰-2Yõ©dõz=™YY¸(U¿¿kƒJ¥B§Ó™¤ã|X¥þŽ®Êòó p°·7|¯è'æ¨Üïjó£ÚW\\Lqq1ÎÎÎfm.,,D&“!‰ ;6ÖÖØWa¿Àÿ.OjyX´Z-÷îåãì,ès*ÙB¥©­­Ù¹ªP©4;—–“••‹Ë_™(Õj5jµºÆÆ¢ÁŽÂB¬­­ L¥¥¥äççÉŠ1¥r•EEè´Ú'2&/]ºTå±;wîÔ^àxò<(ð ¯ìxŠ¿€€€€€ÀS„øž"„À/ ð!~§!ð ¾Æó™—ËTk4ìØµ«Êr·n¥Þãü8h4®^»öØrþíhµÚ‡ªgbR?-^Âï«×R’>IîÝ»W#ý*ð¿Ëéälö_H@«Ó³`[Õ/Rù;$&%ñó’¥lÚòÇ?âã55w ü³ÔJà/))áø•t>Yx”)¿çjZ_¯9G@ '‰i÷±½ËݪΜTSÜÍÈà—%¿òñg£Êr/«ÕÌ]°Ü¼\Ç'p-ùñżìå25j5Ûwî6[^©TrãÖM“wRWäasi«Õj®^K6«œK[§Ó™MˆSùÝÕâaÞ÷n.'·^¯¯öÜi_Ídãæ-Ô¥ÕéLêi.‰ÈŒY_Ó´Ic<<Ü).)©RïÃÔçïäê¾›‘aÔ¯Â{òŸ>V¼Æ¼­eÁþ› çØz"¥Úò:}U©rÌ3cÖ×´hÞŒ‚‚‚j}üa¡•T8_¥zpªtss—àãÿ›ÔZZÞé÷Љ%Ô óeÄÜx‚<Ø}ò6Ζ%´Šp~°àè±ã¼4h·RR¸tåJ•åvîÞM§î=é3` 9¹¹Œ›8‰%Ë–ЭWoV®ZMii)ÍžmM±c†ó6nÙB\‹gˆkñ ‡y =‹]FóÖmùpäg@Y;M™>ƒvº°tùoÌšý-½û¤Ù³m5n<-Û´¥C×îäää²qËb›µ qËV:|„B¥’í;w2kö·|:z,Í[·eüä)$]½Ê³í;дUk‰7ذâ÷Ulß¹“qM˜1ëk³6Ù¼ôWâZ<ÃØ )--åݲ{ï^t:ý½„R©$??Ÿ.={×â¶ïÜ @ff/¼8€¶:“tõÿùö¿\I,ÛyyïÃYüë2V®Z͸‰“˜1ëk³ºÊ)»ÚÉÝŒ z÷HóÖmiÙ¶=7oÝ2”Yµf-ÇOždÀK¯ðÞ‡“žžN·^½ymØ›ô0ˆÌÌ,&LžBl³¼6ìM³}¤T*éÙ§[¶¢Û }xóÝá´hÓŽÙs¾   €aï§Ï€†]ˆÅ¿.£É3Ïòâà—«l7§ƒ<¥k±72 ¸•Uˆ¿›Ê’Ržûb }g”þ3wÑìÓ då—ûÑZF,:üP²û Ìñ“'é;`3þó5ééé {g8í:u¡Ï€A†Å„ÉSˆkñ 3¿þƬœ»ôìÓ¦­ZóÊÐa¼ùîpÚtìDÒÕ2®<‚éÜ•ŸŸÏËC†yÿj-ð7«£@™“Müå zµ«OÂÅ;xJ”¼Ñ%‘Ȣʔ5IÂÑc´nÕŠç»w¯2ïs~A«Ö¬cÎ7_óɈügö· {}gΞåJb"*•гçÎsúÌYd2 ¢¢ çÆÅIJaõïL™0ž«VWkKJj*Gcïö?;ªlð,úù¬,-Y8÷NŸ9Ãî½ûø`ø»l^·†Ä¤D¶nÚ€‡‡{÷ï'.&–5+–³hÞ}ºû+zooO6¯]Cròu4 «Ö¬eÄûï±fÅr‚ƒ vtëÒ™ú‘‘l^·†aC‡TiC¹Í‡ãX¾øg._¹Â®={ùàÝw˜:c&_LšÌÀû!“ÉøyÉRÞ{çm–ü¸ˆ•«×PPXÈÀW^åÝ·ÞdÅ’%ÜßyÐß·YG·Îy¦E ÞöÆ1««"åõ´··cóÚ5´oÓ†m;þšpºuíBtƒìܺ…žÝ»¡ÓëIIMåÅ>½yyÐ@ú ~‰«×®q91‘UË—1úÓ‘Uö•³³3Û·l¢cûv´o×–½;¶qüäIò è3`];uâ“#xéµ×9sö,GcÇ›ùeÑ‚*ÛMàé¡Yw†}€nüðw³§ñ'ë˜ñJ\%ÜÉ+ÆÎVÌÖñiùùFâB\IËR>”ÜùßÏ!ºAÖ¬([”èôzÔ5‹æýÀ˃2Ñ_ýÛr:´o_¥,ggg¶n\Obb"íÛµeøÛo1qêT³ó¡¹¹ëç%K‰nØ€å‹fåê5ßhO”Z ü'[F÷ Ǧ$›­‡®ÐÈ Fõ¯§‹:µ›–07/ó—.òÍ¿£¨¸˜=ûö.5*î~geeáëãChH0qb¹›‘¯–¬Z³–©'Pª-eÃæÍL8‰Db87áØ1–.ÿÛéé†üÔa|asáâ%¼<½Ëå(îgsº~ã&Ï÷ìAP`‘õê.N¼<=ðõñA¡Pà¢PHQq1 ÇŽñÃü?qÒD_€¿?î8:9RRRÂð·ß&++‹‘£ÆpêÌYC9;;;lllðõñAîäT¥ å6+•Jö8Hû¶mñpw#$8˜vmZ³ÿà!Zµ,K«{+%•«×®qððaš5iÂÝ»ddfÒ(6//O,--²-ûrìííɤ899!wr2«ËNNNxx¸S·nŠ‹‹ ¿ÛJ$X[[ãêâb”¥/0 €çÚ·#''•J͈÷ÞcÕšµ|óßï [ù•qttÀÕÅ\]\‘;9!‘Ø••Å»wiѼqb‘J¥œ~í~Úñï½Çì9ßñûš5Õú¸§‡ …WW¼<=ÉÊÎ6;š›»n¥¤¢R«Ùwà Íš4©¨5j%ð;::RT¤ÄÓMÁÈòÍ+¡ h_™Ì+++ŠŠ‹ªL±XS,ûmíÛ´aæ—S™ùåTœådçäô(èõ;~NÏ©3gøsûüø ë× 6º!ñGÒ8®õêqúÌYšÄÅé8zü8];uÂÞν^••ÇŽŸàæ­nßNçàáÃh4eÛ¼mžmE±cœ¿pã'Nдqú9»÷îcóÖ?öúkÕÖéèñã´nÕŠè ÌÞ»¯È™sgi×¶ Q\IL49¾qóÎ_¼X­ ­Z¶¤ °–Í›Q?2…³‚‡±uÛ6F —Ÿ/ *"NG玈¨[—?¼<=YôÓ/\ILD«ÕâäèÈé3gˆ?z”´´²œò>ÞÞ;~‚ó/šÕUdfe³~ã&<=/~æì¹jå˜Ì‡ææ®¨ˆNœ”H$&sWÇçÚ#“Ê8}æ,¶¶¶„…†ÔBëü]²²²ª{–Õk×Q¨TâïçÇüE?Ÿp”’’¢"#(**bÅï«H¼šDxX¥Z-6mæø‰“dggì{÷íçÂÅK¤¦¥±qó,-,ðññAleEý¨(þøsGâ8Ÿ@xX(‰ÄD¯H$àú›Üº•‚‡»;çÎ_ 3+ 7WWŽŸ<‰¶´”«VammMÂñã¸(( NŸ=˪5k¹yëuëÔaåªÕlúã áÌÙsœ¿p‘ý‡¡TB~~~•õº—Ÿ¿Ÿk×o ^Ý:¼ùÆPüý|iß¶ 666ˆ‘w/Ÿ«V“vû6øùúÚ;éêUÖmØÈ­”ꄇ³~ã&ꄇ°k÷¼½¼¸~ã†Q™y qúÌYn¥¤Áù‹êUTTÄšõص{wîÞ%éê5víÙCpP¶Vô*•Š_—ÿÆö]»9áݺtfçž=lß¹‹´Û·©[§*•Še¿­àp|<ÎÎrìììXøÓÏ\IJâø‰“h4Öm؈N§ÃÇÇ­VË–­r8þ–ÈYøÓÏ\¿y“Ý{÷áá££ÁFÃïkÖ²s×n,--),T²jÍZâŽâéá••ë6nbϾýœ=wŽà  $‰áü_[Á®={H¿sÇP÷ÕëÖŸ@ VVVFò] 6mùƒ]{ö P8ã,—““Ãò+9qên®®”––²nÃF>‚‡»;Ž}•åKmm),T²tÙrœåÔ £¸¤Ø¨¿ÊYµf-‡ãððp'<,”õ£H8vœíÛ™´³³ü¯]§ìœ#{ŽŸ8IAAîîܺ•¹ ‘ÉdFe¶þ¹ÍÈ·EðHýX¹M*¶AMóûÁd®ÞΧwó@¾ÙpŽ{J5ýŸ ®²¼N¯‘ÑCÊ¿xù2+~_MjZÙÙÙøùáëã˪µkÆ‘••éfîÞýûÙºm;µ†Rm©aιwïÇOžÂÏ×ר̽ü|~üe1……”¨T¸»¹™øÛáøxö<ÄŽ»)..â­Û¸|å a¡¡ˆÅbŽÄ' µµE*•òǶmr-9ÙÈǪ󣶸t™5ë×sêÌiêÖ­‹­­-2©Œ?·ïÀÛÛ …‚«ÉרüÇVn§§ùïÿw²²²ª;ví&*";;;ºvîDQq1Ý_èƒB¡ ##“ÏÆŒE£V³nã&ÅÆÀö»è߯/yyy”¨J:äU¾›7ZÍóp;=­Û¶Ñ±}{‚ù}õ³zËQ8ËY²l+V­â·¿°ä×e†-¼è† hÃÀW^#33“¹óÒñ¹öddd²c×nžmõ ggºvî„L*5œ3bø»¬\½†ÌÌÌjëj°ç̹s4kÚ€¹ 2vÂD~^¼”CññØÙÉðôð 2¢õêÎÉÉÉ¥ïÀÁÈårÃï7oÝâôÙ³¨Õj6lÞŒRYdR&*"‚Ȉz†¶¯\¯B¥’í;wñbß>̘õJT%899ñþÇõïüE?âïïÇ;ÃÞÀËÓ o//ztëÊ¡ÃGXµv-ó.B¡PЪeK¦}5ZÍÜ ñòô$//¥¿ýFÿûòݼù™:Žv­Û°ø×e$&&2wÁBìí  dÀ˯¢Õþµ{µð§Ÿquqá•—„ƒ½=ŸkOófM™ùõl •J¶nÛFß^½HIIå÷ÕkŒêݰ}{¿À¡ÃGH8zŒž}úáêâB×Nqtt0‘?oá"nܼI»6­™öUÙÊlþÂEÈår:w쀵XÌü…‹Hºz•Nʾ—SPXh"ÿP|ÏÆÍ[ 3[F.—#—Ë m_¹^ŽŽxzx P(puqÅËÓÓ`_9W¯%Ó¸Q#ìììJËv222øò«ì?p»w3¸–|1ã'0èÕ׸xñ’á\/O<<o½ûJ¥ÒàîÔ­[‡ââb£:ü¾j ]Ÿýr9ñ ™™´lÞ //O,--Mä_K¾Î/K¥ÿK¯êóòàAÌ[°>I‰JÅ˃‘˜t•!o¾E‰JeЕššj"ÀV"ÁZ,ÆÁÞ?__“þ*G.—cmc‹™{ËUµs¹}íñööB¥RsþÂEnÞ¼I“¸8“2•}ûQû±r›Ô6c|IËVÒ¢®^Î2½›Ï{7ÄÕÑ–{J5ŽRk^iÆësö1oë%N'g?X(e«å?¿²¹ÇÝÝèXÅqdaa:­‡Ó¬IS†¼ù÷òïá`oJ¥FYTÄÑcÇhgRÆÎÎÎÐîr''³þeíîëãƒB¡ÀE¡ 8(¢J¾] gg«ÎÊIMM%8(_¼¼<±¸¿{j+‘`mm«‹ ~¾¾4kÒ”¾™øïÓN­<ÜWZªA ×›=®ÓéjC­ *•ŠkÉ×Q©Jظy ;t º~}žiÑœ/FF¥VáèàÀ™³çÈËË#1) W… öööL?ŽˆºõjlwœފԌâí÷> e‹æäååñþGóì3Ϙ•åáîÎ3-šóÙ'ccmc˜àôz‰IIø›ÞFñpwèzõèÚ…¯¾žMQQÞ^Þ\¸tÉè!AGGRÓÒÈÈÌÄÍÕeQr¹¿,ZÀû}BNNQ‘ü°`!©©©LŸ:Ùl‰ ©ii$]½Š«ÂŤ^Å%%Õ¾þ~¾:O\£X H¿s‡ÏÇŽãç…óùcë6ü|}™=ë+b6$¿ à2ÃCCÙ½w êGqòÔ)^}ipõ6øú²ÿà!Z4kJ©VËÒeËycÈk4mÒ˜ S¦V{nú;ä俲׿|?×Ð_û"&º! ggù~¾¾ û-zvë†J]дZ¿,ZÀ×ßÎa݆ôêÙ“9ßü‡;w±nÃFF¼7À¬üʘë/çŠå* o ¸•’‚·w•í¬ÕêLìiÚ¤1³ç|ÇÛÃÞÀÚÚÚl™Š¾ý¨ýX¹MztëÊå+‰téÔñç> Yù%Hm¬èëKçX_ïN$ÒON§_f­;ƒ›£-iÙJ¼2¬,D4s¥c´/­#½è3c3_mÊÆ£7yµmÛN¥Ò¯e‘üؘh6ÿ±•ŒŒ îVX8Fã(Àßßèù™T†……ˆ^Ï÷ÀÝÍ•G~ÆÁÝ;iÚ¤1Óf|………ÖÖÖdffš”Ñëu\ILB.w2ëoÕ‘“ý{÷ ßÝ\]ïÛy™LF~~J¥ÒÄÇ*÷¯^¯çúF²år9—._!%5[[[$66TFYTD¯ç{ЭK'>=–ââb£ÛƒO3µr_©TR¢*ÆV*¡T«1ú¨5jîܹCXhíßoÉÍÍ#éêUîÜÍ I\žk³³/O/¶üù'i·oãçëKxX(ÎÎr’¯_§Ql }^èÅñ'9sîŽxyyaiaIHp0ˆDýpwsÅÉÉ D†•¥%q±±ØÛÙÝ/v2QQ‘&zííí ¶úúx“_PÀó=º‚R©¤WîH¥¶XXXÐ(6æþjVJ«–-ðõñeçîÝ\¾r… À@ìíí äÄÉ“Ô C,¶ÆÛÛ ;;;@DTdDõõª€‹‹ bc¸’”ÄÕkÉ4lЀ!¯¼|ßNZµlIZZ e+’â¶íØÉ±'èÚ©‘XZZrþüy¬Äb†¾úªÙ2^žžÜJI!#3“è ðõñ1ª—ƒ½=ÖbkCÛGEFàä䈓“õ£" 6Ç4lÈáøŽ?Ahh(ÿ·l IDATÍ›6%2"‚# G  "¢Ý»v!>á(‡ŽÄSZª%44+KKÅÆ µ•âîæVvÑt¿/c6$ñj/]¢sÇŽ„ÝïßF±1H¥Rìd2ÅÆVXÑ ŸÀ¡ÃGIe4oÖ”„cÇH»}›¦l¨‹înnøx{e;)y÷òØàA4Šá•A9~òç/\$$(ˆfM›ÉïÞµ3wîÜåБ#h4ÂBC8sö,ÛvîÂ×Ç›~½{“t5‰­Û¶£R«øâ‹Hïß²µµ¥WîFò%÷WwR©”ð°PdR™IU&<¬ì^n³&MP©J¸|å ¯½ü2G7´sXhˆ¡ü™³gMìñõñfùÊß™1m "‘Èl™Š¾Ý¤qÜ#õcå6ÉÍ+›6hð˜3Œ1R+:Fû¾7 TàïfÏàÖ¡´­ïÍ3õ<ðVÈhá‰ØÊ‚7:Ô¥e=B<è×2¹ MÃÝX[ágz_[îäD`@ü¹”ÔTÄb1-[4ÇÏLJ¨ÈHÃ8 fíú \K¾~á£ÂÙÙ™M[þ@YTÄÈGàéá¯7c'Lbèk¯Bn^žI™ À@ÇÇcogO—NMü 0øL¹?€ˆ€î޹ˡ#ñ;\]]h׈í;wrýÆ êGFÄŽ]»|,&º¡Qÿ²jí:ƒœkÉ×‰ŠŒ$$$˜í;v’tõõØØÜ÷[ÂÃÂ().aõÚuœ=ž®;Q'<¬Fûûß̃îñ‹–/_®0`@+Þ¸i@_iÕoooÏ›ÃÞÆÝͽŠ3þ?1jÜxÞø¿öî;<ª*}àøwz2i“JÒ+„Ž"MÄŽ *ê.¶UÅŸeA¥ƒ ¢²öU×Õ]W v‘&Ò”.%R ©LŸ¹¿?BÆL2 ¨D¼ŸçÉÃ0÷ÜsÞ{ï9÷[fî·“’œ|¦Cg©ü‚æ½÷>žp¦CùÓxáåb03zÔo®#¿ €¡×]ÏÊo¾öºl'þüvïö}‰ ¸¸¸uNõ\=tWÖZÕ‹?‡ÃAuuµ$}Ñ¢ÕkÖÒç‚Þg:Œ?…¿ùò 9R\Ì”Gù]u­^³–á×^#I¿ jµ#~!Ün7V›M~HG´¨ÖlÆßßßsƒ–h™¢(ž¯ÿµf3~ƒçÆNqî8cGüB¨ÕjIúâ¤ê¿~*NÍéHú ë½-“‡ô!„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6D¿BцHâB!ÚIüB!D"‰_!„hC$ñ !„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6D¿BцHâB!ÚIüB!D"‰_!„hC´­UqYyeeGQÅë}½^OBB":­®µšB!D3Z%ñoß± ½NORb2*•ÊkšÍfeëÖŸèÙ£Wk4-N3‡ÃN'Ò„â\¡>|øŒœœœÓZé÷߯!§sô:=*•ÊëO«ÕQ\RBûØö§µM_þó¿·Ù°i»víÆétÓªí¹\.¶üø¦PÓiK–n·›Ï."*2 ÿSžo×îŸÑh4¿jž†ò ølá"Ö®[Geeqqq).F§Óõ¾]±’èèvg}œg£}ûsù|á"**+IINòYÆår±lùrV¯Y‹  bÕwß‘š’òG†*€‚ÂBœF£ñL‡rVØ·?—E‹— ×뉌ˆ8Óáœ1eeeÍN«©©iküeåeè´\.g3ŽÖh¶‰å+WqÑ…èÚ¥3‹–,áãO?óLs:ž×ß­ýžQcþÏk^—ËÕä2EC‡‡£n9jjjêæq»Ù´e f³EQ°Ùl^ó5l÷T¸\n¦ÏšÍÁüCžvÆÐ0Æ '{^»bóQQQ‰Ëå:åå8—ÇcO½{“Õ©£Ïº¡®o½öï7éÛ窪QS[ËÒeË=Ó[êc¾bk©Ì©ŽM_ã±a}”íà¡7×°3¿’ þì$süz ûSAa!eåå>Ç‘/¿v|6ܧÔkÜ'\.—gŸg³ÙOº}O%._ãÔ—ÆûØ9sçÒ¯ÏÄ´kç³^Q§UNõÛl6œNg“ÓüõìöSÛ¹þ^~~2ÒÓÈÌÈ`Ô=÷rÝ5Ø>k6½ž=ûö1{Æt>X°€Ÿ÷ìaÒ´éLyôÞ™ÿ¹¹°;ÜpݵtíÒ™ÛFŽ"3=ƒÌÌ >ûb!=ºu#÷Àâããð÷ó£¼¢’™S'óÚ¿ß WÏŒ¾ç^r²²8ZVƈo ¿¾MÚMˆ`ëöí¬\µš±÷ÝË˯¾†V«eÌèQ<ùô3\sõÕ¼õö» ?ƒ§ŸÍôY³ñ÷÷§¤¤”qcïçãO?có–-Lš6¿ë™'!!žÝ?ÿ̯¾Âëoþ§ÙåêÖ­+7\w- >ù”»G¤W”=J‡Ì Ž;κõ?°wß~¾[³–»v¡R«:x0‹…ÉÓg`0 cÂCòÀ¸ñÌš1à`ÆMx„©“'2ë‰'½Ê|°`•UU¬ß°)>œ¹ÿðZ.ƒÁÀ˜û sN6ë7läü^=9R\Ì…ýûsˈ¿z¶õ¦-[xgÞ|âÚDZ}çN¦ÏšË墨è0Ó&O¤¼¼‚?ú˜À @B‚ƒuÇíô8ˆ!ƒ¯äðá#DFF`2™¨¨¨dîœ'رsÿ}ûm‚‚‚°ÛíL÷/½œÁ—_NUu5±±1Lø¨'†­Û¶óŸÿ½M»¨Hºu튿¿‹¿ZŠËå"«c®|%cî{€n]:³aÓf÷ú÷óÌ?eÆL z=yñìÓsX´ø+6mÙBTdwÉá#G¼êŒˆàµ¿ArR"Œ½ï^>ûb!?l܈Á`àª+¯ ¨è0ß,_Nt»v\qÙ¥ôêÑ€ÚÚZú äµ,C®¼’Cùù|øñÇtëÒ…eË—Ý.­NË„‡ôĹðË%X,Þ~w6›Ž2ºpã>Ö·ÏžùÇöμ÷˜0îAâãâ7á¦OÌŠ•«¼ÊœÊؼ厑>Çã¬éS›ôÉÖ¶§¨šªUµv^Y¼“n)8œnÞû.?½†û¦ðÑ÷¨ªµsÓ€4ÞZ¾—ä¨ ®ìÒºEáñ§žE¡ªúa¡& éii,]¶ì—q4ñQŒÎô•WTðØãOADX}ú\À·+V2îûÙòãOlùé'®vµW™®]»zö)ô>Ÿ˜vÑMúÛÜç_ ²²EQ(*:LffËW®âÙ§çÐ9;»É2üãù2øJ232¸ïÁqÌž1ÇžxÂkmÚ¼ÅkœŽ½ïÞ&õÔÖÖrË#½ö±ûrs9”ŸÏ¼÷?àÎÛneÆìÇ=ËrÏÝwýözj•#~§Ó‰ÛínöïT>Énƒ§ÓIaQ%%¥\wÍ0Ìf3»ÞÀ~ý åž»Fc³Û™ÿþ èß´Ô>ùüsŒÆn½ù&ú÷í‹ÉdâîÑ#ÉÉÎ"';‹1w¦¸¤Àói7$¤.± ½j0?ïÝë³Ýzɉ‰äp¤¸˜‚‚BÏë¸öu—D®¼ü2®»fËW®¢¬¬Œ’’R†_3Œ´Ôvÿ¼‡¿Þxícc¹ç®Ñ„„{æ¹gô(\.eee-.×€~}=ñ?~SHú¯ýû ~¹ÈÎêDjJ ýûö¥_Ÿ>žy,+ËW®¢g\3t©)Éä<ˆÝnÇér¢¸•&eôëGÿ¾}=ë¾ñr˜L&ÆŒűêjr²³¸è ùjéR¯íûýºõ\sõPî¹ki)©\=ä*Fßyaa¡lÚ²…µëÖ1 ?®6Œm;vxæ½dÐ r²³°X­Ü5òN϶\½f úõãÎÛnÃf³QTTÀÀ 0ôªÁ,ùz©W_^»nC¯̘»Fs^¯žd¦g0fôHnúëü¸u›§_Ü5r$Ý»våç½{½–ᦿþ…;oÿaa¡ìÝ·Ÿ·çÍcèUƒ¹ã¶Û mRÿÚuëÈêÔ‘ë®ùeyvíÞMÏ=uÇí$Äűk÷n"#"¸eÄâ⚌‹†Ë’‘žFû˜º>Ô¥sgJJK~í5žmUï¼^=HJLàö[oñzÿøñã>ûX½Æ±¥¦$³|Å*\.N—“àà&eNel67}õÉÖæv+„ûñ⢤DdàõØUPÉ?¤ÖæäÓõ±Ø\¼ÿ].‡J³xsþ)Õ}øÈJåîÑ£èÞ­+   x#?ƒ¡É¼•••””–rˈô¹à’“’8tè{öí#3#½I™œ¬Nž}J¿>}|ö7¨?÷Ü5ššÚîy'1ÑÑìߟës¯× «¥É6jnœ6Öx{Ý5Ã<ý×l±x-‹ðÖ*‰ßjµzNÕøúk|êó°?7—ØØvîÚMmm-«¾[Ã%ƒÝ.ŠÐÐP´Z-ñqq”——SU]ÍþÜ\´Z-OÜÿFÇ™´‹Š$$$˜Èˆ¢££‰Œˆ$ÔdÂÏÏ{°™L&âIˆÇb±øl·^pp0jµ†›7ãgðÃéròýú0™LøùùCû˜…E‡©­­eùÊUhµZ¢ÛEÁ` >.­Vë™' €°ÐP ‹Ÿd¹~‰'=-• 7xýº~ (0€#&“‰P“É3OXX(‹>ý˜²²2ž{ñeÌf3Æaá—‹™ûÜóô¹ ·Ï2¡¡¡˜L&Ϻo¼\P7Àc¢£ '2"’ؘÊÊ˽Ö÷¡ü:çäˆÑèÙlfþûòÎü÷¨­­¥¤¤”ü‚Böçæ²æûï¹àüó=óÆÆDMxXáážm™wð}û\@BB<Ù:Qp"ñ'%&Omm­Wâ?—GÏÝ %<,Œ6n䕽ΦÍ[0[Ìž~ÝŽŽ;`±X<óšÍfþûÖÛ|¶pµµµäæåQzô(={t'66FÓ¤þü‚Blv;«¾[ãYžû²²2&LœÌ[·qß=÷“Íó/½ìùðÑPÃeÑétžk£ ñqýb!}.èí³Ì©ŒÍæÆ£¯þÖš@Ü?$‹î)tN #3ÖÄ­Ï­àÁ¡Ùøé¨ªµâÏ-Óõò*ôZ 9‰al?TÅîâPiÝeŠÒjK“ú·oßAdDDݲž8•]¯á8R«›îÖÓRSyðþûyþ¥—ùðãñ÷ó# €í;w²nýzúôîݤŒÁ`ðìSBM&Ÿý êÆO|\áááD„‡“š’ŒÙÒ4þz®§ßÃÚl£æÆic÷±¡&“§ÿf¤§{-Ë™È9g³V9Õ¯×ë±Ûíøùùº±LÁåúu×¹«ÂÂ"&Lœ 8]Nþû8"Â#X±j¥¥¥¨Tª§ÊR±ÙmLùŽÏè;ï`÷Ï{ˆ¡S‡§%–‹/º¨I» ]vÉÅŒó¼úÒ TTVrÏýð¯¾ä³®”ä$Ú·¥ °£Ñè©+99‰©3cÜøœçT—ëæ¿þ•§Ÿ}Ž»ï½ à`4j5·Ýr3ë7lêÎ$ü÷íw 5qÙ%—ug'^zå5B‚ƒp+nÔj5I‰‰°c×n–|þ™Ï2éi©¼;ë}räòà}÷û\®SqÃðk™2c& qqìÝ·»ÃAAaXO\·¿þºkywþ{ÄÇÇb:IpëÍ#xâ©gÂétqí°«[,?üÚk˜8e©©)tíÜ™£ee¸Ýn**+Ñëõ-Îëp8¨ª®ÆjµbµÙIIJbÔ·3qÊ4RR’yûßšÔýu×òò«¯’™žN»¨ºDðùÂ…”——{Îp}¾p!‡ Ðé´¿êþ’#ÅÅ,þê+üýýq+î&—íÜ ®ãšBBÈ/(`ï¾ý-ö±Æ±%%&rÛ-7ñì /²äóÏ|–é™ñ›Ç¦¯þöÅ¢/±ÙlÜ0üºS^§ªâ¸•ëû¦BzLö¥krß?5ŒwWíç¡a9ÔXìüµ*¡M½‚ÍûËègâ“uyÜ}E'~Ì+ègWAQ!ÞûÏË.½„e+VòØãORRZBûØXÏ´†ãèþ{îaÖ“Oy¦ådu";;‹Å_}…N§Ål6£R©6dwß{?×_{ †-?ýÔ¤Lrr&NâÒ‹ùìo-ùrÉW¬\ýçÿ#n¼.99¼òÚ넇‡QXXÄ‘#żòú¿½¶Qãqêp8˜4m†WÝwº³Å¶}-‹øE«ÜÕ_]]…ÃiÇÏ߀Ãi÷ú³Ùm”””‘žyZÛôÅf·BLL4ƒ¤CfšÈˆJJK‰ŒŒ$«SG¢Ûµ#88ˆ À@ºtΡCf&f³FCLjE£Ö–š *Õ/¯vQ‘˜L&PÕÝG ÕhèÕ£A'ÊC`@ ñMÚ òÄj4úDÿ~}  '$$˜ýúb4ú£V«éÙ£û‰£Y#çõìIt»vTUUa4éÒ9‡   BCëINv:žöíc T¤§¥Ñ¡C ËÕ€Z­&%9­NKpP0}ûô¡ß‰kµñqq$%%át:HJL":ºn ¸J–bw88`™lÛ¾ƒ€€†_3Ìg™€€lv‘dwêD»(ïå  B¯Ó{Ö}Nv&S&“‰Î9¿\CŒ§²² EQèÞ­+çõìAtt4•UUôìÖ¬¬NtíœÃ±cǰÛí$''‘žžŽV£¡gîý´‹Š")1ѳ-Ãð;ìôz.»øbbbb~)o4@ÏÝ=GXTUWa³ÙÈHK#;«‡!<,Œ^=zžšêY*ÚEEy.åøùùQS[CMM-=»w#;;‹ݺQS[ƒN«#»S'âââ¼êïÒ9?ƒ6›¤ÄD2ÒÓ¨ª®¢¤ô(éi\2hv‡²²2ÂÃùâ²Ë~¹û[¥ò¹,*•ŠÌŒ ·Â¼<\. @zZšg]«TNzZ:–ŒôtlVqíÛsÑÀ õ±_¾IÓ86£ÑH¨ÉÄšµßsÇßnõY&22âÔÇf£ñ˜‘–Þ¤¿9NBOœu9ÝŒ-Éí~ÓíÃðÓ@Ÿíˆö#"ظðÒcCèÓ±)킘K ŸŽq&üt’¢‚šÔ¯RÕõ™Ò£u:Ž~}ûGbB‚guìÐü‚ÂBC %..Žä¤DŠ&$$„‡_GTTþ~~¼ùÖÿ¸ñúád¤§ÕÝÓ¨Lh¨ «ÕFzZ9Yšô7¨Û'Ô÷«ÌŒt@ERR":­»ÝCf))ÉJ¯ÝÉêÔ‘£ee^Û(2"Ükœ¦¥¦rðÐ!O=a¡¡tÎÎ&°Ñ>¶~,efdø\–¶ädwõ«æÏŸ¯Œ1â´7¼gïÏäç7½v¥×ëéÙ£§½Mqö;~3¦Löº, D½×ßü/ p×È–àD¼ƒQ«ÔÌzrƒ¯¼œë† ûÍumþñG<•…Ÿ|乤(Î »wïnvZqqqëýr_fF23NÏirñçd³ÙЯ¯$}á“Íf£²²‚Ûo»õL‡ò§‘›{€¼C‡=òÏ74~«ªªjæ>õ¤$ý6¨ÕŽø…p»ÝXm¶&_-êúDZcÇ A-×`O™¢(§åšu­ÙŒŸÁ€F£9 Q‰³É;âB­VKÒÍR«Õu×ãůrºnT _ûk³äé|B!D"‰_!„hC$ñ !„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6D¿BцHâB!ÚIüB!DÒj¿ÜWV^FYÙQ”‡ô$$$¢ÓêZ«i!„B4£UŽøÍf3‡°Ûí8¯¿šš>ÜÍ !„â$Zåˆÿë¥K4èüý|ÿNûÖm[ILHl¦…BÑ‚V9â/+/C§Õàr9›ùs´F³M\1tãÈøG'òμù§4ÏK¯¼ÆÛïÎózoîó/p /¯5BàP~>ÏyŠÊª*^~õµÓVç]ÿwO<õ4ù…§¥ÎÆ&NÆž½{WÏ<÷<Ó›ÅÚuë~Óüµµµtéu>òò˜ûü |óíòfËNœ:òòòߪÇ}DAaë¬Sñçöâ¢<ôf]_Þ™_ÉÖªíµÔçÍf ÷Ü?¶ÅùKJK™0qrk„&Îb­rÄïtºp»Ý¨TŠÏé.—«5šm"2"‚1£Gàyßn·£Óé.ÿO´Ùl ¿ÄrªýCœ{ŽT˜)©´°dsѦ–Ÿ€ç>ñˆÝ_ó¼=‡Ãá5>[¢(J“}™¯1Þ’ÆýÙív{í ÄŸO«ìl6+N§³ÙÇGÚíöÖh¶‰cdzlyݧáó{õâÝ÷Þ§¸¸˜à  9Âk/¿ÄÊÕ«Y¶|%¥¥\pÞy|ýÍ29Byy9Ïœá©OQ¦ÏšA¯gϾ}Ìž1„øx .Þ6r™étíÚ…;wâïïOII)ãÆÞOB|fLBZj*Ï¿ôO ¼aC†0mÒD¯Oöõõ+Šâ9îÓ§7O=>›þ}û’“ElL´g]$&&0mò$þrýp~Ú¶|ÌôÉ“™ôð:gg{ÚŸ8a3¦L&-5•õ?là¶›oââ‹À¤‡'PQYá÷ÈÛÿFrbÓ&MdÝp8̘:…þñ ïÎß+¶ú¤_¿M&‡ƒý¹¹-ö|Ìô)“™0îA:gg“——ÇO?ÃÄ ˜óø,¾Zú ëØ@bbS&>ÂÅ dÐÀLlï­7 !>‡ÃÁ’¯—Òð¼Áí·Ý˜»FñÑ'Ÿbw8Pk48Núô>¿Å¸Ä¹GTÀýC²èžAç¤02cMÜúÜ šM€ŸŽªZ;Q!þÜ20Q/¯B¯Õ“ÆöCXì.•ÖPZmiRÿ·+V¢Õh˜2ñQ_q¹×´yy8œNfNœÇgyÆOjj 'ŒçÕ—^à½?¤svN“1Þ,•Ê»?«TF¯þmµÙ¸õ¦üã©9±g߾߽Eëk•Äïv»Pø%¹øúû#ü ¤¥¦–šB¨Éä5M­Q£( «×¬¡ôèѺÓáNP(ürYBQê^ÉÁƒÉîÔÑg»ŠÛí)×­k²;u¤¬¼œ//!00FƒËåâTVC}œ.·§Ãé»=8qvEÍžiQ©T¸]îfÛZ½f [·m«;Åݨ ­6&ë/IDATN‡¢(¸ÝnÅ»¥~WÿOƒyÕg{·|$ PÂS¥R5i¿žÙlæËÅKPk4xênn]ÖÅûËDÏ«†õ7Š×óZ­Æl6óêëoPzô(¸ÝMןF]7¿Ÿ¹þzÔj5óÞûàû€+ÎåǬø´¤Ç„0¤W‡+Ì$Fry·8^þr'IQA.¯%"؃NC¯ôHT*H‹ aæû›)®4óÙ©®µ³rû‘&õ;Nßû¯ Æ[QPÜJ3cÜ÷àiÜŸµ cF"-5•yï}€Ùlö*¯ÕjZÜ¿ˆ³G«œêïÞ­òöÛdšÛ­àt5ßyO§ÂÂ"Ï+]r²}–9ZV†Ãá èðaôúºkÐ6m"?¿€£åe<5{Ÿ~ñÏ¿ô3§NeŪU”––¢R©¼®ë6”’œLûö±b41 ÔÖÖRU]MEe%A¤¤$óãÖmL™1Zƒ^ßòõ¶¿Þp=“¦M'5%™]»öšvëÍ#xöù‰‰‰Æår3éáñ|»be“:"#"¨5×2{ÎS”••‘œ”Ôd]¸Ýn**+=뢱†_˔ѩcöîÛïiÿ‰§ž!88§ÓŵînqY|¹ø¢‹Ø°q3Ógͦ¬¼œÛn¾‰ ›67)çp8¨ª®ÆjµbµÙ1üNœåx‰îݺñÖÛïàv¹¸ü²KÄ;“„¸8öîÛOJr2Œÿ;O<õ Z­†«®¼‚ Î;¯¿Yæ3.‡ÃAAaXm-_¢:r¤˜Å_}…¿¿?nÅJ¥bÔ˜ÿãòK/á†á×ýêu"þ\"‚ýøÇ½=ÿÿÛ  dÅx•ë• ÀÏ\‹ÃåF§Q3¨sݾrìкýÔýRšÔÙ¥—°lÅJ{üIJJKhKlL4o½ý·Þ|jµšéÍÆbµpÛÍ7PTt˜YOÌa×Ï»uÇÈËóã¦ò XøåbV¯YëÕÞˆoðêÏÅ%%¼üê¿ ­ürÿïÎÃd2QYQI‡ÌŒÓ±*E+SÍŸ?_1bÄi¯xÏÞŸÉÏÏoò¾^¯§g^ÍÞ8w&˜ÍfŒFï›pìv»WòkxWãiÍ©»¹MñÜŒ×ðæ±†íh44 Ž4OV߃ã'ðìÓsšýàÑ·ÛÍfóº9­!³Å‚N«=é?§ºZCýoB4ÜfõÛ§¶¶£ÑèuÖ£þÓï‰×Wi.6›Íæuc §“Ýî`Á'SVVÎØûîõÙç½Ë{ÕÆc¼ñMÄ 5îÏŠ¢`6›=ûï¹Ï¿À¥"5%…À³hŸÞÖíÞ½»ÙiÅÅÅ­÷Ë}™ÈÌèÐZÕŸV¾vè“DÃ${ª ¤.¡ÿò_ÉôTë:vìÕÇŽqüx f³ù7'1µZÝlÒ0¶0­¡3•ô¡n=6^—õÛÇ×ÊSý`Õ’SIúÍÅ&Äé’wð j•š+W3øÊºëü';ˆjß·;((òt>!„熲ò2R“SÐjÏžÔ–wð {öíáüž½Îx\N§“•«VË5~!„ç·Û}Æ“kcjµ‡ÃqVÄ¥Õjq»Ý’ø…BˆÖ¤R©Ît^$ñ !„87œ]ùµÎÙ“J¿Bˆs„ê¬Ë²u1MGü*T’ø…BœÛ Š =¯mv¥eGO:Ï‘’bl6ÛiißW⯬ªdïþ}ìݿ¢"E9-m IüB!Î ÍX6Lü6;G¶œøN'GŠx¿Ûí¦>-—-e݆õ^å[LÚÍÄTYUÅñãljnÙbfõÚï<õ¸Ýîã;Y™Í?mi1ž3›¡Bñ³Úllܼ‰€€Ìf3;tEa÷ž=„„SUU@Ii GŠ‹±X-DFDRQQAõ±cü¸õ'r²³9—Çñšã¸Ý I DFDþª8ÔêºKjuÝqøOÛ·¡Ñh°Z­têБ²ò2jjjÈêØ‰ ›7MEU¥WZÍúM B§ÓQ^QÁ[¢SÇŽô†¦mþþÕ'„BüÉ( jµš´”TÂBÃ()-¡´¬Œˆˆp2Ó2  8(˜ôÔ4⨨¬ ** ½^OFzn—›¼CiÕŽ À@üªªU³gß>ÊËËIOMÃétbµZHŒO (0êcÕ´‹Œ¢¦¶‡ÃAyEþþþMÊh5ZÒRSIIJÆèo$#=½Î÷IâBqNhîæ>—Ëåyíp8Ðh4èõz‚ƒ‚HKI¡¦¦†ÚÚZÚGÇ¢×ëÑœøÞýÑò2ræa±Zp:]ôÔ*F#6» »ÝÎñãÇQ«Õ„šL>cjîæ¾ˆð²;uUÝk«ÍŠÓ餸¤µZ¿Ÿ~~~ø ìËÝOlt ~~†&e ÁAÁ Q« 0}¶+7÷ !„8çÅÇųaóF6ý¸™ýö“À±cÇØõón6nÙLrb‰ñ ü¸m+[wlçøñcØl6·³ÙŒZ­&((—ÛÍOÛ¶âïçOzjÇŽÇf³¡Óé|¶ßÒ]ý½¤„$V­ýFƒÑßH­¹›Íæ9ýŸOÑá"r²² ôY¦¡ÀÀ@~Ú¶»Ýî³M¹Æ/„âÜÐL~ŽAQAAF¬V+jEQˆ‹mOXhI ‰ÔZÌÄÇÅc0ˆiM~aD„‡cô÷'#5‡ÓZ­&%)™‚¢BœNFã)Çj2` <,Œøöq¨Uj’“(=ZŠJ¥FwâT}`` iéž$߸ŒV«¥}LŒ§îøöqTTU¢Öø8¶—›û„Bœ+š;Õ¯ÓéHJHlò~`@ Y;y½—ïõƒÁ@§½Þ‹‹ó¼Öëõ¤&§´—#þPS¨W|iéøùùêUV§Õ‘Ø þ°ÐÐ&ebcb=¯M&&—êÉ©~!„mNã£äÖ"?à#„B´–_‘_µZ­×Qr["‰_!Ä9A£ÖxÝÁ6P½NVÄår¹Ðh4r_!Ĺ!<,œÂ¢¢³â¸P÷ëzz½ŒôŒ³".§ÓIxX¸$~!„ç­VKpPV›õL‡€F£%8(ø¬‰+8(€Ú³$~!„çEQ0}}­î r»ÝgU\r_!„hC$ñ !„mˆ$~!„¢ ‘Ä/„B´!’ø…Bˆ6䤉ßårqìØ1Ün÷Of³§ÓyÆÚB!Î-~oë¶í¼ûþû´‰¥¼²‚‰ãÇc4úŸRÅë7l¤÷y½~w€³ç<…^§ÇbµÒ½k†^5˜Ÿ¶nÃd2‘”˜Ðjm/øäV¯YKxXÝ›îs7‘MÊýó_¯S^^NV§Ž ¿æšS®ßj³1ï½yûm¿+N!„â×h1ñoß¹“ ûõ£oŸ 8”_€Á o±2·Ûíylà×ß|ã•|ëÏ4|v°ÛíÆår¡Óé°ÛíèõÞõ[,Ž)fÚä‰X,VÜ<\õÝwtÈÌô$~EQp:žg!7nûd±6çâ‹Ò%§3¦Ïû cÝ¿?—{ÇÜEppp‹uÕs8èt:4j5ÉI¿|FZZšÏ‰«•%_/E§×‘Ó©F£‘Ÿ|ÂwkÖÒ³Gwæ½ÿÛ¶ï èðaÞüßÿؾs'þ~þ|¶h߯ÿÜÈîÔ‰=ûöñï7ÿËæŸ~bç®]tÌÌä²!WS\\ÌÇŸÎÆÍ[ؾc_-]ÆÀý=íët:V¯YÃñš’HJLdó?òáÇŸr(ÿzžÔ”ž|æ¬\½šŸ|ŠŸÁ…‹—{à‹•¥Ë¾¥¢¢’´Ô&NFïóÎãÛ+YðÉ'ü°q#F#?mÛÆÏÌeØ!ž¶wíÞÍîŸ÷PUUEAa!™é\6äj ‹ŠXòõ7lß¹“À€@¾X¼˜Z³½NÏ‹¾dÕš5,ûv:?îhÛvì -%™7þûë7ldý†tÈÌàý‘“Žc"ïÐ!^}ý bb¢9~¼†'ž~†={÷òú›ÿ¥KN6¡-œþ}ûb4ú3ö¾{©ªªjÜٳèØ!“Ÿ|ÊÔ™³èÙ½;:drÅ¥—rÙ%paÿ¾´‹Šb×îŸ  ó´}Ù%£PwF@9Q§N§Åét’‘–FJrW\v)ÿyíÕ&mggub@¿~ôïÛÇóÞ_o¸¿Ýz3 ¿\L‡Ì âãøûØHJLÀérò𸇘2ñ>úôSÚÇÆ2uâ£äÊG§Ó3þÁ±Œ{à~ŒþþžˆâãÚ3þÁ± z;vîbÁ'Ÿ2îÁxèûIIN:ù–B!NÑIoî 5™¸âÒKéÙ½;ù……D„…±iËâã  ãüóÎcà€ä8À¦-? xÒl]âŒ'"<œÁW\îU¿F­ö$f_§ÞU*=»wçö[náð‘#ž÷ê穨¨ä›o—`4¢ÑhPÅ«m ÉçŸwÉII,YºÔ¯/í¢Ú‘œ”HRb¢×ûšq*Н¹ðùìe‡Ãቹ9õpp»ÝX­gÇoM !„8·´xyÞûðÆ¢ 0þÁ±\~Ù¥L{l6¯¿ü†%K—RTt­Vëyô`b|þöïOVÇŽ¼ùÖÿØ·¿çƒÃ’¥K©¨¬D¯¯{Tâ×ß,cÁ'ŸòÆ«ÿôjÿ½>dé²o¸ýÖ›[Œ51!µZÍÓÏ>‡ÕbåÆá×yMïß·«×¬áÙ_B¯×3âÆš­ëÚ«‡òøœ§ÉÉÊbÏÞ}§¼¾„Bˆ“QÍŸ?_¹üòË›-àp8P«Õh4Ï{ÕÕÕ<÷ÒË̘2ÙóžÅjE£V7¹A¯žÛ­`·ÛðóóûÕAúºñ¯!§Ó‰¢(ž›û|Mw:^m›Íæ3òÀ›Í†Á`8¥²‡ƒ©3g1é‘ µrdB!Îu¹¹¹':Ÿ¯dz(¿€Ô”¯÷üO’ÐÕjÕoJú@‹I8é3޵Zm“2gê)I§’ô?NYy9Z­‹ÅLP`à™Bˆ¶à7}W¬úX5W\zééŽEœ`±XÙºm;5µµ<ü÷q>ïB!~‹ß”øû÷í{ºã DEErÍÕCÏtB!ÎAò[ýB!D"‰_!„hC´Pw—ŸB!Îmü?èÜ$ÛœxìIEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/booleans_toggled.txt000066400000000000000000000004661330160122500250460ustar00rootroot00000000000000You are viewing the booleans page for the application domain. Toggle the button to turn on or off the boolean. This will not happen immediately. All changes on the application screen are bundled up into a single transaction. You need to select the update button to apply all of your changes to the system. selinux-python-2.8/sepolicy/sepolicy/help/file_equiv.png000066400000000000000000001401051330160122500236270ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìw|UöÀÏöúËKï½7 ¡÷Þí½÷Þv×ýíꮺ«®m­kY "`QPz€z€TÒ{Ï«Óïï!—W @î÷ÇÏdæÌ;gÞ;s߹瞃ÊËË›ššÀ`0¨Š pþr8ÝÝÝLKKKPPPJJ BÄêÂùŒªª%%%v»Ñét©©©ªª*Š2н"Âi„¦éäääüü|FUUP…¢¨î@ N#²,³,«Ó錱¶Ë»A „óUU˜~b÷ á¼Çkêïßdš—pðd „úŒ9¼{´O£ïöï¼P¯Cpü£'ní÷wŒ@@Žš~âð!œ14›KÓ4`Œµ‡f@PU•¢(íhGµé¨ßŠwîJUUUUû˜iŠ¢°ªjÆ[=‰O¾·'ZßhŠ‚ÿµcÂiBûpjŸ|í3¼Ñ Ƙñž0ÐÝ&œÏhÃyŠ¢h†q»=*Æ:ŽEQDI¦¨#GY†q{<,ËÒ²,ˊ±챃o„cŠ¢|?ëc·‡ !ŽcF’$͵© x<<Ë2ªªªkíû+Á{„(JŠªôzíå$ˆ’ŠUÇ©CÏ[Jk¼ï ŸCpÂß }¿íûÅ0 EQ‚ €N§SUU–å>¿­½u÷@>v„Ó‡f—%Y^ôÕò×oaHzêsþyÝ–m//Xh0œ.wFrâó{øž¿=ùwß–“•Ž­Û±kùêŸ_zü¯:‡ULÑ´(Š ã8Aiš¦(„aŒQÔët*Æ’$ÑÅ‹âÃO¿ÐÒÖi‰ w]ulTBˆaY’œn÷c/þçž®>PRV^UóÄï÷x<ƒã#æ^  ÓéEÁd2-úzÅW?üôü#çdg66·üå™Ó’¹ï–fhšVE”$–eŠ¢eI’…eYï!à8–B,ËŠ¢(:c,MÓ:€cAµwð›PU•a˜šú†n‡cXF: عï@€Í/62B’e_ÛÞ×ôqøN'ŠªšŒÆÛò?_ùã¿þòǨ°ÐŠšZp¸\þ¶ÿ>óOA) I¢äáyEQ Qb£/Ÿ7[–寖VÀØÍóÑáãªÚºèˆðήnAeYaY&&*òpU5EQ‘¡!*Æ ½³ëÏwß–“™ñèó//]ñý¼¿º®¾ÛnOŒahÚÃón^•34.:JU8TZNSÃ0ªªFG„#„Ê*«¬f³ÍjI’ºìޝ~\“¹bõÏ•µu)‰ñ¨¾±©µ£#Èß?2,´¾©«ªÓí ´ùYë›Z;:ƒüma¡BµõnžgÆßÏÏfµ••ë8.!&º¥­}_Q±$ÉAþC3Ò ×4pR¨ªÊÐtCsË»Ÿ.½û†kBo}¼øÞ¯MˆDÑ7pß;Ö?:êèÎÎsYŽ ‰‹ŽZ¹æ— £FL=†±;œ}ñµÛí>$kÒèBcY‘iš.9\¹bÍ/Y©IϾù®^§ëìîÎNK™=i o¿·àù§Ú¸¹ôpÕä±£>ûö»»o¸æ­ßuýÕ±‘‚(ªë9n]Þö¢»ÃyáÌ©·íøø‹oXŽ ð³Þwóu ð “·cWyuÍØÜ¡¯¾ÿQyU¿Ÿ_DhÈÎýžýëý/½þ×{o °€ÛÑãæùw?]z¨üðô cE¡)jùêŸk›::»n¾òÒ ÛvTÕÕ³,CSô³ýãwk×U×7´wvÝ~Í<ϰô«àÀ€ÚƦ‡ï¼¥¾©eãö….ž5=51þ? ÅGGE……¦''úz·„“!äöxÆä uºÝï|ºn½êòñ#rÝnϱÁÄ×O8 ^⢣Þxúñõ[ó×oË_¾úççy˜ehàXV憡µ"Dz Àw«êu—\àÿÂß’žêïçÇq¬ÉhTTuö”‰uMM<÷òo¿yê¸1§“emÀÃó’¬ÜwóuCÒSÿôäsWÌŸ=ÆÔ‡þñÌ÷?o°˜Œ4MƒN—¿gñáÊ7žzÜægAýñÉçvî;`1›ÂCƒ‡ggu;~VV’¤ðà ñ#‡?ðøÓÞw¢ÐÎ}…ãq#r––¯Ûº}Û®½ÁÄQ#®½ä‚»y¢¨ìðÔq£wì-ܼcçO6ÛÎë/»hÞ´É~ú…ªÚúŸ·lÍÍÎlnmÿbåªGï¿+8 àïÞâr»ÉÔ1áCU1EQFƒ^VÀ`Ðë(ŠRUÜg©n?¾þî9á|c¬Óqe•UKËÇ ÏáXæÅw>hëèÀ›MÆk.š/ˆ"…(J º¾Ád4ÒòðVU¬bL!ı Ë0,Ítvw—WÕ4·¶a¬bU±;œ&£¡µ£CÍõž¿åÊK3R’Yvó¼Á olimhjv{<6«Åíá›ZZÝn¢ªFƒA–åªÚ:¿n‹¿Ÿõ²9³}½Ül4Κ4Þ÷«ápºÇ Ïyãé'F ÉülùJ–eë›^Yðá´ c£ÃÃDYRTL!D!ð³XªjëÎÛ6&wXTx˜ªª:Žmnm­olD‘fh–e]nOfjÒ¤1#QTEI’È×ð¿¡blÔëóvîzgÑ’[¯º Þùt)B067ÇÍóÔ1¾þ#>ZÈÚ@wžp>ƒ1F€Ú;»¾ø~ÕÇ_|«×ën¾òҔĄªÚún»ã®Gÿár»Ó“žzøA?«õ“¯–#„ŒýŒñc­f ƪA¯G0Š¢â¢#ÇÈ}íƒÍ&c|tôO6—UV¿þäc/-X:gêDQ”c³Ñhw8žwó¼Ùh¼ýê+>úò›m»÷ÍH»|ÞìºÆæïÖ® Ôs\vzêìÉßüx1Ã0W_0gê¸Ñ_|¿ª¥­}Ô°!¼ hý×é8YQÁÈ¡YË04ò¬ÕbNŒ‹)¯¬ö|¼4/ð4C«ŠÊÐt@€-16¦¼ªÚà Iq1³'OxëãÏ ‹ËÚ::c##.=cÕ†Íí]ó3Óâõz¤bò5$üïȲxßM×΂q,`³)ŠÒg÷häôæÍ›GŒ!I‰ð!œV0Æ MB·Û Ót:AUc8Ó¢EÙ÷ú(‰Þ<"£bLQDz¼ 04­ªª(I:ŽãXV$Q9–ÕÎÓ~(x/­Åº ¢d2êEQÒÂB€B ÓëÝÆ@SÈl4>ùÚ[V‹åá»né¶;´0SíÛƒ¨ªŠŽìÁèwtÛÍ&#Ýó»Z»ÍéÔÑm7 MK’d4ªëž|õÍ?ßuëð!Ù-mm.·ÇßÏÊдŠ"_>Âïc¬ã8†a\n7YVDQ컞cŽãvïÞM"|gYQBƒAUU·Ç£Å¿ûüŪŠi 5Ù1âcLSHUUžçišÖÜâ:ŽÃ»yž¡(=Ç)=¾rÚgiðB0Öº-Ê2…PÍOñùݬuR–e„ Ðæ'˲^Ç}ýãêí{ö"Dš–˜`·ÛÍF£ŸÙ,+²v˪J¾}„ß /˜çµx§Ëú[0ß+‘ñõÎcïLf¿.;5Åérªo„ªªf£173MQTž€¬Ú% ½"|È4/àEE/Ð4u ¿²,;$ z2 ‘¯a9áC>‚/Úz‚SÛfŸt=€ptÔOÓ´–’ü=ï!˜@äô2ýÇ_ÿyBH‘E%˜ „ÁËÑiÞ¶ö¶½û÷’åãç7!I–"Â"‚ƒäÞ™ü „éìêLLJ °ÈŠŒ€X„ó ˜e٦榮0Ÿ¨B0Ha(Š2›Ìf³™X„ó–eMF“ÃéÀ@¦ „ó ­ìݱhÙAŽçÑa@éøÎKpO«î@8Å „º»»UUíÇeƒ±N¯7è ý~÷”e'®žóò| „ó -ÏÁƒ:ºÚMFSOÜðÑ´(àt:³²†øÛüácúmQQUMÊ[ÞÅ[í·_yí­‚(„Ž'æ>Áo‹—&‚†f“Û;ÚG(,I2EQ=ö)вsgAgGGpPȱþ|æØæ8Ž3™L@!ät:UŒµÄ‡<ÏûÃcLÓ´ÍfÓZñ<ïr»O`»u:Ýñò’cŒM&“$I$èoÅ7ÅØ±„ó­»( ­íÍ‚G h Q ²ªÐ4……(pœ*]¾ qWS[»}G`,JÒ„qciŠÖét•ÕUi))f³Y’$@Q¥]¸Ûn_ùâ( ¢˜–š2<'G« šŒö"RT•B¨´¬,44T¯Óiëȼ×Å:ŽÛ¾cGxXXDx¸VT^»Š–gB3dÚO -ñ–öŠó=ñ¯óŒ1˲ Š¢¦.m¡ â$Îw6øÖ±:F§§iZDЦYƒ‘w:8–ÓÒ’÷K/s©ªªÑhܹk÷—_CQÏ{ »w×ÔÕ}ºdi[{Ã0‹Åf³ m]€Žãêêê?øøQ’$IÔ~VX­Ö€›ÍƲ¬Ùlæ8l~~°iKž"Ë~~VYV ƒÉd2›M6›ÍÏb1 ŸùuII)Çq&£Ñßf3›Íc£ÁàïoµX, „l6›ÍfÓët`±Xü{ú3Ða` iº½£££³S¯×˲¬×ë;:;;»ºŽ7ïO ÎUQƒ"£,’ÒzàPsGWcC£ûÀÁ¸è³ÅªªÊñ¦ùŽñõcL3ôðÜœ«¯¼ÂétšM¦âÒRƒ^o1›†QUõÓ%K++«fΘ6røpÇ£ÕÙHMN¾êòË´°ì‹/këêüý'Mœp°¨(>6.9)ñ£OM›:%:**¿`'EQ—^|áÆM[ºº»$IÞ¶=?""üö[nöó³2,Ë2ÌòU?ìÜ5XTôóºõ¿lØ0aü¸›·”•—ï(ØY]Sÿ´ög‡ÃùãO«%Yúzù —ÓõãêÕv»#>>î¢ ç,*^þÝJŽe9ŽÍ/Øùõ·Ë§O²ôó/÷ìÛWV^~¨¨øòK/ùaÕO••K>ÿÂáp^8^lLÌ7ËWìÝWèíæèègqFAy<ü%^ùÀþ´vÝúþ𧨈Èy³gy<ü`{ƒ„PuiIæØ±ðùç{ׯ+yÿƒtƒY,MuÕœNw<“ÈÛŠ$K'Œ{ì‘¿Øí›Íf2u:EQÇ•”x<|qIiP`(‰š_¥ŒôôWþýÆX§Óÿù‘G¯½êª)“&mÚ¼E›¹µZ,£10 €ah½^7"7÷ࡢϿúÚÃó³fÎØ¹kwIi)è¶Û1€Ùl..)ñðüC‡¬~VEQôzÝðÜœ¹¹ÉI‰55µ‡+*ù¿?ÇÅÆ(²¼¯°Žö‡|eîBŠ¢øùYÞxõ•¿þý±n¹mîìY/>÷¬Ñ Ž©ÍF Î7’y^ U¢¢ö{Þr{í¨C; Þîp04-(ý§í:ÆôS”À ¼‡×q:†ñPêêîV±jwØwìÜ%ÂŒiS'Ž"Š¢ÉhÄ×ÔÔnÎÛ&BZjJvVÖê5kÓSSêê†çæ „vìÚi0ªª« £³SUÕ™Ó§ÝyïÝ/ÃÐo¼ýö£þsKk›‡çUUÍÛº-%9Éæç7fÔ¨‘ÇggfnÉÛªM!´wtM¦Èˆð-š7gvxhhZjjQq‰OchBˆç£AÿÜÓOΞ9}òĉFƒžâê!ˆ¦ÀÍ3’ÌÚµÅÅ-%%怵³Sgñ“Ôãæh /»ü²˜è£Á¨ÅÛPåöx¬VkbB‚,ËE;œŽŒ´4›mÏž}7^wm{Gdž›ÝwZjŠæ`Á7µ4×Õ×®¨Ðqº çÏ«­«[·acÙáòáÃr¦O²9oksskFzÚÐìl 8)!1&* cuúÔ)‘Fƒ!oÛv›Íǫ‘ɉI[óóçÍžm³Ù~Z»¶¹µ5%9™¦éà  ø¸X{·=)!aâ„ñû ìÞ³'$8xÆ´iuõõ›¶lq»ôgpfŸÖŠŒëtºœaÃ0Æ¢$õ±û4M;]NI’ɲmá<cÌ0lMueTb’§°þàã´ŒÌ"Y´Œi5õå‹eÜz[ssB(°wÒF𦛛›Ñ§Ÿ}:~Üø@ÿ@I–´ºŽz½žah§Ó¥ýi±˜Ad†a—Ëe6™8Î#É?ÆÏjÅ#Šòx<Çd2étº'ÿõL||ÜÍ7ÜÀóýº}È£!§`n™)@Z„(¨*Ö³´‚qY£Ë%¨=jÄ$E¥ˆ‰9ã1ë0BÃ0Ç&ùQ…̃‡£¦ÿx9/µ$n¿2*DGì BHU±AÇÔ¶¹¾XßÔÞ")Šågõïº`d°ÕÈÉÊ`̬9°xB”,˵µ5¼Àû ètúˆðïÏïY ûÕ>ÃÿVAUU€žzÑkÉ Ž×Uï¶VxÙû¹:¼o=zíf½)¡Ží ÉeM €¯é7™LÚ Vôœ¡iEU@E–e}G…½Þ0`ïÀp,Ýæà_Y\Ô\ÒÂwí3röú}¶œqÓw»îœŸDS]žaPãŠÊñ±±JÏ|/MQ-­-•‡““S½§héý(Šr:f³YEš¢–åy~»wÈl6+²Ì ‚¬×ë=ϱÎc†¦i†QUUKe2USyxú|ð0ÆZ8I:’t–eYN'KÃ0¢$‰=Åj¼'AgfoÁ´ p’ôGÿ&¢$K#rsÇŒÙÜÜâp9Ãå—\\[Wo³ù1 #IÃ04MK’¤}(šÒjöödG¿¹òðþ+.»ë¶ÑÆÛ°iûgŸý7lÒÖ¦Ù#c¼DÜ>gš¢Ýn·,ËÉI)š­ÔöcŒ““Rò¶nq»\³EQŒ1DzUÕÕ ?þÄápÚl¶?ÿáÁ¦æ–‚]»n¾ázA´Ê9š×¶)ŠÒB{5 >?dY¾çÁ‡æÍž}á¼¹’,×ÔÔþû•WþÃC‰ ñŠ¢P%Ë2 „UÕÏjݽwï¶ü“'N,-+›=sÆ[ï,¨ª®IMI¾þš«BÇɲì Göóó{oá‡q±±S'Or:z½¾¡±qñÒeíV‹åÚ«®LLHÐ^ZM˲,IÒËÿYpÍWDD„k Y¼/†~8™æHffQ››ïºýÖ§žxü’‹.„LfS}}CsK /ϽøÒ¾ÂBY–uÇó|m]EQ4M˲Âó|·Ýލ#ƒ(„ï?Ô(vµOŸ–4}Êx“Ñ4wæ¸ä” šÒ†’Š6 iÀGÇ¡„3‰ŠUE‘YE^…ž¼¢HŠ"cŒhyÀÆ>ú$2"â?/¿8gæ £ÑØÒÚ²-GUUu[[;Ë0 ÃPÕÞÞ¡eÞæyž¦)ð¾xžÇSÉŠRZVþÞ‡µutèuºO>ûlûŽn·Ëh4º=»Ã¡×ë(„8Ž«kh()-;\QAÓ´Íæ·~㦻w_~éÅ‘á!¨©©U…¦i–e%I:\Qq¨¨¨££ƒ¢(†aìÇãO>pß]w&%&>öäSMÍÍE9\®šÚZ­…ÒÒ2Ïk¿BŠ¢ø¾ „ÁÃÑÌÉ¢vïÙk4s† µÛíét:£Ñ¸9/oÿö÷ì·ßrsRbâ‚"@ááa÷ÞyÇ+¯¿QWßèÿÐý÷j~ hJô¸TL™Í&ƒAïT†B‹ÙåRÞ@’ ƒ$I²"+Š‚Ð‹6Ç+I’7ÅBHU”´Ô”¼­Û¶çï3f´ÙhäX®ªºêÃO>©ª®ùóÿñÚozÞÏb½îš«þûî‚¿ÿõ/MÍ?õÔ‹?Ý–¿cÓ–-?úˆ,Ë¢ ’ ~XõSVFzWW×ì™3à—uë¿ýî;9|øõ×^óú[ÿ­ª®éîŒìèèØµ{Ok[»ÃáüfùwF£aô¨Q ?þÄår †û£³óÕ×ßô³ZJJ˦Oª(ŠA¯ÿyÝ:ƒAÿ=w ‚˜•™y¨¨hÓæ--­­e‡#„‚ƒ‚þôЃãØç_zyÆ´i³¦OûÛ?þ9uòäÉ'8N2@TP#I–šš[êêëN§ËånljÒʤL<)3=ý¡ûï›=cÆâ%K»ººss†-ýâËŠª*žç§Lœðà½÷ ‚HÓZxBˆÍL±9~×^±¦®™e”ƒÅµÅ¥”Gå3“‚´é>™G{Þ’$)ý!I’7‰EQN—ëú«¯ºêŠË¾Z¾üÁ?>\vø0 ˆ‹‰}ñùç²²2wíÞýÕ·ß¾ùêËz½nýÆMQ‘Q[¶n+)-ëêìÚà@~AAfF†N§Ó¼‚çÎÛnÉÛºí¹—^¾ý–[ÌfK}Cãç_}ÛÍ7=öÈ_7çm]¼téáŠÊŸ{ææ¯§(Ômïv8œÓ¦L:$ûÎÛn±;¿¬[¿oÿþñcǮ۸i[þŽVý”–šúÒ Ïçæ óxxŠB€Pw·=8(HQT‡Ã!ËRDxx·ÝÞm·OŸ2åù§Ÿ*.)mmmCôú!YY›¶l©ohhljÊÎÌð0"BŠªúÛüîºýÖ¿ýåÿÆŽ%Ë’AoP™ã8½N/J¢ÅlFew8 =MÓ÷ß}W`@B($$DoÐCOˆ'E!UQ®ž?2&‰Ý¸½ñ±å?óï­O¾°³¦Me˜ªCÛTUsÎ<«²,k†^–üÓ^²¬ô‰®DqάY ÞzÓh4¬Xù½ÙdÒét€±ŸÕŠ(ª««+2"œ¦™ðð°ŽŽŽiS&¯]·®¤´äá?<´ì˯ÚÚÚÆír¹´Šl²,‡„„Üpí5—^tѰ¡C0DGEEFD úúú£Ñh±XX–EÑ4Íé8­EQz®Ûn7è ‚ ÜrãõiiMÍÍáa¡À0Œ$Ëòì¬Â+«ªBCB›ÖoÜ4"7—¦i­Y›Ÿ,˘4qBGGÇÇ‹?’•L|>„AHO„Ƨ«Ûn7 ƒA–—Û•ž–º`á¡ÙÙéiiÿ~ùÕ‡zð¢ùó/ý¼³³S ¥p¹Ý¼Çƒµx‰ž(IQBm/?~ù+ï¯Ù··nOqEl¼?’Š9wYÉAÓ‡ ß»ó®{A ¿¯Ï0’$‘å8š¢.°Æ˜¢iI> Ǿùλ…FGEº=žysf746z<@Èãñ(Šrù¥—¼øêkÕ5µÕ55÷Ý}gZjjMMmHpðå—\üÖ» &OÕÝÝ­ÓqÏó‡cêäI’,‹‚Øm·GGGžû¯þm2CBBî½û®'ž|úïOüÓát04#Ë ïáeYöxxŒqWW÷¤ ã*jnná8V§ãæÍ™ýÖ;ï¶´¶îÝ·?;3!äñx232®¸ìÒg_x1>>®ººfòÄ‰ãÆŽYòùç’(bŒµ—¼òŸ7ž}ò11ÑŸùõ¢…x<<ù(!hóæÍÆ s»ÝµuõQQ‘Ë"„ºººœNWHHð¶ü©ÉIþ{÷í‹‹‰‰Ž:T\\RV6$;«¾¡Áßß_Udãø¸xïèIŘeQ’+êšì.wH€¿‰–þùϧ6mø944bݦ-¢(’ïÛæPñ¡¨ˆ¨» €R ƒª(€f÷=VШ‘£}þÍ--•Š¢dffD†‡7·´tvu%ÄÇ765©ª[]S[QU™’”*IR]}½Ñ`®¬ª²˜ÍG"|¥¦¦6:*R‹£iºº¦6(0ÀÏÏoa¡(JC²³t:]Ww÷Î]»FCTd¤Ñht9]f³ÉápÕ×7¤$'666ïÙ·Ïb± ÉÊ ð÷/*)©®© ‰ŽŠôóóS!Ðëõ‡+*êêëÃBBSR’eYªª®µùY-KEUU|llcSÓኊ™Ó¦mÚ’÷Ù²ÏßyóuQúÉgoYv´yóæ¡C‡Š¢hÐëQÔÅx#8M&“̧m‚`0t:N–·ÛÍqB¨¹¥™¢©¸˜8I’¼]UU„(†9R£!är¹–-]>oþZÝÈVÂ`AÓÿÁ¢ƒÑ‘ÑŠ¢*:h·Û)ŠÒö«ªj±X3Ò3X†Q}L?DzœŽC€´–e†áyžã8A§Óéu:Ïk¯|Ç)ª*I’^¯÷œÑi-­eN§y™LF#¢(—Ë…1¦iZ‹â×Ñ4­ý/I’Žã<<ϲ¬Ñ`PTÕãñȲl08ŽSYDYQ´Ÿ0ªªêõzlj’¤-AÐëu²¬(Š¢×ëA`†eYŠ¢ž|æÙäÄį»¶³«‹”w& ¼¦ÿè’.·Ç£nÍ9+Ë2BÈn·k_`mƒ¢(Çãñx€¢(žçY–E€ô]r©5%É2à#®ƒÁpûwjñ$ÄîŸI¼¾~mÐ=bø(-Ó‹ª¨¼À«½ÃÛQäA;]‹¾×^íÚ0YÛðŽ÷ð¼¶íñx¼;cìýhixx^‹pº\ZS!EQº»íÐó)Ò– hBítI’ºz.íû9ô½EQ‚ hF_»"Ϲ·ÛMQ” Š¢(ªªêçg;z”‡'Þ å¨é÷ýø~—Ž·´ªŽ0êYßßgºŒî½öRE„€¦IQ—3Š–8A{=cŒÝn×±2ÇZ@_“êû§wgo Ç6ÕgÕïg©wkÇž~¼Ëýj·}åµKSuß]w)Šâ]îK 6~—F€0Æ4E+²ZèÎ äÉ/ëB’$豃dœ‹Ò~»»O´üÞ¸¢(‹¥­½­ªºŠã8²&þ,!ät:­V«–\a »sV@Œ>aÃ@O¾Ãÿ¹ „PP`ÇãQdÈê,ƒŸÕã8-1@´x­=ƒÒÖÑüžqd4‰Ý?kÁ*VTb÷ „A>vfh´²ìMÍM4MÃïðÖàßs2áôƒÈ›™@dPt߉=UQýü€ijnЉ‹‰Œˆ$^`@8?Ђ¹kkk½Iα6>G 5Kí팇÷˜MæÀ€À_/ÅE „sUUy7¯¨ MÓ¾ïì»Ãé`|—Þ tWÏb(²¢-n讯€ÂK²„1njn®ohd:!.Îb±h¯àhYÝ#xza°¡}ýµ<íZY=—Ë­y/àXÓ¯ªjYy)Ïó€qHhXxX¸7Ôûãc¬ªjEåáP?«Æê©2[g3}V?Q”‡ÀŠª¦¦¤yëÚ{µäÕ˜Çã.//KIIÓrŸi30Z5o%Ûªê*“Ñâ–Ññ^T3Ö¾GU¬z«]j2<Ï—.Sd™¢èȨ¨ÿß.yÿ÷ðžššê¸Ø8ŽÓYßD œ¿h_{8Æ‚õ5ýŠ¢|»ükNo0èy^˜6uúì¡Gš@¨¹¹)Çöys/ÀÿðãʹsæûYý0†Á`:0ÆZ+ŒiŠÒëõ&“™ç=á&“É× û¦¿÷x<… ãâ´ÂUÐ_^š ×ÅÅÄM™2 z§Nêc—}G뢼›Ú›¦«»ëó/—j/l„ÐE\í}sª««9cvwW×w+—ßyûÝ:žÌñç9ý}Çûš~ŠB:îª+®ŠŒŒþèã*++÷íßëgµæ ¾{ﮃ‡`ŒSSRýmþhh¨OIIŒˆ:ï„T¬RØÇìRH§Ó]qÙUQQÑ*V)D‰¢¸kw z½>"<²¡±!=-CU•¢â¢ÌŒÌä¤Y–6mÞ5Ôl6çmÝ’›“[]S][[2bøH£ÁÈr,TVU”––¤$§&&&•——µµ·¹Ý.›Ÿmذ\ŒÕÝ{v·µµFFF ÉZx`CCý°a9¡!ašþB6?Û]wÜ£ªø­·_¯«¯s¹Ýåå¥aaá©©i;w´´´`Œ##£Ìf˶ümFƒaÈaþ6ÿóþñ_Žuø`š¦—,ûŒeY³Ù<~Ü„ÎÎN–f,liiö÷0 z½žaXI’DAhkk--+½í–;X–è{9½ý¹„¦(fñ’E€Àl²Ü~ë›6o¨¬ªLLLÚ™·yü¸‰{ö슈ˆ”ei×®‚ȈțÖ''¥”•—aŒS’SwäO?QEŠ¢·ämE¦iŠ¢[ZZ¾ÿaerRòŠ•ß^uåµõ u»vïÌÍþ˺µ«_MmõáÃe ñ‰‚ÀïÜU°£ ?:*zÙKo¹ñV??IL&¼ùß× <!3#ËnïîìêèêêNIN’=´¾¡Þl6GGÅ„…E`¬ÆÅÆsÇ2lpphzz†^¯×ë íím~~~q±ñÉÉ©mmmY™Y¡¡¡õ u²$ÆÇ%Ð4e4𢢢Ý·6%àp:Zš›-ˈ#eYiiiB•Ÿ¨9ÜTU%1!>‘aŒ±ÉdÒëõím~V¿¨¨è¬ÌlE‘»»»BCÃŒFS||< (*.6^+•5К&§ ŒqWWÏóMÍZëØQ£<‚§¨¸¨Ÿ%]}–éj^oH¢æ÷ðÆ­{CÔú6O;}|ýÐßj^Œ±ª*ÁÁ!f“Ù«Iè óï‘Q1>*> ¯ú}Uh'zJ¯¸~Ÿö}{ÕgU—·eßÓµfµ§9@ðåH©ðÉáãîÅw§¯¹ñ¾úFN#Ú=ªXUÕ~å•9¢P†7÷_[ïî‘AõRoŸ¥}ð]æûnè³Ýß… Ï%|OñŠ÷@Œ tâou?9|ÇkêùU-‘ÄaÀ9±bB-mmnAö’ž¥xIåJU±Še/©z–’dL! ($Êê ”Ašêv¸LzVEv–ƪ ¿Ö: ™sàÞ‰ ‘!2çœ K#–¦T¬ªªz¼W£gÑ¿×ÚUŽŠô£*Ú„ä}]§hÒÑFŽªëSBõ¥Í|”?çU— Dp¥M|J˜¾®cÐÉÄêKšÜÉ!ºº.ÉÄQÞ"Cdˆ ‘éG&Tßd—ší’ž†Lg7‘G_uåe‡ÜaefªÅ ËvòHJÆt·X–mwaŠa\rËE1mîA*ÝæÂËvzàlè‘!2D†Èô+ÓêÂéf£ŽÉ ”(U¬olê'¸sñg‹Šèá.dÛYÑågdxQe½Î  ²ªc(IÑ~P€$cK ‘!2D†È™³RFV)„‚-¬Å÷±à(ؽ÷ØàNôù²ÅkíYm’U”DPZ®`-%§71§ïŸk¹@h„d#t¤4û±2'ÓN/™Þí…Š1Æ@SèÈ¢ZtíÀ‘|;'­ß$C!„1¨ø¤î¦ÖŒdýG©Gb«ŽÈ0R1V£~~“ŒVlFQ1…!¤¨øô]‹È"sæe(² F޲éу£dõ8¦Ÿ‘Uìo¤YÄ–5 :;¯p â-¼ÿ÷ù ²Š’jÖQÇ“ ¿ÚÎ dƒ‚Á)*FŽ¢(p 8 ã“mNi|ïÝ«¨_m8xKy$•¡/©&…à¨L·§Wƒ§¾Ï.A¡)¤g‘¤`σ;å×"2D†È Œ €(« Áº?Z%î8>P0( F@RñÅ9¶äP½¨ÍkáŒÚ¿#¡G7$YØkFPÔÑý”φW¡žFz·ƒŽ¦|þ¤(¬zꪑzŽòˆêÄËø$‹ aº'‡”ÏÕ^ηWý]ÅWæäé£(o#ÈÛž.iÊ*ž“å7/ÛoZšUÅ06Ñaã® £îéUÍ£ÞFÇ»»ž õÑ@/ýk2d<+Ë/;ÊàÔàÓùàÂ@1Xª¼Eȯp™t”Šû£h ¼Òæ”É*˜uÔEÃü{DUÁÀËØ-ªÉ¡ú[&Ù= B Ș—°ªbŒÁ#ªÃcÃcNER°(cEÅI•Œ¸EUQ± cQƲ‚Bïv$¬"É8UÅ HØ-ªZË/cAV-zz|’YÇ E…‹‡Ù eçYÁ‚Œ»EU{{i'ºEUR°$c§ ^3*pX´±Ó¥PZg0xDD»Dœ‚*«X’±f¾OƒYG]<Ì_”U¨R$,ÊXR±GÂ’Œ%Ë*v ªGRE[ôôÜl¿p7"΄1Žôçlzb²ÅÀQ‚¤Š ÆLGÄQ•ÕžÖD•B ÉX°ŠÁ-ª²‚ +îžlf]¢ªx¤#šGnQ$Œ18cЄÜ;†Üc|®Û£Œˆ;=NR‹" Â)!ðHjj¨~B²ÙÉ+Ç1¢ŒÃýØ@F¿ã°€Ç'Yë:ÄâFþÖ A)¡úâ&þÛÝW m 41ÿ]ß’Ä]=*cø¼ }_­;7Ö´ª°;7ÖxqŽ?øjgÇ´tëæ2ÇÞ÷“‚÷Õz$_8Ô†|½«ã’ÿQñ&­”Pî¡6AÆËvt’ú×9áZ‡šºÅ´0ÖrÇ—c“,³édÖQNAIÕ!@U®Û&gFèËZ„}µî)©–·~iŽôç.Îñ_¼­ý’ÿŒ}Y³°¯Î}á0ÛÞiã¾ÝÓyÝèÀÔ0}Y3ÿéöö¹Y~c-‚‡ÄÑ(ÈÂ~°©µº]`}\7'@{‘LH¶–5ó–ºoZÈ×µ\7:ÐÎ+ê<׎ð3Ð+÷u¹õòáþ4…–íh±°õRq£gJªUÅ`ÖÑŠŠÍôf†Ê ,ÍoßSãžìWÕ.´Ø¥§‡Fúsye^Æ1Ü‚-“R,™†å{ºnåÏm)wH ž“å—ª_’ß¾»Úuï” “_áú~×íƒbtƒj:ÄP+£¨ðöúŒñÓBü tJ˜~Wµ[Ç œ˜Óòà6•9¾ß×Åœ& Â)cÐ1Tu‡Ðæ€Ù1”Â÷/FéXª¦CÜWë6q”¤àq¦]Õ®1 ¦©©ÖUº/jgú¹È~¸Uødk;…àÖ A¿Ùni­ï’"l\°™)¬ó\7:Bðõ®ŽšQVñ”T«YOŒ7×wŠW  (øjgGC—´³ÊUÖ¬µƒîžr¨Áƒ1Ü39˜BÄ-ÜÜj`K£…[Zç±…Û¸ëFü°¿ëÃ-m² ’ŒsbLÕ‚‰£®áŸWîÌ+sÔ´ †è.;ʨg‘YO]1Â?¯Ü¹µÜQÑÊjðl(v|¿¿kJªeJªeÕîùClcÌ6#ã‘”6·NIµ®ØÛÕØ-ÎâçUêäü>ÚìèðXSa½Ç¤£ãƒtªŠ£ü9«žž’fI ÑQÐQÞ"Y˜0?öë]UmâèóÁ¢EM¡¬HƒŸ‘îö(ï¬oÙ~ØyûÄ`„ 7Ö´·Æi˜’fY¹·s§®Sœ˜b±êéñI;¯¤‡ë§¤YVìíуëí¼ÂP$)0p ÀXéJ…ãNdR …:ÝrC—¨ª8#Üà䕆n©´™eµ¦CÜ^ájqÈ.A àî›ÚâyIýóìð †ØÂmlv¤ao­›cPV„áPƒ'ØÂŽI0jð8õ¶ñA¿²[ôTf„áPƒ'ÄÊŽˆ35Ù¥Ø@îÞ©!]n¥¦]à%¼»Ú½¯ÖM#0²”ŽA~Ú¢§Y…XÙêvÑ#©Ï ›•égä¨HÎÏ@ï¯u'…èŒtagbŠ%ØÂ®=Ô='Ë/ÄÂî®r¥„êýtagRŠÅfdZÒ%ÃügeZ÷Ô¸D×vˆÛ+] ]¢£ Å1(ÐÌp42ë)G¤±B‚Œ3" N^mì’ºÝJRˆþª‘91FCv¤±±K”<1Å"«Øb („´iÕú.IÕaÑÆ‰Éf„baæ±ýßœ0Mu‚‚+Û„¬Hƒ¬àšqF†¬+¶ß99¤Õ!×vˆÙ‘YÁµ⌠?mVã¶ Áé†ÝÕ. PÚ,äW:»=²£ ,e`Q€‰a(d324…vV¹®pýèÀÔ0½ŠqnŒqOë”?8ŽF6#CAÆÀ1¨É.—·ðzæ¸Ó¼ôåW\V¯„IHßá¯x¨?ÔèépÉmN%7Ö¨£Qm‡XÝ.v{‹.nä÷Ô¸cu=åÔ±I–¯vv2ŽÒåÆ˜vTºV´K æh”ªû8¯B(®çÐχìN¹Ó­X tQ#¿¯Îª‹àšírc·äÔêv‘—Ôê±Ã¥Ø=Jy‹°¯ÖÄ14ÚPâL Ó+*^}Ðîg ‡E›‚,ÌÒüŽº±Ý%3–6ó›Ë6#säÐŽŽêv±ºM4pÈ#áüJW—[ɉ5ꪲMpjS—Ôæí¼RÕ.zDµ¾SjqÈôI¤.Ö&º¯p¨‘?Øàq ªSPS …uîýunŽFc“,µâç’‚Ûre«pÍÈ€Cüz[Â,…lðÔuˆmN%ØÂv¹•O¶µ]–PÚÄï®q[ØQñ&E…O·µ;yµÍ)ONµþt »¼U49ôÙöö6§\Ù&ø›˜6‡¼­ÂÅP0$Ú +¸²MðH¸¦C´{”v—\Û!zDµ¾KÜUíVTœ¢ß[ãnwÊcÍ_íì<®Û­Tµ‹ÿæ )pJЦyÓà úp½‡鸫yR¹í¿§ª;&P×íQ SxDU10é(†F.A•ìg »UÅ`¢LL«SF.AUTLQ`ÖÑ.A½kr°¬â…›[­ÆáQ´CFަ)ðmÇ)¨ cޡܢjÖQI¥âäT³ŽÒd(Ct'«ØÁ«c— 8†Ò³Ôã„¿³¡¥º]¤h‡88JQÁÁ+L:Ê%ªZYOK Œu,¥]E”±Š±á¤þC…qðŠ ‰‡‘U z–Â*dŒ˜8JÅ *ØÈQæ#ÂàmmÇ ^TU €ÀÄQ¡VÖÎ+‚ŒekÑM–‰!º;&?ý]ƒ¬bQÁ¼¨":†Ò³H±KP¥g‘ƒWeÓÌzÚ#ª,( yDÕ¬§Ü‚ªò;xUQ1°é@ÓêêçÁ)*þ`s«UÏ8ø“~pzÊ#}pÞÅ a@Ђu4þ× $ºí;û]ÒÅ1TS§Ô,ðz–ªï”XaU=K8 ’¬b0rB b@ù›UÅŠ Ý’_oÒQB°ª‚‘£B­ì7»;)„°ŠÍz 0 „dµo;&FË€¯b0é(  c(ŠE‹žòÊhKOÛ204RÙŒ´6®t jf¤¡Õ!W´ :–?MQG®…ü4lâ(# ¢Ç !YÁV=%«À1!$+˜¦¢bm²W ·WTLSHûÅ„¨*¦)„šº%m5,0r…´eº€h¤c¦¤`†–AŠ ÍÝ m¥.X 4ô,àbô´v¢ªBS C!?#0€Ã£¤‡6xºÜ²YOëÄÑ4E!EŲ ,üM4H 6ë) õSÏQ”~ª§TôE!lÑSGÉa¨ï’t R1˜uGX*Üýrg|ä™b¬bÐ+M!IQi iZEÅ=%« g) ¨Øj dåÈçï:<="Cdþ†FnAM Õ‡[ièb3£/¾ôÑdmêLŒ¢‚IO#,Mi¡ôf=­½  QL:ZR°QGk#S=‹0“ŽV060M#–F‡<ÍvÉßÄ`–¦t,Rßp ¥cÆ`ÖÓŠ ®—ŒIGc=K9JÕd0XЦÇ IÁ[Ë=p4¥c‘¢‚YG«*8Ц6Ò—U0êh À1”žEª Ÿki2ÚÍ"tDc°è´ÃÒˆBGeꨌIG+ô ÅP!0êhIÁf= ,MéYD!dÕÓJõDF-« Ý×qe8š¦P‡KÞ_ë6éhM‡&­¨ØÀé‘£e´k1tu}u¨Éy ÂlÆ#:dzú£¨àg  *Ýv¢=©#Ï”¥íZ>÷ÅДŽ9òLêIOËÊÉêÈ"sšdL:š¥Æ87LElèÏáCq UÙ.l«pšutJ˜Þ-ªiaz–¦ü t\ NÕ¬Hƒ¤à˜.ÀÌPJ×{zd¬¾22ŽàÍ Æ¬ã%œzÒíœäµb{_+ÀÌÐJ Ö95-ÜÀÒèT]ëWe˜>2ò‰Úá%53Ò )Gúü›dbu MÙNúZ'y_™ý´“ªW1ö71qÇèùtèÈ"s:d\¢šihwÊ»«]:渵ºÐâÏ%Ÿn´)²$«À1”(«,T *–B¢¢r4¥%hÓ\¿*#+˜=휤ŒŽ¡„3u­3,#É*s>^‹È"sZe8š¢Ê¸ìÝ]ý—eW1$…èü9ŒYR ‘@ ÎE©¬<®Ig@K¬Í‹áÜc@èxý hóÅÞĪªjÃUU)Š"?އ¦(¢pv¡…Ð21Çî¢zŠ9Ò4=ÐwpVCQ'± z^¢Ý_@8B/{¤¥^Ù»kkkSSó_s¸¢$YVU’‘ë(š¢öhllYV¼h‡|ÿÔì¾,Ë$³ @8KèeúB²,¿òŸ×kjë^þÏëííí’,CÓdÐê BHQ”^~¥£«( Ñ=hþm[s—9œÎOæu£€sÔáƒ1FíÞ³7*2²¬¼¼`çÎØ˜h?«õ§5kwìÜ9aÜØiS¦h2ÝçÆGQ6?¿ï/lï숋ŒKËÊî¸íVÿ/¿þÆápØŽî½gå÷?¾óÞûÕ557]}\l Ñ!@pŽŽå5—Îæ¼¼Œ´´ô´4??¿‘#FlÞ’÷æ;ïL›2%Àß »z¶ )jã–-9ÆÕ74|¿jÕ¼Ù³?Y¼ ~ë¼Ç³è³%¹Ã†¹Ýî÷~˜‘‘44;Ûj1tß À×ô3 #Ërqié”I“BCB"ÂÃGÏ?w3W­^íáùßq•óŒ1MÓ²,—””N™4Q–äaÆ :$=5mhvÖäI%I”%-5eü¸±“'Nt»Ýɉ‰!!!³fL2ä'N/~Qq MQÑÑQ.·«««KUÕn{÷óæÆDG?û‹@ÌVÏoQq EQáaav‡£££ºíÝ‚( ‚àr»UUmko·Ûít:õz}WW×úM›‡·@@zw~¿jUΰa`4'OšÈ²lKkëgK—qœî‘ÿû3ô¸¹ºÏÏ÷«Våæ €°°ÐqcFÀÄñãƒ1ÆãÆŒ6 S'O€ØØX·ÛͲìM7\·%oë¬,‹Å2Ð}'@‹/š?o~€ì/,Œ $&þÄE„³EQ*++;;;ûÏáã•ÃÉÎö=¦iŒ±×AAâ;½ôR”ªÒ¥(ЦM¿¾Ú£(JUUmƒ¼'ÂÙ@/‡73BH[ÊKôK/Eõòk‡´>Ú#oMpVÑËô u’E„sbÂaÐAL?@ :ˆé'„AG?I›½!=¿s‚W‹oñ(Öþ@8GéÇôwtt"„–1 Ч¨E¦#„¼Qê  á!ºÇ”kÑëÚ!—ËUTR¤ÛÖÞ®×ëš.;|8<,,(0P–eßÕ}"ß}ãâ! !EQ¼bývéˆð1M~¿¢È˃@ }M?Æø_/¼šœÒmï~äÏk–ËkÐûl÷Áw,ßÐÐøÌ /0 ÛÒÚòðCŽ9RUÕÇþùä½wÞùÓÚµ¼‡Ÿ?oNIIéÈ‘#˜Þ!ïkÀ8Ç)v¼.™âb¿_Q$™@(èK/»4%9Å`0hcÕâ’Ò½ûöM™4ñ»ï¡º¦&)1¢¨Ò²²MyyË**Ú¹{Ïî½{9–ûyݺŽÎÎØ˜ØQ°sÝÆ~Vëko¾•ŸðÄß5 Ÿ,^rÉE–”–îÛ¿?00`é_^zñEÍÍ-¯¿õ_†¦###[[[ (TT|àÐÁ°Ð°]{voÞ’çïïoµZOG¢…S¥¨à  ‹ÅBRA„ÓƸ««‹çùƦfŠ¢´Áhtd¤¬Èmmm}óõoØ´15%%$$¤µµÕh4~¶lÙú›?÷âKííÿzîùÒ²²…Ÿ,Z¿qSUuõÃ}„¢¨ÿ¼ùVQqI~AÁgË>G½øÊkv‡£££cêä‰0qÂxžçyžÏÛº--5Õd2#€Î®ÎöŽš¦Bo/xÿÛïV8ðøSÿêèìüeýú¥ŸYT\²wÿþwÞ{–}ùզ͛¿Y¾âƒ?ætºöööú††W_Óh4¾öÆ[-­­kY÷⫯vÛo/XðÑ¢Ouz}}}œž‘õ)QEQÏ¿ô’Ãá<â "„3ÈQ‡æ')àp823Ò/¹èÂæ––êššü‚‚K.¼ð’‹.4 ˾ü:0 `Ú”Éa¡aåååW^~Ùþ+*+‹Š‹ív{WWWqII[[˲mmí©) IMS¢(î?pðÎÛo Ž‹»éú뛚›÷¸ÿž»M&B0wö¬™Ó¦=òØã?¯[§×ëââb9Žó÷÷???ŽãÒÓR×üò‹ÓéÌÊÌ\òùÍ--Ý{uMMii™Åb™9}ú5W^±uÛöšº:—Ë•š’ §g&ö”(ª³««¸¤´±©ÉbI"p†9:êG•>Ì{øä¤$·Û£Õf!Qxð ””–ÆÇÅz<ž0V%YY–hšöóó ž?wÎk/½˜Ÿš’òÍŠŠ¢|²ø³´”T‡Ói·Û³22\n—ÛíÖfk;»:«kjc¬íikkOˆ‹¿hþü?>øÀ¸1£‚ú†Fhnn¶ÛíéiiO?ñÄ®Ý{þõü QV«eâ¸q¯üûù ãÇutt(ªéOÿ㈠ôŒÐO!Zƒ§@Qsf¿ñê˱1Ñ@ÒB„3N/£óãO«ÓÓR€ãبÈH 2 7]EQøó_¬Vë×]ëgµZ-N§É„……êtÜ×]KÓôÛ ÞûeÝz·Û}ÛÍ7…†„Ü~Ͻ ýóŸV¬ü>== (ŠŽ‰‰QU5,4tÒ„ ¯¾ñFk[Çq}òéŸþò×qcÇŒž+˲æÉ6ÌßfûÓ_imm‰‰þiÍÚ§Ÿža™É'N›:%+#cÁ~»â»n»=88X+!¹zÍÚ§Ÿ{ž¦é¹³gÃi‹¿<%ŠZóó/²,™ï%gœ^ùúW­^œ”””˜ØÇ1 ôëuZ0Æ.·Û ×{clAà8!t¼–µŒÇýóÉÑ£FΛ=Û›ðò¨€¢¸ÜnkO…»ÝÎrœA¯×Úq»Ý ÃrëÛ ¯ÌéЗvÝS®(@8µü†|ýsgÏöCGi¶L˜z'$]ë=d6™¼‡@§ÓiÁšÇ¶ ªŠµ†N'Dz Ãhiî}»DQ”Õ' ÆjµzÇká@}ðÊœŽ!¿Öæ)T@ œyúÉׯm÷¬¿=º ÇøO|×èö{È»qlË@QHsuüáþû´éÜ>£à_÷Ĝ։ÓS¨(@8óœ¡|ýÇkY³ƒ‰ ­‡Ss;pNpV˜0oÂ@ œ˜ßßÄï‡ ¢ áLBl.@ :ˆé'„Aǯ˜~â‚?­„¥_¿–«À7gòySWëÔâ«(ß0oºfß2^D«á졟Qÿ /¿òæÛïü÷Ý÷àãEŸü¸±©iËÖ­ÉIID«á,¡ïxsϾ}cG–dIŠò<Ï BddÄ#~øÉ'_ñÝ÷n·[+ø2Ð=0¢EÑq0 ÃÐ4Ï .—kÄðá#GŒp:])ÉÉ/>ÿl|\\þŽãÇŽ%Z%g ½JÚÖÕ×wttÏÍq¹Ž¤ÔG!I”TUEAñÉ]38Ѧp½Šòxx§Ë²,;œŽ™Ó§ýëÉ.Yöù›o¿c4hš€šÚ:¢UpVÑ+Âgý†M±±1µkÏîÅK–&Š¢ìÇó/¾\^QqÕå— ­ðú@÷|`Ðbr¼ŠJMIîîê~êÙç ¸â²KW¯ýy[~>˲áaaÐãÚ°q£V’—h•@ œ%ôÊ×ÿá'‹²22F5µµËY,f–ãá sÔáƒUhzSÞ–¤„„ÌŒôŠÊJØ_x 6&Æápþ÷ݧóž;ïHIJZóó/÷Üy‡ zAXðÁ‡wÞv«vÊyïÁм46o6dHKkë‚…þó±¿/ø`apPPvVæ‚>¤iêÒ‹/2¯½þ†Åb}àÞ{**+âãûÕªËåºõ¦›ÆŽMÒ·„3F¯Q?ì(Ø9bx.Æ«Êv8œ¡¡¡/<ó¯{ï¼óãOWVW{<žƒ‡}³|ÅOý >]²$1!~Æ´©¾£ÝóÍ«³£ `äˆán§³« ºº»Aعkwm]ÝM7\?fÔ¨¶¶v†aŸyòŸ)ÉI›óòF Þ¿Vïºëý>R…äë'gŒ£¦Ÿ¡éöööú††‰ãÇ»\.–cÀh4RÒª‘$ÄÇñ¾»»;5%ùÏüóO=)ŠâšŸùqõšCÅů¾þÆ¡¢¢7Þ~çü¶_cÚGQ¯5éõzï¹öê«î¿çî×ÞxëÛß úàà «ÕÒÚÖVWW?qÂqµêñx´¤ÿpfèá“_°3$8˜a›Í¶eë¶Vý$Š¢¢¨UÕÕ-útϾ}99Ã&M˜°|å÷/½úšÕj¥izäˆáÆEqï¾}MÍÍW]~ÙùíðѼ=^EEEF>|ø“ÅŸmØ´éÂyóò¶m¯ª®6èõµuõ!!Á¿£àZÝ»oÿøqãü¬Vâð!gŒ^ùú_ùÏëY™³gΔeyÓ–<›ÍjµV×ÔÖÕ×›LƉãÇSÕÙÕõêU¢ ]|áüÀÀ@ͺݞںÚÔ””¾£Ó‹f _ùÏëY™™³g΀}û KËÊâbcãbc=¼gsÞÖà  Ó¦vww·´¶¦¦¤¼üÚ²³2O ÕI&œßïKpæù ùúEIä8Á‰Ìo bß=0˜ÕQøUEýoÂpJø ùúuœÎ÷4oÎaŒ1Æ¢(JûSQUÔ³š×›‰~ð¸,|¥ªêå =Aúš´õº¿ªÕA¸Ž@ ,Ìñø¦d86%=}ÌÐþäSœgôyÛ@o¿z”@ Î d¼I ƒbú aÐAL?@ :ˆé'„AG?¦_Q”“Y‘«…ô tÿE=Â@w„@ ~ýDøœd¹•AÒã…e„s”¾Wà§5kWT@Ï VÅ=h#\íÿææ–¼mÛÁØî#ïÝÆk¿!TUÅpo™sí~Y¿~Ûöü»vN%„s—^¦!$ÂGŸ~zô0Ei˸4|cØKÊÊ–~ñ…÷Dmù’†w!DÓ4:² ÀGf oüwr{<˾øª¨¤tÙW_ N%„s—£m™ïÖíù©ÉÉEý퉨ªêïïo2*úÓC´´¶VU×Üxݵû KJË2ÓÓKËÊÿöÄ?$IúËŸþúÑ¢O‹KJ2ÒÒn¾ñ†EŸ-))->%9¹º¦FÇéþúÆ ?þ¤¦¶væôé3¦M=G³>h‹–·çŠ;zä²/¾øÛãÿäÁ¥pN㓯cÈÛ¶mxnNKkkeUõ#~8oë¶ä¤Ä™3¦¿óþ‰ +ø~þeBˆa›Ÿßã{!´nã¦åß­,Ž¢PXhXRb¢^§ =j¤¿¿Qqñ…óç9’¦éÔ”›Íæo³¥$'éõ†˜˜èQ#Fˆ’¸m{>B(--•a˜sÎÓ­uØ«(6è”@ Î~0Æ]]]<Ï765{O¢##eEnkkëUª¥¡±Ñf³ †~[AUUW¿øÊkÿyùEŽãN|ÉóÛ–@QƒG álædóõcŒ#ÂýۚœV.$YæX6¿`gFF:Çqªªjó“4M{3Ôk±êZØ¢÷Ä£2Q)Š‚ÐI/;;9VQƒP áÜ¥×j^ï@U EÛı,\8o®6Þ×,švÔŸî«î=±ÌùaìŽUÔ T@8wéeúÕAa4ºÃgÄ“C ÎiÈ‚R@tÓO ƒbú aÐÑé÷&¡üýœß9ýO^Qç·Â9G?ùúOaFÉó;§ÿÉ+êüÖ@8ç诊JJš[Z@–e¥mܪ ]½ÛÚŸŠ¢¨COy/Œ±,˲¢@ggWáÁƒZÂú¾ÓS‰WQMMÍÚMŠ¢h*Ó´¡ôl·wt8xÈ+©íÔ6´mŒ±Ü³áU8È=ç™ ÂÀÒ;_?€¢ªÏ¾ðo-ç EQtZºymœëÝÖÓ4M!š˜–ÔSÛ³¯°ðïiò§Ê‰t6àUTgW'ô¤qÖÔÅдwI„7~ÿó/¿Zùã ˲&æ«^M¥ Mk˼ Ç3½WÂ)áhÍîìÙ»¯ªªjÚÔ)ß,_ñóºõÍÍÍZþÝÊÌŒôÒ²²â’Ò¸ØØšÚÚÝ{öVU׸ܮÐo–¯@}»â»  Àæææ÷~ØÜÒš‘žÖÖÞ±ü»•µµuµuuééçGq¯¢ª««###gXhèæ¼­íí[ò¶~ùõ7N—39)é‡U?mÙº­®®>-5eÙ—_Žž[[[—œ”x¨¨xËÖ­éi©Ú¾cGIiYrRRggç×ËW ÍÎnnnþeÆ⒒ÀÀ@“É´xéÒ˜èh–e¿Y±">.ŽeY’‚@ œ 'ÎásÔkÞ››6å VWßðÅ×ßLœ0îÝ>ðð¼Áhxý­·Y†]ðÁBX±ò‡òÇ»º»–}ñ%<ýÜó?­YÛÞÞþշߺ\®g_x1;;k݆ ßÿ¸Êh0è8nÞÜÙ;w-^²Ô{•sE u»=|ô|´h‘Ëå 0nì'‹—ämÛ¾ô‹/[[[âãËÊË].׈ÜÜ…ìv»¿_µê™þ ºX–嵿¬+H pŠèÜùý?:‚ƒ‚†çäÀ¨#üý`ô¨‘0mÊä—_ûOnNŽ&?sÆ4D¡Èˆˆ ãÇaŒ£""hš¾í替úæ[½NÓ ×EEF¦¦¤¼üÚëFƒáž;ï€óÅx}ÿãC‡dkS¯3¦O;\Q1tè³É4kæŒ-NJHHMNv¹\áaa%¥eÝÝvM{é—]rñ¸1£.»äâéÓ¦@hHÈ%]˜œ”dóó»ø‚ †ÉÖ´tá¼¹&“iöÌ™¢ ˜LFâí!§Š^ùúwíÞr¬•Ñötuuýíÿ|î©§üým^™Ae’´›=VQÇÓX}CCKkkÎС¾ýjìäw¯òòõÏÍñú’µ€EEUµ0MY–Y–]½öçÐP›vÔ7[½æ—Žf³¼’çDz&í†çæxÿô*A»Y­Œ7˜52""2"Â{¢–Á!äÝÐvjñ¯Þ 8²ThšRUÐçø @8«èåðÑ,בµ§Z¨~ÅÑ ˆO?~ÖŒéÐ3[{l¶z8f"×·>Ðwz*ÑÕ'e?ô.càý5 ÅTùjzÇé÷»Ó·À@ß.@8ßèeúO`e4C>Ð>+ )Â9ÍoQjcØî3@ ~Ìo’&X@8 ~d@tôcú«K§èØÓO¡HkªOƒØ‡>{NGNk›pèÇáó«^cð‰Zé#ìé§ÐMä ªù­W<ù>øFïœLgᜣÓßm·³,k4¼aæÞAô‘˜N@HQ-ÑívK²ìgµj9å=ó¬(I¾K}ü‰ÒÒ2ÍL{óÚkïmÛ›P”¦)x---¾%4É®îî'ÿõLEeåßÿ‡(Š^Óüø“OþëùÞ[øáÂ?€ÕkÖÞ}ÿƒŸ,þì•×ß()+€æ––‡ÿú¨ÛåÖbð½iñ½/o}„оý…õõ 'S`àÑǟв뉉Â`£×j^„Pùáò,çæ kkkßµgwTddfFFsKK}CCkk[VfFdDÄÛ Þëîî¾÷®;s† åy¾¶®îš+¯(.)ikk€†ú†oW|gÐëgÏœa4ËÊË **rÇÎ55µ)ÉÉÞSWW?o΃A¿9/¯¦¦nèì¬ÌŒƒEE]]],Ë¥§¥étú­Û·WTV ’™É ÂÆM›WVº=Žãºº»–}ùU\lÌ”I“5§Ë}wß5zäHíUät:'MÿØ£h¿Z`÷ž½1ÑQ¸`×®înû„qc›[Zgf¤ÇDG@áÁƒõõ ãÆŒ¡(ôüK/''&Þpݵ©)É'H®P~ø°¢(ÙÙ™@Ê0Ìwßo³ÙvïÙ³hñgË.YöEZjêöíùí!ÁÁC²³¶lÝZW×0}ÚÔ;î¹¢ÙlÎ/(ˆ‹Ý–ŸøpŸ1c>ÿò˨ÈH£Ñø÷'þ™ž–öÚoê8î`QqáÁƒÆûiÍZЦ>Y¼8%)é…—^©­«·ZÌËW®ÌÊÌ8pà ¢ª/ú4gèÐE‹?+-+7ÍUUÕ3gLÿvÅw™éi›¶äUUW>|ý¦Í?ÿ²nÕš5v»cèìú††o¿[¹9//oë¶¡C‡˜L¦÷.œ?wNÁ®]ï,x?"<¬­½ýý?bYvɲϳ³2·mÛþÙ²ÏUUùö»ï¢"#7çåÉŠ™ý™u-OÃ×ËWX­Ö cÇjzèçH ½8ÙR-šýÚ_x`ÖŒé_|ýMJròC÷ßw÷w|ýír—Ë=aܸ?=ô`nNÎÖíÛ§M:n̘k¯¾ ¶åï=rCÓñqqûë_Æp×í·]}Ååõ pàࡉãlj¢4bxîÍ7\7}ÚÔ›o¼¾²ª FA!$BIYYxxØý÷ÜuÅe—"„Ì&ÓÈÃ`øaÕêšÚº'캫¯ ôxøè¨¨®¿î©'Ûœ·Õn·¿üüs‹>\øâsÏþ¼n]Á®ÝsgÏúæó¥ï¼ñzDDøû~$IRsKëè‘#Aœ3{æ­7ß´~ãÆ¹sf=pï=³gÎ|÷ý…k~Ywÿ=w?ü‡‡l6[yEÅø±c.š?Æ´iÞ }ÐUxàÀÄñã€$Z ç ½LÿáŠJ·Û“’œìïo«­¯€’ÒÒ  @ŽceY€æ–æ À@I›š›Àåv—••;†çAT¬*ŠÂ󼢨’( úƦ&·Û“–šêr¹xA XUTE–õz}eUÕ¿ž!7''À?@’$A½³¯û ÿõü¿ssrül~ƒ^„Õ§Ón·ÓÕÑÙéq{ŠJJX–å8®²ªª­­­»»›¢(ƒ^ßÕÝ][Wçp8ÜOP``~ÁΠ€–e].—$ÉTZVåI ñ‹¹¨¤cÜÜÜát¹›šà8nm¦ZSÔ°!C€x{Â9H¯ŸŸÖ¬IKM€Ù3fTW×üáÏÑô=ò×ß­\µzMCc£^§Ÿ?wNcSÓªÕk>øè㸘½^VS[B!Ša˜°ÐPš¦ FCxXتŸÖ¤¤$˲ÁA¤×ë0›Í/$$8>.ö›+† `9!óíwßaged$&Ä?ÿÒK!ÁÁþ6›Á`°XÌϽøbSsó}wÝ©Óé}¶¤ªºšaØË.¹$+3cå?~óí Š¢âo¿åæ¿=ñÏñãÇ€ŸŸU3Ó·Ý|ÓÛ ÞûÃÿý%,4ôö[o©®©]ðÁ[ò¶ÏÍ?v,C3¯ÿ÷¿þþW\véñr&ÿ´fMJr˲Þ0'@8‡è•¯ÿ»ïHINNKMÑÜÙ¢$Q1 óÞÂ]n÷ݷߦÓé4K'Ë2Ã0[¶nÅO?^“÷mW3š}<öò¼ 8ÎÀ€€c-lŸCGU±ÉdÔŽ:œNŽeu:ö§,ËZÔv]EQ0†¡eEùòë¯gMŸÐ'c¾$IÇiªªª( ˲ڟÚtq¿6ý$ï‹@ –߯ÿ¢ ækš åØ#~—Û…2Š¢hšYœ0nœvî±æO3²ÞûµcÇéõÆØ`è>o1›Á§’‰–SÚkˆdÏǘ¦¨k¯ºÊ{SÞÖ€ã8oø&BˆeY­5oá~9™û"„³œþòõûXIÍ^vñÅÚŸÞê"}’Ñ‹·Á~9ùCǓ쳿OO¨žZ1Çk­ßý'ã»?ñ}ÂYίäë× \lLŒïŸ¾GOlφAñéèÃÙp_ð?sR&LU±ª’TepžpRùú)Š87áü8.aÐAL?@ :NA©–AËÉ+Ѝ”@ œUô_ª¥©:²!äcÅHt£WQÇÕX϶·J¯ô¬K *%g˜~FýO>óìÞ}û½+c½ÑîšYB= tÏž'Ÿy¶ðÀA­à êWušYÿiÍÚ×Þx³JÁg%Q)@8“ôÍ×ߨÔTU]áp8::»,f˲‹ÅátÒ4M!äp:###Ž—âæü¦GQÍUÕÕV«E’d–e\n7VU»ÃÑÔÔœg³Ùº»»Ýª¨‘‘›óòr‡ Ã765Qe4Ìf3p:f‹Åáp´··«§$% ôÍ„AÁÑ|ýZ„ï¾ÿÁjµÝ÷ÐÛÚÚ—ü¼nÝ´)SÞüï;Í-Íå•/¼ôJ{GÇÒe_Lœ0Þd2 BëïMãcóókimÛ°iÓØÑ£ÿùô¿xAØQ°sϾ}Ë¿[9$;û‰§žÞ°q“¢*11Ñ_}ûí·ßöÇÿûË–¼­v‡ãÓ%K‡çätvvþë¹çs† ½ó¾û;;;?ÿêkŠ¢ÒÓÒU¥™J Â)çdóõkìÞ³wÜèÑÞûÇþ–)J ¢DQ7fô“?f0ŠKJaO`îÙ»wDnîÌiÓøèãEŸ-ÑNÑRàÞ@qIÉ} çKèºWQ‡ŠŠÀ»îÁ{´O¨þÎÝ{>þtñÇŸ.nim…žÑ½¯Š´=¿¬[¿|åJ¯@ œ&z™~„ÝîøyÝ:-€ª(ýZj‡Óéµny[·546–––546j-hÖß;Îu8ÐÒÒ¶}ÇPUUKYsÚÕeµZ½ªEQ‡wY¯ªªZÒžÕkֺܮ]{ö8.M^Vo…UU픕>pàȲL¬?@8}uøhË|7nÞœ•ew8ž¸çéðаðˆ0Q”þôàïôqdxÃ0_~ý­Ùl¢iúÉ'7›LÛwÜ|Ãu«Ö¬å8|°°¤´Ì`ÐÿáûÍ&ó¿_~¥©¥ù¢ùóC‚ƒƒƒ‚Z[Ûžzî¹?ü‡‡þüè£UÕÕÞzåçZ· vî €Ñ#G~´hÑE\ÐÔÜ\xð`HH°Ûí‘D©³«K›Õ(;\>zÄ~ÁûÌš9så÷?¼ûþ«þåÞ»î9<÷_Ï¿ðÑ¢Oëêë»»»çΙ=sú´{úƒÛí9wµD ÎrŽÖæ€o–¯=rdJr’ÅbÉÎÌ  LJHhmm;gNnΰ¸ØØ´”ÿÔÔ½N·-?ÿæ®×ét©))B#GŽ˜4a¼Ëåš9cú˜Q£¢"#“[[Ûbc¢“’ãcㆠ’” ×üýmpnŽý5'Ì7ËWŒ9"9) c=eò¤ôÔÔÀÀÀÄÄ„êšÚysfÏÉMOKËHOÛ³w_m]Ý—] i©©ªªÎž1#+3C„«¯¸<>..;+Ëfós8‰ ñÉIIq11ãÆŒ ô·ùÆsTKaÀ9qmÞ^ùú=^¯?I/¼,Ë’,ôú>ÓLU¿~êóÆyív»ORQ¢(bOåE_%œßZ"ȉóõ÷ZÒ¥ 3¡÷â[oкö§¶_k…a¯¼wæVQ„ï¹Z£÷Äó`y—WQÞ{×fD|u¥Ý¸o¹]í(MÓ^µx5ÖG½Š¢Pu®k‰@ œµ0ýîõµÎ}ƶÚþcwj¶¼}Äú=ñ<À÷Þ½__¼Gû(ÁWcÚY¾{á”s¾b@ ü*Äô ƒ˜~@tÓO ƒŽ~L¿rœ¬mý‚1ÖTN+ÞK¨ªzöä5ûMŠR{€žªcõö›üßPUUKÈzf@8;é/_ÿo /ño9þ· õ~ChNÞ"*ÿs¯N†cƒŽ=ý hÒÛ3óàÂÙI?ùú×mØXYU²¬xªÚhQ*j;5á®®î~úIÛ©(ªä®ê9ãÈ)Ú¶7«³&éö6ë;:Öþw8«V¯víÞ³{Ï^eY;z¨UUõ6ÕïUú\È;ÊÖz¥b¬Éx{ÞïH¼¢|¯¢]À÷t­'[¶nݰióö°ÿÀÖÖ¶Z-‚7Y¿Ö`Uu5È=ð½ PTÕ«J-Û³WÕ½4 ª}ôà½ÁÍyy¥eåÐÙÙuú@8Ëéž/Šâ{ jÉg( Q¥)m‰B4Mk;µ/ùÖíÛ~XõMÓ€MSÚ2%o?ê9Ek¼¨¸øÝ÷? iÚ» É+ìmÖ ôŒŽÝn÷â¥ËÜ|øÉ'õ Ð3hõ®Nöí§·)M¬ÏU|/¤ ü¼nÝ7ËWÐ4­( …7ßòÙ>ŠòöáÈ)>7®]Îãá}¶dï¾}+øöí/lhl\¼d©$ËÞÆµµüþTO*ß»š¢hŠ¢€7þûN}}ƒö諊ê£ï˜ý§5kwíÙ [¶m=}Ž@ œåôÍ׿}ÇŽ¤ÄD–eŸû÷KMÅFGSuõ•W¬øþ‡ À@†¡×¬ýÅárFGFÞsç4MoÝ–ÙÅ×××ôébY–o¹ñ†µ¿¬›6uJb|ü’eŸ’m6™>[ö¹$I·Þxã⥟oÜ´©¥µõá‡lljZ¼t™Ñ`¸óöÛhšþï» xÏé¸ÈˆˆÝ{öÌŸ;wά™‡ŠŠ>[ö¹ÝîPUl1››A˜?wv~AÁ×ËWèuú¤Äø›®¿þ«o—ìÜ9<'çª+.ÿeý†íù;ì{Tdäƒ÷ÝÛÚÖöÑ'Ÿº\Îk®¾*=5õíïµ··'%%aŒówìˆŽŠºòòË>Z´¸­­­¹¥å¾»ïÚ³wßw?ü Óéî¼õ–öÎÎo–¯à=üe—^<$+Ë· EQÛwìHNJB}üéâ[n¼á»~°Z,Ãss~ôqSsóµW]e±˜¿øêk·Çsó 7´¶µF„‡9bõšŸ5mëõz—ÛýÄ“O™ÍæÛo¹9.6v[þŽØ˜˜¤ÄÄ?YT\R2kÆ ƒ^_W_õ•W8xhïþý×\yŧŸ-9T\2{æ †a/Y²wÿ¾;n½uìèQ Þÿ ªºföÌS&OúlÙçåå‡ÝOFzÚáÇFÓÃxÞ}ÿƒ†ÆÆÂ'OœÛ¶Ÿ–wÁ¼y³gÎ Þ!á,§o¾þ-y[‡çä´´¶å\~ÉÅ oûvØ_XX]]]VVÞÜÒüðCnØ´©¨¸XQ”êÚš‘#†?÷âËn·çš+¯ˆw:?ü¸ ~\½:,$ôå×^w¹Ü×^ue``Àðœœää¤k®¼!ôü‹/gfdÈŠòâ+¯J’´iË–Ûn¹©¾¾¡µµõæoXøÉ'n·ûÿ¾3eÒ¤;n½…Bˆa˜í;vÄÅÅ9®·¼ÛM7%&ÄïÝ·¿`箯¿]~ÉE}ºtéÞ}û«kj››þôàƒë7l,*.yᇀ 55õŸO?#Šâ†M›âãâ&Ž7$+óö[n.-+_û˺ñcÇ Éκâ²Kkjk_}ã™Ó§GEF¾ôÚªªªwíÞ}Áü¹‘¾*ó**7gXk[[~Aìß ®®þ˯¿É/(¸ñºëâbcªkj ví¾`îؘܸ ›6ÉÎbVVdXóóÏí‹å{ïÉHOå?oÀ–­[G¹uûöÏ–-»êŠËÓÓRƒ‚‚¾]ñü´v-E¡ü‚‚ÅË–]}åå)IIi©)‰‰‰óæÌ=jÄÇŸ.>X\€ æÍ{îß/†„„—”ÄÇÅ%&$|øñ"àXæ«o¾íêê‘;\¯×O?þª+.ó÷÷oimu¹Ý²¬´µ·@GW§¬(cFŽütÉ’ý…öìÝ €·çÿ†÷ÓÉ?8Eéèì$&Ÿ@8û镯ÿãOgf¦ÍÎVU544$)11,40lËß‘•™1fÔÈ À ˆˆðè¨(½^o6™~Z³öö›o2™L»vïþyÝú1£F]uùe:NUÕ]»÷üߟþˆÚ¹k÷ÏëÖ=ú²K.Ò õõõ#G ÏÍÉÙ^PPTT£×é3ÒÓ)ŠŠ‹ chzØÐ!¹99;wíêîîž=sFqI‰ªª³fL×ëõC‡dìÜUWß IòM7\o1›×mØØÕÕ•ž–j2™"##¢£¢hšJNJš2iRqiiÁ®]Fƒ15%™a˜´”?«5""|KÞÖè許£G;Únw8ÎQ#G :dÏÞ}þþ~wÝvÃ2ɉ‰àú©y±?þtqVfÆììà  „жüYéãÇŽëî¶/ÿnedDķߪÓéüýS’“4á¡ÙÙþ­m­4E’œ˜èçg=\QÁ²ìŸzðÓÏ–¤¥¥ ’ÝÜܼòÇY¾ïî»C‚ƒ£"#¾Y±âòK.ILˆoniÕÝsç!!ÁI‰‰å‡‡…†M<Éî°oÚœ§(JvV˰ÉI‰þ6›ÑdLOK£iF»MÏïܵkØÐ¡QQ‘kÖþ|û-7Ÿäƒ»ü·<8Ža33Òû'g’“Í×55µf³édÚõx<Í--Z B/Ú臟,âyþ¾»ïRå÷'¡Ô¬mSSòAŠ¢‚h4>üdQ}CÃ{ô”\¥ß‹ï¨WQ'3Ÿy2ÂÕ55¾š×„këêžñåW_|Aß».ÂïáŒ=80€œl¾~ŒqLL´wÛ›ƒÞÍ­Åö€–P^¯×{͇w]¨ÛwàСÛnº¼ÁàÐ2¨( `hÚ«® j¶FÛãýÓ7æ=,,LÛ iúó/¿Ü¹{Ñhüãƒøv O Þ+ú^EÛé K×öËŠ‚´+jõ¼Wï×zåíî £ôêA;½°oé¯fbcb|5ªŠY–ÉÛ¶=%%Y¯×ku|5¦b¬*Š6¾ö*ùHˆªÏÕUE= ÑÚ?n ?óáWèU¥ëÈ®“þ©Þï0VQ—ËeµZOmG}×ÜʲÌó¼Á`¤é‰"ÿM €OFøx2‡S§ã|뽜ªþŸ±G „ßP¥ë·úgû•§iút˜ßk1 c6›½«LÏ"íÆðñd,óëÿizpá,ä´ŒšÏL`ßyPèñlƒDdƒ„Óbú‰E>G!Ž@$Œ+0èèÇôûæ³üUpO~ÍÓŠ÷šÿ êçWzõ{òõ«·ßÔàïìs¿ ƒ„~òõÿ¦ä‹´¼fòþ‡ä޾YæOþ,- òô91~Ó›¯ÿØŽý¦ÿ·»óÕäo åúß@8;éçË|¸¢BËâ ÷$쇞A«7½7è[„CÅÅŠ¢*Š"˲&Ð'í»ìÍ€€ò&:–}ÚQzã›§Þãñ—hgÕ74ÖÖÖ€$±Xîä?4IDATIÞþÆ= ÷UU–e­¯Z}ŸýГÓß—ÿm¬íUø”óêA»´÷¢UÕÕe凫kj ­­Ýív‹¢è;Ò?\QÑÞÞ’v >¿åhãÚ~me€ïEæôïÑ¢Ò[ÃPQQ©õ™çùÓ÷àÂYN_Ó¯ªê“Ï>×ÐÔ>™ßµí£ùèiZ[:Ûwìxí·´œí ÃøÖ~ò¦}gh-É<ª««ûaÕO ÃhA™ M{…éÞx˜E9]®^~ÙátÀko¾¹mG~Ÿþ`„Ž”¸òvƒBè—õŠKKµGÚ~ßœþ¾ü¿ |å͘¯ÝˆÖ­oÚEeY~éµÿ|³|ù‡Ÿ|_/_^RZöÂK¯H²¬-°ö6X×о)ðáHq‚£kû—·²½£C;Ý»_;׫EºGÃÞ(ØEK–ü²alÍÏ?­Ž@ œÍôZÍ‹Ú_x 80080ðÛß¹\®ÈÈHŽãƳcç.«ÅLÓÌî={ÓRSçÌš Û¶ï˜5}š,ËŸ.Y* Â%_´gï¾Üœa!ÁÁy[·ED„‡õÍ·çª+._òùkY×ÚÖvÕ—K’´ôó/ÌfÓÕW\!Éòêµk›ššüýƒƒƒvîÚ}Áüy™ééíß,_^ßШªªÑ`°Û³¦O?pèКµ¿def¤§¦,.š3s¦ÛíÞ´eˬ3 üeý†¬ŒôÌŒŒÿ¼ùVdDÄõ×^=i„ü‚‚Í[òÆŽ3~ì˜Â÷¶¶µ :¤¦¦–„¯¿ÎpÒ™¼Š ð÷ß°qӔɓ víÒëôÙY™ß¬XQ]S{ñ˜LÆ­Û¶wtvÎ5«£³Ób65rýÆMe±Xœ.×Þ|+"<üŠK/±X,û°Y­C³³×oÜ´k÷îiS¦p:®»Û>~옆†ÆâÒÒiS&¯ß¸q×î=Ó§NÅ¿òú»v]sÕ•Ù™™?þ´º¸¤dÞœ9i©)›ó¶VTTØŽÜœœ½{÷†††^qÙ¥¡W¯.--;TT4zäHØ~zÜ…óçg¤§‘|ýÂYÎÑ1šöS}æM9ÆÖ74¾½à=ÿÒ²²e_~ «V¯Þ¹kw~ÁŽï¾ÿ!gØÐwÞ{¿¬¼Mœ0þoOü£´¬<%%™¡éíù;~\µÞyÿŒá©gŸ+.-KKKãy>ÀßßæçH!ôì / †êšÚ·¼çñxÞ|ûÝ䤤ïW­Ú¸isLLÌó/¾ /¼ô²,+9C‡‰¢¨Óé¶å燇… ¢ø§ÿûkllŒÉd ?úÄåvïܽ{ÍÏ¿455ÿߣ‰1M¢üýýým¡!¡‹Š¼¿pHvöÛ Þ«ª®Þ–Ÿ¿nÃÆä¤¤>ýLpppჟ-]>Y NŒ¢†ÕÖÕ-ùâ XµzÍî½{?[ºì›å+† ‚””–.X¸P§Ó™L¦ ›6e¤§›L&Y’`é_¶µ·Q5jĈƦ¦W^ÖoØ8røð;w¾øÊ«C‡ ¡iÚår¿óÞû°ü»•EÅ%ù;_|嵡C†`¬ z›-Àß?48äÇŸ~Z½öç䤤g^xA„/¿þº¶¾Á ×?ýÜsÙÙYŸõõž}ûÖoÜôÍòÇ×ë … ¸´ä”?¸Ø˜˜ç^|I›„è6@8½òõcŒ‹ŠK¦Lš$JÒ¨‘#æÏ“”˜àgµ@€¿¿Ñdä8ݤ‰¦Lš””˜àp8 ô³ú……†ÎŸ;W–¥òÃ~~~Ο{àÐÁ;wFF„'ÄÇÍ=[–¥²òòÐÐÐìÌÌ¸ØØ æÍkim+*.nniimkëèèP%5%yæôi9C‡eff^rÑ…F£aßþB‡ÃyßÝwMš8.0 @Q”ü£FŒ ¹è‚ víÞ-btTTVFƺõvïÙ;gÖ̈ˆð‹æÏßµ{·(‰ááaññqÆKMIÎÛº­Ûn/¯8ìñxZZ[-ËøqcçÏ“?uÊä‰ãǵö¸ìo.£¢â’É'(Šþ ÃLŸ652"b×î=þþþ0røð®½Æb1ï?p`êäIøðãá¹¹ãçþýÒÌéÓ >>î¡ûïÿaÕOK–}PS[[~ø°Õb LOMyèÞ{¸÷^‡ïêêžçyžW¥ÛnDaýÆMÕ5µmíí5µµ£FŽðx<—^|á”I“ÿç“v»ãª+.ûøÓÅ%¥eãÆŒq:]Ú¡¿ÿãI—ËÅ2̾ÂBI’b¢£ý¬ÖéS¦>ý'FÑÖÖær¹Àét*²ìáyIàdl•fÑ¼Š¢(ª¢²ÊÃóå‡;?«õ¡¯éÕ×X–mï耢â¬âè¨(Y–kjj[Z[N§ªªõ µuõ«þ9<,¬¥¥E’¤Ô”žçï¸í–àà¿þýq˜3{æ“Ïþt±Ùl?v܆M›ýü¬a¡¡•UU﾿PVä»ï¼Ãb1§§¥é8.<<Ìl6WTV¾·ðCI–ï¹ãv“ÉtÕ•W¼ñß·üiõÅ^PßÐðîûïøûGGE%%&j…‡çæ²,Åq,ü–ÈÑ•?®úÿíw|ÇÕ÷g¶Ý~¥«Þ‘P ItÓÁ66qŠ÷ncãîçIò8qy§8Ž;6.¸7 nTSÁôTiBH¨wéÖ­óþ1ÒrU 4IHœï|v÷ÎÎìÌ¿{æÌ9Ã3B™Ã3†¥ ý/üÕ`Ò†ݾs×·+WÚmö{î¼CUÕŒaÃBkÖ¶jú°4Á ü°îÇqcÆ9Ã3Ò?7Ïår?÷‡§.Y2,-!t¬øÄÂÅKAxê±GBÓ§Lyí7³²2BÅ'N,\¼TøÇžº÷î».^24eÈìY³Þ|ç·ß}wP\ÜÐ!)ééÁÁÁ‹9;+ !”–špýŒÅ%%yña¡¡3»÷î}á¹ç.ýÇq#³³YŽ;¯Á ÷é¯×î=qq±Q‘‘þËt]}ºé§­­­ss'ŽŸ@mÇúF!†aV¬Z]tøð³xšº¾œWœË®Ðæò X–MÚ¶„¨Á =~úÙçî¼íÖÙÙþõÐxÑ&ü ùElFcpv-ÜuÚË쎋‹ÓËBh­Nç3Ïÿé}!88Xÿè"G²×¾8úóˆ×?nìÝDÛöŸ¿]ô(ðz¬y›Í6yâD]8Ú¢ÉcŒúáÇõwßy»^­ y=°»~E¿N/R·Bý”QU5}Ø0ÿGe0£( MyØÒê¤3\ý#]¹è­Po‹:ª3í­œ×~%Z‰>Pú£ªšÆø×ï7,FU—oy7v¬^†(²ÌóüÚÖ…„„ë7ê_ÿêï½§Ý)ÆX=ýÅuüv.é××óü:|üõ±í }³®îÇM¯ëÉ@tÇsý¢¢(¿}ê‰Á ÈoïèYüO;}ªŸÒ•UBõ8×/"„b¢¢ÿüü³¦Ã~îðl׿ô*ôbç;±õwbѽéýë÷?èfT1ÖŸ¿k™¶/†ãBW3}êÔÝf`¦»Ï2†mÏÙÞ\~q\ætþóýÛmyŽãR’“/ùƒvÕgzâÚ;\p‡s/C»ÛkÏßC_—!ý8^¿ÞÖö#ìåÞ à‘Àîâ«èJoNÀö"d/÷n`&:`™¸âèFúÏëW?içì·wº80¬4=1P½@7Ÿ‹Ì9ÞéJ·¾áðpi  ×èfÖïöx¼>=Ö'ª4ƽž^Jm2ïñz[N=l‹¦i­­­Š_Üv*puuuN§ µ¿ |>_sKK_÷ýb¹´Ðkt#ýÏþ¿?>Œ:æ¢1îé)ãO¯¿øò+|üÉÜ÷?D}ôégyùÏýù/’(ê{ª«kþß }ú¹ç÷æìGíÒ?ûñ'zôqÔ+É{Ž‹¨‚Ó–z™áBÅ'JdY‰ŽŠ*9y’a˜SåUUÕ¡‡­þnmCc£Óå*(*Úº}{KKKÉÉRŸ×;,-•FCKIN²X,õ ß®\¹}çNê<þêodggÎÿäãi“'Ó-Á‹–,mllŠAýÓèqiÊÜ6P;vîêƒ@¿¦s¼þŸ6m‘u²´ôÕ7æ „|ùå6¬YûýÛsß««¯?uªQ2ÿ‹/£"# ‚ø_~¥²ªzÖ}÷¦š9|øãOýV0C’S®ž6uÚ”É Ã=vì³ù þ÷‰'úô_òªªª~èûyž‡˜—ôâõ/ývùÐ!ChΟÏ×ÔÔƲ¬¢ª55µ&“1Èá Ž‰,Ëúv: ËZÌf*åMMM£‘žbŒKN–ªª’”˜ˆÚ-Úz Í~·ÂIû’T_w €ÆÙãõŸ–þN™@Î’WäL§Ý>{…ý—K>P}Ý!g—þ'=1…nXòW(ÿÂÝÚmpÇÔ%IÝzb z³Åë÷—¤®òt¦T!]xÒÖCÐ;Àº"ÀH?ÀH?ÀH?ÀÇ%HÕra· LG¸Òè>U‹ž_… D]Rü3®øûÿ‹º$f9]O»JöÇm\gâ¼ àò¡›YÿKÿzõPnÆXÓ4]Îü%ÛÿøÍwæ¾ÿÑÇö9BHUUúõm÷¿K¿Žzý­·÷î;»¿ÿr^pùÐ9^MmÝ‘£G£¢"EQdÆëõú|>Œq]]ýñâbI’Eq¹\UUÕŠ¢ÔÔÔ=~Üáp”–•!„†iljª©­Ea„!¥ee'KK !Í--…Eõ ¡ÊÊJ—Ûú­ôŸß@UW{½Þ¾~d€œ6øPEÛ¸iÓˆ¬¬Såå¯-ZüÚËÿüà“O#ÂÂ’““>Ÿ¿ <<üºk®æxþ¥W^ûÄãæåå''&& |(7!´|媟6mÆe¤§ÏžõÀ[sß;vüxddÄoŸ|rÑ’¥ååU•øýïìv{¿ž Ó©ý9TBü »ï¸#;+S#„éϽ` ÑÙÖ¿ÿÀßÜø+Y–雀Úp*«ª›î»çî1£Fý´isttÔœ¿ŠúðãOnºñW²"Áív/ùöÛW_z)*2âѧþ—eÙŠÊŠ÷Þ~SU5–enüå/Ž/þtÞüŸ6nâyžôÿ´$ç2P1ÑQ¯ÿëZt€Ë‡Ó–e«ª«kkë®;ÖëõI’ŒÂ»Üî_Þpߟö£O?ÿôóùf“Él2!„*«ªjkëÆëv»1ƒUUCMFÌ0‚À·´´0 ‹bYÆçó½òÚ¿Ë++ÃÃÃ!Š¢ôßèÄ„†aÎu ,’€Ë‘¼uÛö˜˜h„Pâà„ªêª×æ¼¹mû£Á°þ§k¿ÿÁ <ÏiDóú|m…££B‘‘‘›·lݾsç/nøÙ_þþ§Ÿ}>)1ñwÿó!ÚÿþßÞÿèã¦æfÇ[WW×ÐÐÈó|xXØÛï¾WQYÙóRÑ>Ç}b_?/@7t0ø444Ìœ1!;çµWO”œ¼õ¦ß‹¢È²Ì5Ó§ge÷x<‰ƒ#„¯¿nB(uÈwæ¼a1›ãã=JV”Ä„„Ћy!/¿€çùðð°—_üÛ¡¼¼ë¯½6<"c<";‹æ5ìwFúÀç8Pɉ‰ý± x:Ç뿘ºüCطժМ=^çe^ù&„èâݶVÉ0¨»,%4cm{h~Ä0mŸÒPõÔ°Ó©¶þkî¿€¸¬è,ýgÚŽÔí±~ ë¸ÿMgÙÜ4ñ¼ ಢO½€ ¤àŠ¤àŠ¤àŠ£› Íªª2 sŽK”Z{H†s÷ØQ5i_õ¿º Q$ÿúuŸêADoÁ÷¹ÐT·=è5º‘þóÒ£ Ð_Öï¦Ëq§Ö;Õ1¾|äò‚ªÛžôì¯óë”ä“ÉDÏ1ÆÿùêkçCCBÚwfa„:'`¡pŒñ’eß>q¢dHJ²¯_ŸÕvšÓ+ß,Z̲\hHBÈÿöõ?mä8nñÒei©©tÆxÕšï>þìó­Û·ÇŠs8‡rsßÿèãUk¾#„$%&ö•ã·\p¥qÚàCMÏ[¶mž>¬¥µå«×þñÿ~?ï?_9²33?øäSŸÏwëM7Y­–÷>øˆãùÇyøTyyü AYÇ—–Bí?p`ɲo%Iš9cÆŒk¯Yúíò7üòÌÿýþ«E‹òò xž{þ™?:jëØ¾cçàøøÌáåå¡Ò²²”äd—Ëýò«¯©ª:{Ö¬¬ÌáS'O>QRräèÑÑ#G"„ÒRS‡¥¥aŒç-øÂçóõÉQ5¿€:{O5xÐ[tÎÒµkÏžQ#G8]®òŠ „PUuµÓéúió–cÇ‹gÏz`äˆìêšZ§ÛõÇÿû]JrÒ–mÛFfgD0ƪªÎ}ïƒ_ýâÿûÄß,^üÃë7lÜøÂóÏýî©'ÍfóÌ3yh–ÓéúvÅ AE¦mege!„UMCÌÍmim ùÇ_ÿrû­·¼ûá‡tQwëö¹yùt*Mm#ÿžófPcܘ1}â‚êL=}ïÃiGú]Sú)§u“ã¸ææ–²²S“'Nôù|F£!dµXEIº÷®;ï¹ëÎ7Þzç§M›FclLLTddSSSiiÙ”I“\n·Åbnjn&ˆŒÌΊ°c×®ˆˆˆ¨¨ÈÀÀ@„зËWnÛ±Ól6+ŠªªªÝf—$¹ìÔ©)“&¹ÝnƒA@Ùm6†aÌf“ÁhÌÌÈp:-­­,ËÞÏÝ_|þéÆÍ›+*+9Žûzᢊʪ¿¿ðBŸŒ!„eÙ ¨3õ´Õélimíë¿® :L™÷çä9ŒFcxXØá£G—¯\µyëUQöçPÅh4ù|^hhhtTÔW =ýÜóáaöÙ‘£G{ßÖO'æ6PÝ÷ôÅŒÌÎ €Å^z>‹–.=rä””àà¸Ø˜Såå×LŸ>nì†aróòRS‡Þ{÷]‹%%)922bñÒ¥cF’’b·Ûí6Ûm·Ü¤ªjPãÞ»ï²ÛlcÇŒ®®©á8ndvVÖðÌ¢ãFŽ˜2iâðŒtÌà=ûöM›299)‰Þ`ŸÑ7uòäàà`†e“ìvÔ»QÒ¨¡ÿbªSOS’’î¹ó–eA÷¸„œÝÃçt¼~„Óé4™Íܹù›w-ìïjù_Ý..—Éd:Ƕ.7.r zšs×O±Ùlú©ÿ6ZB!m‘÷Q{´}ÿÂÔ£ŸaUUQ—·,Ëú×F+·Z,ú»ÞŽò7à0,‹Û?"1í;4`Üfsï«™òETçžžó–`€KB‡Ý¼þSuÏŒB¬ß)îTXߘê¿CÕçm'?–eý½Yüïê´ÇµëæÞËÁòâ Án^z…ng–Ì-q^ÕõÚí}KoÀÅ ‘6KÉe0….5Ôªl2™‚QE‰Œˆ`¹6‹ wÑõ—#„ŽãR‡ ijnæX600P·´ƒô X4Mãy>2"¢¨êÙ¤¿¯âõÓgêÅžBoÑ› N5}¾LzÁu¦ž\rücJê\Fñúõ…ˆN1î´{à²ðò¹ˆê¶§=D×j7ñú·íØI  í Œ5UÕuOvŒñž½ûJËÊjëê¢"#5êuO>íƒß–QKk‡a˜í;w± c·ÛB{öî;YVVW_yøÈÌ0;vŠjóþÄc\ZV¶jÍŽåÂBCéD{Ͼ}ûs IIéÛxýç;Pgì)xp©!„466vIŒ±$Kõ ]âõ˲<÷ýhŸ‡Ú#êô>6Pgê)¨>½Œ_¼~BXŒ÷ìÝ—88㸯¾Yxçí·­ýaÕj9"ûóù *«ªn¿å›Íú튕.·ûî;n¯«oˆ7zôÚuëBUÕÕ‹–.óz½7þâçi©©ûöç,]¾"0ÀþÔã¯únÍî=û¢"#~÷?O9ŽçBûöçDEDŒ3zÝB‚`0›Ìû//þ#Àfdöƒvûgó<õøcWC÷3 óöÜ÷&MÏóê£É2}Œ ¨n{ðà}÷EEEöÕ/®@üâõkBhëöí#²³jëj·lߎÚ—“s²ôä7‹oÛ±ó¶›oŽŠŠzoÜÝ{÷¾5w®×ë]µö»â%+W¯é}ƒõ,º°ê¾§¿úeyyESSµqõõßWlý…ƒ!8(Èb6>räÈÑcûrrÜnOUuõ5Ó§)Š²à‹¯0fjjjBù…ƒIJÜÞý9N§+((èãÏæ-[±R}÷Ý}W^AÁêïÖ>r¤ªºúƒ?5";88Èëõªš¶s÷î;wYLæà  †asóó nu:U-)9¹wÿþÏ, 7v¬,Ë[·m/(,DÙmö'{tÂøñЬx}>‹ÅÜûãEÕùª۞~:~llŒÃჽFŸÏü'mè¬Ìá¡!!’$oݾ=)1qÂø«.Yþð¬ Áf³¥2oÁR‡ÍÊä,-+áûî=xèPSsÓƒ÷ߟ”8xP\ÜO7×ÖÕ7.:*rãæ-áá“&Nš2¤èðá»v¿j\Fzz#°¬¼!œž––œ”d49BydöCAG\lì’o¿=pðÐ=wÞ‘•™0hаÔÔ””äðððf^ßûZIú‚ª›žjäÉG¥¯1~.g÷ð鯿øÄ šNä\f g/ü_k8QR|ŽméuRwIêN£ªj_¹Æ_Âè 4M;vì˜(žÂ0ŒËí:|äp‡xý‰ƒÓcŒ±ªj#M# ÓyùEÛgYV/Œ0¦µë1èéWÝ«Ý?^¿^,!>¾íÚo§šÞ)н¾3@÷¥Ó‡ººÈê¶§}Õ®@:ÇëG§÷šRünîÑõ—Ægˆ×Ïœa×.j×ß¶ùë¬Qìõ;ýféÛ­°?PvóÐwt~ˆ×ß߯{ À€"w00¹(oiŒ0— ž>j«Û§å\[ð€îOqñ?¸õˆd½öØ—¶-j0?ý^A„eÚÂÌàïÖ~&Š"f0‚WýŒ±¢*-­-š¦a„Éyê½cl³ÚLF“Ëír{ÜT=Ï·ª>l‹Ö,‰’=ahá’WâìC’‡ˆ¢&iú;cUUkëk£#£Û¦³ l!Œ|>˲v»Ýd4Ñ@Â=BµEˆÁýO!Šª”ž,åt·K€~ ÍGØÔÜd0â4U»°-A„a˜ú†ú}öM4Õ(5¢ážÑþm«óO‚–ihlÈiÈe^4¶®ª¨^Ÿ÷ÂÒ:ÑWÆXS5DÇëé¹§í“¶! ý (0ÆhìÃÒ–zI#cZOÏ=mo·¥Ñ¤RàÜ À€ƒ}¡æ©ç Í ÈvÜ9Ow×ë¿ ôlÛ„MÕh¶(¢=ù G@OÃGwìwkV:‰!Ü~ÚuëþÙÛ¢^J¸ýÿÐ jCgvm"„¨X¥mô0¡JõQÓ4£Ñ(ð¼ÓåÒ§Õ„³Ù¬ªªîäbµZ}>Ÿ¢(!Ñ"#ÿJ8޳Ûín—KV„AŒ&“ÓéÔƒ²èBŒF#Bˆ #,ɲÝnG„¸=žN… !gi‹‚’Åívû º¦i&“‰âóù: =ÓþVè !„Á ~·MŸ5M£³c«ÕºaãÆ¼ü‚Ù³ á³!‹eɲoc¢£GŽÈE‘eÙOçÍŸQ$­þníá£G¦Ob6™h>DZR7Luj‹eÙÚºº¼ü‚)“'3fé·Ë|ù•Ùlæ8Îçóqg0……EGŽpgàyQ1Fƒ¡¶®î_¯Ïñù|„žã!², ‚ ÿÒ]:aÖÀ@ƒ¢j*;“ÉTXTd6›¸çîï×ýøôïÒªkj>üä3I– ¯™>½¨èðÛï¿Ïs|]}½Éd’eEÓõ¸].5M#š&ŠâÌëfTW×<”W]SÃó˜ѣTM[ûúŸ6mfYöÖ›~“>,í­w߯®©9QRrÃÌë[[[Ë+*·lÛæv{6lÜÔØÔôðƒ³ì6Ûo½sÇ­·ÄÄDI’LxQûâ.Ѓââ&M˜`6›cb¢ÿþÒ?vÝŒÕk¿/>q"6&æñGfFžç†Y¶båÁÜÜ»}ö¬V®þnËÖmÍÍMO<ú(DZ_~³PQÔk¦M0~œÏ'ÒmÑ…ûú;¸t„Òˆ¦©šªªtUvÛŽV‹eÈ”}9|>qÑÒe6›åå¿ÿ5=-ÍíqÏûâ‹ñcÇþùùgÃÃÃ|>¯¿ÜÓ bªªÒSI’,fË÷ÞóÚœ9+V¯žuï=<Ï-[±â¡î›>uòü/¾üvÅÊŠÊŠ—þö—iS&«ªrôØ1ÇsÕ˜1™¿}ò ·Û³wßþ'OÖÔÖ†‡‡ù|¢^9BHÓ´¶SUÕ4M”Äæ––êêê`‡Ãjµ-_µzçî=3gÌXûú›¶˜L&„pÑáà —,½zÚÔãÅÅ ¾üê7ÌœÿäcÆÅƼÿÑÇ6›mHJÒœ¹sN—_Ìú``ŒAÑ4¢!‚|>_^~Oô5·´644äæå755=Úl¶Øín—»¹¹9+s¸# Àl2kédñ7Ë0 ãöxÆŽ½/''::jpB¼ªjUÕÕŽÀÀÌáÃÃBC—¯\•—_”˜h·Ûm6›(ŠFƒ‘eY‚ˆÙl2×LŸ¶}çÎâ'&\5Îl2557ëkÈoišþà0»Õj2™Ö®û‘cYMÕÑÊÊ˧O›}äèÑ à ¦¦f„HyEeFzúðŒ ŒÇsñƒɲܨÔ¢ÈÊ/o¸AïuîÄ<|pPUÕfµnß¹ËíqÏyíU»Íöö»ï­X½zʤIóüÇëõîËÉI6,+3sÎÛïLž4ñØñã„MSýíï§-0I’ìr9].×c³BWUU×ÕÕegeææçÿã•566¦:}ꔼòªÝfÛ¾cÇðŒá’$q‡q»Ýn·{DVÖÒå+ò æÎy½ÕéÔµS[T¥ó ÞÿøI’ææÎºïÞ°ÐÜ‚|«Ålµ r8,Ëò•«xvü A¡„øAa¡!F£‘òêsfÝ{ÏUcÇTTVFFF¼À²¬ªªþ^¡ì¬Y³""":%ñè0 ãóùdY6MŠ¢ ŒeEÎ><,4TÅÁ V‹eìèQááµuuã¯7$%eôÈ‘,Ëy½¾i“''$ij «‚RT¥±©14$”j¥ªª‚ NH ¥M°,?vôh§Ó•œ”4sƵÁAAC’“**«†6rDVLtL\lLlLLBü “Éd·ÛÊË+X†ýÕÏo þšt¾ß©-MÓŒCTT¤À 7Ýø«´¡ClV[B|ü‘cÇY–ŒŒHœ@œ0yâ„ãÅ'|¢šœœ„‰ŠŒ=r¤$I§ÊËC‚ƒ#ÂÃu MÓ*«*ñÖ­[333%Ié _£Çðq»ÝAŽ Y–©=Ë0ncÌqœÉhtº\V‹…MU=^¯,Ëv»eUUݪª!–e%I*>Yœ:$US5½rƒÁàñxè)Ã0f“Éíñ0 c³ÙTUu¹\taÙl2©šæóùpÛêÂ{½^A^|ù•ëgÌ?n¬Ûíf†Òm[,ËÚlVê†ïöxDQDÑš5Msº\!»ÍæñxTM³Ùl¨½˜Éh4™ÍN§SQ»ÝƱœ(IþϬ¨Êþœý`ð` Ð>}mwìÔ0ÆTõ¨ÈJ’Dcd6·´Ð’t{mcc£ÿ)ÝïÚ¶-@ÕôRúíôTQÕæ–†aUU­¯¯×ow»ÝN— wÜUK1 UÕÕV‹5uHŠ×Û¶ž|¦¶dY®««Gí[yé®]½fzZ[_Ï0 F¨¶®ë­{YrüD±A0°,+ð‚®ò<Ï ‚p0÷Pkk« ‚ pDZœÛãqºœFƒÊ4½Þ]s§_!‚ 9vtÛ®¹y»÷înni¦¯ƒ ÐèžÇQA§ ÆA`†¦â¢ ÅdEnlj4 ]úÒÐ=Øÿ&þ¢×4M%„ˆ’ØÜÜ\US%JÍŠUW__r²Äãõb†inn.)=ÙÐØ@9rìHAQQ]CÆXV”ÒSeçŸYQ•„AñÓ&O 9V|\ÇSRVêö¸†ijn¦?#ZZ[Eñú|%¥¥n·›ã8×ÓÔÜT[W[r²ôP~Ý+ ïN ï~€néh%Çé6‚xž/=Uv(?·²ºjïþ}’$••Ÿ*:zØíñH’Ä2LM]­Ëå*:r¸´¬TE—ÛU[W§ªj^A~«ÓyôøñÚº:–eϲ€1ÓÜÒRU]ér¹ì.—+¿¨Àívçz}¾ã'ŠË++0Ƈòs ¹<îü¢QËËË÷QŒŒˆŠ ÌÌÈlljlhlxÞívWÕTu ÛÐÙ òx<ór%YNOVvªÌívó<ßØÔØÔÔ˜7¨®¾¾ª¦ÚnµùD±¹¥YàùƦ¦úÆŽã"ÂÂGïtŒÊ!‚ÿ;ì [üu˜b -­-nÛ'úŒF#ˆÁ BDUžç1Ftʯjª$Ëû`YÖj±hš¦©ŠOôÉ’cÌsœÍbÍH–?Ø?drW‡!UÓÅÅMºj‚$‰Í­-¼Àó¼0*{„Ãäp84M+,*ŠŽŠfF„À€€‘YÙá¡a’,cŒ5MQ5U’D×Ûá·F–yº§]Œ1Ʋ,‡‡…‡…„í;³{ÿ^“É­ªjEeÅö]ÛEIJL7èxqqÎÁŠ¢ÑÆxëÖ­™™™’$AÐf²ò²äÄDý”zÙ‹¢HÝožÏ/,e11~°Ñh¤î7¢$ɲl/Áåv™Œ&–eY†•YÓ4A0Æn·› d4èJ/!Ä`0äæç#D†§gˆíôî Æ’,s‡vy\,˃¿g'u1r{Ü,ÃR‚ƒ1Í/+ŠÀó´0Çr­.ç–­[Á¯ :M† !Š¢ÐˆÇš¦„dEfY.Èá BˆÀóA Çã@{ F4BˆF4êÍI?²X,´’NÍÒ¡I=­¼FÏó4ʲÍjó¿×£€ÿGºw?ÆØ(4¢·Õ6íéè–Άӻ´0V%:*!$Š’ÿ–.«ºª¿ì½›Ð@m›¼ÚÚ®ù¹é·Ÿ%¬Ð™>òÓýÓ5‚ôt†J$>s7UU¨}gïEµuÚhƒü÷÷P§#~€®03 ãõzm6›¦iÝ.„R%幋RQ‚ÆØ'ŠaÌ Ÿ(RGÌK¾ôÚö2CÈãñ ‚ÒÐ ¡Á¡Õ55µuu=Ý͆0:YZÊq\OMü1VÅb±9‚@ú:C1ÑQ1½²_ê`1[z´EBˆÉdª¬¨éè†6W™^ñz÷—ûm‘¢ª*!¤àŒôÜ¢kß¶»y®8@ú®8ÎhðÑí\=— XÏ#sikÖÑ·Et­\ßhw.ýÒÓß $Î(ýV«•eI’EQ<ËýTIÏW¾iÌ ƒÁ ©ª×çÓÚ“ÐwÕYMÓηr“ÑÈs˜hZ§u„ŽãLF£(I’$Ÿ]ÕiÈŽÞYßèMº‘~šxÛöMMÉI‰q±±!z$ =®-Éqœ .—‹ú¢Òëþé+ér5}=èá& ‚PròdAaQhhHê!ƒÁl6û|>Z¿^9Ã0‹ÅårјôÝ ª*Ío ·E†!±,s¼¸¸®¾^Ó4ƒ`:$EO†@Ÿ¶¥µuמ½ñqqaa¡²,ӬǚFÑ+!!,ÃH’$˲Ùlöä·yOï@ÿ‚5kVDD„¾`ƒÁðþ‡ïܽÇãñ>†aƒ(I ÃØm6³Ù,ð¼ V›•?"„˜Íæ}99o¿÷>Çñ»÷î‰IJ¼ú»ïâbc4M 4cI’~ÜðSæð Œ‘A0`†Ñ4Íf³)ŠÂq\`@€ÑhEÑb6 Q1F&“éÙ?¿pàà¡†ÆÆòÊʬÌá¡!!F£Ñd4j„B^ù÷ëuuu¡!Áƒ ²ÛlÏ‹¢h2-f‹Åb‘eÙd2Ù­V‹Å|àà¡-Ûw\5n¬Éh4[,ÇÑø¦v»Ùb1 ´;}ý œ,ËÖÔÔtM ŒUUݹ{Ï£³šyÝ —Ë%Šâ÷ëÖ ÏÈ ݽgoppPhHèò•_û|¾™×_·hÉÒ[¶644̸æjBÈ׋[Ìæf^ïöx~Ú´¹ºº:(Èáp8róò¯™>-ið`¯Ïg4ʵY­Ï?óQEÙ¶cÇ;ïpàPîÍ¿¾Ñl6¾à?¡_ýü†Ý{÷½ûÁ‡§ÊËþ³™••¡!¡Q‘?®ß0zÔÈ–ÖÖ 7YÌæ_Üð³í»vɲ¿ ²ªú¯/¾ät¹W¥¤ääÑcÇž'„`K’ôï9oÍzäÑ·Þ}ÏåvÍy{.Ïq‡rsÿóÕWAAžçŒã‘£G_}}!dÙŠ«Ö¬Ý½gÏü/¾2† 7}½pQpPÃ0ÇŽoÚ²uëö‹—-‹Œˆx÷Ã**+—._±s×î ‡ã£O?«®©¡‘TûúK8?:K?Ã`ŸÏ÷›õþ;o1âïÿ|ùPnÞm7ßœ›Ÿ¿kÏÞà ì¬ÌQ#Fˆ¢ÔÜÒ<(.ndvVRbâ¬ûïkjnÎË/hq¶644––Òˆ68!á®;î™=òЃ6nTõÚ«§ßyûmû¸ù׿~ðû'OšÈ0Øb1 7_Q•éS§äʲÜÜܼk÷žqcÆ(ŠRVVV•8¸¶¶Î'Š3®¾:-5õÙ?ýÙÔÒÒ:";Ëëó!„}>Ÿªª ƒUE%Ñåö8[[]n·ªj^¯×ét577Š‹[±zuIÉÉÍ[·ÅÅÆbŒ[Z[B¡!!Ûvì––j0TUõz}¢$¹=DˆÛã1™ÍV«uíë CKKË%wKè:/óÒ,”Ë–¯\÷ãú]{öÜ0óú«§Mãy¾©©qæÍüýo1Æ /Y·~}Tdäu×^“88áXqñž}û¦O¹nýúüÂB›ÍUZZ6iâ„“¥¥¡!!ñƒâŽ?>nìžãX–Í9xpá’¥[¶n3™Œ=ò°Õbå8nÍÚ¢'ìËÉ©ª® ½fú4Q’~øqýðŒa±1±ËW­>|ôh``@vfæW íÙ»?mèÐùóï~XWZV6qÂx¯ÇÃó|~aá¾}9;÷ì9rìØä¤†ÆÆ«ÆmhhPd%-uhiYéè‘#““’ZZZ–¯\1~ìáÙÕ55f³9=-->.n÷Þ½k¾ÿçø`QC‚ƒÍ&SFFz^AAÚС'Œ_¾bÕ¾œœÊªª«§M  Ò‡àò‡.óvŸ›×l6ù¼>†eyžw»Ýv»}ÅÊU‡òóÿüÜ3.—›ç8·Çc6›†Q…NeY6 ª¢J²Äó<ÍB)Š"µ†Ób’$Ñ}ƒc$Š’Ùl¦+½ƒºôð<ïõzY†1™LzèjI’hm!z BÈãõÚm6EQX–Åë - ƒîú©iÏó¢(²,˲Œ,+z=&“I‘eŽç$Q C[ç8Žv™ã8ê÷IJ%I2 ²,3 k·Û+**~ÿ̳ûóŸ¢£¢ ­1ýšXøÐ¡CÝ|\.Ã`U‘©®‰¢¸nÆ›n¼!L‘Åh4*Š‚Â{<êqïõz©ó;ÍþîõúK’D‹y½^j!¡Ò—ËEïÕ¯P™F¹=†a¼^ÆÈ_ÙÝn7­Çd4Ò‹ÔÑ^×_ŸÏ§wcìõùŒEQ”áv»1Æ¢,c„P{ Š¢PÏQúºò¯ÇãñšL¦}ûs¶lÛVS[—™‘ º@¤{é§¼0˜iÓô{ï¾+%)Éãñè)äuÉÓMÞúý¨­’.꽍_éô­¤Û[ôgè$¾NÜýc´½‡:vÜ?Çq§zX–U%!!žþ IOKSý”ÿ´™?‘•EÍ5}ýÀ}‰¦iÆ_Eñx<}ý8‡ºd‘ïݪÓ×ÜÇȲ¬›°`4è_èjÏ1 #ê­d4@_A—y†árrr À•Ã0 ÿ'ÙxUî–Û%tEXtdate:create2013-09-27T11:10:28-04:00a݃%tEXtdate:modify2013-09-27T11:10:08-04:00.bBtEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/file_equiv.txt000066400000000000000000000022351330160122500236630ustar00rootroot00000000000000SELinux can either setup labeling directory using the Application/files screen, or you can setup file equivalence. File Equivalence allows an administrator to label entire directory trees as the same way as the Equivalence directory tree. Use Case 1: An administrator want to store his Apache root content in a location other then /var/www like /srv/www. He could define an equivalence between /srv/www and /var/www. libselinux reads the equivalence rules and does the substitution when ever the matchpathcon function is called. Tools like restorecon/rpm/udev and others will all follow the substitution. Using the example above when matchpathcon is handed /srv/www/cgi-bin/myscript.cgi, it substitutes /var/www for /svr/www and looks up the context of /var/www/cgi-bin/myscript.cgi. In the command line you could execute. # semanage fcontext -a -e /var/www /srv/www Another common case where you might want to use file equivalence, is if you put your users home directories in a location other then /home. If you setup an equivalence between /home and /export/home # matchpathcon /export/home/dwalsh/.ssh /export/home/dwalsh/.ssh unconfined_u:object_r:home_ssh_t:s0 selinux-python-2.8/sepolicy/sepolicy/help/files_apps.png000066400000000000000000002400721330160122500236300ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýgG–¨‰~"µÎÊÒUÐZƒšµ&›ìi9=²gæÊÝ»ïÙÚ[³÷Ì®½»övÍv¯Ø¹sG‹îéfë!ÙÍn6µ@BkUUJ«Ô*Ôû™‰¬BAQ â3«ª¬Hw—ÇŸ#¾ÿýï»#‘È׉Äÿàr¹VX–åÂÁÁÁÁÁÁáK¢\.—OLLü'Ó4¤$‰oöõõýommmMn·ûF§ÏÁÁÁÁÁÁá³ÅU,× þ'Ož”ž}û,_¾|•¢(X–u£çààààààð#„ X,rðàÁ °TQLÓ¼Ñérppppppø°, ·ÛËåZ¦˜¦©š¦é¬ö¾ä˜¦©*–eQýqppppppør#Πïàààààð%§:Ö+ÕÎàïàðÉBÔ>WÛQýµêu!Ä%íl¾kŸE:êÓ2_8;=×ÿüêsêï›ïšƒƒÃÍEµí+€#êwpø!Ð4L.išx$IâØ©3lÛ³—¯<þ]m­K%Ün•B¡ˆßçåO¿ýuܪŠÛíFA*EÓ4{ð3Mšl\³Ë‚þs0-“²¦Ñ£ª c“S´55‘Éå(‹µg·46r~ä^›ÆxI’0 “t6Ës>DW[+?xù—¼¿s7=파M/hN4`š&™lMÓXØÝEKcds9†Ç&p© †iÒÙÚ‚‚sÃ#DÃ!¢¡–%È LLÏðÖ¶ôuwòζ874BcCÃ4c&•ÆïóÑÜØÀäô š¦S*—‰†C4Ä¢ŒNL’¬„imjãc”Êe$I"áv¹¸02Š"Û™L.ÇÁcÇ1 “†X”e‹úPdùFW‡/!£“SüòÍw¸kÃZ@ðþÎÝ<ýð´65^qL·,Ëø> –i’ˆÅhjˆsàè1,ÓdíŠe!¤3YÞ|’,±bñB–-ì«.TkímàüïîØI{K3ûÒO‘e‰b©D[s3›×¬äå7Þæß|ç›ì:pˆ³ƒçY½l ï}´‹;Ö¯eÛž½<÷ȃ4Æã•øì8÷>ÊÙsç)–Jt´¶ðþG»yoçnYÆëñðØ÷ $eÁÁcÇ™˜š¡§£¾ü+Æ&¦ø}Ä"aNöð‡_{·ªòw?úß|ö)¢á0–eaš&KúzÈæóüøW¿aðÂ+—.F†iðÎŽ œ"“Ëñà]wpøä)Æ'§QE–ù£¯¿È{ífàüÒÙ?p¥r™w¶ïÂëq393ÃW{„ñ©)? À½›6ÐÝÑÆK¯¼FKc#]í­ôvu x½Ÿx‹ÄÁáVŲ,–-ìelr’_üæMž|è~V,^tEQU§¶Çïààpí–EW{+ÿî~—ÇN°÷ж¼?þÆWØbkŸÏ‹,˸].ª³¨ˆÔí ·‰nµÏÞ}A¿ŸŸüò7ŒOMƒu±¡š–ÅÆÕ+97<Ì÷ñ Ï<¼•5Ë—rQ9·’0!ƒ|íé'hknâ¯þùGܱn [Ö­æÏÿñìÞ¨&z7MÃ49vê,ç‡Gù³oæÆ4Mã/¾÷ŽÃçõééìÀ0 {ûÁ²hjh`qo?ø—_òØý÷ I‚óã`Y,èìDÓ =Æc'°,“ÕKsdžµüå÷_âÜÐ0½]hºÎäÑã|¸ëctÃàžMëY·r9ýƒsad”½‡ÒÑÚB>_`Ûž½46Ä |ëù§èjkETÒâàp;" ¦cCå³àÚÆsgÅïàð „`àÂ'ÏöÓÚÔD_w'o}¸ƒt&‹eYø}>6¬ZKUñxܘ¦½O=pa·Ë…$ ò…"ÔÚŸÀ¥ªø¼^$IBQ ¥gÎgrzË2)•m¥A¯ÛM*¡P,âõxf)ç>vÿ=¬_± Ã4He²¸Ý.¦ff£\Öø}ºÁØÄdMÑNŸÉÈø8†i ¹{ãz~ñ›7p»]l½s n—j¯$ªz¦ÉëÖДˆÓÙÚÊ›lì}ÇWÞx‹4D£èºŽ$I¨ª‚ÏãÁírqnh„ƒÇOÐÓÑAC,Ša¨ªÊL*ÍÄäeMCQTE`AW±H¸¦ƒ È¶äÀ¨è88ÜnHBpèøI>Üõ1O=t?îú˜H(ÈÚeK¯8!ž¥ÕïààpíXfRiÞݱ‹t6‡×ãá¡{îdAgS3IÊe¿y駘¦IogßxöI¢áomûˆwwìÂçõ°vù2¢‘0Š, q©*²,élmaå’Eüö½q»Ý4ÆcÆëV×åâ‘’”5ÍÖÖ÷zyâûøÍ{pæ×o°¸·‡­wn!—/°ÿèqÂÁ¡@€Å º¹cý~óî¸TÝsK.à×ïºÉåò,é[P›\˜–EÐïCU]ªZ›8X–Å»;ö³ïÈ1LÓdÅâ…tµ·aU¤ !¿«Z†.×U;7‡Û˲¨Wã3 ãšï«‰ú?K b· óµËþâšÂÎ÷Ýl…=ëªá¯ÿÜëW '„Àãqóì£ÑÕÞÊ\'^W{öµäsn˜ÍkWÓÓÙŽKuÑÚ”¨HCÌ+>ÇÁÁá“á8éqpp˜…eYt´4ÓÕvé ÿy ø‰5ËcNäàðÙs‰§¡988Ôs­¢ÃÏ‚¹bK‡ÏÇV¿ƒƒƒƒƒÃmBÍ€,ËÎþ¾ƒƒƒƒƒÃm@mÅïàp3q+NB¿Èã°·bù888Ü<(SÓSœ<}²Î3—ƒÃÁ0 b‘²,“/äotr®ˆ……$$ü>?~ŸŸéä4étÓúüvª=n‰†A*“B×õOéçˆËå" S.—Éd3†qKÚ ©ס`è–̃ƒC=J6—¥7ØK$qV7 !Éd’áÑa-\DSc5_´7#Â^yOMO1xaéééÚàÆç1.X ª*™l†x,NKs ªªÞÔåS(ÆëõÒÞÖŽ,Ë7oz¯’˲˜šš"›Ë †œ¾Òá–F\.^·÷s]­88\ IHä]yJ¥¡@E¹ùw¡„ø}~ŽM£X,ÚÖø>Çt[–ÅÌÌ ‘p¿ÏE/\7¡`ˆÓgN †ðz¼7}z¯Dõ]OÏL †ntr>µ^ʺ%§â_ªõ¯þxé;ª’$ ,;Í’$!¬/F\³›“¤õ&D-óæOïUóâô‘7 ¦i¢:–i[øTd庶ëoþe•ÃmEõ„É­0H˜¦‰U±»/ÉÒ"Æ®¹é5MLÓ¼i÷›«Ö@keeÝÚFy£B7 ¹\–\>c{§4mß’$„ø×‡3ð;ÜtÜ*u’"„@–äOá5Poòöf—ŠTßaõ}Þ ïôr8Gžn2Ù4…bEuáUÅ…e”J%RiÛ}w0põ­¨+üBÛæuÎv«"‡êŠäzLu¥à4´Û“¹ƒšÂV «`Æ5× ©âÎøIH~Ùö¬gaÕþÖ§Q .*ýYµ‹×…@`˜¶5½¹©,I DÍÚž$I†ñù¶²$ÕÌìΓàZëEý’$]"–ü,&óy'û¬ú’ê»þ\7®ÃÐÉç³ÈŠ‚e–ˆF¸Ý~ £D&3X¤3)|^ÿ¬þr>.;ð !Hg2ìܵ›åË–ÒÚÒrMGÁñ“'‘%™¶¶VÆÆÆhkm½ªÒSu’ IÉTŠL&K[kËM+Êt¸:U·¯õúµ¸Ž¬_ñ !˜œšâÃmÛÑ ƒ€ßÏÚ5«I44\ÓóÏ 119ÉÊåË?ó#«&ö„X`×ÛúÝåv‘ˆ'ja3Ù š¦àñx( KÅë¦eÖô ªmFÁÇûö“Í娲i#Š¢008ÈÔô4«W®¼¤ Y–…iYµIѧáã}ûˆÅbt´·_ò !„= ²¬š¨_Áé3gØ»?m-ìcŲeŸ8=º®sah˜¦Æn·»V.ccã  1‘øDñÖʻ܅3ò;Ü ÃD7L°fhŠ—ðª †.£Jaï º"›31Lãªÿe{B!Gã/ÿæoyÿÃ/Þ I5?ÀÕÆU»Vù»wß~>L.—ãà¡Ã”5­Öá×S¿GùÆ[osäè1Efbb’ã'N\Tšªë ê“úkõn&&&9á¬kç/\`rjêŠ÷UWÕÁxx„·ß}¿ÏÇ…¡!~úó_P(.Q¬J¦ª?8s¶Ÿ÷?ø]7f‰œë?ëº~q2R¹^½V¶þžúx ɲ,#Ë2’,áóú‚ 188H2™DAC¼Ûƒ,ÙáE©Ý[ýQäK¯É²\S2«O–Ň۷óŸþïÿ›ý"I'NžâÝ÷?¨IGê¥$““üäg?'›Ë]RvÕò¿\™Ö‡³,‹wÞû€ã'NÖÚd}¹Ô·÷úëBØ'‰Ž=ÊÎÝ{p¹T[bÁlÅÅëy/år™ƒ‡111ÉÏ_~…¡á„œ ``Þºr½ïÚ9õäp#‘$e™IEÓ²èå1ÜJÌiL³ŒÜ¶4M\}sÙe¸®ë<|˜{ï¹›³ý¤ÒiLÃà·o½M©XDVÚú…Bm;>¢\*FyèÁ­È•ÁºŠV.óöîÝ;~‚ö¶6î¹ëNÞ|ç]FFGiomeAO/ÿò—„‚A&§¦hii —ϳ㣠ÓÞÖÆwláƒmÛ#ɰxáBî¿ï^öï?ÀÁÇ ‡B<òЃŽM‚›!;víäW¿~ý'ßeõª•8xˆ¿øë¿æ¹§Ÿâ±G¹ª{Øš»h,‚Á d2Æ*GçúÙ±ó#4McýÚu,Y¼ˆ£Ç޳ïÀTUåž»î²Ó"I€Å±ã'ضcªª²õ¾ûˆÇcüò׿fttŒ––î¿çÞ~ï=òù<éL†-›6±rÅr>ܶþÚÛÚØzÿý¸+~ïk{üØ{üõ“[I’Ðu—Û…¢(¶Fxe¥n´PU•X,†Kq¡ÓÓÓ¸T‘H,Èä2d³Y;•­]×ÁºT4îv»é[ÐËëo¼Iwg'’dOÄ Ã`÷Çsàà!»}>p?ï¼÷>¯üòWŒq÷]w28xŽ­÷ßG*æíwßã…çžcl|œ“§OqÇæÍìܵûbܲ™·ï`br¯×K±X@H‚ýÒß?À#=ˆÛížõîêµúMÓ¤£½žînLÃdjzšgŸzŠÑ±1¾÷ƒb=ÝÝŒŽ166NKKóÕßK{wnÙÀî?æåWɱãÇyò±Ç쎉‰ÉIÞÿp©TŠ%‹³bù2~ýúo¯ò®ï›§Oq¸(ŠŠÛíAÓÊÌd:9CŸgxx„ŸþâAº:;ù—W^eמyù—¿¤««¿ÏÇO~ös2™ H¦Rüüå— ‡Ã ^}í5,ËbAOkV¯æã½{ùxß>öz”ñ›ß¾Á©Ó§Ù¹k¹lŽ·mçÄ©S¬]½š#GòîpèðJ¥2Ë–.A–öíÛÏëo¼É‚žE™óîìí üxÍ0 4M»(qÑ4R©ïÛGG{;ííôöô°fõªkz/]”ËeöîßO0¤©©‘5«VÑÞÖÆ™³ýœ8y’—_ý%Ùl–åË–ñÖ;ï°oÿö¸Ê»¶f¿k[ƒÚÁáÆ†mé2šÕÆÐD’ÙIY“)• ákÚŽºìÀäØqÎ_âµß¼ÎèØ({÷ïÇ0 "á0kV­âÁîgtlŒL6Gss›6l`ËæMœí \ÖjÛ’$108H{{;kV­¢wAº®sòä)Ž=F.—C’$â±]tvv"˦e100ÈÊ+زiK—.áìÀŠ"Ó×»€¥‹áv»q©.ž|ì1FFÆØ±sùBáF¿ì•mc"Á¿ù³?¥«³“üÞ÷éêìäßüÙŸ’H4\qõ4wP3 “ÎŽ¾ó­oòþý¿ËâÝ÷ß'ŸÏsǦlÙ´ I–Ø»o^‡Í7°eÓF’©$Éd!333ŒŒŒrîÜ92Ù,—|>ÏÉS§8zì¹|žt:ß룯·—…½ 0 “x<ƃÜÏ¡#G8pèåRiö€kV”û”KEõéTšþ~( 5)XU§**ªªÒÐÐ@:¦T*qîü9RéË–.#‘H\"ê’¨‰úçü’$ñèÃsahˆ=ïE#£cLLNpêÌÛúŸ¢’hh ³¨¯—DCË–.e÷ž½œíïçž»îbÇÎ]œ»p¥K–008Èò¥Kذ~‹-¢¿Y‘Y²xK-B’$>‚ßï§wAÏ%éªÖ…KÄæѹ=)°ÿE£¬Yµ’H$ÌÉÓ×ñ^¢\.# ‰xm; Q(Èf³¤Ò)&&&(•J$èºN±X$#Kò¬x«Fƒæ–nèºN<ã¡­pèðò…ÍM´47³xáBÚú+W,G‘4McÛŽ˜˜˜`ù²¥?y’|¡À£?ÈþƒÀ‚žî.z,`߃¼õÎ;9zŒ%‹a™º®ÛÛ{äaòù<¿}ëm4MÚ3ðÏ—^Ó41 ûDz.êZè†Áù ®ó½ìef&‰aªª²k÷ÏÃ0 <í¼¿m;o¾ý“ôõö¢ëúu¿k‡IUa¶\.ÓÔØŒa$S3œ;?h+Ÿ^ãØ'¿øÕÿckk+^¯·q¹\¦P,°eÓF‰‰Æ–e¡**ïÝG¡X$àóñøc’J¥Ù±s¥R‰öÖV¶>p?‘p„ÑÑQb±­--lÚ°Ç˱ã'0M“eKcY††éìè`ù²¥,ê[ÈäÔ4^¯—¦¦&‚ wlÙŒ‚¡¡!V®XÁæ°,hok#²e´µµrüÄIY³jë×­µm˜;ÜX–…Ï륻« ÇsÙÎÓ^™˜ž™¦±¡qÖý¦e’ËåÉd²˜–Å=wÝÉ’E‹èêèdt|œr©ÌÖû·—–æ&.\ÂëñðÐÖhL$˜I&ñülZ¿žþÁAFFG‰„Ãôtw¡ë††éhogÑ¢…D#:Û;p»Ü¸Ýnâ±fzf†;7o¦¯wÁ¬Æ¥:3©¼^/’,!${¿¿\.355…ËåB’íãkéLš\.G*•"ŸÏ“/äI§Òøý~UAQJ¥²,“Ë瘚šÂëõ"$¨ìÙ—Ëe\.`ÖÊ0 šš‰E£Äc1â•¶·tébÑ(§NŸfzf†ÆDÍÍMø|~&§¦hmn!‹âõxX¾l)ÝxÜV­\ASS#m­-€`xd„åË–±níÐÖÒB(Â0töö²rùr{O¾¹UUkûâÉTǃÇ}é»·2EijjÂ4M\ª‹ÎŽvBápMKÿZÞË[ì÷" ‰ zhmma|b’x,J8¢1‘`Ãúõd2û=Þ±™…}½tv\Ç»ÖuLÓÄïóßèfåp›R=m72<Ì‚ž^ Cgff†©É)Z[Úðû\É’˜‚ÉÉIÄK?zÉÚ°a±hlVÔeyÖ,WUUNŸ9Ã÷~ðCþíŸý)ñ¸-F{ÿÃùxï>þ컌Çã™u «ú×4ÍYŠOõÊ2õÏ©~ž{_5¬aó†¯~ÿIl8Ü!˜ž™æôÙÓ,[¼ì’諸õ+°úóýÕkõgÄ«gÚë;o!lE¿j<Õ°ÕºSüP–$Œºº+êÎÉWã-—Ë œ ‰]<.(@×ìU»ßï·Ÿ_qZSÝËår„B!4M#ŸÏ#+2Á@MÓjÛ_Á`Õ¥Î:÷ŸJ§ðy}´4¶ÔÎôƒÝ^ëA*ŠŒeQ“žÕŸg7M³¢‡ j§YƬ|§(ʬ»­[ 0ëÚ`}s’Í›î`jjœþ~ÆÆÆ¸có]$MXWØ’BpüøñËkõ×Wz°g»²,Df ¸‡Peõ=·¡])¾ê÷õ®Eçs3:÷¾úÿ«Ÿ«qÍ ëpkR=«^ÏåÞíÜë×kæJá«q_îÙBLëâ@S‚Çã©iðÁÚ½€mZÓëõ…ka<ÁàÅpsÑTêT·C.—rùòß;îÿr¹|Ű—{îÜrš;Ù¸R5n·›@ pSKYn/>i]T<“S“̤f¾âóRÑ„O4$hˆ7Ì«œu3RµÒçóú>WåR IH5]š[a’${û#`‡Ã·|ÿ"ËòM/eqp¸”¦D‹-úÜ¥ÓP®…z¼À-#R­9â IsíÔÀ-¢L[;¬ÜïóZòâàp«£@Å×ôç0òŠÒ™4†n8~¬®ˆÇí! ×öÉoÅNö‹Ló­V>·Zz¾Ì|nˆr¹Ìøø¸³âw¸&’Å$š¦ÑÔØt£“âàààð¥æsø…”J%E¡¥¹Å9îçpUJ¥#c#³¬é98888|ö|n+~˲p»Ý—µÏ.IªXöÂâ?íãð)¹Þs¨ŸŒÏOCH0ËFø¬¯d :ç'ŠäKaŸB{‹×%álÞž!œm!‡/€Ï]5x¾ÎüÄù4¯4ÆÌdIè$Ä>î]§9æ½Ñeâp¨º›(‹LÏLUlÆ[Øò!û¯Ëå"Ûv𯗣Læààà0?µß²,4M³½UU6mXÏøÄ$K/毼B2•¢³½§Ÿ|ŸÏW»·þ~Ó4yùÕ_ÒÑÞÎæMky8vâï¼û™lŸ×Ë=wßŪ+j“ƒjÚ³¹?úÉOyâÑGimm¹Äu¶3Évp¸½PàâÊ!ŸÏ󵯾HkK .ÕE*BU]LÏÌàõzŸàïþñŸ¸ÿ¾{Y³z¿ŸÉÉI2Ù,‰D¿ÏG2™¤¬i¤ÓiâñÕøtÃäÄé1´l–Mµ³aý ‚Á0kWIìØy’sC3œ ðàÆ.œ…ÉíEUÔoZ&º®cYóï CÇ4gÖ–eñö{ïÑØØÈÓO>ÁÌL’P0ÈÙþÏÈè(ÇOždxx!mDUUvîÞÍ™³ý<öÈCaëÂ$S)¦¦¦‰F#DÂa&&'ŸàÔéÓ¶õ;liÁÐð0ßûçpç[X¹|9§Ïœå/ý˜àhhh ŸÏ“ÍåhlH€€á‘Q Å"SÓÓü~TU%•J£ª ^¯³½æàp;Q[ñ !(‹ìùx/‘H„åK—Ëå9tø0n·I’8~ê$ÇNž¤¬•ñzm¿á¿zí7(ŠL à…çŸãŸ_úS3345&øêWžG’¤Ú C’¦QÂ4-T—ǃ (2ªâ%Ÿ×± Í6($œ%ÿí„Dm+_ÓôËšìB i:sMM !XÐÝÍG»v³çãÙ°n]¥~ Î_¸À;ï¾ÇøÄ/<÷±X”_¼ü*Tyß=wóæ;ïòµ_`br’¿û‡âÿó¿ü¿8uú4'Nâ;ßúfm‹«­µ•`0À;ï½OG{;†a°bù2 ÃàÍ·ßáà¡Ã  «£ƒ‡ÜÊÏ_~…d2I2•Æëõ066ÎC‡Èf³LMO³mÇN$IÐÖÚ¯_˲½î}ý«/’L¥ùùË/ðû8wŽM7Ôò{üÄI¼^/=ð>Ÿö¶6ŽŸ<ÉÞ}ûŸ˜`&™DUTT—Ê7~ç«È²„aèüø§?cÍêU¬[³†üèÇÜuÇV¯ZyË;Ñqpp¸vfmJ !p»Ýx½^E¥¬•ÉårTüj²fÕ*õõñվšU«xÿƒIgÒ444ðñÞ} Œ ë:›7làùgž®í)VEfy_œ¢©±ïPc'F˜šN³ïàNõ›ô<„$fÝçüÜ?\;ëºVs5÷G×ut]»äô‡eY<üàV^xîΜà?ÿù_pðða° §‡?ü½ï°xÑ"Ž8ÁÛï¾G{[+úÇD¢¡ý‹FÙ»o?ÇŽŸÀ0 >ÄÁ#GèëíÅårÕž#Ëm}€3gÏòÚë¯óðƒ[ ƒŒóÑ®]<óÔ“|ç[ß䨉üú·o0>1ÁýþïñÔãáv¹(—KX¦ÉšU«X¹|O?ù8†a²gï>úhnnâL?‡ŽeûG±tñbþäþ•Ë—ÏÉ—ËåڄܪØ>ðy½K%ʚƖ͛øö7¿ÎÔÔ©T x<öõ²wÿÏ#IÓÑÑîˆún3f)÷…‚A¶ÞííXÀøÄ8{Ÿµ¬Ù+qI5ÿÚº®ãõzI44ðÜ3O“hhÁ`ŸÏ‡iš5â’/çΧ©©—ËÅøø8ñxœP0Èèè“SS„Ã!Zš›I¦Rø}> Ó>~ÔÖÚvÉŠBA¡Tft"E±¤ô{0Ë9þáïþ†÷Þ}“ööNþæïÿé–ñ@æðé1M“3gÏ‹Æ8yê¥rY–g9Ø“—êaé’e³ŽÀY–Åôô4〠¹©‰X,J.Ÿ'›Í’hh •NcYÑH„ÉŠ<‹F±,‹‰‰IÜn¡Pˆ±ñq¼/áp¨ö Ý0˜œ˜$¿ØF,Ëbbr’` €¢ªŒŽŽb&-ÍMx<Ré4††P•p(„Ïg‹ãÝn7¥R‰` @2•¢!'™J1::†Ç㦭­ ·ËÅðÈÉdŸÏO¢!N ˜•çñ‰ 2™ ~¿ŸÆD#²,119‰ÏçÃãv3QiÓSÓÓ¤R)úz{Ù¶cnßÁÿãø÷—µ¬éààðåCÁñãÇ/ü–eÍRÄ«ªÿ<÷ˆSõž*¦i" BJ§$iÞ¿Jí,´A2™ä£v …ؼy‹³â¿0M“ÓgN“H$0tƒáá!rùÜ%á|>?­-­³öÝ«Ì>::ûx©iš³¾›{œ˜e£ârö*æ¶‘ùî›ïùU.·}QMßÜô×·¯Ë¥§¾ ÁÞR³*á«é­Æ­ë:ûÿDwW>ü°£ÔçàpQøg-©çvõÌå>ϽǴ¬šÉ•«™a­ïÃ,Ó$óøãO̯×›ª¨ TU¥§gÁ¼uDz¬ËÖùÆúksëðܰõñ^îó]¿Ò}×bìª>}WJÓ5§gžöY»¬i´µµT¶*œ•¾ƒÃíÈç*K¿ûës‰8«ýÛ‹¹uÅ™ø}>¸].{øáš”ÂÁÁáöãsøeY®b±œAÜ᪔ËåY'@>gHŸËÀoY·‡L&Ãà¹Á«Ú!wp(—Ëøý~gPrpppøœùÜVü’$‡1 Ã):\¯Çkkñ;uÅÁÁÁásås?/çÉs¸&,ÇYŒƒƒƒÃÁç>*;¹ƒƒƒƒƒÃ̓³w¸n8Þ¿@ì3ù7:_œßáº)S9“|Ù9r÷y# AÄ+õIŸ>2®aàw´¬/ÏívTQ(i??çÀ¨EVs£Ï 4û ~g‡… ÕYù;88|j®8ð†A.Ÿ£T*ÝètÞt¸Ýn¼/…bá¶)I¦Ë*'§$¶.ãQ%œqèsÆ‚ÁÉ<»ó,J¨Ny;88|j®8ðŒ i>Ÿ¯æaÏLËdjzŠB±€ÏëÃëõÞ壙:g‡Ó¬okæ…îY¦a>„€‘¤—ŸíÉb:ÅíààðpÙ_×uòùO"ž¸mÊG®© ñàí‘ß›[•ð©‚|ÙÄïr¤,ŸŽy~!¥r UU‘eÙ±›>¦eâóún«òʆDC@Ám!å¸ÑÀ­¼®ÊÀï–pF~‡OÃeµ³Êå2ЬÜVÊk׊­¬¡(·_ùäË:Q¿sä‹Â\Š„Wʆ3ÕrppøÔ\¶/—˶} ¬º%†a”Ëåšû]—Ëõ™Z络t°=¶†ªªµkºn WõP.—m§A•g¸]®št˲®;eÍžÁl·ªš¦¡ªj-îúôVÍ×?«z2`>?ïõe>÷>MÓ‘ei–?ö¹X–E¹\¶ïY®mK†âºü(”u ð»ej>t+!0L]ÓpUÊöjÆ›ªa4MC–åÚ»¿Údª¾¼êëÊõL„”5 ­Z—…ÀëñØi ]¯½Ç¹ù¨¾ÛB¡`§W’°LI’ðx<Ÿ©ç;!DeÅ/QÔìwæ¨ö;88|.;Úiº†"+˜–YëÄdYf÷žyåµ×ˆE£!Øzÿý¬]½ª6hÕw”’$°êL± °;ÉJg]VaŒŒŽÒãñx°,«6° !8~â${÷ïçw^|—ªbYo¿÷.ª¢rÿ½÷Ìz¾5Ç'ùßþã?1>1Ïë#Ñç¾{îa`p¯×Ë…¡až}êÉÊ žÙi®x3›gY+ãóújƒ‚L6Ë?ÿð%ôôô°ûã½¼ûÞû|÷ÿ€p8ÄÛヌ$I<øÀýLOO³wÿ6¬[K&›¥¥¹¹6W1!ï¸B±À>ŠeYè†ÁÏþå_X¾l)+–-›7ßBRé4ÿí/ÿ ¨ªÂÂÞ^–.YÂäÔ™L·Û}Ùr››oäK^—À¥Höʳn •e‰;wò£Ÿü”û¯ÿ‹úúf âõï¼þša|ÿ‡/±~ÝZB ýƒÜwÏ=µÉRõ¾j=¨Þ3xî’$ñ“Ÿýœ»vFðz½|åÙg8ÛßOccíÜÉw¾õM‚Áà¬gWóËåø«¿ý;&&§˜œš¤1‘ ­µ•oóDÂáYï°þs};™{Mæ©k’$¸%JšæŒùŸšy~Ã00 —êÂ0ŒÚõê`ÒÔØÈ×^xÁ^¸]ŒŒŽ…$‰™™¢Ñ(¦i2:6†,Ë456¢( Åb‘±ñq$I¢1‘ —Ï °€\6K¡Xäû?|‰»î¸ƒÕ+W Ë2cãX–EkK3ù|žÓgÏräÈQ ššIÎ$Q]*¦i’Ë囘ÀïóÑÐÐ`w¤ØŠŠét†{Ë—! iY¸\.r¹“““¦‰V,2:::+Í©tš™™~?±X¬¶Ò4 {…W_>.— Y–9zì8m­­9z”“§OsúìV._ÎÑãÇÙ´a=cãã”Ëe4MÃívsòôi^ã-ž}ê zzzÐ4ÉÉITU¥µ¥…d*ɹsç9ÒÑA"‘  219I.—Ã4M’É$SÓ3D£¢‘ˆý®°¥¥R‰¯<÷,-MͨªUU™I&ñx<—”[¢¡˲˜™™!“͉Dˆ„B!(–5¼. —r©‚Y©Tf÷ž™˜œdßþý,êë£P(J¥)–Jü>âñ8™L†l6G©\"â÷ùŸ˜ —Ë‹Fñx<ŒOL099I<' 22:J±X¤¹¹™l6Ç_üÕ_ñðƒ[Ù¸a.÷EéÍää…B†{ò8>>N¡X¤P(ÐÑÞŽßﯥ9™L²võjž~ê °,ÜÃ#£èºÎÈè(†aKl†††)kmm­xÜn,ËÂçóño}‹Ásçø‡ï}Ÿo}ýëD£r¹Á@!“SSü~r¹<…b°hjlÄår‘Íf!ÐÜÔÀèÄ©TŠx…©dÑ9Iáààð©™wà7M]׈Y[•¡áaÞýàTUaúu¼õλD#|>gøÚ _áý·qîüytÃ`Ýš5¬[³šyõ—LMOŸsËf^ýÕk<óÔS†Î¯~ó:K-âô™³èºßçÃåvñÁ‡ÛÉæ²´¶´² §‹±±q>Úµ‹t&Ã#>X[5e³Y~þò«äó9Jå2m}€%‹aYV%?brr’¶ÖVš››øxß~ú,@®i¼ùö;µ4¯_»†…½}¼ôÓŸâv¹hjjâá·âõxÐuÃ4jRŠZaÊ2K/bïþ¬Y½ŠT*Ŧ ë9qòáPMÓðz¼ü—?ÿo$ ZššÅïóq¶¿Ÿ7Þ~‡gžô24<Âá#GI¦RlX¿Ó4<Çûn'—ÏóÜSOÖ&5£ccüâ•WíIˆnðÜ3OÑÔØX{ù|]»÷‡YºxùBÃGŽáñ¸ç-·G|I’xåW¿"ÓÓÝÍ}÷Ü, ŠeŸËƒ*Ks$;““LMOóõ¯~•={÷òÔy>Â~ôcš››Èår|ãk¿Ãñ'Ù¹sÁPI~÷[߬‰ù‡‡GØwà áPˆ_¼ü —•+–³léþå•WÉær¨ŠB_o/'NžÂ4MBÁç‘$‰l6Ç[o¿ƒªªx½^ž{æ)þü¿ÿ¡P\>Owg'ßýÃ?˜%Í8zìŠ*‹FÙ¼qíÜņõk‘%!ÙÒ–m;v Ë2Ý]¼ø•çQUEQhii¦T.á÷ûhkmÿåÏÿßþæ× ƒüÕßý=_ýÊWøç¾„ËmO2׬ZÅ£<Ì^úÙl–b±ÄóÏ>ƒ,K|ÿ‡/ѳháBô‘Yƒ°OedÒÀ´¬Ú»wpppø$Ì»A\ø+«¨¹?.ÕE($ààõxØzß½|¼o?o½ó.=p?Ù\Ží;wâ÷û1M“]»÷pâä)ÆÆÇùæï|•çŸyš`0H¡XÄ0ttÝ P(²tñbôtóô³|ÙRšYµrM;~Œd2EñµßaýÚµ|¸cÅŠñœ3ýý<|ˆh$B2™dï¾ýµA¿*Jõz¼Ün7š¦“Ëåk÷øÄ;vù£]»Éòd2bÑ(K/B®¬ðu]·÷È™]>š¦ÑÓÝM¡P`çîÝø|>îØ¼‰á‘ö8HC<Ž×ëAU]<ó䓬X±œb±ÈêU+ééîâ«_yž¶ÖVzº»X¾l)Á@€C‡S*•Y½j%ßùÖ7hjl`מ=˜qðC‡8wî<ñh”sƒœ8y *âpÓ4’„ßç# ª*¥R™B!e™€ui¹íßO¡P Ÿ/ÐÚÒBï‚[WÁ4)•u|nE¹¸ýRýÙà SÓÓ‹EÎ;ÏÀÀ¥r‰X,Ê¿þ“ï²vÍjÞxó-’É$ öò?þÛC0dÛövEM×ɤӼýî{¬X±‚ÿðïÿ-n}€ÆD‚;︃E}}œ:}†æ¦&–-]·¿ñ 6mÜ@©TfrrŠ7Þz‹ûﻇ÷oþ…bíD–%žæi¾ö œí T*Ùi®¤ßç÷‹Æ…B ›ËÙïV²Åùo¼ùr¥ ßûಹì%Û†i‹Eimma÷Ç{9vü¿ŸxÚµ‹b±D>_ «³Ó–JIҬ퀠ׅaލßÁÁáS3ïÀ¯zm°¬Šý ÃÀ¬ &--ÍlÙ´‘MÖãõzA„ÃÐ+«gIü>+—/ãÞ{î® –õ—®ŠEJ¥¦iw¶¦khºÎŽ»Øwà~Ÿ„°ÓU¿š¦‰¡Ûé,—Ê‹ETEÁï÷sç–-¬]½ºöLÃ0P•µ«W±õþûX¶tImà3-‹²¦Q(ü>¿æ»ï"‹ñâWžG× ~ü³Ÿ35=]àk~]ù†A$&òæÛïÒÙÑA{[B>ܾƒ…}½¨ª‚Ïë©ùŸ—%û¯®ë‹EÞ|ûúø}æÅr·óm‡3M“b±D¹TÆív …xxëVzººÐ*߆ßçeó¦Üï=tuvbšFeBdÍ[n«W­¤»«“gŸ~’s.ðò«¿¢X,b&šaô(³4Ë…K%ö8@¢!A:“! óÑ®ÝX•í”@ @ÀïG¯L²<Á`ǃnèX–U«P.k`YȲŒ"Ëì?xˆ×~óÜwMqÐÞfÑgí…Û{ú2²$!U”ôdYÆëõâóy‘å‹JwU%Ï5«VñìÓOqÿ½÷âv¹ìo„¨¼‹¦e †X²x_ÿ¯âóz/ߘ$‰-›7qèðaÞ~ï=Ö­]ƒÇíF’eü~¡P! Jå2.ÕE4áчæÎ;¶°tÉbþà;ߦ`€ïýó(Kuù¿GÁ2 GÔïààð©¹DÔ/”Kåyϧ•÷ÄÉ“üÃ÷þ! 6®_Çé3gY±|9¿ù훼ðü³¬\±‚ CCäòy</‹úzÙ³×Ç÷_z‰–æfî¾ã ¼öë×q¹ÔšNA[k+o¼ùvmÉdQd·Ë,ÉŒONð£Ÿü”Ééiºÿ~2Ù ï¼÷ñxŒîîn …B4&5Å;Ó4Q¥6¸V;EQˆ„Bl;Ógΰbùr. ] —ÏÑçñ22:ÊöQ(ñ¸=¶n€iÖ4úçÓ—$‰Å‹²ïÀAzººPU•ž®.FGÇhmi¡T*¡(•{- EV„‚!þå•_òÐÖ*ùÎ`YVmà8}âÿôƒJ¥yîé§Ù³w/ïø!÷Þ}7‘pˆþ‚Á`m…ö@¨*jmö@­(*±h”m;v\Zn NŸ9˾(lË„ W&AŸË®%âb~GGGÉ üûý¯innbÏÞ½¼üê/ihˆsìøqþû_ÿ ã<÷ÌÓ:|„·D*•fzf†ßÿÝoóÛ7ßâµ×_gåŠåü~îØ²™ŸÿËË ž;ÏêU+q»Ýä󆆆QU•@ À‚ž~ö‹—‘$UQˆF£¬X¾Œ·Þy‡m;vàñx¸sËfNž:…$I•“n„¸¸’®Ú©¨–•¨„‰†#äòyÞyï=îºãöìÝ‹$ :;;g)›V' n—»v½¯·,8á«V®ÄR©?úéÏ$‰%‹óðƒ[åÄ©SÄ¢Q:ÚÛ9zü8nßN>_  W¶Sj U–ðº$ÊšŽ*;”>9bûöíÖ’%KfisŒIg‚—ÜËå핯e"€p8Œ®éCA0“LÒc£cchšFC†ª(´47S*•Áëõàõz‰Çã E¦gfˆ„èªÂ…¡adY"°·Ré4…B¿ßOc"A¹\fxd”x<†ª(Œ‚ÆÆ„-)€Š²ZŸÏ[SÓ4t&CÀïgtlŸ×K(bl¼šæ<7#££”JeDÂኂc ! Bм…Z.—kå Ë2ùB|ÞV^3 ƒt:C$Æ4ÍÚç\.G:“¥¡!Ž®i ŽâõxȲL:¡X,FˆÇbd2&&&iii¦\Ö˜˜œÄívÑØØXY¹ÚÒˆ™d’p8ŒZ9 X((–JxÜnFFÇæ-7,‹‘ÑQ, ¥¹™€ßiZ %‹¬[¾†HpÖJ»X,’L¥hL$$ ]×™œšâð‘£¼ñÖÛ<ÿìÓ´·¶ÑÞÞÆ?ýóåá·ÒÑÖN"Ñ@2™bxd„††8’$‹FcrrЦÆFb±(ƒƒ”5H8LC<Ž®ëŒOÐÕVÁáPˆ±±qò…M ¼^/““D#,le¾DCCmžžžFQ[̽Å519iÇ3>Žiš´µµ122B:“!ÑÐPËcMÓ˜šž&ÑÐP›DüÍßÿº®ó¯þ令R)þ¿ÿëÿÆ=wß;^zº»ñy½d2Î !´·µbYƒçÎaYÐÕÙQKSÓ²Øs¬Ÿ†€‡xØÿ™tpp¸}Bpüøñùþshe[m¾ëW"Õ£^VÝ÷¦i^rlëÒ£\&öÊñb\õ÷Íw6{îï+…Ÿ{$ªþúÜx/wÿ|ñ Ó©i_O:®1ß’$0ÍKËázómšc™woX…Çuю•òûö»ï²cç.þçÿé?ÔŽçýÝ?þ²$ñ{¿ûíKÞaý{{ on=˜›þêõ¹GïêÏÔ×§q¾<Ûå5Û–À|uîry¯žzù?ÿÓæ+Ï?ÇšU«˜I&ù_ÿÿ;ò‡ÈÂ…}—=Öx¥wXåØÙ `é´6DßÁÁẩü—ˆú«F_$qyƒ2·;š¦ÕÎðßì|VIÔtU¸Õù­Îgx§§»E™mgíšÕ.?á¨^›;°Í7ÐÍgXçJñ\Î8Ð|“й÷Ívn¼U‹ŽëÖ­£oÁ¼?ø ÑXôŠy¾Ús„ø=*©taŽé$‡ë£6ðW;šÚ¸à–ؾhª+;¬Û«|t]#P±lw-X–EOw7=Ýݳ´µ«W×¾ÿ²aYñxŒgž|¢6ép»Ý<òЃŸIž=.…C·•iotfnYMÓÈd3µN©\.“ÏçQÕ›~ùúçOްO<”Ê% ÅÂíS>Jå2­k×ëŸàj«ì/WÊקͳ×ãK'™J~iËÏÁÁáÓqÅe°%ÖÊèø(þ _E ©©Éñ¼vª~ n»òÐQ9šèpcƒ4%$S)œ×ààà0—ª%×ËI£ËZ™©‰)˲èêì¢!Þp£Óìp›r-Žynnt:…´¶´ÒÚÒz£‹ÂÁÁá&Ä0 úûûÑuý’ï‚L.ÃÄø„½ÇÿeÜou¸uø$Þõœt:8|ù1 ãº<ˆÞîTOY¦E&—ezzE‘I44àv»káÇê7Ó4o‰Æ}«¤ÓÁáË‚³(½~lkªEΜí'—ËP,•XÐÝ] #}¸>3n•Æ}«¤ÓÁáË‚iÝ>'§>KÊe|>_û?•J×L¦Ã¼ó¥RÉ‹žç„Àãöضß~rÙ^¯—ëò¦Cu]#•JÕŒ¨ø|><žËÛ9·ïÑÉf³ƒdÙFÜ.Ôµ¹™™/së¹×ë³ýW|ئ›Óx½¾+¶5;:Ùl†@0ˆâ´‡/ –9ÿdÛÂ"—ËQ,‘$ ¿ßQñ1˜ÇâìíŽaÔ;Ê™·‡( üâåŸQ(eE–Y´h ©t’;·ÜÅÛï¼ÉúuY° ÷²š˜˜àg¿ø ’$!Ë2MÜs×½44$f…&™œaé’eLMMòæÛoðø£O‹ÅntY9|AÜ*³úùÒY­ç²$#+2‘H”6ÑÓ½àS?¯X,òλo³zõšyã«o;33Ó¼÷þ»l}àAb±ø.*‡OEe¿kÖ)*Ó49|䇨xË”¸óŽ»H§RdsY~èÑ›~q£¹ÌÒÀvfs÷]÷ÒÑÞ‰v'4=3$ÉhšVs€3>>F.—#‘H ^´/nZö~èã=‰eY¼ýö›ôôc˜&éT ŸÏG8áСŒŒ ƒe;Í)‹œ;?H:¢©© ¯×wYq¸U¹Ü¬þfc¾tÖêù£OàñxÙ·/Û¶H<Ö€ßïgdd]×innÆãñ’LÎ055…¬(´¶´"Ë2cc£äóy‚Á ¹|Ž‰É $!hin¥¯o!áP˜©é)²Ù,º®  Cµ¶cY±hŒE‹ãñx+~2F) 444à÷Ū8˜jˆ'‡Ã7º8®ŒU™l[PzzðÜ{öìbõª5tuuS, šž®yd¡P, …m¯¡éSSS(ŠBKK+š¦1>>†eY455ã÷ûotn¿P.+´,‹ƒ‡pæÌ)¢ÑÁ@ÓgNјhAÿYvìÜŽ,ɸ=nÚúpÝà/(—5öìÙ\n7‰FN:ÁØø™L†Þ½LÏL“Ëç8Û†Ö–VJå2GŽF+—éîîáž»ïsª¾ä˜–yKìŸ_.’$‰ÄˆD"lÙ|/ýø‡Ì$§9}æÇŽAH‰FÖ¯ÛÈ[ï¼A.›#ð<7À±ãGñûüÄãq4MãäÉtvv§ÎœÂår11>ÎÑãG‰F£òy–.]ÎLr†\>GÿYJÅ"‡¦¹©…ã'Žrìø1\.–e±aýF¶oÿEUÑ5@ Èc>QsXåàp³2w²mYçΟ#±víúÙ>=°·áÊš=†¤Ói Åë×­çøñãd³YÂá0n‡C‡pþü9B¡0ÖoÄïï¹ÑYýB¹‚rŸ ‰ÒÔÔB<G’å‹[ ]çÄÉ㔊EÂá0#ÃÃLNMÎŽ\D"Qº»»yä¡Gikk'‰ðÑ5t:Mï‚>š›ZxèÁGhiiÅãñðàÖ‡Y³fcãc‹Å]FŸ77ÿ˜ÕtVE‹¥R E–)—Êœ8q !Iø}~úÎR(ä B„Â!Z[ÛÐt“§N°lérž}æyîºóTU¥½½ƒÇ}‚Å‹—`™öŠÇ¢©±‰gŸ~ž––VFGGXÐÓ;«íX–E.ŸåÔ©“,_¶œ§Ÿ|àôiÛ5ñšÕk¹÷Û•u:ºÑ¥éàpUæ›hË’Œ¦kuÐæ ‰x<Žßï'—Ë266F0$ÑÒÒŠÛíÆçó …hjj&Üèl~á\A ÈbÅòtWö9l»â•$LÃ`rjÒVh’e|>?+W®"ªV|Áoܰ‰p8ÀÄÄ8»?ÞMkK+¡°í–VUUòùçÏŸ«YÅSÅ^­˜fÅ‹ŸÃ—™[ÅçÁ¼é´l˜gûO£(*G¡µµ•D"êr¡k:ÑhŒ¦¦f\n7­­­LMM²ÿ^„x=^&&Ǻ€¢(vg&@–e„j{œùBžá‘!Òé4ñx—Ë5«íX–…¢¨x<^&&&ðû”J%‚ ãȲŒZQ¼UÊÜáöf®^‚žžœTU¥¡Á6XwâÄqLÓàž»ï›%=ø²3oN%I"‹£¨ݯzŸÎÎnÆÇÇèéY@C¼ññQÒ™4²rq¡ª*±x|–’E  ¥¥…T:…$$Âá0]„#Üowh±8Š,ãv{ˆD¢H’#æÿ²S?¸ÝÌÌ—NÕå" qàà~>HKk+wß}‘H”õë6âr¹¥P´½ê ]`dd˜öŽNz{ûØ´i ¥R‰mãô™Óx½^B• ´,KD¢ÑŠá ÁÌô4{öì&°fõ:ºæ´X4F `Ӧ͔J%öïßGoo‹—,%±ãQ…h4Š¢:šÿ7?óéÕ´¶´rÿ½N§ø`Ûû|üñnfffhkk òùñXœ™™©Úi² •v×ÑÑIKK+ããc ž ±`Aßm5舗~ü’µõ­$ê´í-ËVî“e¹V ¦ibš&Š¢`š&†aÔV(…bUQq»Ý³\ŽêºŽ¢(sŽ?é”ËeEA–%dY©ðC™–‰"+ðfeåãhh~™I¦’üåæŒæK§]Ï5,lãÜúZ.—)•Jö «ªvÛ1 û@EwÅ0t ã¢q {ån·Ã0$Á‡Û> ™LòØ££ThUîÛv„†Qk¯Bt]G’¤ÚwN»r¸Ù±,‹d*I$™·®VÇY–QUuV=7 ÃÐg·•ºvg·!¤›¾ß¹t]g``€©©i=ZÛ*q¹\¬Yµ’²Væô™Óó‹ú…¨u«}°¥Õ¬ÿ¬( ÁyÎMÎG5üÜ‚–e…ªþžŒ\»ÿv›…Ý®Ü Š}—K§]Ï/ÆÞårÍ:ƒ/Ëò%ʪõõnÜÕ €ÛíÆç÷£ª®Yà|mg¾çÔ·¹/SGçðåæJ}Ã|cIu̱ëþìvYßæk‡·Nàpù•Eý_B–/[a˜Î*Ýá¶âV9ê{«¡€ãtÄáÆbYÖ-áæøF¦Ó±Fæp»!„¨Ñs¸6®µ¬€l6[W^~v5džÂUqÂ;á¯5|>_@1Kôv3¦¿P(E¹ºˆðfL¿Þ +…·,‹B¡@2•¼d@»ÒÿE‡Øú;ײuª˜¦Å?lŸDW4¼ª W2zdòeEÈ4“€[&[2𪆠ºiásIdŠNx'üg>“¥çrá 7YzœðNø/{øÒM–ž›3|A3ñ©ðܸÚÂ_þÊ‹/þÇ=Ó $BV韶U7CiÈ ESåB—›i Kv1]”˜Ì ] 8áðNx'¼Þ ï„¿aá‡Ó$]bEÂ@%Æ'&.ô²LsS†i0=3øÞhí×–‘!̹©BØN|ª .^»ÒwNx'¼Þ ï„wÂ;áoHøö˜‹ÛâÅÅ%¤ršCG®pœOšaQ0Lvõb‚êÇêµ+}÷e_ýþfIÞ ï„wÂ;áðci ÝwmêÇ\I¥ïòæ'?ØdYðYÒ°,êÝ _ŸKÂë’°,;ý†iÕÒôȸ…¶j«q aŒ"ÙÅjÎóܹùºZœ·>¦e×!ô>Ñ{5-{¿®z¿ù9_š/]×SMëúúˆOZ—K»ñ9•‰aZ³ÊþfÅââ»ú4uíˈi]¬Ÿóµ/¢}Ý ˜4‡TúîyÇֹʑòó/¾øgD’êe:§_U)À% ·x(”M4ãú ÒA…Ö¨J2g\×½—‹+ä•É•®l{\xbU„ˆO!W2YÓégQ“Ó„lÉà±ün‰¡¾F7÷. ÒÝà&[4È”L _ÝcpªL¾l²°Éƒ/›¶¸¥’–¦°ÊLÎ@–¸bœÙ²y `s¸Š$XÚêe}—ŸæˆJ¦dPÒ®¯=tÄ\¬l÷ô*¦EWÜMªh|fc—,ˆJº=A©Ö¹¶¨Š" šuÅz( 茻Р‹²a]µÎºÁÊ6†e‘/™³V*µJ%Þ«e±Ú¦6yHå t“ϤÍX@È+³¢ÍK_£‡¨O¡¬[”ôk+ôú¼|ø]aŸLI3ékô°°ÉCA³(hNÒsôH˜&,hô*Ìn;ŸwûºYòšI¡¬³±ÕBAgrjºæÈ( Ò˜H ë:Ó3ÓHHæu†SÚ5 ú¦-•g×Dq+¢¶j®®fW´yYßíG¯”lý*×°àî…A6tÙa¬ú[ÝJ¼~†[¦~õl˜ºýÜÕ@p±#©†©¿·%¬²´ÅCÿd‰Ž˜‹e-ºÜ|csœ¦Jÿd‰ ]~¼. UäJ&1Ï­µó¹¡ÛaÂTN'è‘y~]„˜_©=sC—ŸßÙã››ã<²<„, ¦®ç—¬îÝV˜¬éôñìÚnUÐwõ)5 ”Y÷öÊ<²<Œ[µDz æWøÚÆ}ÖuúèM¸yzu¯*ͺ¿¾-T% sÓ2·½€Ý>B^™Í 4•Z, YfY‹×n7Öì¸Ú£.î_IJ@•ϯÒVké®þ­¦¯ŠeÙR®ïܧ¯ÑƒfØiu)‚on޳®ËOÙ°èI¸ùý»D|r­½Ïm÷–ºa±¸Ù÷6Ç yåËJ.j}Ьÿ­Kú”jÙ¸d;=¿WO­Šðûw%XÛé›% ¼Üªº>/õ’U<´,D< ÌzVý;™¯«/ÇùúÓ‚Öˆ‹5>$ܼ¸Á~^U̺îçúr¹R¹Òws¥”ËxvyÏÍûåÊd¾t]/³Ú—i±eŸõ]~ ÏTÚN5ÌgÕ¾nL b>…¶¨ Ó²ðz=t¶· ‰F"´·µÍ¶äiñ€‚Wrq|¤pMƒÿ¢&ÃI’nñв0A…CCFRO¯ŽôÈÄ|2ïÌÐs³®ËG¡lòÞÉ šaÑÝàæÍ£)îê Ò×è&U0øàT† nšÂ*^UâÐPÓãEîî ° a‡yïd,¸³/@Ô¯°»?‡K¬éðôÈŒg4Þ9žÁ£ îî âV»r L–YX™ Ž¥5F’e]È#K‚ÿñá&Z#.ŽxbU˜Î¸ýùèp»Ù¼ €Ï%±¸ÉîþeÝdY‹‡²CÉrmµïu 6õyeÆR’Èpz¼Èã+çSõS‡[ ˲h(”4‹÷OfH ,Ë^É.nñ°ºÝÇTNgûé,w- òôª-a•7¦¹0c×›;*u{2«“ÓLtãbˆùåYuøüT™å­^V´yÉ ><•%S46öøIå NypiˆsS%¦Jܽ0ÄDF#_6¹³/ÀƒKôVÒàU%î^dQ³‡ScE>:›C7-<ªàÑaVµûˆù¶Îñ*<¶"L®l²g Çá¡K[gç1_®HÜ,„àÎÞ1/ä yd\bI³‡Ž˜‹ö¨‹Í üxTÁÞÁZdKŸsS%†f´+ÖŸ{zƒôO–XÚê¥)¤04£±g Ǧ?DÐ#³ëlÎ^­²¸ÉË[ÇS)bZÔ•‰—·Ž¥83Qbm§Ÿ¶¨Ê…™2ûÏå¯KblY°¢ÝËš%ÝâÃS{®N|êËí3l_·(ê&¹’ý¿$I477ÑØ˜¨ý_$€™¼ÁpòÚVü.Y°°ÉÃñ‘›XÕnÔ³k"D}23yƒTÁޝ! òôêSYsÓeʺE[Ä…"Á¹é2%ÝdpºÌ²V/w/ rg_æ°JI·x~]”Öˆ‹‚v1Ì= ƒ<º"L"¨rr´H¶d`a‹ÛØÐm‹ï_¡1¤ {µâwK´E]Œ§54½º' ëºü˜ôO–(é&eÍ"°Wm+Ú|Ü»(È[ÇÒ(² ì“I•‘„`Y«—©¹’-j“E’83Qäôx‘\Ù@‘…òüq¾s…­KB|e]” Ý~žX!QÙª[×éG•Š,(jŠ= .šB*/nˆqßâM!…'WE芻.™pÔ¤s¤©‚A¶d2’Ò˜ÊtÄ\lêñòÊÜ»(ˆ*ý‹ýÛÚ( =<·6Š‚¦Êc+—äÕ²,ZÂ*+Z½$ó39ƒþÉZe[B–[— ye6õh «,lróøŠ03y…]fE›—%Íd›{ü´D\µÕí•êfXd‹C3÷- ²¦ÃÇÝ miP¡lñäªͬå=U°EËbN™¤ wöؼÀÏdF箾 ›zü×­« ç¦Ë4_F½Ì¤ð³j_· Â.›Ru\©J½_z$ [é-|QÚÜÂl¨ø\2S%5yˆºân\Š„fXœŸ.30Ufß¹<­{&ýÎñ4{säË&K[<œ›.“+™ø\½ 7·LC@Á´,Ž xõ@’lÑ 7áÆ£Úaün‰î¸›î7œÊ°ól– ÓeÀ¸?Ì3žÖi«ô5ºIUZÂ*nEªB”4[ölô%A^;”b2«öŒI’’ËÛ¼ìîϱÿ\I‚BÙ"ì•鈹82T.Š¿¶ŸÎðÒ®i~ºgš_ì©­€æ3ï ú·8BÀDFçï·Mò“=Ó´G]<»&B{ÌEkD¥«Á×%ásI N•˜ÌhìêÏ1UYÑY–ÅHJc:§søBLÑî0-Ën³ê°*Q6,vögi «tÅݳˆ£Ãâ…;zƒœ+õ+lî 08Uf&¯c˜ƒSe&³º†œŽa‰‘"ûÎåmÃn»s(ë&ƒSeFSvzó%“¢frèBžòHB° áž•G¿«Î’¡€²nñê$?Ú3GŒ¥5†g4vögùÉîi>:›e"£ñ/û’ì?—G7-Þ8šæ¯ÞÇ­H<¸ÔÞ*û‡m“¼q4mO>êÄäºi¡Ê‚Uí>Ž çùË÷ÆùÁGS´Flýš¿y‚wŽgXÝáë ÎŒùûm“ N•h «ì8“e&§óÊþþúƒ &Ë„½2 ݼq$Å?nŸb$UÆb®èßâèHá¤ÆÎ³Y^=¤¤Û“¨á¤]¾ûÏçéŸ(±ÿ\ž¾„›µ>ÒEƒ 3¦E­K Öwû茻h «D|2>—4o¿`%Ý@Ç3ÏçkÏ=;Q¢¤[¬ëòÑs±ÿ|ž¾FC3oM³ít†¾&Om›ÉªLîê­»]©þ¤ a¯Lwƒ‹€G"æWÈ• ö˳ï\UŒ§5&2:ûÏÛ+çj=¸X&9†S‹›½8Ÿç£)Ž åYÒâåzü° a/<{ânÂ^™†€­§R[ô×m—|–íëVÀ² ìSh«×´Uq]Nz,l1ÿDFc2«3–Ö$xÿTÓ„ñ´VYÕ«,jöÌD¼2«;üŒgìY_OÂÍ»Ç3„<2[—„xïd·"! $lE¤EMün‰²nñвïW˜•F¿¾²¿–ÌHÂÔ%a‹/ʺÉhZ#[2Ù>nXäJãiDHA–«;|üÑ= ìî·à¨Ï¶|äQ%’y!39þI[n’+dŠQ¿L\(˜& Í”‰ùeVµûØÕŸ£P695VDjJTª,æÓâ‹Urø|XÞê¥#fK’tÃD7-¦s:çó$ó“ !DEéÍË¡¡éJ'$a¯Ø$Éþk˜!DSHe"£“,ì?ŸGÓ-4êuÄ/¬qj¼ÈÞÁ<’°ñdŠ÷/ò—ïsW_;{ü×·Æ0-;nݰpÉÓPm/¢ú·’'!%Ý$â“YÞæeh¦Œ,$ „aÕVDãuyœÎVVH•zoçÉÞ«jçÊ&›zü”t‹™œŽ×%ñÔª0g'JÈ’`c·Ÿ…Mn ÓbÏ@އ—‡y|e˜ GF•ë»ü4•Šbàôx‘Á©ë»ý<¿.J¡l2•ÕÙÐíç¹uQ–¶x83^D3,¼.QÓ²û Rù+ "ÛRÑ”Ææ~">™˜_¡1hïÜ2H >:›­åE3,><•¥P6kûÃËZì•ùé‰"âéÕ~öñ %ÝD–¨õoAÄîQ'ÇŠ N—ÉW$˜~·DQ³jûâµ2ö_!DÅo„îÃCžZáÌD‰á¤FÜ_fëÒëº|¬hõqa¦L®dK!4ºi*5ŸW«?í1›xí`’–° ©RªuFÕ}r;塚ÁTÎ^HUËdi¥L.L—XÚboÃ,lòpr¬„irM«k ðª. Ó?Q"[2èMx0-{¼9?­ðÈtÅ]. ŸMûºUúéê{ÔÊðH×ÕÃË/¼øâ<[Œ“,»(W?»UÁCËøçÜT™ñŒFsÈÅ’f/nEÔV­~·ÄÁ JºYS¾P$AOƒ›·Ž¥É•L¼.‰¾F%Ýäôx‰¶¨Ê‚„‡ÆÂǃyöËãVE-̱‘"æXÜâaqeba‹™ìuÈ+s~Fãèp‘ÞF½n §Ëè¦Å¦?ÇF‹ô%ÜøÜ2¦1ã¨_ay«—·¥)Ë[½$ “YͰh¨4…Tƒ*S9»Ó‹ùÖtú89Vœ¥ñ,°+ýÂ&ËZæ‹ó%9\BGÌź.?]q7£)7ަMi” ‹•í>šB*ãᤆ, zn.Ìhd K‘p+‚³“%¼ªÄ‰Ñ"!¯LÀ-³íT–î7½ntÓb2£³eŸÞFg'JìÈQÒ¬ÚDÓ0 ¨[|t&KI7)h»úsÀë’89T™€.2\É‹@pjÜnû†aŸ èkò0“³·:£>…ÅÍžÚÀ¿¥70«Û3g&o°¬ÕKgÌEª` €¯oŠsf¢D¾dŠ>—„aZŒ¦5tú'гÄÛÍä¾ÅA¶Îpr¬ÈtÎ@`oIfŠoK3–ÖéMØ ÍɼÎÑ‘beAråú“+Äü n’yƒ“c%JšÉÙ‰ºi ÇF äÊvÞ§s©V}™Lçt^(öÚeÒ?YbÛé,šyõ“"`÷©Fe²Ó×äA–g&Jœ+ÑÛèf"­€ˆOæÔX Ãâ3k_·U%О=Á2^už2‚²V¾h¹ï¨µœ‚ˆp|´pE‡ZÙßœ*‘-^<[£H³r®¿*r©˜e"Û ‹û¢~…Óc+®* ´ÊJâÏîoäÀù<;Ïæl¥qqå\Ýk¤¢@%KÂ>PW1ª+骕£ê,¯šÆom‰sb¬ÈöÓÙY†x„€ÖÅÐ “ÙŸœW5qϯ²³?Ëé±Rmð¾Üêýjq:ÜúXPY9Û+êj}µ,{fk\Ï׉Ô[äB€\ c˜—ÖaQX«mAÌIKµÝÍ×ë­Uà .Ÿ6kžûçÆ57Wº·~±ú¿$ ÿË“-üìã>8•Aâ’ðöMÌÑު˸˜ówžûêËXÌ“F„-ÍôªmQ{¿ý?¿9ÆéñÒle»yòRŸïúøm}$…ìœB‚?½/1««Æ%Iv=Ò [q¹-¢ò‹½3³OLÌÉfý3[#*ßÚ矶O2–Ö/±ôVßOW•/yß—©?Õ:.WêußÍWçVñYeRïeÚõ È•ÓdsÚHõ˜åÜ“&ŸEûºÙ©JDü‚?XU&â™§)A6—½h¹o:«3¡•¯ú"4Ãâð­ù_¶þ‡¨ýª>Ì.d€‰¬-­¿·Z™„°÷àKº}^Xš/Lå—µã‚s5`«Ïœ›.ͰWմϽoß9{ÿ•y*°0’ÔxíPŠ¡™2¹²YKßåŠìjq:ÜúT;xÚݑVWQ³Â^æåϵÈU½o¾:lYsÚœ´ .ý<ß3æÞ?_Ú„¸òçùòxµðó…ÑM‹É2™¢½mw¹ðófºþš¸z˜+åIèips÷ÂeÝâåýIÎM•ç]]í]‚½îip³ýLÆÞfQæïߪƒ’QYÐìéϱ›yêÏe²gaK‡“š½Òž“×ùúéyßw}9Íù\=Z)f¾òû·œ/ó.®ݘj¾jGÆçyþ§m_7=xT‰€ûÚŽ‰‹ïýð‡Öac99æôxñ†*5„½2%Ý¢¨™Ÿ>²ùÊfÎK¿ä»« Îf¥q^×óœßÁá²H|nÛ8Íõû¬Qå‹bõ\ÉüT‡mÉÖÔŸÈÚzOðùõo •sò3ùOgÍáÖŲ Ri I<Ý›'z-+þ‚f’2Œ>@%óÆç:P^i–y-3ÐëÝ*ûC7 Ó‚Láæ8/­¶Â0|ú¶«›VÍ^C•Ï«›¨œJº ŠÐá!¤ò:2âšêîuiõ‰wpp¸½¸™Úýg™–Ëmo|æiþüŠÃáÁ´ )¤Ò•1Míªá¥ªR@¨bÜÀÁÁáÚ°øt—æÛ“¼ÒõëI×>‡<×yÖp*SSüý Ëâ’|}žéw:d‡kD0šÒìíúk°P³Õ?z¶úl<Š ê—/û}5ÑYת„}¶©Ú¹|õºaZtÄ\<°Ä6hs‰7Èyž©Ê‚G–…ø“{yq}Œ¾F7ϯ‹âsIµô\)Mד~¨š±õ²¡Û?kÂðH5ûúBØ–üTy¶âÑ|Vñ<ªÄó뢴E]WÍ3¦º¸šB*¿{Gß½§‘-½šc ‹ë°ëÃ×ç+ä•Ù² Pó»q¥ô̇iÁ†n?÷-ÎzŽ…­# (³&p×›îkIÃܸ%O®ŠÐÛèaQ“§bMÐñ+r³cZ (´ÏÓnæC²°JtÄ®í»“\Õîã«bD|2²dkò»mk}’° C…=²}t¸e¯*áRlS¡[zx\§è.EðÜÚÊuU"PXßå£5¢ (µ#V>—Dܯ ÊGÓ‚®¸›{91Vd2«áwÉô5zlwÒ„<2QŸ\IõÉ<ò¬AF¶)×D@±]K[vÚbs,ÌY–EwÜÍÊ6/­•P%žû‡xlE¿["êSøæ–7{pUÌåú\Ríl|µÛ yeZ#*KZ<ÜÒ¬²®–…¯RVŠ$yd<ª=¡Qeß}1Œ$Á½ ƒ4Ž çk&n}ªDƒ_!è–Qd[±ùa?cî{ô¹ì8ƒîKó%KöýT ])=sq)‚æJoÂm›1—1ŸBܯ ÛëÜïÞ§5âB‘lP …ˆW¾¬4§j¥´š—êñ´ú÷;7¿’°í<\Ì£ +î"ìµëIgÜK±Ë˜·ÃÍƒŠšI¦xmŠ£ŠÀ¶Õ?¥;+~‡k¡º=vg_€å­¶‡»_NUì®CÿD‰|ÙdI‹°øàd–SãÅšGGͰ8x¡ÀÆ?K[½¸dÁGSè&t7¸íë-^da·Íî7ÏU|Nü|ï Ù¢ÉS«Â¨Š¨3-höÓµ>šÃ*k;}(’àÝiûÌ3°²Ý˽‹‚HŽ Ùq&Ë+ôE]Ìät^;”b*«ca¯–«ÏœÌê¼q$Å£•oxFãׇígVËce»í(K–¿=šbË‚a¯=éI Öuúˆùe~u0EØ+³¦Ã‹aA*oð‹}3tÅ\l]ÂÂö+^=\=§þÔê(Upd¸ÀǹÚyÝ€7ޤèkò°¶Óg§É‚פXÝáÅ¥ØÎˆÎN”Kk<¾2Œ* b~…ßI³ áæèpÉ_ßç#)žZ±ßãd U´Wæg³lé Ø“9{rô6º95Väî…ACó§GßÿhŠÉŒ­„ñÛNm™Ž¨‹½çrô5ºyhiKpr´HÀ-³¦Ã‡* ~þñ ­•õÝ~܊ć§2ì8“U'eIðÂú(‡‡ì¼|csœ_L²±ÇO{åý¾~$ÅCKþæåý3lìöÓ“p£Ê‚×&+&}©™,îˆÙÞ¿¿cŠDÈöƒð£]Óµ÷ïp ¨¸Î¾60×e«ßÁÁÁž]Ê&{óœ+ñã=Ó¤ ¶¼m§³¼Pà¾ÅAÆÓ¦ [—†Ð ‹ÎæØ3˜£-â£ ŽŽxïDšwOdjGE&K)Ö®[–íÿâû;¦¸0]fE«=x‡¼2ç¦ÊÜÑk;W±*W]ÈÓ?YªX­³­—Y–=QyxY˜²n1•5غ$H<`ûºŸÌêì°­´Q9Óž*l;áÐ…<ËZ¼,mñÒÝঢl›9c©òðPÜ>‰¶ÿø}çsì;—çÕƒIöæ83a§éÀù<1¿ÌTÎà‡;§ðº$î]ä¾Å!v÷çøçS U, ZØÆmî]d"£ñwN²ýt–5>A…—vMsf¢È£+ÂÄ ÃÉ2ÿü‘§W•82\`wŽÝý9b~¥òNt¾·cŠ™¼Žß-ñÉx]¶Y׸_Æ¥‚™í§³¼s,ÍÇ9>:›E•q7ÏÛE_ÝŸÄ´ PÙØã¿bz<ªD{Å]ª¬íðáV$þáà vœ±‰$5>8•¡¢Ìú.?g&Jœ(ñãÝÓœ›.sj¼Ä‡§2$ó:[l)ÌœzYŸ—˜_&à–æ¼_“¨¿.¿YÀþóy>:“E‘ëºü—œ½Iiø+qU­:ƒþÍ…eAØk; »[ýRõ&gÌwp¸vLË¢X6Ñ Û3™iÙÎil&.ÙÏ'mW¦ …G–‡h ¹j ³¬Û]ê;QͰ(ëfíº5³Ô颉* ‚©fÿÃSYRyÛD+–mF3lîzÁ—"*"pA®l°­bÞö¥]S¦Å‹ëc´F*Û}–í±në’!¯­Ã0‘ÕùáÎ)šÂ ϯ‹ò\\(XØþ,²%ÓöXY1ÆU6Lò%“‚f¢ù²IY·ÝÉV=xNd4Û-¸Kb:¯SÐLŒºˆ$DÍDoº “/›ø=2™‚ÉdÅ ˜·²µ’.¤òF% P6¬ŠùYûÿW&[2È ŠšíøGTžQ¿J*ë&ãÛ<îÖ%!ú=¶¥Ba‹SˆI®lbY·L¦h\1=JEÚ/€€G&W6ÈíòÂv8tgŸ­/ ¦Ûï/W²ëÆ]}Ötø*¾DͰN=õy2%“—vÚï÷…õÑÊñbËŸÛvŠTÍ£K5ÿ `Ûå/”M޹³/À’f/nIŸõ_f$ã³ã¥kWî+jæMs–ÖÁáV@ÁdV'ä•yn=‚…,Ù׎ñ¹$LË"]0ðºlÏf¶+TÛ-íHRcË?wTÏÀîŒg_¿Ø(«æV÷Ëcšö³r%ƒ’n] Àìù²IØ+³¡ÛϑႽ' ]0¸%V¶ù0M{bàRì»,ìÕC°2¸ë¦ESȶ±®é>—T3×{±eðÏM1œtÁo6, ¢~…–à…EÅ«›ìµ€ˆ_A*§Çq¿ƒÃõ Õõès¿Ès“4·÷gö ]»wÎuQÿ⪆½’£–¹Ï“/³t€êŸ>ÿóæM×RœåÈáæB‘À%_Ã?•ã|ù’IÒtVûŸ/BÀ®þœýù ~îDFçgÏŸÎ-ìÍ€üÊÚ«§M&K³¼Ù9Ü25×®ü'ºÿ¤»Óúô>¾ìTmõŸ»[ýÇV¿ƒÃgÁg5èù*ÚùŸ¦M†}2±Àõ9à¬O¤bž÷zð(‚Öˆ:¯ñz'"’€æ°ŠO•x¤O$Þ6?ÁäÅÁáV£j«ÿZMïÛ¶úýŽ­~‡ë¥zæÚ0-LÓÂï’ØÜãG©hdSù^7­ZÛª†7*×jŸ+qš•só} 7/®Î²e_ W}nýýFÝ3ªqlîñóð²Ð¬çšuaª× bÌ¥.ý–e;kYÑêuß|i¦.íKZ¼¼°.Š,‰Yé²°Ïî·EUtÚ7 sËÕ­J|mcŒ¾&7[—„ˆùeôº|Ìwý5Ylìöòȵ0Õ²™[úÜxæÉŸƒÃÍJÕšh¦h\Sø‹¶ú5gÅïàp=ø]ËZ½ÜÇG‹,jòðìš(!•ÎfI V´y yeú'KLdtV¶{ñªÙ’ÉXZcY«M·84”'[4iª,kõÒÓà®9FÛé˲V/ƒS%„tÄ\ Í”YØè©9ŒÙw.G*o°¨ÉC_£›åm^†“Šl[†k(œ+2”,³¤Ùc[ßÃ6ó[Ò,6tûyvM”DHe×Ù,a¯Ìún?!•³EމúeV¶û(WÓ\2g:XÒìapÊÖ–¿³/ˆ[*à’/nˆ1–Öx÷Dš“£EºÜô5º™Îº`›®š_Õî£5¬Ò¶MNfu\²Ä†n?Eb´b!qq³—™œÎ‘áša± aÇ9™Õ1MøÚ¦{ól;áÂL™EšÃ #I©2‹n‚ç:¹²ÁÑᦠ[¼œŸ)“½ÆŽÔÁá†R9fªצC£Tšá’I£×Êý‹C¬l÷rèBž˜_Á]±~çwK¸dÁƒKC,H¸Ïhlî ð›ÃI^Xc(YæäX‘»ú4Û¸LcHáÃSY¾º!ƹé2†Y§€VqWûÔê?Ú5…, žZá•ý3|mcŒÎf銻‰ùeöžËóüº‡‡ ö­–ÅÆn?›zü %5^ìˆñƒ¦xtyEÊWl Xx*^nÉ6 +À£Øyya}Œ¿ù`‚ÇW„ÑM ¿[¦)¬òò¾™j yl#=/ïKòð²­•|Ù¤¯ÑÍ{'25³ÁnE¢»Áͳk¢œ(‘/[µ¼JY¢%ââÜTÙö(' îì  Ê9ž\áà…<ª,X×åc8©±¦Ã‡G•I•y~­gNµMÞº©ö>Öuú¹gQÁ©›z¼{"Ã]}dIpv¢È=-ʺE2¯óøÊ0ÿ¸m’Ì-®ýïp{`Ûê—i ɘVùªá•êMŽÒ¦ƒÃµc£é2K AL*o.¬ï*óëC)LËbU»—÷Ïpt¸ÀwïmdE›lÉà£iʺÉÓ«#ôO– ¸%\²›‘”†¼²?ÉòV÷-Íž½[÷É-Ë6Ž3•Óyãhš5>–µzYÑêå´mÑÍ´ TXÕî#æW(j­•°O¦¬[ì¹cÛélÍÍÑáë:}üæPŠTÁÀ0aÏ`Ž}ƒy6yèM¸YÚêepÊN³mW¾jŒºâ.ʆEª`°¦ÓGQ³p+& …Ÿçf8;Qâäh‘Ýý9¾².Êp²Ì/öÍÔlX=2‹š½übï4f47{ì³äçASY_HÒ“p³ á¦P6‰ød:ã.b~¹'@Ð#qa¦Ì;ÇÓœ(ñÝ{C8ŸçõÃ)ž^a}—m±oÏ@ŽOe0×Âê“¡d™éœ^gú÷F×8‡ËcÛê×Ñ4©ëêᕚ­~Ã9Çïàp­H§Êüò@’GW„yle˜ßNáRíQCÉ2™¢AOƒ›\ɶ—?8e›Ì(jɼa‹ÞgÊäJ&UpË´G]D} J2›nZ(² !h›Çu)’=R4+»ÿ™¢AOÂMKX%â•Á²Åˆ|x:ç2Œ¦4d‰yöè-;ý1剒}Ì—‹ƒ^Y·õjš es–mûe­^'Ë$ :é‚ÁHJãðP£âl¦jÞ7PÈ–ìt6…TŠ'D¶Mý’fÒÝঠY5åB©ê  bå/_2™É*°ít–©¬Îâf½žZœferÔq1–֘ɴET:ã.ZÂ*SYæ°Z+‡ýçóüÞ ,ltó³g0,XÔä!UÐO;ÒP‡›Ó‚¶êq>3{Õðòó/¾ø3jnŸIÇ*“ƒÃ5! ØÐíçξ Š ûóœ™( ¨¬ló20YæÌD‰Õ^–µz95^dÏ`žÖˆ‹ÓãEÆ3:ºa±ºÃG{ÔE¶drt¸@Ð#sW_€¦=0²=¡†EÐ#³eA€ÆB¦hpb´H< rd¸@À-ãR$¶ŸÉÒs±iA€ˆO¡²Ìîþ,½ }|ª``ªDcHe$©]ÐüÿÙ{Ïðº®ë@û½½7ôÞ‚ €`ïU¤z—%[îŽÛiÎ$™L&“™Lf¾ÉLâ;®²zUØ{ï ˆÞ{o÷^ÜÞÏ÷ãWII$EYí¼ÏÇä¹ûì³Ö>{ïuv[+Šî .MÓ0` `RËuw†ÈŒSQ7àÅê½/³/óÙoÖÊØPlät»‹QG§/BiZ4”¯ @ׄŸ`X`A¶¨ð§dY¾‹.*gtRÀé‹°,OOQ²€Æ!/FµŒ{BJó— Wµ<„&Ũ`Ô¤mÔOvütžZ9ã~¤ ²uØÜ!ê¼ä%©Y©eÊæX‹“DCt½Ì Xš¦Å¨‘±ãŠA¸g¾‰PlY.ED>SLG£ †ÂT¦DPßà0D"! `µY£¾úO:ç0!úê¹%äR Z•4r¢r™„P8O!‹Æ>NÑ‘K%„…÷wà«RäÒè @hÚ¼V)%‰Ž~¯Þi.•D]§CQžö§ŽÑ±DJÐ($áHt¶@!‹º¬ †¡™ØÂuK|WË?ãŸ?"LûŽŸ àsÌ3†~†–KÝnü¡h8á™=þ`T^ˆ†}ÙY/“F×üƒaßU¡‰g‚Ée¡è3füÆK¦õ…è €fzFÀŒ¦ßÉUyJ$ÑwŽD#ØÉ¤ÑÿGËé BÌŸþW—Æãð†cÁo䲨ÞâR¨ÈgA€8œT£”G‹¼7ç«?N'G%QÒ>êGü""7I( ¹{5!:%Ñ)òPD€Èì{®æjƒÑ<ƒýZ"×=o&v}dÚË„èî^—ÿýçÌ„·u…ß¿öAžØ®–ÿêó½W§¿Væw¡§Ú³|ï¦?2®&p 7:~$ü!áýpÃWéyµLÄ>¸fî»6Oáš÷ˆå;“~&E''Õ¤àL‡sVX`‘ÏR)Èe7™VB´£±¹C±‹W·±™3¸³®qý51½˜^LÿåN/ùŒÉsKé‰Î°ì©³3hÆtùÜÈ/¦ÿR§—H¢3p7ëˆOöØÿ}ý”¥:znÖŒ07MƒÛ&+^‰N%C&…‚$5No„9©j"°he¤š”bz1½˜^Lÿ…H?á §“ Ÿ yÄôbú›MïñGÈŽW"Ê’Âh>jÿõ·Þ&õH5ä2 ¾@JŠ;A-—¢ëŒj…·?ú›?A*‘ Ó‹éÅôbz1½˜^Lÿ©§—2Â,Ov¢–EnhøcküR <µ4Ž„øÄžùL ‡èìr E>4Þ_+ù|r³§On-ô–ˆˆˆˆˆˆÈçÑðß‚ ‰|ðÔɇý D„[œVù¨Ÿpøæ>D#‘§“@0xGä8Î;þ!‰Dp:ØíöYmý³H$‰½+׋Õf»ã}ÞçŸÏ‡ßï'ß°í|ÒíëóŠìñ'ÿûÜÜ\tZÝMß4:6Æo~÷,sçÌA§›}ßðÈv»“Ñø÷>zŒó/² ¼üc+pìÄIZÚÚ™SXxÇ Ååvóëg~Gvv&£‘½û066Nnn/¿úGç̹s$&$b6›Ù¾sùùøü~ÞݶƒªËÕ\ªª¢¤x.¡P—_{’¹Å¤¥¦Æt¯(+C"‘055Em}=o¼µ¥RF£A&“}`žÅsæ ×Ýü»ùäèìêâ·¿{Ž+uu\ª®&-%•Ä„„ëÒù|>::;±X,H¥ïk{½^^|ù;Nss J•’w·m§´t*•êŽÈ819É¡#GHJJ¢¯¯‹ÅŒT*eë;ïIOK»îûÔƒƒÄÅÅyñåWHNJÄl2}äó¬V+ÿûÿqf3é„ÃaÎ_¼D8Ál61>1AõåË$%&¢P(>4¿s.ðÜ /QQQŽN«½#e‰DØ»ÿ?ûÅ/Ù¹g/§ÎœÁl2‘••ù‘÷^«ËÕy¶µw Õh>R§[¥½£ƒËW®`0øÝs/PW_ORR"ñññwô9§Ì áPˆŽÎN†††Ñëu(•Êë §`€®î$€N§cl|œŽŽüþ ¥‚#ÇŽ³ ¼•RÉ[ï¼ÇæM›ÈÉÎ"+3“5«VÅ ö¦ ëimkÇj³±dÑ"*+Ê©\°€£Ç“™‘ÁØø8mí<úðCH$¶íÜÉœ¢Bòóò€èGÔ3Ï=Ïé³çèî顬t¹99´´¶Ý0Ïô´´vÖ"¿>¤ÕÊŸÿéSQ^3dv»æ–V¼^/F£‘ËW®ð»ç_Äl2a2›POw:«ªØµwëÖ¬&%%­VKÍ•ZV.[ŽL&½®ÛívZÛÛq8 d²¨›®áá‘0jµšþÔj5ƒ„Ãa<£cã¼øÊ+˜Í&L&GŽÃf·ã÷û‘J¤ †¨ËßPˆý‡³mÇ.RR’Ѫ5lÛ±™LŠ}j FƒV«¥£ÉdŠFÐ\.7Ûvî ..¥R‰B©`ttŒÿ÷ÓÁ>eÇl6sþâ%žñ%Q©TXm6&&'›˜@¥T¡R)q¹Ýt÷ôr¥¶Žæ–V6¬[‹^¯¿îŒŒŽÒÛׇÇãE¯×155EwO/>Ÿ½^ÍwlœÑ±1¼>:ŽÖ¶vþé_ÿÌŒ /ZˆÇã!;;‹ÌŒLúúûÃf·!—ÉP«Õ³ž×Û×Ç?ýô_±MÙILˆÇd2!•Jéîéá?~õkL#6»-ª¿BÁèè(¡p‡Ãy]ÿæñxhimÅjµa2cïôj܇úÆ&jj¯°yÓ&Š Q)•LLNât¹Ðët¸ÝnÆ'&0èõا¦èîéÁçóa0˜´Zñx½h4†‡GH$±~ñƒëÏýttu …Ðëtô 044LO_/zŽá‘Ѩî‚@œÅ ÆÊäªë£££ôö÷#Âm `ÆÆÇinmeÒjÅh0PS[G$!%9…³ç/°rù²Ø;»XUÅ®=¿}}ž¸YÃ/¿õŒjjë(/›Ok[;vîÆh4r,r‚ᅫÎN¬6+U—/c±˜yýÍ·ðù|$''‘–šŠÛãÆjµ2¿¤„3çÎ308H_?Üw—kj°OM¡+Ðj5|ï;ßæÂ¥K ÑÛ×Ï£?ˆßççä™3$'%!“Ê]ÝݘÍ&Ú;:øÓ?ú1]\ª®F©T’˜À>ÂàÐ0^¯—ø¸8&¬“¼þæVr²³(ÈÏ£tÞ<~õÛgHLH =-5«W!‘HH¤  á÷ûÉÌÈ@©T’•™I0ÄfŸ"-%™LFzZuõ ( Nž>V£%''›Ý{÷‘žž6ݨ£º—–Î*O¹\\.G©TN{a’|`žy¹¹ŸvÝ™fîÜb.\¼Ä[ßfͪ•$ÄÇãp:yþ¥—‘H$ا¦¸ÿÞ{èì좯¿ŸSgÏ’šš‚ÉhDz{ûp84·´008Äc<Àá£G©º\«Ã?øÏ<÷<‚ ’œŒÅl&11z÷艄Ãa~à~þáÿü#ë׬aã†õ<óüól\·Žã'OGÿ§Îœ%5%•H$BsK+.·›]{÷ò_þò/0›Í„B!ZÛÚèîéæÌÙsžsç/² ¢Œ•+VðÂ˯pׯœ8u ›Ýëß¾óÍo°kï>FÇÆðûýTVTpÿ½÷\§g_?§Ïœ$8º{z¨(/ ±©™³çÏóŸþôO9qê4ƒCCÜ{÷^zõ5TJ§ƒ»6l §¯©DÂ=Ê‹¯¾ÊúµkX¾té‡ÖŸß>÷<_{òIΞ?ÏÔÔCCÃ|õɯðêo˜˜ˆ×ã%))‘’¹Åôõ÷qþâEÒÒRIJŠÖË™29ñ"ééŒóî¶í zO~å æÎ™sKm®¾¡‘ú††GFYXYÁLü¦cUÌp'Ûב[^ã·Z­ŒŒŒRTXÄñ“ÑŠ¬T)©©­%‰°léV._ÎSOÎÂ׿úÜ{ßÿîwHKKýÐ<>#Ó{"PVZÊ_üùŸa6™øÝó/²s÷ZÛÚ¨©­E­V399IÍ•ZV,_NQa!ðoÇ>Ü$ TPTXÀWžx“É«³.—ëº:ìžÞ"—É).*Â`0Ää¨(+££³“‹UU(•Jºzz8á"f³™”Ô‚Á Ë—-eNQÑ´ 9Èdr6oÚÈw¿õMB¡V+jµš•Ë—3¿´”ï}û[ÄYâÐé´<þÈ#<õÄãŒOLPså 5µu1«.×¼_((•J¾õ§ùÑþ€Ö¶6òrr).*âчâoþê/yôá‡ÈÉÎæ?ÿÅŸsׯ}ø!þîoþšæ–^zõUZZÛøë¿üO<ýÔS(• $’Ù]U0dמ½¤§¥ñÓÿûüÅOþŒº†<7ÿûïÿ«W­ä÷¶a³ÙÉÊÊä¿ÿ׿Ád4QߨÀƒ÷ßGJJ2ôÃ?äÿ÷?PXPÀØÄûdÓÆ üí_ÿ ññ75­^¹‚¢ÂB}øaþô~[~¨\PÁœ¢9|õɯ°bÙ2*ÊçSu¹†¶övüy¹9³ú7—ÛÍ¡£G9sö …¿ßϹón¸×  #“Ë©\PAiÉ<¾þÕ§bK©¥óJ˜šš¢µ­†¦&ÊËæs©ª­Fßüø‡Üµa‰î“¢ú„Ãa„«Î}}`ý1™ÈÏËeAy9éééXí6Ú::P©T<úЃ|åñGé¤dî\æÍákO=É¢ÊÊX¾3eòôSO± ¢œ#ÇŽ1¯d.ü£RXXÀ‘cÇoy½½¸¨ˆÂ‚´Z µuõøýþè ™°Í’;Þ¾¾ˆÜòˆ¿©¥ƒ^OfF:R‰„øø8æÍ-f~I i©©\©«ÇëõâñzAˆn"òx½( ©”Úº*ÊËðx<¼þæ›”––’˜˜} €\.G&“ÅÖ¿=Ƽ’‰„ÃD"\n¡Phz*F@.“!“JQ*‚€B!'9)‰’¹Å¬^¹‚Œô4¾ùõ§c:¸Ýn¾ûíorèðQ^xùþòÏÂ÷¿ûmΞ¿À3Ï>ÏŸüø‡„Ã\.7Z­©TŠÏçC"•²s×nNž>Ã|÷ÛètÑ©GŸÏ›Þ’ËåܵqC¬ƒ·˜Lx¼^ÂáHT÷²ù( FFGÑiµF*ÊËÈÉÉÆd4ÆÖ€?,O‘Ï“V+‘H„Í›6ár¹ihj"#=VGVf&s‹ç‘žŽL*% ãr¹0›L±õΙŠ4ÖYA Äãñ"“½_‡×¬\I|\AÀãñ x<ŒÓËVwª}}¹¥(¢æJóJæ¢V«Ù´a=áPˆ‹UÕôôöJæÓ?8È{Ûw——KZj*?ÿå¯xùµ×ihlbrr’y%s‘M¯Ÿutvâtº0øvîÞÍÏù+’’©¬X€J¥¢£³‡ÃIZZÖ­c÷Þ}üü—¿¢¶¾µZF£@«ÕÇ–»614þõMüǯ~Íèè}ýýüŸú'þúoþ–ÿü_ÿ–ÿ÷ÓÅ>5ÅêU+¢º¼ð.— ˆÎ”Ì+)fûÎÔÕ7GnN6uõõ,Y´$ÌêßؼikW¯¢±¹™š+W˜ššÂátòö»ï19=ÑV‹R¥¼n/–T*eÉâEÔÖד——‡Á gù²¥¨Uj~ù›ßr©ú2=p? TÐÚÖÆ¯û V«•RuSõG©T"•Iinmô:]¬¾Èd2ôz=Z†’’¹1Ýg˜)“m;wRߨÈÝ›7388È/~ý¬6[6Ï^Fù($R):ŽÁ¡!†GF°XÌdfdp©ªšÎÎ."á;ví&8}¢äNµ¯/"’7·¾)lX¿Ä„^Ïðz}lßµ“U+V’9½c×f³a³ÛÑëôÄÇÇ!‘H°ÚlH$â,ü~?#££(•Jl6-­m<üàÈd2ìö)Æ'&0 ¨Õj~ñëß“ÅÒÅ‹IOKC£Ñ¼ŸÆ`@¯×¡ÑhÇãñ””‰ Óép:(U*” “¸Ü.Ìfslª}×ËÈÈ‚i©)ÈdrFFGðûý$'%a4±Ùl8].ÒRSÙ¹g/£££|ãé¯ár¹¢SeÓ`Ün7?ûůø“ÿÜœ<þ@‹Ù €Ãáàg¿øùy¹h4¼ÿ>d2V› µJ…ö;•{ûú>4O‘ϯ›ÕF  Îb‰Žêˆîâ $&$ Ñhp¹Ý¸\.,f *Ut)) áö¸Ñët¸ÜntZ-V›H$BRb"““V\n³ƒÁÀøÄ‡“øø8âãâfÕißôHÊl2áóûñû|˜L&ÂáèLƒÑhÄãõÆdðü( ”J%‡½^‡\þþ Ý>E Àb±àv»Ñé´ÓÓ¤nL&#~¿ÿ:!úÑjŸšB§Ó!“Jq8ÑNT°ÛíÈdrÌfSlÚÇíáü¯ÿÍÃ=ÈêË1›Í( ö©©èlƒTŠT*Ãë›þÀ¢ù&“ §ËÝ›M&Sjµ“шsº½šŒF¦¦Èår´Z ““ÖèŠBÍnG­Rq8ttvñ›ßýŽ?ùñ™SX;Ê(“ˈ³X®Ñ%6Kç÷c·Û1 è´Z9ÂÙóø›¿úKd2ÿ÷§ÿr]ÿ …#’OõåËœ<}š¿øÉOÐé´±|Êér¹Ö(Y­Vþ÷ÿý'¾ÿÝo3·¸ˆîhŸÙŒiž®Ã##ü FFƒ1V?¬þŒOàtEߣN«% ¢×é„èì©É´]­{,ßkÊÄétár»0 ×»©6çñ04<‚V«A¯Ó¡T©Åb6ãõùˆ„#¤¤$#‘Hîhûú¼ …èîî¾áQÝ«}õß’á‡hþÝÝŽ‚uds£é¬p8Ì?þóOYµb9ëÖ¬ù´Ëo#££\¼TÅæM›P«giïè µ½ƒ{6ßõåröüyä2‹-º©Êt3yŠˆ|˜˜˜ä¿ÿÃÿâ«O~…Õ+W|ª²¼þÖVΞ;O0$++“?ýñn{­7 ñ³_þŠÒy%lÙ´‰P8Ìÿ½‰þmxd„H$rK'wN>é³gùËŸüÙu'˜D¾\|b†ÿ“BªkjHMN!=ý³w\-¶{ô×4ètÿ¥½™ïZZ[IOK'>>îãgø1¡««FÜ¢ÂÛ‘Îàóù9uö •ÄÇÅ.BýÛ•Ú:D7é‰|¹ùÜ~‘['zøÓ–Bä³ÀÍ~ÑW¿ˆˆˆÈçÑè‹Ü*¢áù!~‘ÁÇ øñA÷^}Ýf‹º½•£œmíìÙ¿Ÿ‹—ª§º¦æ ê28õ¬ùazÜl9ƒA.×Ô`³Û?¶\>Ÿ3gϱïÀAºº»ïXp–™||~?ýý7ìèƒèéí¥µ­íCŸóûDjëëgdt”úÆF"7ä]äsƒhøEDn“ŽÎNvìÚ}Û÷ï?xˆúÆÆ½ÞÞÑÁ{Û¶ÇÙ|ccc<ÿÒK  Q×PO{g'ïmßu¨õ qöÜŽ?>ËëÜ…‹—8~òu¼òÎ{ÛùȼÜïnßÁàààmÉru:s†]{÷24‘¨O‹÷¶ïàbU5ãÜ{÷Î]¸€Ûå&99™¬ÌLNŸ9‹B©`Ë]›ˆ‹‹cûÎ] ‘“M^n.o¼µ³ÙÄý÷Þæ J¥´µ·óú[oa1›yðþûÐj´4µ´ðËßüNÇ£?„^§cÿÁC Œ°°rK/F*•"‡£µ­„øxLF2™<êaM"attŒý‡áóùX»z……T×\¦úr f“‰{ïÞ;»=11Áö]»q8”Í/eÅòåœ=wŽÖ¶v²³²Ø¼icìèX(äÜ… LNZIIIfŲe¼ùöÛÑà;F^k+u <òàƒH¥R››p»Ü°fÕJ&&'Ùwà £££ôõ÷Ï:òëñx8tä(=½½”•–²bÅr.×ÔÐØÔL|\ׯ£¥­†Æ&N'é©©,]²˜Ý{÷ãóùp8d¤§ãõz9|ì8ÈårÖ¬ZÅàй9Ù¤¦¦rèÈ–.ZÄ™óçq»ÜQo¡Óæââ,,Y´ˆ7ß~«ÍÊøÄË—.A©P‡9wá"MM7”'5%™î½7æ³#pìäIšššiko§rÁ::;9pè0¡PˆË—ÑÞÞÁ›o¿ÃÀÀ?úãœ9{¥RÁ–»î"?o¶ÏH$Âá£ÇÈË͉êrø«W® «§‡ªê˘M&îÞ|U—kÞ×÷ðV¯ZIUu5MÍX,îÙ¼™L  IÔû^Oo/Í-Üw÷ìv;g/\`Óúõ1ß "Ÿ?Ä¿ˆÈm PÈÉHO')1‘²ù¥Èd2ŽŸ8‰D"ÁlާRkÔØl6ÞyoéiiÌ+)áè‰ôôö’œœL~^y¹¹±£›‹…¤Ä¤Y×uZkV­b|b‚ÓgÏrèèQêIKMå­·ßa`zt<Ü)))‘ââ9Ô76àp8¢ÎLB!¶¾÷v»•JÅ«o¼ÉÐ𯿹•RENNö¬ã£r¹œü¼ŸS§Ï019ɉ“§@"!33ƒÄ„”—ÑÒÚ B“šJFz:%Åsp¹Ý\¸t‰ó/±{ïËsúÌYÚ;;cåu¥¶Ž“§N³fÕ* £ÑðTjJæc0xûÝ÷Ðét$ÄÇS6¿“É„^§§¢l>n·›÷vìˆy§›!"\¬ªz_—3gèäõ7ßB¥T‘›“ƒ³Òœ<}§ÓI||<åå´¶µqøØ1®ž£„¨¾3gÏÒÛ×Gm}=ííŸX˜]‘ߢṠär9ÙÙÙ¤¤$³tñb´ZmÔ5íʤ¥¦Ð70@wwV› ˆºkíïï§©¹§Ã‰T*%5%…¹ÅÅ1×Ì5 3×órsA"!%%™ *ÈÏËÅjµÑÚÚÆØØ8­ííÈåòYkÌ)))ÄÇÅQZRs>#‘Hp»Ýttt084L?2© VËÝ›ïb`hš+µ³öø|~Ú;:èìêbÊ1…^§gÃÚµÔÕ7ÐÖÞ>kZ_‚„Üœ*+*HNJB232ÈÎʦtÞ—k¯ÐÙÕÍâE‹Ðjµx¼ŠŠ )/›Ïá£Ç¦æD‰Lë-´œ:ŽžÞêˆD"Èr.\ªš^磥µ•ή.ÊJKINJâØ‰“ÔÕ7Lû©–‡L&#+3“ó.P× ‰›Ÿ—GOo/§ÎœåÔ™³äç£RF§Ü#‚@DˆFߌD„¦Ë/ZnYœ:{–ËW®02:†\.G­RÑÜÒB]}}ì#-4]ÞV›ƒ‡P<§¬ÌL"Ó®Á{z{¨oh  ‰D(ÈÏ¿)yfÈÎ΢­½ƒªêËôôö 9vâ$¾éм3‘ gÏ_`hx˜ýÇÜâh[¯×ÇÔÔT,Ïh $uL›Ý†Ïç#%99ú~«/ÓÛÛ‡F£‰¥±O‡H>x$ªcfff,¿¦¦fÜnCÃÃôôô²tÉbŽŸ8ÉàÐpÌ-°ÈçÙãO<þ÷¹¹¹×ùpL&>¯—±ñ1 òò‚âããHIN¦±©‰Þ¾>âãâ(*,ÄétÒÕÝCjj*eó)ž3‡Þ¾>Ôj5Y™Y±ˆbñqqôöõ£ÑhHIIA©TPTXHÀï'>>žË—111AcS¡P˜ü¼¼XD´Ð´.*( ‰0¯d>Ÿ·ÛÃæM›èë£µZMJJ2gϧµ­²ùóY¹|jµˆF¿add”¼Ü\2ÒÒ¹\s…ááaV¯ZIùüù±²ÏçÃb±•™‰Çë!+3“¢ÂBÆÆÇñûüÌ-.Æb1ÓÕÝMRRÃ##TW_Æf³QZRÂÆõëÈÉɦ½£ƒÞ¾>ÒÓÒXP^ŽÁ G"‘‘‘ÁØØ8µõõ¨”J/ZˆF­¦©¹™ä¤$î¿÷žh¹ÅÇ‘™žŽÇã!7'µZCBB<‰‰‰h5ZÖ¯[‹Íf£¡©‰îîn*ÊË©¬(§¡± «ÕFNv6eóK‘H ¨ €ø¸¸é‡vŒFe¥¥TT”3>>ß '; Ö¬Z‰^oøpy²sˆ‹³œ”4ðì j•š²ù¥”ÌKww7.—‹9EE,ZX‰^¯£»§—‚¼|“hmmC*•2o^ M´´¶MË+™^b2ÑØÕ%7'›¢Â"ªkjhm¾ßU+W””DãUú.]²•REKkF£!)4+‹ŽÎNæãt¹É¤”—•qöüy òóY³j¥èUô3J$Án·ßp#«D"! `µYEÏ}""Ÿ$׺j‡#ÑÍSŸ@Þ7›öÚûBá0òÄ„¸6¶FtùØñ#^zåUÀÓO=uÝ”ñ‡é‰D> líÍ ñûý8].~ö‹_ò•Ç£rA‘HdV×kù8ñI>Œku½Y9/¼ü +—/§t^Éuetm׾ߥ¹VÇÙfþv8üô߯>ÂüÒÒ;^"w†›õÜ'.Ôˆˆ|‚\Û‰ß)££¼o6íµ÷É?À¨]k$É1€m44îÖ‰?L§côhøí={™˜œ$/7—¢¢Â›Ê÷“ ”u­®7+‡R©ä¾óíÊu£<®}¿7Jsm^3²ÍüÝÓׇN«%?/ï) ‘ß/¢áù½rÿ=÷|*ÏMIIæ+=J8Æb± úG²û}GíÌÉÊæ»ßþš„ùü!~‘ß+ÚOÉx( >mõ?—àöB‹|öwõ‹ˆˆˆˆˆ|‰ ¿ˆÈg™t;KàvüÅß ×¸Wçõiø¬ù"#~‘;D0dxd䎾–Ö6^yýõ\çäéÓìÙ»÷¶åß³oÿ c |<÷âK7ô_?119Ë‘ÍGáõzyáåWhikãÈÑcÓçûožH$ÂÈè(~ÿ' HDäóˆhøEDn“H$¤ÕÊðð^¯öŽNþãW¿¡½£ß´ás8ŒOL‡ÃÕjÅ>5E(bdd„ñññ˜±õôõ÷ÓÒÖJWWwlÄ.§“P8L(Âét …°Ûí Œ044;Âãv»éî项¥…Á¡aìSS  áóùp¹\Øl6&­ÖسÛ;:¢òwFåohl¢¡±‰ŽÎ.=v­ÌWSS[G @¡P0>1ÁðÈ¡P¯×ËK¯½ÆÁ#G±O;žñz½ 2199+/AŸ˜ ½£ƒ¦æfÜn7…˜ššbbr—Ûßïgph›Í»w&ÏÉÉIFÇÆøÕoŸ¡ºæ2.·ˆúý-r¹\ØìvÆÆÇ±OMÅf9œNçÇŠº'"òYFÜÜ'"r›œ¿p‘ý‡a0X±l)­míÔ\¹‚T*á›O?ÇãfÏþÄĸ÷^~õÌ3ȤRŠ‹‹Q(´´¶‰Dظ~• ðÚo084ŒÕfC§Õ2sàËåróË_ÿ–¯=õB¡o¿·‡¸Ÿ_?ó,ÉI‰LLNrÏ–-T.¨àù_" ÒÕÕÍÒ%‹iïèàmÛ"yê‰Çy#33ƒ¯õ«èõ:ο“ÿ_û‘H„“§OÓÚÖ†R©äOü£iïzõD ëÖ²jÅŠXyx½>š[ZØr×&.UUsèÈæÏ/%'+›‹/ÑØÔ„T*aåòå¼þæ[LMM‘““Íã<ŠV úrîÂö8ˆR¡dxx„p8Lm] …œ»vc6›Y¸`££cŒŒŽ O<ú‰‰‰¼üêkLMM‘—›‹N§çrͦ¦€„Œ´4¶¾û.~¿•JÅ=Êö»G¯Óãñzøþw¿ƒ^§ãÙ^äë_û*i©©Ÿv5¹ãˆ#~‘Ûdph¯×Çâ… ),(`åòeÌ)*âÿà{¤¦$³c×–,\È~ðŒqú\4„ë½÷ÜÍÒÅ‹8|ä(I‰‰H¥R:LSs3]Ý=üÑÿ'y•J ˜"اì„B!‚Ó#ß@ ˆD*áOU+Vp¥¶–sç/ ‘Høó?ùc6mXO$æàá#ØíSdNG ìëÀãñ°hQ%O?õ$:‰DÂÊË™STľ÷]òór‘J¥lÞ´‰~ÿ˜œœ¤¾±‘ý‡‘””•ùàáY#õ¡á!|^©É)ìܳ…RI\\{÷ %%™Šòr¸ï>îÙ¼™‹UU„Ãa~ò'Ìã<‚Fõèöx8xø›7nä~ø²³³‡ÂLZ­x¼^Aàé§ž$!!žÓçÎ’••Åää$'OæÂÅK±<}øaV¯\Añœ9|ãk_eñÂJö8@BB?þÃ`2ÙðN§“…• øÑþ€ä¤$.^ª¢¥µ-æAQD䋈8â¹M6oÚH||<ûb``€•+–#“IQ)£; `¶˜1¨Õ|> ¥’Ä„”J%áH©TJqQ‰‰ ø}~¤R):­¹\ÎÕî]¤ ‘ˆ@(ŠùÅP«TFŒ&#‚ àr»Q©T¨Õjdr‘ˆ€ÇëE¡£ÕhxèûIHˆG:mØŒFcìjµjÚç» ©L†D*A§Ó¢ÓjQ«Õx<^¡÷eNHˆŸå„¦æJ-™™˜Í&|>q ÉII.³ÙÌŠeËxoÇZZÛX¾l *• ǃ\.… ù" ŽøEDnƒp8LÕå::;‘J$ƒ!Ì&3:­Ž^y›ÍÆÚիسw?¿øõoGÂ,[² Ä"Ç-\°€ññq\.J…’¹ÅsP©Tüǯá#G‡#1ã¯ÑhHLˆç­wÞeçî=øý~$Òht9Aõª·xa%ƒCüò7¿åâ¥jTJ%«–/Gl6‚  Ë‘ÜÀ{›ÉdB§Óòâ+¯Ò×ׇ\&C‚¨áMKMaaåU2+U1ƒìóùhji¡¬´ƒÁÀª+p8L9Èdrr9¹9Ù=q‚ã'ORYQN_?¿øõoصwol3 Á``ñ¢…l}÷]^yíuÆÆÆ‘Ê¤ÓQô$H¤"‘……æç3:6Ž×çC­V³°²2–çî½ûÈHOãíwߣ¡©‰õk×P[[Ç/ó[ZÛÛÙ°nÝ,¯vEE…øý~::;)/+Cž{ñ%Î_¼øiW7‘;Šè«_Dä6¡áaºº{ШÕÌ)*Ä`00<2ÂÄĹ99h4zûúp¹Ýdfd`4è 99ZË펆põûÉÎÊ"5%…I«•ÎÎÎè4¹ÅBfFFlÔ;>1AKk+z½“ÑHrr2ãããd¤§ãr¹q¹]¤§¥184ÄÀÀ Z­†¤¤$’ééíedd”¸8 ¹¹¹ŒcÐë1™L³ôš‘?''Ç”­N“;%9™p8LÛ52ŒŒŽòö»ïñôWŸ"Îb!ÐÑÙ…}jŠ´”²²2ñù|tu÷`6›HOKchh˜Þ¾>ââ,äçÇ\øÚÚ;ðx< 2ÒÓ°Úl F¦2ÒÓËåX­V:»º‘H$äçåb±XŠåYXP€Ã餿€´´Tâãbbr’äÄD’““Â`ˆ–ƒ <û‹x<þìÿAèîîÁh2’ÿiW9‘äf}õ‹†_DDäc‡ ƒ±è~ŸG\.?ý÷Ÿóà}÷R¹ âÓGDä–ƒôˆˆˆüÞÉd¿wÿñw×KQaùŸ¶(""Ÿ(¢áâãyòñÇ>÷0""…høEDDDøøaED>/ˆ5]DDDDDäK„høEDDDDD¾Dˆ†_DDDDDäK„høEDDDDD¾Dˆ†ÿ*Ün7Í--ƒ7•+ ÒØÜ‹x‰Dðx½„ÃáO[‘ß#b7‘ϲǟxüïsssÑiu7}“Ãédמ½¤$§ Ñhfýæ÷û †B(ä|` ¡±‘šÚ:òórgùú>sî<@€¸8Ëm+ÔÕÝÍé³çbAFn…ó.rôøq–.^„Ç륣 x½^Ξ?ÏØø8q–¨Œon}¹\AjJ2»÷îcÛŽ\©­%9) ‹åöõùì3åp°mÇNöí?Hm}=ÉII˜¯ñ„Qç6^¯¹\1«¾‡ÃaNœ:Íž}ûèëïG¥RqòÔi²³²P(wDF§ÓI}c#³™@ “áÃÚZ0Äï÷£P(C?yƒÞ€N§½©ç½þæ[Ó>õ£Þî"‘ÖiwÁJ…¿ßÝ>…ò*_üDcS3û$7'µJuGÊD::;ysëÛ9zœÖ¶6ŒFq7”çZ]®ÎÓãñ •Éîøé€‘‘Qº{z0 ì=p3gÏb1[°˜Íwô9§¼>_,ÍÉ3g±Ú¬H$üþ‡H$™³çhjnÆnŸš5Šòù|ø Z™f¼„ÍŒ¬ƒÁ`,ýÈ諪ˆD"Ñ€&Óàõz ^•g$ÁãñÌÊãä™3T.X€J¥¢§§—êšäòè™Þ@ ÀÛïmãù—^æ™çžgÇ®Ý(•J”—súÌYBá0 ÊËùÚ“O¢R©Ø{àà _ä‹ÃÉS§©ohàž»7S2fˆ}$ÎÔ·Á¡!~ûìóL^w¾¯¿Ÿí;w’ž–†T*e|b‚ —ªbu=Äf“fðù|X`VОH$ûw8Æëó122Bo_?Ï<÷¾ ÔÖA ®¡—_{=ªC0À¡#Géíëcjj*&ÿµ:Îàñz9rì8}ýý±|Ýn7ÿôÓåÀ¡ÃƒAj®Ôò?ÿ¿ÿÃÀà áp8öçÚ™“P(DOo/ÇOœÄëñÜð‚0«/˜¹oFÎH$Bxº/˜¹6åpðïÿñ ê+uuttvÅÒ_éj\Wérµ¼N—‹g_x‰ŽŽÎØý3D"‘ØŸP(Dðª¾qæÎ¼óár»çÊ•ZŽ?AA~>Fƒ>úާó)‹«Ÿ ‡#³d¸¶Ž|Tý‰D"‚AÜnw,ïp8ŒßÀåv_§ûÕÏ¿Ñõˆ \Wo…p8ŒÇãÁ7Û¡µ­ŽÎ..^šUŽwª}}¹­süWjë(™;·ÇÃK¯¾Æ”ÃAÉܹ,¬¨`מ½Xm6N'O>ñ8§NŸ¡úòe, O=ñ8R©”þ6oÜÀ…KU>z…\Î#=H(b߃\ª®&=-oãëT]®áÔé3ÈdRî»ç,3Ï¿ô2 ¹œ…••‚À•ÚÚXQ‰D‚\.§§·—ƒ‡°iÃzÚ;:©oh@¯×óø#`4xgÛv‡HMMá‰ÇÅn·c³Ù(*,œÖ±–¹Ås0 Àûg|{{ûH%lÞ´‘H$BQa!ïnßÎøøYY™¸Ýn|>?©©)³Fw"_<Ôj^¯`0Ȳ¥KÐh4C!öîßOccz½žGzˆÃGŽqðða¬6+ßøÚטSTˆ ;q’®îŒF# …‚ä¤$d2R‰”æ–VöìÛG0dÅòå,[²˜}ÐØÜB¼ÅÂã=JB|<‚ °c÷nLFkV¯âßÿã,^XÉ’Å‹yùÕ×(›_ÊàÐ0í]<|„IkT†µ5µZ×ëe÷ž}T]¾ŒËåâ+?†ÓéâÍ·ßA©T°¨²’ûg}Æt|ìá‡IOO¢£Šp$Âko¾Åž}ûY·f5‰„‹UUttuQ_ßÀää$5µµüã?ý3ëÖ¬¡§·§Ë…ÇãeýÚ5lÚ¸cÇ£Á|FÇÆ‘J$7lKccc¼±õmºº{ÈÊÌà±GáÔéÓ\®­%!.Ž'Ÿxœº†Fª«/G#%šÍ|ûë_g÷¾}\¸x‰üü<$H˜˜œ ‰ÐÜÒÂ[߯3ý‘ñø£°lÉ’YÏþs ‹Ø±kcã$'%òЃÄfNo–ã§NqúÌY"‘÷ßs72™©D ’hª™Zr§Úו[ñ{<:ºº(-)áÀÁCŒŽ1·x{÷íÃãõ²°r‹Vòàý÷100Àé³gyâ±GyâÑG1›Íttu¡RGÆîÞ³—ëÖñͯ?MFz:i4&ø7žþM--457óÞöí¤§§!‘JÙ¶s'.·›Á¡!6nX^¯‹ÆîÞ´‰åål}ç]ìv;ý<÷âKÌ)*"‰°wÿŠ‹‹æðÑ£\ª®¦º¦†²²Rªª«©¹R‹Ý>…D"!!>>ªcg'e¥¥±'"¤¦¤°níî¾ë.’£± ´:-R© —ËE8æ­o#îݲY4ü_pV­XÁæMÙµ{ÿï_þ•ºú:;»Øà`¬¾9~œE‹*ÉÏËã©'ž ++ˆÈвùäçóÐý÷ãp8ðx½H$¼>/ïnÛ†\® %%…w·mcxd”§Îš’ÂÊ+Ðj´±|¸pñ"ÍÍÍ\©­ãRU5WjëC¯ÓÓÕÓCyÙüY2ÌjkÍÍŒŽ VkX´°’¹Åsxò‰Ç1›Ì¨T*î¿÷nî¿÷^Î]¼H]CûŠéxèÈ‘Yå"•J˜?¯„â9ElÛ±£ÑHzZ‹-äÁûïcÉâE$%&rÿ½÷R5ÅØø8j•Šâ¢"$€Éh¤¨ AÐj5”Ì-¦t^ ^Ÿ·ÛËåbjÊAzzN‡—ÛÅÐЩ))dddDCyz¼ QTXH|œ%úå(•"“I§u„‚égD"TJ%›7mä[_š¯í«¬[³&æÚS¡#“I …BÈd2ô‘뢞‰|ñP«Õܳe3ÿù/þ)ÉÉlßµ‹ñ‰ \nw¬¾eefb2ÑhÔ¤§¥¢¹*ˆN§C£Q“Jùþúµßïgbrû”¯×KÙüùÄÇÇñío~‡ÓÉÖwÞel|,–~nq1¯—}²vÕJ܇eþ¼yèõ:dR)f“ F“á궦ÓéLOJ¥Ìf:­Žô´4 9J…‚ä¤dRS’QÈ匎Žá¾FÇ(ä –.Yºµkʤ z,39YY,¨(§ ?½NGÙüR2ÒÓQ(T”Íg˦ÈdrQ*•lX·–ù¥¥Èd²Ø4ùÌŸ@ ÀàÐùyylX¿ŽU+V0åpφµk©(/cpx˜`0HfFwmÜ@vVö©)Š Ñët,^´»6n )1 ÇÃ䤕E••¬]µšø8 Ä– f¦ïÓÒR±˜MädgQ:¯$QÐ`4 ÕjHNNÆh0°dÑBú8pø0餥¦"“JÉÌH§¢¬ ‹ÅB{G'SSŽ÷û·9E7,ÌÌbêt:´-‰ ±¾'#=Ô”d9Âèè(• 0::FJr ùùÌ-.fÒj% "DgO¤³gP>°þ”Î# røèQ›šc˺†ŒôtÒÓґʤè´4š¨î½>–ïL™¤$'£Óé#?/¼¼\rsr»¥)õP8LUõeNž>ÓåÂçó‡‘0cû¸J¯;Õ¾¾ˆÜÒT¿ ÔÕד—›‹ÉhdAygÎ'#=­V‹Á '1!ó.rèÈŠ ñz¼¼òÚëdggQ˜_@o«W­$%9™8‹™W^{9EE”—Íáý5¦p8LRR"s‹‹Ñj4ädg“‘žÉôº]˜Â‚9Ê˯½ŽËåbNQ Ì),bÉâE¼ñÖVî¿çr²³1™L$ÄÇ““MbBWjkILH@¯Ê,—Ë‘Éd SߨH^^.zŽË5W¸RWÇ·¿ñu¤R)¹99³ÊÄjµ!•J±X,ƒA<O¬3ùbsôø Ξ?OrR½}ý,^XIA^ÙYY±ú–•‰N«C"‘ðζíÜwÏݤ¥¦ ﯽ†#Ôj5“““T_®¡dî\lvÙYYÄY,ø¼ÑÕô´4š›[°ZmädgGzZGçÿ×?°ïÀANœ:Í׿úU‘0:‰„¨ wß=«­E"‘Y#ê8K“V+ïmßÁª+ˆáý´y¹¹³uÌκênp$B8"2½F,—ËÉÌÌdÛŽ ³nÍjþïOÿ…%‹yãí·ÑíÑ’”˜ÈWŸü /½òÿü¯ÿÝϲmç.j®\AˆB„µkÖ°rùrÞzûþæ¿ýwâ©(+£ªú2÷?ÿñ‰ 6oÜÀÄädl/O$•?ŽD÷„„BQÃn±XXºx1;wïáÂ¥K ÑÕÝÍ_ÿíßaµZ¤¤d~ð½ï•Ŷ;äßýnt*Y®Àd2±gï>¤R)yy˜L&víÙËßýÍA&“ ©¾\ÃÄÄ$^¯—ukVc·Ûcý[zZ¡PˆÎ®.²23ÑjµÓõD 2½?jæ=Ì P(X²hÿòóŸ³aíZ’©(/ãå×^çµ7Þ¤·¿ŸåK— “É8vâ;wï¡··wV=þ°ú311IwOë×®¥¥­mº>EÞ—'A¡˜­{qQQT¶é2Ù½w2™œ%‹säØ1ìSS´´¶rïÝ[niV4 ÒÐÔDB|Ÿï3{Ì­¹µ•ÃGŽòð’šò¡GÜn¿{þy6mØpÃM9"""ÎÄÄ$ñ×ÿ…ï|뛬[³úS•åÀ¡Ãô÷÷361AWW7ÿð?þ.6;s«‚À‹¯¼ŠZ¥â©¯šH$‚ÏçG£QÇ3kówú´ÏçC&“}aÒˆÜ<ŸÈˆ_DDDD䣑J¥hµ³g7?©ã½â~"‘[EôÕ/"""""ò%B4ü""Ÿa‚ÓîRoå¼³Çãaxd»ÝN À~•«ÝOŸß×ëûø"ŸššºÎ­íí V›‘ÑQ¼^ï×;‰àÿ˜î]=.—ëŽËöqp8øýü~?§óÓGä@4ü""·‰Õf£©¹å¶ïokogllü×;b×›[[yíÍ­7m¸ÝnϾð"¿}ö9žé®ÔÖñ›gžÅårbåpüÄIší…m``®î j ëc¾Ý? ¿ßÏož}ŽÎ®®-Wcs3ÿú³Ÿó̳ϱÿà¡;5ój½&&'Ù±kWÌÅïípìÄI¶íÜyÝu¯×Km}ýï=Òg8æÅW^¥¾±ËWjyõõ7bþþE¾8ÜVt>‘/;Á`={÷±}ç.âãã0 ôõ044„ÓéD&—S_ßÀøø8f‹‰DBSs Í­­„¦ƒJýê™géÀg!n:ÍÄÄ¿üí3ô ‡ÍnçèñãÈår¬V+ñ ñH¥RÚ;:hmoG©T¢Ÿ>-gÏŸgï¬^¹‚Ô”ôµõõ¬\¾ ©TBCc}}ý zT*Ô76bµÙ0›L±³Ë¯—ºúz::»Ie ‡†hlnÆëõa6›bñ+.VUÓÐÔ  ¢R«yõõ7¹pé‰ LZ'ùåoK0$ÎlÁï÷ÓÛ×G_?ƒ @Cc#µuuT_®aQ傘[lAèê1ú ³ÙÌÄÄ$­ímx<Ì&£cct÷ôÒÚÖŽÏçG¥TòÚoâñzY²x1)))¤¥¦ÒÕÝCSK “V+J¥’‰ñ d29=½=¨”JzûúbjÊÕf¥±± ‡ÓR¡àµ·ÞâÂ¥K$$ÄcÐëq»Ýdefb³Ûim»±<^Ÿ‹Ù+/èàò•+\ª®F©T’—›Cm]=}ýýh4jêyöùÑjµÄÅY°ÙlÔÖÕ3:6†ÉhB©TΪ‚ DËó*]tZ-ö©©Øû5  ÏJ£Õhèí룡¡‘)‡“ÉÄ©3gÉÊÌ  ÒÓ×Gñœ"FFG±XfÞ]?½>æ=Pä³ÃÍžã ¿ˆÈm 9tä(­mm RR’ùÙ/IÿH$œ9{žÎînššZp8dgeqäØQú8tô(2™Œªêj<^ÉI‰äæä ‘HbÏþýx½^RSSËä;y‹Å±'ÐëôLLNòÞ¶L9\¸x‘y%%±c²/UQW߀N¯çÂÅKäåæÒÛ×ÇŠeK9|ô§Ïchhˆ¶ör³³ùõïžeppÇKfFºiçB“;y’ÞÞ^Nž9ƒÅlá¹_ÆãñàñxÈËÍí"ohläJ]=:­–}‘”˜À¥ª*FFF‰Ãïpòä)$R Y™™\¨ºÄî½û°Zmœ8yšÜœlΞ?Ïñ' ]]¬Z±‚Äiùæ o½ýþ€…\ŽD"áù_b||‚ó." PS[Çî}ûˆD"ì?xôôt.VUá÷ûgrÒŠL.ã½í;ìܽ£ÁÀ‘ã'P(ä˜M&~þË_“••Éožy–¾þ~är9ƒôö÷sôø üþÍÍ-ŒŒŽ‡V«aמ½$''ñú›o16>~Cyöî?ÀÜâ91ÿ%===üî…ˆD"ôöõ‘”˜ˆÉlâÂ¥K45·Pרˆ×ëåò•ZÔj5ùy¹ÑŸ¦&.\¼Ä„u’Ò’’Y¡n#‘¿}ö9”*åûºdfðÊëo088ˆ×ã%-5•×Þ|¥R1æWÌ-žCm}Ý===~¥RÉèèÙÙÙD"a†‡GÈHOç…—_¡¼¬ŒŽÎNvîÚÍÒ%‹?—n¾è|¢ayED¾ì¨Õj–-]¼y%|û_Çb± V©yüчY¸ ‚ªËÕ„Ca\n—ª«‘+äÌSŒÙdbÒjE*•2¿´”»7ofÓ† ±N¼ ?ùóJ¸{ófÖ¯]‹D*¡° €o}ã뱎÷ÔtXëp8Lcs3££Q¿â‰„ò²2 òyìá‡0›ÍD"$ N—‹“§OÇBÀV×ÔàõùÐét„Âa232Ð_ågÝd2QXP€Á` `‰ÉI´M4NGNÎu#ÎÅ +ùÎ7¿ARb"¡P˜E ²lé{øa–-YLaaO>þåeüJç•ð'?þÙÙY8t˜K—ªyô¡‡øúWŸ"3#ƒHäýа§ÎœaÙÒ%üá|µkVSU}“ÉÄÿðܽy3ÇŽŸÄívSYQÁ÷¾ý-LFáP˜ÒyóX¶d Ö­#ðsòÔi–.^Ä÷¾ý-Š f…ªE‚Aˆh4j}äaî»çnJçÍ#>.Ž@ €Õf£²rAT¯GF©R …¸pñ"f³ù屘ͱwPU}™´ÔT¾ÿÝï°rÅrA mÚ“¢V«¥³³‹ââbŠ ùö7¾NvV¹99¤$'#WÈijn¾n„@4ØÕºH$R´Z-¡p˜ŒŒ ôz‘™¥ D"Qï“ÅEEÄÇÅ †him¾7ê_„¨Ës£)ê¾¼¶Ž¹s‹Å“ŸsDÃ/"r›Èår|^V«p(„Dõ®T*Ñiuäåæðàý÷ñµ'¿BwOo¿÷II‰ÄYâˆD"H¥ìv;.—kÖo©TŠÝnmê“H$Hˆº,•*¥’ääd-¬ä~ø‡1wÀ3Ìä5s¯ßïÇíö R©ÈHOgÝšÕüà{ß%Îbá‰G¡²¢‚Wßxƒ¦éЭ«.qäØ1r²³Ñj4 ¾ù§ILHà™çžŸeÈ@"‘N“‘!r™ §ÓÅÔÔH$LZmx}¾¨a"êóÝï÷£ÕhÉdŒOLàt¹bƒÞ/g““¸=Z­—ÛÕfcÒjE«ÕÆlI¥Rä 9!rUY€…BÉÐðN§‹@ ˆdúcË>5…ÓéÄçó3èE¥Tâp8¦GÈJRSS£q®Òk&ÖV«Ååº9yT*SS¦<olV ©¹™ü¼\ärR‰„P(ˆÕjÅétòÖÛoc³ÛÉÎÊë¢J§ ^­‹R©à‰G~¿oÒÜÚ­[Óiü?V«5¦cZjJ4.C$‚Ãá  âöxƒ,Y¼ˆƒGŽÐÚÖÆ‚²òO»é‰|LDÃ/"r›äåæ Ö¨yíÍ7q8ÄÅÅ!“ËIJLdÓÆõÔ54pæÜy&&&Ñëth4®ÔÖ!“J1™ŒT.X@ÕåËœ8uz–á_X½~êÌY” EÌ“¤N§Ãl6³yÓ&"‘'O¦µµ}Öæ«™ôr¹‹ÅLbBR‰”cÇOpׯ sêôY±OM±kï>.UW“’œLüUñÇÍf3áp˜+µuF&­“lß¹‹Öövòrsb~Þô:Ct¶Àl2¡V«˜_:ñ‰q¶ïÚ\&cAE{öí§±± pòÔiþýç¿Àï÷sïÝ[زy‡ã¹^$¢REgd2›7m £³“ûùpìÄI–.YLœÅÂoŸ}ކÆFyèAb2™M&Ô*}4fˆZ­&>.Ž{¶ÜEoo?ÿå/ihjD©P° ¼œ'Oñêëo “ÉP©TÄM—ŸJ¥Âb±ÐØÔŒÓéÂb6ÇôÚ±{BD ÎbaÕŠX,æ”g†åË–"•JøÙü‚†ÆFŒFc4ÈŒÍFsK+ñqñ¤¤$“›“Ãëomexd„¤¤$z{û$99‰ªêjöî?«7R©t–.r¹ ÇÃî½{§ßoÉIIT”—½¯¯T†N§éèpºHJL$++‹C‡à÷˜˜˜àÈÑã”–”`µZÑëõ¤_ó¡)òùCôÜ'"ò1˜ 2¥×ëñûý¨Õjd2Y,®E Äl6£Õh°Mâ z™\†ÃÝ4vµ! ‡Ã8œN” %J¥‚@0ˆV£Á€  V«£¡§´Z-&£1¶T‡ñù|¨ÕêØßS‘H„8‹‡ÃÛãÁh0 Þüår¹0›Í †Y^æÆ'&…Bôz S~¿Ÿ„øøX !ˆçZÇãA¡P —ËqN3 „B!œ.Z–·Þy‡)‡ƒï»—Ä„Dt:-‚ `³Û øýh4Úh8á«69Îèæ3£ƒÁ@ Àår¡R©Ðétø|Ñã„jµ·ÇƒR¡ˆîˆŸžA Chµ\.“V~ûì³ÜwÏ=,_º„ÑÑ1¤²è´¸V£™õ]n76« ½^F£F¥RMë%A«¦Õjµƒ!\.ç‡Êsµg=¯×‹Ín¦×j‘+Œ!“ÉÐiµhµZ¯£Á@8fl|&*×o÷,•l¾kS,ÏP(ÄØØxLZÃ錽_“Ñx]½N‡Çë¥#€ÍnÇb6ãt:Q*U¨ÕjþïOÊê•+Ù°ní§ÝìD>€›õÜ'~‘ß+/¾ò*R©„o>ýôïõ¹#££\¼TŤÕJWw7?þÁHM½}üŸáp˜Á¡!ÑüžÖÚÛÚ;xñ•Wù‹Ÿü)ñqqŸvˆ|¢Ë^‘Ï$«W®øTž«Q«1™Œ(” 6®_ÿ¹4ú]þÈÊÌü½>S­Vóð÷c’}! ¿ˆˆÈï•ü¼¼Oå¹&“‰µ«?ÝпŸW²23ÈÊÌø´Å¹Cˆ›ûDDDDDD¾Dˆ†_DDDDDäK„høEDî‚ ¾CÁpFFF¹pñÒÇòÕÞÞÑA}CãmËßÜÒÂðÈÈ-=ÓjµqúìÙÙ™9÷~³‚AΞ?ÏèØ]ÝÝ·hçVŸ)"òe@4ü""wˆñ‰ ^}ý[ ˆs#£‡éìîbßÁƒ7¥N˜vºr5¡PˆË5W8sî܇>ëÃäß{à uõ ×{‰û|._¹Â©3gß÷K•3¡]{÷q¥¶î¦ór9ìÞ»Þ¾>.×\¹a¤¸Ý?sÍçóñú[[ºé÷!"òe@ÜÜ'"r›ô pððaÜnkV­¤¡±‰·ß}Á¡!ž|üqLF#‡ŽÁf·3Þ<**ÊÙ±sn‡´ÔT2338}ú,r…œ{·l!##3çÎsáâE‡†Ñj5±sõ^¯—]{÷±nõj‘0§Ïžcù’%ìÞ·ŸP(ˆ×çãÁûî%7'‡ýÑÒÚJGg‹VbŸšbï¾ýŒŽ± ¢‚•Ë—±÷ÀFGÇÐj4<òЃhµZöÆ'&èëïG*•FÇÆØµg/¡`yóæ!ª._&>.Žûï½½^Ï‘cÇihl$';FÃÛï¾GCc#>ü0óJæräè1úÈÎÊdÝš5=~‚ѱ1‚Á Z­–‡|¥Bɾé@GIIIŸv5¹ãˆ#~‘Ûäȱ㴶µ³°²³ÉL^^.)ÉɬZ±³ÙÄ›o¿Ã餼l>{÷離ºš‹UU˜ŒFÒRSysëÛ˜Í&<^/ïnßNwO/»÷îeõÊ•¬\±¹ìýïò@0È¥ªjNSSSTUWcµY¹\s™Š²2´ ¡º¦†‹UUÜwÏÝÌ/8tˆ¶ŽrsrxwÛvúúû©­«ÇçóSV6…BD"!Zþ•Ë—“Ÿ€ sŠŠØ°~='Nž¤­½7ÞÚŠÙlÆãõòζí³flV+£££äçå³õÝwñú|˜ŒF^}ã 4 YÌ/-e~É<®ÔÖqîü6¬[Ë‚ŠrЍ§¾`0Ȼ۶¡Õhxð¾ûHˆ'p¹æ ƒƒ\¼TEnn ðζíädgÓÚÞÎácǸR÷~žåeäç‘’œÌ’E‹ÈÍÉæÀÁC457³°rWjë8tä(5µµø|>/ZHOO/5Wjéí륶¾•è^ä Š8â¹MÖ®^ËåâБ#lÙ´‰´ÔT,3åeeH$úùö7žfnq1Õ—kèèìÂ`0°dñ"är9ÃÃ#hµZ„H„””úÐiu,^´©LJSsó,ŸìR©‰DŠT*C&zµ‹‹‹£l~)>¿ŸË55tvv‘“ͼ’ZÛÚ¡«»‡ññ ÚÚÛ1 BÔßyY)e¥¥±üÓÓÒ¦åŸÉdD*“’Ÿ—GIñœh°žÁA†Qª”‘Èu£á†¦fâãâ0™Œtu÷D=å¹Ý Ì&3 ‰ äçå‘™™ÁÉ3gÈÉ΢rÁ‚Yy¸Ýn†GF¸çî-ded`0¦ÃÈFc$$ij|éR›š£µ­ ¹LNGg׬<].‹…y%sILH £³“,[²„±±qZZÛËå”Í/eñÂ…X­6ªª/g¡´¤£ÁðiW1‘OqÄ/"rD"¼^/• *Édœ9w¥BI0âèñãx½^òór9tôatlŒ’¹Å„B!Âá0³™œìlòóòزù.Ö¯]CNvS¦±©™€ß{žJ¥B"‘RU]Íå+5¸ÜÑuøp82'Dˆùyy´¶µqêÌYÚ;:J¥æç“š’ÌÊËyäÁHJL  Íòñ?óŒ`0ıã'˜˜œDˆD‡Ã‚@("Þ7Kæ ëÖÅÝ„Ãêê(™[ŒÅl&?/Œôt6¬]Ëý÷܃V«A¯Óq¹¦†–Ö6rs²ijiåÔ™³4·¶Æ<ét:ÒRS9xø«ª£r G#ç…Âa‘i©©¤§§1¯¤„ûgŋNçÙ©3g§£ÌJ¥äÔ™³ R2w.«ª8rì8Wjë¦gDˆ•Cå‚ 8{î<‹V°kÏ^šš>íê&"rG‘=þÄ㟛›‹N«ûø¹‰ˆ|I®în.VWc2¹gË]def¢Õj%/7—ŠòrlvããlX»ŽÒyóüü<, éi´wt244LB|<ÅÅÅÄ[,446!•J™WRBa~~4›\ŽÉh ±¹™TÊܹÅÌ)*B¥RQXX€T*Åh0LÇI—ÑØÔŒÉh¢¼l>Ë—-ÅårÑÚÖDƒ Éd2²²²ˆ›Ž ÕhÐé´ Œ’“…V£!+3ƒøøx"Òy%ÐÞÑ“9=-€ññqŽ8Á}÷ÜÅb!';‹Á¡aº{zÐé´ädg“’’ÌèØ8:­–…• ËeÔ74 GÈËÍE.—#“ÉÈÉÎf``á‘òrs)+-E§Õ’—›ƒÉh¤ ?Ÿ„øxâââhjnaÒj%=-’âbd²hžáp„¢¢B’“’"9)‰E••D"úúû©(/gõÊ‚@vv´Ôj5‚À£=„D"¡µ­‹Ù,®õ‹|.ˆD"Øíöë6ûBÔeo Àj³Š¾úED>3¡o¿¨Ï»Y<CÃÃädg#—>WƒÁ ÿñ«ßP:¯„Í›6~Ú∈Ü2¢¯~‘ß¿o#üY4úZ­–‚üüO[Œ…ÕjÃç÷ÍÚ÷ "òED4ü""""€Ùlâßûî¬å‘/"¢á!º¹Q¥R}Úbˆˆ|∻úEDDDDD¾Dˆ†_DDDDDäK„høEDDDDD¾Dˆ†_DDDDDäK„høEDDDDD¾Dܖჴ¶µßV|l€I«•®îîYá3ÛÚ;[!«ÍFwOïuá:ƒÁ míí7æTDäf‡Ã4·´°ïÀAΞ?ÏÔÔÔ-ç144Ìù‹imkcjjŠöŽŽ:߸]‚Á ““×yòÁ~òF"únº­ê™´Zïˆü““445á÷ü¾Aä“Áj³áõùðx½Ô\©¥©¹å÷ÖÏ 122‚Çë½aÛù¤Û×ç•Û2üý¼ðò˸ݞë~««oàbUÕ‡ÞàÐaŽ;sF2>1Á‹¯¼‚ÃáøØ ÕÕ7ðÞöí„ÃáØµ¡áaÞ~÷=~öË_ñæÛoÓÝÓóI–©È—„KÕ—yîÅ—âRU5#£c7L755ÅÞý®û°µÚlüöÙç8wþ‡Ž¥±©™—_{÷´þ;Õfãàá# Œ°ïÀÁ˜ ïnÛNÍ•ÚÞÓ?0À‘cÇ‚¼øÊ«ô ÜÔóìö)þåg?£¡¡1v-ðüK/sñR´_èèìâ×Ïü»Ýþ‘ù]©­ãg¿ø%6»íޕɵC!BÓ~_\[&7ËŽ]»Ù½wßþÞÑÙyò½úÞI"‘'Nž¢§§‡}ûðîöíôöõýÞ ÿ‘£Ç8qú ###¼ôêk³ÚÎï£}}^¹­süMÍ-¤¥¦¢Õj8rì8ÃÃÃT.¨ 99™7¶nÅf·319ɦõëéïàÂ¥K¨Õj6®_‡R©¤½½ƒûîÙÂàÐ'Of`hûÔö©)ª._Æëó,]²˜‘ÑQÆÆÆÉHO£¶¾—ËERb"Ë—-cdt„“§NGX¾l  × ,À¹ 8á"SS–,^üi—»È€¾þ~´Z-O<ö(zétÀš–Ö6ª/_&11‘U+–sôø ^{ó-¹gË23Òc'NÐÔÒ†uk1›Í(”ŠèL•DÂÔÔ'NÆãõ²rÙ222Òimk£¦¶£ÁÀÚÕ«Ñëõ@Uu5³™‚ü|Ž?AvV¹9Ùœ>{–Ä„,f3ÇOœbû®]ô pÏ–-¸\.Ž?N[{;óJæ²|éRd2>¿Ÿí;wqáâ%&''Y½j“ìØ½“ÑÈŠeK)7o–Ž«W®@£ÑD E¡P˜ÓçÎ1<:Ê‚Šrì6;ïmßAm]=½ýýtw÷pèèQ|~?K-Âåváñxñûý,ª¬$??ª/ÓØÜüy|b‚sç/àt¹˜?o#££XÌf/ZHWw7MÍT”—q¥¶‡ÓAyY¥%%³òã'Np±ª…BÁÜ9sH$,_¶›ÍNCS#›6l »§‡¡¡!îÚ¸1öžcrŒsöüÜn7óKç‘›“ÃÙ󘘜¤|~)ÙÙÙœ9{Ž`0ˆË墢¼Œ©)Çt™Ô1:>ƺի¹RWÇàÐ0 TÄòp:8Îh|³™w·oGˆ8N¶l¾k–³!ŸßÏÞýصg/>ŸõëÖRQV6ëZ­Væ•”0idåòå¸\.jëë).*¢®¾‡Ë‰Z¥fÕŠåèt:ªª/ÓÒÖFa~>K/B&“]÷,3#££ì?xˆÄÄLFãûõáSßÐHuM jµšukVíðàêIÞ;Õ¾¾¨Ü²á…BÔ76²bÙRNŸ=ËÙó˜STÈ˯½Áw¾ù ´-~¿³ÑÄèØ/¿þ¥%s‰G&—Ó×ßÏï#-5W^ƒ””dòrrèï`rÒÊÖwÞcýºµÈå Nž:EYÙ|ÚÚ;¨¹r…¥K³sÏ6®[ÇÁ#Gðx½Ì)*Ä`0008È+¯¿Á¢…•×¹5õú|$&$’›“CvV欨g""·ËÊåËèêêæŸÿõߨ¬¨`ýÚ5øü~^~í5æÏ›Ç©3g …Cè´ZTJ%f³ ¥RD]ïê´:ôz&“‰ÓgÎ’D"!óÞŽLMMa0xùõ×ùÎ7¿Ás/¾D~~>‰ñ ƒQc(9á">ü¿{þÖ®ZÉÆ ØðÜ{/ÇOž¢|~)*Õû2‚€V£!%%™­ï¼Ka~>ÉÉÉȤR4 *• ³Ù„L&%"Dˆ3›‘+¼õλèõúÙ:†BÜ{÷–X¹„B!ºº»äô™³l\¿Aðz½8¦¦ðz=‚€Ãá`br’7ß~‡8‹…BÎñ“'yú«Oñú›[Ñjµ¸Ý."á뎄ÃaÞݶ=ûöS€ëÞ©D"a÷Þ}ädgÓÛÛÇù —HJLä­wÞeúµ´´´1<.Žº†&&&bz]Ëj__TnÙð áp8)Ì/à•7Þ`tt¥R‰ÝnG.—1§¨)‡ƒË—qæì9 9=òpì+¹¶¾¼Ü\¼>“ÖIþðûßÃívS]SCDˆ””È÷Ý‹Õjãô™³H©TŠT*%ÈÊÈàÑG"1!“gÎPŸÇÄä$V«‘ÑQ´-+V,G­RÑÒÚJSs Ý=ïë8>1ñ~¡QxßøÚW‰³ÄñÓÿ™äæä°nÍjôο@wO/ßÿîwP«T¼»m;?ò0¥¥óøÉ_þgÞÛ¾ŸÏÇßÿ·ÿJ}colÝzÝ([&“Q\TDGg'z½ƒAφuë8yú GOœ¤­½ƒ¯<ö( ¥‚þ~ôz:­öº G3ÿž_ZÊÿè‡H$ƦËÏår“—›Ëñ§èíëãñG¹Î õ ÐÙÕÍþO?aAEãüõßþ7ºÿ~îÞ|õ7ÿ•ó—.¡Rªxôáce’•™-“µkxäÁøoÿ?q{ÜdgeÒÓÓËÐÐR©ŒU+WðÀ½÷ð_þî¿£V«(7¹\Î~ðýëê£F­fõÊ47·ðýï~‡ô´4€Yïô®ÌŒ Î]¸Èèè(‹.@©Tb‰³pÏÝ[°Zmüê·ÏàñF/Yººp8Øl°Ü"‘”˜HZjeåÏ™ó‰´7AËä áp8p»Üdeg"‘HDŘõ~îTûú"rˆ¿±©‰ä¤D’’IJL$‰p÷]›Éd¤¥¦R«¨gphˆîžL&V«ÚºzRR’1è ´´¶²yÓFââ¢Æ·úr Z­&ºyHˆ® ‚€J¥ÄívÑÝÛK_?Á`‰\n##£´wv’œ”Äá£Çðx<,^TÉðÈ0©”ñ‰ ††‡&%%™ì¬,’“’xèþûo8U%"r;4µ´000HRb"&£‘`0HœÅBrRË–,!.ÎBâtñûýÔ76Q>¿ƒÁ€‰DãËOÿ‘J¥8œÆÆÇHLˆ'99™%‹¢P(ѨÕ,¨('55•^~…ü¼\–-Y@Zj*½Ý{÷ò“?ùcŽ;Ρ#Gù›¿úK¤R)áp™L†ßï§¡±‰²ù¥D"Âá0Ât{»zšT©T`³Ûhlj&-5•H$L$M‰D°X̳tLHHˆÝ+ Dó@&“"´Z ç.\Äd2¢Óéq{<ìܽ‡Â‚|Bá0—ª«éîíE"‘°háBöìÛÇÞ±ZmAªª/319Öòòrñùýdgeq±ª»}Š¿ÿoÿ•… ðÜ /’“EyÙ|®ÔÕ‘••Å¥ªjìv;2™”žžÞ¨¬‚@aAÁ`ˆð´~‰„µ«W³{ï>RSRxøÁø·ŸÿË–.!5%…Ý{÷199  J…‚ÂÂŒ=a`p“ÉDZJ*çÎ_Àãñ0iµ±tÉ::»®)Ðj5œ¿pN‹ÅbA¥T’”˜ÄÝ›ÓIOK#Ee’J áp½^Çå+Wضs'½žáá‘é÷'0§¨¥R‰Ûãfçî=¬X¾Œòùó¯y§M°lé~÷Ü ôzž|âqÜn7~Ÿñ‰ ÚÚÚ‰³˜ÉÎÊ¢`€uk×°E©"++“p8L0D­VÇÞy$‰Õ§È5³wŸÏÇ{Û·SXXH鼚[Z‘J¤  QŸ‡Ã餯€’¹ÅH¥Ò;Ö¾¾ˆÈâñ¿ÏÍÍE§Õ}db¿ßÏŽ]»YXYI~^.é©©ôôöR×Ѐ×루 ÄÄÚ;:q8,]²©Tʉӧ& ÓÒÚʃ÷߇ÅlÆ 7pêô‡HJL¤t^ >ŸŸùóæa4±Ù휻p` @^^z½ž‡208„R©ä‘‡Äh4ÐÔÒ‚Íf###ƒ… DcjGzûûÑj4d¤§\7j¹]A µ­#GÑÒÚJbb=ü0™™H¥.VW308HZZ*ÙÙÙx=›šÈÍÉÁl6Ñ5Y§ÓÅÜâbìSS”•–2:6Æ”ÝÎÆ hni¡¥µ ¹\Frr¡±±‘ü¼<Ö¬\‰V«¢£_‰4:˵eÓ&ä r¹Œë×Ñ w‹-$ŽÐÐÔHnN€ôô4’’’gnq1ÆéƒÁÀÈè(½}½05å xNjµ»}ŠÕ«V¢R©Þ×155¯> 1<2Âüy% Fl6‹."3#ή.ü«–/G"‘ÐÙÕ…N§¥­½·ÛM8摇`˦MX,fêê"233ˆD"\¬ªb`pA z=J¥’úéÈ£=H^n.­†í;wqïÝ[X¶d íÔÕÕ“œ”Ä#=ÄøÄ'¦÷ b4HLHÀh4RQV†D"Á`Ðãt:™[<‡5«Vb³ÛÙ´~=©©)ì݀Ʀf‡†gQe% VÒÔÒBOo/i©©lÞ´‘þÁAzûûؼi#kV®b||üš2YHfF:]„‚Ñ¥ÇÃÀà2™ŒÊÊ8.232ÈÉÊbdt”ysçR2w.ýLNNâñx¹R[Kÿà –-YJ(¢³«›¤ÄDòóòf½Óž¾^Š‹ŠHLLäè‰ädg±qý:lö)vîÙËàÀ N§“‡|€òùeØì6.×\aÒj¥ /³çÏs¥¶–Òy%H$`tt”¬ÌL 33ƒ”ääO¤ÍIe2?MÍøý~ òó)™[L]]=)ÉÉh9—΋íW¹íëóD$Án·_wŠ¢³!`«ÍŠäÍ­o Öo 1!ñ#3 Ô\©¥xNQlÊR r¹,6š¦7[H§§]R©”±±qFÇF©(/MÉ„BѯZ…BqÝóAÀçó¡R©J¥?yŠ3gÏòG?üC F#²iCî÷û‘J¥±<‚Á`lyà³ÆTä‹ÁÌhB©Tκ>³«Y.—Çê`$ùÈÏP8„ €B.'‰ †P(äH¥RB¡`õt{¸nF†›M{#oAç¯þæoùÖןfúu\Í̑ܙ¼¯>¢ûAÏ;{þÿöóÿàÿÏÿÁœÂÂ|îGåóa2_ÍÕ÷_»Œpíÿo&o¯Ï‡B.¿axmZ‰Dòº|гgÞ©ÛíáŸÿí߸ÿÞ{XTYIGWÏ<û<úG?Š.ùÈߟ žé¿C¡¿ùݳ¬\¾œÅ‹ÞR¹ÝI|> …"for¹œÈôÌÇÕ²_Ë'ݾ>mB¡ÝÝÝ7Ü+‘Hp¹]ttvÜÚT¿R©dé’Å×e¦R)¯»&¹æ>€´´TÒÒRg¥•ÈK’H$³v‡ÊdRTj:½>fôë6w|T£¹SÈd².ݨÞLg"—Ég¥¿ºmÉåòm/7íth•öã¶3‰D‚B® ;+ƒAϵvêZÃõQF4 rìÄ JŠ‹ÉÉÊúÐç~™oö·[}ŽD"A{“»ágòþ g|Ðõ™wÚÝÓƒD"aNQQôút?®Óé®3œ3ý·L&ãßûî¬iþOƒkŸ?#ßÍÔìOº}}^¸¥ÿ§ËåÆíq“”˜(ŽäED¾„§§&uZjõÇ ‰ †hïèÀh0‘‘þi«ö™frÒŠÓí";3º9Î099IrR’¸êsÌ'2âÿ´Ñë£Ç3DDD¾ȤҨώ;€B!§dnñ§­Òç‚øø8âãß/w•RIZjêÇÈQäóÄçs!CDDDDDDä¶ ¿ˆˆˆˆˆÈ—Ñð‹ˆ|Ž 7ŒqñA×o„Çë½mÿå‚ 05å¸ÎÓٵׯÔÖqá⥛Î×ãñðæÛïð¯?û9»÷¶–Ý{÷]ç­îNrüÄIZÛÚf]sº\ø|Qxáp˜©©©•º–ÉÉIÞØº‡Ãù‰É{³ttvòîöíƒA‚Á ï¼·öŽÎ›ºwjÊÁ¹iwÄ7«»ÈgÑð‹ˆÜÑc¬ØqªP(3J`×K$ý- Æœß\¼$‰Ä‚æÌ‹½:ïP(ŒÓéÄápÄœ¤øý~¦¦¦p»Ý‚@Í•Z^xùUœNg¬Sþ ë~¿ï´»Z†ƒ‡óÞŽx½Þ˜L^¯—`0H$ÁápÄŒ_$Áívc·O ‡™r8xæ¹çhim%p•nSSS±ëÁ`æ–V.UW36>>ë#Ããñàt¹fKªË—9á"óJJËå ÐÔÒsVãt¹ðxÞ …p:ø®qÇÏ.C˜þ(r:gÉ páRMÍ-Œã÷ƒ¼ñÖVN9‹Ïç§·¯Ÿ_=ó;FFGcA}ü~?^¯7&¿@ÔqÿÀÕ—kðû}³ôr{<1Ÿ7ª?W§¹ÚÈÎÔ‰›z/Ó»"‘6»Î®nêꈓV+ç/E?ÀÂÓùÏä7óïP({–ÇëÁ6e§§·_?ólT÷éz~£w'òùàsµ¹ODä³ÂLtµåË–2Þ<^yíuVV¢Ñh¦ƒ¤xÉÍÍaãúõ¼¹õmyèAÂá0;vïáßû.µ«ÍÆË¯½ÎÓO=ÉÄÄ$/½ú*ÿå¯þ’®®®i{óÙ»ÿ^¯—E‹*IOKã½í;0èõx}>žxôQ:Ì¥êjü?ßþÆ×IJLÄëõ²ïÀAªkjb×»º»9qòáp˜Ê ¸kãd2£ccì;p›Ý†ßïgíêU¼òÚë¨Õj*,ÀétÒÖÞŽZ­æ+?†\.çå×^Çét’•EB|<ÇOž¢`¯<þ«V,àÂÅKÑ냃|õ+O€Î_¼ÄÄä$‰„ýàûŒŽŽ±gÿ~¡K/fúµQÇ+>ÇŽŸdphˆS§Ï`±˜™3§™4ºÛü؉“œ;‰T½[6“››Ëomebr’œ¬,ô‘Ø‘¯¦æf¶ïÚÏëcáÂ,(/çÝí;ø”—•rïÝwÇNCA:Ìåš+$''±dñ"=†^§‹Å8qò.—‹§ŸzŠêšËô ðû)WÊ÷ÝÃé³ç8uú4^ŸûÔÔ´×½¨>zìøÿßÞ}‡ÉQæ žÿFF¤÷•™å}É—¼GBB!|·pÝÐÀ4==f{fvvoæÖLgW±xœh4FGGg&éŒËéLßÝž8É©3g¨¿ØÀ™³ç8|ô‡ÒÒÖ­½‡©S&³{Ï'´´¶¢Óéø½çžÅépPW_ϲ;–R9cÏ>ýÝL ³ÙÌÒ%‹©œ1ƒçžyšT*Åæ-ï³âÎå|ë‘Gع{ðy½,\0Ÿ%‹³áÑGèyðûq¹œìص›©S§ÐÓÛËŽ]»q¹\¬½ûn–,ZÄ‘cÇp¹\L2…Ç7|›ùsçdêgΜÙLž4‰Ç¿ýmæÎž šÆœÙ³øã?ø!ñxœ³çÎñî–- rssÙ¼e Ã##™òÏŸ7—9³gñÀúûèH%SH:‰>¿ŸÍ[Þ§  Y–ÙòÁVzzz9uæ Ó§Mcñ¢…ÆbpßÚµé:Üû §NŸ¡±©‰Å‹R9cã'e™»V­àûÏ?KýÅì6³fV²ní=¬½g w,]ÂäI“xö™§)--¡¹¥•Iå<ùøã;q‚O÷ïg×î=<úÈÃ<÷Ì3¸]®ÏîèS)Ž<‰¢(¬Z±‚‚|¿Âñ³xñ"âñ8ç/|öÿøê¸öý"+L™<™T2ů^z‰O÷í'‘HP[W‡ÛíÂëõàr:)*,äÜù ¬^µ’lŸÚº:æÎš £S%LSU›Ý†,+¼þæFY´`Áçì;áëî %éá3:Ž‘‘}}}<¾áÛ &U”ãv»°Ž>Ç-).¦¬´„h,JqaË–.¥ ??3uªÉhdÒ¤ .˜O^^.“+*X¼h!n·›¢¢BÀírsç²eL›2…ŠŠr|^_:{ZI1%ÅÅäcµZ),(Èü»]. °Z-”–”0«r&“‰lŸukïÉ$ ÈÍÉÁçóár9))*¢¤¸˜¼Ü\;“'UÆ0 RQ^ÕjF¯èY¾ì¦NÂô©Ó°XÌäçåãp¤ý(ŠByY‹…ü¼¼t²™’b²²²ðz½”•–2{ÖLLF‰D‚¼¼\²}¾L½Ø¬VJŠ‹)Èϧ¨°ˆiS§àv»ÉÍÉaÅËÑF;Nâv9 Ñë ¬_w/%Å£©Z%ib._F~^.ƒCCx²²¸ÿ¾ux<žL=x=^JKKp:äçåRTTĤŠr'>Ÿ¢ÂÊËJ1›Mäççsâä)$I¢° t½ÅL2MÓp¹œÜ±d)ÅÅEé$J@8fxx˜óç±üŽ¥ÆqÇÏôCºÃܸόMGk0(*,$ÿšöËRæÌžÅ¬™•Äb1Š X´`!u/2uʦLž”.w~>sçÌfÒ¤I2oî\*&U`6),,¤ /³ÉDQaååL*/Çl6Q\XÄÌ™•WÝw­sC’ô‚ðUUùå¯_ÂétðĆ ·º8ÂM¤ª*ûÿw._Æ]+V\÷2næñ344„ÑdÂxIB)áöq[NÙ+_'±Ñ¬e çߺLe­3uòd<îëŸnøf?‡ãfUð5'¿ \'£ÁÀ3ßyê²”¼ÂíO§Óñø†o©eˆãG¸UDà„ë”Nëùå2Ê ß\âønÑCA¾ADàA„oøá&kjn¡¶¾þ }§Ïïçô™³·ºè‚ ÜÄ3~A¸NªªR[WO[{ÅEÅL™<‰îžš›[F§²LWw7]]Ý‚Aòòr)*,äÍ·ßfpp >ÊÜ9³ñûû©ª©&++‹™•• ÒØÔÌÐÐ V‹•ÊÓùxû>ÂSO<Æ‚yó°Zż‚ \øá:=~œ­o£¢¼‹Å‚^Qxåµ×ÈËË£»»‡%‹ÑÝÓÃé3g˜5s&lýˆg¾ûÁú:»»ÈÏÏãÅ—^ÁëõÐѹ/“•íׯ¼ÊŠeË8}ö,÷ßwÁàÁ ­­m̪¬_„ë&¿ \‡T*ÅÁC‡Y~ÇRÖ­] ÀÆ·7áõúøá ßçø‰“l~ÿ} òó™7w.ßyâqZ[ÛÐ4yóæ288ÈÃ<Àá£G¹P]ÅÂùóñûýT×Ô2uÊdÊËÊxú;O‹Ç ƒ,^¸€Á¾ûÔ“b†4A¾øá:™Íf::: ×ãt:¨­¯§«»›öÎNœ²"§Ó¾J:Y‡¦i(²Lp`€þþ~Œ#n—‹Ù³fqçòeäæäÐØÔœùŽ,˨šŠ¬È„B!ºº»ÉöùhmkÃétâ7å¬ µ·‚pdYfÝÚ{èèêâŸüö~ºÅ‹QŸÏ‹/½BcS¾õ(¹HæY?IDAT99¸œN$I"ÛçÃl23wÎl†††øðã)/+eé’%ì?xý244„ÍjÅçõ n·‡ÝAEy9.§‹·6½ÃÀà mÛNUuõ—ÞA¾yÄ\ý‚ð%D"FFBXmV,f3©TŠp$‚A¯Çh4’H$ÐëõÄb1EA–e"‘d¾“N“+a³ÛÐIÉT*“C}ü÷“É$f³™x<Ž,Ë"+š b®~A¸ Ìfóh¾ù4Y–±Ûl™Ìãgi»ô;n·{ÂreY¾â÷Ç–a2™nõ¦ ‚ð;J4õ ‚ Â7ˆü‚ ‚ð "¿ ‚ |ƒˆÀ/‚ ß "ð ‚ Â7ˆü‚ ‚ð rÛ~MÓnÊwAáwÉu~MÓˆÅb¨ªz]+M¥RÄb1‰ªz}Á6™Lf&7¹’‹ ìýôS4MCUU¢±Øe=g^ëïïç£í;ˆÇ㨪ŠßßOCcƒCC_IE ·§h4Jww7ƒƒƒ¤R©/üýd2ÉÈÈHæ|Š]á8ý2ÆŽÿ+­÷ZË›>O¯í\×4H4Jò:êâjõFÅEùטªª™ý‡ G"7m% ÉäUÏ}~ý®’{ü±¿*++Ãj¹öl_}~??ÿ寘¯§Óñ… ¾kÏNŸ9KåŒé—½—L&ycã[è…Ó§S][Ë[›ÞeÞœÙ(ŠB,£¡±‰oo"`6™±X,¼÷þ¸œ.;7mJO£zð E…Ex²²nán¾ŽZZ[ùÙ/Å¡#G9zü8y¹¹x½ÞË>‹ÅhmkÃát¢“¤ÌëÑh”W_ƒ¶o§º¦ƒÁÀ»ïm¡rú ŒFÃWRÆþ@€Ý{?!;ÛGWW7N§I’Øôîfbñ8ùyy—}gxx˜îž\N'ñxœW_ï5ž§`¿û‡ÄétPŸ¤/ôOŸ=‹šRq8ìAÎ]¨Â“•…¢|þb‡ãÅ—^aö¬™X,–º?o¦KëäZÕÔÖÒ ^5GC ¸bÝŽß§_%UUÙµg M¼øò+ô÷û)+-Ã`øjŽáÏóÁÖhimÅl6ñÊk¯SY9ãèzoÆùõu£ª*W¼P—$‰x"N ¸¾™ûêë/‰F±Ûltuu108DAA>Fƒw6¿ÇÐð0OlØ@QaÑh”¶ödYGqQ:Ž“§NQ^VÆ¡#Gðù¼øûû)/+ÅétFééíE–eòrs‰ÅbˆÇãx=^â‰8í휯ªÆb2¡i]ÝÝ QŸ‡Ãá «»›æ–¾õðÃhšÆ™3g1›M™1‰°qÓ&>Ý·Ÿ‡óûßž5«W3sÆ >Ý€™•3xú©§ÿëO9sî“'UÜê}*|Í>zŒD"ÁŸÿÉ …p9]ŒŒŒÐÞÑÝf'//—óUU¼ò›×yæ;O1mêTl¶ôÅòÙsç9xè0<ô z½5¥ÒÓÓ‹ª¦H¥R´µ·'(**Äl21<2BWWF£‘üü|ô£?ì~¿“É„Íf£§·«ÅŠÍf¥§·—T*…ÕjåBU5›ÞÝÌÓßy’iS¦ÒÐØÈðð0ùädgé€ôɾý<|˜çŸýÙ>ªªñy½ô;O/ÝÆ±Œ©dºÜÍÍ-ädgãõxøçÿ/-˜Ïë×súÌ^ßø?ú£?dÚ”)¤F·7•Jáóù°˜ÍD¢Qúzûhll¤­£ãŠS& zzûH$â¸ÝnB¡f“‰¬¬,B¡`p´Üâ‰8YYY8—_¼ÔÔÖÑÝÓNÒQTTˆ^¯'Ûç#$?/—á‘B#!òóóÒ ”ÆI&“t÷ôH$Fs+Øéíë#‰àóz1›Íôöö¡iñD¯ÇÃÀ@ºN.˜Ï#>HA~ÁFFF2uÐ××G2•"ãt:Qd™_z¬ãûÏ?Gqaá„Ù S©ûâÕ×_çGôGÌœ1¬¬¬ ûô÷žý^—D2A¶ÏG2™¤?Àép008H4E¯×“—›Þ§ýýzz{ñù¼ø®pQ `±X ‡#¼÷þû¸ÝnæÎžƒÙ|cf– ƒtuuc4(**d`p£ÁH<Ïïc¾ªóëvô…·LÓ4N9ÜY3iljfÓæÍ˜M&Œ&ëï½—sç/Èöùxðþõl|{ýý²³}lxôQ¢±(}~?ß~ôvíÙË¡#Ge¯ÇÃ÷Ÿ{–×7¾…ßï'‘H°`þ|¿yý Êˢ7gGŽÃb6S±óærîÂ6oy³)Ø¿ÿüs465a±Xñz=D"jjëxø¡&œ°:ŽÔh•N—žµ¤¸ˆÝ{÷‰D°ÛíœD¯×sÿ}ëxêñÇ&,GÓ4öìý„·7ofrE9S&O¦¦¶Ž~ï9š[ZxcãÛüßÿõoصg`ÿô¿ÿ%ò¸ß‘±ÖÅ»w£( «W­"Ççcã;ïH$(*,ä‰ øÉ¿þ”T*ÅðÈóæÌ¦¨¨ˆæ–‚Á #Ã#ܵj¯½¹‘á¡afLŸÆsÏ<ÃOþõ§´¶µ‘RU²}^Ö¬^Í…ê*âñ‰D‚û£QXX)K$eßþ´wtòËÍã¾Íƒ÷¯Ÿ°O?Þ¾ƒùóæ²cçnþüOÿ„¶Žv¶~ô1?ø ÿò³Ÿ“—›Cp`€uk×2mÊ^zõUô±XŒçžyšÂ‚‚Ëêïø‰8Z[Û¡£³ƒéÓ¦ÜsîÄÉSœ:}¿ŸeK—¢i éÒçŒ$é2ÇÉWu~Ý®¾ð3þ`0}òN2•Ý{÷288ˆËåâØ±ã¤R)–-]ÊË—ñôSOÒÜÜBwOòÇÈï=û=²²ÜÔÔÖâñxðz¼X­žxlO?õ$]]?y’––V~øƒøÎ“Oðɾýtvv’ŸŸÇþþÆa·óg?ú7ܽzÉTŠÝ{?app(]†'éêêbph›ÍŠÉd¢µ½D2AyiifŒF#¬¿‡î_Ï÷Ÿû“Ê˰Z­h$S)üýý¼õÎ;Üß}L›:õVï'ákhÞÜ9üÙþMÓøŸÿë_Ùúñ6jëê8~âYn7@€£Ç³bù2¦N™Âð£Çš$I,X0Ÿ©S¦ðݧžÀf³‘L&‘$‰ÐHˆí;w!I:L&ŸîÛÏÐÐ#¡V‹•¹sfã½s•$‰Y3gRSWÇñ“'QS*õ8rôV«…ÜÜ"Ñ(Ë–.eÚÔ©üð…ïSQ^†N–Y·v-?|áûD"ü~?Î!°âÎåÌ™=‹¾ðž¬,¬ë„óôäéÓ?y2³‡ý¬R4Ðë |÷;OòÂóÏqöü9ÊJK™:y2>üùïÿßzøaJ‹‹ù÷ÿöÏX³z5¡pˆï_Ï_üùŸsòô^zåUNŸ=ÿý“ÃSO<ŽÁ ‡Kî²%I"@Q–.^Ä왳Xµrª«©®©åÈÑ£,˜?Ÿd""Ë,]¼ˆÊé—?”$‰d*ÉÜÙ³øoõ_xáùçÉËËåÀÁCœ:}†X,Æá£G9söw.»Y7ñ'³¹¥•·ïàÉÇãoÿú¯¹cÉbÞÙ²…%‹ñü§ÿHww7;ví"rß½kyá¹g9¡Š²Ò¦NžÌ·y˜þàûìØµ›ÞÞ^¦L™Ìö»¨©­%‹2{ÖLþýŸý)]Ý=(ŠÂ‚ùó¹sÙ2þÃ_üoäçO|Lc³Z¹wí=”•”dêöÒ}úƒïÿ çÏGÑ+œ>{–ÓgÎRVZŠÁ GQdž}æi6|ëQvíÙÃŽÝ»ilnÆëÉâbCóAj@(¦¨°€Ó§ñÀúõÜ}×]pÙ¥ÚW£rÆtæÍƒÓáàøÉ“Äb1¤ÑµIéú•ž_·«/|Ç_]SƒÅb¡¸¨d2…Ãá ¤¸ˆgŸyš¼Ü\dYG"‘$™L’L¥ÿLßUëPU•ÓgÎ1{æLL&#’¤Ã`0`4ÓyÇU @K_±å$7™LجVt’”iL¥Rhš†¦¦Ÿ‘•ñÜ3O““M{ggºó’ªrêôJKJp¹\ ¡iN§“¹³gSTXˆÝfË<H$Y!™H²xá"–,Z˜iÆ„ñ††‡±ÛllxôTUåÄÉS¬[{F£¯ÇÃë×SR\„,+hšF"‘˜Ð±HÖéÐI:dYNÿ^Ié;ÈH4 ¸\N¦LžÌ‚yóðz½<ÿ½g8vâ$¿zéeþè÷ÀìY³(/+E’$6où€õëîå̹s|´m;ß~ô‘ÌóN½^AÓÔL$$ ½ƒ^?á™ ^¯'•J‘L$ÐétètÏÓd2‰ÉhÈlcqQá„zÑétäø²ñù¼È²Œ,˘Ì&"‘±X ›ÝކF8Æd2!!!I:Y‡N'‘þ¤Ëœ{@€p8œ^«…ùsç"ët|²?Ý==üèþIåüìW¿"™L²lÉ"Ñ’$ñÉþýtuwãr¹H&™åØl64MÃd2eúgÜs÷jþÇÿ÷cœÞ¿ž÷?üœœfLŸNGg'ñX¤tùÆÊ”îà–®C MUQS* n‡ÏëM׉"£È &³‰p$Ýj’Þ/ Wô¬»w-n· M—ÓIaa‹MÓ°Y­‡Ãéc%IoЇ»Ý–©ÛX<–ir¿Om6‹ÌgǮݨjŠ<ÿ<’$¡( ‹«Å‚¦i¤’)lV+9Ù9<õøã̸…ÓIÒ!Ë7ê÷2óÎæ÷P…¬¬,Ú;:2Í“É$‰dr´ó^:þUç×íè þT*Å©3g˜>m*f³™Õw­dÓ»›©ª®Áçõ"I0eÊd9ÂÛïnfÝÚ{Èr»ùçÿ„’’Ì›G__•3¾=z²ÑétHRúG¨rút›šøé/~AJU¹û®UX,:»ºX²x§ÏœåüÏÓ××Çì™3Y¶t)›6V$‰IåìØ¹‹ææjëê¸ÿ¾uH’ÄÖ·‘H&øÞw¿ pY‡½†Æ&rsr°XÌôöõRW_Ç=kV#ò  —Ò4ýòÁÖÒ¦$‰o=òÓ§NcÆôiTU×àv»(ÈÏ#+ËÏëáÅ—_á™ïËîg³Ù˜6u*;vífÉâE ŒÐÚÚFåôéD¢QŒž,^‡_¿ü Oç)L&Š’~Äe4™&üX’H$xñåWØð裘Gß—$ £ÁÀô©S™1}zfóór3ß•tfógŸë8»xá6oyŸÎînžyêIrsrùçŸü„åwÜA"™àÍ·7aµZX¼p!OlØÀ«o¼Áÿü—E¯( F>ØúŸî?€¦©¨ªÆ=kîÆj±ðɾ}”—•‘åv³fõ]üŸóßxä¡)(Èç7¯¿Áö]»‘$¨(/gÛŽlÞ²UÕ¸ïÞµètéú»Ù˜9£’lŸ—¼Ü<î¾ë.víÙ“¹øûüï\lh@’$, þ§?âþõëØ¸éÞݲ…Õ«VñíGaãÛ›8xø¥¥%Ü{Ïê.Ö_µNºº»Y±|9==½457át:±X,˜M&½40›ÌèõzÌŸÏOñ þþÿ ¯×˩ӧQÕtÜß:yèArsrøçŸü„o=ò0OlØpÙ>ýÞw¿ËÜÙsxí”STTH[GmíüòÅ_3<<ª+¨œ>ŽÎÎWU‘år1³r5µµôôô²rÅH’„é›%E½i’oèy'I½}}™‹¶ÜÜ\¶ïØIVVÑh”Í[Þçùï=ƒÁ`øÊίۑôÆÆ7´»WßÏûÛŸgDF;Å­Z±’Ò’b4M£·¯¿¿§ÃAnn’$ÑÓÓ‹¤“ÈÍÉ!ÓÞÞŽÑhdhx˜ UÕ<ñØdŽ>¿çhOç<ñD‚ÞÞ^E!''‡X,F$!ËíF’$ =½=˜Íf\.N‡ã²2hšÆ¿üìçé‘’Ä·}§ÃA @ÓÀã¹¼‡~(âïþñŸX»f +ï\N4#“I‘*ã ŒÐÛÓK<ÇëõâõxÒM‰¡€D~^.6›‡†ÈöegîÂâñøèc*'ƒ8éNajJ%??‡‡ñz<¸ÜîtGÚ|>¹99‚u(&Áëõ§ï"½^©TŠàÀž¬,†GF$Û—M$Æh4b6›éïïÇétfZ¾4M£Ïï'‹‘“Íàà`fDÂØy‰D.ÛFH?&ëëíÃét Ë @' UUéóûÑ+z|>/ƒCCŒ ‹Çø¯ûw¯ƒÁ@uM-ñÿÿù?ü%w,YÂðð0ÁÌgB¡0ÁÑZK/GÖɤÔT¦óÚØö˲ŒÓᤷ¯‡ÃÉh¤§·—X,HètÙÙÙôzzz{Óû\n;}~?ÑhǃÉh¤÷óêD¯ÇãñÐïï§§·›ÍFaA!ƒCƒ ì6½}}8ŒCúQUE!‰dêÄa·ãñx 0<<‚ËéÀ9Ú‹ü>ÍËÍEÕ4þöïÿÅ‹rÿºu446òÏ?þ ¾õ(E…E¢( Á`îžžL‹È¿þìçL2™‡|0³Ü@ ˆÉl"b6™nèè‹¡áaZ[Û°Z-8Ì&míø¼Bá0©T*Ó‰ü«<¿~W$“Iššš®ØV’$FB#\l¸øÅ¿¦i¤R©Ñ¦“/þ gl¼çͤç/\ µ­µkÖLÈi~5½½}ìܽ‡‡z›õÚ‡6 ‚pýüþ~þóù+žþÎS¬¼sù—Z–ªªüËÏ~NUu5û7 zÂåšš›ùÙ/_äÏÿäßÍņ~úË_ñŸÿò/p¹\WüN2™¤¦®Ž’¢"ìök‚(Ü<×ø¿PSÿØs ëu3¯ *gÌ`ú´i×|‘áóyyòñ âî^n"»ÝÆ Ï?GiIÉ—^V"‘ 7'‡™3fˆ ÿ[¨ªÊšÕ«ðŒÎàÉÊâ¾{×b4]ýÁ¦¢(Ìœ1ãV]ø |¡;~A„¯- TMýl¢½Ù2§…ÛÊ ¹ãAøÚíi/üv"賉³DA¾ADàá†ëéíÍ Ë½ªªRUSÞO>¡þâEº{z¨«¯¿¡ VZÛÚ_ɲÂáç/\pkAªkjF‡ý©T×Ôâ÷÷_Ówãñ8ÝÝ=ו€Jøú_~‡55·ðѶí×üú•œøÞÞ¾Ï}}ÿƒìصûšwýÅ‹¼øÒËÔÖ×sèÈQNœ<Å–·ÞÐôî{ïsêÌÙ eܵg/5µµ@zÖÒw·¼O4ý­Ëòûý¼úú } ²{Ö_¬ç­wÞ%‘H0<2ÂË¿ù þþk üƒƒìùôS:»ºØ|Û.|ý]Wv>Aø¦‹Çãìܽ‹Å‚ÝnãÀÁC¤R)ôŠÂÎ={8rìxz–H‡ƒ=Ÿ|ŠÛå& ³ÿà!Š‹Še™ÁÁAvïý„‚ü|Ûv줼¬”®înNžüè#‘ÅE…˜Íf¢Ñ(¯üæu¶~ô1áH„’â"‡Ø¶s'gΞÃj±àv»ð÷÷ó/?û9‡ŽÉÌj¹cç.NŸ9K,Ãï÷óÁÖhïè ¨°á‘Þ~w3Ê$ÌúÙ/EGg§ƒÜœ9ÊOñK::;p¹\tw÷pðÈašššikk§¬´”¡áaÞÿp+ÇOœÄn·“5Z¦h,Æ«¯¿ÁņŠ Ér»1ôõõqÇ’%´¶µñÞR]SKNv6F£‘ƒ‡³}ç.üýýÖ/¤/€6½»™c'N`2±Z­ìÚ³—Oöí#‘HL˜{~מ=T×ÔP]SC(&Oð¿~ú3ªkjÑëΞ;Çko¼I0$Û—MmmGŽãøÉ“(ŠB¶ÏGsK ï¼·…‡Ó××ÇÝ«WgƵ757óáGsîœGÇlžxü òÁGsîüy|^/v{z~„@0ÈGÛ¶_Ó~‰ÅbäsþÂ6¿ÿGŽGÕTV¯ZIMm2y¼^[?Þ†ªª¸].vîÞC,gÿÁƒœ>s†¡¡!$I¢ªº†›Þ! ’—“K*•bËöpk]kv>qÇ/×A–eùtß>ùxû¢Ño½ó.uuõ¸]NÞxë-N93šà%€¿ßÏŽ]»‰Çãée( GŽãü… =q’_¼økê/6ðɾý´´µ¡(z òÑI¯½¹‘3gÏñéþý”—•rîüŽ8ÏçÅáLO›­€GQ/^¯‡7ßڔΟápPXX€ÛõÙ¿ÓéÄn³QXX@V–аZÓó ï;xóUUlzw3]]¨jŠW^{P(€^Qðfe‘íóát88|ôhzNvIbdd„W^{UUéììäÍïÑÔÜÌ+¿y§ÃÝfC÷£§ÓIdêp×Þ½¼ÿáVòóòÐëõ—µ@x=¦N™Âæ÷ß'ãr¹ÈÍÉ!77OVv›’’b,f3;v玲½£ÁÀ+¯½FUu ¯½±‹ÅÌœY³Òó‡Œ.?OðúÆ·hïè ?/ᯱ©iÂñ‡yã­·ÓŸÉÏCÕ>ÛŽ`0xÍûeã¦M>r”7ßÞDIq1S¦LF'é2 Ö¦N™L<gûÎ]´µuðÊo^g×î=£ÇÞ>†GFxëVdEAU5<„ÅlÆn·QR\ŒÑddã¦w®¸ï„ß "ð Âue™;–,¦º¶–ÃGŽâr9ñz=ÔÖÕqï=÷ðÀúõäåær¡ªzt«ô|íòhv0H'U™=k¡®®Ž¥K³ÿà.64°pþ|@£©¹…îÞ^úü~"‘%%%¬Z±‚ŠŠr‘0“**(*(dÕŠ™‰§EaÒ¤ YµâNB¡þ~?<ô }UUinnI—Áf£¼¬ŒÉ“&±`þ<ôz=¾lëî]‹Éd¤­­ú†B¡ÃÃè©]Ý=´¶¶ q9äåærÇ’%”eꧤ¤˜ÜÜîX²dô®ZbʤI,[º”ü¼<ÚÛ;¨ª®¡««‹Ö¶v¢Ñhf’,ËRŸÏ¼¹s2©g%Ž>?õhimÅßßÏÈHŸÏÇ’Å‹¨ª©¡³»{B0O¥R4·ŒÖaŸŸ‚ü|¦M›ÊÉS§œðYEQ˜=kw,]‚ÙdÂjµPXXÀœÙ³˜1m“'O"''‡Uw® ;Û‡,ËÌ›7—' §Óɾbý½÷2oîœLÒ¯ô²eî\¶ŒD<Á¹ó$‰¥‹eާÓÁ¤Š –/]:ú™*’ÉÏkh@ö5î—ÁAN9ƒÙlæÞ{ÖP9c:ƒž@0HSs3óçÎeîœÙôöõ±gï^*gLÇï÷³÷ÓO©(/ÇëÉÂçó±ní=L29s<åæäp×ÊXÌf.TW_qß ¿Dà„ë4mêT$Iâõ™7w.gúîðБ#=~œîž¦MB*•¢¶¾Žºú‹„Ñ yËΟÇÉS§ ðĆ |ºÿ ‰D‚ŠŠr¶ïÜI(fÑ‚ù(ŠBJUI¥R™0UUÅd48yút&a ¤ïäƒÁ§N§€Ålaß|ºÿ©Ñ)K3Ÿ5™hmk£¶®ŽD":º¯ÇKnnK.äÙ§¿Ë]«Vrôø jjkYºd1V«5=„N'qúìÙL+IîsúìYúü~ÔѲ§ËÂd2RXϤòr}èAž}ú»éåRU•d2E*•þž¬Ètww384H^n.³*+yò±ÇøÖ#¡ª*‹,`îìÙ|°u+}£™UMeûÎ]™:”åtÚÖÕ«V’››Ãæ-Lxf­Ž®K­_ 0 ÔÔÖÒÚÚ†,ËÄã1Nœ:I0˜nNíëí£ª¦†¡¡afΘNÒqàÐa.64¦ï‚Gwv*•"'ÛÇúu÷ÒØÔÄÁC‡™>mZæø™?o.²,“=î3‡Žùì@Ñ4’׺_,²}>8zü8ÍÍ-$’Iš›[Ðét’›“‹ÓádëÇÛ¸Ý:L&»öìeÑ‚ùH’.sœ©ªJ2•BQb±ÇOž"RXPpÕ}'|ý‰gü‚pôúô]Ôù xþ{ßK7…–ÓÔÜBccË–.aùw ( GŽ# QRRÄÜ9s2Ï -f3áH„9³f1gö,FB!æÏ›Ç”I“0 ÔÕ×388HyYååØlV¦N™ÂÐÈ0w3+géèèdêäɘFg^s8ƒ´wt0{Ö,*ÊË8¡ŠžÞî_w/S&OÎŒåv;]´µ· ‡)-)!O0cút²}^Œ#'N¢£³‹‚üŠ‹Šhim¥³³‹‚ü|ΟOnNª«3sœCº¹Þd2QUSKN¶³Å‚Ãn§¬´”`p€ò²2æÎ™CuM-5µõ(ŠByyy¦^ÂáŠ^OYI ñxœ9³fÑÔÜŒÕbaéâÅœ>s†¦æfÜ.7&“‰m;vÐÞÙÉÒÅ‹™7w.Š¢¤“'Ö¡ÍjãÓ}ûáî»V1yÒ¤L=Š ñù¼ 2}êT òó©©«K''š> UU©«¿Hqq1§Ï¦sÜw÷ô°|éRVܹ'‹ÃGÑÓÛ›n±˜“n±H$“8t˜£ÇŽ‘““Í=«Wãñx>;~žýzƒýMøŒË•ž0žH‰D¯i¿äçç³jå |^/& S^VF[[y¹¹ÌŸ7YÖ¡7èÓÉÖV­má°²òÎ ¥ó²TŽÎÒ‰„Y0>ЬP[_ϤŠITNŸFuí•÷pë\ë3~1sŸ | ï¾·…îžþà/|îŒqñxEQ¾ð¬rc9ÄoåêØÈXÙÇîÜ¿ÌôÝ—nãµ,+•Je2ܵxŒÕËXªî±DCŸW‡ÉdôÅÉõJ¥Rüý?ýw-XÀª•+0ŒËri}Kͬ×ë3—?WúÌ—Ù/ãëìBU5^‡œœì¯d¿}‘}'Übæ>A¸Áb±uõY³ú®ßЯ®Å×áGõÒmûª/B®uǯ÷Ò‹!Y–¯Z®K—ÿUÕ©ÉhÄl6MúWª¯ñe\éø¹ô3ŸçZöËø×*gLÿJ¶ûFÔ¥ps‰½&×I§“yò‰ÇÈmÞ¾9t²ÌóÏ~óç$µù­ËÇp‹ˆÀ/×I¯W(-.¾ÕÅn ¾ôØuqü·ŠèÕ/‚ ß "ð ‚ Â7ˆü‚p“ŒŒ0øçpF£‚Á[]tAn:¹™áz…Ãaúúú‡Ã@z¼õàÐÐgÿŽÇ¦··ááR©~¼·6½Ãðð‰D‚þþ~†GÒÿN¦R Óç÷“{üÄI~þ« ƒ74C ¿»Æ†n^í¿1 t÷tg~¨A¸6‰D‚O÷離¦†Y••ܹlµuu?y’ü¼¯§ÓyÅà@’$\ÎË;~ÞÅÒ•>;ví"fîAnmâsþ±¿o|{ó·GOOOúc£ÍöªªòÞûpüÄ $IB§Ó‰Dxå7¯ÑÜÜ |v7;Ö”=ž$I ŒpäØ1Ú:ÚôBSK3'Ïœ&‹]q’I’ÐI:zz{iëhÇßï§? 8¤¦®–^/ÉT2ó«M„'Iª¦NþMÍÍüÃÿyÿí¼óÞ{üËÏAUM n±›ˆ`çî=ìýt_fyãßæà¡Ãĉ u6v!3VÇ™zÖTÄ¿ ‚pÀñw·}~?]8ªkjÈËÍ%s¾ªŠÖÖ6ê/^¤´¤„‘PˆS§NÓÑÕEgW7ªªM¸x¸zs¸†¬Èt÷t“ãË&‘LàïïR¨F@§Óáv¹Q…‡†èöc³X1 $’IÚ::PÕ&ƒ‰ááaE$I ±YmèõúÌZÇ.4UC•ÔÌö§’I òóùþóÏa2Ù¾k7›·¼Oþüîînšš[(.*dê”)$“It:ªªÒÞÑIMm Yî,fVÎàȱc¼ýî{t÷ôpÇÒ%X­VNŸ9K,cVe%Ïg}¯qÇ/‚ Ü4ãïöÇ‚Q]]=>¯‡Õ«Vrúì9â±8GŽcûÎ] R£?Ú¶ã§Na4I©©Ë—¥jWY'8íœ'­ím´wtàóz1›ÍD£1êê¢×ï§©¥™à@†æ&4Mm—ƒƒA4UE’ÒåZÛÛ$ ÓÒÚzå‹ÚÄ;ïô:„,˘ŒF/\ÀÀÀGŽã÷¶084Ä;ïm¡þâÅÌݽßïçñûûÙ¹{‡#‹‹Å!‹ñÑÇÛ8uú4Í--¼õλD"‘ËêÄ¿ ‚p“H¤›½Ç÷êO&“=~‚îžn"Ñ(ilnæÌ¹s,œ?Õ«VÑÖÞÎÐÐÕµµlxô ¸PUE*•Ê5N—iʾâºu…TÕÔ`6™(*,bdä"CCC¨)•IåÄâqÎW] c·Ù(+)C’tÄâ14À`0 (z@£¸¨h´åÀÙdÆjµb2™®¸îK{õ«jú‚BSUTM#µuutttâ°Ûéí룳«›±óÍÍ\lhÄl6hmkcÅòe°~ݽH’ĉS§±XÌD"Qúü~Báô„Iš¦eZ D¯~Aáæ‘˜Ð«_’$ºº»éë÷³rÅØmvFFF8á6›–Ö6ºº»"7'£ÑHCcƒp8Œ¦Mì' ©WëÕ¯¡©f“™Êé3e9]MÃ`0L¥&¡(2f³™‘‘B‘P:èkŒõ¼×´ÌØ|ŸÇKM]-ƒƒƒT”—_y”€ª¦"ic½óUTM%ÓÑÙ…N§c÷Þ½”•–PPP@ À¢… YvÇRòóòèÚÝÍðp€üÜ\Ün7³gÍâÎåËð¸³H¦’ÄbqZZ[ÉÏËÃétPŸÏìY3‘e‹ÙœéW0þŽ_~á…þÊëõÞêÃAA¸I’D,#‘L`43wÁ HH<¸þ>JŠ‹°˜-ttv²üŽ¥T×ÔpæÜy¢‘(³fU2uÊ9FýÅ‹€ÄœÙ³pØí™€–L%"';;ÓÛ^’$â‰ÑXO–³É„^¯'¥ª„B!r²³Qd…ž¾^"‘……x=†GFèéë%ã°ÛQ=Š^A–edEÆép¢( ýÁ ‰xœòÒ²Ë:Æâ1 Y®¬ CöB¡§Ïž¥±©‰‹ðz½¬¿÷^Š èéíãBu5@âÂB FÇOœ¤¸¸ÇÍÙ³çéêîÆçõŸ—G08Àù U”””PZR̹ U455PR\”¿éÖ•žž¤ƒjÓ¦MûZÌr$‚ Üž$IbhxˆH$‚Ýf¿ê´±žücMÓñx½Á€n´·z"‘ •J¡×ë/ ´ñxœöÎ6fUÎÄ`0dÞÓFïÒuÒÄnmcëô¿ñ=â5MËt¬»Òp¿±u×]¬Ç 7PVZzÙ<ƒCCÔ]¬§¼äòÖ€±V IJ?ëÿ~4E'ËèG‡Æâqôz=Š,>H·TŒ•!•JeÊ™L&‰'ôú åN_Å9wîœhêAnUS?·þ„çà àš¦Mpã?;~ÙWÇŸžÍïò×ÇÆKÇãK’4¡‡þ•Äb1Báye¹¿u›Çšú¯´þK/‚Æo3€a´é %óÞØûc c/ÆK¾Ÿ©[UÃùA„›GBJm»Asõ§;¯Ý<:Ž’¢¬Vëç¶š«©[;OÿXý¤Ôt‡JøA„›æ·¹ÿrËFºy¡_¯×ãÉÊúÜmÉðuÈ æêAn*E¯džK7 @'“Iì6;¡pEQnÈ:.uµ ŸJ¥Òýìvb±½á .ù«—J¦0"ð ‚ 7ž¦i˜Œ&œNgzìü ¸ ¶YmØl6†G†éêî¾Õ›ŒÁ`¤0¿Á"ÑÈ--‹$Iج6ì6»ü‚ ÂÍc·ÙqØ7än<H$nf‹ÿi¨š–N.dw j*Édò–•G’$trº3¡ü‚ ÂMóy)h¿ìrýý}èõz²|>ný#u‰H$LOo:éÛåÄâv·fè|*•"0<2,¿ ‚ð»OÓ4‰ùù™º·šÅlÆßߦ×ã½)}>O*™¢6R/¿ ‚pû¸â´¹·°,é?o}¹$IBÒé@ÙùA„ÛÅ­~°¥"Ýúg—H~AA¸a¤Ìÿ¾6DS¿ ‚p[¸Rx›,hlJÞ±tÀ—NÑ{©d2™™CÂ:¤±,{×Þl¥†ˆT*•éå/ËòWÚ/áó+ˆ |A„ÛÇ‚to_/Ã##L®˜@GW'š¦QZ\2á³ãç½O&“Ô]¬§0¿§Ó9ásápUÓ°›¦÷ó.$¤ËúñK’DSK3}~?&“¤£´¤§Ã9áBc,uñ¥sò_ö¤ÌUO,'âp8.+ÏØ·DàAn[ÉdŠD"1îßITU%ÅI¦R˜L&LÆtªà‘‘Bá0#¡T-º7`а˜Í´´µ’H$(-)Áfµ‘H$ …0èõX­ÖË{îK\q_2™$Û루°Öö6:º:q:œ„#"á0f³“ÉD(Æd4"Ë2¡pƒÞ@"™$c2›±˜ÍDcQ≪š"80@?åeå8ìöË[6D’Aá¶v…fvI’èìêÂßïÇd4‘L%™\1‰Aúü}˜LFâñ8hÐ×ï' ‡Èöú&áïïG¯èiln žHPTP€×ã½æÇÑX”á‘b±f³™P8LCcz½žD"AYi)í8N¼uëÉÍΡÏïGQ‰åôööÒ×߇Íj#0¡·¯‹Ù|yà½úA„ÛÚ¸<þn\M¥p9]̘6³ÉLGg'}þ>Š‹Š˜T> «Õ€ÛåNgßS5¢±‡lo6å¥e„Â!Á²¬‹Åè®X„+õ=Ð4¡áa.6^$QTPH Ÿ‘в¬0<2ÂÈHOVýýzEO$š¾XûÌÐÐ  áv¹™>u…ù¸.&WLÂh4^±0"ð ‚ ·…+X½^!Ž„‰D"„B¡t¾zIJmk¯Kÿ™H&I¥RhªJ<§©¹ MÕ0šŒhš†NÒ‘L%I&“h€¢(جJŠ‹ÉÍɽÂݾtÕV‡ü¼<¦OD¢Q$I 7`·Û¨(/Çåtâv¹I&´´µâÉò ( ½þ³Ï¸ÜérÉ2²,£ÓɨjzzàËÊ"¥ûˆÀ/‚ Ü. °š¦‘åÎÂn³S[_Gu] ²,ãóúÐ4žÞªj«‰'æ››KGGõ Ó½ú•t0&‘H¢WœNáH˜–ÖìVn—›þ@€R©Ëçâ—®2œOQt:N‡“lŸŽÎ\N&“ &‘‘Á`í`¨‘åvãõx0ŽûŒ¦ªÈ²‚¬Ó¡v:D’hhjL?®¸BIÔ¦M›öµ™éHA¾(UUéîí¦¤¨NwÙ{ñxMÓ0 (ŠÂÅÆb±ù˜Íf z=š¦EI¥TEÆ 7L&‰ÆbèõzôŠ‚,Ë™€j4Óéw£Q$ LFÓ„gê’$Qßp€É“&ÄÙt"! EQPU•D"Á` ™JÆe“шN§#•J‘J¥0 ™ïFcŸ}FUU€ÌÀx<ŽªªÆq³J  qôè1ѹOA¸=\mšN‡Ùd‚ñãÛG3繜ΠÃåÌ&ó„!tƒ!ý¬\Ó2ÝÆ?;—e»Í6ºÈkΠ×ë'”ol™zEÁn˜°>y´üw †Ï>sé…ÎØÂÕ*I~Aáöð9SöjΕK:@{½^àÊÝ\úÚokÿÜ÷%¾`ƒúµ´À_O+½„˜ÀGA¸Ý\ãì¸.§ ¸¾z£Êt³Ê!¿ ‚ð;O’$dL,Ãb±|¡ïÝ(ñx¤Ëüýs›ào0MS‰ÅâèõzøA„ß}’$áp8è  Üêâ ª‡ èéíC§»u·þé| v›]~Aáö`6™1M_›Qjãç °Zm·¼\:ŽÞž^øA„ÛÃ¥Is¾Æû¯K¹Ä>‚ ‚ð "¿ ‚ |ƒˆÀ/‚ ß "ð ‚ Â7Èçvî“$ ”Î,¤idæ¾™t:]z2& TM»i½"Óëý¬#F*•ºzét¨ªú…Ë6~ZHAA¸>7ð‡Âa …ÈËÍ£° Â|ÁW“ÂÃøe¨ªJk[]Øì6ÊJJ°Y­H:š¦rµ˜9ˆ¯—¦i45·¤3¡a2)))I§r¼D€Þ¾^|>ž¬¬k^G<'cµÚøštôA¾®øUUåÍïÑÞщ'ËÍņFûÖ£ †ÌÝ­n4 LLÐÙÙEK[K/ºìý±€œù¼¦¥çWM60þý³çÎóî–-äç‰F1®]KEy‡¡rú4²²²PUuº9}öK/Êjm´¥@–ÓyŠÇZ24Òwò—–MUU^zõU’É$Ù>.—‹œœ¬Kz{FË:88ÈË¿ù &“‰åËîÀçõfêdl¹’$!©ÑõŽýW[_Occ÷Ý»EÑgÊ8V†ñX×Óš ‚ WrÕÀO$¨«¿ÈêU+Yyç¤RI$IâØ‰”•–âv¹¨ª®Æår¡( gÏCÓ`Vå ¶ïÚÅñ“'`ÙÒ¥Äb1Nœ<…Á``áüy Iœ>s–¡¡!L&#V«îžnfΘAEy9n5hjnÆb±ð'ŸÈ¤Dì6;5µuTNŸN<‘àý­[±Z-œ;wžÁÁ!›8täÙÙÙ´··sôÄ rr²±Ûìôùýœ8y?'O"?7—»vSZZÂá£ÇhhhÀa·óñöL›:¯Çs«Aáw˜$IøýþÏïÕ¿vÍþø~H~n.¿zùešX´`>Õ5µœ;“Ñ@EY9åeeÄãq†††q¹œÌ˜>²Òî_·ŽX4FUU5þþ~ mmí¤R*^‡{î¾›I“¨¨(gõÊ•DcQb±nž/).æOÿø¸û®U<|”·ßÝLEyEÜ}×*¦NžŒÕb!™L ‡éî¸ˆ¢ÂÖß{/ùyy™ë„g4™TQN $‘H¢( ÷ܽšõëîÍ4³k€Ñd䮕+xòñ ¬¼s9^¯‡µkÖ°há‚Á ¥%%äåçrת•tuw“›“Ó=ÆšÕ«9uæ Ñh”Y3grÿº{iikgñÂ…<òàƒÌŸ77ýxAJ—­rútî¿o^¯‡¶¶vªª«Y{ÏÖ¬¾ ŸÏ‹¸ÑA¾*WmêO$?y ³ÉDqQЬ …¨œ1í;wñΖ-Ü»f F£Ó§‘“ÍÆM›°˜Í0<ËÖ4u´Ç¾Fú©ùhÎäQéëóãõzÈÉö1<2’„†FKkÙÙÙìØ½›á‘fÍœIgW:IG<§©¹™É“*Ðétôôô’åv3 ¡i°léRÚ;:xó­Mäåæâñd‘H$™TQžiN×T ¤C–4M#™L ªéÖ€t‘5TM%•RÑTŸÇC]}=¨o¸ˆÇãAQí ápØihldÆôi˜M¦Ìóü±†±õêõzÌ&ç/\@‘¢Ñ¨èü'‚ |e®ØÔ/I‘H„]{öpððašššX´hK/Æb±ÐÛ×Ë™³çxú©'Ñ ìùäSNœ<‰ÕjeùK),,¤µ­æ–fÍœ‰ÛíâÔéÓ´´µápØñy½øûû™YYIºó\v6Ý==̪¬Äd2PUUͶ;¸p¡«ÕÊCÜ'+‹T*Å©ÓgÈÊr“åvS[WÇÀÀž¬,-\@<çÜ… ”–ãv¹9|ô(­ííXÌf¦LžÌ§PS[G^n.w,]™³çèîéaúÔ©™\[_GMm=Õµ5ttt’ŸŸG8f挄Âa’É¥%ÅôÒÛQŸÏÀà ÇŽŸ X±X‹ÅBEy9^¯‡óª8~ò$ªªát8I&“¸³Ü8ìvJŠ‹iïè ¢¼œiS§päèq.TWÑÑÑÉw,ýB#AáRcMýÒÁƒµiÓ¦]±ã˜ªªÄb±LùX“ùö;ihlâ¿÷<²,“H$‰F#ÆL¾aUUQUY‘ÑI:¢±©T £Áéù>6ìnl¹—öÐ×4D"A2•Âd4"Ër¦œÉdN‡N§#£Óé0Œ[v2™BQd$I"£“¤ÌûñD‚x,†ÙlFQ”ËGîí?vG.IÒhŸ‡ÏF2Œ½>öÚØß‰²,#ËrfìÿØûÉd’h4Šñ’m NÊÔÅØr::;yñåWù£ßÿù¢sŸ ‚pÝ$I¢¦¦æóÇñët:Ìfsæßš¦Ç©®©eÉ¢EôzRªŠ^¯ ×Û/ûîX Õ4í²1ðc“㌶ãÿ>öƒÁ€aÜúÇ(ÊgE·X,—}O¯ÿì}ë%ï † å¹t½@&x_©ÌãS-Žý9¾©~ìß—^ÄȲŒÕj½lyãË!IÕ5µœ8u’>?“+Ò­"è ‚ _…ëJË»vÍÝ‘º3ùÝî4M#//—¹©9èt:JJŠ3£AáËúÂ_¯×3}Ú4Œn—ÓI–Û ˆÉ{A„¯ÖuÝñ‹@tcÍü'‚ _µLà—Ę1AA¸í)@€ššš[]AAn°@ ÀÿRFöa{T%tEXtdate:create2013-09-03T13:19:37-04:00»Çï5%tEXtdate:modify2013-09-03T13:19:37-04:00ÊšW‰tEXtSoftwaregnome-screenshotï¿>IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/files_apps.txt000066400000000000000000000010631330160122500236560ustar00rootroot00000000000000This screen shows application types that are defined for process running with the '%(APP)s' type. The description should give you a decent description for what the application is allowed to do with the type. If your application type is being denied access to a particular file, you might want to change the label of that file. It is recommended that you use one of the types defined on this page. Note if the label of the content that is being denied is owned by another domain, you might have to write policy or use 'audit2allow -M mypol' to allow access. selinux-python-2.8/sepolicy/sepolicy/help/files_exec.png000066400000000000000000002044321330160122500236110ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýgtG–¨‹~éÊTïA ôV%‘å½i?Ý3Ós¦çž™ãî=÷®w~¼µÎ¿·Ö»ïÜ3îtÏôôtOy©Õò†)zoAŽ ¼·å]š÷£PE€N$%5I1¿µ°P•™‘;bÇŽ½…ßýîwÖ¼¼¼oÿd±X–†aÁÄÄÄÄÄÄä ©T*uvllìou]Mß›7oÞÿ§¬¬¬ÈjµÞêü™˜˜˜˜˜˜|µX‰ÄÊžžžÿ»½½]NžïJÇLLLn/²m_LU¿‰ÉM étšp4†®ëØlV6;©tŠh,(ŠŒËá ‰âpر( ÉdŠD*‰ÛéDn¶ ‚€®ëÃt]ClV+v›mÎÀB4à b·ÚP5]×q:7t¯H4J2•Æãv!Kºa…E—Óy««ÅÄä®@˜Õ¾³}Èõê˦Ð71¹9B‘ï~º“cg΢ª*‹æÕñßycMgùÍ›ï`QdtÝ`^u%òüÓüí¿þšï<õ8K/Ä0 N·´²ÿè þòûßÂåt’i¶Bn .Š"º®#Ìü úÌo³ísB‘ÿߟý‚©`E–)+.âÙG¶±°¶:×A`ƒ!~ñÊl»o#Ã#LLNñƒçŸFDQœy²Ì²Èì{ ¼»}»á/¾û"kW4ÒÓ7Èÿú·ßQU^οý¢(¢i:¡H„g~ª²R^~ç}ö>JMe9C#cÄâqŠèºN8%N3¿ºŠ’‰FÀ¢ÈhºNei ‚ Ð;8„ÏëÁçñ`±xœ±É)>ÛyÕ•ìÚˆÞ! òÑt¡¦‚!œÅ…ŒON‘N«$S)|^~ÃcãLϤ)-*‡GH¦Rˆ¢H ßÕb¡hYÊ dÂÑ(gZZÑ4¿úó%éV¿ &&tA`x|‚÷wìbãê€ÀžÃGyrÛfJ‹ ¯)Ó Ã0¿‰ÉÍ`è:¿Ÿ¢‚|NŸkÁÐuV,©GDBá;öìG”D–,œOýüyÙ‰j®½u÷ ðùÁÔ—󯯾‰$‰$’IÊŠ‹Y·¼‘w¶ï䝸=ŽœnâBOËê±ûÐ6¬ZÁþc'xæ¡­æçÏ\/sÍ“gÏq¡·D2IEi {e÷á£È’„Ýfã‘Í›DÀ3-­ŒMLQSQÆ+ï|ÀÈØ.§ž—ö®nþüÛÏcU~ùÚ[|ïé'ðy½†®ë,šWC$ãõ>¦§€ÆÅ Mרuð0Ý}„£Q¶nÜÀÙöFÇ'‘e Y’øñw^`÷¡£t÷õŠDytó&’©»Án³2>5Ås<ÄèÄM­íÜ·v5Õe¼úRU^J]U²Ý~ÓK$&&w*†aP?¿Ž‘ñqÞþx?øK.¸¦ª?k‹“[ã711¹~4઼”ÿðgÂé–6N45sàøIþâ»/"Q[;v$IÂj±ÌÂŒJ=3àÖQ5-÷yë½q;¼ñþÇŒNL‚q±¡ê†Ášeôò»·ßå©m[XÞ°˜‹Æ¹3×Âé–6 CgÙâ…lX½‚þÝ«ô RWUAZU?×ʾ#ÇQ5MkW±²±yùuú‡†9qö¥%Äbqö;AaA>—‹ï?ûUe¥3y11¹ gcÃÌgë“çæŒßÄä&îþÚ/tQZTļêJ>ÛwP8‚a8V/]‚EQ°Ù¬èzfº»«Å‚( Äâ ȵ?‹¢à°ÛEY–‰'“töö1>9…aè$S£A»ÕJ0&žH`·Ùæç>òÀ&V-©GÓ5‚áV«…‰©)†FH¥Ò¸œ4Ucdlý8>¯‡ÏöâóƒGpØm¬h¨Ç—çE–$ò¼n,Š‚$‰x=n*KKh\´€OwïÃjµR˜ïçLKñD’Ÿüà;lß{€g[ذrYÎP.?/QH¥Ók}»Ç6ßÏÇ»÷ÒùÑvÖÕ°åžõDcqNkÅëváq¹XX[͆UËùøó½X nÚÀâùµ|ô¹•h4Æ¢yµ¹Á…n¸YÆfµÐ¸p†®c·Û𸜸].J C3 òý>€™àu»)ðû.¦™±%XÞ°˜í{ÐÙÓËøä¥E|žõ>ušx"ÃnÃn³âózrZ³ß2¹[Ñ‚|ž~øAÍ÷ø|ø|×Õ6„K–,¹l°‰‰ÉµÑ ƒT:M"‘Äb±à°eŒøÒªJ*­Î¤ÊXà[…d*=3ÏXµË’„®(ŠL:­"Ë™óEà ™N#‰"Y‹xA«ÅB"™¬3[ à ™J£(òLú ÂÌ@@Õ4l ¢(’VUTUË ,JffO&Ì5UMãg¿y…|¿<ûäœçÎ<›‘Û–V5 CÇ¢($Óiâñ‹YÊäED$I$•VQd UÓˆåÒH$“IÒªJßÐ0¯½÷?|î)ϯ#‰’L¥f )5EQ2;LLîbA@´+ì¾¹Ö9ÍÍͦªßÄäf›Å‚Íb.úÃEÙ67ĵaج–+^Ç0 ¬%׳ŸQÀ~…PÙº®cµ\øYlVËe ß0 ”µyÖ0/«*ŸÈÝK:ºzåÑÍ÷åüdÉfßG‘%@Ê<‹¢ä$W{N‹¢ä†aðùÁSœlnA×u–,œOUyÆŒvÁãt`dËÐbùÂÎÍÄänÀ0 f›ñišvÝçåTý_¥1“»…+µ#óÃu¥½Òos öŒ/LÿE׿ôø¥›ÍÊÓ?HUy)—ñú¢{_Ïs^šfÝŠeÔT–cQ,”f´!ú5ïcbbrs˜AzLLLæ`%ÅT•].ô¿.<.'ynWÎó˜Ù™˜|õ\æÀÇlh&&&³¹^ÕáWÁ¥jK“¯ÓW¿‰‰‰‰‰É]BÎ$Iæú¾‰‰‰‰‰É]@nÆobr;q'Bÿ˜ÛaïÄò111¹}'&'h?ß>+2—‰É­AÓ5üy~$I"Ýêì\Qq:œ8N&§' …BèÆ×·Rm³Ú†ƒ¨ªúå/ú5b±Xðz¼¤R)‘0š¦Ý‘þBf×µÇí¹#ŸÁÄd6r$¡Î]G^^ž9“0¹e‚Àôô4ƒÃƒ,˜¿€¢Â"r±hoG„ÌÌ{br‚žþ&'' ‡ÃhzÆ .·Eaî±™ÿ@î÷k¦ÏÜEQGÂäûó)).AQ”Ûº|âñ8ƒCƒØívÊËÊ‘$éöÍï<‹aLLL‰Fð¸=f_irG# X,ìVû×:[11¹¢ ³ÄH&“x\dùö_…§ÃIËx ‰D‚´ª’N§±Xb±8‡D"‰$I™È{‰$‡ƒX,ŽÍfEÓt4MÃf³^3}<G’%$QbjjŠ™ í®äR¡&BÆ0lMÓ®ûÝg"Ði_ƒÐ1'øE1 F¥œ‘Þì< äFîàu! à°;D1×6.¤’(‚ ä¼í‰¢ˆ €¦}½ÂVÅœ›Ý+d<÷Œ³Uý¢(^¦–ü*WŠNöUõ%ÙºþŠ•9&&צ©Äb$YÆÐ“øòX­N4-I8<„ÂAvçœþòJ\Uðgg‡¥¡~1¥%%×ÕxA µ½I”(++edd„²ÒÒ/4ÖÊDQd:$ŽPVZrÛª2M¾˜lØ×Ùúõ„Žœ=ãñ‰ öí?€ªi¸œNV,_F  àºîß70ÀØø8 _ù–UÌ€X@@3ï©(‰X¬ù\Úp$L:Àf³ÇI$×WŽ9a)Bή ÛfAàøÉSD¢QÖ¯]ƒ,Ët÷ô019É²ÆÆËÚa膑}ŽŸ<‰ßï§¢¼ü²{‚Û±Uõ ‚ÀùÎNNœ:ÅÅm æÏcI}ýMçGUUú)* `µZså222 7uÝÙuÁW¾Œcbr½hšŽªé`LQ”ŸÄ®Èhª„"jxíS¨i‘¨Ž¦k_(ø¯Ú ‚À¹–þùÿÊž}û.ž0Óùd;¬°žýÿÄÉSœ9{–h4Ê™¦³¤Òé\‡?›Ùk”Û?ÛIó¹dYbllœÖ¶¶œÑ”0«ƒš-Lf›ýßäö`llœ¾þþ9ÇúúûŸ˜¸æyÙÙ_Vø±óóÝ8úxó÷oÇ/3Ìj¦²Ðy¡‹={÷¡ªÚ•óìϪª^ŒÌÏ›vö9³¯ƒ’,ár9‘eQqظ]nèééazzQÈ ò °YmH¢„$IȲnÝ2G% N¥Øyô(-­m”—•±iã=ìØõ9CÃÔ—–R[SÃ;ï¿Çíf|b‚’’b¢±f`pò²2îÙ°ž½û022B(fáüù¢(lÚ¸1“Q ZZÛØ𠊢°åþûÉÏ÷óþG1<3SÏ|4P¿ßE¶ÖÒLNNbQ,äååáh˜H$‚ xÜnAÈh ŒËUãV«•yµu|²}Õ••ˆ3yÐ4£ÇsúLS¦}n~€]»÷ðîû022½ï¡§§—-ÜO0bçç»yþ™g¥ý|Ö­ãð‘£Ûàúuì;p±ñqìv;‰DA8uæ ]]Ý<ôàV¬V뜺›mÕ¯ë:ååÔTW£k:““<ýÄ ŒðÛ—_AÓ4jª«add”’’â/®—ò2îY¿€£ÇóÎ{ïÓÒÚÊã<’é(gϾýƒA-\È’†z>úäÓ/¨ëûç>‹Ù§˜ÜBdYÁjµ‘N§˜ W08ÔI¾?A<žÆh$™Ò3 YúÂk]qh ccc óÀ}›H&Stw÷ŽD8zü8µµ5hšÆ;ï½OwO-­m,YÒ@o_;vîÌY:‡#NiâøÉS?q’M÷n¤qɬ6óêjYµb9GŸÈ ÊÊX¼xõ‹266Nó¹s|¶ësÚ;:X¹b9Íçαgï>š›Ï!Ë2kV­âó={éííåÝ?Äãq³háÂ;bÿ÷݆uë().â~öO¼ñû·ù‡ŸýÅEE¬^¹êšçézf{N¸CCC|üɧœ=wŽX,Æàào¾ý6.—›ªÊJþðî{9vœwÞŸªªJœo¼õ{Âá00 òûwÞÁëõÇyïÃ1 ƒÚš–/[Æñ'8~ò$§Îœ¡¤¸˜Úš¶ö]]Ý|ôɧTVTPYQ1'oÙ-v²,ã÷ååfï¢(ât9)È/ ??‡ÝAaQ!~¿„ŒæÌçóa·ÚéêêÂasàõzñù|èšN[{Áé ²,#Ë2±XœtZÍÌø¯¢yX³j%¥%żÿÑǤf–zûúxÿ鬨 óÂvïÛGuU%…V¯ZEiI ºº8{î§Ï4ññ§Ûé8žÃGŽDÙ·ÿm¬X¶Œæsçø|ï^šÎ6“L¦¨_¼I’9yòŸlßAmM ²,_Rw‹~M¿xLÓ4ÒéôEK:M0äøÉ“T”—SY^N]M Ë—-½®z©ª¨ •JqâÔ)Ün7EE…,_º”ò²2:/tÑÖÞÎ;ï½O$¡¡¾žÏvíâä©Óœ:ýum̭댵‰É­ÃëöÎhÿ$ÒFcn’z%©´D2Çíò^×rÔUsK+}ý|øñ' sâÔ)4M#ÏëeùÒ¥lÝüÃ##„#QŠ‹‹X»z5ë×­åBW7©T:· Š"Ý==”——³|éRêjkPU•ööšÏµFE‘|¿ŸªŠJ*++‘$Ý0èîî¡qÉÖ¯]ËâÅ‹¸ÐÝ,KÌ««eñÂX­V,Š…Çy„¡¡>B,¿ÕucBff[ð×õª*+ùõoGUe%ýW?!(¸æìéR¡¦i:•üðûßã¿üÇÿ†Áç{ö‹Åذv ë×®E”DNœ<‰ÝfcÝšÕ¬_»†éà4ÓÓÓ‚ÀÔÔCCÃôööŽD°ÙìÄb1Ú;:8×ÒB4# á´;˜WWÇüºZ4M'?ßÏÖÍÐÔÜÌé¦&RÉä\«Ï÷Í8Ü™­ªCtuwÑÝÝM<ÏiÁ²ê8EVP…‚‚B¡Éd’Þ¾^‚¡ õ‹ë ¹AD^ž§Ó‘12ãÊ‚_EÞ¶þŽ? 06>FGg' È ‚¼^/ æÕ(( ~ñbŽ;Á…®.6mÜÈÁÃGèíïgñ¢Et÷ôаx«W­dá‚tuu#É‹.`Ñ‚ˆ¢È™³Í8Nêjk.ËWö]¸Lm>£:Ï 2ßý>Ë—6’—ç¥ýü ÔË™&R©¢ ’ŸïÇëñPW[CAA>‚ O$bͪ•¬]½ŠÂ@€îžœŽ/¨ëTÊTõ›ÜVX,VÜ.áHÝP±Xdâ‰(c£X­6,Ëu]ç2Á/O$8uú Ï=ý?þÑùÑ÷¿Oç….&&'‰D"´ut°ÿà!JKJp»]ŒsöÜ9Nœ:ͼº:œçÏ308ˆaèTUVÒ>sN{G==½œjj¢¡~1Þ#üÿ’ÿöýWþú¯þ’Â@à ­·uãr!1>9Á‘cÇØ»o?‰d’% xÜnvìÜŧŸ}†(lX·–D2ÉŽ»Ø±ës ),,¤`€‰‰IÊÊJ©ª¬äM›¸wÃz‡8Ót–Å‹âõxÐ4 UÓÐ4uf¦§‡)(ÈgÑ‚=~œ©ééËldQÆjµ"Krn}^±(SRZ‚ÓáD¥œ¡ßç'‰D†‚Œ‘L& PU•D"×ëE36éT]7rNƒ.-UÓPU•|¿Ÿ·l¦él3±xœâ¢BJŠ‹Y8>nÙLã’dI&N³ÿà!ÆÆÆh¨_Lk{;±xœ‡·måÔ™Ó`@Muuµµœ<}†Ïví¢ù\ ‹,ÀÐ TUÍÄ à‘‡¶‹Åøô³¤ÓiŒKÿ•ò«ë:º–ù3Œ‹¶ª¦Ñ×߃õr‚©©i4]C@@QŽ=FOoïŒgD•åìÙ€;w166μº:TU½áº61¹•d fS©E…ÅhšÆtpŠÞ¾žŒñéuÊ>é…_øï¥¥¥ØíöÜ…S©ñDœõk×0 EV8~â$ñD—ÃÁ£çÏ395Ea €ââ"'ã”—à÷û°Ûl4Ô/¦º²›ÕÆÒÆ%RVZ  ÑP_ÏÊËA€²’<š¦2¿®ŽÆ††Ìš|q1Š¢äÖŧƒÓØl6lÖËë>”ÉGQQº®cQ,TV”ãñzsVú×S/ÖgêEDjkk(--atlœ|¿¯×Ca ÀêU«‡Ã™zܰŽùóꨬ¸ºVUt]ÇépÞêfer—’Ým748HmMš¦255ÅÄø¥%e8.®CÆÇÇ^}íUcõêÕø}þ9 S’¤9£\EQ8ßÙÉo_~…¿ù«ŸŸŸQ£íÙ·ã'NòWÿî/°Ùls¶aeÿëº>Ǫ¶±Ììûd?_z^6­¦iWLŸýýf|˜Ü‚ÀäÔ$ç/œ§~aýe¿em7fÏÀfïïÏ›½G<»§}vç-C¿ìu²i³ïÎìí‡ÒŒÀ;»Â¬}òÙë¦R)ºûºÉóæœá÷ûD5™µ;ÎÌýg‚Öd×ߢÑ(‡t:M,C’%Ü.7ét:·üåv»Q,™AlzfgL$ÁawPRX’ ™ö:{¤,K9íÙìý캮Ï,!¹Ý²$¡Ïü&Ëòœ»$Iˆ‚€>« ξNÖR^’¤9»DQ¤§¯‡zZÉS†yñûki\²ˆ¦sçyíÍ£bœ,u°eu¥¹æ—‘}wR©š¦RTX„( s–~ ‹&•Jb·;fý&Ð|î}ò)ª¦áv»ùÎ /05=MSs3O>ö(Š¢Ì û|é{;Û—À¥Ÿ³q°ÿïÿù·¬Y¹’§žxQijnæw¯¼ÊŸýðOX´`ÁœÐÓÙóEQ¤­½c'N²võ*FÇÆY¼h!o¿ó.ÓÁ •å<ùØc8ŽÜ¹³Ï×uwÞŸŠ²rÖ­]“{†Ö¶6>û|7‘H‡ÝΦ{7²tÉ’Üà ›÷H4Êko¼Éc?LiiÉe¡³ÍA¶‰ÉÝ… g±XŒo¿ø¥%%X ÁPE±095…ÝngttŒ_þú7Òé4Ñh”¼¼<A@UU‡†øèÓí¬\±‚Â@~ü ˆÇâh𯸸š®‘ï÷c±XˆÅb ÐÚÖÎàà‚(¢( ‡¥óÂyh[n2 211‰Ï—Gž× ÀØø8£cctttâõdމ¢ÈÀà ¿yéeîY¿žÆ% œï¼À˯½ŽÛ墠 €X,F$¥°   O$˜˜œÄåt¢( ÁPE–±ÛÍå5“»‰ÜŒ_â‰ÇŽŸ //†Å‹ˆFc4=‹ÕjEEZ;Úiio'•Na·gâ†ðáÇȲ„ËåâùgŸá¥W_cbjŠ¢Â/>÷,¢(^ ]* èZ]7P,6l6‚²,¡Èvb1CKg æ”ÿnB…ÜR~:­^Õe¯ ¤Ó*—ºššêj9ʱãÇY½råÌû%ÐÛ×Ï®Ïw3::ÆóÏ>ƒßïãíwÞËøÉGàþMÙ±ës¾ýÂóŒóË_ÿ†ÿ÷ûÑqþ•JåäÆŒï‡ÝN"™$•J³~íZ~ðÝï011A0ì6 æÍãÄ©Óôôö …¨¨(7Uý&&wsŒûøè#jkjð™íÌÄä®cŽª_V2_õœ¾ˆ"+äç³s÷njª«¨ª¬äÝ>`Ãúu|øñ'ôöõá÷ùf¢‡e≆‘QÝΨS!Óí•úøßÿÝ^~ç('OÑÜ=A à `!>ÖAG«…×_}™÷“ÿÍ´@¾‹ÈZõ ‚™ÝëÚ»¤Óit]Ë, ÌBUUÞyÿZZÛp»]ˆ¢Èº5«™sm$QÄjµ²fÕJÞýàCþ©ÿ$’Iž}êI T5ßçcíšÕ|üévª++ÈÏ÷Ï1ZUfÚÈò¥K1 x<$I””³LkäÍ·ßF–$jª«Ù¶u ¯¾þ&ÿòË_‘ž±¼%I–‘$ yF#¦È +–-chh˜žž^<^‹… ëÖñö»ï288DWw õõ@f‡@]M Û¶nå÷?Àa·ÇÙ°v- õ>v 1ìHÆf³a±(¼÷Á‡üéŸü€’’b>Ûù9O<öØ­®v“[€pàÀcÑ¢E¤U•ññqòýþÜ6¾h4J<žÀî°ÓÛÛGQQ!‹…ÑÑQòóóñ¸Ý 0>1×롤¸˜é`§Ã¦g¶••–]6£x2ÅðXD2ÛiCOEù·_þ‚ÝŸï ¼¼’_üê7wL2“/®ët^èÄïóÓÞÑF2G’¤9Á£2ƒ‹bcñ¢ú9[à Ã`rr’ѱ1Š‹ŠðûýDc1"‘‚‚¡†aàËËc|Fîóùðû|†ÁØØV«ÇÃÈè(v»¯Ç“»‡ªi—µÃ0Çír!+ ÃÃÃhšNIq6›`(DÿÀЬàõxp8ì$I¬6+ÉD·ÛÅt0HA~>ÓÁ CÃÃØm6ÊÊʰZ,  1==Ãá PP€ËåšóÌ£cc„ÃaœN'…’$16>ŽÃîÀf³26“߉ÉI‚Á óêêØð ûäÿøOÿñªž5MLL¾y‚@kkëEÁoÆC¼l¢ÙŸ/Ýâ”='‹®ë™™†  EñŠ‚?KÖeoF*0==Í¡Cñx<¬[·ÞœñßEèºÎùÎó4Ucpp€h,zY:‡ÃIiIéœu÷,s·ŽÎÝ^ªëúœß.ÝÎÌñQq5—¶‘+w¥ûg¹ÚòE6—ævûºZ~f—!d–ÔŒ™ôÙüf¯­ª*¿üõo¨ª¬äámšF}&&wYÁ?gJ}i'0»“¹ÚçKÏÑ #çrå‹Ü°Îîà ]Çëõòè£]ñº&ßl²ª~ P…ššÚ+¾;†a\õݸ’`œ}ìÒwøÒ´³¯{µ{\éøµÎ»gW³ów­<]w~®Ð>³×N¥Ó”––°li£9Ó71¹KùZué7âýRg"ælÿîâÒwÅø}=X-Ù¶-§¥011¹ûøÚ¿$I3ŽX Sˆ›|!©TjΓ¯3’‰‰É×"ø ÃÀfµ‡ééíùB?ä&&©T §Ói %“¯™¯mÆ/Š"^¯MÓL•¢Éb·Ù3Vüæ»bbbbòµòµï—3·ä™\†,ÆÄÄÄäÁ×.•ÍÎÜÄÄÄÄÄäöá v—•É\2û¤ou.LLLLLLnŒk ~M‡‰˜F$©›Bnಉ8%DsTdbbbbrqMÁ¿³#Îî.PJD7Ì™ÿl¼V§ê-¬¯²q·‰Ì-š|Ì%3“¯Š« þxZçDšµu~òœ¦Þ ˜Œ¤8Ô5Édd"ŽßãÈE ü&£j*Ó#Ó¤Õ4N‡›Õv«³ôGÕT‚£AòýùäyónuvLLL¾\Y𡄆ß)!™BÿŠˆåÙq¸äûlw „"+ŒQ(š Æäë#(™NãËó™*“/ÍUfü‘¤†×nÉÅõ6™‹(B¾K!–Ö0tý.é- ²$_3XŽÉW‹ÅbA is" š˜˜˜Ü,W²Å’*^»t1t®ÉDò2ÑÔÝ%ü$QBETU½ÕY¹kEQI«¦M…‰‰É—çŠ3~M7P5·Mš³rçL¥0ff{V«EQ¾¤ ¹øá—^O4MCÓ4EÉÍ|Òé4‚ Ëò5óJ¥H§U $QÄfˬOë33WE–sñÙ¯Ið:dG20ö4Nçò§ëz.¿@Î}ñlo†Y ù+ÅyÏÕÇÎK§U$I¼¦ºÝ0 R©Tæ|@–¤\{MÓá†ã(dƒ¼¤Õôeõ®ë:ªª¡(ò ÍL³Ï’=çzÎÍF—›ÊöFgꪒJ§su`µXÅÌ; i²|õç0 ƒD"1s®ˆa袈ÍjýÊgå¢ ‚‘ɯÕb5Õý&&&_Š+ þ´¦#`à´J€@¶“$‰½ûöóêoRP <þ裬[³:×gØì(`Y6ûØ¥1Ò³³ÈžÞ>Š 8Ž9ÛÆAàÌÙ³:|„?ÿÑg˜ÁÇÛ·£È >üÐï™ýü?ýCÃ#8Š‹ŠxxÛƒtœïÄápÐÓÛË÷¾ý-dYÎ ÒKó|i¬tAp[%ÒšŠªj „#^zåU}ø!jkj8züŸïÞÿûó?Ãëõ°óó݈¢ÈÖÍ099ɉS§Y½ráH„’â✠žýÜ{öí'žˆóØÃcª¦ñÖþ@Cýb–Ô×çÒ]*ƒ¡?ý矊"3¿®ŽÅ‹1>1A8ÆjµòÀ}›®zþ•ž;÷ޤÓèV}Ný8uŠ÷>øýàÔVW¡ÏÔŸ dœ]ZŸ†a ª*oýáp:ô÷÷³níšœÐͽW‚ÂE¡<4v»Ógšh\²ä ï7;¿ï~ð'OÁëõ`³ÙxdÛ6zûú((ÈçÄÉS<ÿÌÓ¸\®Üù³ß‰p$Â˯½Îää“S“øó)..âÙ§žÄãñäî}éÖÇk•ïµÊÜÀ0µ,&&&_ — ~P5QÈ~ƒ¹Â. QVVÊÿôG‚€Ýfchh˜¼>AAA>º®Ó?0€,Ë”–” ( ±XŒÁ¡!DQ¤¤¸˜H$‚×ëÅ0 Âá0ÑXŒŸýüçlÛº…5«W#KƒCCè†AeyñxœÖövN9Ciq ¥¥%LMMc™™a‡Ãa‡†p¹\ÍC!zp+«V®@Dt]Ãn·‹ÅÃ0 ™LÎɳ,ËLMM16>Çí&ä–> V ƒdZE–D, ’$q®¥•²ÒRšÏ£ýüyÎ_褱¡s­­¬]½Š‘ÑÑ D«ÕJûùó|²ý3ž~â1jjjH§ÓŒ£( ¥%%L§éíí£¹¢‚@ €Çífl|œh4Š®ëLOO319…Ï—‡///W©TŠd2ÉsÏõ$ƒ¼õ‡wxê‰Çñz=D¢Qlv;0 âp8ˆÇâ$SI à ??×n¨ÌÌí“&&&_ Wœñ«šŽØ-™?³„¿( ôööñɧÛQ…M÷nä½>Äï÷ãr:iïèà/þüÏøø“Oé¼Ð…ª©Ü³~=÷¬_Çï^y…ѱqŠ ÙòÀ¼üÚküà»ßAUU^{ó-–.YB[{;º®ãõx±Ú¬|²}¡PˆªŠ ,XÀÐÐ{÷ígjzšgŸz*³þ)ID£Q~ûò+D"‰$O?ùË–6æ´jZåèñ㌎ŽR]UEyy9fñ¢EH3ZŠ?¼÷>fò¼qýzêëùù¿þ+6›²²2žyêIv{n6æ´Êˆ$Ó²$±háNœ:ÍòeK ƒ¬]½Š¶ö¼ét»ÍÎßÿ¯Ÿ()*bpx§ÃÁ…®.¶ïÜÅSÛâló9¦ƒAV¯Z‰®ët÷ô²gߢ±Ï<ñxÎèrxd„·ß}QÑTgžz‚¢ÂB 3à‰Åâ9z ¯×Ëâ… ˆÅãœmnÁf˰H$ÂïßyX,J2•â¡­[s³á<¯—šêjîßt³$I¤Óéœàññ ¦¦¦xâчij>Ç÷m¢½£ƒ÷>øˆ‚‚|âñ8O>öºº8uæ N§QyæÉ'.>ËðÍÍ-8N>ýì3¬ ,`^]-oßA,C–eª*+3ï–ªá°ÛB"‘(B–eì6nÙÌK¯¾†Ëé$S^VÆ·ž.7«ÖuöÎóH’ˆ×ëaYc#'NžfIC=¢ `è:‡ŽåøÉ“H¢HYY>´-§•É÷ûIÄØí6ùüú¥—yæÉ'p:¼þæ[<òÐ6Þ}ÿC‹B<gñ¢…lºg#ï}ø!Ñè ”¹,‘VÓ¦šßÄÄäKsù±Qõ+¢Í’ÌV¡ƒ€ÍfÅï÷ãóùð¸Ý<ýÄøgŸ~Šh4ÊÎÏwãõxÐu={÷ÑÜÒÂÐÐ0óW?áOÿääçû‰Çã9µf<gÕŠ,Z¸|÷;¬Y½ŠªŠ Ö¯]CEY§Î41==ÍâE‹øë¿ú ÷Ý»‘»v‘J¥E‘öŽó=vœ‚‚&§&9täÈÅ| ‚(àv»3— ]׈F£†Ž(ŠŒŽŽ²k÷Å<¾w/ñDœP8Laa€•Ë—aYÏ–…Ã*#K"iUE×uÒé45ÕÕÄãq=ŠÃá`úµ  qêô™Õ´ E±ðÔã³dI‰D‚eK©©®âÅ瞥¬´”šê*êãv¹hj:K2™bÙÒF~øýïRTXÀ‘cÇÐgÊítS½½}äû|t÷öÐÖÞ3êp]Ϭ;;Ü.Š¢L¦ˆÇc†tvuqæl¾¼<¦§§9qêñxœX,NiI uµ5躞ûÓ4 I¼(øu]ÇÐuΞ;ÇÔô4ñD’ÁÁ!z{{I$x=n¾óâ ,Z¸½0 RYQÁ¿÷]ìv;GŸÈ½ÉTŠp$ÌC‡˜_WÇ¿ÿ=Ö­YMž×ËŠ¥K©ª¨ »§‡|Ÿºšž|ìQgÊpbr’}û÷³fÕJ~ðo‹Ç9~ò‚ °åxä¡môôöÇsÏb6«—Ë…ÝnGÓu¢±hF¥.@$eïþýˆ3Nt=J(ίª*ª6S÷ªŠÛå¢0àô™&:Îwb³Ùð¸Ý$’IØ´‰ž}†³Í-8tˆ3g›o¬Ì‰T2e ~“/ÍgüÉ”ŠÛ~5c7ƒªÊJzpkƨNQˆ'9ã;Y–ÑõŒ0õx=ÔÕÕïÏGÓt4-#ˆdYFE4M#‘H戢(™™ëÌ÷Ÿï¦£³“ÊòòÌõgŒþ2 ©Z΀-™L¢X,øòòxxÛ6*+*.æÝ0°Z­Ü»aëÖ® ½£T:M"™˜“gŸÏGiI ùã³wÿ~þå—¿âÿú?þwŠ‹Š2÷¬Š„"fŒÓtEÀ0 ÏëÅïó±cçç<õøc”—•!ûä[/<€¢È8ì6RéLG.‰Rn½;‘H°cç.AÀåt0–ˆ£Ï”G¦\ =#l‰$©d «ÕŠÇãaÛ–-ÔTU‘žY Ö4 §Ãκµk(-)2‚Ìl× •L‘H$Pd§ÓÉ=ë×SRRLyi)O?ù8¡ã|'öÃäŒD)ca®i¢(’H§iimÅ——G8ÂårrêLååÈŠ‚ÝfÃn³¢¦Ó膎EQf<Z2ˆ™g™|¥R³l4ε¶²wÿ/\ˆ"Ë™å'ÒjUUsï„®dêA€Ü{h±(ˆšˆ( ¨3¢†a çÏgËý÷¡¡p8w-UU‰Ç躎Ãá ²¢‚ùóê°(–œñéECTе̱Ɔ>úôS:»ºX¿fÆVA°Z-82KJ7\æ¢H4½Õý…‰‰É7€+ þ´Š×a¹¢u²,+œn:ËÿøÛ¿CE6ß?MÍͬ_· 7Þú=ùã?çžõëèêê&‰àrºXÚ¸„}û÷ó?ý•<öðÔ—•ñêë¯cµZÑt»ÃNmM o½ýÙÈ¡Pˆ¡‘;‹ÂÐð0?û—_022ÊsÏî»÷^ò¼ºº»q»Ý¹Ùbö9YÉ ²y–e¿ÏÇþƒÉÏ÷S]]MwO‡ÂÂç;/pòôiâñ8»ƒ¹Æ’ÙAžª©(‚ÂèÈ(±xœï}û[ òi>×®={ñzg`hˆóæa™Q“Ž"I26«•²ÒR¶ïØ F¦ÌÝ.µ5Õ8|˜ã§NaQ,,]Ò@wOOf8³+˜™ECÆXU2ƒ¬æB–eœN±XŒÃGް¬±‘s­­@qq1†¡Ï±mÀÈ ä CGÕ4ÊÊJÑu¡áaêêjÑ4p8ÌGŸnGªª*Y·f5£cc7Uæš®!K¦ m“›G8pà€±hÑ¢Y–ÅÐÞ7N ßGMiÁe3þp8ÂÈèÈL§$Ÿï'•Jáóù±±1Š‹ŠÐ4¾þ~’É%ÅEøý~Âá0}ýý(Š…ªÊJâ‰8]ÝÝ8N\.'ÅEEDc1FGÇ(È÷c±XèìêB–d¼^N‡ƒÉÉ)"Ñ(›²ÒR’É$Ý==aQú²²RÜ3Ù†a06>Ž{F¥ c´©éi¼/}ý}8Nü>?ý3y.)Æa·ÓÓÛK<ž ¼¬”‚‚‚¹…'œéèezrœ€Çž;ž½vA~>’$‹Ç‰Åbø}>4M# “—çE×õÜçh4J(¡  5fpx»Í†ËåB’$B¡ðŒÑZù3e966NII1©Tš±ñq¬V ………¹% MÓ2Ïèõ¢ÌlŒÇã$’IlV+CÃ#äçûQd™‘ÑQ@ °0†ÁÐð0PR\ŒËéœó܆a015ÇåÁb±L& G"ø}¾ÜîŒ`0Äù 8tä(›ï¿¢@€¢¢BÞÿècÆÇ'X·v5E……ø}>Bá0ãããäåå! ‡ñ‰I¦ƒÓäû|x¼^‡†PÓ*.—_^ª¦199Ež×sÑæÂéÌóùý㾩éiwgÆìÏ×{¿K™McµXqع÷fö}dYæðÑc457óÃï}7çƒàÝ>DEž|ìÑœÊüÒgɪѯV³ÍÎÛ¥çe·æêe¦¬/-‹9å5“þjïÄ•Ê"[Æ‚ ‰FyéÕרrÿ},\0ŸP(̯~û;žyò ª*+/{æ)óp4LIq yÞßÄÄÄf­ñç<á©*6Y@–Ä».ÎüÍ`³( «9OxwY¿«Q\TDIqqÎ:`~]pó‚ývÇírqÏúu]%‰µ«Wͱ³ø2d=Uš˜˜˜Ü,r:& çf"‰d2c­.ߘÛÕ»E‘qÚ-D¢Q$Iä®- J§H¥RD¥è]’øºÉÅWýÛ‘H4B0Ä,r“E2ÚVyxt§Û™óhf¥%Åsü›\«Å‚yó¾«`Ö£ãÝôÌ·ƒÌ2Z,»ÕY111¹‰Åb #†AUeù_þªw)ùþ|òýù·:&&&&&&We|bœóçÏg<÷™Â&&ß<²n‰owî”|šÜzÌwåË‘ Rv«3bbbòõpµm·wJ>MnLÁÿå1¿‰É7”;E Þ)ù4¹=0ß•/Ï-øt]'œ¾¸ýH°Ymßï.'ÑH»Ý>Ç—ø¥¨jš`0˜sªâp8°Ù®íqLUU"‘LxVÉtKjbò¥¹S:É+åÓÀ ’ˆÇE§Ó…Õj% ’N¥ré\.7Ì…òæ;E"a$IžŠùfI$D²Û5dYF%dEF%‰çª;¡Ò3ý!†Áň§BÆ«¦¢Üêâ¿c¸Ö Q×u"‘ÉTEVp:$ dYÂnÿòïÀ7‰+J×x<ÎÛï¼E<G’ddIbÁ‚ECÓܳ~#;wí`ÕÊ5ÔÖÖ]õÂccc¼õöˆ¢ˆ$I±iã}æ¤dzzŠÅ‹ê™˜gÇÎí<úðãøýþ[]6&&w4wÊLújùìééáÀ½„Â!DQdýº4.idÇgŸ200€ÅbÁ0tîß´Ã0h:{šçŸ{E± i*   €•+Véx‡T*M:BQdYæÉÇŸ¦¤¤ôVWÁ…n\®êO&“œ8yŒöŽvâñV«îßLKË9BÖ¬^{«³}[q•iu&:Ù½¼af4=95‰8’5ëzttt„h4J Àíöä® :’$ñè#c;wî «» M× ƒ8¼yy45fhhŒÌ(:™HÐÛ×C(¤¨¨È©™˜Ü$wˆà¿B> ÃàÌ™LXå§Ÿ|‡=¿ •JÑØ¸”e˧ÓIk[+étšìeDQ¤ªª—ÓE8fjz]ËôIEEÅCA ]'?¿€¡¡Al6;ÑhŸß,Ë  QZZšÓRªªŠÇíá±Çž@‘3QDGFGp9]ƒAÒjÆe2™dhhI–).*ÎÍæóó xîÙåÀ}¬[·!“`±ñ1‘0“Øìv’‰i5Ë颰°]×BUUŠ‹‹¿P{úMÆÐ/§Ï67ÑÚÖÊúu ‰E£x½yY¥i¤R)P5¿?_žññ1‚Á v»â’¡ȲLIIé55Úw:WÕ§†Á™¦Ótvvàóùq»Üœïì 0PdbÜwu]ààáH¢„ÕfåÁ-Ûf T*ͱcG‹ÕJa ŽŽ6FFG‡ÃÔÕÖ195I4åBW'¥%¥$S)šÏ%JQ]]æ{ïÏ?111¹Œ;DÕ…| ‚@UU5MM§9qò8µµuø}ù9—àLMNb±XX·nÃe*vMÓimm¡¨¨¯7Äž½Ÿ((djzŠËW2==…ªªlº÷~öîÛÍÂ…‹™˜Ï…÷NÄãÏÉO(bï¾=ˆ¢HmM==Ý™ë{<97ÔGŽaxxÝÐY0kV¯›‰ˆ)ã÷ešÉŠ‚×ã%ߟϙ3§˜œœäÉ'žæôéSŒOŒáq{¸p¡“<ŸX4ʺuˆD"´¶žCE¸3ŠòÍLWÃ0ŒËfüétšÞÞjkjY¼¨>s0¿ ç\‘0gΞ!"ŠK–rôøQ$Q"??«ÍÆç»wDñx=Üçv£·h_øOÀ—磨¨„|>¢$åFÓ ©*mí­$ ¼^/CƒƒŒOŒÏ½¸(—磺ºš‡|˜²²r|y>\N7j:M(¢®vÅE%<¸õ!JJJ±ÙllݲåËW22:B"‘¸ÕedbrGr§«ú—,å‘G§¸¸„cDzwßnTUÀãñRZZJqq V‹5³v.ï™Ìå 3ª§ÓŶmSS]ÃÐÐ`.v„(Š X­VÖ®YÇØØ(.t²nÝçìL¢( E…Eãr¹fò|1Èää.œÇn·£È2ç/‹I‘ }ÞE  éííaph€yuóQ ……E<ýä³”••sâÄqZZ2BßépÒÝÝE$¹ÕÕvë¸äUÉÖc*•¾òû.X…|Ÿ»ÃÎøÄ8¡P¯Ç‹×륤¤Y–q»Üx¼JKʾѳ}¸ÆŒ –4,¡ºº€ææ³è†Ž ŠèšÆøÄxÆpO’p8œ46.ÅëñÎ:= ~Íêµx½yŒrôøQJKJñx3aiE!‹Ò××›ó'ËrfýN×1 s놉ÉÍp§«úÏ67‘J%q¹ÜX­V"‘0†¡cè.·“@ pF®gzŽx,F{G;²”í? Œ™ß@‘ÅB,Ãb±2<2DOoñx #cŒ H’ÄÄø8…Â\´GÝ0p¹Üܳa#’$£ª*MgÏdÆ¢H,%œB’$DQ¤¤¤·Û3'„óìgË>m PHIq)ûîÃa·SYQÅÔÔ$±xŒÁ¡‚¡ yyyD£QTUÅçóSTXtU[‚»K·óɲ̼yó9pp?°˜D2AQQFc311ÎÉS'è¼ÐI]m£##TUU322Ì‘£‡±Û씕–3>1Æ©Ó'q84.Yz«õk㊂_Eòýùȳ¬Mm6+yyy8*+«aÑ¢ÅèºÎèè0§i–›_EQðççÏQÁ¹\.JJJ†‚ˆ‚ˆ×륲²Š¾þ^NŸ9EuuMæ¾’„Õj#/χ(šj~“›âVõëºN(¢½£ ]×(Ȱníz,+>ŸÁFGGÑ ƒîÅép"+2‡तÇ“ÙMdµ‘çó!N§0¨«›ÏtpгgÏàõzAè8ßÁ’†Fìv;ç;;(++'//»ÝŽ/χ®dW½/‡ƒÂ@!n·‡éà4K—-çÂ…NFFG°Ùí—-S*²ŒÏçÇ2ӷʲ̢…‹imk¡¶f n·€©ÉIŽ;ŠÛífÝÚõLMOqâÄqFF‡)È/¸k]ª_m0»pÁ"tMçì¹&ÚÚ[±ÙìÜëöP]]Ck[ n·§ÓÉäÔdf"*ôôtÇX0^¯—“§N055IEE%e¥e·úQ¿V„W_ÕØ²y YÖö†‘1îËŽ^\„5Y–s‘ÆdYFÓ4â‰8Ь`µZç„ÊUUù’`?ªªfÖ¹dI‘$MSÑõ̶?ÝБ%9ç¡I’$3X‰ÉMH$PU—Ëu«³rSùÔut:…®ëX,ÖœUUuά/+³Ë@®ß!:Û_È’Œª©º1'M¶¿I§Ó3[öf÷²|q2”].$)woI’H&“¤Õ4v›mNzÈô‹š¦"IûÅ~>úäC{äqJKËØ³÷s¦§§yäáG‘g !cÔ˜L&±Z­ßxUôÕPU•H4BÞŒùRÒét®î2†•ªª!J™0â†ndêUg4B:’”©gMÓÐt I”¾±vecãcìܵóÊ3~A.Û[*Šbîœý9»6r=×Ȧ¿t´*Irn-!åο’šÌÄÄäú¹#füWɧ(ŠWTi_m¶{-a˜íKfwè²$ìþ}öo—^kvŸw¥|Ìþl³Ù°qeU|ÆÐïb¿¨ë:­m-ä¶:[­VN'Šb™3é±X,w­ÀŸÍµÞiEQ.‘;Š2S÷ÖK„ù%âE’¾¹ÿRîN}‘‰É]ÀnÜw7`55µ8ΜPo¨_‚¦é¦¦ó Ü)v+·;2`¾`&&ßP îŒNòNÉçW$IÔÖÌu„溂Õ$ƒ€` þ/AVÖË‘HË]¸'ÔÄä›L2•̬Cs{ìï”|šÜzTM% …nuVîH²Û@s3~AîÚQ·‰É7«ÕŠÍj»íÛõ’O“[,Ëx=^ó]¹ „¹3~§Ó™ÛFbbbbbbbòÍ#™J3v暉‰‰‰‰‰É7›¬¬7÷Ë™˜˜˜˜˜ÜE˜‚ßÄÄÄÄÄä.â¦öñ§R)ZÛÚ¨«­qycç¶µw (2V«•šêj £‚ÇápàºÊ5»º{EªÊÊ?j!†A[{{ÆÉFþElŠF£Äbq"Ñ(²$QQQþGÍ»‰ÉF2™¤¯¿ŸªÊÊ+:»QúH¥RÔÖÔÜêG3¹MéîéEE*¯³Î8^jgxd„ò²2<7¡PˆùóæÝÛãojÆßÛ×ÇK¯¾F2•º©s_yý ¶¶“;w历Áƒ‡èíí»âyš¦ñÆïO[Gǽ4]çíwÞ¥µ­ý†Ïíéëãà‘Ãìüüsö<øGÏ»‰ÉÆøÄÿöÛ—/nÙšššâíwÞÍEë<~ò$û\_{:tøÛ?ÛùGŽKólrû²{ïö8pÝé;ΟçW¿ù çÏsèÈŽŸ8É»|ˆ¦i·úQ®‹›šñŸ=×BUe]]ÝôööѸ¤=ûöSW[ƒ®ëìÛ­›`dt”ŽŽó¨šÊ¶-[i>×BeE9n—›]»w“L&Y¸`>›6nÄét¢:ï}ð!ÁPˆP(Ľïaé’% Œ055Miq ¯½ùáp‹ÅBž×KÿÀkV­bÍêU Œ°ÿÀAR©ë×®%/ÏËö»ˆÅb¤ÓiÞö åee:r”³ÍÍX,–4Ô#IçÏw¢iÖ¯çls3ƒCC¬Z¹‚Ɔ†kŽâNž>ÍùóèºNMM MgÏ¢ª*7lÀf³â°;r[&UUåàá#´µ·SYQÎ÷ߟ Øabb’™ô÷÷ó›—^Âf³ñð¶9qò/¿ö:ƒƒlX·ŽWßxƒÉ©)ÆÆÇÙ°~GŽËø#±ZÙrÿýx×BA¾‹EaûŽÏ(/+ãLSmíñú[¿ghx˜_ÿö%Bá0Š¢ðo¿ý--­m|º}…¦§ƒ|øñ'457óñ§ÛY´pƒƒœ8yŠS§ÏpìÄ Ù½w/ÇNœ ÏëååW_cpháq²Ï°Z-”—•!Š"¯¼þ:gÏãØ‰èzÆgOo¿{ùe¼^/n—C7Û˜\Š(Š,Z¸MÓxÿ£ðù|¸Ý.ª*+É÷ûñû|äûó©¨(gzzš÷>ü›ÍFww7¯¿õÇŽŸà“í;X¾t)åWVߪªÊ3ý†®ü楗AâçÿúK^zåU,ŠÂðÈ/½ò^‡£Ç³s÷nÎ6ŸãÃ?aÞ¼y”––^æã]ü~?n—‹êê*œNÇ­.Òo$ÉdŠ>ù”p8ŒÕjá·/¿‚®  ñÖÛ `€Wßxƒò²24Mcïþýœï¼À¾ýÐ4“§Ns¶¹AÉúòz=TUVòñöí>z”O>ÝN(&ßï2¾ üäåy9täÉdAˆD"üö¥WÐLÞ|ûíÛr×Ü þ¾þ~¢‘(õ‹a¢( ÎÔ±(î½géT:7ëE‘Æ%õlݲ™P8L8eñâEºNUe%÷¬_Ï’úzÎ6ŸËÍŠÝ.ë×­eúµ¤Ò)‘Mgϲli#Š¢PPÏ=Ö3¯®ŽÚšÖ­Yƒaèôõ÷319ÁÓO<ÁsÏ<¦ëtõôPXàÞ{îaÅò¥C!Ξm¦ª¢œûî½—óç#I™Kxà¾M  1<Ö¯]ÃòeK‰ÅâTWUR\TÄ}÷n¤ººŠêªjæÏ«cÕŠȲŒßçcëæxá¹g9ßyÃGRW[ËÆ{60¿®–+5Ýh,ƹÖV‡†èíë#‘H È2O>ö'NžBîÙ°žÞÞ>zûúèèì$G8×ÚJmM5[7?ÀÊå˯h‹0¯®–¢¢"î¿÷^ nu±~#10p»]lÞü•tuwÓÓÛËøÄ±xœÎÎ (²ÌÃÛ¤qIV‹%N˜ ¼$ˆ™—CtÝ`rjšó„CaÆÆÆq»Ýl¾ÿ>V,_– äSQ^NYi)+–-ÃjµfÎEÆÆÇ9ßÙy1±ØmÙÇß°ªÿló9Š‹‹ðûýØí6Ú;ÎÓÚÖÆèè(étšÒÒRyø!^zåU>2^ט9·™’â"|yyhšÆÐð0çZZ8×ÚÊÊËin>— ù«ëúLðgtlŒE ’J¥Pgý®k:º¡£é:ù~?v»ƒ=û÷“çñ ë:¥%Åœ>s&Vs&HyYï~ð!gšÎ244„Ãᘠó™ ÑYVZŠ®ë<¼íAdI¦¬´M×èè줪ª’±±qtC 3¡>E ÃàÓŸÆX³j%CÃÃh3ù“$‘žž‡X½j%~¿?¼÷kW¯¾êŒÄÄä®Ä0æô™p¸2ÉdŠc'N²fÕJìvçZ[hkobñ8ýƒ´ut°pþ|>ß»—³ÍÍôõ`µX¥`„Œ³@ €ò²2ò¼^Ö®YÕbA±X8pø05ÕU„Baš[Z±nõjüù~Š é8ž?ÝNSs3y^/ùùùtv^ NàñxP™T*ɱ'Y½r^¯÷V—ì7MÓÐ5 ÏGiI ÔÕÖàv»Ñu±ñ ö<ÄÐЪ¦ápØ£µ­¾þ~æ×Õeúç¾>9Ìž½{yñùçèë@ÓõL~‰fV×uTUCÓ2òJ’%†‡‡ C”_̃Ë}[ûI/¼øÂ¯©©Áéøbëüd2É;ï¿ÏÚ5k¨ª¬ÄëñÐÖÞAGg'ùù~–Ô7ÐÞÑÁá£G).*âÁ-›ŸÏGqQÑœs#‘Ã##´¶wPSUÅC>H,£¼¼ ‹Å¢… °X,$S)B¡0±XŒm[· j‰Dœ†Å‹‰Åb(**"‰²zåJjª«9ÛÜÌèØ>ü0ÕÕUÄqêëI§UYæþM÷’H$8zü8ç;)+-¡®¶ŸÏGuU%åee Ñtö,ÉdrF+ ÑÒÒŠÝî`ÿÁƒœï¼@gç,ߌڱºª‹ÕBGGÓÁ u55Ì«­Åår±xáBZZÛ¦³gé`ÃÚµ¬X¾üªaFMLîFTU%°¤¡]בåË—a:ç©©®¦ººŠÞ¾>b±8@}²‘‘Òé4Ï>õ$K‡Ã9z % õÄ v|¶“ ÝÝ\èꢨ¨ˆ5«VÒÚÞF[[Š¢ïóÓÞÑÁ·^xâ¢"‡†X»zv»ã'N288LYiIîú‡!‹STXÈÇŸn§¥­ó.HÄi\²I”hïè ¦ªÚü_º® †X¸`>‚òýùœn—+wßX<Ž¢(ÔTU‘J§YÖØHWON§ƒuk×r*›_•·º˜.æ;£«» áÕ×_5¶lÞB à‹ ²ëûuµµ9¿š¦¡ÊŒð2 ƒt:¢(sF:W:7{þÅ@¾ÐÕ _Ùv]×I&3A~þË_Q]YÉóÏ>sY:UÕ$1÷ד×Ìy*‚ "IsWR4MCÅŒVC×M£>“¯€ó.ð/ÿúKþóøŠ g-­]›Õåk§ËÎúf__UÕŒa×m8«»[Éh‰t$IÂ0 ’É$š¦óî0<<Ìþ@ZUçôÁÙwÅ0 TU½á­¤Ùþ]„9y¸cç®7¦êW…åË–Í9&I³M„\\é/:7{þQ[Sý•>|(æ÷ÞgphX¿níÓ]Ú\o%^mŸ=?»Ndbbòå‘D»ÝŽÝf›#”áFÚ짯`àkjën?AÈÕ{:æ£O>¥ã|'ÑXŒçŸy*7H»tâ•=G„›ò1û]›‡Û‘»ò­u»]<òЃÄâqòý~<Ï­Î’‰‰ÉMR^VÆßüo…ÛlÇ&— ( ÷mº—åË–âq{ðû}·:K·w¥à—$‰¢¢¢[ “¯EQnØ£¦ÉÝ äûý¹­x&L_ý&&&&&&w¦à711111¹‹0¿‰‰‰‰‰É]„)øMLLLLLî"LÁobbbbbrqS‚_Ó4‡n*,¯¦i  14<ÌÔô4š¦‰F3žü†G.óküeîu)ªª2>>ñ•‡NœœœbjzzÖ÷I&'§¾Ò{˜˜Ü-|Õítz:ÈÄÄÄ­~,“Û˜Kûðëadd„¶övÆÆÇ …ÃŒŽÝ–~ù¯ÄM þÁA~úÏÿL8¾©söóáÕ×ßdç®Ï™˜˜äƒ?âȱcüê·¿½¬±gï …nø^—26>ÎÏùË›Ê÷µøè“OØ1ï[7 ^~íu=2'a;q‚¾þ¯ôÞ&&ß4®ÔN#‘(ûDUU:ÎwÒ|®åº®·{ï^Þyïý?úsD¢sólrû2»¿zûúø‡Ÿþ¿ç]Þyï}<È+¯½ñ•O*¿.njk[;~¿©©)"‘•œkm¥¸¨Q8uæ †+W,' 244L2•båòe´¶µãóåáñ¸snA¤óÂÞøýÛTWV²rå ¬ ­míäûý¤R™ð‹º®±|é2ìv;ç;;‰D"äççÓ¸¤±ñqŽŸ<‰¡ë,[º”ò²2Ο拉­Â@€@ @Wwïøn›{Ö¯§  ŸÖ¶v:;/PS]EýâÅ—¹ßìëïç\K N§“U+V‹Ç9=ë5]G©ðɉIy쑇ç\C9ÊŠå˨(/»ÕõnbrÛ¢©]ÝݹvºaÝ:N>Ío_~•á‘–5.áµ7ßbzzšçž~šúúÅt^¸@$Áj³²|éR¬V+­mí´´µrâä©«ŠÅb;q’D"ÎÊå+°Z3}Î’†z‚¡CÃÃ,kld`p¦³Íäç³bù2EÉõ-‚V®X>Çc©aì?pß½ò*CÃÃÜwïFŠ ouÑ~ãH§Óœ9{–X,†Û妬´”SgN£(V¯\Ëåbhx˜“§Ï KÅÅE˜œšbÑÂt÷ô IÒL0t:ÍÑcÇ£¢¢œ†Å‹9×ÒB4Ãåt±li#ª¦ñɧÛá¡Æ­ø|y ¦‰ÉINœ8‰b¹˜‡Ûüš¦qúÌV,_Ρ#G1 ƒï|ëE~ÿ‡w¸ÿÞ{9sö,ÓÁ ‹-" ²gß>ŽŸ8ɺµkY´pgššX¾lÃ##LMOñÙ®ÏÙ¸aš¦£( ŸìØÁÔô4o{ÓgΰrÅrb±8ŒŒŽrêL«V,ç÷?`ͪU|úÙgL¦¤¸ˆÉ‰IFFG9yú ?úo¿ó. æÍÃn·SPP@"‘ ­ªœi:ËØØ›6näw/¿Ê‚ùó8pè0?øî·‘%™Î®.lV+óçÍãŸþåRYQA0âµ7Þ$çžqö@á\k n—+×ÑhšÆé¦&†‡G8ßyUÕˆD¢4Ô/¦¬´ôV׿‰Éí‡ Ìi§##£‰8ÓÓÓÄ bÑX&Dn$Ìðð0?ÿÅ¿²zÕJúúèîîaic#¿{åV,[vYdµ,º®ó‡wߣo`§ÃAó¹þä{ßãó={8s6Ó?,^´ˆòÒR~ùëßP^VÆ¡#GˆÅãT”—ñë—^báüùØl¶+ªxc±‰x&ÏÙ¨}&_-ñD‚_þú7TWV²¤¡»va·Ù‡Ã  ñЃ[ùÕo~KiI ãã8x ë×sâÔ)æÏÿÏìÚ½‡ÝžqÇ,¨ªÊÀбXŒ]¿{‰ž{–×ßü=•å¬\±Ý0€D2‰$‰ ŽrìÄ 6Þ³aæ½ýÝ˯ I2‘H˜ÁA¾÷íoÝv±nXÕ?<2Âää õ‹1ŒL[AQ©¬¬È„ÎUÓ¹hF+–/ç{ßþš¦111ICýbt]Ÿ)ŒL†AMuÏ?ó4?ø GŽ£§·—É©)/Z„×ãÆb±N§ééíe:¤ª²‚ýÉ÷yhëVö<ˆÃáÀjµfÒôô²gï>ª«*ùÁ÷¾Ëƒ[6c±X xê‰Ç¹ÿÞ{›Q¿÷1>1ÁðÈ0ýD¢QÆ'&˜˜šD”Dª*+™Q§ÃAeÅÜg4 QÐu3Mgi¨¯Ïùz6 ‡ÂŒOŒÇ …CŒ“L&ouÝ›˜Ü–†A ȵӉ‰ –Ô×SS]Í Ï>ÃÒ%KX²¤Ë—óð¶m(Š‚7/ž{Ž?ùÞ÷8qê4»vªŠŸŽU+Wp¥n7røè1¦¦¦˜˜œ¤ã|'ŠEáÅçŸãÓ;ˆD£<òÐ6:»ºhmkgrr’ññ ÎwvrâÔiª*3}˶­[r1Ù³‚Àòe˨®®æÅ瞥¼ÌÔò}†Ëéä™§ž¤¡¾ž¦³ggêsŠŽŽZZZQU•?ùÞw¹wã=9­Œ 3ÿ³/‡@Æ d  Ÿd2ÉôtÞ¾~\nO=ù[7?€,I(ŠBýâE,˜?Ÿm[6gêÞAÌ Nœ:Íôt&íWxÞJnxÆî\ ~¿¢ÂB$Ibtt”±±1¦CA Ý`ͪU”•–òÛ—^A‘•LÌŒv2çús*¯‰ÉI‘p®`"‘##£tvu‘——G[{ù~?…¿yé%¦¦¦Yº´‘¾þ à •J‰DÅãvóÑ'Ÿ ‡Yº´1Sa.ƒƒÃ àpØ1tC70t#WÙn—›¢ÂB6®_Ï›6QUUIA~>+W, •JñЃ[éêîáw/¿‚ßçcíš5TT”çžQ3êþAúxôá‡H«*çZZ¨­®æþû6GX¹b9Ö­»ÕõnbrûbsÚ©H’H2™¢§·›Í†"ËŒÏh5MGSUb±8CÃC8 ´´¶1<2ÂÔÔ4ºaŽDƒ¹ÛX-Vòò¼T”—±rù EÁn³sì |>‘h”¡áa\Nù~?«V®`Ëæ( ÒÔÜLKk+ÃÃ#Øvv{Æ Q×À›Ý† @*•¤§·«ÕŠÝn¿Õ%ûÄ0 ì6¾< õTUTâv¹H$LNNÒyáÓÓÓ躎Ţ0==ÍØø8“““”–” “SSœ:}šwßû€§ž|"#´5 #7I½ˆ®hšŽ®gþQ 8$OàËóæòàr9¯ÜéV#½ðâ ÿ½¦¦§Ãù…‰S©4ï¼÷K™?¯‹¢pèÈÎ6ŸCÓ4–4Ôsúô9ŠÝnã¾{ï%•Ná°;¨©®â³Î'ìۇݎ,ËTWUÑÞÑAó¹‚ÁO>öûdiãæÕÕDiniajjŸ/‚»vï¡«»›x<ÎsO?Å¢Ð|îSSÓäååñèÃ184Äç{÷299IyyCCC™uúXœh,ʃ[¶0<<™¦³LNNRW[ƒwV°é`?¼û-­­²fõj<Èᣙg¼Ó&Ün7û §·I’yä¡m$S)^zåUª««ðû|3OII‰é7ÚÄä$ zûúrí4‰°vÍ&&Æ9~ò5Õ5”––pâä)¦§¦)..âý?¢»§‡ž|üqV¯\ÁùÎNöîßÏää$óçÏ#òêorâä)Nœ:E  €% õœ8ušÎ $‰‚ü|vïÛÇ·Ÿ§ÃAWW77¬'‘LpâÄI‡†(+-aIC=ç;;Ù=Ó·¼ôê«Ûõ9ÍçÎ!+ =¸•s­­;vœh,FýâÅ”—•±gß>òýùÄ“ úúúÅ‹¡j* ‹ãõzs÷˜˜ ‘LR[[Ãèè8Ë9~òv›% ;~‚žÞ^¼5ÕÕ·º˜rÄb1ºº»^}ýUcËæ- _xR2™dϾ}¬X¶œ‚‚LPŒH$‚ªj8žN§‰D£Øí™QpÖÊQUÕ9çêºN4Åjµ"Š"¢(’N§I&“Xm60Œ9é à  #I"V›ý°gï>þâÏÿ ¿ßÍj›ÆjEQ”ÌvÁH‹Å‚ÕjEÓtdYÊÅK–eMÓˆF£È²Œí’О†alj'¸\.¬ ÉdrÎ3êºN,£µ­ Q”X¹b9†aN§‘e9w½ìúÐí¶Þcbr;‘‰‡®]±¦Ói, ¢(’šÙâÛÛ×Ï?ýâüäÇ?¦´¤§33‰É¶kÅbÁ¢(9-aVÛgQdY&‘L’L$±Ûm¹û(3é³÷3 ƒh4Š8ìöŒAØ%}K2•ÊÌ> r}Ð¥y6ùêI«*²$åúÕX,†ªª8dYFUUâñ8º®înþëùϤR)bñ8Ι4‚ F±Ùl¨šF"‘Àép I™wPšu} 7ÓϾ’$Å% ›ÍvYnÆÆÇØ¹kç©ú­V+Û¶nsìR‹E«Õ:g½kv úÙ犢ˆÛí¾æ¹³Ó ‚€×ë™óÝbµPf öÒ4ÙûΩeŸ ¹Ï’$]54¯ 8ÇUó)Š".—‹Õ«VÍÍß,+_Ñø&&_H&úÅ6=»ÎŽq~q½dI¢ ߟúÙô—¶ë+uÂ6«Û%í9{ïÙk—öu—ö-v›í²k_šg“¯å’:ÝW§R)v}¾›¾ºº{xxÛVDQÄf³a»¤¾²ò(³äc»æ=³“U¸øN¹f½{³óp;rû EnÆ%K¨¬¨@6•‰É]MII þ£Ý–Û¦Ln-²,3Þ<Ün7÷oº—Úšš[¥Û‚;Vðû}>üæš™‰É]ÃngÁüy·:&·!¢(R[[Cm­)ðgc.:™˜˜˜˜˜ÜE˜‚ßÄÄÄÄÄä.Âü&&&&&&w¦à711111¹‹0ÿM`ÆUÃ/^ë7“[ÍM þŒ3‹ØM… ¼Ú¹ªª‹ÅæMMÓ®yt:M,ûJ "Ngœ{\æèñã¤Ói&§¦#•J¡ë:Û?ÛÉù ‡Ã´µµÓÓÛké01¹Nt]'‘H|eèd*E"‘¸Õer“L&o8~J<gjj*P*&ßêǸnnJðŒŽò÷?ý)““S7}îÄääœãMg›ùůþmŽ ?rìG¿êµvíÞÃëoýþ+)ˆ={÷ñéŽ_˜n:ä£O?EEŽŸ<ÉÿówÏÿø»¿ãçÿúK"‘(étšÏvîBÓ4ŽŸ<É[x‡ŸþóÏyûws¡{MLL®ÎøÄ¿üõo‡Ã¹c‰d’¶öö\ÿ0<2BÿÀu]o×ç»yûÝwÿèÏqižMn_Þÿèc>ÝñÙu§ç~ú3þþý”W_ƒ}ðÒ«¯Ý1}üMíãoï8®ë¤Ò)&&'ñû| àõ¸E‘îž ສŠx"A("•NQYQIÇ̹v»Î ˆFcTVTL&i?žýQ^VJMu5.§ÎØ©,/§¨¨ˆtZåÔéÓ,_¶”þ†‡Gðz=TWU15=M$!•JQVZŠÛí¦¯¿Ÿ‘‘Q¼ÞŒïdAèéée:8MUe#cct^¸€ßï#PP@]m-º®s¡«‹d*Emu N§ƒ–Ö6 Ã`ñ¢Å$q~ò?FEþç?ü#çZ[X»z5{÷ïg``{Ö¯çžõ8rì(ïø=ò°édÄÄä H&Sœm>Çá£Çðåå±hÑBšÏã·/½Â÷¾ý-êjkyëí? †øÖ ÏQVZÊøÄ±X‹ÅBeE9’$122JwoMÍÍxÜWnwétš®în’©u55ˆ¢ÈÈÈ(ee¥Äã ¦¦§©(/# ÑÝÓƒ×㡪²QŸ ¯¿·ÛMuU5²|Ñ™˜aœ>}†ß¾ü ßýö‹464\Õ;¨ÉÍ£iƒƒC$SI,+ù~]Ý=ȲLmM5‹…p8Ì…®ndY"//·ËE,§¨¨‰ÉIDA̸^žqñÞÕÝÍôtÂÂ¥%% “L&±X,T”—£é:»v僚·—§›ÕJ"™dzzÈh:/\@–•\n7nXð†Á©Ó§YÖØÈž½û00xñ¹çøõï~Ǧ÷Ðyáº(/+Ãb±päØ1:Ì‚ùóyþ™g8uæ K—,áà¡Ãìüüs*+*Y³*(ŠŒÓtö,ŸîØÁ=JwO/š¦ÑÛ×G$Áår‹Åøoÿçer&”æ’†öü>?þüLž®ž*++Ÿ`ï¾ý,_ºûmîÆÑÄäv@¦¦§9yú4,klD× zz{سo‚ ÐÞÑÁÄäGŽgårüÙ?QUYÁøÄ[x€Å‹ñ¯ÿöoäçÓÝÓÃÒ% —ÝÇ0 ¶¶“ã'OfÚxa!=ò0¿yùåÌ„¢oÇÃã=¯~ý à  ñôOPRRÌ¿þêרí6**Ê)+-›#øÚ;:èîéa÷Þ}™‚ÿk ‹ñ?þîïñz=,ih  211I2•dõÊ•lºw#ÿöÛß‘H&‰D"Ȳ̆uë8uú4ÿé?ü |ô1v›-ã‹_I&“ìÚ½‡P(ÄÐð0ßýö·xé•Wq»Ý,_º”Ò’4MçÂ….B¡‡%™L²~ÝZQDSU^ë÷ “L¥Xµb?úÈ­.¦Ë¸aUÿÄä$CÃÃ,©¯'­ªhZ&¤®ªª3 A ®¶†Â@!é´ÊÒÆFþòÇŽ¢È  ÑP_ŸK[^VJee%º®³há~òÁÖÍ›Ùõùn"‘Hnm|ó÷óãýH$Êt0H[{;‚,kl¤¶¦]×i:ÛL<‘`ÓÆ{ø/ÿáo†Bœ=wŽåË–R[Saοýöw¬Y½ŠyuµdBýfmÞÿè#\®L_&ª^"A<Ç02é%ÓÞAD”$‰$‰D‚T:…A&`K2™‰è‡êLôÌÙmÜn·‘L¦e)cð›NÏê²SQ^ÆÂó)/+£ù\ ñxœt*…¢(‚@,ÇÐ3‰²œ Σë‘hŒ<ŸvY0“/AÆ-¯ÝnÇ¢X°Z¬””³|Ù2|yy¤Õ4ÑX”p$’YŸ‰´‹ÅˆÇãÄâñ\@žD"A{G¯¿ù÷Þs^MU3×wØçÔŸ  ¢ˆ @"™ ‘È, dóçõÞ–QoèMTÕ̺zýâÅH’Äâ…‹øÝ+¯ðÓŸÿ ““è†Îg;wÑÛׇÅb!ßïÏXêc i§NŸ¦¡~1²,sððašššI§UŠ ±Z­ŒOðÿôOLOOóí^ £³MË„6TAp»\ŒŒŽ26>NÃâz$IÂj±Ðy¡‹p8BiI SÓÓ¼ûÞ9rŒ@A+—/§©é,º…ùøËï}ð!‡eË÷cµÙPU»ÝŽßçç¡m[ÙñÙNâñµ3ë‹-äãO>%óÉöí>vŒ¥KùéÏÎ3O=Ia @,£ºª Ã0hïèÀ——w«ëÙÄäŽA%\N¢  ( »‚|?¥%Åü楗øá÷¿GÃâÅ9z”ß¿ó.«V® `€Ÿÿâ—ÄqÜü‹-äç¿üÿÏßÿSSÓ¬X¶”ã'NòѧŸ" "ðØÃóð¶mìܵ‹xÙ&&‹ÅŒÉdb`pÛCJJ2’$!+ ³çø8z]dCCøÜ.âãâˆg||œÿù/ÿÊÆõëÈÏËÃãñ Ë‘é[|<û¤££“ÿô—¿D­V32:ŠÉhÄ(îøá …Â8ÇÄY­‚Aü>V«—ËŸ˅->­VËÈèhôy€_ýæßyñ¹çÈÌÌ -5µZÓédxdƒÁ@lL Šcޱè~âãâ0™L·õñx,3ã®H÷x<l6¼>ƒH$%%a2q:  c±˜±ÅÇ3<2ÖUÀ`Г€Ç㉶ùöTÞÂÃ!Ë2§‹Å‚V£! 208H  11‘ؘ|~?CƒCœEš˜.r{<<¹r%sfÍœì&=¾uO›¨$‰9³f}ùŠ>ÇgÍÛˆ /_¯8«•Å Lv3„GF£aö¬™ÌÿÞㆂ ‚ |eDàA„Ljü‚ ‚ð_A#"ð ‚ Âcä¿¢(œ/û^e´¾[¿éTÝþžÆÆœ=w¿ß,Ëøýþh®ƒîž._¹-ãtŽ3<2òIó(Óƒž[>«®‡YŸðíó ßEQ…ÂѲߤïØýœott”÷·ïàÙÍ›HLL| ²ÏlÞDÒmeë¹\UÅK/¾€fb…¤k7n S§L¹g]ç.\ »§‡­[žáË®Šxþâ%ü~Ë–,yh×íöðî¶m¬[»†´ÔTÎ]8OCcùyyìÚ»®în¬±±<÷ì3(²ÂÞýÈÉÎ& ñö{ï1j·“žžÎ÷¾ó"V‘ÙKxLŒŽÚ9xäë×®!f"u0dÔn')1•J…Óé$,Ë_hÁžSgÎàt޳aÝÚ¯õ}ÜÝfáÑuðÈ´-+—/ûBÛ;ãlûðC)**$;3‹Ž®®HÒž‡´^ÍWé¾Í­môôö"I*|KòºÝn‚Á áp˜áᆆ‡ …Bø|>N'#££„B!Z&Ê ÆÆÆÄï÷ãp8¸^SKKkö‰¼Æ‘ ~2n·›Q»îîžhÖ;Y–¹pñZ—kœîž^FívEÁëõâp8Ø'€süÎmÆzz{ñz½´¶µQuµš¶övFFG£Wp#££ Fë¹Ûøø8ý¸Ýn ²¬qÿÀN§“`(ÈÍ–¼^@€s.2oÎbcc™5c:/½ðF£‘»÷™™ÕjåÒå*’’ùá÷¿ÇÏö'´µµÑÔts²¿'‚ðµq{Üœ=wž––Vºº» …B4·¶ò¯¿þwZÛÚp»ÝìÙw€÷ÞÿQ»P(„ËåbtÔŽÓéŒÖãñxèì좾¡‘îžž{îëŽ> …p:ÇQ…`0ˆs|ˆ$øéëïÇápDËú|>zûú½çÈcsK¤Í-mmøýþÉ>¬ßJŠ¢0îr166†Ó9N(bppˆ‘‘‘èg é˜XšÙM ˆ,x}>|>}}ýô÷ ( v»îžÆÇÇïªß]öÜ… ܨˆQ ²€IDAT©aîœ9ØâãµÒÑÑ¢DòÒ ÞцGÍ}ßñ+ŠBõµkL©¨àÄéSl\·Ž—_}óæÒ?8Àåª+ÄY­l\·Žëµµœ;ä¤$^záyª¯_§²¢œÚúzöø‹ÙÌÒÅ‹Q«Õ´µµñþ‡Û …‚<ÿÜV::; ‡Âœ8}†¡Á!"ëkÿÅ/~ŽÃá `€ÍOodϾý457ãõzyaë³\ªºBo_¡PˆÂ‚žööìÛÇÍæ¼^/ß}ñ‚Á»÷îC«ÓòäŠHH\¹z·ÛÛãá¯~ñ º{{8xø( S*+Y³ê)œããƒALFCÃC¼³í}´Z-S**˜7w¯¿ù>¿Ÿì¬,žzb%jµ•JEo_.—›ÜÜL&³fF”8ñ"@FCVf×kjX»z‰ œ=wZó•®B(•¤bhhˆí;wâñxX±lƒƒ\®ªB’à‰+8uæ #££h5j–.YÌ^‹ÙŒÇãeÓÆ äççñêëoàõùhmkcÞœÙ÷Ü×…K—8|ô( S§LaîœÙüáµ×Y¹|9íø|>¶nÙÌÛwÐÝÛ‹$I<÷Ì3$%&òú[oc·ÛÉËÍaë3Ï`2}²r ¢(œ9wŽËUU (|ÿ»ß¡¤¸x²í·ŽÛíæþÇÿŒ$P+)A¯×SW_"Ë<¹r%3gLçƒ;him#`‹gö¬YÔÔÕò§?ù »öìÅh0 Ñ¨Q©Ux½^Þ~oCCà ÁwžŽ·Þ}I’(+-eë–Í„B!.\¼H_ÿGŸÀl21mêT*5Š¢pàà!ª¯]CQžX¹‚…óçOöaú”û¾ã§£³“)••¸\n\®Èî˜c ·ÇCkk:­–E œ’Ìø¸“¬Ì ~ú£b0hïè`JE]]Ýx<^æÎ™C~^²,SZZÊ_ÿå_0sÆ öø˜ááãNÆÇÇ™7w?ýÑèèìÄn·s³¹™Ø˜ÒRS™;gË/&–9wá"ƒCC̘6?ýéOhlj¢®¾ùsç²lñbdYæÈñì;ð1Ë—.á¯ÿâÏ™6m*³gÎä¯þüÏÑiµÜ¨­a÷Þý‘,ƒ ì?xžž^>Üñ¿{ùŽ8A_ÿƒƒƒL›2…©••¸\.ÚÚ;(ÈËcÞœÙèt: ²Êߨ˜•JE||<91œ8yŠÆ¦&V?õ$ñqñxÜ‘+Ñ–Ö6¶ïÜÅÖg·‘‘>ÙßAøÚÈŠBbR"?ýÑY±|×kj˜7g6¥%%üÉÄ‚ys™;g6‹.àÅžIÂãñðâóϱrÅ2öìßÏ¡#GQ…ÿü—¿äÉ+€OÏz<vïÙíãûÀh0°tÉb~ûòËT]¹Âª'Ÿ µ­“§Ï—›Ãðð'NâÂ¥KƒþÓ_þÏnÙŒÑh¸£nI’X´`¥%%üì§?¦ ?²ë·’,˸=Ö®ZÅÜÙ³9tø0)ÉɨÔj3 Päp˜ÞÞ^¶ïØI^nZ–@ ˆ^§#9))ú¼ €V«C«Ñb4¢Ïo„Ã2¯—`0mCRRâ#yþ¾¯À/Ë2׮ߠ¸¨NGNv;vîâÕPˆÎ®.ü~?ç/^dÔn‚Á’JDæEª¯_§¤¨VËÙsçéèìB¥Rã÷ûQ©TtvwñÊ«¯ÑÒÖÆš§ž¢§·7r%uëÀ) R©¥§¯ukW Ád2–Ãh4GŽ£¡¡•ZEYI ç/\Ä`0…±Ùlòîûïsµºš¹sf#ݵÆ~lL, ÌçÚõx½^â¬V4uô. ¦¶ŽÚº:Ô*€®î.UU¡( @N‡JR±}ç.ž{f :­–Þ¾>Ôj5ÿüo¿Æb6sêÌYz{{Ù°~=]]dge!I#£vQå‘üâÂWI¥’P˜Ò’D\l,&£‘×Þ|‹žÛJnngÏ_à£]»)/+¥·¯Ÿ÷>øÁAæÎžÅÔ)Sø?üßüî÷´µ·SR\Lõµk?y IR!I°lÉ-XÀšÚH‹ÃåróÑ®]<³i7[Zسo?O¬XAaA>#££$$$`6™™5c:¿ýWøõoG^n.³fÌ`çž=¸ÝnE!7'‡ùóæb2™xíÍ7y~ë³ädgOöaýÖ‘ˆ|W²LrR23gLgtÔŽÁ`Àh0RRRÌ¡#GùÕ¿ÿ{ô³IOKephˆ—_{ÚÚz–,^Hl|,ûD«Õ2æ#LG’@­Ž\(D¿‹·ö+IÑÊ%IÂjµÒtó& ̘>QûDŒ¦Gòü}_iy½^/xý ž\¹’â¢Bü~?5µu‘NGFZ:Ã#Ãtu÷`³ÅSVRÂØXäa˜ØØ˜;Êv÷ôÐÜÒŠÑh |"…m[{ã®qâãâ).*dd$ò]  66’¹««‹Q»+W®òãþ­VK{G]ÄÇÅa³Åó‡×ßÀËô©S)--!9)é¶m¬$'%GcSNç8EE…HH„ÃaRSSèêî&vâDÓxó&cc2ÒÓÈÍɹãéÜá‘Q(-.Æh4R×PÇã!?/¬ÌLÚÚ;fê”JÞß¾EQظnmí„ÃadY&.>kl,ÿï?ý/~ú£RVZÊðð0§“ü¼¼Gò‹#_¿ßOwOÙYYx<ÆN²³2éëëgphˆ‚ü< 7[ZÐj4(À?ýË¿²úÉ'ÉÎ΢¢¬ ½^OgW7]]]˜L&RSSèèìIBrr²‰‹‹£é¶>ž’œLo_?99ÙŒ;ØÇäç12:Jss ’J¢¨ ›ÍFWw7íí$$$Å͛͂PÀj¥° €Á¡!#mŽy„ò²[„Ba:»:IKMÅh42îrÑÔÔ„Ï /'‡ôô4Fívš›[¸zíƒCCüÝßügZZÛÄf³‘–’‚Þ` ¶®Ž¬ÌLœã㌌Œ`‹·‘””ˆÛí&5%åŽìö±1\.6›ÁÁA’“’¨ol$ÞGrrM7›ñùýÑ6<*n¥å½¯À¯( >Ÿ/:l}?¾LÙ»C!Âá0½þSÿ&Ë2ÿýþ‘Å‹²ü!þ4ïahïèàøÉS¼øÜV †;çkëê¹TUÅK/<Ǩ‚ \sK ¿}ùþÿúwÄY­“Ýá …hniÁçósðÈ2ÓÓyéÅ&»Y“æV࿯¡þȼՃå¼þ2eï¦ÕhÐj>»é3§O'-%å!®‡#;+‹ŸÛŠþ,ÅE…ä‹ /÷)66–ùsæ Õj'»)Â#FQº{zihl$?7—§žX9ÙMz$Ü׿ ‚ ßL·îøÅrR‚ ‚ð_A#"ð ‚ ÂcD~AAxŒˆÀ/‚ øAá1ò@||œí;wN,Íûpʶµ·³wÿ;Òß¶´¶ÒÚÖö™uÕÖ×G“qÜîÜ…‹´Üq¯ö‚ðÕsŽsäØñh nˆ,Ìåñx¢}=àû‚©n¯V_ãôÙ³_ûû¸»Í£ëüÅ‹\®ºò…·÷ù|ìÞ»_ÿöw>zŒÚº:=öH&ä¹— üm\º\…J¥Š~©oO€ ÑœöaY& ¡(J´¬F£! á÷û‘e™¾þΜ;‡}lŒ`0ÀðÈ(Ã9C¡n'z`Eáä©Ó !IR$á†×‹,Ëœ:}†ÚºzN'¡Ð'‰3ü~?‰ºoµùV’!ˆ¬òt+ÑF_ÿç/^Œ&r¸µÏç»ãb@–e¼>ß7æ„GÃádߊfÿìéíãw/ÿ‘ÑQÂá0GŽgÏÞ}ÑóÊ­¾¾­ʲŒË墦®ŽšÚÚÏÜ_0Ä?qq+Ÿú-·ÿý( ^¯—@ pÏz{z{£m燯έsô­Ïêîó»@ S·ÇEQ¨oh¤éæM‚Á'Zß­úCÿ­Õ×®sôø ²³²ðú¼´wvr¥º:Zï½Úð(¹ïì|×®]§¬´” /!I°rùrÞz÷=fNŸÎ¸kœ“§Î`0èÙ´a7[Z¨ºrƒÁÀ Ïmåúõ”•–ÐÛÛËÞý‡Ã<±b9µš†Æ&~õï¿%&&†çŸ}§ÓA8,óÆÛïÐÛׇ×ë%?/ï¾øãã.ºº»yrå÷¹Tu…CGŽ ÑhØòôFB¡û>þ˜K—«ÈÌÌàßû.W®VsòÔ)Ôj Ö­!..ŽW_µZÍ€w¥ºµZͪ'Ÿ@%Ih4:ºº8tø+—/§¥µ•k7nc±°õ™-ÄÆÄðáG;éêî&#=g7oëq —$I}ýý¼üêkȲ̺իiºy“‡a·ÛY¹b9»öìett‡ÓÉÊåËÙ±sgô¤¾ùé§IOKåýíÛéêꦵ½ùsçÞs_ ìÝ€`0ÈâE )*,dÛ‡ÛYýätuw388Ä–M›8|ô(×kj"}Ëââ¬ìع›æÖrsrغe &Ó'+“*ŠÂÁÃG8pè#£#|ï;ß¡¤¸h²í·ŽÇãáw/¿B  /7—äädÎ]¸€Z¥fýÚÕsøØQª®\E–e2ÒÓ˜RYIÓÍf^xn+F¯×¡ÑhP©Õx¼^^ó-úúûI°Ùزéi¶´¿ßOnn.ÏlzšP(ÄÁÇéî‰$eKJL$//µ*’ñìùóœr”KUU\®ºÂ´©S¸x¹Šª«Õ“ýy Â7Ÿ¢`µÆòÂÖ­L›:•ÓçÎ1uêòórÙúÌf¦O›Ê´)S˜9sÖ­% ÒÒÚÊÊåËÈÉÎæýíÛ9vâ$]]ÝüôÇ?bñÂ…÷ÜÏïçýí;Ðh4¤¦¦²íƒíèõzr³³ù·ßü;bæŒtvu²÷ÀOúþÑ£\ªºBk{?øîK¬~òÉh:í[$IbæôéäçæòÜ3Ï•9ÙGõ[) ÑÚÞÎÔ)•T”—³cçN2Ò#çù»vs³¹™“§NóÜ3[˜>u*]Ý=ŒŒŽÒÑÙ‰¢Èôöõ100I„¦(è´ZΟϊe˨ohäRUíL©¬dé¢E¨Ôjôz=S§L¡²¢œ•Ë—ÑÓÛK(šÈª:ÊÛo‹5íz$G{î;ð·´´¢È Å……(Jä ©$ I’Ðët¼øÜVâããxÿôµ·£R©ÈÌÌ ?/žž^Y¡¨¨UO>Áô©Sùh÷n®]¿"˘L&ÒRS)*,d``P8„JR¡ÕjÉÈÈ ++£Éˆßç§úÚuÊÊʆ‚øý*ÊJIOKÃdŠä\NIN!-5‹ÙÌðð0vûýýh4 €8«•ÒâbL&#•L:¯×‹ËíÆéÇ>6FvvçøÄ(CÉI‰¤¥¥Ñ?0ˆÛ㦳³‹‚¼|lññ“ýy Â7ž˜Œ&ÒÒRIOME‘ebcb1Mdfdb%ÖKœÕJJr2*µŠØØXŠ‹Š˜?o.vû­mm¤¦¦’ž–FœÕʽò[ú}~††‡µÛw¹¨(/C§Õ2}ÚTú1 äåå2<<‚ë¶¾Ÿž–FOo/©))äæä’’|ÏÄcñqq˜LF²23ZžáN `2™(.*Âb13æpÒßßF£¡h";¢V«¥ ?Ÿää$´ ‘ ¯’")w%Uä¿%IÂátrìÄ jjk †‚x<^L&EE…¤¦¦DcÅbÁl6“”˜ˆf"C¤$Eža»#ÖLö!º§ûêW…ë7n——‹Éd")1‰c'N²gÿ~:;»ðùütvu“––J]}]]Ý€‚Vî,k4RW_O¬5½^OsK 3gÌ »»‡]{öRuõ*3¦MÃát–eä‰?Š¢ + cí¼ô ¤¤¤gåÍwÞ¥´¤„)•Ñ9œ[óuÉIÉ”–C^néii Er8‡å0E”Žðæ;ïàr¹(.*")!’â"æÌšÅ;ïmcýš5äæd“`³‘”@A~II‰T_»¹À°XH} Â7Ž¢ ËaYAVd²ŒÙlB’`ûά_»†”ä$.]¾Ì‘cÇÉHOcxx„§NÓÖÞNYI1Ó§Mãí÷ÞcûG;¹~£†ôôT›¸R]9ÙÓ¦FFFFG(*( Îj% ³kÏ^–-YLOo/Ggê”J²³³¢}???¤¤$^{ó->üh'éiqòÔi¼>_4ç{a~’$±}çNÖ­^EZÚ£“žõÛDž˜ßOMM½ã<Ÿ–šFrR"{öíç·ßÁápIL°ÑÛ×Ïî½û¨­«cάY˜Ì&.\¸„Á` ¥µ'V,§éf3 ÜñŒ×-Š¢ ‡ÃȱÆd2r³¥…ÎÎ.JŠ‹nkCê—ÎFûUPo}nëßçååa6™?wcŸÏÇ‘cÇY²h©))¤¤¤ÀDºÝÙ3gPZZ‚Çí¡·¯—©••,]¼ˆ¸¸x²231›LѲi©©ØÇÆèèì"3#ƒÕO=IB‚ «ÕŠ×를´”Ë—aµ’™Inn¹ÙYX­Vl6~¿Ÿ¡!Ö¬z £Á@QA§ŸßOVf&i©©ädgG||Å……TT”ãp:p{¼¤§¥’š’BrbY™™w …x<2ÒÓXýÔ“ÄÅÅ‘ššÂâ… 0›M¤$'3cú4†††Ë2™™ä“””ÄÀà :­–ìì,qe/_’Z£&)1‘œì¬‰QÀ òóÉHO'“™I~^&“£ÑˆÉdæÔÙ3ÄX,ädg³fõ*r²³HNJbhh˜ÜÜfNŸŽZ­fhxZZ­&##9³g …°ÛÇHLL$.>µZÍšUOQR\LXSR\L^nCCÄe™¬ŒL òIINf``³ÙDrr2½}½È²ŒJ­&6&†¢¢B²3³‡Ãdeea6™&ûÐ~ë¨$‰øøxr²³‰±X(œˆn—´´Tòrs)*,Àn·388H8æé ë±Zcµ2¥¢‚©S*),(  QR\DNv6‡ƒéÓ¦2µ²’Üìr²³îH¥nÐëIOK#+#ƒä¤d*ÊJÑét$&&°lñãmHM#)1q²S”Çã¡­½íþ²ó…ÃaFFG‰‹»ï˜_¦ì½ïõùH°Ù&õ ‚0ùš[ZøÝ˯ðßþî¿7ÙÍ!²,308ˆ"+ìܳµZÍŸþô'“ݬIs+;ß} õ«Õj’“,}ï—){7“É„I\= ‚FòóòШՓÝá …¸t¹ŠÚúz¬±±lX·v²›ôH¸¯;~A„GÍ­ßb?Šs©Âä»õ|­FóØGèŽ_áQ#MþÍÐØÔÄÍæ–/¼}8æRUU4×LgWÕׯc>ï üìܽ;šŸøÊ†î,ÛÒÖÆî½ûðù>éìM7oN¬—q÷A=|ô(—.WñþötuwGseûü~Þ{ÿz{{¸ÙÜÂöv~î‰B–eZZ[Ù»ÿ§ÏžåôÙ³ý€ßjÃÐð0ï¼· ·ÛóÐ÷!ßd#£vÞyocGôFàîþrîÂEŽ?þ¹u…Ãa._©âäé3_ûû}ü›ãÜ…‹\ªªŠþ÷çÅŠº†ÞÝöNç8u ܨ©åБ£ß˜Àÿ@¿ã¿QSKA~>õ ¨$sfÏâÀÁC”– 9qê4*•е«WÑÓÓKm] °aÝZnÔÖQŸ‡Ûãfמ=¸Ün–-Y‚F­¦¡±‰ýõ¯IKKcãúu¨Ô*ä°Ìž}ûéíëÃápPQ^Îê§žÄíñÐÚÖÆÆuëxówxoÛMF–.ZD0ä½÷ß§¦¶–ÕO=ÅÙóç¹t¹Š¡áa6®_ÇÅË—³Y¹|ùù\¸t‰ó.ÒÝÓƒÙdfö¬Yœ:s†ukÖ`¼mæúÆFŽ?N§eíêÕ Œ000ÀSOz„º†Fn673súô{î©·¯áõzY±l)ÉIÉ:r„Ë—Ñ×ßOwwkV=EÕ•«\¼|™ÄÄDÖ­YÅlæø‰“ܨ­%+3“õk×b4~ržP…æ=ÑÇ¿R>Ÿ»vãq»IMM%;+‹SgÎDνO­"##ª«Õœ=•$‘••IQA]]<õÄœ¿p­N‹Z­F¥Ráóùøð£ôöö’•™ÉSO¬äБ£¸ÝnRRSYóÔS„BAöìÝOo_o$ïËD"ž[™û?9ÿ?µŠÌÌŒÉ>LŸrßwü@€ú†¦N©¤¹¥…Æ›M„e™ËUWèììbûÎ]8*+ÊÑiµÔ76ÒÒÖFEY†ú†*+*9~â$µõ L2‹ÅŒ¢(¤¦¤°nÍœN'{öí§¡±‰Æ›7©ºzY–™9c:ûÀ>6FggŠ,“››ƒJ¥fÚÔ)T–—³{ß>âããINJfúÔ©äç咛ɒ4gö,4j ÇOœÄc!6&†7ßy—ë7jع{sgÏfîœ9¨Ô* óóñx<ôõõEß»s|œ·Þy—‹縋¶ï@«Ñpøè1úúû9vâƒCC¼ýÞ¶è6îø»}Œó.R^V‚F£áàáÃädg“””ÄìÙ³H°‰t¾‚p;½^Ç¢… ˆ³ZùøÐ!²23#ýeæLr²³ÈÊÌ$7'›iS§0îrqâÔ)²23q»=¼÷Áœ¿x‘³ç/ðÔÊ”—–ÞsÁ`m|ˆËåÂb1óæÛï¢Ö¨ñüæ·¿gÛ’œ”Do_Û>ü¬ÌLêê8rì×®ßàä™3,\0ŸÊŠr´Ú;ï¡$I"';‹¤¤DÑÇ¿B@€3gÏb0HJJâmÛˆ‰‰‰œ{?úˆŽÎN>Úµ‹™Ó§Ç•«ÕtvuSuµY–'. [" @M¬þ˜—›ÃôiÓ8}ö,ç/]âÌùóè  òóP©$t:9ÙYdgeQŸÏµë7Ñ´¾o½ó^ôüÿþŽÈò›’ú:ÝwàoïèÄëóQZR‚¢€$E®tTj:½Ž5«žBQNž:sÜ…J¥¢´¤„ùóæ2::Š×륬´„… æ“‘ž –²¢`cJeóæÎ¡¹¥…`0ˆJ¥B§ÓQ^VÆÌéÓ1 x<ª¯_§¨°K ƒžòò2*+ʰÅÛHHH`Je%™dee’œœÄ¬30M&f͘Á–MOã÷û¹xù2³…ó瑟—‹J¥"))‘ÌŒ ®V_‹¾÷‘‘:»ºimogll FC^n. 8x‡ÓI^N]wl£L¼·™Ó§SVZŠÏç##=›Y3f'‹B”¢€5ÖJeE¥%ÅøÒRSI°Ù˜9c:éii‘Ìh™™”•–¢Ñ¨‰‹cáüylX¿–®în®VW“—›Ë´©SÉÌÌà^ëúy¼^ZÚÚèéí¥«»ƒÁ€F£á©'VRߨ€V«eÖÌt÷ôÐ×?@cSáphjn&/'‡ysæPZ¹ ¿[Vf¦èã_1°X"çîÔ”dº{zimkcll ­VK{G':ŽE PTXˆ^§C’¤ÈºJ…Z­B¥’IRiii¥¦¶—Ë͘}Œ˜˜æÏ›KYII´\JJ2ÉII¡×ëT*FGGéìúäü¯Õh&Zùh¹ï¡þšÚZ232ˆ³Z‰±X¸vã—¯\¡·¯€?@LL K/bÛÛ¹Z]É[<1ïq£&RÖËÀà óçÍåÐᣜ:}†ùóæEð»\ÅÉÓ§ÉÏËC–åÈŸpY¾•ûXÁíöÐÜܦëQ©T„Baä°Ý—Z­B§ÕpîÂbb,˜M&FFF9}æ,ùøý~ZZÛhnmÅ`00kÆ Þ~oG§¯¿Ÿ€ßZE8uæ,]]\¼|™…óç“›MIQùùX­VŒF#sgÏæŸþå_Ù´a=ÅE…dgeF·¹ÕáC9oå×étƒNž>Í¢ D¦AA¸E‰ä@Wd9š÷\¯× 9yú4K.$&&†k7j¨¾v £ÑȸËEãÄ3AéL›2…}Ìù imm#&ÆBwO-­m‘‹IŠÜ±åå¡Õj™3{FƒZÍÑã'¨(+Ã9>Îå+WHOK##=iS§˜Hzz]|´kç.\$1ÁFZj*5µuø@ÁoÃK0}ü+‡ ‡Ã$&DR9rîµ¢ÑhåãC‡" c¡¿€ËUWhmk£¼´­VË͛͜=wŽ‹—«xfó&ºº»‘e™p(Œ|×ól²,GãN8F«ÕÒÕÕÍðÈÈç«ÕŠ$=z?žSo}nëßçååa6™?wcŸÏÇî½ûX0Y™™Øâmt÷ôÐÙÝMNVååttvr¥ú9ÙÙ<¹r%:–¤¤Dl¶hÙì¬,ššnrîÂE,3kV­Âf‹ÇårÑÙÕEbb"O¯_‡F£!)!‘ÄÄDr²³‰'¡( míml\¿­VC  ¨°“ÉT–—“˜”HGg')ÉÉ !;3‹ã'N284D `㺵TVT`µZ¹6ñTfYi)ÅEEX,Nœ:EjJ ƒƒC̘6Üœlêéêî&Áf###¸8+jµŠ%‹“žžFzZ*õ‘mHMMA%I”`6™©¬(G¯7ÐÝÝCnN±±±“ý]„G‚¬È(ŠLÉÄ–Á`dJEãDÉÍ!?/Q»`(ˆ-ÞÆ¡#Gq8t:6oÜHIi ²"sýF &³™©S* ƒ\¸x‰¡!HKMeîìÙttuÑÒÒŠÑh">>žþþ~žÝ²™¬ÌL†GF˜1}:¶¸xnÔÖ284DFz:åee(ŠLõµë„BaR’“9sî]ÝÝô÷ Ë2åX,fºDÿê( ÁP‚l¶ø;ν 6*ÊÊHH°q£¦–¶öv$•ŠëÖâñz¨oh$%9™)••äçåÒÞÑANNqÖXÚ;:ÈÊ̤²²‚¸8+…˜ÍŸÄÈP(„Ùl&''ZÃÔÊJ††‡ˆ±Ä°háB?‰™é“}”¢<mím÷—/ ÑÚÚJVfæiqE¹#I†,ËŸÊ‚t¯²÷Úî‹eÌá ?ïþ–q:üŸÿðüøß§¤¨è&÷‡Ã´¶µ‘’’BlLÌÃÿAøÒš[Zùý+¯ð¿ýçÿDRbâ׺ï»Ï}£EQ\n7Š¢°s÷nìö1þê/þøtüQP&&…dY™˜øvy ì|Z†’ââO½~÷ÿ^Áü^e4E¢ÍfÃö€Ãf’JE¼ÕŠ^§ÿÜ«V«)*,| ý‚ðõÐh5ÄÅÅ¡Ój¿ö}‹ ÿh ƒ:|„†Æ&¶nÙý·»ãtÛ“ ߯ Ç{½Ÿ;þoEQp»ÝF‘ªQ¾Âá0^¯“ÉôØç[îtë|ïöx0›ÌX,Ÿ?¥ýmö@wüß’$a±X&»‚ <$jµZôiážnïÅ÷ãNâòXA#"ð ‚ ÂcD~AAxŒˆÀ/‚ øÿEQðx&?³–,˸ÝîÉn† ‚ð-pGà—e™öŽ6À- iniÅëõÝ÷?«¬Ó餭½ãŽ´†.— —Ëõ™uÙíc´µ·ÓÓÓ‹Ïwÿm¹§ÓI{G¤£v;/ÿáUΞ;s|ü¡Ôë8·´¶~á`>44Äëo½Ãá páâ%vìÚÍÕêkƒÁ‡Ö.AxAº{z£i¶¿¬¡¡!zoK¶%wëï``pð o¯( í\¾r…®îî‰5ú»?7ï£â®;~…K—/RuåÒ (Ý==üÇ^} »á[eïzuõ ¼ùöÛ„BŸ¬‰\uõ*Wª«?³®f÷Þ}¼úæ›tuwG_ƒ>zŒ‘ÑÑè>Ÿ<õ…Úרt“7ßy—P8̹óðx½œ:s†ÓgÎ>´ƒ …ø?¼F{GçÚ>99™`0ÈÅËUȲLÿÀ‡ƒ7Þ~›K—«¾P‚ðM1<<Ì˯¾ŠÓùÉŶÓéäàá#Ñ›’šº:ª®\ýBõ:s–½û|íïãî6 ®ƒGŽpìÄÉ/¼}[{;ÿþûÿàÔ™³:r”ó/ñÁö„ïZÓÿQu×ïø%~?ç/œC’TÌš9 ­V÷©Buõ ¤¥¦Ð×ßÏÐð0ÅE…\¾r…¬ÌL$àÂ¥Ë((,Z°€ÑÑQÚ;: ,^°€ú†FÒRST:ŒÓédö¬™H*Í-­¼öæ›ädg³dÑ"bcb‘™‹—/388ĨÝNEy$KŸÏ磩é&K—,æ£Ý»Ù½o?qV+ çÏgÜ5Î+¯¾ÆœÙ³X¾l)çÎ_àüÅ‹ŒŽŽ²tñbš[Z°Ù …ÂÌ›;‡ä¤$n67sñòeZZÛƒø}>ª¯]gá‚ù¨Tç/^âÉ•+Ðé"Ç£¿€¶övÌŸG[[;=½½,^´›ÍÍx}>Š ¸\u…Q»ò²Rr²³9wá"n·NG( êw¹))*ä̹óx½^æÏ›KrRgÏ_ÀívGYi)ç/^dÙ’ÅlÚ¸P(Äÿ`hxx²¿C‚ðPɲLGgÛ>ü‹ÙÌòeK¹rµš7ßy—ÞÞ^fÍšÉ{ï€Ý>ÆÈè(³fÌ ¦®–ññqôz æÍÃd2rµú5uuܨ©ùÌ8N'§ÏžÃëõFÊ™M\­®fö¬YŒŽŽÒÝÓËü¹shmkçÊÕ«$%%±pþ<ôz=7jj©©­%%%…Å  ×ë£õ*ŠÂ±'yûÝ÷èîéaõ“O’ñ­Ùþm¢çÕ¸¸8²³2¹xé2:–Å G[{/_F£V“‘žNzzCCC̘>†Æ&4udÍ>E!püä)úûÈÉÉföÌT]¹ŠËíÆjµ2îÂá0{÷ ¿€Ò’’Q©T(ŠŒ$Iô÷÷GRùêtÑ6B­V±}ç.êá·Þftt”m~HsK$WtJr2CCÃx¼^B¡;vîÂï0oîœÉþ ÂÃ%I„Ã!l6}ýýìܽ'Ú‡õ:­ZƒF«Áh004<Ì[ï¼Ç˜ÃÉÅK—ù`Ǯߨáƒ;HNJúÌ<áp˜v|íw¯¿õáp˜ë7jxõõ7xí·ghh˜×Þx“`(Äñ'9yú MMlûðCL&ý½—ÿÖh4¨&Î;b•Я†ÏïgÛÐÒÚŠ×ëåõ7ßbxd„º†FvìÚEÿÀo¼õ6*•оþ~öB8æìùó\®º‚¤RÁÄy9 `4ø`Ç.\ºÄ¶íÛ#çá‰}ªT*ô:‹…P(Äñ“§ðûýH’„Çãåõ·Þfdd”º†F¶ïÜõHÿßóᾌŒL–-YNl¬õSÿÖÛÛ‡Ãá ¢¬ …H"I’P«Ôh´‘,E~¿Ÿ¾þ~´Z-’Ó§MeÓÆ ø|>Æ*ÊË(*,Äl6ÑÖÞŽF£EQ233Xõä<±rW«¯$ NÇ‚ysY³zjšq—‹5µäfgcµÆb6šXºd1+–-Åï™™Avf&+W,§¼¬”ŠòròsóX·f51±1 V._ÎOü#FFG9~â:½Ž-›61gÖ̉;ò²,c2IIN&%9™k7n|rŒÒÓIMIáøÉ“ØícdeerüÄIccäåæRS[ˆµkxá¹­$'%Q}í:±±1¬Y½Š%‹áóùÙ±k7eeqµúƒƒôöõ108ˆÏï'6&†µ«W1î\L¦‰%†…¡áajêêøÞK/’š’2Ùß!Ax¨E!1!'W,gþܹ8NŠ‹ ÉÊÌ`íêU”SR\Ley9K/B«ÕÇÆukyé…ç©«¯çÔ™3äç³võ**+*¸×’ú.·›êk×£ý®`­FÃ3›7qêÌY‚¡ +—/§µ½æÖVºº»±ÙéëëãúòssÙüôF-\ ¼E’$*ÊËÈÌÈ`ÝšÕ¤¦Š~úUP…˜˜Ö®YMQa! M7éëëgxx˜¾¾›n"Iðì–MÌ™5 ½NH¨T*$iâÿ'Öå—ˆuµJÅÀà ‡ƒ¾þþèyxá‚ù¨Õj4 ùäåæ°hÁ| †ÈH¤R104Hm]}´ ½}}È`àÿÔ’½™”—ššvÏ5uu$%&‘˜˜ˆV«£««‹®®.FFG‡Â’`³ñÚ[oCä=GÞxMm¤lBBÁPˆg6obç®=ìÚ³‡óæ16æ ½³“5µÑáY–£EA!’¸¾¡•Ë—¡ÖhËáè¿3‘-Kššn’’œŒN«eÌ1FcS¶x¡p˜1‡—ÛZ­"?/—º†zjëëéíï'`1›‰±X%=-ŠŠrjjj™;g6MM7™=k&³fÎä_ý–-YÌ‚ùóøõo˲%KÈÉÉ&..Žk×o€$144Lqq7››QP£ÑÈÚÕ«¸R]MaaÉÉI¤&'3gö,´Z-³%’“|âKãv{0 èt:üÓ§N#=- AøÖQÂá‰>‚¬(¨Õjü~? L©¬@§ÓÒ×ÜOgWáp˜@ À¨ÝNSs3V«52rxå míí "I`·Û@’ ÆCrR"©))Ñ~g08uæ i©)ŒÓÖÞF|\ÉIIÌŸ;‡øøx’“¨k¨çFm$Õ«Åb!6&†žÞÞ‰g””h W ÒæÊŠr±lìW$,Ë(²ŒÙd"91‘iS+ÉËÍÃb1ðáúõ† Ë2ƒž‘‘ºº» ';•$Ñ?0À¥ª+8x˜­Ïl¡½£ã“ïá]Á[–eBá0aYFG²ü àq»ILLdÚÔ)äåæb6›Q=‚‰œÔ[ŸÛú÷yyy˜M‘/jzZqqñ÷ÜØ°s×fÍœN~^f“‰«ÕרkhÀ`0PYQAMm-gÏŸ'ÞjeåŠå„ÃabbbÈÊÌà£]{˜5sùy¹\¼|™#G¡+—-#>>žææê…Â<»e3¡PKŒ£Á@NV ô÷`4¨ohdÓ†õèt:º{z(+-Á`0Dçüt:UW¯’”˜Hqa!ݽ=´µµ“—›ÃÑãÇini¡««›'Ÿx‚…óç9~òÃ##dfd0oÎ:»ºeJe“‰£ÇO`KàÂ¥ËL›6[|½}},]²˜â¢"zzzY¹|9ÙYd¤gPSWGm}=³fÌ`Á¼y R^VŠÅl¡»§—UO>Ùl¢³«›¥‹RSWOCSjµšÜ܇(/+#ÆbáÀ¡CÄÅÅ1wölFFG¹R]ÍÔ)•ŸºÓ„oº@ ÀÐðÓ¦M%à™=k&·‡ë55äçæ‘••I}C§“”äöø˜Î®.ÆÆÆØ´q#3¦O£·¯?:_ZRŠÇëá£]»©­¯£¶¶žää$fL›Îµš44ÝD­V“`£êÊU^xn+ññq´wv±pþ<.]®¢»§‡ôôt*++èëëçäé38œN’“ùà£\¹z•ë5µ8ãL2¿ßÏõ5äææÿÎõ~Ó…Ãaúúú)/+%99‰‹…‹UU´¶µaµ2}ÚTdEæä©Ó446¢ÑhX»jUô‰|€Šò2²³²¹pé©))(ŠBkkF“‘в2T*åe¥wL9NY&/7çø8Ó¦N¥¶®£ÑÈÌ3¸<ц8«•ÜœœÉ>LQ‡¶ö¶ûËθTUEEYYô €£Ÿ˜ç’e¯Ï‡^§C«ÕF¯”‚ÁàeeYÆçóEæí&Š‘e™@ €V«E­Vßy•%E’&*ŠBOo/}ýýÌž93rw[NìÛÿ‡£C:Š¢ Ë2.·›ÿþÿÈwžŽÒâb Ct~¿•J…F£A’$šnÞäí÷¶ñWþ bcc¹x¹Š¢‚|¢YÀ>kß·þ[–åèüÞgm{+/t8& ¢ÕêP«UÑmFFFøÿü/|ï;/R^VùP‘‰LøÖú"}úÖO[ÛÚùÝË/óË_üœÔ””èŰ¢(øý~4m´?Ýþsa•Jug¿ÓéPMœ+nõ­Ûs¶t:môœâóùÑh4h4ê;î %IŠöûÛÛ,<|wŸwƒÁ á°ŒN§E¥R  ƒìÝ·ŸÎînþö¯ÿŠp8ŒßïÇh4"I‘éjŸßN«ˆCA †OžÝ¸û³»ýs¾µÿ@ w·áQñ@Ùùt:‹,¸ã5ý]wœjµ‹ù“Ô‡·ØÝeU*¦‰òníö@|¯Ž"I™dfdÜs»Ûÿ~û5·:¢h5,fËûîx* /7— ëÖNtlMôÊÿîö|V{oïülÛ[_ µZ}Ïí5-›7n¤¸¨(úº8‰ßf_¤Oßê7’JB«Õsǘ$IŸ:ŸÜë$üYýîö}÷œÇ7 wÔs/âÁ¾¯ÖÝçB­V‹Vù{ àãC‡ikogphˆë×#IRôœ~;ÃÄùÿVðþ¢û¼=ÆÝ« ¢ûºãÿ6‡Ãôõ÷“˜˜ý Aøæòûý “ššò¹'láñ"Ë2ýý Ž`‹'==ý‘œsÿº<Ðÿ·Z­¾c´@„o6½^Of¦èÓ§©T*ÒÓÓHOBßîÑ™|Aá+'¿ ‚ 6vÇ¢=Á`ð¦öù|ŒÚíŒÚí„B¡ÏÜ^QÆÇÇZ~o¿ßÏØ]máá‡Ã8ÇÇïXlçËp»ÝŒùŠ„o-—Ë…ë®TñŸgÌá §§§s¯×YÍï(ð÷õ÷ó/¿þ5cޱ.k³ßñúšZ^þëwä3¾pñ.]þ̺=Æko¼Éo~÷{zûú¹xùò=·¼òÚtuwG_ ‡Ã\»~—ËÀÈè(5µu_è=Ô54ðò«¯‰<Û‚ðæ?^y•ñqWô5×ËÕk×¢ç‡Î®.ZZ[¿P}ÇNœdÇ®]_ûûðÞÕfáѵwÿ>ò…·ïëïç_~õk^~í5ÞÿðCNŸ=Ë[ï¾ûù¬èwüM71¸ÝB¡~RRRhoo'ÁfC¥RÑÐØ„¢(”•–àr»!àPRRLÓÍHYƒÁÀõ5¸\.Š …Ã4·¶òñ¡ÃdgeRVZŠÕ‹¢@k[ccc òóÈÉÎ&PS[Kii —«®‡‰‰)2RPW߀s|œ‹…ÌÌ ::;8}ö7›[˜:¥‡ÃÁo~÷{–-]Âü¹s8ñgÏç»/¾@EyƒCCŒ»\(²LqQf³™¡¡!j먫¯ÇátNög'ßJÁ`ˆ¦›79vâV«•Ó¦qýÆ ^ûžv ¥%%¼ÿávƶnÙBA~=½½¸Ýnôz=ÅEEhµZ::;¹ÙÜBõµk$%Ý{2¿ßO]}=>¿Ÿò²24 æçãr»¦¨°€‘‘›nOII1µšîž^ZZ[‰£¬¤ímKµ)ŠÂÅËU¼ñö;<÷ÌfæÌš…Íf›ìCû­ …&Ròú0™Œ$''ÓÐЈV«¥¼¼ ãDþ–ú†F45‰ ‰ÄÇÇ1î'''›Þ¾¾H¨€YQ…BÔÖ×32IΖŸ—K[{;^¯£Ñ@Qa!aYæÐ‘£ôôö²~Í, `׋$IŒS[WG5÷øeY¦úúu¦M™Â™³gQ…çŸÛÊÛïmcéâEÔ74Ò×?@~^.‰ œ9ž‹—.1mÊTÒÓÓ¨¾~©••œ®\½Ê¼9sææÍ›äåæÐÛÛËàÐ õ¤¥¥ò›ßýž”ädÜi)©lzz¯¼úV«•Q»ýse'ß4’$1î§»§‡ËW®ÐÞÑÉdbxx˜úÆFl6}ýýŒÚí´¶µ¡×ëøçûe¥¥ô÷0wÎl*+*xõ7ÈÏËcÔ>FRRâ§ö£( {÷ ¡± ƒÁ@õµëlݲ™vî&??¾¾>222HJLàåW_#66–þÖ®^EFz:¯¼ú:))Éd¤§S\XxGà‡È]áðð0õ ”‹Àÿðx½üÛo~KJr2S*+8xøÁ`·ÇCGg'+—/篽ŽÑhdlÌA(bÁ¼y\½VÍßüõ_óñ¡Ã˜ŒFT*ud½ý`0:¼{ï^^xn+ï¼·¤Ä$f̘FA~>Š,344L  ¾±‘ÑQ;‹Ì®×ÿö»Ûp{s׃,ËhÔj–/[Êw¿ó"`§ÓI}C©©©Øl¶h’EQsŒqþÂE¶<½‘Ÿ{Ž”ädYÆb1³iÞټ™Ñ±1 (*,dë3Ï0î\æÍCyY9?øîKÄÇÅ¡V«Ù¸a=¿üùÏimoãБ£ƒ!~ö“³ú©'Ñëõ|3fsá›EQR’“yñ¹­<¹rýýý̘>¢ÂB¾ÿï0{æLfLŸÎ¼9sزéi4Z-–˜¾ûâ |ï¥9ñ"GŽ#3#ƒŸüð,\0HН;¹\.N9ƒÇëÁë‹ Ëëtzž{v ;wífhx„ k×ÐÜÚÊšZ‚Á ÃÃÃܨ©åò•+¤¥¥òóŸý OoXÿ©¼’$1wöl øÁw_z¤2´}«( F“‘gŸÙÌŒéÓ¨ºr•@ Àø¸‹«×®Q[_‡ÛãáOúV®X†F£™HrFô¡LœÉ%"¹gЋа˜ÍØÇÆhmkÇd2ñÌæM¬]µ FƒN§cÚÔJ*ÊÊØ¸n-:6šØ©`€ó—. N´á굇ö¬ÊÃtßwüuuõXc­‘5Uö1N‡—;2·rù2òrsxç½÷ Ëa$4šHŒúú†HÙ´4,f3¶xÛwîbhx˜™3fàóùp8 b0èQI‘ŒZ  V«P«TѼÜ7jj˜=kz½ž`0ĘcŒ`0„Z¥F¥RÑÙÕM‚ÍF(ôÉÃ~‘$ªh’…á‘a¼^/µ¯×ÃðÈZPdǃ$IÄÆÄàñzÆår‰;~AøÊL\Rß–äJ=‘emhx‹Å‚F£Áé•ÐLøòˆ&^ÓëôX, ÈHO'66¿ß‡Ãá¤`Ç‹¢(h4ÆÇÇq:8ÇÇ£mã.µuõ|¸}«žz’›-zž×j5w$lR¢YRoÝxº]n|>?ó'mˆ‰‰y¤²óÝ¢ÞúÜÖ¿ÏËËÃl2îÆÁ`{öP^VFIq qòÔijëêp:TV”S}í:W®^IbÁüyø|>tzEìÜýIÙ§Nsâôi|>3¦MÃf‹çÂ¥ËÔ54ÐÓÛË3›7ãñzÐé´ÈŠLvf‰I‰Ô54`³Q}ýO¯_Gll,5uuÔÔÖa6›IMIaÖŒ||è×nÜ ½£ƒÅ Ò×?@eE:ŽÖÖ6Ì›‹ÇëåÔ™³$&$’—›ÃõššnÞ$//—#GÓtó&5µuÌ™=›'W®¤·¯#ÇŽÑÑÑIœÕʼ9sDæ-AxÈ<MMÍÌ= çø8£v;óçÍ£«»›KUUäçå’”˜ÈÙó絑–šÂî}û¢súkV=ż9³¹vã§Ïž£·¯¼¼\</o¼ý.]æÂ¥K$&$P\\Ä•êjzz{Ñh4$$$°ÿãƒ<»e3†Ö¶6/\À˜cŒšÚ:†‡‡ÉÌH§¼¬”êë78uú CÃ#$&$ðÚoqòÔiÎ_¸ÈàÐ •åôöõq©ªŠÜœlññ“}h¿u‚Á µõõL©¬ =-°æjõ5úˆ³Z™1}:ý>zŒÚº:4j O¬XÎÕêkT]©fhxˆÒ’bÒRS9zì8±±±Œ9 ãóû))*Âãõ2¥¢"šŠ```€q—‹‚ü|ºº{˜ZYÉ™óç1›LpõZ¤ V«•¼ÜÜÉ>LQ‡¶ö¶ûËÎçóù8pðóæÎ!-5EQ% b1›1 ø|>Æ,f3qqqÑ'ßE¹£¬ÇëÅn·£ÕjI˜®÷xŒF#áp—ÛÑ`@¯×ãñx †‚ȲÌÿõÿȆuk))*&11µZM0Ä>6†F­Æ`0b4¹¹Aø¦“eùŽ> 1øý~¼>s¤Ÿ»Ün$ `€_ÿö÷üèûß###[||´Ÿ;tz=&£EQp{<Ñ!^“ÉŒÁ Çátâõx±ÄX0èõøý~Ìf3¡PŸßeâïvûVk,:ŸÏ‡}l £ÑˆÅlfÜåŠÞñkµZb,@´Í"sàÃwk$G¯×£V«‘e™±±Èèo¬5£Á@0ÄápräøqZÛÚø»¿ùϸÜn\ã.bb"éÙU*£vûÄgÄíqc± ×ë …BÑúo ƒ„ÂatZ-þ@½N‡}l ½N‡ÙlþT·²óÝwZÞ[Ãú!=Œ@©( H÷šµ‹hºy“ë5µôööùó?ý&“é ×ïp:ùïÿÏ?ð'?ù1E_º½‚ |uš[ZùÝ+¯ðßþËÿFümwe‚ 9söýƒƒÔÖÕ±dÑ"V=ùÄd7kÒÙMz$|+ÇžRSRHMIyàòZ­–éÓ¦NöÛá ˆ±XDîI­VSQ^.þ]½Ç AAøÊˆÀ/‚ øAá1"¿ ‚ Ž×ãÅ9î$..Ž›Q»8«•JÅÈè( 6›X^S&‰×ç£êÊÕH*Ûøxrsshllâ·ßæûß}‰ì¬,>Úµ§sœ¶>KbbNç8~¿VCRb"*•Š1‡ƒÞÞ>jëÐÝ•2÷–p8L_?Á`ôôt$`Ìá 1!!šå-11¯×K_?³™ääähÞõþAÌ&))ÉŸÊÛQ×ÐÀ›o¿Ã÷_z‰¢Â‚û^HLø|²,3::J D«ÑC_?jµšô´4Ôjõ§bÑ`ÀïgeÜåB’$FFFÑétȲLÿÀãããØl6l6ö‰ú5šÈwK–eN9KÓÍfžÞ°>’ôÇí¢pEQ‘ýi>iã澣›¢(T_»ÆÔ)•?u Eg6=Í+¯¾Î¢…óéêꦦ¶Ž¤¤DÖ¬zŠ«Õ×8{þ6ÆàÐ0ë×®áÿçÿÂb1ãv»)ÈÏç»/¾ÀÛïmcph¯×‹ÅbaþܹÔÖÕÑÚÖFÕ•j’“’ãOÿä'||è0I‰‰X,êêøÅŸþ‰ü‚0IT’ÄÈÈGŽÃát°`Þ<Æ].êêøh×nV.[Æ•«ÕŒŒŽoeÁ¼ùüö?^Ž\8œ¬[»†â¢B^~õ5´ Í-­Ìš9ýžû:uú §ÎœA¥RSXÏò¥KùÝ+¯°xá::»PI*¶lÚț+Ãé$àðì–ͤ$'óÊë¯ ÉÉÉæ™Í›0ÑzEáÊÕjêêؾs'ß}ñEŠ‹ 'ûÐ~ë¸=þáþ½òò2Âá0í„B!–,ZÄüysyëwN5üòçÆ®={1h4‘ì{^ŸvïÆ>jÇåvóÒ‹/ðæÛï ×騬¨à™Í›‡Ã\¿QÃÐð0'NB­R3{ÖLT*²,óÑî=ܼÙL(bÉ¢…¬\¾|²Ó§Ü÷Pÿ˜ÃAwOS**ðùü‘D:^Ÿ—@ ÀÈè(†™Ó§“š’‚×磤¸˜?ûéOÑëõtuwSY^Ý>F(¤²¢œü¼6FÓÍfl¶xQ™-O?Í Ïm¥¥µ•êë×éêîæ—¿ø9O=ñ¡PÀËI›X^VÊ/ñgh´FFGÙüôFN9ÃŽ]»ØüôÌæÏÏT(ÂWCV’““ùÉ~Ȫ'Ÿ ©¹™ysæPZRÂÏ~òc̟Ǽ¹sX²h!/½ðjµ PøÁw_bÓÆ <|˜C‡`6™øOùKžX±î‘ÙÃív³ÿàAÔj – GŽÇ`гnõjþðú›Ô74°~íjZZÛ¸pé)ÉÉŒŒŽræÜ9.\º„^¯çoþú/yî™gîúYV|ñÂ…”–ógòS ò'û°~+)²Œ,Ël~z#óæÎáÄÉSÄÅÅ¡( ÇNœ ¶®îS± âóyðÑdpFƒ% 2uJ%ÃÃ#ÔÕÕ£(°iãFžÞ°>:r:;;ñû¤§§‘˜€ËåŠÆ‚îÞ^þîoÿ†ÞÞ^FFF‰Ãf³¡Ójimk'%%·Û}lŒø¸8âââðz½Ñúoq¹\‘ÀÃØ˜ƒ¸8+íÄX,Øl6:»ºîhãâVZÞû üй}xã‹ú2eïù¯ò™Á9 q£¶—ËÅÉSg())bë–-_ßÑákÓÜÒÂo_~…ÿã¿þqVëd7Gx„ˆXp§[ÿ¾nk%Izà9ð/Sön_äç.—›¦›ÍÌš9ƒ%‹=”ý ‚ðè‰ç‰åËÑ‹çs„{±àÓîëŽ_A„o¦[wüb­~AAxŒˆÀ/‚ øAá1"¿ ‚ Âíñ|ù£+Â}»Wÿ …ÂŒ9¢ëó{<\®/Ö¿Ï_¼Èá£_<×úà ßÙfáÑuâÔ)Μ=÷…·w{<¼³í}þÇÿúgvïÝÇÕ‰Xt{.ˆGÙþ¶¶vQ©ÕÑ@˜Hx¡( n·—Ë…,Ë‘Ìx~?Y–£euz=^¯çø8¡Pˆá‘._¹J_?o$s’ÇãÁíñ ñx½ŒŽŽ ÈJ€gÎÇëó …ðz½x'Ê»\;~œžžÈ²ŒòD'¿?€g¢¾»ƒAvìÚE0¢´¸ î¨SQ|~?ccc¸\.|>?££ö;.TAøòîÕ;»:ùõï~G_?@€fûÎÑóJ ÀãñÞ‘i- 2<Ÿ/Z.<ØÝn÷=“ðtv~Òfqžøj(ŠB ÀëõáóùQ…ññqÜ·]4ʲŒÃéÄår‡ÃÑ ……B´¶µÓÑÙ‰¢(x<^Fíöè÷à“ú}Ñ}^®ªâÂÅKL©¬@§ÓÑ×?@}cc4!ÓÝmxÔ<ЂôW¯]£²¼œÓgÏ"!±zÕSüáõ7˜;k&£v;gÏ]Àl6±iãê¹péÖØX¾óÂóT_¿NEY­­­ìÙZÍŠåËШÕÜlnæåW_C§ÕòÂóÏÑ?8@8ærÕúûƒd¤§ñ'?þN§“ÞÞ^V,]¯þý·ø|><^/+—-§° ŸþAÞxûm ëÖ¬"ÁfãáÕéÐët¼øÜs$$Øðù|H*Ý==T]¹J||ÙY™||è0€?Rçòåäçñëßþ³É̸ËERbcÅEE|ç…çÑŠµýá¡$éŽþ»ú©'èèèää©Óx½^žX±‚ftd”@ ÀŠeKyç½mh4‚Á ›7=MvVo½ó.ÃÃ#´µ·3ÞÜ{î«úúu||P8̼9s˜ZYÁï¼Ëª'ž £³“1‡ƒ­[6³{ß>šn6c0xî™-$Øl¼ûþt÷ô—›IÍ{ÛZüŠ¢pôø Nž:Ûíæß}i"©ð0y<þùW¿F‡),,$Îj¥êêU$Ibíª§¨¬¨`Ͼýܨ­% “š’ÌôiÓhhhàßû.»÷íÇ ×GÁMä}øÃo000ˆÙdâ¹gŸá½>$ QXXÈÖ-› …B?qŠžÞ^Nœ:M|\<¥¥Å¨U‘e?Áù T*Ö¬zЙӧOöaú”û¾ãw¹\´µµ1¥²»}ŒQû(Š¢0Ð?€ÃáäJõ54Z Ë–.!11‘á‘â¬V^zñŒF#­mmL©¬ ®¡‘1‡ƒ%‹“›¬(”ñ—þ Ù³w}}ý 084DeE9?øîw¨«o`Ôn§¹µ“ÉDRR]],^´ kײÿàÇôö÷“`ã‡ßû ÌãÂ¥K ãøÞw^$ÎÇÎ={8~òÿòëßðò^Ãb6S^ZʺիYºd1]=ÝŸÔùñÁHÆ'‡—^|ž8k,ñññ<÷ì3T]¹ÊøøødŽ‚ðí¡(ØlñÑþ{©ªŠY³fRTTÈ÷_z‰¹³g1{ÆLæÏ›ËÖ-›‘e™¡!žÞ°Ó§óÑÎ]9z ‡ÃÉ/ñsV,_zÏÝx}>vìÜ…N§'5%…»va0˜>u ¿úío9yú4K-¢­½ƒÃGŽQR\Ìàà GŸàâ¥Ë Œð‹ŸýŒ§7lÀpW6OI’˜7wE……üð{ß%WdæûJÜJÒ³xÑBfNŸÆž}ûÉHOG­V³{ï>›¸|å ?þÁ÷Y´`Ã##Œ;éDFFF°Ù#Ù÷½^ϲÅKX¾t mí\©®fhx˜E °ê‰'P«Õ f͜δ©Sذn£öQ¡0’Jbhx˜»w“‘iî={É©žûü7›[T* òQ…°,#É‹¬Óiyé…çÉÊÌä÷Þ§®¾•JErJ2éiittt"I…¬~êI/XÀÎÝ{8sî<ÊDzÞø¸82ÒÓ°ÛÇe9šj7))‰¤¤$ŒF~¿ŸêêÈÈÙdB¯×“‘žNeeN§£ÁˆÍO¢-E‰ ÷ÄÅÅ‘“Mqq!vû Ìç¯ùüì'?"#=N‹ÅbÁl6ºÎq'f³™Ä„l6ñqq$ØÐj5ÈáGo*0è Ñþ‹&£ ½NG‚͆ÉdŠdë4šˆ‹‹C’T˜Íf²³2©¬(gÜ墷¯[|<6[<&£‰{¥ ø8¼^/*•ŠE  Óë),(`ll NGZj ‡¿ßÝn§° €âÂB‡‡±ÅÇ‘’’L|\Ü=s®ÇX,èt:D¯ˆB$ókvVFƒ׃Óé$Áfc挌¡R©HINÆjC£V#IR$¶LÔ!M}€ááaöîßOsK+ àóù1 deea³ÅGÌ F ÖØÔj5 À­in·§sœ›Y3fLö!º§ûŸ–e™k7nPXP€Á` =5•}²Mó!ø|~jjëÐh4„B!ìv{ä¢@ŽÌ{Ü*«×멺zŸÏ‡N§ephˆÔ”:;»xgÛûÔÖÕ±xáB††‡ Ëá‰y9:f·ÛéêîfåŠe I8ÇÇ9|ô²,“–šJvVæ'åP@Q$‰––VvìÚÍõ7X´`ÖØØ;ÞÛ­ù ¿£Î²3³8><±¬Dê½×Üž _†í‹ ‘¾cA£Ñðö¶m<³éi2ÒÓ9ñ"{÷ ?/ÁAöì?@wwÓ¦Laú´©üáõ7yýÍ·¨ol"/7‡55œ»pI’ˆÜ‘Ï™5‹öެ±±$&$àóùرk7kW¯¢½½ƒ1Þ\òrs$‰Ä„R’“±Ùl¼ü꫼öæ[dge1¥¢œÆãñ¢ •™ÉÔ)•hµÞ~o$33c²ì·’"+„ÃaÒÓÒ™RQ,ËØâã#± ;‹ýòûWþÀø¸  @rR2ýýý¼»í}nÔÔ°`ÞG¡RIdef’‘žNyYrXÆ>6F äé ëIOK# 2gö,¦N©¤° “ÉHyi)E…E„ÃaæÍÃÔÊJŠ‹ ÉÊȸ#»¬Åb!7'›Œô ²³²(-)!!ÁFZj*K-IŠ´!#“øø¸É>LQ‡¶ö¶ûËÎ'Ë2ãããX,–/”÷a•½›ßï' c±àp:ù?ÿïÿ‡?ý“ŸR˜Ÿÿ™eŽ8Á¹ ù¯û7Ÿ»ÿ/Z§ “¯¹¥…ß½ü ÿŸÿúwÄY­“Ýá‡éêî& ³wÿ~bccùñ¾?ÙÍš4·²óÝ×P¿J¥Âú€ëË”½›^¯G¯× Õh¨¬¨Àt×Ã5wKJL¢¸¨ˆ/20ÿEëaò™Íf*ËËŨ›ð)²,SWß@]}=‰‰‰¬_»f²›ôH¸¯;~AAø&¹5ÿ(εÝèŽ_A¾I$IŠ>/DˆK AAxŒˆÀ/‚ øAá1"¿ ‚ «ìÀà Ý==̘6íKýìÂãñpæÜyô:II‰”•–~j›P(„$I‘5–…P(„F£ù£O~¶´¶ÒÕÝC0dúÔ©$%%F÷×ÑÕEa~>Z­ökkϽ<¬c(“ÉåvSS[Ëô©S1"«ÝÝÝ/ÂáÈ’Üš/³®¾¯Ïûµ¯›þeú²ðõºvý:jµšÊŠŠ/´}0äôÙst÷tS˜_@bR"CCÃÌŸ;çqî} vttrøØq>k5œ[y­ï~íö²·ºÁ­íÚÛ;Ø»ÿ.—+š+"+/…Âá{Ö|*Ïu{G'GŽC­Q£Vk¢ûOÔ¡( íÚÍ•«Õ‘¬‚ƒ¼úÆ›8?'ÃÞÑã'hljâБ£tõtœØ¯Ûí¦®¾žÀmùoï_U{îu¬?ë Â7ɘ}Œííbdt¿?D.joõ EQ8yú þÜ\~¿ŸkׯsérÕgns{ücn]lÜîîþ~»ÛÛ,|õn}6ápøSŸÉ½^»Ý•êk\¿Q­ç^çÏÛ?û5µìÞ»£ÁHoMM79söltŸ·¿Éö@wü×nÜ ¤¨ˆ«×®¡’$-\ÀŽ»˜RY×çãøÉSh56®_G{Ggôjê™Í›¸^SCIQ!#££¼õî{ø|>V._Ž$IÔ×7ð/¿ú Z­†—^|ÇÃÎÝ{ ,Y´ˆ›ÃG"I*/\@Gg'Í--äæä°aÝZL&×nÜ ¸¨@ ÀðÈ:–½ûàóûY±l)½žv|Dll }ýý ³cç.úxê‰'hhläéõëÑëuìܽ‡'W®@¯×ÓÞÑɳ[6qýF o½óI‰GX¾t 99Ùø¼>jjk9}ör8ŒJ¥âÅçŸ##=ý¡·gåŠå¤¦¤ÐÚÖÆƒ‡>ó¾øüsädgOöwLî$ÑÛÛËï_ù*•ŠõkÖPSWí+–.åÃ12:ÊèÈË—-åÀÁCøý~T*ׯ'9)‘Ý{÷q³¥…–ÖVæÎž}Ï]µµ·³ïÀÇøü~–/]BVf&»÷îå©'ž »§—ÞÞ^žÞ°žÓgÏRuå*ñññlÞ¸˜˜X&2Þ\,f3mímØÇÆXºx1z½žÆÆF¦TTræì9Ú;:X8>‰‰ (ŠBbR"[ŸÝÀÙó°Ùl,]¼ˆœ¬,vîÞCãÍ&ÚÚÛY¼p=½½œ:s–ÊŠ N=Ë•êkC¡HÛ*§ÐÙÕMsK ï¸p8LbBo¿û1– òó˜;{6sfͤ¢¼œ¬ÌLV=ù…ùôõõq¥ºš¶öšš›±X,´µw VIdgfa0X»zË—.açž=4·´RSWGwOÝ==¬[³·ÛÍÅK—ƒ½=f“)úYœ<}æÃs.Lö÷K`6›Y¿v y¹9=qœ’â¢h¿(-)¡¸¨ˆò²R–.Y‚Ïçãju53¦OÃd2±íƒ8uæ,5µu<ÿì3Ìž5óž» l»£?nC§Õa±Xø×_ÿ;íÚEQa!]Ý=ìØµ›¢¢"ÚÚÛ9|ôWª«¹zíOoXÏ¢ùóïHà‘EcÊJKÈÌÌdÕSO’šš:ÙGõ[) rýÆ 22ÒÉËÍeÛÛINN" ²ý£´¶¶±ÿãC<õÄJòrsilj¢¿€ú†FdY¦µ½Ž®®hj^Fô©SX²p!UÕÕ\¼t™55d¤§3czd U¯×SRRLQQ!³gΤéf3Á`I’°ñîûœL(äƒ=’wþ÷øÛÚÚƒ”£( I ’$Tj:½Ž-›žF§Ó±gß~Q©Ôäçå1¥²‚AÁ %ÅE¬X¾Œ¢ÂBöì?@Kk²¢hK  /ÌÌ ¼^/==½œ>{–îž^<7Á@ŒŒÈàöx°Ùilj"ÑfÃh4ÐÚ:Ѷâ"$ ¼^Ý=½ô 008HZj*Vk,ñqñdef’––Fjr2111”‘˜ÀœÙ³¹|å gÎcJE&“‰«×®QR\ŒÅbF«Õ‘žÎ¬™3e…¡á!Ô5’¤"5%…Ò’b222ðù´µ· †j{,Kô³xråŠÏ>†x½¾Éþ~ Â}Sˆd?ËÏË#7'‡p(L‚-ØØ‰~‘˜@bb$=nnN6jµk\Ó¦NåÉ+¤®¾ž¬¬L HNJâ^3ì^ŸžžžhLOKE«Õ°xáB::;0 ”—•Ò?ÐÏèÈ(ÍÍÍèõz, ídgeQQ^FÎDî–’œLlL ¥Å%ÄÜÖo…‡GÌ Ó§NÅÏÐðøü~ééíE¯×1mʲ²²ÐiµÑ•üT*j• •J"©Û=/UUW¨¾~Ÿ×M,7uêrsrP©TH’D|\ÈàÐÐdÕo­ðÄyÏo£ ?ŸÌôt–,\Èü¹sÉÏÏclÌÁö»¸vý:ÁPˆ¸8+}ýý?y’ƦHŒÒë ÔÔÕqúìYjêê(+-%66yâ»(ê9³‰ó½"ËôzÚÚÛéëï'?/7Ú†óæ=’û©·>·õïóòò0›ÌŸ»±ÏçcÿÇY¼pééi$%&âp8¡¼´”ò²R‡†ihlŠÞÕ›MæèíþY¼héét÷ôp£¦†ÄÄDÖ®^…-ÞF\œ•ÜœÔj iiiTV”308ˆ,ËÌœ1¢¢BRSRÉÊÌ$5%³ÙDsk+áP˜ää$Nž:â… HOK£úúu z=ׯcÔ>JwOïDnï,ÒÓÓwc¡¨°[|<ö±1r²³ILL¤µ­ •JÅæ§7ÒØÔÄÍ–6¬]ƒF£E¥’p{<ž^¿Ž¬¬,Ì&yy$''‘•…J­">ÎÊ•«Õ·=7 I]Ý=$Ølø~®ß¸ñ™Ç055%ú<€ |SHF ò ÐétÄÇÅQZR‚-Þíùùy‘_èTX­±;q‚°,“ÀÆuë(,ÈÇl2ÑÒÚJRR3¦MCQd›nâöxð¸Ý¤§¥3oîœhŒŒ¾Åáv{Ø´aùyy¸\n¦TV––FKkãã.232(-)Æl6Ñt³µZMJJ2µµuŒ9Æp¹ÝhµZÊÊJIJJœhs–¸ëÿ H€N§%?/«5rîëìîfhhˆää$JŠ"SDííít÷ö¢È2O¯_Z¥¢£³‹ü¼\¦N™BA~###ä“’œBo_ÅÅÅL­¬$5%™ü¼¼;žáP©TØl6²3³ˆ‰±0¥¢ŸÏGœ5Ž¥KÓÝÝ3цdRSs°Çã¡­½íþ²ó…B!zûúHNNÆ0‘÷‹Š–MJÆ`¸¿²_D8¦§§—ä”d4j5ÿüo¿¦°0ŸM6ÜW=@€ùÕ¯™9c:+—/Çátâv¹IOO»¯zdY¦»»ç¡·G„;5·´òûW^á¿þíß`³Ù&»9Â#D–eÆÆ((ìܵŸßÏŸÿÙŸNv³&ÍeçÓh4dge=пLÙ/B­V“©`pE‘™1mÚ}×3j·#+ •ååXcc±ÆÆÞw=*•ê+i wÒét¤¦¤ þ¿é/¡Pˆ§NQ×ЀAoàÙ-›&»I„ûºãÿ¦‡Ã;†f¾¨@ €ÇëÅûÐÝxÔÚ#ß&², …ÐN<¸%·óûýø zý§~}ñ¸y ;þo µZý@A"wûËñ¨µG¾MT*•è#ÂgÒëõèïsjúÛîÑ{ÜPA„¯Œü‚ ‚ð_A#"ð ‚ ÂcD~AAxŒˆÀ/‚ øAá1"¿ ‚ Aáë£Ü9ÏëïÛ>øÿßÿ¿ˆl61l/Ë2;wïárU’$¡R©ðz½¼ñÖÛ´··ŸÜÍÞʾ$IŒ»\\¸t‰®žnàÿßÞ=Éq܉ÿÖÑÕ÷ôôtÏ}Ïäð’I")jåØu¬lÙá¯Íõnì>øoØg?8üæÛkSAÅ®$Š©0µ¼µ’ ‚¸À`îû¾º{®¾êL?ôts.@$E˜Ÿ`Žª®Êª˜ˆ_å¯~™Yz@˜š™æÊµ«M³@wÏ ( ª¢²²ºÊÜÂ<©tŠt&ÃúÆ:ã#¬¦Vq\§ò™›M„§( žðöÿ©éiþËýoüêÿ¾Íëo¾Éÿÿ“Ááa ”±PUµr¼÷?üˆßüöw•ãíÞ¶½½Í¹OÎcÙöž{V~)ßãÊ}(²Ç/I’$ÝA帻w»–J±°¸D¬ªŠ¡áa°,‹ƒƒÌÎÎ16>NG{;Ù\޾¾«,,-±¸´Œç‰=7O‡ 4]cye™úÚ:lÇ&•Nï )‹E667PU•xu]×ÙØØ`sk‹ôzšH(ŒaØŽÃÜžç0loo£ë>EascH8‚Ï竜µü( <§x•ëw‡æ¦&þã_ü{~?ï~ð!¿|ëW4ýõ_±¼¼ÌÔô m­-Üß}8ŽƒªªxžÇüÂ"Ã#ÃÔÄk8Ñ{œO/^äµ7Þdye…'N‹p8ÌÕk×1M““½½$5•¶ì¾?²Ç/I’$Ý1»{ûå`4::Fm2Á™gžæêõ~,ÓâÓ y÷ý0 w§ð×ï¼Ë¥¾>ü~?®ç<–'nrNˆE«ˆUŘŸc~aÚd’`0H±h2:1ÆæÖ«©S3Ó¬o¬31=…ÞNz\a}}õõu„ç¡(¥B¹Ùùy677)òÌÌÎ^°(öö¼Kÿªª i¿ŸÇ{” >½p‘×ß|‹Í­-^ó-ÆÆÇ+½ûT*Å?þìg¤RiÞÿð#Î_¸ˆiZ˜¦I6›Å4M~ýOïÐwõ*Ó33üüõ7( î5È¿$I’t‡(”ÒÞ»«úÇáÂ¥Ë,¯,S(Ÿ˜drzškýý<öÈÜyæææçÙÚÚbhd„?ÿ³?¥¥¹™ÁA\×­5UU+©ìCÏ­*´4738{ë„w³ª~ðÁ@ÞcÇÑ4­Ô!0 ÇuÙÚÞÆ´Lt]# ’ÍfÉr¥ /”+ï…¨ŒÍ¯M$ass“î®®ÃG (à E”«ó=<á‘ËçYX\BUU>üÍoèìh§¹¹™t&éÇãÉ'NÓÔØÈÒ‡Ëloghjh óÀÉ“|û©'IÄkp\Ó´˜™¥©±‘X¬Šæ¦&8yMÓƒ•º‚Ý=~íå—_þ»d2y·ÿ$I’¤{˜¢(˜–‰íØø ¥<19‰‚Â^úím­„‚!yê‰Ó s­ÿÅB‘“'{¹ÿ¾û8ÿéEÆÆÇ…8IU4Z hŽë°¹½E}]]¥Ú^Q,Û¦hIÔ$ø|>\Ï#—ËQ_W‡®é¬¬­R(hin!™H°Í²²¶ŠeYTE£èºݧ£iš®«Š¡ë:éõulË¢«£ó@q i™d2ëÔT×ì²—Ëå¸zý:“SSŒOL&yé…hkifeu¡!2™uÚZZ0ü—._¡­­D"Îõë7XZ^¦6™ ©±‘õõ n ÒÞÞNG{ýƒLMMÐÞÖZ¿¥ìÊÊÊ Ê¹sçDOOÏ×b–#I’$éÞ¤( [Û[ ¢‘èM‡ •+ùË©i˲ðêNµºmÛ¸®‹Ïç;h-Ëb~qŽ“½'0 £²MìôÒUeoY[ùƒÎŽŽó lnm1:>FWûÁl@9K¡(¥wý»·‹ETM÷3„д,|>º¦í¼(e*Êmp]·ÒNÇq°lÃçÛÓîÒE¿LõK’$IwŽ'¼[Vàïy•.„Øàvï»û؇ã/Íæwð÷»ãþñøŠ¢ì©Ð?Œišäò9;~ï5—Sý‡ÿCÐîk0vÚQzàÑ+ÛÊÛË å‡ÿ¾ÏWî­'äp>I’$éÎQPJCÛnÓ\ý¥âµ;GUUÚ[Û ‡Ã·Ìš{îݧ¿|\¯TP)¿$I’tÇüþ1÷رQî\è÷ù|$jjny-å‘ _‡ä\ý’$IÒ¥ûôÊ»så6hÇqˆF¢äò9t]¿-çØïfAßuÝR=C4Šiš>ã ù«ç:.~¿_~I’$éöBðˆÅb¥±ó·¡ GˆD"lg·YZ^¾Û—ŒaøiijacsƒB±pWÛ¢( ‘p„h$*¿$I’tçD#Qª¢U·¥7nY™ ¶mßÉŒÿ¡„OˆÒâBÑ*<áá8Î]k¢(¨Z©˜P~I’$鎹Õ´èqSé5|>5µµÜýWê …Bž•ÕÒ¢Cñê¡x¸;Cç]×%“ɰݖ_’$Iúã'„À¶mš›š*KèÞm¡`T:L$ïHÍÁ­¸ŽËHaL~I’$éÞqè´¹w±-¥¯w¿]Š¢ ¨*¹:Ÿ$I’t¯¸Û/ökÒÝç°¿A2ðK’$IÒm£TþûÚ©~I’$éžpXx-OTž’·¼ðþ)z÷s§2‡þžs(åUö>Úþ°D„뺕*MÓ¾Òº„[½VøH’$I÷ŽC‚ôêÚ*ÛÙ,G»°°´ˆ‚޶ö=ûîž÷ÞqFÇÇhij&‹íÙ/ŸÏã Ad×4½·zPPÔñ+ŠÂÔÌ4k©€UQého'VÛó Q^ºxÿœüöA©<õ˜–…Y,RUUu =åOÉÀ/I’$ݳÇŶí]?;xž‡i™X¦…ãºþÒRÁÙl–\>O6—Å¥¥{óÅ†Ï  237‹mÛt´· G°m›l.‡áó‡Vî+:‚Ïqê’µ´¶´0;?ÇÂÒ"±ªùBB>O0$Ëç øýhšF.ŸÃðØŽC!Ÿ'  )šE,ÛÆó\Ö76H§ÓtuvQÌlÈEz$I’¤{Ú!ivEQX\Z"•Nðp\‡£ÝGØØØd-µF àDz,°–N‘ÏçÉåsÔ%kÙÞÞÆ´LRé4>ÝÇäô–mÓÚÜL2‘üܯŠf‘ílÓ4 ƒäòy&&'ðù|ضMgGó Īb$ FÇÇh¨«g-•B×ulÛ¦»«›ÕÕUÖÒkD ÅÛ¹,«k«„‚Áƒ_VõK’$I÷´]1xwoÜs]ªcÕï9F0daq‘µÔm­­é:B8 ^/­¾ç ЦI"‘ .YGWG'¹|ŽÌzMÓ1M“t&sh«=B°µ½Íøä8¦eÒÚÜB:“&›Ë¢i:ÛÙ,ÙlŽDM éL†t&ƒO÷Q(–Êûlmm‚xuœc÷÷ÐÒÔLƒh4BwWÕ±ñê8Žc337K¢&®ë>ßgûTÇKíÒ44MCU5<¯4=ð¶(¥šø%I’¤{þ+„ &^C4edl”¡Ña4M£6Y‹‚•ÕG†°l›–ÆfXXX`lb¼TÕ¯—‚évvÛvðé:±XùBž™Ù¢áñê8éL† \÷à\üÊM†ó麎ªªÄªbÔÕÖ²°¸@u¬š@ @*®,ddÆN¡ &'™Hàßµð<4MGSUÄNÑ!ŠÂÄÔdéuÅ!7H9wîœèééùÚÌt$I’$I_”çy,¯.ÓÞÚŠªª¶Y–…Ã0ÐuñÉ LÓ¤¹©™`0ˆáó!„ hq]]×0|ŽãP4M|>>]GÓ´J@õûý¥åw‹EþÀžwꊢ061ÀÑî#{âli!!]×ñ<Û¶1 Çu(M4M#à÷£ª*®ëâº.†aT>[4?ÛÇó<€Ê@˲ð<¿ß¿kö@…Í­-.\¸(‹û$I’¤{ÃͦÉQU•` »Ç·ï¬œW‹í. ÷ ¡3 £ô®\ˆJ¹Àîw皦Dvùù†óø|¾=í+Ó§û0¢Æžói;iüÝŸ5ŒÏöÙÿ S~@¸ÙM’_’$Iº7ÜbÊ^¥µr)èd2 >ÑÍþßý¾Œø-·+ |Á„úçÉÀ™,½‚œÀG’$Iº×|ÎÙq«cÕÀ—  ·«Mwª2ðK’$IôEAS5Ì¢I(úBŸ»],ËBUÔÊ÷·LÁßfBx˜¦…Ïç“_’$Iúã§( UUU¤3ë¬olÜíæày‚ªª °²º†ªÞ½®i½h$*¿$I’to‚ü¯Í(µÝó„Ñ»Þ.UUY]Y•_’$Iº7ì_4çë`w°ÿº´KNà#I’$Iß 2ðK’$IÒ7ˆ ü’$I’ô "¿$I’$}ƒÜ²¸OQT¥´²T澓TU-MÆ$ÀâŽUE–ÎûY!†ëº7¿GªŠçy_¸m»§…”$I’¤;á–?—Ï399I6—£±¡‘–æ¦=óßLiCi ãÂóAm2Y¹'åã*Š‚¸;ç-ÿcrrŠï½ð<ºî«´±Ü†ÝX_&› I’$I‡¹ià·l›Ñ±qÎ<ó4OûÛ¸®ƒ¢(\¼|™ÎŽâÕÕ  Q]]®ë\ïïG8Ù{œw?ø€KW®°±¹Á“•ܵôIDAT§Ocš&—¯ôa=ò0( W¯]gkk‹@ÀO8aye™ÇÓÝÕ”²SÓÓ„B!þíþueIÄþ~òÿÈ#?ÌÙ3Ï ¹Üׇçy’‰ÄÝþ[‘$I’þˆ)ŠB*•ºuUÿógÏò·ýW454ð÷?þ1Sœzô††Gè¿1@ÀoÐÝÙEWg'–e±µµMuuŒãÇzèìhçû/¾ˆY4"•N“ɬ377ëz$ ¾ûÜsé>Bwwgž~š¢YÄ4M ”žookã?ÿíßðܳÏpîü^{ã—twuÒÚÜÌsÏ>ÃýG…p‡B>Ïòò ím­´¶4óÒ /ÐÔØX¹ØržßïçHw™õulÛA×u¾ûÜ^zñ…Jš]þ€ŸgŸþ?úWÎÓß~ …d2ÁógÏrê±GY__§£½Æ¦ž}æi––—i¨¯çG?ü!gÏœ¡ïÚ5ŠÅ"'Oœàû/¾ÀÌÜüíl–“'N°¸´„ª¨X–ÅÔô4Gt£ª*++«ÔÄãds9„€'OŸf~aŸþü464HÔ`ÛGº»*étá TEEÓt„8Žç•²¥& <ááºÂó¨M$c|b‚±‰q‰º®ÃN-DUU”‰ÉIŽë!TÞç—3 åóú|>‚7Ð5b±(‹ÿ$I’¤¯Ì¡©~EQ( |ðÑGœ;ž©©)Nz”Ó?N(bum•k×ûùwÿæGø ƒþù·\¾r…p8ÌSOœ¦¥¥…Ù¹9¦gf8yâñx5}W¯237GUU”Úd’T:͉Þ^Òét©x®®Žå•Nööâ÷Þc``ˆp8Ì¿ø“©Áu]ú®^£¦&NM<ÎÈè($jj8õØ£X–EÿÀímī㜿pÙùyBÁ ÷=Êo?þ˜á‘Qxâô·¸v½Ÿå•ŽÝ%Œ2<2ÆÐÈ0 ‹455’Ïç9qü8¹|Çqého#)]GsS››\¼tüÉKßÃ4-B¡Ý]]$“ n réÊÉPþ}ùwåïmÛFÓ44M«Œý/ow‡b±ˆßµ€‚ª*•{Q>ÎÂâ"ÿûǯò7ÿé/inn’Å}’$IÒ—¦( ÃÃ÷ǯª*Á`°ò³˲á[§Naø|¸ž‡Ï§ãóE|¶H…ÆÀ—'ÇÙlw_ÞÇ0 Œ]ç/ÓõÏš …|Îçûl{xßv¿aìiÏþó•à}X›w/µXþº;U_þyÿCŒ¦i„ÃáÇÛÝEQárßÖRiŽv—²2èK’$I_…/µ,ïógŸ£­µ÷.Ìäw¯BÐØØÀCªJ{{[e”ƒ$I’$ý¡¾pà÷ù|ëéÁè6©ŽÅ¨‰Ç9y$I’ôÕúR=~ˆn¯òÌ’$I’ôU«~EŽ“$I’¤{žžÉd¾Ûí$I’$é6Ëd2ü¾kذ a¤õ%tEXtdate:create2013-08-30T12:28:19-04:00¯Û(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshotï¿>IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/files_exec.txt000066400000000000000000000006161330160122500236420ustar00rootroot00000000000000This screen shows application types that can transition to a process running with the '%(APP)s' type. In SELinux these are called entrypoints. SELinux controls the executable files that can be used as an entrypoint to an confined domain. If you have an alternate executable that you would like to run in the '%(APP)s' domain, you need to change the executable file type to the entrypoint type. selinux-python-2.8/sepolicy/sepolicy/help/files_write.png000066400000000000000000002277151330160122500240300ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýgtÉv ‰~iwð$ AïM±ŠÅò¾êV]oÔj©%õHíÆ­×o½YÓkfÞë™VkZ=ÝjéJ×ߺå®SyO«è½H„#¼=Þ¥y?çð€]9’ÅüÖÂÂ9y"3##2bGìØ±·ðüóÏ;‚Áà7KKKÿ•ªª‹MÓT±±±±±±±ùJ B&“ÉœûkÃ0^–KKK¿ÓÔÔôï«««ËÇÍΟÍ狚J¥VöööþåÙ³g%áÈ‘#ÇÚÚږʲŒiš7;s6666666Ÿ3‚ J¥8~üø1X(Ë2†aÜì|ÙØØØØØØ|˜¦‰Ãá@UÕE²aŠaölßÆÆÆÆÆæ+ŽaŠlš&¹?›¯6"` }›¯89Y/ç>ØÂ߯æÓ!Bþs®Ëá²v6×±Ï#…y™+•€¿î>…çÍuÌÆÆæÖ"×öeÀVõÛØ| A ›Í'0 §ÓÛé"“ÍO$ÓE‘ñºÝDcqÜnª¢NgHeÒø<DAàÓ¶@A0 ƒp4†aè‚€ÓáÀåtÎX€nšÄâq\'š®a·û†î‹ÇIg²ø}^dIÂ0M¢‘(¢(àõxnvµØØÜˆ‚í;ׇ\¡¾l }›OG$ãµ÷¶qðøI4M£µ©‘?þÖs…(ˆ¢8ódÖrHá½^{;;öìç¿ýuÖ®XBoÿ ó³ç©¯©á¾ù,.—ÃÊ©ibÌh: µ fþØÅ4Ö}„™'Ó00gî &†qqð‚­]°±apd”©p„æÆùœ>{ŽâPªò²+ž3KÕo7 ›CEÚ;»Øuð0_{äAê««H¥Ó8 Éd ÛÅŸ~ï[8‡Ã „#1²Ù¬%ü ƒŠ²RÖ,_‚iBwß Ó “ÍR^\Œ¢ÈŒŒOP]^N4'™Jåï]YVFÿÐ\NeÅň¢ˆ®Db1ž~è~ê««xáÕ7øxßæ×Õ042F"™¤¢´Ã0ˆÆâd³YÌ«§²¬ˆÅã ŽŒ *2ºaPWU‰ ô  ø ùý˜¦@"™dlrŠwí¡i^Ûwí¥o`ˆ²’btÃ``h„©pÛMEY ã“Sd³éL†PÀOIQˆá±q¦gÒT•—ƒÃ#¤3DQ¤´¸‡ªrahY²2ÑxœãíèºAIQˆEÍMÈ’t³_›/AŸà¶³iõ @àã}xâ{©*/»ªL7MÓü66ŸÓ0(-*¢¼¤˜c§Û1 ƒ‹!"‘hŒ>Þ…(‰,nYÀ¢M¹‰j¾½õôðÑž}ÔTVðã—~ƒ$‰¤Òiª+*X·| ¯¾¿?ÿÁwØìç{ûY¶¨•{÷³aÕ v<ÌÓÞGYqñÌõ¬k9yšó}ý¤Òij«*ùxïvì;€,I¸œN¾w3‚(`šp¼½ƒ±‰)æ×Vóâ«o226×ã¦(àlwÿô›ÏâP~òòoùÎS 0MÃ0hmšO,‘à•7ß¡÷ÂK¶ "º¡³}Ï>zúˆÆãÜ·i'Ïv2:>‰,KÈ’Ä}ë9vì=@Oÿ"±8Ü»™t&ÃöÝûq9ŒOMñµ‡dtb‚g¸{íjæÕVóÒkoQYVF}MõµÈ.×§^"±±¹]1M“E ç÷ï|Àc÷oaqKóUUý9[œü¿Íõ£›&õ5Uü‹?ü>ÇÚÏpøÄ)v:ÂûëXjk·Û…$I8T•œ`fTêÖ€Û@ÓõüçûîÚ„Ïãá×o¼ÃèÄ$˜ªaš¬Y¶„¾ÁAžÿýk<ùÀV–·-ä¢qîLÆ¿ÏÇ7Ÿx”êŠrþþW/³aårÖ¯\Æßüü=‘W½†n´wž§p˜?ûÞ·¨(+!›Íò·¿|‰c§Úq»\|>æ×բ뺵ü`š”—”ÐÒ8Ÿþñ Þ²QèÓ¤¡®Ž¬¦sìt;ÇÚÏ`šË¶°aõ ~øüKô ÒX_KVÓ?ÝÁÎý‡ÐtÍkW±rIÿðÂ+\æðÉÓÔVU’H$Ùuð0e%Åø½^¾ûÌãÔWW!ÌäÅÆæND€¼ 3Ÿ®OžÛ3~›O(ô\àìùnªÊËišWLJ;÷‰Æ0MÛÍꥋQ§ÓaXëÔ=p¨*¢(H¦ ßþTEÁír!Š"²,“L§éêëg|r Ó4Hg,£A—ÃA8%™Jár:gç>¼e3«/B7tÂчÊÄÔC#d2Y¼7º¦326ž7@´òg04:Šnèý>îZ³Šß¿ó>‡ÊÖëq¨Š5“ÈÙV.§¼´˜ºª*>ød7`­;¾öþ‡4ÔÕQ ¡i¢(¢(2n§‡ªÒ70ÄñŽ3̯­¥¤(„®ë(ŠÂT8ÂØø™lY–Qd€†úZŠ‚¼ ‚,Yš}ÆÀÆæNCNtœeçþC<~ÿvî?DÐïcÅ¢…Wϲ귱±¹~L¦Â>Ú³ŸH,ŽËéäþÍi¨«ebjšL&Ë^ú †aÐXWË·ŸzŒPÀχ»öòÑžý¸]NV´-" KÁ€UQ$‘€ßG]U%KZ›yoÇNeÅEo?C2•æO¿÷-Þÿd7‡O¶³aå²¼¡\q0ˆ(d²YËZßåâÑ{ïáŸÐõöû´4ÎgëÆõÄIŽžî àóâ÷zii˜Ç†UËyç£OP•û7o`á‚ÞþÈA<ž µ©!?¸0LŸÇ"Ë8*KZš1 —ˉßëÁçõRYVÆÈغiR\˜ÙaŸ’¢ÐÅ43¶ËÛòþ'»éêíc|rŠªòRBþõì;zŒd*…ÛåÄåt øóZ»ß²¹S1€²’bžzè~ZgŒûJB!JB¡ëjÂîÝ»ÍÅ‹_¶ØÆÆæê¦I&›%•J£ª*n§eÄ—Õ42Ym&•eïPÒ™ìÌHܲj—% Ã0Q™lVC–%¬óEÓ$Í"‰"9‹xA‡ª’Jg@ÇÌÖ@Ó4Ig²(Š<“ÞB˜hºŽSUE‘¬¦¡iz~À *ÖÌ:™NÖ55]çoñ"ÅE!¾÷̳žÛz63¿- «é˜¦ª(¤³Y’ɪª"KV^DAD’D2Y E–ÐtD>D:&«iô óòëoóƒ¯=ÉÂDbqÒ™ÌÌ`C!£eQÅÚ©`cs#¢  Ï±ûæjçœ:uÊVõÛØ|ZÀ©ª8U¸èCEdçìצiât¨s^Ç4Mª’o‡¹Ï‚(àš#T¶a8Ô‹?‡Ó¡^ÖðMÓD™Q›ç órªòÂ4@þ^‚ ÐÙÝËàÈ(Ü{wÞO@ŽÜ@¡ð>Š,’õ,Š’\é9UEÉLÓä£=G9rªÃ0Xܲ€úšjÌí‚ßãÆÌ•¡ª^³s³±¹0M“B3>]ׯû¼¼ªÿóô fcs§0W›1­®+í\¿Í6Ø3¯™þZ׿ôøµÒ ‚€Óéੇ¦ŠKƒx]ëÞ×󜗦Y·bóëjP•ªòÒmˆqÕûØØØ|:ì =666³0M“ÚÊ ê«/ú_~¯‡ Ï›÷ù^ʼ-‡â6_rï_áöÒ[}V%Š"˜VžEQD0¿pÞoþ-.H ]ˆšÆ­Ÿßk>‹ÝGÚÜ"†¦k˜†åáS–äZ®¿õ§U6w¹&·ƒ0 sÆï¾(‰_Š;¦×00 ã–]oÎyÍ—•y{;å± ÙÜ*Äã1≨Ò°bˆ¢„×ëÇëñ^×5lÁosËq»þÜ E$Qúì¼ ]ÞÞêZ‘\æêóv¨Ó+aoy¶¹ˆÆ"$S dEÅ%ËȲŠiê¤ÓiÂ+|·Ï{í¥¨« ~A¬˜78ÚÍ©r3’m0¹™‚ÝÐîL.j‚ X†a3èº~Ýï†8Nÿ„Ž(ˆ¿dEÖ31óÿ ó( \4ú3óoݰ¼é]*H%QAÈ{ÛEA]ÿb…­$Šy7»sd8ÿŒ…ª~Q/SK~ƒ¹¢“}^}I®®¿ÃM›ë@×5‰’,ciBÁRºž&L"Ñ0n—gV9Wü‚ ‰FÙ·ÿm‹RUYy]G:ΞE%ª««¡ºªêšFO¹A‚(ŠL‡ÃD£1ª«*oYU¦ÍµÉ…}-ìЯ'tdáŒ_Æ'&عk7š®ãõxX±|¥%%×uÿþÆÆÇYÒÖö¹oY5°ÄÖ{[(ØU‡Jiqi>m4%›Íàt:I&“¤Ò©¿§iäí rmF9J,gýÚ5ȲLOo/““,[²ä²6dš&†iæEŸ…CGŽPTTDmMÍe÷Á™f^Õ/纺8|ô(·m4/hbñ¢EŸ:?š¦qa`ò²RG¾\FFFA€²ÒÒOuÝ|¹c•»`K~››„®hºæåÅi\ŠŒ®I(¢NÀ5…–õ‹è†~MÁÅžPN··óÃý˜wî¼x‚(æãçWþØÌÿÃGŽrüäIâñ8ÇOœ$“Íæ;üB ×(ßÿp§N·#Ëccãtœ9sÑhª ƒ*&…Ç ÿÛÜŒÓá¬cý.0>1qÕór³¿œðbÛG;ð¸Ý\à7¿û=Édò2CÀœf*÷']ç»ùø“hš>Kå\øYÓ´‹ƒ‘™ã¹c…i Ï)¼ˆ’ˆ$IH’„(‰¸]n|^ôöö2==(ˆ”—àt8‘D+½,Ëùss²tù1I’òFf…ùÁ4Ù¹{7ý_ÿ+GGEΜíä£?ÉkG µ$cããüú·¿#_Vv¹ò¿R™¦3M“í;>¡ãÌÙ|›,,—Âö^x\¬D§NŸf߃¨ªbi,˜m¸x#õ’Éd8~âccãüîÕ×BÎ÷ôÐÝÓ3ç»r£umïz²¹™ˆ¢€i¢B6CËŒà§Á˜Ä02¢ÃÒ¦ מà\q®iÇOžäîÍwq¾»‡p$‚¡ë¼÷á6Ò©’,sÿÖ{I&“ìÚ³—L:M(âþû¶"ÍëÙL†mÐÞq†šêj6oÚÈÛ?bhx˜šª*æÏçÕ7ÞÀïó1>1AeeñD‚={÷108HMu57¬ç“]»!Ò²`[î¹›£GqüäI~?ÞŸí“à@öìßÇ›o¿Ë÷'ÿŒeK—pìø þöþ§Ÿxœ‡|ðšáaóá¢1ñù|ÔÕÕF™Ù:×ÝÓËž}{Éf³¬Z±’Ö–fN·wpäØ1Eaó¦MV^D0iï8î={P…­÷ÜCqqo¼ý6ÃÃ#TVV²eóf¶íØA"‘ ²~íZ–,ncç®Ýt÷ôPS]ÍÖ-[pÌĽϯñc­ñnEQDÓ4T‡Š,Ë–EøÌLÝúh¢( EEE¨²JVÏ299‰ª¨ƒA0!‹Å¬g˜Y*Ð4 ÌËU㇃¦†FÞ}ÿæÕÕ!ŠÖ@\×u:ıã'¬öyï¶ïø˜×Þx“‘‘îÚ´‘ÞÞ>¶n¹‡p$¶vðìÓO32:ÊÙslX·Ž}û\lƒë×±s÷ÆÆÇq¹\¤RIQàèñãtw÷ðàý÷áp8fÕ]¡U¿aÔÖÔ0Þ< Ý`br’§œá‘~ù‹èºÎüyóadd”ÊÊŠk×KM5ׯàÀ¡C¼úú´wtðØÃ[%"cãã|¼sáp˜Ö–·-âíwß»F]ß3ûYì>Åæ&"Ë ‡“l6ÃT´–Á¡.Š‹R$“YŠJ—ÎÖ„B¾¶½ÑœCAchh˜-wo&ÎÐÓÓK4ãÀ¡C44ÌG×u^}ý zz{iï8ÃâÅmôõ÷óÁ¶myKçh,ÆÑã'8tä(‡aó]›X²x1§“¦ÆV­XÎC‡­@u5 ¶²¨µ…±±qN>͇Û?âlg'+W,çÔéÓ|üÉNN:,ˬYµŠ>þ„¾¾>^{ë-ü~­--·Åþï;… ëÖQYQÎùÛ¿ã׿û=ÿåoÿŽŠòrV¯\uÕó Ã@×õ‹ÂÍ4âwßãäéÓ$ ‡øÍï×룾®Ž|íuö<Ä«o¼A}}·›_ÿöwD£Q`:æw¯¾J  ™Lòú[oaš& óç³|Ù2>Ì¡#G8zü8•4ÌŸÏû~Hwwo¿ûuµµÔÕÖbbÎÊ›a pq¦>3{E×CIq ÅÅŸ]nÊÊË(**²4¢H(ÂåpÑÝÝÛé& …0tƒ3gÏž#˲uMyfÆ?³Ö<—æaͪ•TUVðÆÛï™YVèëïç·Þ¡®¶–®óçÙ±s'óêë(+-aõªUTUVr¾»›“§Osìø Þyï}:ÏcßþýÄcqvîÚÍ™ÎNV,[Ʃӧùè“O8qòét†E [‘$™#GŽòîûÐ0>²,_RwÖò„n\<¦ë:Ùlö¢Æ%›%sèÈjkj¨«©¡qþ|–/[z]õR_[K&“áðÑ£ø|>ÊËËX¾t)5ÕÕtïæÌÙ³¼úúÄb1Ú-âÃíÛ9rôG]£®ÍÙumYPÛØÜ<¾€¥½C"kV30æ#mÔ‘ÉJ¤ÓI|ÞÀu-G]QðŸjï ÿÂo½ó.Ã#Ã>z]× ,_º”ûîÝÂðÈÑXœŠŠrÖ®^Íúuk9ßÝC&“Í/ˆ¢HOo/555,_º”ƆùhšÆÙ³œ:ÝN<GEЋЍ¯­£®®I1L“žž^–,^ÌúµkY¸°•ó==ȲDSc [šq8¨ŠÊc?ÌÐÐ{öí'‘LÞ캱ÁšÙ–•–òçö§Ô×Õñó_>O}]þgJiiÉUgO— 5]7¨«­åßýÿæ_þ 0M>úøc‰Ö®aýÚµˆ’Èá#Gp9¬[³šõk×0žfzzA˜ššbhh˜¾¾>¢±N§‹D"ÁÙÎNN··O$ˆD"x\nšYÐØ€®qß½[8qêÇNœ “NϸƌqŸ|¹ª>ŽÐÝÓMOOÉT2¯Ë©ãYAQJJJˆD"¤ÓiúúûGÂ,Z¸ˆÒÒÒËTý‚(äUý— ~Qyè¸00ÀÁC‡€¡áÆÆÇèìê²¼ÿÉ ¥%%š›)-)aÑÂ…8x˜óÝÝlÞ´‰=ûöÓwá [[ééí¥ma+«W­¤¥¹™îî$Y¢µ¥™ÖæfDQäøÉSx<æ_–¯Ü»p™Ú|Fun ¬ïE¡Ë—.! pöÜ ÔËñd2DA¤¸¸ˆ€ßOcÃ|JJŠd*ÅàÐkV­díêU”•–ÒÓÛ‹Ç}ºÎdlU¿Í-…ª:ðyýDc1 SCUe’©8c£8NTU½®ë\&ø’©GçkO=ÉýÁøƒï~—®óÝLLN‹Å8ÓÙÉ®={©ª¬Äçó2>>ÎÉÓ§9|ôMxÜn:Ïc`pÓ4¨¯«ãìÌ9g;;éííã艴-ZH À4M<'Nž¤½£]×E‘–æ9z”¶mãä©Ó,jmÅÄ2r0LÓ0H$“¸].V­\NÇ™3\¸0€h¯õ߆1#üÿ„û?ÿüùŸý e¥¥×´Þ6ÌË…Äøäûä“»H¥Ó,nkÃïóñÁ¶í¼÷ᇈ‚À†ukI¥Ó|°m;lÿˆ²²2ÊÊʸ00ÀÄÄ$ÕÕUÔ×Õ±eófîÚ°žÁ!ŽŸ8ÉÂÖ~?º®£é:º®ÍÌôt¢Ñ(%%Å´67sàÐ!¦¦§/³EYºø'IŠªPQ^AeU%·'¿P*"™L‹ÅGÂŒ‘N§)-)EÓ4R©@I”f]7ç4èÒòÑtMÓ(.*âþ­÷râä)É$åeTVTв`÷o½—%‹Û%™l6Ë®={£mÑB:Ξ%‘LòÐ÷qôø10aþ¼z8rì8nßΩÓí´67c&š¦YË<üà$ ÞûpÙlóÁ?W~ ÃÀЭ?Ó¼hk¡é:ý.Ü`½fjjÝÐP…ýÒÛׇ®ë8Nêjkøx×n>ض±±qšÑ4í†ëÚÆæf’3˜Íd2”—U ë:Óá)úú{-ãÓë”}Òs_îßUUUár¹òÎd2$SIÖ¯]Cii)¥e¥˜¦‰"+:|„d*…×íæ‘‡"ްgß~Òé45UUl½w Á@ááaŠŠŠ¨ª¬díêU8.Ú;Î`‹Z[0M“ ƒÔÕÖÒ¶h!ÍM Ÿ˜ÄårQ^^ŽÏëcÃúu‚ÀÀÀK/fÝšÕ˜&ÔTWð[Á2ª««è8s–žÞ^–/]ʪ•+,æ6·¦iâv¹˜W_Óé¼bçiÍÌ’LNMRVR6ë|Ã4ˆÇD£1 Ódó¦´67S_[Çðè(™t†­[î¡©±‘ÊŠr.\ÀåtrÿÖ{)+-ejz×ÃÚU«èîíehx˜` ÀüyõhšÎ…Ajkjhn^@(¤®¦‡êÀápP\Tı'™œšbãºu456Ìj\š®1žÂår!J"‚h­÷g2&&&PUQ²¶¯E¢âñ8áp˜D"A"™ ŽàñxY‘I§ÓH’D<gbb—Ë… 3kö™LUUñz¼³Pº®S^^FQ(DqQÅ3moáÂVŠB!:ÏcrjвÒ**Êq»=ŒOLPUQIQQ—ÓIÛ¢…Ì««Ãép²tÉbÊË˨®ª‡†h[´ˆ•+–ƒÕ••øý~t]cAc#KÚÚ¬5ùŠ Eɯ‹O‡§q:8—×½”)Dyy9†a **uµ5ø¼•þõÔˆõV½ˆ‚HCÃ|ªª*§¸(D ৬´”Õ«VF­zܰŽMÔÕÞ@]k†aàq{nv³²¹CÉí¶¤a~#º®155ÅÄøU•Õx<^®æILÆÇÇ^zù%sõêÕ…Šf5LI’frEá\W¿|áEþâÏþ”âbKöñÎ:|„?ûgŒÓ霵 +÷ß0ŒY†O…Æ2…÷É}¾ô¼\Z]×çLŸûýÓø°¹5É©IÎ?Ç¢–E—ý–³Ý(œîïÏ+Ü#žÛÓ^Øy ‚eè—»N.mîÝ)Ü~(‰"zÁ»+ì“Ï]7“ÉÐÓßCQ°èâvA´¬5k÷x<Öýg‚ÖäÖßâñ8~¿Ÿl6K"‘@’%|^Ùl6¿üåóùPTeÖ¾ÿp$ŒÛ妲¬2¿§¬öZ¸ R–%L“¼ö¬p?»a3vB~·ƒ,I3¿É²r”‘Ñ1*Ê˘_ß„,+×Ý'Ü´E§Ã1ëXn¦ccóyq»øt/ôÕŸsàóEFpf1º]|õz¼])¬k››… øý~-\DkKë¬åM;:ŸÍm‹,Ëhº†,Ýú¯fN˜9–Jÿ‹çFû…ëâ·2º®£*êm/ôa¦®uÃ6¶¹%È úOëXJÎ9$ÑuÝÞ§jsÓËËœßçGÓ4’·‰?‡ÃAuU5‘H„X<ö…߯¨¨ÈòêÞòñáEQ¤¼´œt&M4½ÙÙùÌ8¼^ï-­e±¹³ø´ï¢ìt:Ÿg*<õ¥Ä·±™“KøÒ’RJŠKæ4κÉyés»Ü_¨q©‰‰(ˆy[šÛA‰¢µüá5½Û¾‘$é–×²ØØ\ryi9ÍÍÍ_X£´ŠÍõP‚¸mTªù€@‚ð¥ä9¿kà61¦Ío–oú¼žg±±¹Ý‘a&Öô ù“©$‘h]Óí8Ö6WÅépðòëä·c'ûeæùv+ŸÛ-¿66_e¾°iC&“attÔžñÛ\Ó©i²Ù,åeå7;+6666_i¾Á/étY–©¬¨´·ûÙ\“t:ÍÐÈÐ,oz66666Ÿ?_ØŒß4MÇý³ €(ÎxöÂä6ßícó¹Ñ}¨66666ŸŽ/ÎBH`–ðY? Mjô¥H¤un™šR.UÄ^ ¼3Á^²±±±ùøÂMƒçêÌÏôGxwïSãIDA£´ÄKQ©›»—SQäºÙebsÈ…›H¥RLNMÌøŒ7±ôCÖUU) [~ð¯r-Û˜ÌÆÆÆfnò‚ß4M²Ù¬­j&’Un{Ò¬(]3¾Â¯§cÍÍâ.Fëè‰òË×;îDKvãs¥>ë¢qárÞŠ%xîÞy<»ã¾ÃÈE°Óuá‘!Š‹KƒÌÞb2==ÍÐÈu5u—ÙŽ‚@2™$‘Hâv»p̸—6LésXF0Ms&X•œ_¦Èf³ù¶q%r¾õsyEMÓÈf³(ŠrM;˜œ§¾Â{‚@VÓвYdY·Ë\-[«bcc“üÑh”ÿç¿ý­¢S–ii^ÀâEmŒOŒ‰Dq8l¹{3. P\\”_»/î…ßEAÄŒY*\Ó„úéí$¨ óõï®eÉâVNœ>ÇË¿9@ib GªÜl]]g¯ùßaäÞL&ƒ®k”—•#ŠÂ¬¥A€²²r†G†ÉdÒ¸\î‚ßNnçíwßEÓu|>ßúúsLMMsâÔ)žxôE™öùÒ÷¶Ð—À¥Ÿsq°ÿòÿþkÖ¬ZÉ“?†(Šœ8uŠç_|‰?üÁ÷imnžz:w¾(Šœ9s–ƒGްvõ*FÇÆYØÒÂï_{ép˜ºšžxìQÜnwþÜÂó ÃàÕ×ß ¶¦†uk×䟡ý̶´ƒh,†Ûåbó]›Xºxq~pË{,çå_ÿ†GzˆªªÊËBgÛƒl›; .ΉßüúsTUV¢**áHEQ™œšÂår1::ÆO~þ ¶Üs7Ë—-Åëñ0>>N4£´´ÛÍôô4™l–H$Bqq¹ëhºÁ™s#dc1ÖÞ_ÃêU‹ñù¬X*²gßYú¦8×ëå¾5õØ“;‹œªß0 4MÃ4uærÞ' ë†1[X›¦É¶;(++ã‰Çejj¿ÏÇùîŽ?NSc~Ÿêª*dY&‰Åðû|8N"‘Á`]׉D¢…Èf³Äãq‚Á ‚  iƒCC¼ýÞû¬\±œ²ÒRÞzç]ººÎ“L$Ñuñ‰ t]§¸¨UUI$ Óqö,ƒƒƒâEaßtïæáïG,[˜ép˜‰‰IB¡ Á@€±ñqFGÇèý4EE!~ÿêë0sË{6ßÅÛ?â›Ï=ËØø8?ùÙ/ø_þíÿ‹Îsç8ÓÙɾûüWuU>Ÿ—í;>¦¶¦]×Yܶ]×ù`ÛvŽŸ8 Ô×ÖòÀ}[ùÝ«¯1==Ít8‚Ëåddd”c'N‹Å˜˜œdמ}ˆ¢@uU%o¿û>¦iEÝûÖןc:áw¯¾Š×ã¡§¯µkV矷ãÌY\.÷ß{/n·›šêj:Ξå𑣌Ž15="+(ªÂ·¿ñu$ID×5^ùÍoY¾l)+—/ç…—_aÓ†õ,[ºä¶¢cccsýÌZ”‡ÃËåB–2Ù ñxœ™¸š,_º”æ¦&¾þì×X¾t)²“H4BII ‡aphMÓX·z5Ï<ùD~M1÷'ËmMŤŒ,GN$i?3ÄÄd„#Ç/ÐÙmÔÔ–9DaÖyößðÇEµ³¦eó£.ýÓ4 MË^¶ûÃ4M¸o+Ï>ý$]ç{øÏó·?yh˜?Ÿú? ¥¹™ö3gØöÑjª«øÓ?þ#JKJ8züE¡‡¥½ã º¡süä ŽŸ:ESc#ªªæï#I"÷o½—®óçyëÝwyྭø|>FFGÙ»?O>þ?øîwh?s†·ß{ŸÑ±1þèŸü?ò0U%“IcË—.eIÛ"žxìtÝààá#t÷öPQQNWw7'Nf÷Þ½,liáOþ蟲¤­m–J>“ÉääæŒï·ËE*&“Ͳ~ÝZ¾÷o111A8œN' š9|ô½}}D¢jkklU¿ÍÆ,ã>¿ÏÇÖ-÷PWSƒ ŒŽ‚`­³f²ÖL\…||mMÓp¹\”–”ðô“OPZRø|^Ün7†aäcˆˆ‚ÀCw/âð‰ œ:5ÁúÛ#”y¹0<ÍT,†ËÙËÙ#ãL­j$ ÚÒDNø›XïU.Þü\é4MŸó·d2ICC üðG?æø‰“4/X€¢(¨ªŠËå$•J£iŠª¢* Š¢ÉfY¾l¿ýý?â÷yyæÉ'ØñÉ.•¶E gÝË0LÊËÊxî™§™Ghmnæ£?ÉϘUUEUTDQ$“É`š Îa„(I⌭ X‚N‡ŸÏÇ£=DSC纺¯`7þ<Þß¶3g;YÐÔÈ…:Ξ幧ŸfϾ}¸]nÜ.7Š¢æ 3™ ‹ÛÚØ»ÿo¾ý. óç²Û™ÍÇ,U¿¬X_¼¾ˆ"+”³mÇæÏ«§¾®Ž×Þ|€ ë×ñÖ;ïÒ×ßOQ(4=LB,µ(3êÔœ£¨* ñßÿ³­¼ðêŽâTÏ¥¥nJ#$Ç:éìPy奸gúÏm ä;ˆœU.Ö¼nèsvÉf³†n-  i¯¾ñ&ígðù¼ˆ¢Èº5«™Gòm$QÄép°fÕ*^{óMþîÂRé4Ï<ù$e¥VDÀPQˆµ«×ðö{ïS_WGqQÑE£U”™6²léRLÓ ™L!I••,Ó—ð›ßýY–˜?oÞ·•_ù ÿ𓟒±¼% I–‘$ yF¨+²ÂŠe˦··€ßêPÙ°n¿í5éîí¥mÑ"ÀÚ!Ð8>Þw¯½ù&.—‹d"Á†µkik[ľƒó»EÆét¢ª ¯¿ùðýïQYYÁ‡Û>âñGÿ?7»ÚmllnÂîÝ»ÍÖÖV²šÆøø8ÅEEùm|ñxœd2…Ëí¢¯¯Ÿòò2TUett”ââbü>ÃÃ#ŒOLø©¬¨`:Æãv£Öö£êªêËf‚ Lg “Jgñyœ™8?ûÉØñÑÔÔÔñ£Ÿþⶉ@fóÙ1 ƒ®ó]…Š8Ûy†t&‰$I³‚G XƒUq²°uѬ-p¦i299ÉèØ PQ^NQQˆx"A,£´¤„p$‚iš„‚AÆgTà¡Pˆ¢PÓ4ÇáPñûýŒŒŽârºüù{hºÎøØ8ÅÅÛˆišŒãóz‘…ááatÝ ²¢§ÓI8áÂÀЬðûq»-u¼Ãá Nãóz™‡)).f:fxx§ÓAuu5UephˆééiÜn¥%Åx½ÞYÏ<:6F4ÅãñPVZ†$‰Œãv»q:ŒÍ´é‰ÉIÂá0MìÚ³‡»÷ð?ü«yEÏš666_=A ££ã¢à7Ms–!^.QáçK·8åÎÉa¢ € Ž„EqNÁŸ#¿Úééiöî݃ßïgݺõöŒÿÂ0 Îu£´´]Ó žˆ_–ÎíöPUY5kÝ=Çì­£³·—†1ë·K·ó³|T\É_Å¥md®ó溎+-_äòwiþ ÛוòSX†`-©™3ésùÍ][Ó4~ü³_0¯¾–‡xÀ6ê³±¹ƒÈ þYSêK;ÂNæJŸ/=Ç0ͼ˕k¹a-ìÃLà ðÈ#Îy]›¯69U?&(ŠÂüù s¾;¦i^ñݘK0»ô¾4máu¯t¹Ž_í¼ëqvU˜¿«åéºó3GûÌ];“ÍR]]9³TaÏômlîD¾P]úø_¿Ô™ˆ=Û¿³¸ô]±~_ UåáÈk)lllî<¾0Á/IÒŒ#Óâ6×$“ÉÌÚbóÅ`C²±±ùB¿iš8N¢Ñ(½}½×ôCnc“Édðx<¶P²±±±ù‚ùÂfü¢(ÐuÝV)Ú\—ÓeYñÛïŠÍʾ_ÎÞ’gs]˜v°›/ƒ/\*۹ͭƒ=ÿŒäv¡Ý)XûÃov.lllll>-¶àÿ èL$tbi㎆¢ t‰„Üâg¿˜ÍMᚂ߶²¾2Û;|Ô­ɈæW{æo¢no.w± L¹#;· ö’™ÍçÅU¿®ëÄqÒéôÍÎç-‡)ªè7Y×XBÀs‡(NLèO²«+L© éLöfçè+ Xát=n{«£ÍçÃU%ÖÐÈÙl·Û°g¦iÐ;6I/À7–9‘îÍ· ÀPØÅ?èc:"àt8ov–¾òhºFx4LqQ1Á@ðfgÇÆÆæ+À¿¦i$ ª+«ç ˆr'# 0œLP.(ˆwˆÐ·pÈ%/^¿ ¿ÛV÷„å0ÓáiBÁ­ò·±±ùÌÌ)øA I£( ’$Ù~Ó/A!¥A‘WEš‰„v' YÀçRHià5î £Æ›ªªè}V„A›OËç«™LY’íŽfNâi€KBïœò1Uq;DRYÃ^üù’EQÉj¶M…Íg犪þL&cùØ7Á,˜ÓêºN&“ɇßUUõsõÎw¥8è`ElÓuEQòÇ4MG¸f<€L&c š¹‡CUóqÐMÓ¼¡gÐtM7ð9¥Y!ˆ à ›Í¢( ¢(¢ëz>¿¹Xè¹{Æ‚Ïuì¹¼Rxž"+ XÞÙlI’®èæ6wýT:>óܲ$ãp¨ùzY–¯[},–ªß­J$3iLS¹,D³¦é(Ê ³Y Ióç\Ϲ…ïɧè¨i™l6HÊ¡:E«Üt]Ï×Ó\˜¦I*•š9WÄ4 QÄép|îƒeQÁ´òëP¶ºßÆÆæ3qEi—ղȒŒa^F’$qàà!^{ë-ŠB!A`ë–-¬X¶4¿8ÀL'Zj :ì´‚  ë:CÃÔãt:óB1÷{Ç™³>z”o<÷,ªb m;>B‘¶Ü½yÖý/H?þù/ÃírSZRÌ=›7ÓÓÛƒËåâÂÀ O=þØLGÏì<ÏD3+¼fV7¯Cˉ Çù»ýˆgŸ~šMMìÙ··Þyÿá_ÿKBÁ ï¼÷>¢(òÄc066ÆÞýظ~=áH˜Úššü¦P¾óþû$Iž}æiëþÙ,Ï¿ø+—/gåŠå³Ê²0ßáp˜ÿ—ÿAPd…… [Y¶t £££L‡#¸œ~ðÁYÛrõ(ZuYYŠ¢€×!’Jj†Ža掋>z”×ß|‹?øÞ÷h˜Wo aV™>—išhšÆoÿñU–´µáñx¸páëÖ®¹|pTŸÂ÷Äårqìø –,^|Íû]|7E^{óMŽ=N àÇétòðÐ×ßOII1‡åÙ§ŸÂëõæÏ/|Ç£±/¼ü ““SLNMRRTLEE9Ï<ù~¿V®ö^Íu,VYÙØØØ|Væü¹™ªª¨èºž?.áH„ò²2¾ùì³Ö,É¡24¯ˆÇb$S)žñ%6mØÀ²%‹‘$‰‘Ñ1LÓ¤ª²‚D"Á¹óç9uê4e¥¥”——1=5¢*†A<gdl ÛMII‰%,°fJ‘H”Í7²¸m¢ `˜&ªªÇG7 ²©ÃÃóòŽD˜ššÂëñPTT„(Šd²:¢`âvHymˆiš¸ÜnYáø‰“Ì›7£ÇŽsº½³g;YµrÇNœàî»îbxd„t*M&›ÁívÑ~¦ƒß¿úßþæ7hin&›É0<2‚ªªÔÕÖ2=¦ëüyšŽŸ ²²‚` ÀèØñx€ÉÉIFÇÇ)).¦¸¨(__Ù¬F:æ¾÷=jª«QT…©©)œN'S=½¤\.KˆE£  áõz©(/`xlŒp8Lqq1E¡Pþš&tË Fu4M·Lý±4*GŽg|b’§NQ_WK*•"’Édp»Ü„BAâññDœl6KÀïÇår16>N,Ãçóæërl|œ©©)‚Á >¯—ѱ1Òé4¥¥¥$â ~ù‹ù÷D–e¬÷vrjŠT*E(ÂépÌ|O“N§¨¬¨ÀívçŸez:Ì¢ÖVîÛºLÕá`xd˜l&ËÈèYM#›Í2<2‚¦i”—•áp8+®ý3O>ÁÀÀ ¿ýÇWyòñÇüÄâqœ.0ãv»I&’¤3iLÓ¤¤¸EQH$ùwµ´¤Ó4™šš"‹  úýù²lÖVõÛØØ|væü–ÊVC@˜%øs òÑ'Ÿ (2«W®äÃí q»Ýœïéá›Ï~w¿M×­™éòeüãëo019IqQׯãõ7ßâÉÇG×5Þ|ç]Z››9×uMÓñ¸Ý¨•Ovî&QUYEÃüzFFFÙ»?‘h”ï»/?›ŠÅbüîÕ×I$â¤3îßz/­Í͘¦9óŸ—ÿíÿûÿ£ª²’šêjú.\Àëõræl'o¼õ6~¿ŸÞÞ>9Âää$wmܦIW×y>ضh4Æw¿ó­¼šxx˜Ÿ?ÿ+$I"«i|ÿ;ß¡¦º AˆÇ|¼s'E¡Ë–.%žˆsèÈQ\N'¢(Çùå /‹ÅH¥Ò<óÔ“H’Èó/¾DIq1Í ðÈCΚµÜ =šAV×gf©ããLMMñø#qâÔi¶Ü½™³¼þæÛ””“L&yâÑG9ßÝÍÑãÇñx<ˆ¢ÈÓO<ž  pêT;·‡÷>ü‡ªÒÒÜLScï¼ÿ‰DY–©¯«£ë|7š¦ãv¹Bb±8»÷îE–e\N'÷o½—_½ô2^‡D2IMu5ßxökùYµaœí:‡$‰~–-YÂá#ÇòƒCÓ0Ø»ÿ‡ŽAEª««yäÁòZ™â¢"RÉ.—“Ò’b~þ«xú‰Çñx<¼ò›ßòðƒðÚo¡¨ Éd’…­-lÞ¸‰×ßz‹xÜzW¼ï¾¼"0Þ<îÙ|×,m…$Kdµ¬­æ·±±ùÌÌiÜ—ü3êÍKÿTEÅïóáõxq9l½çn9ʇÛ?âþ{·‹ÇÙ½oÃ0Øà gÎv22:Êw¾ñužyò |>ÉT ]×Ð4d2Å–æÏã‰G¡mÑB*ÊÊXºd1åee´w´3=¦±a>ßþæ7Xµb;÷ì!5ã\¨«»›ã'O ™žžæð‘£ùÎ=§¢u9]x½^Ù¬F<žÈlFÇÆØ³o>Ï{÷ ‘LF) …XØÒŒ4³nŸÉdQ$§Z –Ÿ&‹.$™L²ã“øü>¸o+}ýýì?p€ªÊJ|^§“ï÷;¬]»†d2ÉÆuëhmiæOþéÒÔÐÀ¢…­¬^¹‚@ ÀÁÇIg2¬_¿Žý/þ‚šê*>Ùµ L뾦ë|7e¥eœëêât{{~y@’%EEE¸Ý.²Ù,‰Dª|Qälç9R©¿o}ý9Z[Zød÷n¦ÃaêjkùÁw¾ËåâÀ¡ÃyÕv:“!‹²{ï^46òƒï~‡ukV X±t)õµµôôöR Ñ8>O<úK·‘J¥˜˜œdç®]¬Yµ’ï}ë›$’I9š_ŽzøÁèíë'™Læß p:x½^\.ºaOÄ-•º±xœOvíBœq¢³ïÀ"Ñhþ|MÓÐtͲíÐ4|^/e¥¥;~‚Îs]8Nü>©tš-›7óÜ3OsòT;»÷îåøÉSßÕ£GI&“$Iª*+il˜?«½éºŽ$HdÒ[ðÛØØ|fæü¹Î .ªýu]ǘéè+++X¿v kW¯ÂårÁ̺ª®k3³g Qð¸Ý,i[ÄÝ›ïBÓ4t]ŸµýKÓt’©étÃÐÄ•¦–%«iìÙ·Ÿ#ÇŽáq»A¬|éF^àèš•ÏL:C*•B‘e<ׯgŲeù{꺎"+¬X¶”­[îaÑÂVLÓL Ó$“Í’L¦ð¸=VžïÚDqQÏ}í4Mç•ßþމÉILà •Õð9åüL5‡i𔕖RVVÆ?¾þ:ÍMM464 ‰ï}ð!K[ËUÅï÷ãPUÕ²WÐ ƒT:Í?¾ö:çºyƒ?3÷0tÓ´Òf2Ün7%%Å<÷Ì3,lm¹¸ýÒ¿ÏÇý[·òäãÑÒÜŒYàZ8“ÉN§QT•P0ÈC<ÀÆ ëYØÚÂþà{t÷ôðË_½@*•.xFð8LÃRõ†A"•¢½£ƒP0H4Áëõpôø tÝ@V\N'.§-›Å0 TEÁétâPU²Ù¬õÜ©4º®a¦e<šßB*pº£cFä È²µ¼"Xv(9ÃGkg" äŸÑ0 DQDUTUE´‚÷YZ,`ë=w³zåʼ¡dÎö ™Lan·›úº:yðTEÍ ãüÂÌՉɒ¶6Îtv²wÿ~¶´X¶ ¢µ$f9ÂÂ*ó‚wuÙÒ%Ì«¯ã©'£ïÂ^}ýMR©Ô¬¶'Š"©têf÷666_.Sõ dÒ™9÷ïë‚€(Šœ9{–ŸýòW¢ÀšU+9×užÅmm¼óÞ<ûÌS,Y¼˜ Ä œNÍM<ìæù—^¢²¢‚»6l ¬´„·Þ~UUò6ÕUU¼ÿÁ¶|§Æ% ‡ê@%FÇÇxù׿a|r’û·l!‹²}Ç'1oÞ<7Y–˜šš&žHÌhJ™ž384H}]ét†Áá!\N'ÕÕÕ8g Ðt]gl|œâ¢¢üÈx"1#\\ôöõQ^^Žª(\jª«0M“Þ¾>Lêëjñûý³žÏ4Möž8‡¨%º¤Òi¢±E¡¢(¢iáp„sçϳwÿî½çnÊgŒ1ßxûÆÇ'X·v5åee…BD¢QÆÇÇ ƒˆ‚€ßïg|b’éð4Å¡þ@€Á¡!´¬†×ë! ¢é:““Sþ|x<ž¼1_Q‘eÜ75=ßçÃ4M¢±¡`0¿‡‘$)o¹oSÓÓx=&&§0 ƒ²²RÆÆ'ˆ'â„‚Áü3æÈf5‘0¡`0¿öÿû×^GÓ5¾þÌ3Äâqþá'?eŲeÔÕÖP]U…Ãá žH0Zð®bš c•x=žYen˜‘h„úÚzKËfcccsƒ‚@GGÇÜ‚¿§¯‡l&‹ËéšóÄK·'YæmÏyË¥+ܾwñ˜µîâµ Ï›koö¥[£®–þÒ-Q…Ç/½î•Οëzpa2Îꥋ(ú®¸‡þÒí_—–Ë•>ÞÏ}©_„Âónä¹/åÔ¹>&'Æ(ö¹fÒƒa\L'Ë2ûäÄ©Süà;ßÎûIxíÍ·¬->’×È\ú,…Û8¯T—ÖÛ\çå¶æßMÀ¸Ê;äÓþv­²EÁZfbñ8¿zée¶Þs7-Í ˆD¢üô—ÏóôS_WwÙ3ßH™GãQ*+* ‚öZ¿Í “ü—é MÓZcÑvÕ;–01p:KÍ/WÞWû\˜þÒëå¸Vú+ ÉKÝèý ¿{ÝÆFµ9¥Q©(/ËlrÆ¢M ×µ5íÓ¾{—žw£Wù4wÍÝRÒé4- PYY‰¦éH²µóÅãñÌZfú4˜†iGÊ´±±ùÌä®sÏwN§ï|¿ÊhºŽK•‘EñŽñÑ?.UÁÔ³º~År¨(/§²¢bÖΊÀW÷Ýòy½l\¿.¿&/KkW¯Ê~V²Ù¬íFÛÆÆæ3!g³Y¢±h~&’ÉdH$(²åvöŽ–n—"@VÓðûýȲtGwÀ.§Š, Äq;ds!¹¢ø¼Û`µÍXÁíˆß磩¡éð´ý®|I˜XËB‰TâfgÅÆÆæÄ0 ¦§§¯¨QÍd3LŒM ›¦I}]=%Å%7;Ï6·‚ P]UMuUõÍΊ ÖN®îîî9ãzDãQÆFǬ5~ÛBØÆæÎA×õkF³¼¸]òióùpén0›'±Ô0‰ÆcLNN!Ë¥%%ù8#p•è|666_Mn—þí’O›ÏÃ0ìÞç€ ¤Ò)ºÎwç¹¥ÒiæÍ˧?åµmllnS óöØQq»äÓæóÁè}~d2c²„ô‚]EWŒÎO_Ü~$8Nt]ÇãõÅq¹\¨ªzÅkZ–p8œwªâv»q:¯îqLÓ4b1+<«d»%µ±ùB0Û£ƒ½R>3™ ±˜,ÉétâñxÉdÒD£1˜ ”­( >¯H$‚ÇãÉ÷UétšT*‰ßøÌ*åÏ£Ÿ ‡Ãd³rQ>MÀåtâÃkêWBGo—b±J&n·Çò™‘Iã÷ùí¥ë@×u åÌ)]“É$¿õ·$“I$IF–$š›[ G¦Ù¸~Û¶Àª•khhh¼âÆÆÆøíï(ŠH’DYY9›7ÝMIIé¬tƒCƒLOO±°uã|°í}yè1Š âÊÛØØ|>˜Ì¬bÞÒ»1®”Ïx<ÎÎ]ÓÛÛƒaTU×ðÈCr®ë|ø‡Ó4©¬¨âÞ{ïãÕ×~Ç–-[™W?€¾¾N·Ÿæá‡µæùiø¬ý¤a|¼ó#úûûÑ´,‚`õ•m‹sÏÝ[nv|é\IÃs¾û<‡`jz ÃÐY²xÁ`ööÓ<ñø“8ΛõÛŽ+L«­`6wmº›Úš:R©“S“ˆ¢D6›Í{l!SZZŠÏwѧ»aZë5<ü¦i²mÛt÷t£‘p·ÛM äĉc ‚i¹yM§Rôõ÷‰„)//Çår_ç£ØØØ\s¦ƒ5¹µ}\!Ÿ8¾‹ÍwÝCyEÙlY–Ñ4 ¿ÏÏ£>Ž"+È3~H2Ù̬­MÁPM˜¦ÉÀÀ+ºg6CIq)ªª06>FeE%ÑXŒT*e¹…6 ÊË+ÀårL^>[?)Š"÷Ü}/©d’Ov}ŒÇíaÍšu¤R)z{{¨®®±bƒ àt8H§ÓVTIA ¼¼§ÓÉäÔ$S““C!Š‹Šov­}¶*ŸCÃ311Á';wP_[Ï=woAÓ4Eatl”¬–Å4MFF†‰D"¸Ün*Ê­0££#˜¦IyEЬ0<1>kÖ/ŠÁ`ˆ`0HmMÅÅ%ÄbQâñS““D"šP•ûï{©©IœN'÷m}€áá!Îœí •Já¹$R™Í§çv1¢š+Ÿ%Å%<úÈã\èïçlçÞz»“G~ AP•ÊŠJ$I"æe~a4ŋ׵֒—/[Ûåæã;ˆD‚€( ‚uNSÓFÇFصû6n¸‹ùóæ_’£ÏÞOæ·`ÍœWYQEqQ1çÏŸÃápð,§a’ÄÝwo!JñÁ‡ïŘžš¢¾~½½=\¸p[ þ¹¼]J¢„®hsÆö°*¸(TD"ž`jj’~Š‹Kðùý”—Wàõúˆ'âøý~JKJ)**¾¢ÁÄU¿Éâ¶ÅÌ›×À©S'­P¼¢ˆ¡ëŒOŒ[†{’„ÛíaÉ’¥ü‚ÓMYaÍêµAÆÆF9pèU•Uø Ã@Q‰8ýý}3¦-–Ê_UUL؉âgccóyq»XËϕϡá!º»ÏS $“Ncš&’,QRRŠ,É(Š‚i˜˜†AÙlI”H¦’y#'$ eÆøNQ+$v_/“˜¦I*"âñx˜šž"™J^µô3ö“¹«Ì FÀêÿ-jã“#Ë2kV¯EQ4]gll”D"Žêpàóù•PU•… Q^^q³«ì³Õ÷Þæ*«ªp:œlÿh­­ 1M—Ë…$“ :Ïåð‘CTWÕà÷Ð4ââAäÌÙ4M£¾¾žyõóèêê"‰P^Vþ™í;nwæü¢(R\TŒ<ÃÀét q»ÝÔÕÍctt„ÖÖ…†Áèè0n©À­¢(ÏYy½^*++ Gˆ‚H  ®®žþ };~”yóæ[÷•$'Á`Q´Õü66Ÿ'·³ª?“NÓÓÛÍ©Ó'q:¬^½–òò âñ8²,³{Ï.LÓr«½ù®{Ñy®“s]çp84Ìo$*B–eBÁ‡eæsyY9ÍÍ-ttœFU­þ®¿¯Qyì‘'8rô0==Ý´¶,œÑ |ö~2‡ß˜å6½¶¦·ËE2•¢¶¦–X,†¦e9yêÕÁúµ(/¯@›\¨ŠJSÓ‚›]eŸ­¾gŒ9 øl½÷~ÚÏž½»Ö–…4ÌoÀï÷3>>FYY‘HIñûýŒŽŽ008@QQ LNNp¾û<ªªÒÒÒŠRP_w*ÂK¯¼dn½w+¥—¬[iš†$Iy5Y.š,ËùHc²,£ë:ÉTEVp8³BÆjš†,˳„¿¦id2–AŽ$‰H’Œ®k†µíÏ0 dIÆ4ͼC‡;]-ccóyaš&Óái‚à-Ý®®”Ï\¿’ÍfóšA ú9‡( H’<+² €(J–v@’ÐuQó‘%Éú-g@WH΀0÷¹0/Ÿ¥ŸÌ‘ [³gÊd2¼ñæk³åž{àÝ÷ßæá¥´´,Ÿ]×I¥’‚ˆÓé¼lYãvb:<×ã3Š®ëd2A@Q,ÃÍ‹Ñ.M2ë}ÈÕ§aè‚8«@‘¿ÚB_Ó4zzz˜˜˜ääéÓùw_UU–/]B&›á\×¹¹gü¹Â-DÅüKUøY–e|sì9ë¹ô—V¬$Éäì÷$¤üù·óKlcs«r;¯ñçú•¹ú§¹öË_mvWØå>_­ß¹´ßú<úÉ+]{xdˆ©é)Ö¯ßXK^‡Ã1+­$Ix<Þ/´¾,®ö^J’„Ë5ÛÌìúS.KŸ£°l,ìÒ°±¹Ã¸Uýw n·‡»7ßCyY9EEÅl½÷~üsØ|U˜KÕoóÅ ·´ÊÏÆÆæóC„|xß[™Û%Ÿ_%Å%³"¦*ŠBñW<‚ªiÞÚN¥n®·½È±X EQá*£­õ÷a§·ÓÛéo½ô¦i’H&™O_µ“¸Ùù¿4Ÿ7;?_vúåVËÿ§IŸL&Y¾¶A÷­˜ÿ›^À²U¹ž¥<Ù0L~¶{MÎâRâiŸS"‘1EI„dÖÀ눥u\Šˆn€f˜¸U‘hÊNo§·Óß~é“·X~®”>u‹åÇNÿŦOÞbù¹}Ò'³nžnµ Y¯†ôµçžûw'K˜Ö½’B÷¤‰¤8ˆ@B—I ¦AVôLš˜’ÊdJd™ŠÀµ½.åÒ.(w\sä# Pæ—QeaV~ æ—:xfe‡,¢\áyë‹T* † YäÉå!ê‹TVÔ¹yfEˆ{[|øo lmllæ¦&¤ò|ö¶d.EdQ• U¾žùÝA·í>üfašPì•i,s H­U—÷Ç%^™ >VÖ{º%Z+?ŒºŽdéM! Öš¾,ËùPn·k¶S#˜Nh †³×´K(VžZB‘„‹#0óâˆ,ÿŸ‹#0ÃQ„G—h(qä™—ÌŒsçÓ “Õó#¶XTéšÙ–hÛØè¥±ÌAV7 ¸$l à…Yí<7„‹}A±Gâ©å!¼Ž¹…}n˜´T8i*wÒVíbÕ<Ú´…çÞ·°Êõq\徆9ûz¹Ùkî»Y®&¤²¥Å—ïãrÇ ûÒÂþÖ0¹¬¬æ"W¶Ú§QÑ~ÊÝ4i.wrÿB?‡È“Ë‚{å|™ª²À3+C,«u±¬ÖͼO,·Òæårº¶‰a~5´† En™êŠaš¸\Nêjjðù|„‚Ajª«g ~ÙÄI¹D•Ž¡äu ÿær'cQeµnÎ §il˜ïa2®ÑZéÂçéJÑ5šf]ƒUèK3Ó¸dÎŽ¤h©p±ªÞM2cðIg”…•.K„“:;ÎFÁ„M^B™ÝqTI`y­ŸSb4še{G§"pW“‡"p 'NïxCd^‰ƒ÷O…© (lhô¢H;;£ÄÒw-ðâsJ¤²zâÄÒ‹«Ý<¹š+œœN1ÉòôÊ“qíQÊ|2. RPø°=’׺‘I:GRÔ©lhôRê“ñ¹Ä9›¤(ÀÊz7Íå.²ºÁÙá4©¬IÐ-ñà"?>§D‘[bÇÙ(íâLj‹T–Ö¸PeÍ0iLÒ5–æ¾…~ú&ÒôL¤ÙÜä£c(ÉhD›ÕßJ¢ÀŠ7 + G²ìêŒR°®—ÑMtÇq©"+ëܸU‘TÖdwW”Û,«uSä‘ù =‚Ï)±¾ÁCF3Ùu.†n˜ljòâR-íåÇg£,¯uóIJ•…NG¸0•ÉçÅ0a~‰:«ltÇ>Õí§Å0-íð¦&/’hõï&¸KÒ.©q³¢Î͉$ͰêÅÌiw65ù(õÉœLrz Im±Êªz&°§+ÆÈuN|oU ¥Ä-Q„(ŠTT”SVVšÿ^ˆ(S Áéë{pUXPîäÔ`‚ŠÁZ擹kå‡z"¦1×ytI€…•N¶´øÐ ˆ$u”9™Škˆ<¹,ÈDL£o2CV7Ie z'3,ªr±y‡(õ)œNKë˜@"cpz0ÉêyšË<²8H™_FžY©TUdÆ¢O­ašÐ5š&«›<¼8@È-Ó?™aí|/~•Õó<ÄRCá,Ó RŸXh"¦áE”;93œ$«›€$‚n@×hŠ3#) ÓD"IE¸¬ÀBw·ø˜_ê`ÇÙ(Æí ÕÆæ–f2¡Ñ5šæþE~œŠH$©3Õ‹f™JèÄ3¦2¤²›š|TÒšÉ3+B4•9yrydÖ }(•oÏ…&´Vº¸»ÙÏù±å~…¶j ÊÔ«L'tÂI¡pö2Ahš&5!•M |L'5ÜªÈæfUA…§WÙØäe^±ƒõ 4½À<{æ¾ÍåNîmõÑ3‘f8œ¥Ä«ðìªP^›ñÌÊ Ê¬™ï¡o2Cs…“eµn&âє΅© ªdõ…‚ PîWò}ÞÝÍ~&âÖžï{[ý³Ê*‘5fåEÀêk£)«lÇ£Ù›2g1MfÊÙäÉåA|ιµ3NèDS&3,(wPîW¬´&lZàcI‹hJçÉeAjŠT[¤Ü¯Xÿ&<Û玚n’ÎZFú¹‚ºRœÙÄIkŠD$©]Uø›&T<ªDÇPŠ©¸ÎcKƒÈ’@ÿd†ñ¨ÆâjE™€KÆï’i|Ò%–Òy¨-@ûP’Ê JF7ÙÞ!«›(’€[i,uX3öbn‡È¯Nrn$ÀšyºÇÓêM°²ÞCE@¡©ÌAF7ñ: k-^YXé¤w"ƒS±fÛ/ì›`:®òÈÌ/uðë“ ‡³lhôÎ<“ÉÀT†±X–£ýqú&3,÷º1 k0’{ÞÎÑ4‚`©Å2ºÉÛ'¦éH“Êt¥ÑtK•–ѬÎÄ©´”;y÷d˜Þ‰4âí<œ´±¹Ð 83”âH_‚ M^’k°~f8Eû`’Œf2Ͳ¿;N,­c˜&§’ì=§¶HeÍ|^‡ÄŽ3QܪÈêyVÜKö”9œÎ°û\Œb¯l ¢I鄎'!q¤/" ³Î5“þÉ ;ÎD)÷+|w}1}tޤ ydÖ5zé™È0•Ðó3Òü}ËôMføxFÓ¸¾Á‹n˜¼:‚ß%ñÏ·”1׸0•awŒÚ"§"Ò;ž¦6¤²oæ9畨ˆyûA€É¸ÆÁžYÍ ­ÊEÿT&_Vá¤~™Br,ª14¥c8EÇp Eúrû/A°&X5!•"L‘[Æ¥XK­¨ëM,Á?Í2×8=”¤¦èb°&YXPæ Ø+“Ѩ²ˆ$莳¡ÑKK…“þÉô—úl_¦ ·LE@Ä03×L/_Ç5/^kT:ËIê$2ºiro«ÿüþmÕ.KlëˆPWä@¬µn(òÈ{eºÆÒ8d‘ KbY­‡‘HØÚêgÇÙ(YÄ0L4ÃdU½Ý0™Nèùk‰‚¥¦ÈhÑ,±´ÁÑþšf­ƒ5”:ø¨#ÊTÂÒ¬™ç¡sÄÒ„:뼿ÀëQòëb‹*]L%t&ㆠ~—Ä‚™çŒkÔ«TUöuÇHk&Gû`Z ,añ´( …³–&å«1¦´±¹©äÚ¾Pð?£™4•987꘱ÛX\í¢}fÙ²Ø+Ó\îÄç9Ч:¨°ªÞC2£ãRETY µÒ‰"Y­4’ÔjÜÛêgqµ‹r¿B"cµgS„DJ§¹ÜIs…“áp–º"yæÜðŒÆO,µýh$K4¥³¥ÅÇwŒ²©ÉÇÆF/ÿuÛ²(ÐXæÈŸILÄ466ùXTå"’Ô‹j8k€tÉ„“:Ñ”Ne@A¬óDÒºµ ±¸ÚÅxLc$¢qv$Eïd†x*×w‚(XÑ4Ý*«%Õ.N $ñ;¥¼á¤aÀ…© Ý*Ûóc*Cáì—º«A,[-·*râB‚2ŸÝ€ŸLy@Á!‹Ì/u0É’ž™lÉ¢—&&ª$PW¤2×Å,wZš×ɸ5ÁÝq&ÂÓ+B¬¨÷Ð?5}[÷Ò¢`mçËfàÁúk§—ž}î¹w>UÌtF%3³—ÿJ8ûÛëOÐ?•Řq˜Ìšì銑ÈT…T*ü #‘,]£i2ºÉÙ‘4Kj\øœ;Ïŧ4tÃde½‡RŸÂù±4&ÐTæ$­Yj¸C½qZ*´T8™Nè$³±´Î…©,~—DÿT–Óƒ)ËœyãYi©pòa{„HÊRÉ-¯uS_â *KÇp’ær' ÊœTUöÄÑ “Α4“q¦r'SqþÉ ‹*È¢@K¹‹ãôMd¨+v0¿ÄÁ™áÔ¬Ñqn´¼vfF±ó\ Y´: ¾‰ ±´q[¯ÙØÜ ÝÃá,q¿KâÜXšÑH–†R'šnÙÚ‚ÀüƒÓYUZ‘2¿Ì¡Þ{L',ƒÛŸÂpX£o2Íæ~KÔ9p©"‡zãÈ¢ÀÒZóŠŒF³ôN¤‰$uÚ‡RTU\ŠÈxTcKËÅsŠÈHÔDÝã4tRšÉÞ®iÍ ™5Ù>ŽC¹oaà²û:d•õܪÄÉ$Sq¶*Š$ðÞ©ñ´ŽaB÷xSb:¡sv$EÀ-QPèN1ɲ¨ÊE]‘J8¥3Óp("£iI@7LÚ‡Rˆ3e50•¥©ÜÁÊ:uE*ƒ SY¦3ù²½0uíYä牉å_¦¡Ô‰Ï%Ñ7™áô`ŠÊ ‚fÀdL£®HåìhštÖD|N‘î1ëû&¬ò¯-RÙy.JÀ%ÑZaíâ˜Ê²¤ÆÍÒZ71ÝçbDSúmÝG&TUæ—¨Ì÷epͱN2ÙÌEÏ}§Í6’BŽáä,4—¢Ì¬ï÷N¤‰¥Œ¼× ë¢VeÉ‚_oÈKDÁ2Ô€Þ‰Lþ÷ÑÉÕ—D óYÞ¼žsMK=m˜-÷/=7ßÿÍœSØæ®!ŠÖsèÆìò*ÌŸyy),Û/PD«,tÃÊ‹TP¢(ÌòÅ0«¬°œÔˆ3ò¬w"·;BÀ*gmf·ÃíÞO綨–xþpi† ór[rAˆÅc=÷MÆ4Ʋ™kŽx²ºÉÉK…v%OBúÌÂKþøÌÿ¾‰Ì¬ôBÁKYxýü)3˜«´Â¬]ê±H7¬F=Ó‹j³îaÌŒLËœ¬oðpIïO0ÓòYÏ!@ûPŠHÒ {<6sýKóQ˜ôlz'2¯ùeÕºÍÀ¬>`Žv{é÷tÖ$­™dtsV;7̹ÏKxx÷/òSî·¦MGû–š|®Œ\+Ÿ„ë9W˜íXH®p+”Gî³µî ¿ÏqìJy¹™ôÿ;r\ê€éÒ>:·Q˜#}N£pi9Þ¶˜àTD¼Ạ1ek-[õªt&gù.ºš&— ə߯–Þ˜ù­ð÷ëI£×L@œ;=@ßDšhÊ2ú™ˆjy~izHf ÎZ†…âuä'«›œN}êò±ÓÛéíôŸ_zÃ4ùÝá)RY#?ÿ®ë‰¬µÅØ©ˆ„:‘”Ž(ÞÚÏk§·Ó+’€S¹>1Ò³Ï=÷ﺒÅLeTܪHK¹“pJgQ• Ý´œTURY“ÅÕnbiƒy%< Ih¾Ò·Tº˜ÊPìUp«ò5Ò/©¹±ëßhú[­|ìôvú¯JúdƤ©ÌÉTBgþ ^¿¾Ø² ¥¬{EnƒçµÓßÙéÛª,ÃαH†u&Î9Ìög­ñ¿øòK¦XµœEÈ¢µþ¥éÖú»>³½3§–—%ë7I¼¸•ÂNo§·ÓÛéíôvz;ýML/‚f€„N£kY¸ÜqÌì5~î_䧨(t]*›[ÓÐèêš"«]Ýcœ—ÙÙØØØØØØÜ^èÆåÖüsaÇŽ±±±±±±¹ƒ°ÿWÃ0Èd2˜7àb+NßPz›Û›O%øu]g`pˆtæÆ½9MNN299uÃçEc1‘Èu§™3ß±Xì3 º‘ÑQ"ÑègºÆ¥LMM“H$òßMÓ$‹¡ëúu_£·¯_½ô©TêŠu419I8 ‘Hðâ+¿f`pÃ0èê:χÛ?âØ‰¤Ó·¿ÿj›¯—¶‘ÏB&“ephMÓ®+}2•"•JÝì"¸£‰ÅbŒŽ¡é:CCÃd.éÛâñ8çÎÑÛÛG2™œ3ŧüƒƒü·þ=±hì†Î3M“^~…}ößð=?Úñ1ï¼÷þu¥}ïƒyí7/;>>1Áëo¾ÅÈè(»öì¹îF)¿zñeö8ø©Î½¯üö·:r4ÿ=•JñÚ›o16>~]盦ɶv‡ƒÁ!þÛ˜òÙl–}ð£ŸþŒ_¼ð"Æét"K;>Ù‰atœ=ËÙÎN~õâK¼ûþ¶&Àæ–âÒ6päØ1ú/\ ³s÷õµë±ñ1þî~ÄôôôuÝ{ÿƒ<|˜s]]œ:Ý~³‹b##£ì?xcýQ,ví²*,Û[ÃGñâ˯‰Døá~ÌàÐPþ7MÓxáåWxþÅ—yáå—9~ò$ÿãŸÌJcs‘ Ò“£ãÌYü>/Ý==ˆ’HÀïçt{>Ÿ—®óç‰Fc´¶4S]UÅ©Óí$S)jª«‚ ñØ#344̱ÇQU•5«Vq¾§‡îŠX³j%‚ røèQ&&&Xºd1ÑXŒcÇ# U••¬]³šl6ËÁÃGH¥’¬X¾œÒ’Ré4íÜ{ÏÝ„Ã:„¦i„BAêëê(--aï¾ýüî_ehx˜•Ë—‡i[´ˆd*EGÇV®XN4ãÂÀš››9uêÃ#£´-ZȼúzR©»öì!±tñbæÏŸU>¦ ]]]´Ÿ9Cii KÚÚ8v⣣cÔÖÔ°|ÙR¢±‡!N³jåJ&'§ØµgÃÃô´4³ ±‘ò²2Òé {öí#µfÿëÖ®¡(¢óÜ9ΜíÄét2^=ÅEÅœíìäûßù¢(Òqæ E¡¡`0Ÿ¯S§Nóλï!Š"ÅE!V._ÎêU«øÉÏÁ#=È#=ˆ(мøÊ+œïéÁ0 $IºÙï¨ `i«rmdak Á`Ÿýâ—T”WððC0<< /¿ÂÐð0›7m$26>N*™bak+••LLNràà!úúû™šº²æqvûšG($‰ðÒ+¿a:<Í3O=ÉÚÕ«Q”ÙNÑGÇÆè:žd2…"Ë466PUYÉ‘£Ç(//£²¢‚ã'NPW[K(4{'•ištu·ú’V­\A8æT{ªª°lÉâ‰gΜ%‰àñxX¾l)o¾ó{öícz:ÌÆ ëɤ3:|EUY½j%püÄI¢3ĵkVsðÐažñ%††‡¹û®M”—•ÍÊËàà?ýÅ/©,¯à‘‡dé’%]IŒŒŽrèÈLÃ`ù²e˜¦¦i˜¦IVËΚ˜œ:}š?ÙÉÆ ë)).Æëñ’ÉZi4MãèñãŒôáã?qÓ4Y±|9E¡;kWÛ ~]×9vâK—,aßôõ÷sצ¼ðòË<õøãŒŒXjð»wóÔó“Ÿý‚U+W Âïóâv¹ùÑOFYY)ååd5Á¡!âñ8ŸìÚE,%‘HröÜ946’L¦€hÔRÓ¿øë_ø9yºÞ¾>Ú×çµ" "»öìeûG;¨«³úð?ù£Êo~÷{"Ñ( [[‡Ã¶à¿Ã##LLL²bù2JŠ‹yëÝw(/+£¥¥™Ññ1Æ'&etlŒ²ò2¾õ¯ ùo?ü{·µÑÝÛƒaüá¾,˘¦IyiCCäRiŽ?A<çûßý6­--9zŒåË–òì3OÓÕÝ͹óçÙપ’J¥%•Lrêt;uµµ$’Izz{ù·ÿÓÿH4ãüùn¬À"Ë—-åÌÙNž{æi‚Á G››Ù³o?étšMMìÝ·¾þ~¶Þ»…]{ö2::†Ë墷¯ÉÉ)TEeõÊ•øî¿eK—ÞìwÓÆf²,Ïj#€Ÿ–æf–,ncÓ†õt÷ô²wÿ¾þì×ðû}˜¦É¦ ؼi#ÿçü+>ض¡áaþçÿá¿'™LÒyîÜœËY‡™Ý¾" Ó¤¸¸ˆÒÒR¢Ñ(<øàœy4Mhl˜Ï÷¿ûz{{ùéÏÉ®Ý{¨ª¬d`p€»vS]UEEyùeç>z”úºº|¿±{ï^Réø?`jjŠ¿ü¿ÿÕá ©±‘o<û5b±Óá0+W,c|b‚o<û5zûú8|ô(  G¢¤ÒiV­\AYii¾9zì8÷ܽ™y»çñõ¯=C°@+˜c^}-ÍÍ,]ÒÆÆ ëoJ}ƒATU%›ÍÒÛ×GcÃ|AÌ ÿÂA@Sc#µµ5Ü¿õ^¢Ñ(æŒ;vM˲ÿàAFÇÆp¹­><Ž0o^=FËjø¼Þ›ò|7“ü§O·S\¢¬´ŸÏÇko¾Éï_{¿øçơÇٳw?ø§;:¬µi"Š"Óá0xôá‡H&“„Ãzzû(-)&™JñÒ+¿fË=wS_W‹ ¨ªJç¹.ÊËËq9˜¦™ÿ«‚TUU°rù EAUUNž:ÍæM üd³ígp»Ý–jÝ0D‰L&Co_‡ƒ5«VñýÕ_QYQÁ·¿ùuþÛÿžŠò Ú.âø‰“ÔÖÖpß½[xྭÔÖT“Íf™œš¢ÿ¦¦¦¨Ý¼™ ëÖæËèíwßã\×y†‡Gp»]ô_¸À«¯¿ÉSO<ÎÙÎs¨ªŠ®ëtv§¹©—Û}Éó ˜¦‰a‚`™dü~N>ÍàБƒÇP0ˆ($âqN·wP\¢¼¼œÑ±1ÆÇ'XØÚBqQ÷oÝŠ ˆ(ŠUõÙã·Û‰IÛ¢…,]²øf¿—66—ašÆ%m$IdphˆÉ©)DQ “IÓÛk H¥SLLN’J¦¨¬(§ã̺ºÎ£ª*étMÓ¶ŒhMpºœø|>Nδ¯h$2éÓÀ0Dª<3±±fÍ“èÆÅsu]ŸñŸnPS]ËåâÕ×ßàÿàûìܵ›wÞÿ€?ÿ³?Å0 FGÇfëq{8s¶3ßoüR©]]癘˜Àårâv»fú«_5 Y’‰F£ôõ÷#‰¡`ˆ¶¶EÔ×ÖYBM˜‰ö‡Õ‡˜X Â>0•J‹'‘P(ˆ(‰  319IQ(tÅÙöS×&o¾ý6SSÓ,]º„þ €@8fz:L&“adtŒšêêüäÑ0 ÝÀÐuË=m&Ëøø·;߇?xßVª««üTWUñË_½ˆ$I|ýÙ¯Ýì×ûKEzîëÏý»ùóçãq{®™8“Éòê믳tÉ45¢* Éd’X<Î3O=…œnï`dd§ÓÉ–Òé4+W,çäÉS ñȃR\\Ìôô4lÛFOoM ŒOLp®ë<™l†¶… Y·v5Û?þ˜#Gá÷ù1MUUhiiá|w óçÓ¶h‡Ž¥ëüù™Ù«Äþƒ‡xêñÇ())A–eÞÿp'N"ްaý:¦§¦Y·v ‘H„CGŽÐ0µ55œë:Ï–îÚ´‘3g;Yºd +–/£¬´”ŽŽ3tœ9C"™¤¹y. Ðyî‡eAS÷o½wÖZ_iI1çºÎ³ã“O˜œœ¤©±‘îÞ^úû/ °~ÝZêëêxïý8ÝÑAUE%ÓÓaª*+©¨(§»§›ææf&''™W_O"‘`ÅòåD¢ÖþÁû¶ÒÝÓËÎÝ»ioo§ºªŠ»6näàá#8NŽ=Æ’Å‹YÐÔĉS§Ø¹{7«W¯B$IB’.Út:|„¡á!¼ÿ>²Ù,nÛNó‚üþ›ýnÚØÌ¢ëüyk¶\QÎùîn–,n# ²{ï^$QbÑÂVÆÆÇ9|äõuu;q‚ÃGŽr¶³“Ö–yèAdYá½?¤«»·ÛMkK3/ÿú·ìÙ»ƒ‡399ÉæM›¸00À'»vsº½šêjÊJËð¸Ý,YÜÆá£G™šž¦¢¼œ_½øRþÜ©é)Š‹‹Ð4eK–ä‘h„§Ÿx]7ˆ'â<þè#¤Ó~úË_κï¦èíëcÇ'Ÿ019ÉÚ5«‘;w28<Ì“=Šßï'O°lÉñz½,]º„³œ=×ɪË 8xÞ¾~‚Á¥¥%  ±rÅ «I%Y»z5£cc:r”yõõì?x×ß|“ÃGròÔiêëj)-)a÷Þ½ˆ¢HSc×*øâ±8§ÚÛ™šš& ²rÅrŽ?( (ŠÂ©öv–.^‚Ëå"«iœïé¡mÑBÆ'&iœ?Ÿx"ÎéŽîÛ²…¾¾>::ÎL&©¯«ã£?a߸\Nî¾ke—Ø8Ü®†Áôô4†1·ËÞ¼¯þ—^yÉÜzïVJKJ¯yÑt:ÍÇ;w²bÙrJJŠó72 Y¶f±X Ý0p»\ÖˆÔ4‘d™ãÇ£é:«V¬¬]4CD<7š¦‹Åp¹\(Š‚$I$S)2é4'ÿÒI’„¦iˆ¢ˆ(ФÒiÒ©4.—“Á¡!zûú¸û®»k ;‘Lrìøq^{ãMþ—ÿ÷¿Åáp È2º®“ÍfQUQÑ4Qf>_¼>XªúD"ÃáÀáp ë:™lMÓðz<ùt…䶪ªŠËåÊoò¸ÝȲŒ(ŠÄãqtÝÀã±fü¹{æîoFþ¿$IùQ­,Ëd2Ëà—ÏS^VÊ·¿ñ ÞÿðC9ÊÒÅm¬]³†’âbt]G7 ÔKŒrõù×ÿå¿Ò¶h?úˆe4“Íæógcs+QØ.5MC’$A N#Š"Š¢äÛµ(IüÇÿô×,ikã®ùw:cš&‡I’Hç|_Ìhrêå‹í«ŒoÌÌ%IÊo“eù²ss³Ï\XØ?~6M“T*ÉÅss}Ka¿J§UUg]#·Õ7×'jºŽCUD"¦i¸Ýnëw]G¾¤)ì5MCÓô|tRUU­²)(Û/Ó4‰D¢VÙÌì@Š'È’„(ФÓ¼^O^Cš{F]×óïH.¦i³úðL&C,Çåráž)篚¦ÑÝÝ=çnY¾úo䢇ƒî»oÖ±B à½ÂzÉ¥kÆ‚ à÷ùòßE¹ÌÊÕåtâr:/»V®Q8œóêë™W_Ÿÿmßþ´Ÿ9CÿV­XÇíž5€(4^“eiÎëçòfý~išK‘$iÖ9s=‹Ç3·–%wí\¹æþ ‚50 G"|ðá6ÆÆ'ϯ7®^µ §Óɺ5kPUuÎç,Ä4MÖ®YÊåËò×Ïgcs«QØæ ?;fÚ?\|ßu]G|>ßeýÊ¥íîÒv9Wû*lC…md®þ©Âþ±ð³ ¸\—Ÿ{i¿äû·K¯1»ÿšÝ'¹ÝîY×Pf~Ëõ!…e•{¦¹š~aÙ~Ù‚@ 0[óè-¨»Âz!ÿŒ¹r°žÉJsižÜ©ÜÐŒÿvc`p¾¾~¼^/Í š¾2Éd8×ÕÅôt˜ÚÚjkjnv–lln)LÓ¤»§—`0pÃÛvû²¹]ùBfü·ÕUUTWUÝìl|ʢ… ?û…ll¾¢‚@ÃüyŸê\»}Ù|Õ±rmlllllî lÁocccccsa ~›;[ðÛØØØØØÜAØ‚ßÆÆÆÆÆæ↭ú3™ ét¯×›ßŸs}ép8I§Óy·’“$SIB¡Þ'<±XŒÉÉ)\n¡`I’H$“8gœ*˜¦™ßƒšÉfÑ5-ïÈ"NŽD¯×‹³`m2™$™Lb˜&¢ âóyÑ4-ï,C×õüut]'¢ë:&Ö^ÜÜÞ^Ó4‰F£d³¢$âõxóîm5M#•Jáv»óûé³ÙlÞQ‘ Äãq2™, Vľ©©iFFGh^°ÀvŠccóHg2H¢xM׃a$S)\NçUÛe:“Á4ŒY}ÍÍ!;ã4Íét’L&ó˜räúõ\¦t:}Y‹rÙ °}ÇÇüûÿð—´¶´PZZB&›åoþö‡|´cU••üâùçYÒÖÆ‡Û?â•ßþ–ã'NÒÝÓÃ’¶6úúûùá~Ìá£Ç8pèU••¸ÝnþæoÿŽêªjÞxó-^xå׬^µ·ÛÍ®={øpÛvV­\A_??þÙÏÙñÉNö<ÈðÈ­­-È3•úË^äçÏÿŠ'OrìøqêëëùÇ×^'›ÍÒÓ×Ç'»v²|Ù2A ó\ÿëÿþpìÄIöíßn464 Óá0ÿëÿö¿³{ï^öî;@o_-ÍͨªÊ'»vóýÕ_ÑÚÜBqqÏ¿ð¯¿õ6¯üú7:|„ÎÎNúúûé:žÕ+W"§ÚOóÆ[o³níšÏ¥Ã²±¹Syå7¿%“ÍÌÚ¢ÛÓÛ›÷šJ§é:ÞŠ[qAöÈè(?þéÏXÔÚšŸÌÅnãȱc,ik»Ùÿ…‡¼!_×SÎ…õòyqàÐ!>ضƆùüðG?¡¾®6ïZ\×u^}ý ~÷Úë>zŸ×˯÷;ê ÒÜ \¯ËÞ–D©TŠ ƒƒ¼þæ›455râäIvíÙC}]-™LšÉÉIâ‰Ûw|ÌCÜÏÆõëˆÆb8<ü›õ$“I|>†®319I6›!™JqîÜ9þñµ×øÃü j2‹óÓ_ü’ùóæñO~ðý¼KJ¥@Æãq6¬_ÇÓO<‚€ÛåbjjŠd2I:“a:ɧM§Ó„‚AþâŸÿ)n·‡ª"ͼÀ–ã?øÞ÷ðþÿÙûïè8®,Oý"½ ï½%@ïèE#ï½/Ó]Õ}{¦çηÞ]ýæÎÜžéªîêê.ߥ’§$JEïDÑ{ð á½Kï3#Þ ¦‘2”T¢JŒo--À9qLÄÙ;މý3™øÍïÿ@ss S&Wqîüy‚Á ª/RZRÌÃ=€Ýnçß~ó[¸÷^*'UpðÐa:»»c«!ÑМ~n &##stttŽ­Æ…ÈÍÉA¯×óêo‘“ŪåËéíëcý»xüч©œ4‰` €Ëí&Œ¾,˜Íæ1U¾«´µ·ÓÓÛKä```öÎ.×Õg6 …èêìÂãõ’“…F£aphŸßG¼9ŽŒŒtœ.mííH¢D~~J…‚¾þ~œN ñˆ¢ˆË妤¸è†N]n7ÃÃÔJ%)))ÄÇÅÑÝÓƒÙlŽýl±X0~*2Àðð]Ý]˜Ífòóòt÷ô¢R©ÈÉΊª˜FeÓõz=¹998|„'OòìSOR\T„(ŠcÚ'j ò‘$‰žž^<^¢(R\XÈåº:Þzû]ôaª&M"îSŽÕf·óêo’“ͪËÉÎÊúJqþ?ÝŸ~‡ÃADµ }¤¦½£“=ícá‚ù$Z­ètÚ1¿F’$:»º°ÙìäädcµXðz½ttv"Iy¹¹×E:ü¾sÓŽ_`ÁܹØN=ÊùóY´`>v‡cLýI@«ÕŽÍú˜?o.‚ PVVÊ©3gyoã,^¸ä¤$<^/ŠqatW¯ZE[[gÏŸ…§ìêîbtt”¿þÑѨÕtuw£R©ñx¼˜ÍÑ$Š"gÏŸÇëõ’”˜È]k× ( Q]æqZÒ‚ ÐÛ×ÇÆM›ÑhÔ,[²„²Ò’èß…‚tvwÅTF#ƒƒØížxìQŽ;ŽÛí&>.•J…^§ÃbIÀ2&#yñb5¿ùý@èîîA­’—šdd¾.1B}CN—‹»vsϺu´¶¶2<^}ãMôz9ÙÙ$ÄÇóÞ›¢/>U••X,Ö¿û.U“&ÑÚÖÆý÷ÞKsK W[Û8rì8ÉIÉìÙ·þþ~Á ³fL§¬´”ÿõóŸSQVFOo/óæÌ!ÐÑÙÁá£ÇHKM½Îñ pµµ•áá23ÒÉÌÌDùGGÇ„þ,..ŠÚt¢6|ü%{zz¡½#*^öðÄüGÍ¥ËlݾsœQyîé§Ø¾smíídfd R©)).ºÕ÷·ÊMo:‹¢DRR"kV­âµ7ÞB«Õ°`þ¼˜®õ5ÉÇ'”G|€«­­üÓ?ÿ‚«mmL©ªâïÿîo‰3›ùã+¯²mÇÎ ×–$‰ôôtî^·–í;wÑÛÛ‡ øÇÞ€Õj5½}ý<|„_ÿî÷\®­å´”TJKJÈÍ͉î댛f ÂDýf“1Æ·¬´tb±«••“(.*äÁûï#/'‡P(„ „#a=ŠÝaG§ÓR]s‰þþhnA ¨ €ÔÔï‡2ßÍð•6EQdά™ I2býÄÉJÑx`pÜœRSSùÙ¿ü+]]]XX½j%¯—Ëuu,]rÇ„epQ™9c:õlßµ‹™Ó§“—“ƒZ­æ£}³léžxìQ~û‡ÿ Åò) ÊËJY¾tIì:Ÿ¼ŠHcò˜.‚}˜â™9c:Fƒ•ú“n$‰¤ÄD^zþ¹XŒn¿ßOõ¥Käç£R*ÉHOãÔé3LЍ Z¥B­V£Õj‘$ µJE(Âãõ"I"Z–ôô4¦N™µ×‚¥R‰f,€Jíg·ÇKBB8¦òÑY¸V«E¡Tâõz Ÿ{†â³$‰½û>¦³³“‚‚|›š‘D  €? ŽàÛ~P(±I":Ã"á^Oô^[­VÊKK™T^NVf©))Ô76òá–­x}>î^·öV?Üß*7íøµZ zƒFÃâE °;Æè’šÙ„Ïçcý»èëëG¯×QVZ”ª*Nž9ö;‰3›Ñh´¯ÏG8&.îIÝ`(„×ãÅ`ÐÇöÝ].6»µZMrr2:­¯×;và"„Õb!!!Qq8˜ŒFü~? ¥2¶åp:‘$‰„19E¯×‹Ãá, tºOÔö\.ׄ¼×òk5$IbÔfCEAÀl6ÇôªÌ&ñññÑ7qQÄép`6›c5 âñxHHHˆ½­ÛíâããP*•±Íؾáøþ ø|¾Øõedd¾§36ót8˜M&$`ddNGB|ͦ-[¯“ªæ?^~ûXþ@0Èþƒ½©ú565±ç£}ˆ¢H0äõoÓØÜû»ÍfãБ£¼÷Á&‡†%‰öö>ÞQ9~â¿ùýøÙ/~ÁÇ|æKŠŒŒÌ­#ò§×^§½£ˆúc'NÄþýM …üÖìÁ—±¥·5—/³ñÃqº\¼úÆ›±‰D'o‡Žág¿øW~õ»ßSßÐÀkoNL#ó _Éñ_im£§·£Á€Ó餯¿Ÿ@ @8fǮݼ·q£6’$‡dppˆp8Œ(Šœ>s•R‰×ëÁf·c³ÛEÀOcs3¡P¯×‹Ûí'¶ó ~¿‡ÓÉè¨ ×KÿÀ}ýýƒA$Iâè±ãT”—aµX¢®¾ó8ýë£ÇOðò«¯ñΆ÷Xÿλ„‚AfÏšECSCCCLŸ>¿ýÉ_³dñbö<õ‘‘¹uø|>£££1[ÒÜÒ‚Ûã! âp8‰DÄÎô"‘NW4l«ÛíÆf³ÑÝÓƒËõÙ«zÁ`¾þ~c+‡W®¶òëßý«mmA ªSÒÓÛ‹×ç»á5</‡ƒ‘±DI’ˆD"1m€p8‹¹?žOÛRQ¼ýf¯Á`ðÛ a³Ûiïè$ Ñrå*¾q}>44ÄæmÛÉËÉ¡¸°ˆ(NH3ÞOAôyahx˜Ð ¢Ü}ß¹é>’$Q]SCÕ¤Iô òþ¦MD"2ÒÓ¹cÑBŽ;Ψ͆J¥ä¡îgǮݴ\¹BrR=üQ¤`€U+Vðï¿ý¢(âõxY¸`>•¨T*ºzz8xè0S&OæÒåZrsr¢="b6›Ù³o§Ïœ%=-•²ÒR.ÖÔàv»™T^ÎêU«èêîfþ¼¹\º\KzZÚ„^jµ:¦% ˜páp˜«mmÌŸ;ÇKË•+äæä Óénõ}’‘¹­‰D"¼¹þmú‡ÃrÏ]ëP)U8N^ó-RR’éï@§Õ’Ÿ—7!Oo/ÿöëßbIˆgÊäÉtvuEW,%øÁ‹Ï_'uë÷ûÙ°ñzz{ﻓ§Nqîüy$žyêIÜn7ÛwîB­V³tÉbæÍ™s]ÿôÚk c4ðüðÅâ?þô ÿóþæ–.×ÕñâsÏ¢V«cy‡‡G8|ô6»¥RÁS?ö•Tîþ’ihjbûÎ]x<*+*¢1õјúJ¥b‚öÉåº:ÚÚÚÑëtx<¼ÿ~”J% …’Ö¶6Þßô!‘H„´ÔTyèA:Ä…‹Õ$ÄdznÍjJŠ‹ous¿UnzÆïr¹èè줢¼Œ>þ»ÝN^n‡Ž! 1î\ΟÇã>BGg'MMüø/ñÜ3OcµZini!..Žä¤$FGG¹sÅ žxìQ9Jo_#£#¼üÊk””3cú4†FFhïè`ý;ïòò«¯Q]SƒÛí";;“çŸyšÙ3g²|銋Š8qê4ݽ=øýR“SG"ÔÖ×SU9)& IÙYYÜï=ܳn-sçÌA©T¢R*1›Í8NvîÙƒÍf瑈‰õÈÈÈÜ:‡‡™6e ?|ñšš›©«oÀðóÚ[o¡P(X¹|96»ý†³ïP(D8æÑ‡bÙ’;X²8ê¨{ûú¸\Ww]ú¦–Ž;N~^.ÃÃ#=~œ… æSVZÊ^|ôô4víÙÃ’Å‹øÛŸþ5Ó§N½a.Ó¦NáG/½„Õbá̹sÔ\ºŒÍfãbM5g/œ'/7g‚ÓHIIfîœÙ,œ?'}ä¶œ|äfg³bÙÒ˜mµÙ7:›\UEIq>ô ÉÉÉx½Þ˜ ÚGïù©#ÇŽÑÑÑI[[µšóæ‘–šz«›ú­sÓ­±¹ZCnn.»ö~„R¡D­Öpך5$''¡ÑjP*Uè´Z<J…’„øôcRµ«k¨œTÞ G¥R‘˜h%9)AŸÏrL7:ÇÞèrsr¸cÑ"$¢ZÐWÛÚ°$X°X,ìÞ»—‹5—HINF’$ †ˆ¡¿¿Ÿ‘‘ª*+‰D"ø z=•“*ÈÎÎÂçóÅnz$"‚DLsÚ ×sÿ½wcµÞ~’22ß5$@©Tb±XÈÊÊÂh0àv»j•:j/ˆ ‘ D÷|Ç/ŸK’„A¯'5%‡Óɇ[¶’Ÿ—‹Z­" ^—Þëõ"IbDdöÌ”éÌ+0èõˆ¢ˆÇë%!!aLâ7ZÆøýQQ*•$%&bµZ˜=s&›¶lÁd4ñðƒðñƒ(•J{øáëòF%nµx½>t:Ým§ì)I'N¦úÒ'¶=‰ FD$QD£ÿ¾†Z­F¥R¡ÓëQMÔDQ$ áv{&ø©´ÔôaNœ<Å»ïoäžukYºäŽ[Ýäo•›rü¢(Rsé2%ÅE˜ŒFÌËÎ={p»ÝXШÕäfgsüÄI6oÛÆ‚¹óP*üö //—É•Uôõõs×Ú58.¶í؉$A^n.ÙÙY$&Zyèغ};*• …  P*c>ÜQ¹];>Ÿ`0ˆJ¥Ä’@JJ2W[[ ‡#$%%‘”˜HWw7ëßy—¿ùë¿">>žø¸8âãâb×t8ìx<²²²$‰®îîÛòMPF滈@tÏwÿÁƒ466¢P(¨œ4‰c'NðÐý÷qôÄ ¶nß$Š„Ca6~¸™îž­T”—¡P($ ŸÏ‡Ín#3”‚€'¤·Z-,œ?¢¢BFFGILLD¯×A¯çõ·Þâá`æôélظ‘‹ÕÕÌœ9ƒ`0È¡ÃG„è2ô¢óÆÊŒ¶¡¼¬ ‡ÓIZZK/fÇÎÝTUV’š’ÂÅê¹––.¹ƒÜÜNœ:Íæ­Û¸{ÝÚ 6ðûŽØìŸØvµZMB|<æÄ©ÓlÙ¶—^x>&û+ ¢þáÚËÒÎÝ{¨(/ãÄ©S1?ŽD8uú £6  …nus¿unJ–×çóñÚ›o±bÙ2JŠ‹ˆD"´¶µÓßßOb¢•¢ÂBA åêUTJE…ŒŽŽÒÜr%ª…qñb5Ï?÷,>Ÿøÿ“™Ó¦QXP@å¤ ´Z-]ÝÝäää088;ˆ‘ž–6a«`HMMÅårq¹®•J%!¼ÜŽ?Á™sçHMN¦¨¨E àñxèè줸¨èºe5I’ؽ÷#.VWóþçÿ„Z­æÊÕV­yÆ/#ó ‰ð¿~þÏÄÇÅ1uòdÊÊJIJL¤½£ƒ´´4ü~?ÃÃ#¨Õ*âââÀår ×ëÉÎÊÄfw“…B¡ ±©‰‘ÑQ¬+©)É  ÅÒëô:J‹‹ñx<´\¹Š (.,ÄjµÒÛÛÇàÐ…h´šššp:]!‰ @NN6Á`8s ñˆ¢HGg'ƒä¤$ÚÚ;0›M¤$'Ó?0@GÇ'ysss°Z,1[ZXÿ½ÑŒÿ²Œ·íVK)))4·´B¡`xx„ÉUUètZÂá0]]¤¥¦2<¤¾±ñ†e…Ãa††‡Ù²m;ƒCC„Ba†††yïƒM8NùÃËâŸùK6~¸ŸÏÿ­õŸŒÌwP(Ä–mÛéíë¢Æ.×Õ100ðg)OÅX ÿoƒ/cKo'š¯\áãñx¿?Vv$! ãõzcõlkk£¯¿ŸéS§L(ëšGWw7øã˼½a¿úíïhni¦° •JÅÅšKÄÅűrù2Ö­YÍÉS§hljºÕό̷Æ5¡–kQÉÂáÇNœdt4: …BôõõÇ^Æ?÷óÆægá÷ûcåõôöòÇW^cdt4f«>m‹>Í5û …ˆ|ʾ]cüïÇ×÷F¶ôv")6€ßàôôôr¡º À‰S§bJªŒnxÿ´ :­»ÃÎÉÓ§ciÆû©kC!‚Áà·:ý®ð•øÔÔ\¢¼¬ ŸÏÇúwÞÅn·S9iS§LfëöØl6N'>ôàØLø< <öðÃ(” ºº»¹cÑB¶ïÜÅåÚ:’’¬Ü±hûâ¡îG¯ÓñÞ›¸sÅ ª/]ârmV«…G|›ÝÁ–mÛñü¬X¶”¢ÂB¶ïÜÅÀÀiiiܵv ;ví¦·¯ŸÏGQa!“«*9yú ©))  ‘hµÒÚÖÆæmÛ ƒ^|îYLF#]ÝÝÌŸû /¿ún¿ÏÏŠåËÈHOC¥Ra³ÛÙ¶sy¹9ÑYy8L{G'¡`«%ŸýË/P*ULª(§«»›¾þ~­VžzâqêIKMÃb±`³ÙéêîfùÒ§býªÕh¡­½ƒÁ€Z­F­V“›“Ãù Y¼p¥%%465¡T*1™¿ù¨‡22ßEDQdã¦éîéÁç÷3}êT.˜J¥" ðÁæ-¨T*þØušáp˜=}Ä¥Ú:Ì&Üw/ûö`Ͼ}ŒŒŽðô“O T(c¶hùÒ%Ì=ûº:¿õλÑA@­RñÌ“O0<2ʆù?~ú:::¹tù2=òð„È¡ƒ1[jw8xò±G¿VÔÔ¿Dêغ}@€ùsç ÑhQŽEbU*• Ïœ=Ç¥ÚZ"b¥R Õ®P(dÓæ-Øív*ÊËYsç*Ξ¿À±ã'Ðé´Ü½n-…ßpØøï:7=ã÷ú|´\½Jå¤ öîÛGÿåeelßµ ¯×ÇôiS™>}w­YCwOGŽãûîåÁûï#!!ž«­­h5âØðii©Ì›;—´ÔT¼^/çÎ_àjk+ýýý E,Í‚ùQ¥«·n¥  çŸyš²’víÙ‹Ãáäûîcxx˜Ý{÷ÒÑÙI^NÞwgΞÅd4RR\ÄŠeKÉHO§½½·l¥¤¨ˆ‡x»=ªÌwµ­ FCjj*MML\ÅüysزuCCÃ8]N^}ã-4j5“**hn¹‚×磶®Ž¬¬L´Z]]ܱx!3gLgþÜ9,½ã›¸X]M_?©©)( ®¶µ¢ÑhÈÊÊŠõmD™9}:óæÌaé‹cᆭVlv;’$ÑÛÛÇëßfŲeäåßêçGFæ[A’$šZZHKKeíwrððašš[…B¼ÿÁ&ººº˜?wí7Ü‚ôú|Ÿ=6kj®K¥µ•{öR^VJOoûbÆôiäåñȃšœÂ‡[>±Eå¥e7¬s{G))ÉÜBGW6›Š²22ÒÓ1›Íô÷÷SR\DqQ!ôõ R*ÉÌÌ$;; ½^R©Ä`0`±$ß`xd„‚2ÒÓ0Mˆ¢HõØJ†ÑhD§ÓQŸÏ¼9s%‰Q› ¿?@ÿ@?™™™ F”J>¯—ú†¦N™ŒR© !>ž²’T*¡¶®ŽP(„×ëC­VÇÞR««/Q^ZŠA¯m3dgeòÈCòÒóÏòØÃSTX½I M4ï¨ÝÆ¤Š –/[ŠR)ŸÍ”¹=ˆj}ädg3}ÚT, ý„Ãaº{zILLÄ’•ñ¾v½Ÿ;6?ÍÈÈn—›®îR’“ÈÌÈ !>ƒAOvV6‚#£#1[wÃz«Õjòóò(,ÈgÖÌ™?yŠ«­­Üs×Z9BwO3¦M»a¾øø¨-MKMýJ¢hé´´\aÿÁCQ¥Ö`€P(B4${tuþ“ûl0Ðëõ$'%b4ˆn NôSqq<öÈÃX, lÜ´™¶¶ö[ÝÔo›Zê—$‰K—/“Ÿ—GB|Ú÷1Á@âÂB>ؼ…™Ó§QR\̬™38xèN§“ú†FV,_ÊÑã'bgÆÿ_£‚Él¢¤¸˜›>¤²²‚¡Aœ.<ñØ#c*FNž>ƒ‰hµ™‘ArR"«W­â£?Ži{÷ôöâñz)*,ÄétEDIbpp+­­¬Xº”¦– ùyÔ\®edt”öÎNž|ìQÖ¿»²Òf͘V«eÊäÉú¼¯¯ô´4AÀçõ¡„Ø’—ŒÌí€@tùýbu 6[T§½¬¤˜ã'NðÌ“süä)ö~ü1Q$ ññƒ  GzjZÔ|jl6·´ *}\…äææhµ’œ˜HA^ƒ€M[¶pçÊM°EÁ`ó«A˜RU9áìÒ”ª*Þ|ûmŠ‹ŠX·z5ÿßþ?L*¯ ;+‹¦ææOò3gL'%9™³çÎññƒ,^¸Fs«o÷†(ŠÔ76#ä¤gÓÚÞŽAoàêÕVjj. 9pè>ô &“ ÆÙxQQ©U„CaŽ?N~~>ž1?e4Ðj4´\¹Bzzõ tuw3cú´¯_é¿ ”=üÐÏÏÏÇh0~ab¿ßÏþƒ‡X´`ii©ääd£ÓéÂl6“•EvV&ƒ½NOyY)ùù £T*ñù| ±fÕ*A »§›ÍÆâ… ˜:e ƒŽŽ´ZëÖ¬FÅXšE 0cÚ4JJJˆ„Ã8NÒÓÓ˜RU…ÅjÁï÷3Þ\¦M™Bœ9޼œlâãã±Z¬äåæ’˜˜HnN©)Éäæd3wö,$Àf³ÓÝÓCJR2^¿Õ«V ‡Ùð j•ŠÄ¤DîZ»–””­Ì™5‹ŒŒ ” %¥¥% b4Y0o*¥’”¤d²³²°&&b2q8L2™ÊI“HINáèñãH¢„Ûíaõª(•JÜ7©É)X, ×õ¹Ýá`Ó–­¬\¶Œôô4BÁ†ÌÌŒ {\22ßg$Iâèñãx¼^âããXsç*òóòˆ‹gʔɔ—• …)-)&/'»ÃA àG¥T¢×é)ÈË#++ócs “ÊËq:]Ÿ¤×ë˜T^NiI1CCCDD‘¬¬LÒÓÒHOO'‰—“ËäªÊq¶(€¡áaTJ%J…‚ôô4rssÈÍÉÁl6£ÓiÉÊÌdæôédgg“™™ÉìY3HJJÂf³}’W©$=-ò²2 =½ž¬¬ÌÛjÖ/ééx=^t:sfÏfrU%:«Å¤Šr"á1V«ÅB^^.ÉIÉ••A$fÉâEÄÇÇ18õSY™™ŒÚlôöõ1¹²’Å‹¢ûžl¥ˆ¢ˆÝnŸpxt|ŸCAFm£Þß -[ºŒä¤ä/¼h$adtKBÂW’°õz½øü~?uæ~¿ŸûõoY0.‹,ø³vÝîÀëõÒÞÙÉæ­[ùé_ý³ÉŒÕjÁátò?û9?|áùØrûgáp8@ˆ‹ûÂ2%IâÝ÷ßÇd4±pÁ|¬_boérm-8È_zãØŒCFæv#‰ðOÿü/,œ?Ÿ%‹ÝêêÈÈ|' ‡Ã´µµÅ¾DOt%ÛÍ•«Wnn©_©T’’üÅ/Ÿ…Á`ˆ-—݇ÉÁ §¼¬ì&®úÕèîéaßþ‚î»çn²³²boÔ*¥’‚¼¼/%Õÿ¥Ë{Ö­C”$âÌæ/•§° €¬Ì,ÙéËÜÖ@nNÎgî¥ËÈÈ|ynjÆÿç& Ñ ü¹±EI" !(¨U׿ÿˆ¢Û«“‘‘¹õÈcRFæóù³ÌøÿܨT*Tªo§J AøÜÃ2·Ó~šŒÌ_ò˜”‘ùfG’ŒŒŒŒŒÌm„ìøedddddn#dÇ/#####s!;~™Ûˆ¿HÇï÷ûéëïgÔf‹)+]“­½Á`¾þ~lãÒËÈÈÈÈÈÜŽ|¥#ô~¿Ÿ Õ5TMªÀü%¿G¿FCcJ¥‚’ââ¯Tnõ¥Ë´wt°{ï^V-_ÎÃ>€ÇëåÍõoc·Ûyñ¹çÈÊÊŒåéîéáà¡Ã\ª­E©TñÿýoÿuL…¯»ÝNU夨çA7Ó®H$ÂÅš‡˜6u*éi©ßøÍ‘‘‘ùŸßÏ™³ç…BÌž9ƒ¸/4ëÓØìvΜ=‡ÉddÆôé_±íÚDAþ„ðÖ!I—këˆC©Tb6™n*~ʵk€|¯ñ•fülݾý35¨?kV‡Ù¼m]Ý=_ªœO_§£³“í;wâr¹˜1u÷Ý{†þþ*ÊËY¼h!½}}òDƒôyâ±G„¨Ã>|ä(|åþã•WØðþF|>ß„v]ûòóV››y÷½czÎ"222^Ž?Á®={oŽô˲uûΜ;‡$I_*VÈÎÝ{¸T[{«›~[ ùøÀ.×ÕQ}é½ýý7} ù>Nä+Íø/×Ö‘•™ÉÁ#G™:¹Šì¬,víÝKVF&ç/^Ànw0¹²’)“'³ç£…BTUU‘ž–ŠÛí&55…×ß|‹p8Ljj*¡Pˆ5w®¢½£“®înòrs8xø@FÃ÷ÝKJr2—jë(ÈÏ'!>žIŠE³++-¡¼¬˜è¬N­mm<öÈÃè´: % A ‰pöüyl6;Eãt˜/ÕÖQXZ­fÓæ-t÷ô¢R)™6u ½½}¬X¶»vÓØÜBwO7#££Øívöí?€ÛífÑ‚L®ª¼Õ÷UFæ{ÅðÈ;víÆåva³Û9tä(e¥¥df¤³û£},Y´+W[9wá ñܽv-^ŸÝ{?Âçó±lɨÕj>>p¤¤D|>_T"÷b5 ñܵf ÊljnfÃû£_»†U+Vȱ¾EœN';÷쥫«‹Ëuõ”—•"IðûÙ°ñsfÏD¥R‘œýýèè(J…AP*”±Ÿ³23™1}—ëêðx&•—£Óêðù|<|˜UË—“Ÿ—' ™o­VKrrHÅEE¨T*AB¡@¡PgfÝšÕœ:s¯×‹Å’ÀÕ¶6ô:N— V‡Ùd"Ñj!?/²ÒRîZ³†ÓgÏâñxÈË˽N?#Ñj%5%™’âbòóònuÜVD"®^mcÆ´©TNª %%IŠêÅ‚€ÉdbÞÜ9¨T*º{zÑjµD"ÒRSiïì@¯×sÇ¢E±š”±û˜—›Ë‰S§ÈËÍeÑÂÄÇÇñîûÉÊÊ¢¬´„ùsçg6óþrÔd")1‘Üœì[Ýß87=㯭‹.óÇÅÅQXX€N§cßþ™?o—.×ÒÞÑÁÌÓ1èõˆb„H$‚$I  1j¥´¤I’G"ˆ¢ˆ^¯ÇãñpþÂEêÆöÌ%"cE I’båšÍæ/u2ßëõÑrå UU•ŸrÂ*•Š¢ÂBfÏšS¬­«#33ƒ¤ÄDòóò8rô8gΣ¯¿˜6u*=½½47·0cÚT"á0‘H„P(D(bîœÙ(‡“¿‘ù3‰DbçŠtz=µõu\¸XÍfÃçócµX˜?w.kj¤¨ €œìlV­XÎý÷Þ^¯'ŽÚ¿ÿ“ôÕ5—hkk§åÊ9Êá£Ç8~ò6›£ÑHõ¥K45·Èãú[D©T’Ÿ—Ë©3g8{þ<Ý=½üµg!!>ÜœlJ‹‹¹{íZV._FvV6›ýRߨˆÏç‹ÝÇ–+W(*,¢­½ƒƒ‡pøè1JKŠÑj4„Çž­â¢"Ô5ï°‰™Ó§kaä¿Õþ}èá‡þ{~~>FÃ/Qûý~¶ïÜż¹sÈÎÊB©P`6™IINfÁ¼¹$$$084ÄÀà ÅE…T”•Giq1çÎÛk[‚$J‚@Iqqqq‚À¥ÚZLF“*ÊÉÍÉÆ`0PXO("ÎlæÂÅ‹Ì3›ì¬,›ðù|̘>í3ëÚÔÜB}C#÷¬[‹F£Á6j£úÒ%Ì›‡N§ýÌvådg“›“ƒÓ夡±‘¶¶v¦TUQ^VŠF£¡¤¸ˆÉU•„BaŒF…\¹r•“§Ï`2Ysç*’¿†‚¡ŒŒÌ ƒ$'%‘••‰Õb¡±¹‡ÃAQa!%ÅET×\¢ùʦM™Â¢ (.*¤£³‹«W[Ñëôäåå …ÈÍÉÁd2râÔ)Z®^eÚÔ)ÌŸ;‡ú†F.]®eppÑÑQrs²)*, §·ƒAOvV¶¼’÷-!ÙYYŒØl45·’œÄ”)“‰3›ÉÎÎ".ÎLQa!V«…Œô4ššèêî&1ÑJEy9ññqT×\ŠãÊÎÊ¢§·½^ϬÓ1 45·žžÆÚÕ«Q*”$'%‘™™J¥ÂétÐÔÜÂ3O=^¯¿ÕÝñ¥E»Ý~ð‚  µÞœ:_(¦µµ•쬬ϕו$éºÒÓÓ‚@fFÆgVø³ÎD"®\½+wÓæ-ìÛ€Çy˜cËîŸfdt‡ÃAA~~lÏçj[ÿóÿ÷Äê3 O·+ áøq»ÜüûoÇc?Ä´©S¾°Ãåƒ?22ß7²37;åq+s#Þßô!N§“ž}æ/êùø³¨ó©U*JKJ¾0ÝÞŠ333?7Ïçu®R©œPîŒéÓNû™oà‰V+‰VkôÚJy¹¹LŸ6à ÞÞ>Ý®¶íÜÉðÈ%%Å””|ñ‰Î¿¤‡CFæûÀÆþÍŽCyÜÊ|¿ßOgg+—/ûÞ>75ã¿]‡Ã8N"¢HB|ü Wddddd¾„ÃaFFF±Z-q¶ÿÏ2ã¿]P©TXÇV dddddnT*©©)·ºV¾Ÿë22222227Dvü222222·²ã—‘‘‘‘‘¹¿ŒŒŒŒŒÌm„ìøedddddn#núTÿððýýGÃôôöâõzIOOg €ÜÜü~?u ¸\nr²³(,(AàêÕV:»:‰‹‹£¬´£Á@{GéiiŒŒŒFãå ‚Àèè(.·›ÜœœX9(J²³2IOK‹}gÙÕÕMO_/HÑS™%%ÅØívÌ&¢$áõzÉÎÊÀãñÐØÔL(B’$ÒÓÒÈÍÉAB¡ Mx}^4j 9ÙÙ$%%àp:ééé¡ ?NG]}N—…B$I¨UjDI$ 3oî »§‡¦æfîX´è{úQFæÛb``½^Gܧp}ü==½ädgýÅ}²u»b·Ûqº\¤§¥ÑÕÝMzz:zî“¿;´µµ£ÕjÈÎÊfhxèº42Qn*d/ÀC‡ù‡ÿùÿRTP@^n.—‹üÙÏ9}öy¹¼þÖz¦M›Ê{? ºæ@€Þ¾>*+*¨®¹Ä›o¿À•ÖV2ÒÒÑëuüê7¿£  Ÿí;wñ§×^gú´©$Z­=~œ1oÎN>Ãëo­gÔf§»»›¾¾>*ÊËcÎôõëÙ·ÿ>¿ŸÁ¡ArssØøÁ& ««‹£ÇO0gÖ,A ¹¥…ŸýâAz{ûÐëõ1Ço·Ûùÿø¿áJk+gΞ¥¼¬ “ÑÈî½{ùÙ¿ü‚òÒ22338tøÕ55¼ÿÁ‡ŒŒŽâ÷ûc/'sgGËjhjbßÇX0¾ìøed¾o¬_O$UۼƉS§ CX-œN'‡‹†¿ÚÞxúûxùÕW™:eJLÞû›¢¶¾ž®®n2ÒÓoø÷ñuþ®ÒÝÓÃ…êš }ýE|™þÿ:m?}ö,û¤¼¬ŒßÿñeJŠŠ°ŒI)‡B!^{ãMjëêikoÇ ×óþ¦MÆÒÜ|Ù½7í‰A >ÎÌž>bú´©œ8ušÁ!r²³¤hÍP0DË•«¬X¶”•Ë—EgÃj5míí ž|ìQôz= …·Çƒ$‰Hh4 =›>ÜÂßýÍO€èõFGmlüðCî^»–E D ¢Õ~s_¡P°pÁ|î¿çn QÇê’ø‰À†(IdgeóÜ3Oc4Ðh4±•Q’°Z-<ÿÌÓXøÿéçttvbIH ®¾ò²2.TW3cú4zà~\.7vç¿ðèCRUYÉÎÝ»ijnÁ  †¢’€222_ ‡ÃÉ¡#G¸ÚÚUlKJæõëIIJfÍêU ²aãFzzzX±|96Û(}ýø|>¦L®"?/¾þ~Ž?AwOv»áƒÓîppèð\.••“0 cטÌÅšA`êäÉ\¸XMBB<¢(r±æñqfÊËÊØðþFl6;#££Ì›;‡“§NÓß?@~^.iii±:¯[³šÉU•œ¿x‘žÞ>ÊKK˜2yòuõééí¥®¾ŸÏZ­¢¼¬œü¼\Ž;Nvv9ÙÙœ<}š’âb’“’&ä•$‰ËµuÔÖÕ‘ššÊ¢óæbM Z†Ù³fáñx¨®¹„ÓéÄh42oζíØÅ©Ó§eŲex}^ŽŸ<‰V£aá‚('OŸÆívŽ„¹cáBΜ;Ïúw7ÐÝÓÃ+V™91<{Gg'o¼µž”ädÖ®¹“9³f}nd¼îžŽŸ8ID™3kV¬=ãÿêšK;q‚9³g“dµb4Çl~0ää©Óôõ÷3uÊdJKJèëïçì¹óHH,˜;÷¶ÓW¹é=~I’˜=s& ññlx#'NbÝšÕèǤo%$t:kW¯âàáÃüê·¿£¶®Žp8Ìü¹sÑh4üó/ÿ]{öât¹Æ »hÜí•Ë—£P(ØóÑÇHRôE£«§I‚)S&ÓÝÓÃæmÛØ»ïcúúúc¹#‘{÷íãg¿øW^k=>Ÿï3Ãù ‚ÀÕÖ«üÛ¯ÃÏñKjëê'üÍnw°mçNÞûàÔj™´wtxðþû¸rå*6›…BR¥D!(”J ‚ àÔ™³üã?ýŒüÙÏXÿλ7|û’‘‘¹9$IB¥R‘À»ï½Ï¨Í†J©B­Q£ÓêP«Õ(Jt: …Àö»¨¹t‰‘ÑQþôÚë\¹ÚÊúwÞÅåv‘‘‘ (€ë÷B¡è ¼õö;ÔÖÕ³eÛvyûÝ÷xgÃ{ôõ÷óáÖ­ôöõóò«¯1<< @$A¥R¡R«Ðé´ˆ¢H(B¯×±qófêêëQ«Ô¨5j´:-ç.\dÃû Ñ¨ñù|7Tl¹r•÷?ø@ @k[;»÷¯Ÿß¿ü2{÷}L[{;;víž0¹¹FCc#ïoÚ„Á`@§Ó284ÄŸ^}ÑѨøÍúwÞåÒåZ¶lߎÁ`àÈÑcœ>{­VƒRíKŸßÇ›ëßfdd”úÆ&6oÝÆàÐ6n$"Š´´\aû®Ý¨Õj”ÊhžÍø• %J¥2Úv–/" Ö¨å­wÞÁét}¦M×h4h5Zâãâ8}ö]Ý=‚€ :r”ƒGŽ#¼ùö;tuwóΆ÷¨kh@£Öàóûoõ£ý­ó•¿Á`àÞ»ïâä©ÓR9©b¢s`ùÒ¥ü׿ÿÏ”–”ðÇW^ãRm-YY™ü׿ÿOÜÏ=œ=žw6¼‡8îA—$ “ÉÄÃÜÏé3g¨­«C4j áp˜@ €J¥B¯Ósððšš›?iˆBÁ‚yóxñ¹g¹÷î»Ðét‘ Œ‹í-ANv6Ï<ù$/>ÿ,%ÅEÚ¨T*1Mäçóã—^"3#ƒ“§OÓÚÖÎþƒ‡hëèàr]]ìZŸîŸÊI<ÿÌÓ¼ðì3¬¹s YÑKFæk£R«˜=s+—/C«Õb6›(,ÈgîìÙLÓmÏÊÌdíê;ÉHOGP(˜={Ï?ó F£‘ƒ‡32:Ê÷ÞÇÂùó0›MÜHhW­R …ahh˜””d9ŠÑh@¥TqèÈQô:•åL®ªb`p›ÝARR"e%¥TVT°xáBtZ- …ÀÀà v›…RAA~´ÎÓ¦L!';›¬¬L®\i©Ï °0Ÿ‡¸Ÿ»Ö®¥§·—ÃGR˜_@ÿÀ‡#/7—ää¤ëòÕ\®¥ /ûî¹›óæÑÑщ$Á>£=Hk[;CCC°nÍjJKŠq¹]Lª¨  /Ÿµ«ïÄçóS[_O_?ÃÃÃôõõ!ŠR’“¹så æÌžÍf§¬´„ì¬hÿ§¥¥^W—ÌÌŒXÛ§O›ú…qðµZ-.§ ‡ÃAo_APÄìøø—€ÜœlÒÓÓX0o.™™cNQ¶êK—¤£³‹áá‘ØêM  ¯¿ÿ¶<ãqÓKý’$ŽD(.*âÿù‡ÿ›D«•+­­QÇ/Iˆ¢H àȱãèu:R’“Q«UƒAš[Zèéé%99™D«¿ß’DdlI^E"á0ùùy,^¼_ýöw,œ7ü¼\²²2yóíwX¹|YLVsüR¿$IX­ÖØA@QÇ–ú%$Ibxd„¦–” %.—‹p8L0D¥Râõù0 ‚€$IMFî\±‚ŒŒèÃá ¾¡‘ûÜÜ\LF#§Îœaáüy DWÆ/AÅ™ÍÑÃŒÀàÐ0âù €¬å-#óu#bÔV\×€R¥¢­½þ @€†¦&ÊËÊ$ §ÓIWwn·›9³fqåêUj._B¯×ãóùƒ´¶µÅ6—¢ºí5—¨®¹Äº5«innÁd4QR\Ì›7óÄcâv¹Ù´y O?ñ8z½žÙ³f’•Åëo¾EA^Z†æ–~:»º°Ùlìùèczà~Ú;:E•JI[{;}ýý zî»ûnŽ8Ɇ÷? ¬¤”QÛ(áp0M„ÃaD1ªEŸ™‘ŽÉdbûÎ]üô¯ÌÁÃGØ÷ñ~þËþ;"‘]]±¼F£ KBõ ´µ·c2™HLJÄãõR]] 1›L˜Ì&"=Q{IE Z…Ýa§©¹“ÑDJr2Sª*ÉÏËÇd2"ŠÒ˜}Nø$ID©Tâhll¢rR‡Ó( ÒÓRQ©U±¶§¥¦~æ ^’$víÙ‹ÛífÆŒéôöõ!(FÆ^Æ]Ýdfd V«‘¤hÿD""‘HAŒáŠ‹#7'›;W®@©T’––†V«%Ñjåõoc2yôá‡nõãý­rÓ‡ûFmv” ŘæqTÀÆãñâv»).*ÂérQR\Ìñ'9zümíܱh æÍ¥©¹™={÷QW߀ŒÀCÜÉh¤·¯ò²R|>?‰‰‰äåæ’•™‰×ë%%%™™3f0©¼ŒÁ!Ξ;Ok[;Ó§McîœÙhÆÞÖúHJL$/7'V×Þ¾>²23ÑëtÔ\ºÌ•+WihjÂb±Ð××OËÕ+\®«C©TRŸ „C!úúû™4©£1Ú'CCà óÐý÷‘Ÿ—KFF:í픕–¢Õjéíí£¬¤KBB¬ÊËJ—Û…ÏçcrUÕ8’‘‘ùlzz{ÉÊÌ$5%…¾þ~*+*HINæBu5j•ŠŠòrÜ—/×’›“CÍ¥KÔÔ\¦½½ƒéS§²bÙRL&¡³«›D«•’âb¶lÛÎ…‹¹T[‡Ë墴¤„ŽŽNzz{±X,̘>ô´T†‡GY½jIÉIŒŽŽ²fÕ*J%;v®ž¼¼\-\@jJ 8N&UTÐÛßOkkz½ž©“'STX­³ZE(fçîÝØÌŸKfFïmü`B}RRRP(&•—âäÄkV­ŠÙ”UË—x÷ý±¼N§“…óç12:‘cÇq8Ìž9£ÑÈÉÓ§±9ÜwÏ]˜ÍfÂá•“&144LB|UUUtõtÓÖÖδ)SHNNâ̹󴶵‘Ÿ@JJ £6S&OÆçõ!Š"3§OÇíöp¹¶–¼¼\.ÖÔðѾýÔÕ7Ð|å ¹99dd¤s¡º•J³¹Ÿ…(ŠÔ762:j#==Ó¦ÑÔÒŒR©Äl6ÓÔÜLeå$ôz=‘H„þþ~ÊÊJq»=Ž„ijnfåòåôö÷q©¶ŸÏG^N.'NžâÄéÓXâYºd ‰‰ßm–/{¸ï¦Õù®Íl?}îicÿ D©PÄ–R$I"‰ˆhµšØ5Æçùôµ?­¹‰D®s¢Ÿ•w|‡\ûwì ßXç(Š ËNŸ.óF×% aìwãÓ™6ÈÈÈÜ<ãÇÖø15~Ã'+p?ÿ×_2}ê-\8áä~0ˆÙ¥ñ¶A”J%@QÑiµ×Ù©Oÿ …ƒèÇím¯Stu1„N§½Îö‚]ùôc’áãWAˆåù,›2Þ~Þ¨-’$á÷G·IÕjU¬Œñ×¾‘ ¾v½km …BD"":ö óìv$‰ýý$ TF—é?}¿>ŸÏ?vX[;Ô=K%‡ÑhnìGA ‰‡Ñj£g-¢+¼*T*‘HŸßV£ù^-õÿÙÔù>ïÀܧÿ¯Ój¯K£V«ùt?ßhÏæ³Êû¬Yóå½Q¾Ïzð>}­ê~ûð?QŸÉÈÈ|y>kœ}z+•J"‘*¥ƒÁpÝçzš±ø#ãÓ­VsÝï>«ü¨M›hÔÆ×éš³ù¬¿_søŸWŸ/S—kŽþFiõú‰ß²:Ýlð§¯÷iÛýYvûZžñ/ŸÕö/âÓõᄄ J¥2–F¡P ÷=ô×—[åþ>"X.##ó½C¡PðôO`2ݾÆ]F泿ŒŒÌ÷AHOO»ÕÕ‘ùN"Çê—‘‘‘‘‘¹¿ŒŒŒŒŒÌm„ìøedddddn#dÇ/#####s!;þ¯I$¹©Xü×bÈÈÈÈÈÈÜ ¾’ãE‘ÑQ¡ÐÍ;0·ÛÍfÇ6](  …µÙ¢Jv7Hïr»oªŒP(ÄÈèè7"Žãt¹pNù‡Žáä©Óøý~ìvû„¿_S¼䢹¥…»vÇB×76rî†ÆD>dddnŒÇã!|#× ‡ÃŒÚl±€`_ŸÏ‡ÝnGúšQ¹%IÂf³ÇúÈLÄï÷ãp8E›ÍvÝêšüàÐÁ`ð†id¢|%Çß×ßϯ÷û±8Ì_I’ذñÞݸ‘ÿøÓ+8Nö}¼ŸÚºz~÷¤½£ãºôï¼÷>ÇOœ¼©r†GFØ·ÿþoÀHDÃ_ÖÞðo#££ì?x“ÙÀÇòÁæ-1'?::Êá£Çøå¯Í¡ÃGÄb±p±¦&ÇÛnçС#ìýècþý7¿¥·¯ïk×WFæûÊû›>äBuõ„ß565300DðÅšš/å̇†‡ùÝþxÝ‹úWáj[ÇNœŒÅ­ÿªˆ¢È¡£Gèèêú³õá×edtt‚šé—Á{÷åó8ñ"ooØ€Ãáàw|™žÞOìe$áƒ7óû?¾Ì˯¼FÍ¥Ëüþå?ÑÓÛ{«»ì;ÉWúŽ¿©¹•ZÅÀÀZ­“ÑH[{;z½žîîÜ…ù$'%ÑÚÞNÀ 99)–nÁ¼yœ<}I«Õ‚^¯gdd„£Ç308@å¤IX°Ûí´wt0gÖL.×Öbw8Ñét z)-)!#=ŸßÏ•+W …Cb2)-)F­R108HgW ññäç388Do_N—‹´ÔT\.¢(2erz½þºôÙYY±H`W[[q:]äæäœœDCC#j•šÒâb‚¡—ëê˜;{V,r”ÛãáÃ-[8ñ"]ÝÝü×ÿüŸ)/+%#=“§OóØÃó×^Àãñð?û9==½d¤§ßêgBFæ;IÿN§§ÓEQaf“‰Wßx“¬Ì î\¹‚¾þ~Ö¿û?p?3§OÇëób·Ûñäç“hµât¹¨­­£½³ƒÁá¡ÊàÚÆìŽÃáÄj± Š"§“ÉU•Xp8´¶¶¢V«).*")11ɳ£³“ÁAÒRÓÈÊÌ ½£ƒá‘Q|>éi© g61©¢•JIGgׄôE……X-ü~?-c6­¨°8³ù†õìééÁï T)ÉÎÊ")1‘æ–+X­–¨€ÚÕ«¤¦¤w}þîž^®¶¶b±$PQV†ÇëÐ.ŸÏGGgN§ƒÁ@iI }¼Ÿ'OñÄc2uráp˜ºúÔj5“*Ê‘€+W¯âv»E‘ªI•\¬©á­wÞåáîcÖŒX­ã⌌ Ñj1›L~?j³QßЈ$Š”—•‡ñú|ˆ’„ÇãE÷"ÑÜr…dáüù$%&b4ðx<1±¶¦æ†G†).,"--§ÓISs ’$QVVzÃþý>sÓŽ_Ej.]¢ªr&/7—ùóæòêo²zÕ*šš›q¹\ìÛ¿Ÿ{Ö­ãåW_£¢¼ŒE  …0èõäåårâÔ)DI䨉“L©ª"Ž02:ʹó8wþõ£ÒÐÔ„Á`@«Õòóý%³fÌàr]©))˜M&Ž;ÁßýÍOؼe+ý¨5Ž;Îâ… Ùºc*¥ŠÍÛ¶‘hµ244ÌÂóèéí£ºæùùy¼±~=óæÌæÊÕVFm6ª*'ñêo’”˜M?=}}èõzê9{þúx?/>û,[¶oÇår¡Óé‚7”½\[Ë›ëßaÖÌœ>{–ªÊI8Nšš›yäÁxåõ7P(”ø|^rssIIN¦¾¡—ÛÍ®={IMI¡¿¿Ÿû]{öŽDÐhÔÑIÌÌ™\ª«ãÅgŸ%"Fزu;©©Ñô÷Þ}7ûdÞœ9´¶µE%c5Ž=Æ‹Ï?wc¼\[Ëo½Íô©Sq¸œ¤§¥qïÝwñ¿~þÏ,½c1+—-ãµ7ßâ¯ô£ë{G'¯¿ù©©)1á£õï¼;¡]i©©¼óÞ{Ì=›Úºzî^·†þþilj¢ /-Û·ãñxñú¼tvu1er¿ü÷_3sÆt::;iïèD­R1<{«ÅÂ_ýð¬¹s‡ŽÅãõ2mêdžxäâX»z53¦O§½³ƒ3çÎ]—Þëõât:9~ò$w­]Ã_ÿèGèõzNŸ=‡Ûã!>>€ú†FÒÓÒ°X,±¾JMIæùgžæ¾{îæ¯øCrs²ÆÔ°"445Qsù2Ï>ý–„„[ý<ÈÈ|gQ«Ô,[²„'{$ ‹%I“*¸så –/]ÂÜ9s(,,ä™§ž$?/p8Ì¢… ø?~ú"‘íßO{GÏ=ó4÷ß{ ñ7œñ‹¢D~~O?ñ8éé,˜;Õ«VÒÓÛKm}v»ƒ¾ôÏ<ù$««é søè1¦OÊð•“&qèèQ…ÀÒ;qϺµ$ÄÇóÈC’•™I[G;GgÚ´‰é#¢HOo/u ŸØ´þš›[>£ž¹üàÅçyàÞ{hmkãÔé3$ÄÇÓÙÙʼnS§HIN&ã Ï?Ozz?þÁKܽn-míí7hW?E<ûÔ“T”•222ÊÜ9³˜TQÁ³O=I àÔé3„BA\.7ª« ‡Ã$&EmõÒ;ÓÓÓËÌÓ).*ä™'Ÿ /7÷ººäç“’|½H\ZZ*™hµZZ®\Åét¡7Ô(/+£ ?»Ö®%/7gl’=ËqüäIFFG £’ÍÃÃÃÄÇlj„±$$˜˜x«ío›žñ××7OzZqqqìÞ³—M[¶ðü3OS}©†‡³tÉ\¬®‰©4©ÕjÜn7,_º…BßÀétE¢7Èír3000¦œä£££“¥w,ŽÞ`A@T*ULMOPhµ ƒƒƒ!"¢å0™L  1<<ÂàÐ&£¥"ú((Ôjª1!“Ñ„Ó劥7šŒ(•JT*:ŽÁÁ!†‡‡ñx½ÄÇÅá÷ûq»Ý„#.×Ö2kæ T*˜Íf¬ e¥%dgeb4cªÏçÅ<C\«Ñ°|éR²23nõ³ #óF"ªº&J…‰hLþQ› —ÛR¡ 144Œ^§C ª¢é‡ÃÄ™ÍD""ƒ(•Š1¥Ð£6[ì °F£AÅX9*•*Zžµƒž`(Èàà#£#¨Õš¨  F###£ŒŒŒ2j³g6ãóù„¨½º&Ô£R*“ÑÄÈÈÈ„ô#££hµÚ 6ME´:í ë©P(Q(äææ¢Qkزm;?x?§Îœe÷ÞxþÙ§®Ë«V«±ÙlØtZ-ýõíÒh4 A¡@5&¬Rªðú¼ Œ `2™(*,$3#ƒ¸¸¸±YvTœG©R …‚P(ÄÐð0F£‘P(;¥Ìfóu"G’$±k÷)).¦µ­ðx>ž8³™Y3fðîûcéïZ»†õïn 5%e‚M[´`)IÉüéÕ×p¹Ü×ÕSô:S§NÆîp0}Ú4Üv»ƒòÒ2焼ÅÅE,]¼˜æ+Wø·_ÿ†ÒâbîZ»†™3Æ·k A`ddˆ3›Ñétäça4y{Ã{<õøc¬Z±œ³çÏÓÚÖÆì™3ÉËË%i¬½ž„„’“’(,,dÃÆxêñǸ\[ÇÙó磊yZ<ô Å7ØæLMM¥¡©‰ú†RR’ÉÉÎæä©3œ:}†”ä$¶íØINv6V«…RI’5µZÕbÁj±š’ÌÎ={¸sÅ ö8ÀÁÃGÈÈH'';›‡ÓÞÞŽÑh$';ûV?Úß:†÷7HË–.#9)ù ûý~ö|´9³g‘ž]> …Bѽ{ƒI’%c2™Ð¨Õ„Ãaôz=gÏŸ' ²pþ|$IÂát"FDtzj•Š`0ˆÏïG’$¬ .^$0–>‰Ðëõ‚Acoâ~¿?&iév»% ³ÉDsK o½³ÿö_þN‹ÇãA3öV{ís FƒÏçC§Ó‡ENG(šþO¯½N\\<ø¯—P(„ÉhD¥Ráöxø÷ßü–¼œ­¬Z±…BÇãA­V_'ÿ ÐÚÖÆoÿðüÝßü”ì¬,‚Á ¡P£Ñð…ý/#s;ãóùQ©¢+p>ŸíجÞåv£V©0 |~?:­–ý÷_QR\̼¹sHINF­VG?E¶E?¯Õëõè´Z\cÑ4j5Z­–HDD§ÓŽMR¢³ÑàØ%Qq¹Ü(• L&ûöàrm-÷7?% áóù¢g“ÆlŒJ­F!Aôz@…R‰F­ÆÄÒ+ú—_°rÙ2æÌž5Á¦At/üFõ¼&] ‡ ƒèõzÂá0¡P½^(I8ÇåU«Õ˜M&6»½NO||’$MhW(&BáP¬^v»P(L\|µ:f«Ãá0áp$ÖfŸßÉh$L˜ñ›L¦ëfü=©?4<ŒR©Äh0 Ñj±Ûíh5…Ÿ×‡ÕjA©T"IRô™Ðj ƒ¨ÇêáõúHL´âóùpº\ôL&#^¯»ÃÉh$!!á{#‡ikk»ágŒ‚ àö¸¹rõÊÍÍøu:÷Þ}×gjQ ‚@Ò§öK®9¿Y3fLØ›IÛã8}ä™ãÒ+ÇtµØù ö;ˆî›Ct‰¨ºæÉI‰èt:Ôj ãöε7È?ÞA«ÕêXz»ÝN[[;wßµà:]o“ÑÈê•+Q(L›2%ö{ãè<¯]½šÌŒŒXÙ7zA‘‘™Èxmöñc?>..ö³V«sˆ$ ))16Ö º5ðiõygk®M,€ØR}tÖ-3 q¹¶–ììlA@§ÕN°Qãó ÑŸÇëÂOµµ‡ÃIZZÂØø—­'€Z¥B=VÇñvY)7Ì«Óéb8ˆÚåkíúôõ&ÚM=ðI»>}XïÚ½_‡k÷åZ?~‘„¨ÝOKMð»ñ÷Î4î‚ ÄʽÖçãË1Ž­,_Ãl6_׿·ʇ~è¿çççc4|9Ýê¯úft³ù¾j9ÒØ^ÏœY³&<Ä_…`(DJr2S&WÅý§ÉHOŸ0x¾‹ÅBA~Þ÷æ SF滈 $ZÉÍÉ™à ¾i"‘:Ž9³fNpè_…@ @qaÅEE²}ùJˆ¢ˆ},8Þ§`(Ȩmô«}Çÿ]F¡P0¥ªê¹VœÙÌÌÓou“dddnA˜TQþg/G£Ñ|c6"=-í¦&22_ù4™ŒŒŒŒŒÌm„ìøedddddn#dÇ/#####s!;~™ÛÙñËÈÈÈÈÈÜFÜô©þH$B$™ðíy$AŘŠJ­ŽÖ˜M¦høGA  âtFUö®Eá …B¨Tª˜lãµOç"‘H4LäØ¿EQÄãñ (ètºX¨] °B רÕj‘D…B$I×]' "Š"ÑïU¯µG’$‚Á`,ܰV«}Z#Šb´}ca<ý~4¼§B$Š xÜnÁP,¯Ëåbdt”œìl92ŸŒÌ×àšÈÕ71Ž$I"ÇÆò7Áµ¸ÿ㯠…P*•òØÿ¸¦´§T*oxï$I" (±àqßäýý>qÓßñ=~œý÷_©,Y‡Ã¼òú:r„ÔÔÞÙðååeœ8y’·ßÙÀé³giïèdRE9ý¼üêk=~‚ÓçΑžžŽAo௼BzZ»ÆâþOŸ6NÇé3g9xè0S&Of`p7׿Þ}û8yê4CCC”Gã4ï¾÷>¯¾ùç.\àü…‹äfg³c÷n‚Á];q’ªÊI‚ÀÕÖVþÇÿú'Μ;DZ'… N'ÿóý‡ŽåÄ©Sô RTX€Z­æô™³üòW¿¦¤¸KBo¬›-Û·óÁæÍœ<}†ºúÚ;:h¹r…éÓ¦"u lß¹+Ç_FF櫱eÛvÁà„OÞúúû£@uшm==½˜Íæ/4öƒCC¼±þmJŠ‹&Ùù:œ¿p‘þþ˜´¶Ïçã•×ß 1ÑŠuœx×­âfúç¢(ÒÝ݃V«ùLû52:ŠÛåþRAy¾ç/^äÀ¡ÃäçæŽÉ1gÆTõDQdï¾yÓ&Î_¼ˆÙlbóÖmdffÜVÊ{¶ïø.—ëêØ¾s'ó×ECS{?þ˜œ¬,|>Ý=½¸ÝnvíùˆåK—0{ÖL'†§NãóùùÛŸþ5.—‹D«•H$LOO/~¿›ÍΙsçØ¾sO>ö(§“þ¼>¯½ñ& üà…ðz½1§чojÕdî^·„h4¯è Ì  288KëõúP«U¼øÜ³  z}LO; áõzxæ©'1 üéµ×©(/cre%§Îœ¥·¯ó«)ÈÏçÞ»îbÔfã7ø«W­¤rRÇŽŸ »·wÂ*Ûíæ"`2227ASK .·•REFz:­†×ß\O^nË—-¥··õïnàé'§¨¨p8ŒÏë#“4É3 ÒÝÓCk[;­mí„Çiº_C’$†GFp:X­V, ††‡Q)Uèõº±°Aâq¹Ý‚€F£"¢H__=½½4_¹Ââ… ®+# a³Ûc«”f³™ø¸8ñqqØívT*Õ­køý~zûúQ(232P( ‰DHNNŽÅÙ÷ú¼ˆ¢DvV& ¼õλ<ýÄ¢Óéèíë# EûS£axdŸÏßï#++ ›ÍÆoþðܹr9Ó§M».âj d˶í8.}èAÒÒR¿±Õ ¯ÏG?¢(‘‘‘ŽÛíf``p$BOo/@0–¶§·—»v1Þ<, ¨”Ê i‡†p:¤¥¦b2™ƒô Ii©©"ÞÜ´ãW æÏC_?gÎãä©ÓÌž9¿ßý»B@«ÑPŸÏñ“'ÑëõÌš1…BA~n.ÇŽŸ`ßþý,œ?Ÿ¸¸8œ. EÔIªÕ*î\±‚ººz.ÕÖ¢T*Q*•tuuÓÛ×ÇsÏ<ÙlfhhƒÁHp,.õ5š›Ðê4X-V–-¹#¦ýQFFG9xøZ†ysç7öS@@’ÀãñŽmDãbŒ0<2Ìã>Ê…‹Y·úN’““0 ˜M&ÒÒRIKME§ÓQWWÏëßFÚ;;e§/#ó ‰D8}æ,]]ˆ¢Èª+¨¹|™Ö¶6 CCÃÔ74ðáÖ­<öðÃ||àƒCC AzzO=þ»?ÚG}}=‚ ÀíqßpæÛÐØÄÛ6`IH ¬´”eKî`ý»èììB¥V‘ÏäªJ.×Öñ“ÿˆm;vbÐëc[Š£68€Éhdpp膎°§·—þ×_’ž–†Bÿƒžç÷/ÿ ¥RÉO~ôCþôÚë,Z°€9³gMÈëóùxëwéï %%™ûg3gÏq±ºA€ü¼ÚÇøa'I¹¹9¬^µ’Í[·144„ 1ѽ^O[[?ÜÌÏñ¯\º\;¡n:“ÉŒ^¯Ðã<®0qïM¥Ta21™Í¨UŸD8NöîÛÇñ'Ysç*Š‹Š9wþ£6áPˆŽÎÎ1™È¨&öµºµ•Z…Á Çh2~í0ž222QT*w®ZÉ^z‡Ã‰Õ’À´)S¸û®µ¬]³šÅ‹RVZÊ^z‘¢ÂN'óæÌæoòWôõõ³ïÀA.VWóü³ÏòÜ3OaµXÆÛOp{<¸\n ¨ªœDË•+´¶µñ“ÿ%‹át¹ƒøü> :ë½&B34<ÌÁǹkÍþê‡? /7'f#Æ='¥åé'Ÿàé'Ÿ¤`€‹Õ5 ÓÛÛËù‹±;Ý@µ®±©™îž~ú×?æùgž& qôøqyèA~ôÒ‹\®«§¾¾ƒÑȳO?Å’Å‹hljbþܹ”•–òã¼DZZ*»öìA©Ta2›8pè‡A€û﹇G~ˆæ–ª&M¢¼¬Œ§Ÿ|‚Y³f^W—Ô”æÍ™Ã¢óyòñÇÐé¾¹™snN æÏ#''› «±Ûí(Â8ŸñÉO“«ª())æÑ‡$+33º×/D"aö<ˆÝá$%9™SgÎÒÝÓÍ]M™6uêuz·_mÓY’X8>@Iå¸=ž ("Šøü~f͘NyY)ÿøO?£åÊU, ¤$'ñÄcòÞ›8uæ sçÌïž‘D‰ùóæRßÔÈŽ]»™2erL6ñØñ,Z¸€¾ð<¿úÝïc¢o€Ó¦Máþ{î¸n#ã÷û‘H„””dV­\ÑhœðF.JÉÉIüè¥ÉÍɉH¼P]Õbaxd„8³™SgÎP9©„±× )Ö5”óðpæÜ9vìÚ}«ï³ŒÌ_<ãEp´Z *µ*:Ö%il©]ŠE…BqL}íš§Q*„#Qõ2I’ƒ\[–S(TV”óü³O³ïã446²xÁ4j ˜Æì…B¡ FÕIƒAÐé„¨Ý ‡Ã(”c6eL#> EµC%´Z ñqqÄÅÅ‘™‘Á›·PYQŽ×çeÓæ-L™<KBÁ`pÂÁÁ@ €(ЍTª¨Ž-F£Q£VkP(DQD£VG' c{ïjµ*Öf1=(g2),( ²¢ƒAD3‡Â±W¥R$F ‰D"”ßT*ú†{Ê_I’8xè0MÍ-deeFí¶( … …È‘`0€$IQ™õ±”j•¥Bˆ‘@ @0Âh4š’ÂÁnæôÙsèÆ$s‹ ?yV©T(Ê uU«Õ(• ”J%5—.ó‹ÿj•š¢Âº»{øÕo‡J©dö¬™,_ºtlùH@£Ñ T~r´·¯·ÛÃßýô¯IMMåÜ… lÞ²mìì‚:Z…0¡®=‚  V«‘–ÊÈ|=Ô*uÌ¡ªÕjTJ%%ÅEì?pƒ^Ϭ3IHHàµ7ßäч" ±kÏ^.T× ×ëX½j%Á`ÿxåÌf3@§ÃɆ÷7ârGµê óóÉÊ̤úÒ%|~Fƒ‘Šò2Ξ?Ïïþø2v› ‰ìÌ,vÙöò»?¾L[[w,ZD$Áb±Ÿ—˦Í[HKMextQÙðÞûtvuƒÉIILŸ:Fƒ„„B¡`ê”É=~œgŸz‡ÓÉ‘c'xîé§‘$‰wÞ{Ÿîî¢êt«V,'Îlæßó[rsrXsç*fÍœÁúw6 R))).¦¼¬ŒêK—@…2j[- ñ¼úÆ›<ùè£,[r'NF¥R‘;öÕ‘z심kvK§×‘——ËÆ?!úõÔGïG!Dë+WPTXȉS§ùàÃÍr„¶öv’ ƒ=vœþÁA” åm©Ž*lxƒ´lé2’“’¿T§ÓI $9))ö;¿ßÝá >>»ÍŽ5ÑÊÈÈCCÃh4²²21›L8zûú ƒ¤¤$“–šŠ$I bµXp»Ý(UªØ’ÁÁAıÃv»ƒ¡á!AAjjJL`xdÕ¸¼=Ðqmï­·¯/úéݘj—Ýá !Ihµ’’‚ „Ãa‡†HNJŠIJúü~l6i©©±ÏIIMA¥T208ˆ%!Nw]ÿx½^œ.©c×—‘‘ùj  ¡û xphˆD«I’èîéÁl2‘’’ÂÈè(6›Ô”~õÛß‘’’ÂŒéÓ(ÌÏ'>>ŸÏG{GGì@]Rb"Ý==„ÂaÀd2b2™èêêF’$òòrIˆÇétråj+µõu\¹ÚÊÿõ_þž¡¡!FFF±X°Z¬cŸƒÙd¢£³¯Ï«×àà ^ot…R«Õ’œŒÛã!%9¥R‰?`xx˜””ÄH„¡áRÇìKgg^ß'y³³²ðûttv VkbjŸ½}}D"222¢‡ûFGIINÆëóáóùHINŽõOFzšÎ®nœN'))ɤ$'34<•Ù;«š’‚Çë¥`€”¤$"‘þØD&-5•¸¸8º{zP(”df¤c‡û|>-W¯¢RFízBB]˜L& v»¢ÂB4 ‘H„Á¡!, ‡“Ñ„ÓåÄf³QXPÀð˜?JHˆ'==ÁÁ!úúIˆO /7'fëÿÒ ‡Ã´µµMX•¹† ¸=n®\½róŽ_FFFæ»N$áÿó¿°pþ<–,^ü]÷Üù ìܳ‡ÿëïÿ³|~Gæ;Ç—uürT ™ï‚ °pþ¼Øù oŠÌŒt–/]*Çäù‹F~zedd¾w(Šot¦ôôtÒÇôÈÈü¥"Ïøedddddn#dÇ/#####s!;~™ÛÙñËÈÈÈÈÈÜFÈŽ_FFFFFæ6Bvüß.—‹êšB¡Ð—J- °×ë¢ß_:.‚_2¿ŒŒŒŒŒÌWAùÐÃý÷üü|Œ†/¯¥lw8Øøáf²220 7UàÇR}é2—jkÉËÍårm-~€Ý}DBB<ñc*yר·ÿdggÝê¾ú\Ž8Áñ'™={n·›n&s¬DIÂårqèÈQúúû±ZP©T|ðáf 3#ƒm;v²yÛ6Î;OrrI‰‰·ºI222·þ¶ïÚM~^ÞÚÉñ„#œNæ{-´®¡ÓgÎ’‘‘·[¶šœÓ!$‰³çÎñÞ¦¹t¹–8sûöï'e\šÛQ±Ûí7ÔN`(Ȩmô«ÍøÛÚÚihl>Q¥ …B„ÂaÜn76›p8Àñú|ƒAü~?ÇNœÀãñpér-Á`§Ë…×ëåÂÅjÚ;:°Ûí±kúýŽ?Ž ˆ åx½>@¬ãË‚k³fgL"XE\c׿vM'B÷Ú¿Á n›ÍFdL›[EN'n·›`0kŸÝáˆÍÈÃá0@¯×;Ö®“Ìš9­FC[[;MM±˜Õ¡`6oá·Öóò«¯²mçNÔj53¦OçØ‰“„ÂaæÏÃ_|ÄD+{÷}«‹ŒŒL”ð˜ÐÖøñ°Ùl±•3I’ðx<¸Ýî˜ñóù|8]®˜¸ÑXöûýŒÚl1Ûàõúp8øý~D1*¹ër¹ðx<±²ÆÛ·O cã8 …ðú|ŒÚl1; ñùüʽ†ËíæÒåË_h'?Mgg'¿ûãéëï¿a·¿"‘N§‡Ã(Š ÑÐÔD0¤æÒeÜw,­Ífc㇛IIކ‚÷ù}Ô\þ$ßïÇápÄîÇž“Û‰¯À§úÒ%Š‹ Ù´e+3¦M£¢¢œW_ƒªÊIœ>{‡ÃAvVKïXÌ[o¿ƒN§cÁüy¤$'‰D˜T^NSs3HÐÞщZ­Áëõòá–m|¼ÿ 3gNgÝš5´¶·!‰–„~þ‹E¥R …¸ÿÞ{I´Zyówp¹\dgeq÷ºµlݾƒ‘ÑQòrr¸ç®uìÚ³—–+WIL´òèCÒÓÛÇ®={G"Ì™5“¹³gó«ßý$ §ËÅì™3¹{ÝZvîÞÃåº:Âá))I<úÐClÞº-ü‰Gáȱãœ9wŽ„øæÍ™Ó墨°€‹55T”—a{Ó¼¦æÕ70€BP©¢jVE…¼·ñ†††ÈÉÎÆápb³Ù)(ÈÿÆâ]ËÈ|E‘õïn ··—@0HeEw¯[Çæm[iljF’$äazz{9yê F£{îZ‡ÇëeǮݨ”J–,^LyY)ÞßÈàðð„±|êÌÔj5j•Šÿð ±eûvDQÄétò£—^¢½£ƒ“§N!(¬¹s)IÉüþå—ÑëtÌ›;‡¥w,™ Ƶ}×n4j5ëÖ¬æÝ÷Þ'%%…¶övzûú0 <üà¼÷Á&"á0EEE3gL'>.>ÚDÅÐÆ¯fœ¿XMcS3 …‚p8L¢ÕSìëîéaã¦ñx½æçsïÝwsüäINŽ>'w¯[Gñ ä¿ÏÜ´wq»Ý´¶¶2kÆLRSR8vâM  QR\ÌŠ¥K™3kçΟ§©¥»ÓÉÝëÖ1cÚt.×Ö‘›“M\|t™JB¢¯¿§Ó‰ÙdâñGæé'ŸàÈÑcôôôP[WOnn6jµš¡!î¹ë.¦Mʦ-[P«U¬Z¾œ9³fqöüy.\¼ÈåÚZÊKK™=k&¡Pˆ³ç/––Êâ… Q(•lÚ²FKZj*[¶íÀf·322Êò¥K¹kíΜ=Çåº:Î]¸ÀóÏ<Í‚ysåä©Ó\º\Kå¤ ª/]âBu v‡„øxžxì”*%‰V+n‡Ö¶6&WVÆLI’(ÈËcÕòåܽn-ÙYÑm ƒ^J¥Äãñ‰Dx{Ã{èõzV¯\ù½Z¢“‘ùºH’DWWÅÅE<þè#œ;ƦFfϜɪåË ‚A8¡³«‹­Û·“™™R©dûŽx|^lv;w¯[ËÌ3®SàÌÍÎæôÙ³\¹ÚJcs3E…,Z°€%‹ÑÖÞÁ…êj††‡Y0«–/¿q`áóídww÷Ää‚ÀœÙ³(.*âÙ§ž$//ïVߺ¯LVf&«W®¤¬¤„ƒ‡3j³!(nl«&M¢¸¨ï»“É„Óå“?ÙóÑ>†GF(-.fß´µ·S]S{N’““n²fùÜ´ão¹rA¡ ¨°€™3¦308ÈÖ;˜RUÅ¨ÍÆŽÝ»é@”$‚ f³™Üœ¨ónhjbÚ”)(×ôA! D¥#M&Y™€@__?cé¯éjçdgQ9©ÇC}C#»ö쉖IKMã…gŸ¥µ½ ï¼ôÂs„ÃaÞzç]ZÛÚp¹\ø|>  æÍE­VG•²R’IINA©R22<‚R¡$5%…øø”J%6›P(„mÔÆŒiÓÈHORRRHOKÓèŽJð¶´\A¡PPXXÓæÖh4,^´§Ÿ|œ'}”ùsç T*‘¤¨œ°R©"g6sÿ½÷`§:(## T©HKM¥¬¤„¸ø8:»»ùèãýT_ºDDŒ FDž|ìQ²³²x÷½Ô74°æÎU,œ7­Ûwpìø FFl„Ã×åÄD+ÉÉÉÄÇÇãv{p8¤¥¦`µX1èõx¼žè6¡ÓE¢ÕÊôiÓˆ*ñåädg6_Wç²²R4 ïoÚDzZ::Ž»vqåj+ á÷ÐëtdggcµZnð²/}§Ëu]¹f“ FCbb"Ú¿`ÉÙššKì;p`l›&2¦¦ÝÞ$‰ñ;ZFC\œÝØ«$I„ÃFm6‚Án‡ó摘hå‰ñÏI}ínê·ÎM-õ‹¢HÍåË¢ÓéHOK#5%…£ÇOðƒž§¹¥%&•¨Rª¢o«¢}[ïî"ŸŸO `Ôfã£ýû ƒx½>>>pQ’°Z-Q©JŸŸ‚ü|ìƒìؽ‡îî¦TUµÙ)((@­VÓÛßG  >.Ž®®nijnÆl2át:Q f͘Ak[ñqq$%&¢V«Ç Q)--áÐÑ£¼üêk¸\nBÁ S&WÑÔÒ‚zl0%$$ IŸì ¥§§£R©èîéármE……ôzΞ;Ïù‹ùá‹/ P(ÈÊ̜ПÃ#Ã(•J­C!†G†oõó #óD º7üä)ººº ‡ÃæçsüøIÊËËÐh4‚A.×Ö¡RE_¤‡††AŠîïj4j†††Y´p—j/_7–%I@’¢6 .ÎÌäÊJ6¼ÿ¥%Åôôõ’‘–FUå$DQÄj±‘žŽ DóHbtïëŽø¼>$$²23Y±l“«*ùãŸ^åÿù‡ÿÇCo_999¨TQíxQ’D‘H$ÂŽ]»éDÀ’À¤Š lö϶“‹«ÅÂÛïnÀ;VnvV“«*Q«U¼óÞûÜ÷Ýdee~íþÿ¶E‘Ž®.B¡ƒ•J‰Ùd¦¥ågÏ'ްkÏžyòIââÌ E½8fÏ£R½"ûöï§´¸—Ë…Ñ` ÎlF!(¸X[{NFm¶[ÝÜo›:Õï÷û9~â$‹Ì'99AÈÍÎaú´©–šŠÉdB£V³pÁ|*ÊÊ(.*"=-‹55ôzæÌš…^¯'5%…8³9š7?Ÿ¢ÂBL&I‰‰¬]}'mííèõ:fϚŨÝΉS§ÈÉÊ¢¢¢ŒåK—““ƒÉhŒ•U_06À5¬¹s¹9Ù¸=nB¡0K—,¦ªrÅÅÅôzBá0餥¥‘•™IvVfte";‡Â‚|*'U FDlv;ÿÿöî+:Ž+Mðü?"½C"‘™ðÞ–Þ‹”DR¢lu9UWõÔ´Ûž™>=û²{vÎÙ݇>û°;»;;gçÌLÏNÏt×”ª¤’T²$%J¤èDo„÷Þ —>3"ö!@‚É’м¿s$’È›7.2㋸qïý¢Ñ(?þá)*,$ áLI!7'—ÌÌ ò¹ºÍf3ƒƒ 2??ŸlY–Iu:ÉÊ̼ãj^UUŽû‡ÃÁ¾½{% £ÉHnvvrP   š¦qáâet:y¹¹¼òÒaJKJÈÍÉ& ³±¶†m[¶`2™ðülß¶•½»w³ós”•”pèÀòóóÈÏË¿ã»\Xø.g¤gPTPÀÆÚZRRRˆD£ô pà¹çÙ³k'²,‘››CFFyyd/%íñû8vR©x½233ÈÍÎacm 5UUx=¼žÄ8§];w°±¦†ò²Ròrr0 ,.ú±X̤¦¦âv§-_Î=Ï“©N'‹·í·¨°Ò’R¬V+¹99X,ß¿ôÁ’$‘Ÿ—‹,ˤ¹\ìÛ»—šª*<™lÚ´‹ÅBAA>ƒ½^GNv6yyyäæäR\\DIqQb|Ùž=dgeGðzmEQˆÇ•;Þ»Òý”_Þ—¦iÄ–ru¯u\'O¦¹¥…p8¼êÎ[Q”;¾D±XŒÞ¾>NŸ;‡¢(|uþ™éé¤{½ÌÍÍsìøq‘ðÒ~áôÙsüÿåø¯¿úoüæí·‰Åblݼ™õõ,.úñz=<·?v»wßÿ ™‡\žªª&¿›·Ÿ4MKæ[¿ŸòË?[þ¯uîREQˆÅb||ôCÃÃwôÖ­Õ‰Dh¼u‹ë7êîûØE!~[ý¿©gï^¯¯u[) ò›·~ÇàÐÐcÛƒ¸²Múú¸péÁPˆ“§N3»bý@ Ào÷‹~?‹‹‹ŒOpòÔ©d™µ>˹žF5¿±©‰Âü|ŽŸ8ÉÖÍ›(*,äÃ?¡¨°k7n07?Oue%;¶oãã#‰œÖÛ¶n%+3“p8Œ×ãáßÿÝBÓ4²³²…ÃüäG?¤§§—¾þ~JKŠ9~â$šª"Ë2¿øãŸ‘“McSÊÊhhl¤®¾žh4FjªUUñüñOBvVŸÿœžÞ^ øÁë¯qõÚ5®×Õ[£|nNÇ¿8Ak[;…ù~á>9vŒ‘ÑQ²23ùã7~Êàà'¾<üðõ׈F£|öùç\¿QGII1?ûéOhimåÌÙsè ^{ù% 8ûÕW\»QÇøø8v»¿ßO{g¯¾tY–iko'5ÅI~^’”XC ¥­Ÿo–šê*4 JŠ‹ðûýtõô°mËf òóÆh0 ?‚Õ a½©ªÊï?üˆáááÄšë^‹‹~ŒF¿ü“_ðÉÑcLMO³yãFžv?9º¨o+ÿ‹_ Óéßó‘¶nÙBMuïô1 TUTðú«¯põú ®\½JJJ ¯½ò ¼ýÍföìÚÅ pî«óÔ54àr¹øÑ~€Ýnãè§ŸÑÕÓCOo/;·o¿ãXfçæøäèQ^õU$$ŽŸ8AiI1ç/\$²ÿ™gp§¥ñåéÓH’Ä‹‡QUY±jgÏ}Å­æf z.W*YYY<³g79Bue%­míÉG„ÊùÑ~€Á`XµKW®òÑ‘#´¶·óÆÄî¥\‹¶ŽŽûŒh,Ñ&º¥µt:yÕZ+W¯]§áæMâ55˜Íf*6l@§Ó!Ë2¾ÙÙŸZ<÷MÍÍœ»pƒ^Ï믾BaAÁzî#õÀwüáH„ŽÎN¶oÝŠ¦©œýê<ýÜjnÆëõ²kç¶nÞÄÉS§hnm¥¹µ•55”•–ÐÜÚBVf&&“‰¦æf6ÖÖ••IcS±XŒñÉ Ú;;™˜œbxd„W_~™@ Àµë׉Åbttv²±¶†Á¡!UåÐÁç¹vý[·lÆl2qîüê¸pé5ÕÕ\¸t‰†›7B½Kùú†›446òG¯¿ÆÞ=»±Ú¬lÚXËþ½{i¸y“3gÏñÁÇS[]Å_ô¥äD›6n䯿ʕk×èèèäÝß¿Ozz:ñXŒ?þ„žÞ>¾8yŠWæÐFY\\$;;MÓhlj¢bCy2)¦ièu:vïÜÉÞÝ»ÈÊÊBUL&V«•ééDö¾sçÏsùêU~úã'SP “LÓ4ÚÚÛÉÈÈ`ÓÆZnÔÕsø…ƒŒÓp³‘“_ž¢`€ò²R>>r„Á!:ººÖ.ßØÈ—§O3;7ÇOücjkªqØìÞ±tî:}š³_ç‹“'9ðÜs~ểAϳûö±oï^N=KK[=JYY}ýýœ<}šºúšZZøãŸþ„íÛ¶®y,6«•ñ‰I®]¿Ask+Ã##dge±ß3äåñÉÑcttuÒ×ßÏÞÝ»ÉÊʼc}ýÌÎͱß3ÌÌúè@Õ4ZZÛ™šž¦½£§ÓÉ‹röÜyf|¾;¶QZRL^n.Ï?»Ÿ²²Òõþß!ÍåâÙm2;;‹$­²Š‹‹ÈËÍå¹ýûñûýLNO!‘ÈžøÅ‰“+>Çèíëãø'‰EcìÞµû.'ÿ$xà;þ¾¾>b±p¹\üêÍ7ùìó/¨¬¨@§ÓqñÒ@#  q»Óزe36«•––6žÝÿ :Ž´´4¶lÞŒÏçC^Z)O'ëÐɉ+¹ÌŒ *6”“““C8¥¯¿ŸX,Ά²rZ[ÛÈÉΦ¬´¯×KA~>£cãLNM24<ÂìܸÓܘL&d|×òýäçåQ]U $®Æëêê †B„Ãú‡ÃìܹgJ ȉŸ—GIQ»Ññ1&&&q8H’DVf&£ccØlV6Ö֋ǸÕÜ„$IȲŒÑ`Àçó1<<¡'ÛV’$ž{v?%ÅÅÌÍÏQ]U…N§CUUŒFcr%±Ñ±q^õUÊÃ/« |4Àh4RX;--™…Îëõ²¸¸Èàð0>ŸÞÞ>²²²Ðét †»–ïdËÆÉïÐÀà —®\4Âá0]ÝÝØl6¶mÝ‚,Ë„BaŒFE……˜Í&ôgu  3ãóÑÝÝÉdÂa·384D^n.¥%%46513}çcM£ÑÈž]»8÷Õyt:{÷ìbnnŽ /‹Å Ä¢1rr²Ù²eóš9JdYGñR&Ѻ†z$)‘Ï`ùNØ`4RR\Lyy‹…h$zÇ6Ün7)))”–?²bttŒ —¾n“H4šìVÝñ;Nìv;y¹98SœH$^‹Ç•ÕŸÌL, ?ùÑùâä—ûì8oüøÇx<žõ>ÜG꿦iÜjn¡ ?‡ÝŽÕbÁa·sîüþÍ¿þ?hïì`l|ŒCÐÞÙ‰ªj(ñÄó¯ññ (/-Ãð'Ÿ‡Ûl6B¡_¿@GWÑh4ùZÛÚ“ªºªŠÍkyÿà G"üÍ_ÿs>øè#EaCyÃ#É|$E.§IDATcUÐ4¦¦§¹~£.™C¤¨°x<ŽžÄ+5•+×®sîüy††‡Ac©®Jò˜cñ—®\ÁçK<ó¶ÛíÔTUbµZ8}ö&Sâ¢æq¡ª*×ëêVµ‰Éd¤`€öö"‘—¯\Åëõb³ZaEÌPTNG$åF}=y¹¹D"¶nÞŒÙlÆn³166ÎÆÚjŽûŒöŽjª«Öû)Ý?{ão‹ŠŠ°Y¿¹»#sü‹ìÛ»‡ìì,dYÆíqSXPÀ¶-›ñx<øæççÙX[CUE%é^Š ¿DUá¹ýû$ ›ÍFQQ)v»îž^22ÒÙX[KA~i®4 òóu2®T'õ 7yfï²³ûÍÊÌ$3=“ÉDIQ1‹™to:[6mÂjµÒÝÛK<§° »Ã~×ò›7mÂf³ÒÙÕNÖQ[SA¯gtlŒòò2vlÛÊ–Í›bfÆG^^©©©äå‘––†Áh¤²¢‚Š å 355Ezº—ò²2²23ééíÅl6³±¶–ò²2f|>ººº™žž¦¨(qÅ…™˜š¤¬´äŽçpõõ tvwóG¯¿†Ñ``l|œt¯W¤ ž*:ŽÂü|RSwwÅE… zòsóزi#ÑXŒ¾þ~ úľÅj¡`òyË壉·)))ÔTW †箚vïÜIIq1]==„B!Š q8ìa³Ù°Z­lÞ´‘ÜœzzûX\ô“““CņrlV+=½½x½^¶lÚ„¦©ttv df¤“““ƒË墦ªŠŠ ð¸=LLN¢ª*[·l¦¬¬”ÌŒL ò󘛟§©© €?ÀéL!/'—ì¬l22Òñz<ÌÏ/05=CeE5ÕU¸R]äç‘êtb2™(,, «»‡‰ÉIšªRVZBaA>¾ÙY232p»Ýëý+N’$ çë6Ù²y3›—~LJ²’æ(/+Ãd2!I&“‘â¥^ØÒ’b<óss¼pð:ŽÞþþäï`hˆŽÎN6”—qàùç°Z­ë}Èß UU™››[sТ$IDcQ|³¾ËÎÇ#==ýŸ-OMM$á}ˆ.UU!=ãÁ÷û¸ç׿}‹Ã/¢¬´ôÓò*ŠÊ›o½…Çíæ¯½ºÞÕASßIv>½^Ÿþ ¼Þ‡Oû+Ë2ùù·ßÇMFz:þË‚ÛíÆh4ÞDZK¼üâ‹8)ë]uAá Òò>b²,“••ußå%IZsT¯ ‚ < ±d¯ ‚ EQxïƒéèìz¨Ê óö;ïríú šZZ}k} ¦gføõo~ËüüÂ}•W…OÎÍÆ[ƒAÎ~užÒ’$I¢þf#G>ý4™K{~~ž÷?üˆ¿ûÏϯ~ónÔÕãñx0 \¾z-±=UÅn³ñÉÑc\¹vm½›C¾¢Ñ(¿yûw Üwîú+W¯qòÔ©õ®ú=éȱO™œœZïªÜ—–ÖVŽûŒE¿Ÿ·ß}—‰õŽD"¼ùÖ[\½~ƒ«×¯ÓÙÝÍïÞ}oUákµ€OKk™\»qƒšê*2328wþé^MMÌÏ/°±¶†Š øêü‘åådd¤37;GvV&~ü ‘H"O¶ªª<»o#££Œ““ÍÕk×ñX,^}é%\®Tš[[ÉËË%;; I’¸|å*£cc‚A¶mÙBUegΣ­½wš‹—^|×mëÙG"¾8ù%¾ÙY”xœÌÌL†‡‡)**âàóÏ1??Ï—gÎ …xvß3äääðʼn“w-ï÷û9uæ,333<³w/V«…Sg΢( {÷즪¢‚k7ê¸ÕÔDnNÊËæÍ·ÞÂb±ðÒ‹/PŸÏ¥ËWhïè ´´”ýÏì%‹qúÌzûú¹ÕÔLUe%ƒƒ„Ã6”—%’ 57SSU•\ß_–utuwsõÚ5zûúرm:Žšê*N9Ë ð⡃D£QÚ;;ñûýëýù„û¢ª‰à###C!rsr˜˜˜Àápðê+/#K§Ïžcl|œ­[6³©¶–¯.\`xxò/¿Œ^¯ãìWçéë罹ºŠò²2Nœü’…ÅE6ÖÔ°wÏnÚ;:¹|õ*6«•g÷ïÇçóñÁÇã°Ûyfï¶nÞLSs ×oÜÀëõrèÀó˜L&.]¾Bsk+mííÔTWßq, \¸t™ýûž ._½JVf×nÔÇÙ·w6›ëuõD#vïÚEIqѪm446ÒÓÓ‹¢(¸Ýix=^jª«8ñ"…ô 266†onŽÚê*žÙ³ÝmYþ®ß¨ãÍ·ÞæVS¯¿ö*›7n\ï_ó*}ýœ:sEQØ·w ±œO’¾þ;Àúz._½Êö­[1:˜Í&$Y_C¡ÐªÏÆæäâå+HÀÁçŸêI{à;þX,FKk+[·lfhx˜ÓgÏ1:6Ɖ/O¡iàõxñxܼ÷þ‡4ÞjâÓÏ?G'Ë8)´´¶âv§a49öÙqtz=ñ¸ÂÉS§ G"ôöõqñòú8wþ<ÅE…457sùêTU¥¥µ•MµµtuuÓÜÒÊ©3gÆd4òæ[o388„Ål¡´¤ˆú›|yæÌõD"œøòK¬ 3³³œùê+Š‹‹9úÙgôõðÁG3:6†ª*üæ­ßáóù8qêÔšåûøèÈQÆÆ'¨ªªÄáp Ë2¹99È’ÄïÞ} —.süó/(-.&{)]¨,ÉTlØ@<OÜÍߺÅÑÏŽãñzøôøç457söÜ9›šÙ±}nw"eæÀà))sóó Œ¬Ê*FIII¡¼¼œêªÊäã¯Çƒov–P8L4åwïýI’سk×zþá¾hšÆW.°°¸ˆÙlæÃO>¡  €«×op³±‘ÓçÎq½®gJ o¿ó.Ã##œ¿xiíò·9wþéKé|K×ùyy¤§§óáÇŸÐÓ×Ç[##%…ëuuœ9÷Í--|~ò$kkÈÍÍ]óXôz=×ëê¨o¸I{GW®]C§×'Ïo¿û·š8uú4)))X,æ;¶q³ñ×nÜÀëñÐÜÚFcÓ-UåÜù rþâE&&'ÉÍÎæ÷|„ovöŽm8Nv;¹¹9¸R¿„_²,­j“ù…ùU©xWr¥ºp:ÒÖÞÎÈÈhòâàÔ™³+>ï108È»¿ÿ€á‘²³³P5õköý÷ÀwüCÃÃ,úÔÖÔàNKãÝ÷?$S\THFF:u LOO377Çüü<éé¼tøEv;9ÊÆÚZ Þt//½ø>Ÿ3çÎ-åª×¡“e@¢  Ÿçöï§·¯Ÿùù††‡ øTUTÐÛ×,Kèôz¶lÙÌsûöÑÓÛG[gF½ŽÎ.˜˜X»›Çn·³sÇvìÙ½‹ÓgÏ1>1AkGFƒùùy"á±X Ç]ÊOÐÓÛËŸÿÓ_RVšÈëÝÛ×GÿÀSÓÓLMMSW_Oqq‡Xj¿\.»wîÀá°sþÂEZZÛ§£³‹H4ÂìÜž8wÍÏSó&f³‰×^yY– …ÂX,¶oÛŠÙd¢ñÖ-:::ÂétXXX Í笠°}{÷299ÉôÌÌÇbµZÙ¹};W¯]Çh4°më¬ }ýý‰óÆôt"#`Q¯¼t½þÎÓ´,ËÔÖTsðÀó Œ$Ο’„NÖ!IF£‘­[6S[]ÍW. †îØFaA>™™ìÙµ‹‚Ç0Š¢(_ŸK§§ CH’œ þ+/²³2ñzccc4Ül$77‡‰‰I6”—“••Éõº:‚Á·šš¨Ü°³ÉDCc#ª¢²mëìv;/:¸êK±°°ˆÕjÅd4…)/+Ãó¥à„û¡*ÊÒyAK~ÿ5ME§“ÉÉÉ!‹ñÒ‹/ ×éÉÊÊ"¯Y^Ö%Òzߨo /7—‡ƒºUç®^<}ý\½~ì¬,œ)NTUAU¾>x=²23Ùµ};nwééétu÷pü‹4·´24<‚ÉhdrrŠáÑ$ßÉÜܶoÛÊÑO?#òóŸ½Á‘cŸ~}ÞGQÕĹ…ÅEzz{A t¯w鼚谵XÌtvuÓÞÑÉÄäD¢~KçUÓÐ4¸§³«;ñxO³ÉLfF²,sóÖ-RSSÉHO_ï_ñ׿kMåÄ—§Vµ‰N§c|b‚‘‘QÂá]]defb2™–bFâܪÄ$Y"²Ô‹ìq»Q…ÃKŸt¯USyå¥ÃüöwïpùêÕÇòÂ绤{ãgoümQQ6«í G"Ž;ÆÎ;(,ÈG§Óa4°Z­:ðÂá0õ 7ñÍÎRR\LEÅú¸u«)™û»¨ €‹—/cµXhhlä•—“ærÑx«‰ÅÅDnjX}%¬iŸÿœt¯—m[·07?G[G;Õ+ÆÂ÷on–‚‚|RRD£Qªª*Y\ô“›ÃŽm[áVs ÑH„’’bB¡ùk—ß¾m+ýýÔÕ×£×–ÆÞŒ0::Jvv6Ïïß×ëæÒå+ŒOLPTTH8’_c1› †Bìݳ»ÝF]}#£cdggS[]ÅÂâ"×®_ ¦ºŠP(ÌÉS§éí룧¯;â¢"âñ8ùùìÚ¹£É˜Š‹ŠÖ|_4½kšÚµö«( ÿçÿóoÙ±mÏ=»?ù .±­FãÔâñøš]lkY¾Ú\.Ç“= +·§ÓéîúŒjù˜$IF–¥U?[ÞŽ¦i¼ÿÑÇÌÌL³kçÎUûîfjzš÷þãªÇ‚𤺟ïÙÝʯuîJ|'%dùîá–O²+ˬüÞ>HÝo?oܯå^Ä'íbþö6Q%ÙΪªÞ³­–{f–ˬü]kšF,Ã`0Ü÷gåû Ó××·jŠ÷2I’ðüt÷t?XW¿Á``˦M÷,s·_ÄÝþ²{妿Û~Í&‹yUÐOlëÿðßoЇDƒ®,¿Ö{ïg{kµÝÊŸI’ÄÁçžÅ7;{ßAÜl6󋟽AIñÓ÷Kxú<È÷ööòßôý»›µ. &x?hÝoßßÃìóqw{›¬<Æo:ÞÛ/¢VnkyÄÓêá?iëLÖéø‹?ûS,fó¾±ï·ÛûžÏ;ìö5§ ‚ O§ïmà—€4×ã7EAgb­~AAxŠˆÀ/‚ OøAá)¢ž¨é ‚ ‚ð4’eyi©â;cúÊŸéÑ`|bœ`ðÁSì ‚ ƒºß ‡êöÅËÖÛr}´Ä²‹ß9EQ˜ñÍ (Ê•I, ÷z¼ FB¡ÐîBAƢ‘@ °æêrI’°X,Ø,6fçg‰F#ë|´V«‡ÍÁ‚H4òH‚ÿ½ÚÇj³âIó ·Z­¤{Ó‹«#AáÉ$IÁPƒÁ@ue5:ùÛ]p(‘fš±‰1r³sY×ñ1¶¢(LLMâ÷(+)Ù²¾Ë/·OÓtzm)‰ƒü‚ Âw)‰¢×éÑëôßÉ¿Édbqa’Â" zýºÆ5N‡Ýfgtt «Åºî1v¹}‘ð÷wAáûgy ýï"ð/gAáÑÑV?ç_þû{ïÀÿö¿ÿk&&&Å–ºíUU哣ǸQW‡$IȲL(â7o½M?ðõÝìrWöJ’$±è÷sõúu†F†ÄBß@?õ7 G"ɺrI’%™‰ÉI†F†™ž™fÆçcvn–öÎ&§'‰+ñä{î¶ž$I¨šº*ø÷õ÷óýÛÿ—£Ÿ~ƇŸ|Âú/ÿ•Ööv Ñc±¼À—§Ïpö«óÉí­|mqq‘K—¯ÅVµÙò…Ìr'ÛYSAwü‚ Â#´WÞÝNMO32:†3%…¶öv²23‰F£4·¶288DWw7…øn226ÆèØ8ªª­ºx¸{w¸†N¯c|bœ o:±xŒé™™¥)…áp˜¹ù9dYÆ•êB¯×377ÇüÂ3³3Ø­6ŒF#±xœ¡‘TUÁl4³¸¸ˆ^o@’$æçf±Ûì †ä^—/4UC•Ôäñ+ñ89ÙÙüwñç˜M&Nœ:ÍÇGŽ’ý×ÿ‚ññqúúÈÏËeCy9ñxY–QU•á‘QÚ;ÚIs¥QS]ÅÕë×yÿ£OŸ˜`Ïî]Øl6n6Þ"‰P[]Û–¬ËÊöwü‚ Â#³òn9uvváõ¸9ðܼܳÕD4åêµëœøòF£ei0àñ/Np£¡“É„¢*wnKÕî²Op:Rp¦8bxd¯ÇƒÅb!ŽÐÙÓÅü“ÓÓô ô3;7KOš¦.uKÌÎÎ2;;‹¦ªHRb Üàð0óóó„BA×°¨­¾óNü§!Ë:³ÉÄÎíÛ˜››ãêµë|øÉæøð“#tuw'ïî§§§yç½÷˜žžáËÓg¸rí:‘H”H$‚ßï'‰püó/h¸y“þ~ÿáG„B¡;ÚÄ¿ ‚ðˆH$º½WŽêÇã\»QÇøÄ8¡p˜îž^zûûiljbûÖ-xî9††‡YXX ­£ƒŸþè‡äæäÐÒÚŠ¢(É &Ër²+{Í}˹99´¶·c1›ÉËÍÃïïfaaUQ)-.!ÒÜÚB4Åa·STP„$ÉD¢4Àh4¢×ü¼¼¥žƒi,f 6› ³Ù¼æ¾oÕ¯ª‰ MUQ5p8Httv222JŠÃÁäÔ£cã,?˜ïíï§»§‹Å‚oÖÇàÐûŸÙK^n¯¼tI’¨k¸‰Õj! 35=M ˜X0IÓ´d¯Õ/‚ <:«FõK’ÄØø8S3Ó<»»¿ßOsK v»Á!ÆÆÇ™_X 3#“ÉDOoF£‘`0ˆ¦­' ©wÕ¯¡©³…êÊ*t:]¢*š†Ñh$®(,,.‰FÐëuX,ü~?P ô5 –GÞkZrn¾×í¡½³ƒùùyJŠ‹×ž% ª©HÚòè|US ƒŒŒŽ!Ë2§Ïž¥¨°€œœf|>vlßÎÞ=»ÉÎÊbìô8‹‹>²33q¹\l¬­eß3{q»Òˆ+q"‘(ƒƒdgeát¦“ÍÆÚt:V‹%9®`å¿î¯þê¯þÖãñ¬÷ÇAAx‚I’D$!a2š’wÁ=½½HH¼þÊËäçaµXå™=»iko§±©™p(Lmm5Ê˹rõ:]Ý݀Ħµ¤8É€WâÌ/.‘žžm/IÑXŒp$Œ;ÍÅlÆ`0 ¨*@€Œôtô:=S“„B!rsrñ¸Ý,úýLLMFIq8Ðë è zt::½gн^ÏÌì,±h”â¢;F¢|¾YÒRÓVMÙ ܼu‹Þ¾>º»{ðx<¼rø0ù¹9LLNÑÒÖ†Ï7K~n.F“‘uõäççãv»¸u«™±ñq¼7ÙYYÌÎÎÑÜÒJAA…ù4µ´Ò××@A~^rþ>$zW&&&.]º¤UTT<« ‚ O&I’XX\  á°;î:my$ÿr×t4Å`4"/VÅb(Š‚Á`¸#ÐF£Q†G‡¨­®Áh4&_Ó–îÒeiõ°¶åý@bÊßÊñš¦%Ö­5ÝoyßÝ] FŠ ïXg`~aÎî.Š îì Xijþ•¯‡ÃadÃÒÂH4ŠÁ`@¯Ó-=HôT,×AQ”d=ãñ8ÑX £Á°ªÞ‰  (MMM¢«_AxtTM½çüUÏÁ!À5M[àV–]¹íµæñ'Vó»óç+ãíóñ%IZ5B-‘H„@0@VQæ7órWÿZû¿ý"hå1—ꑸàÑ'_[~}ù¢aùâÅtÛû“m«jb:Ÿ ‚ðèHH‰©mßÑZý‰ÁkŽ,Ëä`³ÙîÙk®*ë»Nÿrû(jb@¥ü‚ Â#óÍsîÿ°m#=ºÐo0p§¥ÝóX–g2<ÄZý‚ Â#¥7è“ÏÎ¥ï @Çãqv`½^ÿìãvw úŠ¢$Æ38D"ŒãnùÛ§ÄL&“ü‚ ÂwOÓ4Ì&3N§31wþ;¸ ¶ÛìØívý‹Œ¯÷!c4šÈÍÎen~ŽP8´®u‘$ »ÍŽÃî_Axtv)Ž”ïän<â›ó‹Åeÿš4 TMK$r¤ j*ñx|Ýê#I².1˜P~AᑹW Ú?t»Ó3S Ò¼^Öÿ‘ºD(db2‘tÈ•êÄêrë3u^Q|>‹þEøA„ï?MÓˆÅbädg'Sè®7«ÅÂôÌ š·ç‘Œ9¸%®Ðê_Axr¬¹lî:Ö%ñçú×K’$$YMdçAžëý`­*­ÿ3‡Û+$¿ ‚ |g¤äÿ¢«_Ax"¬^— Z^’w9ðíKôÞ.'×Ð_µi9ËÞýwÛ¯Õ¡(Jr”¿N§ûVÇ%Ü뱂XÀGAxr¬¤'§&Yôû)+)`dlMÓ(Ì/XUvåº÷ñxœÎî.r³sp:«ÊƒATMþb™Þ{] HHwŒã—$‰¾~¦¦§1›MÈ’LaAÎçª åÔÅ·¯ÉG¤äUO$%“’’rG}–ß%¿ ‚ðÄŠÇb±ØŠÇQU•H4B4%®(˜Íf̦Dª`¿ßO Äð£j‰Ô½Áp£ÁˆÕba`hX,FaAv›X,†?Àh0`³Ùî¹/±æ ¾xI’¥Df!M#¹ð£$Ërb1& TM{d£"ûýz †¢(wo#YFUÕ®ÛÊe!AáQ¸gàƒôööâÈÊÌ"7'{ÕzÁw“˜Â˜Ãø‡PU•Á¡!FGǰ;ì`·ÙdMS¹[Ì\ÄKÓ4úú™Ð0›L$R9ÞffÆÇäÔ$^¯wZÚ}ï#F±Ùì<&=A„§À]¿ªª|øñ' ŒâNsÑÝÓË?þF£1yw+/¥„ÕIFGÇb÷Îw¼¾“å5-±¾òR²•¯ßjjæ£#GÈÉÎ&czñEJŠ‹¸rå*Õ•¤¥¥¡ªêª}ÏÏÏsóV»vîHjm©§@§Kä)^îÉÐHÜÉß^7UUùõoK<'Ýë%55•ŒŒ lVkâx–ê:??Ï›o½…Ùl晽{ðz<É6YÞ®$IH€²´ßåÿ:ººèííãåÃ/¢×’u\®ÃÊ ¬‡éMA„µÜ5ðGc1:»º9ðܳ<»oŠG’$®×ÕQTXˆ+5•Ö¶6RSSÑëõÜjjBÓ ¶ºŠ§Nq£¾ž¹ù9öîÞM$¡®¾£ÑÈö­[@’¸Ùx‹……Ìf6›ñ‰qjªª().½}ýýX­VþäçœL‰ØÔÒÂ[¿{‡­[¶pèÀsX,êPU•MµµttvñþG111Á3{÷àóùð¸=8S´¶¶Q^VÆŒÏG[{;6›•m[¶208€¢¨ÔTW%°ÑhäÅC‡Øºy F9wþ@€¸¢°{ÇoÒÚÞΡÈð¦Ó×ßOwO/.W*µÕÕ Œ0:6N,ccM5ƒCà  Q\\„Ýf#Í墧·—ѱqfçæÈÌÈ`Û–ÍÄãqnÔ7°°°€Ífc˦8WdA„‡¥û«¿ú«¿Md)ZM¯×£i*ç/^¤§¯‡ÝË•Êg_œ`aaì¬,~û»wÉÉÉæ‹“_2<2JZš ‡#…ÁA†GF)-)&Ýëå÷~D$ahd˜ñ‰ \©Nþá׿&/'‡‹—/ãóÍb4¹xé2[·lÆd2¡i6›–Ö6nÔÕÇÈHOgfÆÇµº:23Ò)**"166ÎøÄ$uõ X­Vº{z),( /7‡£ŸÇb1“êtòëß¾E^nï¾ÿ>š¦aµZÈÌÈ £³‹Ù¹9ÊËJ“ÿÔ™34µ´ÐÜÜÊäôNg ÿøß~MVV]]LNMá°;hï褺²’h,ÆÑÏ>Ãf³ÒÔÔÌüü=½}\¾z•ôôt†‡‡¹VWGFF:»ƒ©éiêêo2=3C}CÙ™™œß,CCÃ(ŠŠÇíæ…ƒ)-)¥¤¤˜Ï>K8&‰‰îù‚ü|þûù7|þ9.]¹Æû}LIqy99|þ96”•a³Z‰Çã„‚AÆÇ'(ÈÏ#/7‡W&;++y°ËƒðL&¥%Åøfg‰Åâèõz^8x€W^:œìfדÙÄóÏîçç?û)Ïî{ ÇÍ‹‡±cû6fgg),( +;“çŸ{–±ñq232øùopèÀ ‡ÃÔÖÔðêK‡fçöíüðõ×Ùºesâñ‚”¨[ue%¯¾ü›¡¡aZÛÚxñ…C:ð<^¯q£/‚ |[îÚՋŸQ߀Ål&?/½NO  ºª’_žâÃ#G8|è&“‘ªÊ 2ÒÓyZ,äææ°¸¸H_ÿ&£—ËEUey¹¹Øí6Ô¥gÙš¦.Ø×H<5_Ê™¼¤»·—©©i<7é^ý~$44‡HOOçäéÓ,úýÔÖÔ0:6†,ÉD£Qúúû)+-A–e&&&Is¹ðhìݽ›á‘Þýýdefâv§‹Å)-)Nv§kª†,Éètz4M#¡ª‰Þ€D•5TMEQT4UÅëvÓÙÕEwO]=ݸÝnôz=,…HIqÐÓÛKUe³9ù<¹‡ay¿ƒ‹ÙLsK zžp8,ÿ ‚ ßš5»ú%I" qêÌ.]¹B__;vlc÷ÎX­V&§&i¼ÕÄ/ñs F#gÎ}E]}=6›göì&77—Á¡!ú¨­©ÁåJ¥áæM††HIqàõx˜ž™¡¦ºš™™™Äà¹ôtÆ'&¨­®Æl6ÐÚÚÆ'OÒÒÒ†Íf㯽Š;- EQh¸ÙHZš‹4—‹ŽÎNæææp§¥±cû6¢Ñ(M--äãJuqåÚ5‡‡±Z,”—•ñÕÅ‹´wt’•™ÉžÝ»h¼ÕÄøÄ•6$pGW'í]´u´322JvvÁ`šª*Á ñ¸BaA>3¾Äqädg37?Ïõu Ák¯¼L$ÅjµRR\ŒÇ㦹¥•õõ¨ª†3ÅI<Ç•æ"Åá  ?Ÿá‘JŠ‹©ØPÎÕk7hikedd”={v?ÐŒAA¸ÝrW¿téÒ%­¢¢bÍcªª‰D’]äË]æ'¾ü’žÞ>þÙ_þ:ŽX,N8Âd2%ó «ªŠªªèô:dI&‰ ( &£19ò}yÚÝòvo¡¯i±XŒ¸¢`6™ÐétÉzÆãqdYF–e‚Á ²,c\±íx\A¯×!I`Y’’¯Gc1¢‘‹½^çL£ý—ïÈ%IZóðõL†åŸ/ÿlùï±X N‡N§KÎý_~=‡1Ýv, !ËR²-–·32:ʯÞü-óÏÿ99ÙbpŸ ‚ðÐ$I¢½½ýÞóøeYÆb±$ÿ­iÑh”¶övíØÑ`@QU =ƒãŽ÷.RMÓ¼8ÎÊ`»òïËeŒF#Æû_¦×]u«ÕzÇû †¯_·ÝöºÉh\UŸÛ÷ $ƒ÷Zu^™jqùÏ•]õËÿ¾ý"F§Óa³ÙîØÞÊzH’D[{u õLMÏPV’è-A_Aø6IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/files_write.txt000066400000000000000000000010671330160122500240510ustar00rootroot00000000000000This screen shows files types to which a process running with the '%(APP)s' type is allowed to write. The description should give you a decent description for what the application is allowed to do with the type. If your application type is being denied access to a particular file, you might want to change the label of that file. It is recommended that you use one of the types defined on this page. Note if the label of the content that is being denied is owned by another domain, you might have to write policy or use 'audit2allow -M mypol' to allow access. selinux-python-2.8/sepolicy/sepolicy/help/lockdown.png000066400000000000000000001426471330160122500233340ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìux7úÇ% /ïší8ÆØNf¦¦M™™™®ýµw½Â•™{eN™9¥´af&³c;föÒðŒ~(Ù:Ô6½¶Ik}žÈ€î5æˆ}CîÆîŸÿÇ‚ö88ðÑŸÏí¯…rùIú©Á‡ò§A4—aƘ 8ˆ€B0¶m#„È!9J¦£–ØÜ•mÛ¶mï%Ó!lÛD¼í_qçÇjBêÆ ~kÅ(”?rs’;ŸÜó`ŒÙØ ‡ºÚ”¿3d8bXV–cç–e醉Ю£ËÊŠÂqƒÀ4MÓ²xŽÛwÐýÓèB€1B¨û½Ž1–€ žeYÃ0ˆi“$P•ãXÛ¶mŒIþû¾%ÄJêºaÙ–$ФsÒtÃÆ¶Àó6Æ`w/Eò±~¢Û!ð³ï {¢Pò|±,‹Ò4 ‚mÛ¦iîõn»ÕY¼zÛQþ8ˆ.¦ùîç3g-\¢iÚÀ¾ùßvÓ‚e+Ÿ|õ I’"Q¹_ŸœGþó¯«ÿs￯ºtHÿ¾ÀkÖÏœ=ï‰;oÛ1Œ®ëç5]g!Äkº. ‚±a Bª®ÿëþG[ÚÚ9ÙWžwVF¯T!˲¦aDdùŽÇŸ¹úü³¶•–WTï¼ëÆ(Š"I"Æ»ä^×4 € –eišæt:ßýâëÏ¿ÿñ‘[ÿ5d@acsËÍ>^›}ëµ—s Ë0ŒmYºap!@ˆ1 ô,Žãb‡<Ï!ˆ0À¦iY–%ÆXÓ4†aŒ5]'}…rPضͲìÎú†`8<¸__ÁºÍÛ>oFZªašÝµ}oéÔàCù#±lÛép,^¹ú“og=pó½’“v쬄£Ñ€ß÷âƒ÷hºŽ4tCQU˲ €º®gg¤ŸvìtÓ4Ʋª¦§¦`Œ«këÒSS:»‚𮛦Åqlï^i•Õ5¡´¤Dc@{g×MW]:¤°ßm<ùÑ×ßÝuã?jêꃡPNFo–aU•UmäA™é½lÛ•U0±,kÛvzj „°¼ªÚãrùrÿ‹—–UVO3òƒ¯¾¹êü³_xûý+Ï;+#-UÓuc‘ç,_µµ¸4Žœpä”Å+×¼ýé—ϼžk/:—eYŽe—¯Y_Q³sÌÐAÿ}ý­Šê~¯75)qÝ–mÝr£CïzâÙ[®¹,>àÈŠ:vøYU_yŠÊ#Ʊ,‹AhæìyµM]qÊ¢•kªëê9ŽeóÐ-7~3wAM}C{g×egŸ®ªêŒ>Oˆ Ô66ý늋ë›Z¯Zƒ<é¨#òs²žyãݬô^½’“úöÉénÝ¢P~%BYQF‘å—ßûpÉ™§>T–•})ÔÖOù3€¨š–™Þë¹ûï\¸bõ•«gΞ÷ð­ÿâXÀsœÉ[,Ë‘ç8–å±9lÛçž|||Àÿ苯 ì›ï÷zyžs:–mOŸ<¡®©éÖ‡Ÿ¼ñ²‹¦ŒŽD8–%sŠª¦uíEçì›ÿÏ{>ý¸éÇM›òw?øÝ¼En§ƒa€@„Õ·”TV=wß>¯Bx㽯ۼÍír¦$% Ð?{=œa) ñãF »îÎûo»öJˆàºÍ[1Æc‡Ý^V±`Ū•ë7A&Œ~ÎÉÇ_yë]Åå•SÆŽZ³iëÒ5ë~\´4Žœwê‰ÇNtÓýV×ÖÏ[¶bè€ÂæÖöO¿ýá¶\™Ü~ýÕiI‰QY¦Sǔ߆mc„CMËH¢€²m¼×RÝýØúuÍ)g0Æ‚À—WUo/«;lϱ¿<£­£cìr:Î>ñ8Mׄºn@j꜃ ¢j`ÛÆ6ÆBžc9–å¶3¬¨ÞÙÜÚ†±m+Ž8RkG‡®iÄôPTõâ3Né—×Ç2MYU%Illimhj–ÅçqËŠÚÔÒ*ËŠeÛI2M³º¶Îtû½žS>êÝ/fºŽ£&Žëþh„#òØaCž»ÿ®á ?˜ù-ÇquMO½úæÔñcÒS’uÓ°lŒ DxÝîêÚúyËWŽ:¸WJ²mÛÏ5·¶Ö76iºÎ° ÇqQY)ÌÏ8z¸¦ë–eéºf} )¿ c‡(._·þåw?¼äÌS/¿÷„`ÌÐ!²ª¢}lý»<|ˆËÚ¡®<åï ÆØÞÙõéw?¼ýéW¢(\tÆ)y9ÙÕµõÁPøÊÛîŽÊrßÜìûþu½×ãyçó™B‡$N7ÆãrclK¢!À „2ÓÓÆúôŒ·]NGVzú‹––WÕ<{ïO¼úF¯ä¤£§LÐu`ìr8Bሦª²ªºŽËÎ:ý­Ï¾\¹aÓ ~§;½®±ù›¹ ããDžÐ7ú¤ Ï¿ý>˲gô”±£>ý¶ö‘ƒªšFê/¼iY‚ƒúóË2,Çq·+'³wEU¢©YþtUS–±-›e˜@À—“Ñ»¢ºFQµÜÌÞÓ'áí¶–”·utf¤¥ž2}Ú‹–¶wv PX%ŠÐÆô1¤üvLÓLÄ]{áy£† „òðù,ËÚk÷'Ïé¥K—>Ü0 êáCùCÁ³  ˲$’ hºnÛƒŸ|Zˆ—ý·â.ïÍ]ilŒB<Ç©šÆ2ŒmÛºa<Ïsœfº®óGÎ#/ ±¢‰¯›¦N‡¨ëq7‚ ‚(ÊŠ‚1`t9÷>ý‚ÇíþוCaâfJžmÛp×7˜gYãŽ`Èåt0»ß«É%£SG0är8X†1 Ãájêîýïó7]yɰZÚÚ¢²â÷zX†±1@ôá£üo`ŒžgY6*ˇC2MK×õ½×3bÌóü† ¨‡åÏô,¡[’lÛ–…ø¿w{ŶøI²!Ü%âŒ1ƒ mÛªª2 CÌâÏcŒeUeyÞÚm+gº- ¨ªŠ d$Ë ñŸ' 6Ʋ,3 ƒ±-ðÜÆíEë¶l{ìö›5Uƒû8àCƤںi"ã}^«Û{3©¤iš‚8Ÿ×4MQ࿘5{ÕÆM¢ƒäd‡B!—Ãáu¹LË$—lÛôé£ü¯¨š†U•øóD¢2Üß‚ù=9P[?åOc›ÉÜïgYû¹­ÝÉbG÷Š1°öœ Ý7¹1 _bŒ÷I`YÆÀ4-ˆÐå眑™–¢éúî´à@ϱ¾ÏÄ,©$ÆÀ¶ €¢ªÓ'ï›—ëÄ>™½ ÃdµÚÏ^2…òø) `úý8wRƒ¥‡!Ð #?+s@~^$ý½žÛ¶]ÇÐÂ˲UUtÕ.åᇇæ¥Pbhº®¨àßñ¡0M3l`wd!ú¸Q!?yøPƒ…Ò²žà÷Ís¯p=Ê!á§Q?Ã0$$!} ýÛsHÔç0”ÿ¾æÍýÅb‹¼Btˆôwb¯1ï^ ÿ%’iÝGýÝ£âü ûMö+Ïý™Êض}8tBÊÿÙÊ¢½£}Ô¨QaÃ0‰\C€–e%&$®[·¶³£#!>q_{>»ß].DZƒ¨,ÿ|PO²Kõ¡n„žÎ^‚x }„î2øÀ]8<Ïó<Ð4Ý0ŒŸ‘Duù`5“X!„dì´1Þ¶±axðÇsB]Ó»c8ŽƒêºþÛÔ{רŸ*?åoÙŠ]×µÖöfMу B€i[ ƒ DÁý¾ä²ûæÅqÜâ¥K7oÙ?iÂø€ßoš&Ã0d„ˆ²l›/Š¢¨iùž¼+@»Æ»ß@hñA~2€®ë¤åÉBýx°ÀÝ£~0Æ<Ç×Ôìܺµˆø…ý’’MÓD ØØFuîÄñ¬eÙ–e!a{×÷AòÀŸn/QL[!€ØÂ€]÷ÀÇWTV ‚Ð+-•ŒDb¥@IÑc^àëë ÓÌÌèmBÈÆ6˲õ ¦iffö6tì~Y‰?lÛF ©6ØtîQ%¡mQ?fÊ߈1fFàV†±41 '9ÔH˜çxxàáÕÒoÛ¶Ûíþaöì/f~}ÒñÇ—–¶µµgôN7t#*Ë‚ ð•eÛÅ0¬a–e½÷ÁGÇwLJRRW0èv»„t]—Åír!†±m{W9dY>¬–tþm`¦½£B'˲Ãáhkoø¼Þ=¦w0€2 Ñ®ñþÎÚÚ™ßÌ:bÊÄ–¶¶Î`0+;c¬( BHEEQžgXÖ²,†A‹/KKK-ì[ÐÞÑát9Y–­ªª ñÇY–MBB5M‹¹ Äv alY–Ãé\³n}BB|Ÿ>9‘H„”ŲŒiZ¤hI’,Ër:?ÌžÈýû÷³,SQT‰—\.çÒå+[Z[ûõË7yžç9Ó05]—$Q–w‰DX–å8β,žçm˨ªJÚBh±Öá°¼€Bù]€Ø–ŸÖKÞ¹³¦¸Ôˆ‹†¯¨Ù&;\Û¶äÿ³‡ôcŒY–iniåX§Ÿ~ê)¦aÌ›¿0žrâ ›¶l).)=öèéŸ|þÅö¢âÉ' ˆÞyÿƒM[6ŸuÆé#† {÷ýªªk¦M2nì˜/g~]U]•å¾}KËÊ|>ßùçœÍ’MS)¿¶m;Ž>žýѧŸ¾úâ …ÛKJ®úÇu_pÁçžGözÙbÚ ù5U×T5??ïÈ#¦êº¾½¸¸¼¢òÈ#¦vuu-Yºb⸱›6oݺ½(#==;;óÇÙó<wË„ñãÆŽ^¹jMIiY~^îøqc7nÚ\ZV.+JzZZ0Š*ò±Gåq»I¯!$«yɨÈ@ä”ÑÁ@Ä2,˰+V®®®®ÉÊÊ;jd$9ç»ÖÖ¶£¦Mu9œ<ÇG‘ïfýxÌô#×mÙPRV^_ßп°ÇpK–®¨©©íÓ'§_ß‚ fO›:% }?köÉ'ßÐØXYU”•W„Âá”ä¤)“&B1ÀB¾FÊï¶1+Š¡ÊʲW^/œ<ÙJKåC¡ÆO¿X¿aã¤;îø€ {èB( ŸxÜqÙÙY^~åƒ<ÖÑÙéñz>ýâ ˲æ-X ‡×®_ÿîû5íˆÄ„„´ÔÔÔ´”!ƒäå}öÅ—›·n3jä3/¼ÐÒÚ²tù ^ú¼õÞ{'ÜÚõë—¯\åt:-ºløwB¨(êÉ'œÐ+5íºþ9wÁÂënøg¯Ô´c§¥(*ì¾ý†aX–eYÖ0Œ~} ¦N™ôÒ+¯?ñô³UÕ5)ÉÉkÖn…Â;ªkššš#Ñ臟|>lè¼>}âÒÒRóóò† ´½¨xùÊU'ŒŸ¿hIåŽuõ ]Á©“'Íš=gèÐÁƒ%K—»Ýn)‹ú9–#Bϲ† !r:ËV¬Ü¶½xʤ‰6nY¿qóü…K0Ç}TRb"Ã0MÍ-Ÿ}13¯OŸ¦æ–å+WŸrâ 999,Ë._¹šœµnýÆ’’ÒÚú†ªêšÚÚú/¾ú& ®ß¸I×ÆÆ¦†Æ¦;víº;këœNƒ–e4¢Pþ¢@kÊJ ÇŒŸ|²iá‚Ò×gô•Ðínª«áá@£m´W¶m{½ž;o»õµŸÊÑ}lìèÑ ³çÍkhlš:yÒÐÁƒO:áøY?ÌnjnÉÊʈó¦Nž”ššºyëVEU‹KKããã5M÷û}#‡ 9|xvfÖ°¡CórsÑ0ƒ £þß¡eY^¯û¹ÿ>•Ñ»÷ù_šÑ»÷sÿ}ÊãvïµPƒŒy†!ŠÌ0 Ë2gqÚ£Þß7¿àÕ7ÞŠп߆M›++«F š™™qö™§¯[·¡bGeBB\ÀïÏÏëÓ¯_AUunå>¯!F’¤>¹Ùùy}z§÷ÎÊÊè“›c&»[æ‰ôC‹–A,ðˆAŒ(I¯Ûér––WL7æÈiSǽfÝú†ÆÆc>j`ÿÂÔÔ^à7mÞ"+ÊñÇN/*.)ì×wÄð¡½RS „%eeÆ=êÈ©£Gލ¨¬=jÄÆ-[O<áØ•kÖ¶µ·="Ô· ¯°°oZjŠ¢ª,Ç!‘˧Nk”¿šªj$%YãGoœ~Ä _–uõ5ëúdŽ;¦=fæ@¶Í=¤c,Šââ¥Ë}òÉM›·X–å÷ûGL™üßgŸ÷y½½{×74Œ=*£wï—^}ͲlŒí¯¾þ¶¡¡¡oA¾Ûå:òˆ©—_|qrRR[[{(ŽD#]]š¦ƒ!àëæÿ „ªª9$ñáûï}æÉǾÿ^‡$ªš¶ßÖf–a„$Juu Ï<ÿâò•+»ººã°Ç޵pÑ’ÖÖ¶……ÍMÍ©ÉÉ£F ÿêëﺺBIZ¹jõ¶­ÛssrœÇAƒN;åÄ‚¼¼`0‰D ݃†nFeYÓ5ŽåÄ"bfaÃ"†c9MÓŠ‹KV­^»aãæ¼>¹‹—.ÿþ‡ÙK—¯˜fô(2W<`@aVFÃ0CJINRU-1115%YÓôŒÞé^¯×Æ»üX†õûý4P9å/ Ƙe¹5U½rr•­[™oô+,6uä(ØY_ñî»ý.¹´¹¹ BßÝßa˜ææføÞï;.Îg˜qÒpH’(I$°m(bY¶¹¹å‰§Ÿ¾ûöÿ8NŽãAÀ¶mÙv4•$ÉétF"]×=q)D"N‡CÓuÛ¶G("1‚TU¥ÛÙpmßUxÄû³­½mëö­Ù™Ù±Ífyžw»Ý¶mƒ¡ mÛ¢g^xé´“OÌÊÌ´mÛår‘:‰pçñxTUD#·‡cYãp8,<PQ¯Ç ‡A`ŽDˆ#?ƒ˜Ž®€AÀ°l‹X]N—C’ll º‚AI’AÐ4- ³,ëv¹!²¢ „„QEøý¡PX–åˆQTŽzÜnžç5M‹D¢¯×cf4õû}ºnD¢·Ë…1ˆF£^¯GU5]×IŸ§ë:Ã2Ù™ÙtBùKCâb-]¶dèСcÊxH œ—^Œ[[;y<ù ³9víÚÕ/ôÉíÓ^òàoÞ¼yooaT–#Ñhì·Û½tùòô^½’ƒ¡mÛŠ¢”!EQ¢Ñ(±Ÿvvv’S† †BdàÙÕÕÅ0L(†ÔµÿfWœ†ŸK±ËÓ†üeYVGGGì\·Óµqóf–ar³³ ÓăArˆc9Û¶ÛÛÛB<ËG£Q’ Ã0d³Yò‹3 £i:˜çøX†˜eYhA˰äž!å²,+Ë2ñòäX@ EíÞP‚íììBɲ‚±Lêó|4*ÿ%²ý@(†ò< † „/(Š àyž$ãXŽD•°‹®æ¥ü @éº!ËQÓ4¢Xøàƒõ­UÕBYÿý¯?9Ù2MÃ4uÝØïéì~sìþg4™“ ýÃâ׿ßY °iZ9YÙ×^• È¢ß=GÄ `ˆ4ƒ½"îþ¸+TC·#c±B ‹X€w-0fОýÓžíèm¿¡ßöêäbi~÷·»”Ø7`wïhcêfFù;`ÛVbBÒ’%‹DÛœ 0ˆשׂ3 "Äq\a¿†±õÿeg㸸8bL8ÔWJù_aÛx¿ñú1Àn·`xÈA1Fì.ëb‡8õ3 c›ôN¦ü€öíÛ///Ÿü‰1˜k„dÝâ®±Îþ¦µX€àç7’÷Ô0ú@FÊ‚°+ Ï~Ra¸ß£@LVQƒVdTîŸÕ!dƒº˜—ò÷BH⸈ùõ³¶m ˆÞÄŠþ_ˆ eY@À0ŒH4òçü BÓ4ã1Àíí‡ÏZî¤Ä$2ç|¨+B¡üü¶ÇŠuHŽÚºÚúÆz:úƒ’9=-=%9åO“~€Ã0<Ï\N—eY‡Ãô*ÏñäøPW„B9”°©)© аˆò·¼ÕY–åt8ÿ´BcSD<Ï&7˜mÛT÷)6fë0y2)äÅðÏÜ„9vSÅ6ÿ9äÐûœB¿ÆÃ‡ò7ãPiÕ\ åðºÛS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8~!ƒ1¶mL¶7úvÚÂ[–Eöw ´OÈöž¥P(ÊAñsÒ1–Áét C‡#?“˜€;¨˜ˆcA\.W8ÖuàõzÄ„Âá}C}aŒY–u:Ñh´ûîò …B9X(ýD—7oÝöÍ÷ß«ª:°ÿã=†ì¸„ŠíøE4!dš¦aÇ‘­zÉ÷êH‡có–-Ÿõõ9gž^ŸoÛö‡ÚÒÚzáyç ‚Ów’˜e™æ––ïfýpÜ1G''%êºws¨ÛB¡PþbìGú‰]E’¤mEEÿ¹ëîü¼> Ãlܼ夎w:†iêº.IIɱ,€ã¸•«V?ýü /<ý_¯×iš¦ UUmÛv»\B À!dÙ¶¢(¶¯¬ª~þå—;;;^}ñ…-[·ÞÿÈ£©))gœvªÛívH„ÐÆv4*ó<ïñxê¿øjæè‘#úäæhš!TU•؈(”Ã:F¡VìGú†aYÎép¶¶¶665ÝxýuÇu$˲]ÿøç¿N<îØŽ;îÕo´µ·;æ£O>ÊÊ¥]øõ·ß–•—_uÝõ_p~vVÖó/½ìñ¸¯»æjUÕ^ñ†mÛ†iôÍÏ_·~CnnεW^Â6† 4¨zçÎù .\²$5995%…c¹æææ_}­¾¾aÚS.8÷œu6¾óÞáp˜·Û={î¼÷?ú¤o~Þ¥_äq»“@ðÊÏ`Æ¡®…ò{H?±§·w´×7Ö ¼0vôè‡î»÷Íwß}á•WO>áøË.¾(Îïÿ£OŽ>ê¨Ï¾øò¢ Î{ûÝ÷ëêëO:áø´Ô”¡ƒoܼåŒÓNMIN¾óÞûr²³êïºïþÿÜ|ó¢%Kþyýus,øþ‡/8ïœW^cðÀGq@UÕ”ää?öÆ›oпðÂóÏûnÖ6¶{êiÛ§Ÿzòó/¿Êqüw³fäç2øË™_o/*~åõS&Mœ=o¾ªi—^|A}}ýÏoLL¡B0ÀÂܬ\b/=ÔÕ¡PØwÔÏ2lgW§ÛéNMMÕ4mâøqgœvê·ß}ãÍ· 8àŠK/¹öÆÎxó-ŸÏ7mÊ”¾ùK—/ß´eKŸœœ>}r%Q<ý”“«kjš[ZúäæfôNx!&&$œ~ê)áH¤¤¬ìÂóΛ3w~[{ƒ˜eXMÓN=ñ¤UkÖsÔQ’("áHuMÍ5W^~ò‰'ÎúqÎs檪záyç:Žù •WT˜¦iZÖÀþý}^¯ÛéÎè õR¥Ž`Œ9Ž+)+ÑtÍépRé§&ì-ý`„ÃáHLHü⫯|ôñŒÞ½E6thrRRfFÆÐÁƒÿûü ÿ¸êJÇóÌ /vuumÞ²µ_~Á Ç«jÚÙ\tÚÉ' :´¾¾>;++;;“縦ææÎÎÎöŽŽ–––P(ÔÖÞ®ë€B¤jj[{;ÇqO<üÛåþøóÏÛÚÚÿQÓŽxñ•×fý8»®¾þÑïãíwo¾ýŽŒôôÚÚÚ Ï;wãæÍÍÍ-^¯7+3Óãv³,K¥Ÿrxbc[à27F¡>0—^zirr²eYdŠeÙŽÎŽå$Q±WZš×ã2xЕ—]š”˜–$é‡9sÿ}à qqq,Ë"„N8îØŽ?.ÎïÏÏËs¹œƒ 8æè#UM3M«oA~VfFJJrßü|¯Ç“Ÿ×'£wo¿ÏÛ¯ ¯ßç³L“„>¹99ÙÙ¦iš–)ð|VffvvÖÈáÜNÇe_Ô· `ØÐ!¢ ¤¤¤Œ;zÔˆá£FŽèì òÇv?!<ПÝãFì• 8Ø…B¡P~ö×'ÅsÇq\쥕ZZ( å¯ÈÁYK0Æ$„ƒ ÇíWú±? s_?ÿÍï‚mÛô¬ÚŸÐùýAWñÛŒÎc†a~ÆÈ¶ïOyPÁ6¨)œBùs8hégY–aâ¼{PmÛ¶1‰Ô€ ÓŒ%îþ$“4¶msÇó|ìy™ˆ}CÎê~t_íëþeìPìOrc,Š"˲ݳý)Íî?í=+Ù½{½×Ÿ$M̹h¿•ݤ°û‡½óÙ£ˆ=ê³ß«ø•óS‰ûkI’ÈÄþ~ÇÆû^>ç¸`(¤¨*Bè§2ºe»× 0MÓ4ͽ[²[¶v·ÞÂ!I±jw¿Ò5éŸÐ»S(KBúɈ/>úÄSϾðÒ<ºhÉRQlÛv¹\Iâ8®¾¡áÁG#qu$Q$n9äát:.§Óét4·´ÔÕ×û|^ò ‚ÐÒÒR[W×ÑÑùԳϱ,ëñxÀîžÆãñp×]8X–õ¸ÝÄeHrˆD ÚuˆçEQÜQU …<eÙ±|Hßã$·ÛÍqœÓáp:Ý/Sày—Ëét:9ŽóxܤhŒ±Àó.— !Dþôù|ªª>ðÈ£‘H„ã8·Û« i(AlŒY–xžÄšøýo¾óî†M›ãããc ;].—S’0Æä]Êåt¸vׇèþŽªª®®®øøø­Û·¿úÆ›q€cw%A"@7oÞ°qÓÖíÛ>êHŒñò•+-ÓJHˆ7M“a˜P(ÜÖÞç÷‡BáöŽN¿ß×ÙÙ©(ÊÜ ‚Á`T–yžóz<ãµë×·µ·§¦¤¨šÖØØXQ¹£®¾!9)‰LªË²üÐcOÔ74äæd×ÕÕÏ[°Ðåv··w$%&ð<_]S³iË–¸¸8IIã<ßÐØ¸aã&QàeE‘eÙãvËŠÒÜÜì:$J]Áà=<İl\Àï÷ùvTWoÞº5.p8MÍÍUÕÕ•;iýÆMªª&$$˜¦)üŽªêg_|ñ¨#Ž(ì×7911*Ëuuu¡PÈír­Y·¾££#¼òúŒØ $éÇ9sÛÚ:0À^G’$–aË++âãY–Åo/.ƒ½ÒÒV­^óä3Ï$%$ú¼^I’6oÙºsg­ÏçeY–x557»Ýîp8Ü ²,Kª ôy½‡so†aZZ[¨_?å0øõ„ôÈXlÍÚµËW®Š‹ ä÷ÉE½ñö;¥¥e[¶mSU5%%eÙÊU'ܬgÏ]° ±±©¸´t¸qo¼ýösæ…#aIr,Zº¤®¾B0 °çùŽÎÎϾü²±© 1°OŸÜ¯¾þ†ãùù ɲœ••ùÄÓÏhš>Ⴜ>!ÔÔÜüÀ#ÊŠÒìEñɧŸ9îè£KJË^ó­Aúßÿ𣲢ƒ]<Ç}7뇶ö¿ÏøŸyáEUÕçÌŸ?bØÐ¯¿ûî½?Rõí÷>ÀýÝw’(öë«é¶í›n½­½½céòKW¬‡Ã_Îüæ¨#¦®Xµú·Þ©­«[°hÉø±cÞyÿƒEK–FåhKKëQÓ¦½ôÚëííK—/÷û¼é½Òbªjjê¿'Ÿpâû}üßçž¿âÒKž~áÅŽŽUÓ¶m/ŠD"ß|÷ý1Óz÷ƒ‹KJ·lݦëšßï¿þŸ7€¿ÿáGUÓ†Š1ÞQU=óÛï::;ü>ŸÏç›ùÝwn—ëÓ/¾LOï%ËÊëo¾-ËÊò•+‡ Ì0Œ(Šë7lxæ…-Ë6 £¥µõ½?:픓¿øj投«âGŸ|ʶmUSÑèœyóƒ¡`vfVgW×[ï¾F—._1aܸGž|jíºõ;ª«¿˜ù Àø“ϾÈÏËKNNBˆÙ¸iÓ¢%KNלyóòóó_|åÕ ›7›¦9óÛïvÖÖuvuy=žçÌ­kh€ ìß ‰âü…‹êêë;;»fÏ›7uòä>ýlÖ³‹Š‹·1ü¿Ï=¿aãæå+WɲÜÔܼrõšH4Zدï'Ÿ±|åªH$âõzR’“B;kkyâ©“Ž?nÞÂ…?ΙwïƒG"‘Ï¿ú*+3#--Í0ŒÃSý©ôS+ˆô„ÁBhFB|üS=:dð ×ß|ë¹_nnn™;Ïç“eå›ïgAYɲüí¬Y,Ër7{ÞüíEÅë7lzàž»nºñ†)'Œ=úˆÉ“o¼þz¡¦i½{õšöðƒ;kk_y}FGGç£ÞÛÍ7}ÿãC ì߽߯wÜžŸ×GÓ4Ó4Fž›“CÖBEA³,+ð‚¦jé½Ò¸÷ž“Ž?þãÏ>Gtç å`8¸i^†aºººšš›Ï?看Î?oÉòåš®‰¢wÚÉ'ÝðkUU5 À &.?vÌ=wü‡ç9MÓ‘ˆm[¦e©š †TUňüª¦C!Û²0ÆÀH4j˜&ÇóÛ·§wzú·Þ!3#CQUÃ4#‘Ïó`žçããâIÓ‘¹SEUmÛ"sB˲dEíì ’öÇ`×$0Ë0¿ßׯ à{îJKM5 CÓ´þ…ý{ðþUU·ß}Ïë9|øó/¿b™VA~^Nvöã=XYUuÏýš†)ËJgg§eY"ŸÏׯ à»ï"1ûLÓÔ4MEEQƒƒÈ¾;º®“•Û†aeÓ4ïúÏm£GºãÞ{7mÙ ìêì"?.@`Û¶"+YV$I„#‘p8lZ–ÛíÖ =‰„Ba2ÓŽ„ƒÁ`8¹êòË.<ïÜg^xñ›ïg¹œN˲B¡p˜eYC7,Ëð<¿ë&FPݧP†ƒ~2AZVQqÓ­ÿ¹ð²Ëß~÷½+/½4';{ú‘ÓV¯]·tùŠÚººÔ””P8üÆÛïœyú©•;-YZ\\’™‘1qÂøû|øÁG/)-0nlQqñs/¾Ä0B¨ªÚ¨‘#ŠKJž}ñ%†aˆa—eC7¦Mš˜˜0wþ‚u6êº à8®ªºú™ç_¨ª®ÎÎÊÂ=ºªª!TXXXTRòÌ‹/UUWgedò?~ìØ¯¿ûîÃ?9áØcãããçÎ_°~ÃFM×Y–E ‚’ 01"o°, D!!„ ‚¢(žöÙß~?ë†ßìñx®¼ìґÇß÷àïÎxC–åaC:dá¢Å+W¯ …BdZRÓ´ÇC¡>¹¹cGjoo2x €aÈIJm»WZÚ±Ó§¯^»véòdj,cF1Ì®ßŲí‰ãÇÍüæÛ/g~í b„ Ã`N=ù$EQç-\¸m{Æ»f}W­^û⫯…ÂᜬlË²Ž˜2yéòå¹99‰‰‰ËV¬xñÕ×ÂápFFo‡Ã1bİç^ziùŠçž}¦,Ëó,ܶ½ˆŒ©!B’ˇ à ˆˆ—„c9„ùŸaÃ0ÁPè¹—_^³n]zZ/QG V\ZJ~\¶±(ˆó.úÇ 7:ŽóÎ>kê”IÏ¿üÊ=÷?8|èÐK/¼ /7÷®ûîåõ×O;ù¤ýû§¥¦=ðÈcÕ55ï}ôÑw³~ðûýÉII–m›¦™š’’˜póíwü8wž <ÇoÚ¼åÞœ3Á¹gŸeÛµ¥P(¿žÆðIIJÑ }ß—hÛ¶ÃáHgWg|||\  iÇqµµu9šœ”äózÛÚÚEÍÌÌhjjnmkKLˆ÷ù|<Çí¬«S%--Íé::ºLÓüD³8Žëìê2MÓçõÊŠât8LÓÔuÝãñhšV]S#ŠbrR™´m»¾¡1ôÉÍeÆårÝvÇ]£G<å„:»º›šÉ!žçÀmmí ËÆªª’|R’“MÓ$W•e‡$†A|]ˆv·Ó4-Ë’$)ò<ït:»ººBápjJ qà©­­µ,Ûï÷9NaUu ÆvJJЏÛÏ@!D>0 #+ Ë0Çɲ,Š¢( ;wÖE¢Ñ””d‡$‘k7 Ã4-‡cW}†imkã9Nr84Uu:ª¦aÛöx<Á`°¶®Þçó&ÄÇ“ˆ®ë;kë}rs0ÆØÆÿ¼å–믽¶_ß‚`0XWß@0Æ­­­§Óïõvƒuuõ>Ÿ71!AQTŽcBªª:NfƒçùX㈢¤éDzºaˆ‚€jimmmkËÊÈðx<ã®`Ð4vý¸d'µP8F³23!„,˶¶µ™¦™’œl˲MM/ÄÅÈŸí€?•ëêë““’’“’ÈÍIšqGUu|\\RRâ’e˾ÿáÇ‹/¼ )11. iõÓ´h ÊaE,†ÏAK?‰©À0Œiš†a"I^ B†iš¦IÄNU5žçX–%nÝ$g2[`YDZÀî+8–÷2çLöûE } ûõU5ÖÇü†BæË_s9¿˜Õ¯¹^pà°¿²{4„ŠªŽ=š˜\~¾q~}@Žƒý¡CÓÅ~\p€ @uÃÈÌÈè“›FO;…r˜ó[¤ÿwØbÆòçÁfBÞˆ™âw¯Yn‹Up8KÌ~s¯WŠ¿äÒ4M£!»)”߯!{rÈb}EQU²,‡“‡Æ²Ÿã8Ó4EÑuX«g’Xc’>™:í¯ݪBù_84£~†aêêkC¡€!d[fbBb|\‚aî± clí¶øgù½ò!Fä_»?&…¿˜B®®®R4!0À§¥ör¹\{E ˆU@^ªlŒÆHýóG÷j̆†ú`(ˆ0°m;!>1>>~¯Õ­c˲p·nþb›X–k[òês µ%ÙªÅÊ_„?[ú‰CHEE¹eÛƒ’$ ØÕ¹uû6Ã0RRRc‚E´ü~ ‚PUÕ¨,ïeköù|B²¡ãÏJü5åZÿâ’bŸÏ7°Ï A,Ënoo--+ÍÌÈòù|1õÇ ïtºÆ¶m‡#‘X7ðk@I‚@&W÷‹ÓáØå§ô‹YYޱ]دÐ!91À¡P°¨¸H×µÔÔ´½Óïw“5M#N«,ËÆ¦…÷­¡ÛåŠD£Dôyž'ûeî{¤‚ D£Ñßé6¡P(,¶ô³,ÛÚÖ‰F&N˜Xל9«Ø-q§MÎ6dèÊÕ+½^ H@Ô¤¥µõÙ^$Î9#‡?bÊd]׉·%BÈ0Œ7Þ~[QÔ“O<Áçõ’7âqö̲,»zÍÚ¤¤¤Ô”dâ0Jr +fÁnË>Æ˜ãøªê<Ï÷ë[¨iª¦©À¤¤dˆ`QQÑ ƒcŽ:’$mÛ¾ýÛY?p,ëóùN9ñ¯×K¤661ÐýC÷âBápdõšµC‡ {}–,]Ö· ßív‘¥{5#y5aY¶µµ5 3Þ¶mMWn·gð Á«×¬öz}¢(voÌç^zÛ6ðÇ ™4aÂŽªªææ–!ƒÅú³Xg„P(þü«™Ç{ Dz<Ï—”–U×Ô}Ô‘Ä'V ˲HxÑíEÅÇs4ù(ÊaΟú†NüÙ23zwt…ïwM›ŠÖ×Dÿhµ p@ ±©1$™çùæææå«V>lìèQii©,˺ÝnâÜíõzœ3oÝúÇåyÞépH’DÂ/“èÐdJB óW×P‡=· !I’lŒIFÂLBmËêèhÏÌÈP”¨aè¶mÙ¶†>¿ íídN‚D.*)Ý^T4jĈ¦¦¦^y•eIY–‘$‰,K&aAp¹\§Ã!<Ã0’$iºV³s'BÈáX–xBèp8X–%Œ«wî´mìt8-ËAàyç9Žxž8Âc Ä457¦§§Û¶©ëªm[¶m©ªÌó\||\S÷Æä¸æ––ÅK—äçgf¤Ïxëí/g~mÛöκ:QDQ$žIÛ2¹Ýî¨õ㪢’ú郞Z²l9Ë0d—žX5Ïóuõõó.Š‘(ÊaΟ:êÇeYöºÛª[C;8ÁëöºÖm©jî;$©µ­=&¤ŸHLHHKI5L#;+ëÇ9s—­X¡ëFRbâyçœõݬYª¦•–—÷JK{äɧÚÛ;FqìÑÓŸxú™®®®‚ü¼Á¾÷ÑG€+.½Ä4MEU{ò¿]Á`KkëqG}ʉ'|óÝ÷ó.â8¶wzúå—\l†…mMSyž-’"5Á3©ªJ–2€]&f@ÿþGO?J„—_a™ïfý¸lÅŠÄ„„+.½¤¬¢âË™_ó<Ÿ•™Q^^©éšËår»\eåå~ff†¬(o½ûþÎÚÚáC‡œxüqï}ðaqiYïô^çžu&`þÂ…º¡_så•_|53÷/,üð“O$I:çŒÓ3z÷Vu @(˲À Ý—’‘žçÛÃݵ›“sÒ Ç ‚˜›“óÌ /ÆÇÅŒ+wT}öå—]]'wlŸœÜ§Ÿ^Ó´aC‡9uJ$}ì©ÿ"¯¿öÛ#‰¢ «—-ÿnÖ‚ œuúiùyy_ÎüzÙŠ ñÏ e åïÈŸ:ê‡`—™"U“|‚“ÑÛäúæPª;EFQUŽã»I†ÙY[÷æ»ï¾øêk;ªª-˺ý–oÚ²¹¥¥uô¨‘ûžrâ Ͻô’Çí¾úŠË~˜=gÙÊ•eååÆ 7zÌË3fLŸ6íê+.OKM]·~CSSsQqÉä N9á„o¾û¾¤¬ì‹¯¿¾î𫆠\T\LbÎ ´Ë'’,sµ,˲L²Y7t–aÀîA-Ƙçø‹Ýtëmï¼ÿÁ¥]XU]óÎû9ujqIé'Ÿ¡ëúŽªª‹Î?O¥†¦Æ›ÿyã–mÛúäO?rÚ§Ÿ¡(ʦ-[Ö¬]7{ÞÜSNl˜i™ùyyiiiii©cÇïñx›š¦9­_ß¾y}r‹KJ““’FÁr¬i˜ÓœÖ¯ ÀëõÛN ÈÍÍÉÉÉöû}Å%¥~Ÿ¯oAAvf¦Óé$&u–e½^_ÅŽ ·Û0MÓ²l§ÓÕì †B ‰1$¡i™Ã‡ »þš«ï½ëŽ£Ž8¢rÇÛ¶+«ª22zçdg›¦™›“SŸïóyÓRÓÒÓÓ³22RSR²2³8žC±,{Ä”Éÿ¸êÊÏ¿š9oá¼>¹÷ÝuÇÊU«¿þö;lÛ‚(ôÍÏïWPðæ;ï"„ú´¶¶5·´ˆ‚0tÈ`²×¶íä¤äŠÊrA†5MË2-A-˪«¯MKMÕ Ÿ~bAà½^o|||Yy9À8½Wše[—^táôiGÌxûí’Ҳή®ÙsæÕÔÔH’(+²ÇãIOïuÔ´#:;;ÛÚÛÉN8áp¤©©YàùQ#G–”–%%&¤$'sÜ![#B¡P–?wÔ¡iš½z¥3™¿haaVüC—¹ãÂQ.Î[¸ %9Åçõí5O¸­¨èµo>ûÂKëÖ¯×4½££ÐÙÙef4*wvuq7bذ—_Ÿñö»ïUìØ1uò¤ú††ŽŽÎ^ii.—óáÇŸøê›o›dYQUµ³«S‘UU›šG ÖØØôòk¯/Y¶ŒŸ!A„úäæ575¯]¿1ŒËí–ކ¦úe+–eg䂳«@„YAfffzÜîP8\ŸŸŒ9¢o~^$%µ•¥£³Ã¶­öŽYQdE…–eE‘¢’†az§÷Z°hIuÍÎöŽŽA,X¼$ …CaÃ0švÄko¼™›“Ó¿°_ïôtI’†6dÐ@2!lšF¯^éƒÅË™–ár;.g8\°x~¼?ÁïìÕ˜EÅ%o¿÷þ ¯¼òÜK¯œyúé’ähïèØ²m[JJ Ë0+W¯Þ¶­¨¤¼lÀ€þ‘hԲ욚ß|÷ý#O<™››Ó''{ɲå;vô-ÈEaäðá}óóÐÒÒ:ã­·.^ÜÕü»®! Pþ~Ü.]¿ ¶m÷JKïìì**-Ù´m{IYeKKkïô̼>ùÝã/¿Q ÃÐu->>.7;«wz¯„øx‡CÊÎÊ üé½âããô/„¶wtœsæ¹ÙY¢(åæd;ÎÔÖÕ···÷ÉÍMNLÌÌÌHïÕ+3#Cr8âþý ‡ T]½³µ­Í²¬#§N5 “˜PRSÒjkkKJ‹7mÙX¹£²«£«o~azzz¬zB€1Çqi©© ññ–eaŒ}^oŸÜœ›·tvvöNœœ”ž–†JKMKKMu:œ9YY')11£wzBBB|\`õšµ B—]|±ÛåZ½n}k[ÛE盓“ír932z''%efdŒ3Úírõ/ìW^QY[W›œ”œš’BÔŸ4fG[GqIÑæ-›ÊÊJ[ZZz¥eôíÛo߯”QÓu†A§œtâø±cu]ÏìÝ›eÙ+WfddœuÆéy}ru]ß¹³vòĉ} òSSRš[ZâãâÎ=ëÌä¤$UÓÜ.×)'žPTRZ[_—˜PŸ—Ÿ×§¨¸Äï÷O;655Ü-ºKå0ƒìÒuБ;/A‡Ã²,CÝn·(ŠÝ½™Ge·Ç „)ŠLÂɲâv»TU%‘ýEº\.Že#Ñ( 먨* Hér¹ ‘h”ã8Ë49Ž#AÜG( ƒé½z=ÿò+‘HäÎÛníèì$«v†a¶³«S×u¡×çã8n¯°À¤­X†‰­6 ß8À *Ëd'÷p$B\b¢Ñ¨Ëå"Nô¢ (ª*I¢iš¢(aŒUE±lÛår t]WTÕåtÊŠbÛ6Ù\W×uŽãÈ娚F®ú§Æä…`(HV ¸Ýn‡Ã©iêþ"€±¢(QEcYcA°mGeÙ¶m§Ó‰¶­¨ª$IA€A(¸Ý.Ã05Mó¸Ý€,eQ ÛØ0MY–õ]}ØA#wR+~{Ðæß±$–/À²¬˜Kû^i,Û†»ýâÉ—!˶Q7t€eÛ`wÔU˜\ŽÝ-TrlUpléé'Ÿ±qÓ¦@ pÅ%ÇÇÇw_¬Kìþ±x™ûá³ï×î%‚nËÈRm°§›÷ô± »&3‚}/gß¿¾1Øc5oÌ™ ì^³ÅVHt?Ô= t,“ÕŠ¨ôS3~{Ðæß ¢ ?™Î¦‘Ý_0 û)ÝCÄb­ºçûŸpΙ§Ÿqê)’(Z–eì¤(]LñT½}£Nv*;—|`º­Þ»å¾{úý~Þïåì·1-ËŠøks¿~TŸýVéçkE¡P[z´W†mc†aTm?¡ö ­yË¿Vm)Ê!¤GK?èkB¡Pz¿Å8KÌ»$.ü~þ/úk¹@ü|m÷ÚoëovíÝ:S(”ƒ–~2ÿév»].ËîýÒ!äyþsØk²ë§©BÈþ±¿ êœ~/ „Â/–Äù‘DñW¶Æï{í¿È¾¿Âoƒú)”¿"gð!îá¡PhùŠ•’$åæä¸\ÎØl-˲ºa4·´$Ä'×°Û9d·Ð@(YVHÏaÛ¶ÀóA²ÉbW{»Óé"Èìe÷-¨Ý7¢ŠùØÄ‚qÆl8$Ps,Øg,ŸîN)ÄÁ¥»~íî0ˆïþÞ»_uߺË4Íææ–øø¸XÐÍX%‰ËMqi) 3##æäÓýŠÈ^í{í±ÊÇ"˜î÷Ú1Æ!@¬bݯšÌÍò<‰Dº÷ßÝ¥ö*}ßC$OUUI|ÐýD}~(”Óƒx2c±ïøÑ%Ë—òù«×®!!'ý~¿×ëåy¾¡¡á±'ÿkY&„Ðëñü~â)òû|>Ÿ×ïó–WTnÛ^œ˜˜H4ÂårVìØ±u[QBBB{{ûãO?#Š9‘ÄFŽ‹“$)6~Ç‹¢çr¹ˆ«;Q(·ËE1>.Îétº]®µëÖ77·$$$˜–EòqH’mÛ‚ ø|Þ€ßïp8|^/ ú»L—Ëå÷ù|^Óሠn—ËpGt6>>Þ´ÌGž|2‰Š¢HM–ey½Þ¹ó¼üÚëEÅź®û|>¿ÏGtÓírùý~§ÃaZ–Ëå:ØkgY6Ü\N'ÙÁ†| 5w¹\N§3à÷K¢È²l\\ÀírÙ¶Íqœ×ë øý.—K„ή®eËW$&&v¿vÛ'|¬t‡$‘æ%‡H´N§ÓxÜîööŽ>þD× ç?¸ª@Àétb@ÍAÊáÈAŒú1Æ¢ ”WT4·´¼ðÌY–moo7LSÓ´÷?üÈ᎙>!†¸ÃC¿ù~V8žvÄT¿×•åÏ¿š•åqcF¿ùλ]Á®¡ƒsG^ó­®`P–åÔÔ”¦¦æ÷>üHàù£¦¿½¨hͺõÇ)ì×OÓ4Çq•;v¬Z½&'';½W¯†ÆÆC‡F¢Ñ 7 ¬WZZggç÷?þX[Woè†$‰MMÍsæ/ÈÎÊ3j”®ë<ÏïܹóÃ?ÉÍÍé[P IÒ¬g«ª:qü8Ạ»ººÒRSöï …öÚÛ;:¾˜ùµ(ÇÛ¸ys~Ÿ>¶moÚ¼%77g݆ Á`Ðïó3 ÓÔÜœ•øð“O³23&ŽW_ßP^¹£©¹Éëñ5íˆO>û|ɲå]ÁàØÑ£œN'é]æ/XX×Ð0z䈼>}¶nÛ¶fÝúaC† èßOU5rh̨‘ÙYYkׯß^T¹9ÇÝkk3 …r8p£~¡¬(C ÊËͽäÊ«Þ~ï=bÖx;:;7mÙúþ‡I¢`š¦$I|üñÆM›;:»žée†e_zõµ ›6Ù¶ …lÛ6M«½£ìŽÑf˜¦iZmí B²,³,»~ã¦?û¼¾¡á¥×^w»\¯½ñfqI Y[³sç÷ÞocÜÙÙF_xùYQ¶öåWÍ--wÜs/Ƹ³«3 C£Ñ¨¦jå¯ÌxÃår¿òú;wî\´tÙ'Ÿ}nZÖí÷܉DfÏ›7ó›o.—mÛØ¶Ÿzö¹Æ¦¦å«V=ÿòËÏ=ñô3ÁPè«o¾ýèÓÏZ[[zìñ¦¦¦—_›QRZær:MË …Ãÿ}îyŽe¿þîûy :Œ±iZˆatÝPõ…—_]º|yqié“Ï<ÛÐØøøSÿÝ^TŽD BuíBY–ŸøïÓŠªªªúÊk3:::›[Z^{óÍŽŽÎGžx²¤¬|gmí£O>URVVßÐðôó/°,;ó›ï–-_YU³óɧŸaYöƒ>^°hy}iko#ËœNçû}üÑgŸK¢ +wìxåõn—ë•3vî¬ýü˯>üôSIÃáðŠU«ž|úY‡$µµ·wtt|ûý•;}âɶöö÷>øpμyËV¬xówyžúùvTU‰¢H×1Q(‡'ý–e9ÎÇ~ðÆëþ±m{Ñ#O¯×ã=räÈáÃR’“£Q™ÌŽ^}ÅåkÖ®½ýî{>~÷ãŽ9ú•7Þô¸Ü§œx¢¦ë×\yÅÚuën¿çÞOÞ{Ƕí’ÒÒ©“'ü~Ç=j䈡Cöë;ã­·ÁPÈ4ÍP($+ÊOQøPT5 GeY×uEQt]—DÉïó­]¿!)!±fçΉ&Ì_¸pýÆ’$vu½^¯ËåPX8fÔ(ŸÏ‰DX†1 #*Ë¢ 0 Z³n}Rb¢¢(I‰‰+V­ŽF£dþÃ4âÚyž‹kjn.-+s:/†Bá¶ö6]7B¡XVÔH$"ËŠªi¡PHày·ËÕ¿¿‘#†÷î¾nýz²xMÓ4˶ Ãhjn®¨¨p»=<Ï©ªš——{ó?o|âégjkëÆŽåv¹F1bøÐääd†aný÷Mÿ}ö¹â’’î¹û¦®ÿì«™wÞwÿ·Ü"Ër¯´´eË—766®]¿!%9™ì– 06 ƒšú)”Óƒ‹ÜÉq\EåŽWßxsÁ¢Eµuu×^ue~~ž(Šó.*)-•$qðÀK–.­©­=ó´S/YºeÛ6EQÇ#I⇟~ºa㦌Þéùù /®«¯1l(À¶í¸¸À’¥Ëêû÷ë[Z^>iâ„ÎÎÎÖ¶¶sÎ<}GUõò•+këêòúôñù¼¡uu/¿öúÎÚº!ƒ1¼WZêg_|•–šrÖ§•”¼:ãµuƒ?n¬ÛíúnÖ¦ižpܱUUÕËW®ÜY[Û¿_¿Ö¶vQûõ-ذqó„ñãš[ZlÛ>tˆ¦ià­Û¶52 ËŠ2zÄðu6 2dÔˆásæÍ_°hñÁƒÎ?÷l1~òIyE¥À gž~šešó.ªÜ±#5%¥WZªaÇm+Úž‘Þ{À€þ>÷ÛY³Ö®[ʉ'ö+È/*)?v,™ýÆÿÊk÷ûýªª¦¥¦†‚Á>ý¬¬¬|ø°¡€O¾ø²¶®6.7dð ;ª&Œ§jꎪªQ#†§÷JSuáâ%••齃ÚÛ;&M_TRâ'Œß°ióÚõëG *˲?ÌžûÙ—_± ;eò¤ÉÆïØÕbu…ýú®\½úãÏ>gæøcimk{í7#Ñèä ²³²ŠJJ.<÷œ¶ö¶/¾š©ªÚ?®º²¡±Qàù!ƒ¯ß°±Onn¯ÔT}÷ =¹“rXñ["w„P$q¹\BMÓDQTUUÝèaŒu]w:¦iF"â!#‰" ?)Š"Ã0Bƒ„È'/, 4 “8’Ó‰¡Àó]Á ˲d›YBHÓ4UUãâât]—$éö»î™~Ô´É'Ȳb9d‘WþŒç¸X>±0g,ËÆÊŠ…-ÛëKò'DzÄ<%Š¢¢(ä˲‡a¢(†ÃaÛ¶‰›c,WGEŽã8MÓH†¿íÚ¢(†B!Ïó<Ïwuu‘íMÓ$§Çò!‰Ãá°±(ÄÕÒ0 –eIn,ËèúOûP"„B¡ N§Ó0 A໺v•‡Ã‚ ¸\N]7dEÁ¶í÷û‰ã,Ù=XUUžçm˲1&3é„nè§áÛ(‡¿1|QC˲$IÒu|£( à §ó'žçIf—ËEܽeEaÆáp³2èpîîHßCvéŠ9•+ªs¯$émÛæy^EQœNçÆM›[ÛÛF ¦(*¹*QHé± ¿,ËR,+–O¬{•EòßëKò§n¡,Ë!EQ†a†t™²,“…lÝÇtäDr $`§¢(D|óµdY€1Ö4x”’jÓcùıБ^ˆ29ªi{¼ÕÙ¶íõxlŒIë)Ê¥“CªªA@UÕX¡²¢0i»£!uoºC}«S(”ýð§àº‡Fa 0þi8SÒîQc"²¯ì2³û‡Xˆàî`Œ­]¶rÓëq_{åÇÅ„ÏÚ'Üæ^•Ùëû_¬@ì¼;Ü&B°ûµtßý|ß|P·†Ú÷òöÚBvl§õnñ“÷{9{Uì@ÉbX{æÖ½ôî‡ö-í–ûýD¡P7±÷Æ@²]ûACÆ•éé½2£î¹ÍËïX=ª_ åïÇ!“þ_³»È/!4 S&ú½:V=Œe™´ P('™ôsFEºœNQ”b“Ÿü½%™¸]2 ‡5]cr»ÜÏSË5…BùÛp¤ŸXäËÊË,Ë% AØÜÜäv»Ó{õ޹Ù0¸›~_w£X·_,ô@Ó û&#“·ÕÕU Ë‚`YVcScB|bbB¢aî¡þÝ'`e5º ¾öŽR(Êÿ¡‘þâ’"ŸÏWß—¨›®ë›·lª®®ÊÊÊŽ ®‰ KN§mYBÓ4 Ã` ˆÆ² #ˆ¢eYº®ÿbÜ|‡$¦› >Lœâ’í™™Ù½Òz1 cÛ8l޲ɶ­ää”îÕã8Žô ÃèšöóÞë{Šr8$YV”Þårªª[oA¡P(¿#ªô¹lh¨‡õë[¸¡¤î‹¥UN‘½à¨‚¡ƒ/Y¶,çv¹‰w£ 5;w>ù̳É!Ëò”IO9éDÃ0xŽ5L“A(ÏxîyŽeÏ9óŒÄÄÄÝ›ÓBD`š&‰%Ç0Ìw?ü˜••Ÿ×‡8ÎÇúâ2OÞ60Æ,ËUTVÄâ2zgÈr”T[’Äþ…ý7lÜà÷ˆS¼mÛ.—kÙòo¿ÿßçxáÂóÏÍÊÈÐtçùØÔ„AHr8Ž5M+öMggç²+§9ã8âON!«LÓü싯Æø‰/&ñ·!¥Óþ€B¡üüÙ&„PSssfï^uMíO|¾5²øÇ?Þ`Yv|||ss3Ñb²v¬³«+‰üß?®¹õ¦;V×uÛ¶ššLÓt:_|9³¹¹ù¸cŽöù|–eE"²p‰x¦Ë²,IR4mimµ,‹a?‰´´¶’eJ‚ ´µ·‡Bá˜9ȲÌP8˜––&ËÛ¶0¶1¶Ev:‡ÔÑÑNÄcÌs\]}=Ïs7\÷¬ÌŒ^y!Äó|sK ÞI:°¨,†aYVcc“e[²¢´´µñ<D "1[ZZÈ`†aZZ[UU2,cš&ÜmJ2MS„ŽŽÎp$"¡¾m(Ê_›?wÔ0PÕT‡Àm­éDœÈ ||[ÛØÑŒ< †È`ì^éjYöÖmÛUU8aüw?ü8wÞ|ŸÏgÛöu×\µzíÚH4ºvÝzlãw>øÀ0Œœ¬ì‹.8ヌVTuÄСii©_}ýÃá¸âÒKª«k$Qz÷ƒ1Æ­míãÆŒ¾úòË^™ñÆÖmÛlÇÅî¸åfM×1ƺ¦íµðŠlF Ð Ÿ6caYÖïó¥$'ÅÇÇkª†zû½÷«jj†¹æŠË«ªk^{óÍ´ÔÔ´ÔÔ›6ûý¾P8Ü+-­¼¢â´“O:dpiiyA^ÞÇŸ}nYvÿ~};æè^yUŽÊII‰çŸsvuÍÎööŽŽŽŽ{î¼cÆ›o©š–›“={Î<†eN8îØaC†hŒ?+…Bé ü©£~ X„Ž`$+ÅíçÕêú®ÊšÖ> ÀïB‘¨$I¶½Û&Ž1„0”•W—”†ÃáP(”••ùÌuvuƒÁÉ“&Œ;æòK.~eÆŒ1£F=öЃe•sæ/PUõÜ3Ïœ~ä´O>ÿâúk¯¹ë?·egeUÕԄ¡p8|ÞÙg_wõU«×®]»~ýÚõë{èÁ㎙ÞÙÙ[œÅ0ŒªªÝÐMÓ4MÃ4MÛ¶TMãy!¶r cÌñÜêµkï¸ç¾¥ËWÜxý?ŠJJ¾ù~ÖØÑ£«ªª?ýâKÄ –aïþÏm½ÒÒDQxüá‡"‘è”I/»ø¢¹óèº^ߨPU]½­¨èÈ#¦}Ô‘-­­«Ö¬2xÐi§œÌ0LIiiÿÂ~;v”••mÝ^”–šúö{ï÷í[€zuÆ›ÇÒh0 å7óçNóB`YVz¯ô­EÛ¦O›ö'þ°ºÊÇœ…Bù_8¸È¿ $ÈZMMMÕÎªŽŽv†aââssú$&&’jd!YQ¶m/Ò4Õ0Œ¬ÌLI’,Ëêž^ZV–œ”‰F-Ëê•–†*.-mii“xŸ{­ç">9$€%Øm/"Q-eYÆp,«¨j,Y,Ü)Ïqš® ËÆö>KŠ,ûw^dô»gH¡P(ðÛ¤àsòÏÄÄ€ ô:¸ß˽o†öžÆx›®e¥P(”ßÊo‘~ÁYJëà 1eŒCŠ1wK“ªÛD”mŒ-[66-lÚûLÆòÓ¦µKÑMû§Ï± çlnÒMBp ,À²1€AÐ)°6Æ´ P(”ßÀÁI?Æ€E°#¢Ÿúè¢'fnw¬eÙ<‹âý’aÙ~¼ìw ¦e;Öãà¼.Ñ'Æ»ÇÁ%x…àqp6Æ‹½b¢WàY!Hp ‰^AàmãX†O|º%¢˜ƒdÝZQÖ ð;yÁÖº¦¢Ý%rn‘£êO¡P(ËÁMóÚ»$~Ƃʣ‡§Ed£¨6˜Ÿê)©Íøps}‡EvIQ‹iáó'eÍÞØÐÖ5Óš½¹±O²ûÿŽÍÿdyMyc¸º5zÌÔÓF§ïh ß;¿2¢š×Õ'5 Ýùñæ l\65§0Ý[\šñáæ†NE†€c‘ecCß®«{øËí—MÍ>uToŽA/Í.{nVé?¦ç+Hˆj¿egG …Bé±ܨA¨èæ‚­MwœÚ?)Î1k“À¡›ÞÝèžfcÌ!øâwÅŠn½³hÇζhZ@:edúÂmÍï/­ž»¶®®-:¥Ò}ŸmmîRïüx‹È1Sú'ù]ü}Ÿmk k)>鯷ÖGUó¶6&zņ§Ù6À` „œ7äás}°¬fê}óŽy纱—N͹僗½¼ŠgúS(Ê¯ç ¤ßÆXâ™òÆðêòöÇ¿.ZRÔ¼¶¼mSu—®šw9`úàEãú&¦'»_]RŒó&f†UsmE ©K\üñÃ{]01«wœceY›"÷Ÿ3èœIÙ.‘ÛPÖÖÖËC.‰ÝXÕ©©æ]g8rPŠßÅ[¶Mfz[‚êæš.ôÓã‚mÑmµA‘eR•} …B9(ÆàƒÀ1ï/ª:z@ò¿O+¬i‰ÞöΆΰ†8ôÒeÉ>±­MæYtúèÞg=¾øö3ð,s×[ëºtxk§ULC6º"ZP1Â!53Þ)ÛøÅJGçŧÇ92SÜ)~ñ¬±Y NÙÂ/ÿP–ä;:d „Ð0­{?Ý¢èöí§Nê—XÚºéÝÙ‰®W®Yê Ê]åJ¡P(¿æÒK/MNNŽm÷ʲlGgÏñn—Û²÷ÚV”·9.cTn\n²»S6.áä‘éï,ÚQÝí›á“ŸçhègËÌMv©ÌÞÔ(‰ì”þI’Äå§zÓã¤íòQƒR†dú?Y¾smEû LÿуSæmmš¿µÙ¶ñä¤üTÏGË««[¢½}“ú%r 2m<"7î’)9i)(›£¦œ3>Ó)°aÕDˆ ?åð…a˜–Ö¯×Ës<Ý`‡rÈa¦¹¹ùà"wb ¼NÑ-Õ° ¯@àËÆ,BAY‡øœ|D1uËv ¬aÙžÕL !h˜¶nÚV ex™6Ö @à8ݲ!Õx–g‘…1‹`H10!Í´B!B@3lD£ÚPohäNÊaÅ/GîÄÇþ}!ìŒjBA@0º+t°¬›@Œ1ƒ Æ 5¨"„!ŀȚ¹;@t„5AY3£’!{›¾+ôq÷C$Cmݶ $¨šecË’$Põ§®`ŒéHŸr²é'͆‰Yº³ßè’{ ~¼ßã<ú¹St…òWCÌ0 ÞsE¡rö–~bó©ÞYÝÚÞj[6PS(ÿ@Uá8Žÿ)‡{H?Ù~$595)! cLuŸBùÀ€ìùC¥Ÿrø°ƒÙåêP×Bù›@EŸr¸qài^z³R(Êß:£J¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=öçÛ¶1@ú…~c !<Ø`ŒmŒÆ„Ð/æ«€AøJì^U˲~M¡ …òwâ¤ßápˆ¢0M3‰üLJ!Ãq†aTñc–ebP–eUÓ~^ˆ%I’$ lY¶,˦i(ý®€½Ī !Œ dYÖtª?…Bé9Pú1Æ<Ï/\¼ä“Ï¿PeøÐ¡—\x>Çq¶mC1ÆB{÷ØB¨jZWKK|\Ã0d(“Ä$Þý'9ÅÆXäù¶öö_yuëöí/œwÎÙ£F ×teÛ¶I²îgñ<¿|ÅÊÏ¿š‰±™™yêI'¦$'[–µ¯pcŒ†aZ–EªD*¯jZWssbb¢¦i×ýó¦3N;eÔˆÑh”eÙ} ¥]…Bùû±ŽeYIZ¿aã½>”•Ñ{ØÁQ9Ê0 ¤X–ň‚@¬%.—kë¶íÿ÷¯wuB¢("„8–åycÌq˲,ËJ’IJ¬ $+žeÛÚÛ¯ûçMë6l6dˆËåTYEI’$± !äyžažçEQ¬«¯¿çÁ‡âãâòóòË+*ÚÚÛ]N'˲,Ã0 ³JA9ŽëêêÚYWW³³VQžç‰îû|Þ­Û·_ÓÍ]ÇåõÉu»\!I’ö-TEÒP(ÿ#‡úI§Pö`?£~„‚ˆã8M×EIKK;áØc’““ÚÛ;®¾þÿN<î¸ Î;÷‘ÇŸ…Ã#†ûø“Ït]¿òò˾›5«©¹åêëÿïŠK/INNzñåW].× ×]‹óÈO2 £ªj~Ÿ>›¶nÉÌÈøÏÍ7‰‚(IÒWï¼kƇï¼éñx5M3M£¡¡áÙ_*-+/ÈÏû÷?o|ùµ×wî¬íèìì_Øï¦þï¡Çïèè¬ØQ «vCa§Ó9oáÂ^yÕép8$ÇÑGùí¬YO>òð·³~¨¨¬œ8nܽ=ìr:§9-99ùëo¿s»\gqÚÌo¾kii¹öÆO;é䆯ÆhT…B=öDyEE÷B;»: ûõû÷7pG]Êÿ„Ð4ÍC] å'ö~Œ1ÇqM-Muõu’(9â¥gŸyãw>úôÓñcÆÜrÓ?øùÌ™'püì¹óþïºkgý8; ŸqÚ)…} ¢ÑhQIé­ÿþW\ ðïÿÜ1lÈàºúú»ïðÁ{î..)yðÞ»¿þöû ›6ýë†ëxøÑå+VžpÜq¦i67·ääd{<ÞÆÆFŽã\.׫o¼ÙÔÜüðý÷>øèã3Þ|»¥¥Õíq_pÞ9ÿ¹ëžc§O?ó´S7oÙzÙÅE"‘g_x©²rÇ[ï½wÜÑÓããâ_ëíp$ÒÜÒ‚1…Ãmmíš®;ŽÇzÀï÷···G§Lþqî¼÷?úø„ãŽÝQUuÓÿý_ZjêŸ|îìêÒTmÚÔ©N‡ã£O?åXÖ²l–eyŽèõx ûõ³mûµ7ÞTT5+3³µ­51>a˜Áƒò<ï¡ú†ú‚¼¼½ 41)) `Я 0‰ü¢ƒ…²/cžç·mÓ ¾>Rö–~ 0BˆeY·Ë5gÞ¼;ï{ .°,kÚÔ©ÙYYÉÉIcGžñÖÛ·Ýô/—ËõÆÛï¶´¶ÔÕ7tƒ£FŽ`Yöä3κðüó¦NžTRZÖ+---5UŶ¶¶P8 ÛÛÛáPGG‡aè ÃtuuM?rÚÖmÛ¯ÿçM‰ míí×]sÕÅœïCŸuþmííÜ}÷ ¯¼’ØÕŽD:::LÓŒÊrGgg8‰D£ ¹ÙÙãÆŒ¾ö†ãº‚¡œì,¿Ï{ù5×Fe%'+SÕÔŽÎEU,ÓÚ±£Šå8—ÓÑÖÞ‘””È0ÌY\xʉ'ꆮëú¹gŸuç=÷í·PÛ¶yžç8ŽJ?å7@Þ¤9Ž;Ô¡Pö.]ºtРAº®“ùLAÊ+ËgjJj{{{YyESs³Ïç>l˜$Š<ϯ]·îúýûãwßîž^\ZV]S“œ”Ô¿°˲;ªª*wTå÷é“¿xé²öŽŽAdfôÞ¼uë°!Cê"‘hÿÂ~›¶lIˆOHï•fÃ0 ÃlÙºuGUµÓå웟ŸÑ;½¢rGyEE~^~vVæºõ¼^Oïôô 7eefˆ¢¸qÓæÑ£Fš¦¹eë¶ü¼¼@À_QY¹ný†÷?úøåçž%qó–­~ŸÏápx=îÚúúÁò<ßÐиzíZŸÏçõxX]³sGUUfFFW°«WjjzzziYYEeåÞ…nÚÔ»WzbbÂϸR(?ClÔß;½·Óá$.dÊ¡‚Ü›7o> ô''%Û¶-IBcFMÓôx<ÿ¾ívEUž{êIEQDQÞ0LEQȹ¢((Šjš¦Ëé„ꆡëºC’¢²ÌsbEQ‡a±‡ƒeY€±ªi𦉢(Š¢ª(ª¦¹œNÓ²t]w:šªÙ;Žp$!t8$]ÓŸ{éežç·K’øØƒ%I´,˶lÓ²žÊ2¹ZQ1ƶmG£QADAÐtaX]×u]ß¡‡¦ëdÀ¡þÉ( þ4; ÄÍ@¥ŸrX“þúõC-Ë ‡Ãc²n–ã¸öövY‘O?ådÒ(Š"Ë2q©„ªªª( 1Œtƒ`÷à`(Ä0Œ¢ic„P$»Wá’ÿ£Ñ(Þ½š!Dò!„"Ñ(Iï:«+$¾¡¡P˜eÙ‚üüÕk×5òøãŽÅº®í^!ÔuÔM×uUUÉ÷±"B«¤’û/´[U)‡'Bÿl[UpÊ_¯æÅÐÝÀM¬ÞO=ú„0*ËûÚ¾»Ã0Ì^Ÿ„`·òþ̉{ýûûË™tÇ=ýä·LKVÓ4÷Ê*¦ÚÂîUŠ%‹%øùB)‡'BÝÐ[Z[vùÿR¢ßï÷º½t–ò—†=¨ÔdA,>œÖ¸F¢Q:<ï™´¶µ¦¦¤º]î?m$^USÅ1œÓI­7”¿0¿eT{X),BˆAˆ†`ë™Ø¶m†Ïë³,ëO(c, ¢(ŠŠJ¬…tàOù«rp£~ å0Ä4M¥ã.clZ&¶£·^ å·ñ[¤ÿ°2øVàÝ‘éþ´âþ¸²þ*¿2жí˜ôã=Cþ¾WA ú݉(”?Šƒ–~!˲ÿc@ò þ†gò7Ÿøk2´m;ýí7¼Ë“Å; ÃèºþÇ™H,0RO2ÑýG”E¼žºÛ²!8|øìÆî Û¶Y†’Õ¿­}º·ó^|pþÊaÈÁI?‰BÕÙÕåõxº?QdlE¬ŸDŠP7=»ç`cRât8UI-èöôîŠØ­Å»!0–$É4M]׉ê‘Sbåv¯j÷‡¶{J°{³†aÈÂ…X†N§#•‰W+„ˆh© ©•Mƒݦ»cs D÷[ÛÚÂápJr2‰Ö²;@hËïÞb±oºgHRÆšclÛÂ]~J<ÏE£2Ã0Ñh”,3†?%Û»Aàž?ľ¿W¬ÙI¹¤–eéº.Ø}±`w¸WƒÀCîA÷Q?©p0Æ»\νÆ(± ûŸ±¶úéƘã8A¢Ñhwǰ]ÒOn å¯ÌA<´äyhni½ç‡4Ms»ÝÇãvK’ðû%I"«ºÜ.—ßë%Ò p»]^‡ˆ…Óéôx<^¯wùªUc·ÛµKã0æy>8NŽãœÑ&§Ó ‡’är:7oÙÚÖÖgY– q€$жm <ïv»}^¯$IÇãñt¯6˲~¿ßãñÁr»Ý~¿àt:7oÝÚÚÖ–oÛö²+]N§Ûíþì˯ŠKJ€Ûåòû},ËÚ3 ã÷ù|^Ã!aŒG ˆ-s:å?öø‚E‹5Móz½n·›$#9`ŒN§wcÝBÈëõü~žç!.—Ëëñø<"»,Ëúý>I’8Ž …Bk×mHˆg执ŸíèèŒ'Ý˲¿Ÿxžpçt:½^/‰› p:{–.Ù¶- B à÷ì.È!I~Ÿ/..në¶í/¿>#>>Þáp8Ž…‹—,\¼Øïó¹\΀ß/ð<é|^¯Çí>Ô÷0èÙ4M§ÃñÅÌ™ï|ð×ëEÑãñH’èt8È]1–$Ñív;Û¶-ËbÆëñH’dZÇq’$ÅÅÅC¡ÕkׯÅÅݽ2ù¡Ú$ŽBù+Ã\zé¥ÉÝv;aY¶£³ƒçx·ËmÙ{o²lW0¸båÊ#¦L.¯¬\·~}EåÛÆsæÍC%'%UUW—–•o+*Š ¸œNãÕkו–—§¦¤˜¦¹m{Qyeåö¢¢W^Ÿ …~¿ßç³,Kàùú†ÆÙóæ*ŠŠÜQ]’œ¬iÚöââÄ„„¦¦¦çÌUT…eØytGUµÏçMMMÝQUõÜ9Ç¥¦¤T×Ôlݶ}õÚµˆaÖoØXV^ž™ÑìÖýP(4wþüÚÚºää$A/Yºqó–ÌŒŒP(tÿÃTî¨JIJÞ´eËÓÏ¿Èq\|\À²­@ÀßÐØ¸eÛ¶uë7$&Ä{<žP(ô㜹Õ5;5MKNJ**.^°x1‚0>>`ZÖÓÏ¿¨ëƉÇ«FiyyEeefïÞÛŠŠ×oÜè÷ùœNçÖmÛÖoÜTQYiÛxÎüy b‰ô(Š2áâµëÖ{ýÌív'ÄÇ}ûý¬¨,—•Wü¾@ ÐÖÞþÝ?D#ÑÌŒŒæ––²òŠmÛ·sçõx,Ë*.)é^:‚0--µ¬¢rÎÜy;këRSR\.WQIÉœùób¢Ñèœù t]ßY[›•™‰„=o8ÞVT´bå*‡Ã§iÚsæî¬«íž~gBáPÌǨ³(k×o°m» ?oõÚµ«V¯QUmGUõªÕkÒ{õ²m»¤´|ÛöíM--©))Ƕµµ-^º,*GÓÓÒªª«ËÊËËÊËç-XøÙ_‘®Ž„]#0ˆ‰D#!‡Ãñ+ç–†iimñz½<ÇÓnƒrÈa¦¹¹ù7H×òU«§Nžtû]÷°,»~ã¦ÅË–þ÷?úxÚÔ)/½öúæ­[[[ÛfÏ›?eÒÄ×ß|{ýÆMMM«Ö¬ÉÈè}û=÷@:»ºjjvB32z§¥¤ „jëëïºï„øÃ0ÇO?{ÌQGn/*þà£Oô/¼ãž{ ÃpHŽù‹¦™™‘|þ¥—“g~óÝÁƒ~œ3wæ·ßú}¾—_}=5%eÎÜy–e 2X×uÃ0n¿ûÓ4ûäæ~ûý¬ ›6)вnÆÌÌÌç̵,+=½WKkë¦Í[i@ÿÂO>ÿRÅ7ßyWQ”ê;W¯]7eÒÄyÔ4ÍmEE6mòz¼O=û|FïÞ²¬äæä4M›3o~T–s²³?ûòËUkÖ$Æ'l/.ùnÖ†¡óý¬AÜ÷Ð#,Ë ø?üøÓ1£G¹\.„P[[ûêµëdEþæûï{÷J¿÷¡‡“,^‡³23ï¾ÿÁ¼y lÛnln®Ø±Ãçõöí;{î<^àÛÚÛ–,[6qü¸GÒãv/\¼Øçóµµµ?ôøã/¤¥¦$'%éº~óíwð<¿nÃFRú}2eÒ¤âÒÒ–ÖÖUkÖ¶¶µ!„^|åU§Ó)‰¢$I³fÏ.ÈÏÿâ«™I‰‰Å¥¥‹—-Û¸y3‚èó¯¾:fúQ/½öz(.¯¨¬kh>t¨~(6¹„v»¼oLúÉ«çÚõë9ŽÃ6~äɧúäæ¼òú¼À—”––UTæåæÜrÇn—kÖì9†®'&$>ð裢Ùsç9Ž ›7ðÑ'·»®¾¾µ¥ÕçõõÉÍ!6ð'ÒÏ Æ!Qé§ü%!Òÿ[¬´BlÛ€ÿŠK/=ö˜é½ÒRo¼þ:§ÃÑÔÜ" ÂôiÓ}è§ÃñîVTVÞ~ËÍ?pK[Ûº úæçßðÜô×§¦¦\wõÕ“ÆW5 àt:ÓRSB¡`ŸÜœaC†¤÷J[½vݦ-[Æ“˜’œ …úäæ:¤¿~§Ÿròñdz`Ñâ¦æf˲+wì(.)u9“&L¸áºëÀçž3ýÈi••Ë3HfFFWgW~~Ïssç/°LKQÕÅË–ggf 4ðôSN9öè£Ç““•õŸß”›“ f\|ÁùW_~Y4]´d©ñn¹ù¤ã—$)..à÷yUE4pÀ0Œ¤¤¤AƒŒ=òÄãcYöœ3ϼøÂ ,Ztåe—ÜqÛ­II‰³fÏIï•vÙÅ“»áºëGSs3Ïóº®'%%ö-`Y¶½½£¾¡¡ONîõ×\}ÚÉ'765ÿ0gnVfÆn¾ù’‹/œ»`áØÑ£öû÷?ot»\Ç]pî9W]~™¦i+V­*+/Ç766­ß°QøþýúÝ}ûmùùº®þÀ—^+Ýét5b¸Ïëåy®¼¢â«o¾9ýÔ“oý÷MÇ=]V䂼ü+.½dâ„ñ•UU‚À#†‘$é”N¸ù_7ò¿iË–õ6bŒ;»ºV­Yshoe˲ìÝÍ81yÀö þý¯¾âŠŒÞéGLžtÁ¹çÔÖÖ©š–œ”tõ—ßqËÍËW®úèÓOs³³oý÷¿.½è‚ofÍ2tcʤ‰7\÷cŽ:*??ïŸ7\ït: Ãø)sÛ²±Mmý”¿:-ýÃ01†nD"aUQmË&áÛ ÜõÆ­kZ0JïÕËÆviyyEE…¦i~Ÿ_QEU¢²,ËJÅŽÊή.2£(‰â-ÿúgnNöÍ·ßÙØÔtìôéöyqiéè#0À·Üô¯Üœì[n¿³¡±Ñ4ͪêjC×]N§Çô;©çD–IDATã2xà}wÝ9fÔÈ`(¤iZ(‚„ÃaUÓàî¹GÓ².¿ô’ã=ú¾‡Þ²u[||\RRÒ‰Ç{ÿ]wB„¢Q¹¦¦&‰¦Ù –WTʲbš¦iZ†aDe9*ËÛ>¯·©©©±±1‰È²’––z×íÿ‘åö»ï%Ó–eɲF†iª*‰aç*)+ëììlimMJLP5ìÙbÛ¶ÓéüqÎÜ>ûläˆá<Ï›¦©z8Q5ßÐØìê*--óy½ØÆ--­µµu†iš–ŽD"‘Æ@’$—Ë™Ÿ×ç¦o8ëôÓ‚Á eÙ$è„ z8Ü­t€D<ñd8)ì×ϲ,—ÓUZV …Âá0À@Ó4lÛd,o¦eZ¦a*ŠBÂ: ¼àpH™½/¹ð‚¯û‡¦i‡p²7f…Ùâ-Ã4M“„÷ˆD"–m…#‘P8 Ä66-KUÕê5<ϧ÷êU[WßÔÔ´­¨8>€(Šb躬(--­Ä_+–3ñð¡Pþ꜇Ƙe™¸¸‚00,ëpH^¯Bà'&Q>üôÓù‹äåŸpܱ¢(~ôégضO:þøý -Y!EñÈ#¦¼óþÇ=Ú¶íªêêw>øAh¸±Ç 6ôÙ_JˆëÓ§ÏšuëÞÿèc¡ cÇ:Ž#8âÕ3~?Ùi‹X½32z{<Û²B€øêxÜn˶† …B¯ÌxCÓôdge}Æï}øQSsSnvö€þ…Guäëo¼éñxN?õ”!ƒ>ýü wÜzKBB‚(Š~¿ŸeY¡(JC;zôíwßkšfRRâÆM›¿œù àIÆ3ˆ1€mÛãv[¶øü¢ 0 sù%½ÿÑÇËW¬ê߯ߑS§®X¹Šç¸Ý-ý~?DZË4332AøqÎÜ€ßïr9>?„Ðépp,wÔ´#¶ýçî{DQ¼ü’‹ã¿ß÷ßçž»é†ÿKˆç9Žä9hÀ€)'Îüæ;—ÓyÆi§8NŸ× baòˆ X–ù©tŸŸçùÂ~ý6oÙÂó|bbâY§Ÿöôs/üó–[>rZrR’ßïø].§Ã0MÓëõH’„äv»ÒRSÎ<íÔÙsçoÜ´yÔˆá¹ÙÙše*‹¿eY1/2Óër;!DÇü~lÛ¿Ÿç8ŒÏëeÔØØøÐ£G¢ÑsÏ:sðÀõ÷=ô°(Šÿ¸úª q'+Ja¿¾ /~á•W¯½êJ·ë'„]L¤Þý”¿4 Úœ’”¢a½µmÛétÞ}ßôŸ:y’×ã1 CEQÈ!MÓb‰9–•U•`@Ãá°¢()Éɦe9ŽÛïº{ÊäÉG15F£QEQRRRˆ¯§¦ëضA@µ¶¶W–Ÿ»BE Cd‡¤3 ºÝnŽã8–UuÛ6ÏóAYQ9–ÝïU»\NÑGŸ~º~æ'y¨ºf'D˜Ñ÷[.ÆXàyÓ²Uõ¸Ý?ãìOš½«+¨ij\\Ü^‘aBdžBa‡ÃóûTU•çù½.“çù¶¶vŒm·Ûýk~8!Ë2MÍn—KEâ&ÔÖÖær»ù_ÚZ B0$W×ÝòO¦¦¶&91¹û† dn?æ‡jš&Çq¤{pHRyeå+3Þ¸þê«âž× C’¤h4*Š"1éS†aY–D­ #Nn‡Ãïóÿš]hÐfÊaÅ/mþ C‘°ËéLMInoï`FQUòÅ‚9tà ‚±‘š×ëõù|$¸ÿæ-[š[ZG!+ „"Aó-Ëb0 ñ׎Ã6¶~öq"–n·Û0 r˲‰‰‰D tà Ú¶mYX„}N"¸Ÿ|öE0Z¿aÃI'oÙvBB<‚0 z_ „š®C%QŒÅ‹>`JMs¹œ{ßµrÄx-I©0ɇèÔ^—©ªªÏç%§üÊ›@×ä¤$bÍ -œ˜˜h[–ýK³‘EQ‡Ëå"ûo¤ƒe/¿~@,'iŠ˜‚ë†n˜f$%o®²¢ „Âá0q²»c•“ È­iˆÝ¨{8wR‹?å/Ëï&ýBUÓ.¾àü¸@ Þµ“-ê¶h¯Ä{)WL×,ÛEñ²‹/!&÷1Éë¾F`š¿JãÈh.¶¸‰Øb5‰=ÉûÖŠ€1FædgWîØqåe— (ìF!„ö/Ålˆ­¥úű!)z¿¥ïµ2.vEûMy°QÌ „±hv7é¯]§Ðëü'‹áó‹=¦éñÀÕ—ÿ{÷'Uu/üœÛ§×í°,ìÒ–²tPTºÅ5˜˜X¢yjâ3yÏ$/½kl€ Ñh,…X°Ð›4)[h[€Ýe{ßÙ:åöóþ8ì0ì.PZö÷ýc?³Sn›{÷ιçü~÷GÛˆè;ÓZ÷\;zKùŠHqÀ—ø:C¿®ëY£Féº~~e­èGTU˜––‘ž{¥üÕ´¯8BÐØ¬ÑS&M”%‰ü'ùWúºÐp–áX×uI’2‡£íç1/BA$yÓ×Ùàƒ1¦E»¾J4¡×¡´ºÖ¥Þ8§ …ôz×å¶`}Ƙçøp8,ÂÙGUÕX†9¿æUUMäc¤!“¸r}ÍI›¿–°xy]ˆyJˆOh4‡#á“ûÌÙ\ŽŸ_.::yB¼^¯E²\-]œ7È×®`´3(Š9‚ñ…íp‰>9;A¼Ôë ÀW¡\Á0Æõõv›Ýëõ^ð»¯äd–ІÆŸÇ'‰’IàÂ\© ôƒ+˜išŠ¬ <ô¢h¡3Ø ‡¬V«¡]²Ql|EúÁ• ¢éš®ýûÑU_üa–˜Ð½\ñ ôƒ+Ƙ˜äâôµ'„Ð\\éÎ3ôÇš?›„0çu ~íÅoc'hš„apדç<“ó[6:Þ ú‰Ÿ?ÒËh^Dû‰!DÎwE½U'ŽÍás©W€¯ä|jóÒ®÷Ñǧ•ÃFcbô ”D‘&Âíy é–2¥ÛMAhbƒn£pQ#¼çAÛít ‚ ˜†¡é:˲’$(ªŠ‘DQ7ŒØ¿½.d·¹Ó\oÑ =ÏÝ>‚ºïD"‘h-­Ø´ÐŽ|Vð© ‹!„eºŸ „¾<¿P·¯2š°eYžçiˆØAÔ'[{à›W¸sý&!I*)-ýÕïþç÷‡ÂáÙ3g,ºëÎp8lš¦(ŠÑ#a°¢œÌV&ÍQÃ`Ìñðã²òòä¤$Q£ÉUX–AÓuÓ4kšŽ1æy^×u–eDQ¤ÏÔÖÕÙmv¯× …i¯>EQh¡+–e9–UT•çyDˆÜ•]‡ „¢õi5šúܺº:›ÍæózCápyyÅ€Ôþϯü×ûÆ“•¥i˲Š"›&ÁÓ"”º®ëºÎqMµOSð<ßÒÚjèFJJ2MÝ,Š"!$¶€ Ïót¢Oò<÷ú›o=–ýìYŸ­Y÷øcÐ)³,#ËÊÙ;}YìU¿an—ë¥Wÿ¾yëÖÄ„DÃ0û¯‡‡ Ò ±,Ãó<ýNi®ºèŒ(Št:= ‚ÐÞÞÞÒÚ:0-M–åhþSWýpVW¸s¹ê'„eÙÎ`Ðér>ý§?Bt說r»Ý6«µ®¾Áb‘†é Eéß/…Äq\]}½¦i©ýúÉŠÒÞÚ©(J$"?óÂâÛÞ0MÕ4Œ1Ë0„‚Â"I’’“EQ,¯¨ˆD"CÖ4mñ²åC‡ ùÖß,:vléò—ô‘!ƒ3hÒæÖÖÖ@ % ÎH§WŽ…E¢(¸].¯×ÛÒÒRS[›œ”ät:é©kÅ{+Û;:ÿëûØl6Q+*+EQLJHPT!Ä`ÜÔÔ\[W—œœ¤(ŠÅbÉÉÍÛ¸yóÃ>À0Œ¡õ ôÌTVV‘#C22L9þ½h -ú3Lccã ×_ÿýû¿×ÖÖ‰DªªkâUU­©­õz<ÁŽÎ«ÅGsòÐ"—>¯·µ­MVBȾýÙ[·oÿÉã?òz½ÏŸJßFLH× þœCFBÏq@`݆ápdvN¿””M[·mÞºÍï÷ýþϹ~öìW^{}æÍ{÷íÏ/,œqÝuïôñÊ÷ßÏÎÉ©­«OJJüñ“?-=Q~øðá’eåqqþA"Bš[ZžzæÙÊʪƦFQŸ]²tþ s—.åÕ1£G=õìó••MÍM,Ë~°zuuuE’ú¥$/^¶¼ª¦fçî/&OœøáÇŸ¼þÆ›uuu+ßÿ ¥µõƒÕ»Ýî¡C2TU#„<»xÉ‘‚‚'NŒ92;7ïƒV;^hiaÅ{«ªkk-Kié‰Ý{öÔÕ×e¾uûvI’^þûkù……;vï.¯¨œ~ݵÏ/yqïþ}»¿Ø{èȑ䤤g^XÒØØhm9bÃ0ÍÀ[ﬨ¨¬‡ÃÆ{åµlÙ¶mûÎ]š®ÈÌTE„+WÉ/X»aCœß? µ?ÆøÓµkó UUÛŸ“3rDæÑcÇçß0wûÎ}üéñ’’šÚÚ1£Gé—.þåcÜÞÞîrºhë\´6ïÞýûÔÕÖ;ž–6à×øCœß¿aÓæÃGò32ÒŸüÅ/ªªk>Xý±ÇåILLøË3Ï<|hæÍiii;vízéÕ¿W×Ô)((/¯hFd·Z,ÑP \éΫ@#Æ„ †alV«ÝnWUíï}WQ•'žüÙ£?Ü/%¥9˜9}ÚÒž««oXõᇟïÜñø#üù÷¿ËÉÍË=p Îïâ‡þêÿ~ž–šú?ÿýøì3"‘Ëqª¢ÔÖÕõï—2gæÌñãÆñøÈ‘ƒ‡>\ÅêšêÔ~ýfÏœ9eâÄñcÇ}ëÎo~çžEë6n:v¼xøÐ¡{öîß»?›çùÉ“&þöW¿ŒÈò£?4g挽û÷‹‚ˆ1M³¶¶ÎjµÞróM6«õÝU«hUñ×ÞxkpFƔɓÝu×·î¼söÌÆùí¯~9|èÐ@  ª*Ë0Þ÷½'~øÃ’’ÒÝ_쩨¬\üÌ_o]xB¨³3ØØÔ4rD朙3i;Rj¿~³fL›1mÚ“?ùqN^^AQáŸ÷ÛÇ{äƒÕ746Ò 3ߘ?ÿš«¯BíÞ»—ãyBÈÌéÓ22Òü£Ç$I’e™c9Y–ßÿpµÅbñz<+Vý«3¼„©ð¯V¢+JE—ËE¥=ñÃÇžzöù’Òý×Ã,Ëþ÷c>ôÀýŸ®Y³êý?÷ô_¾1þÛ+Þ …ÃãÆfýéw¿½má‘#2ó‹ÿsØíš¦E u¦A¶~p¥;·ÐÒu½_JÊýßûî#?48#˜¦$J²,[­„˲·[’$É"EÂcAàyžgXÆ0 Q”h”Y×u“z_4))é…gþª¨êOùë`08gÖÌ÷?Z}¤°àê)“}>ïâgþª¨êÏ~õëÖ¶6C×iiEQv»Ãáxü±GƉDxžWUÕít)ªÊqœÀó!“Žãþò‡ß 2äÿ~ý›‚Â"QlVëˆÌÌŸþä š¥6øêº!GdÃ0LBX–Eq"È´Z­²¢¨ªBxA–åIÆ?ý§?ä8ð§§ÿJƒAHQTZŽÆÐ –ayAxcdš&Ë0Á`è¹%KšÍññqÄ4i]׉iÊŠÂ`†dšMo·ÛFdfþôÇOÐ’#—z'¹Üuú„¦9uÊ”{¾u÷·ÞÊ`Ìqœi&11¦A-»Ýåt¦©éÃ0Ä$ˆöÚ!H%Ó0E‰D"²,Çþ–i¼Ôk ÀWuÎy/((üÑÿ' Í›{} ¥… òÇßüêyú•eK9Ž[ùÁ;wïæXvÑÝw1,ûôó/ðŸ5jÔØ¬¬›¶†a·ÛGff>óü⇼℠„ãÅÅúÏó´šÕu×L}åõׇddd•“—÷ÉšµÏ;ìvŒð„ñãÞyï=I’æß0·°¨(ïÀAI¯š<9z£OQUŒaºa D8–mmk{{Å»¢ X,V·Ûuãüyë6läy>ÎïÇO?nåª÷9–™;gŽ?Îÿ«ßþþgÿû–eMÃÔ vãëèè˜2iÒ†M›ùÑkšîpØwïÝ»}ç.Ã0l6;fz{올ç/}~ÉÒïÞ³(;/÷þŠ¢Þtイ„zÏYUµºú†ÖÖ6·ËÝ5,]l%ÎïkljúÇ[oßtã‚-Û¶q,GËŠA ù·bÃ1½4ǽ³reÞÁƒº®ßuÇío¼ýÎ?|lÏÞýK–-¿máÂʪªg^X\V^1wÎìë®™úÔ3Ï=ñäÏÚ;Ú~àþ/öîÓ-‰d¤ ‡#|êéïûžÓáˆv*‹Î ZüÁíÜ 4Ònuõõ²¢˜†áóz A.—Óét–ž8‘’’üÔ3ÏÅùü“'M2x°$‰ ÃTTVjšFóï·µµy½^–e5M«¨¬ôûýn—‹v´(.- vGŽa³Yí6ÛÿþüãǽëŽ;šššJËÊèKN§Ã0ŒŠÊJI’ú¥¤´µµ=vÜjµf¤’e…âpØ››>Ÿ7ë†áq»éZVQQ_ß0tÈà„øxŒÐ‰òŠú††~ÉÉÉÉI¡ŠÊJ‹$%''wttÔÖÕõï×vþ‰È²Ëé$„´µ·ÇÇÅqWS[»õóíGûõÿý<7ïË2£Gâ8Žöá8¶º¦V×õýû„N”•I’”Ú¿?íVÄó|k[[QÑÑä¤$×c³ZéÆlïèð¸Ý­­­>Ÿ¯¶®.ÈÌ,)-­ohì—’œ”˜x©÷Ë]ÏãP8ÜÖÖ¦Ë0.§S7Œ„øxY–;:;Ãáð /.»ãÖ[S’“Sû÷£ •ÕÕ>¯×ëñ´´´`†±HÇqíí ññѤ­„­(ЮPÑç\›—v}cc¤i:BÈ0 ]×A°X¤G~ôÄóçÝtã‚@ @ß/‰"fp$"3 Ãq\´;$Šª¦Ñ»g´V;ƒ1-èXQYù§§ÿúÔ~ït8LBèK²¢Ð#MEÃ4Eå8V’¤“ & C—$Ú{c¬é:îZ–ãTU¥E¢(ò<§išªjôUÃ4UUåXVYVhÏ?–atÃ@q§ªjvN®(‰­þdäÈ|÷^Y––‰Däèõ&ÝzcZd†v^ŠVp¤ÿ%QÔu]ïêrŽ1¦Û„.6Ïó´ ê䪚ÚUhœIEUE¼?¾[Ú+cD¢» ÝÃv{AQÑ’e/-yö–eBá0-À ‰¢¦ëªªÒvÂh‡]Ú]8ö+x¡¥­Åf³yÜÝÐÿíØ.ýà²rþµyi ØnO2 C­ëgÏJNJìèè@]#’dEA]ƒe¢ýÙ !áH$:f‰‡éÆó|ggð†9sh©^Zþ…ö¤¦oÈ2Bˆa°aÁPw£s¡‰þK/"˱SPE–ŒQì1ƺaèáH´fa´×¥‘å}ÙÙWM™|ÃõsÚÚÛMÓ¤Ÿ½ØTºV!­õ}U×õÎÓ«!F·Iôot:±K¾mŽïö ݘ(f išÁ ËéœÃÜ`(H¯hÆ`(„ºÊ)£®oGQ¥Ç <Ã4LӄѼàJw>‰zG4úcþ¸Ò1ôCƒ&¸"†Á0 Ïógv´¹ÿ?sñ· ÿF6¡B ¸üõš²û"ÌñÞÏÀMpÙé=ô«š*+²ÖÕp~h²OÃ0 üƒËÊ|H÷ò€óǸ<õúA°HŽåàR€¯Â$¦(ˆ,ËÂÍ3pYé=ôGSÔBƒ_ÅÉÛÂöÁeæŒ7ráz€¯IàòýúÁ•$¶ÝükÿIzA'ÀeB?¸’ð¡ß0M„>C>2Ó4» ˆN½N­çû»½ÔóãtLM¯â΄Æg“]ý,'xñõº¡!&!Ì™Wö0¹ C4¾äüÑX_]S uš†Éó¼Ïç÷z¼Ýº Ç®¯i’³É~JóiƒÁ†ÆYQ[-–Ä„$A £û©%ve/Ίp!œsègÆn·3 6 3w»2b†–™>CÓCÓDĽ„V«UUÓ$½¾¤( ¨›ðÙf³r‡é›(´W„‹ÅbÆ—T8Ó¢žåiãßú*ÓÁÓ­Û(AsÊ[-Y–•Þ6}Ë²Š¢|]kÑ“ÕjUUÕ0Í;éó>Ñ”×Ç‹¹ÝžÁCxކ‚ååeRÓ4]‹î‚ p‡B’tª|—,Ïó uuµƒJNŒ#„”UV=Z”žža³Ù óT—|†al6k(&1Û¬Vå ».—9ö¾ûîKLLŒæ¦ç8®¥µEà‡Ýa˜F·c†a˜p8¼/;§°èh}}}\\œÀóô§1ýÉ‘å’Ò!DKš ‚PS[ÛÜÜìr¹è˜{ÔU ƒNüØñãV«5:Ÿ¾D=vÜårÖÕ×wtt¸].8X–=|$ÿÀ¡C»£µ­­½£Ãíru-bŒ2MÓèúe@á9®¤´TUšu‹&¥Ë]Ó4yž¯­«kiiñxN`¢ï´HAHÓt–e¢ãø» ÃŒ>ŽN“Ú¥/B¢Ó9ù|×tb+¾Ò±1𮵢(Å%¥.—cl˜&A#Äq\s °s÷n–eG´JAtÖ,˶´¶ÖÖÖ¹].QBšÞ}î±k==Ðo¡Û’D—“.3}À0LÑÑcÏÓ"'±U évˆÍ|À²¬$ŠÑÒ:g‰^•-Œ‹‹>l8Çr,ËÚíöä¤äÒ%a§ÓIKµÐo°¢¢")!‘a™òŠÊ¦æfŸÏKëªwý8mÝY– …B'N”Nœ0Ñåöf5¶µÌŒ¢(/>Ÿ÷C¡ÐÁCGhÝ.Ã0ŠŽ³Ùl<ÏG÷ç^Ï1,Ë665º\. ?¸äX–mhh8‡#Ð4MQ+«ª~ûÇ?æ8ðîª-yq9-ŒåõxÜn—(ŠõõõK–/×uÝjµú½^—Ëår¹Ö­ßðÙºõ^¯×f³Ñ#Äív{½A4M{áÅåMÍÍ<²þ¸Çíöy½N§SÓ´ç–, ‡#ë6l\»~ƒÍjÕ4Íétdçæþã­·‹ŽÍ=·fýúu6Z,žç}>ŸËé ‹ê°Ûãü>:;Ó4m6Ûëo¾u8¿ÀëõŠ¢hš¦Óáðù|n·›¾ßív{žãèÔçõz<z† [Ìn·K’ÔØØ¸fÃÆøøø³ÿñAã~kk«aR„BAMSt]D¦i 4¨¶¾&zÁ`¬iÚïþô—åe„ßýéÏuõu6›ÍëõºœÎžûݼUÕ•))É‚ <½bï;ÛË^ü´è͵ã-k}CÏót/¡¾¡áÛ÷?ð¯?r9‘Hä¯Ï¿ÐÔÔ,ð¼ÓqjÓ]ê〳rn >!Ã4ÇŒýû_ÿ*ÜûÀƒ­­­¢(¾öÆ›6›íŽ[oá8Þ"Y$IÊÎÉý|LJÃqï=‹Ü÷®µëŸzæÙÌáÃgNŸ ß|ûŸ7߸Àív[­†aAcÓ4ßZñnee嘬Ñ×\}µÍfÅ‹¢ˆ¢1%hyóŸ+DAð{})É)õ ´`ä‘üü›· 8pîœÙ¦inÚ²õpAÁ„±c§Lž$˲IˆÍf[»~ɲ²©W]5aüØO×®;’ŸŸššzÓ‚ù Æï®ZUV^qû- mV«aáHäÝ•«æÌž•¬¸xù+¯&'&ÞºpáÌéÓŽäìÙ·¯¿~3§O£ã¸Ü¼»öì6xpFFzqIéÜ9³ZÛÚ7oû|Æ´ëòܹ{÷Ð!C†¼ü•W“o[¸pæôë¾Ø³oϾ}'ŒŸ~Ýu9¹y…G‹–‘#2«kjE¹ãÖ[­V =­677¿ùÏwêëLÓ´ÛlÅ%%kÖo˜6à–›nZñÞÊü‚ÂÌáÃ%QZöòßÀŒiÓÒÓmÞºíúY3KOœè ­V‹Ûí:q¢ì¥W^MNJºãÖ[®¾jÊÆÍ[ŽN7öªÉ“TM£—ß®YW]SsíÔ«g¤üÙgm­mMM æÍ40MUUA¶ïÚUW_º~ÎìVÜÖÑ~Ó‚)II,˾ñö?û¥¤ÜpýœôË+*·nßnµX®Ÿ=ËãvîÚb×ÏšùÏwßÛµgossóü溜γ̃Ʋl0Ø)ŠÆ(¶ñ]Qd‡Ý®Èr´ÚeD–3‡_t×{íõÄ„„ñãÆÎ¿á†Ü¼¼^÷«&O¢­díC3Ò×啇æNÜÒÖç•-¸*ÍívmiØh@7 cÊäI›¶l?fLFFºÅba9aüéÚu5µµ×N½zèàÁò6¸¬œ[«kWãɉç/~vñ’Ñ#Gy½Þ§Ÿ{A’¤êššW_ÿ‡$‰º¡B4]9"³²ªêïo¼‰1ãpØÇûÎ{+:üîÊUVU‹¢øìâ%ô—2m-ņi‘¤Q#G¾½â½œ¼¯·°èè«WÛm6Ó4 1Ÿ_ºL×õ#†cŒéšðùöŸ|¶&%%ÅjµzÜnÝ0|^oÿ~ý–¿òj~~Áû}„¦ ¨è³5ëDQÒ4x—Ëår9ããã>ß¾cù+¯f†1 1Mb‘¤7ÞþçŽ]»=÷s‹—+.YñÞªˆ,s·tùKÇš&EáÃÕŸìÝŸ˜˜ð÷ü£º¦F%ú †1dð`‹Å²xÙòÚºº§ž{RzâÄË­èر^\æóy·lÛöÎÊUñ ô—Íy4÷ºAïÖÐ9ê†~RLU^–e[[[o»e¡i˜‡yä¡ï———/^öR¯û†y2 c„¦,6¬n êÁˆæ1 Ã8-4-ߨ/9ùÞ{-}ùezCKÅ7ÞþçŽ]»¼ϳ/,9^ZýÀåì@Œ!‡]¥/öî}à¾ï¶´´+>ÞÜ-­­†aðϱœßç«®®Ñ4-(²<23sö¬™ó®ŸóÑ'ŸutvÔÔÖvt#²Ìsœ( ´XxI’Ê+*"õ rDUÕÌaÃF ¶c÷̚>}@jêõ³g>rDÓ´¡C§ H9cƤ‰öegwtv–WTD"rs `³Ù®š<ù¶…7Ó÷_;õêææfúkæDYy[[Ûã=:súô8¿?¿ °¡¡±º¦¦3ljn‘9„pÛÞÑ‘“›÷Ð÷}gÑ¢¡C‡lû|û iߘ?ïÖ…7ë†.Ë Ã`Ó$‡ý¶›ož;{vAaQ{GGmmmgg0;ök§NýÁ÷d0óÖŠwý^ïúþÿQeUÕ?ß}oòÄ ÷Ü}÷ýßûnvnî°!ƒ3ÒÝõÍ;ìg]ê„Þàu»=ª¦r¯iš¦©º¦[,ÖúÆz«ÕÊq\låtŽãÆŽÉ›5ÆápÎÏohøÒ}ƒ˜^§´¼rdzÒÌLÛñc¥µ••·]•àqZkjëâ|q±ýGY†íèìœ7wnjÿþ/ÿý5—ÓÙÖÞž“›÷Ð÷{Ñ·†òùŽ‹nü‚Ëß¹…~ŒEU­Vë#?t×í·¿ðâ2«Íæóz3Ò=ð½ïÞwïwLÓl4—–•=óüb«Íš5jT8Ö £¼¢²¶®n×_Œ=Úçó%'%ÝyûíOüðQ«ÅÒÞÑq¼¸DUU‹$å¾úúë3¦]gµÚ ƂNjK4M+=q¢9`YÖ4Œ`g°³££­½-‘1ÆÇŽgYÖív=úñÇYpà ÁPè;‹¾åóùþøÔÓÄ41B Æáp¸´¬üxqqEE¥×ãùãSO9"99 3ØëvºfMqqqKKKGGç¼¹×{ÜîÅË–s‡Ò5Í0ÍìœÜ†††‘™™Gòó ×oÜ”>hE’!²¢Ì¿aîÕS¦üù¯ÏT×ÔÜ8ÞÊ÷?(-=1iâ„–ÖÖón /ÕÖÖ±,›ÓØØØ/%Ùá°_;õê'üÄ„qãZZZ:;;;ƒÁP(DÐp£ëz|\¼®ëëÖo(.)illJLHp8c³²ä‘oÌŸ×ÜèèìÔ ãÓ5k7mÙ:gö,Ã0^hhl,-++.) ƒÇUUW766!‚²sr+**X†]t×tû˜„Ðv¤¤¤Äu6ÉÏ/.)‘9<hé ;;;Yéúêq(nmk3‰ç÷w}ƒI’Ôh)=qbûÎííí×]3µ¶¾nçîÝŸ­Yg·Û¯›:5ïà¡‚‚ 7 0@Ŋʪìœ\å\ZE Ãp¹\N§kï¾=§ÓéryìG}c]AAAúÀŒÓ®²1F…Ãáp8„JˆwÒ-Ö˾A†Ñ4m`Ú ººÚc%Çïž3ê÷÷fýá{ã®;h_N6"(11ñT¯0Œ ÓˆÈr8~ôá‡>’›ëõx“’×nؘŸ_P\R2bx¦ ùnÁ•àÜzøÐî­m­#†5rD^ÞÁ䤤‰ãÇ­ß°ép~Íj“5úp~~uuõµS§îÍÎîì Ž‘™””X^Q±s÷îÔþýï¹û®´öìÝ—›£éúøqc›šöìßÕ¤I¼ ج֦æ@ÞÁƒv›}êÕW±,»{Ïžé×^³c÷î8¿?}Ð BH]]½ßï÷ù|š¦Mž8á³µëF9|ØÐO×®;^\<0m@[{ûß_# Þtã‚!ƒëºÎr\]]]YyùÎ]_\wÍÔoÜ8¿½½cNÆxܘ1sgÏÚ´uëÎÝ»““’yž÷xÜwóŽ5ëÖ8Ðçõ†‘¿c÷nÃ0nœ?/"ËkÖ­·Ym÷ÝûmŽãX–­ol|ý7ËÊËgÏœ96++)1qÍÚu©©ýo¹é¦Ò'Þxëí²òòY3fLš0!ÎïÛ±k—a7Λ×ÔÔ¼yëçUÕՙLJçÃ18#½¼¼|ÒÄ ¢ Ž1"‰8ŽÄ„„ÕŸ|Z^Y™Ó ,Ëú›Ž—÷ï×ßëõ444N?Îãv—”–=v<>.næ´i Ã|ôñ'º¡v¼ç¾‘Ao°,›˜”Ÿ¤¦®¶£½¥9Ð\tô˜a‰&E tò–C°³£sLÖh§Ó™’œ´LŸvÝø1csrs¿Ø»oöÌ™3§_'Ë2íf{Ô@pù =|ðÎ;³²²h×xBˆ(ŠÅ¥Å6«-)!IÕºw§¿¦AˆD"!›Í‡žÇ £iÃ0º® ‚`DZ²¬ˆ¢H{ ò<¯(Š$Š¡p˜NA‘e–ãèýC:,“Þ2eYVUU›Í¦* f˜Øî†ôÆ€$ŠfWß Ú‹Q×uQ Ã4M‚0&„ÓD‘6ÈÒ~ý!C×9ž—eYY–mV«ÞÕ­SU„1Ë0c]×-K8¦@žDQUUMÓètŒ#²L㪩ªÅb‰È²Àó?ÿõon]xó¤ TUeYVSU‹Õ‰D8Ž»¦c³ZUe¬ëýy¡ªªÕb‰D"Ï3 C{£B$IB™¦)ð|(¦LÓDˆÐ[#áH„ç8‚i«UŽDxž—Åb±˜¦©iÏóº®3Óµ@„˜=¶ÇqtÃ"B"²l±XEF‹¢H¿kº u]WUUžãE¡ß ÕjÕu #Œ&[­Vú•E×”tm1Ó4­V+1Mùô gƒ " RssSUu¥¦j§sPÚ ^à{ŽÕ »q´Gÿ©-ÖÛ¾b†òVUU5š†MJLJLLTUõL;?!DQ;ƒAÚc5ºéº/6!‚ äæ§öOµY¡¢/¸ÄèyèСs ý¨ûhÉ“£m "´û3}Ã0ôx OÒ¿'ßßÕ/úþØZK´S`ÏYÓgLBp×’Äv~ïuQc^FgG;¶3]ç•^?ûÙØîÑC7Ú‰;ºÌº®;ŽìœÜ7Þ~ûÙ§þ;ÓS*f:=·@ìÛN-yÌúÆ.s·Än·è;BÑW{®fÏu¤£Ûõ¼J¾Û7»£ón¢^ÿ=¿A°Ñà‹16 SQä^¿÷ž{é—ﱇÇñMÓzý;YÚ¿‹eÙn›®×# B?¸LDCÿ™“6óL×e±Ñêät*Gßsòë ¨G }ì¼LÒýX¥§–®yZŒèK=ß;;tzև蠤Ӟì:{u[ÇÓæÕ#tžZfÓdFQ”„„øÇ}!m+ˆ†ã^§Ó-.wÛ°ÝÖ·çœ:×"DˆÙk8Ž=1ŸiûtûRz_’ÓOu±oþò%ìùïy·{hš½Ç Žî_¾—~ù¾¥( ý)=Ã}ÉdQÌiµç·»ÊÄ$¬\nÎXªE’$†aà†Õ¹!(µ†a4U»h…ÂÁåŒBKµ@ð—•^B?Ƹ¬¢¬­½Íˆé1 ÎÞ™Z!@ßÄ0L[[Û€~.õ‚pÊi¡c¬iZrb²ÓáDJLð5 „ø½~A ¡\>º_õÓD†~ŸÿR/ÿ9!ð\Vzið!„hšv© €ÿ *ž‚ËKï·y¡©þƒA!ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐçpº®ÃAMÕ0Æ—za\@„UWu]ç8޳[í*§Bè€ÿl„A8Žƒès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès¸K½p™"„\´yÑ| zŽ„‚‚нÂs,‡.V‚Ã0Bwac2!„c8¡zÂëº^ÝX­ª ºðáŸeÙÄ„D„P}C==\ „ø¸x†a ô@wãÚúZ«ÅÒ?%Å4Í ü b& V×V#‚âãvÇš#FØ0Œ†¦ÆÖ¶VýÐišº¦õËȸó"„$;’jjë")Iɲ¢\ <Ê„ŽãLÓ,È/„нÁØ4Í‹0Bˆaš#„°aš¦i^¸Ðoš&AaèÜ ½¹èL.æ 1„~èMP½ÇÉ…yÏ—ÈYôÚ¤WýݦÃ0 Ã0cÚ#ó<ô6_Œ¡‡œÁiØ4MB˲¨«#&Ã04°Fc=ý×0Œ“ñº+ìF?Ûy¿Çc|Z˜6 CÓ4Bˆ ˆÇÒÖ'BHt"=D'JgÁ0 ˲º®÷<ÁU?ô"- !/ÔÔÕr,Çq\iyYɉRQY–x!åyžáàáC‚ ÐRˆË…ÂáÎ`§$Š4LÓç{›Ý©Sˆ ÇŠïÚûÅá‚#û²÷µµ·ÑÓ‰( à „8Ž£>`0eBÃ0lj¢¨éZKk‹(Š=Ö B?ôÇ>$¦ísiš!DQ•¶¶¶º†:EUY–Å757—•—…#Ì0mmmeå–AäXñ±‚¢¢¦@c¬ézEUek[+à_B7ôÒf\7Ãï÷—–‚‡Ë*+BáÃ0­mmôgD{G‡®ëY.«¨…BÇ…#áÖ¶ÖÆ¦Æ²òŠCùGèXŒ¢­UÚúàLNo%ÇEÛpây¾¢ªòPþáÚúºìÜUU+««ŠŽ …ꪲ ÓÐÔ ‹Ž­¨¬P% 665†q¤ ¿£³óxIIcS˲_rc¦­½½®¾6 ºœ®`0˜_T …ò #²\r¢´º¶c|(ÿp %Px´(å(ŠR]]{ð@m]][{«ªªuõõ†aœ:‘„н:­}œÂ`Ì2,ƒ†aA¦aúýþ«&]íñxŠKKêFeŽÈ5Úa·†‘’”l³ÙL“ÈŠ’”˜œœ”5*«¥µ%Ðx> Õ5ÔÑ{ÑÙukÇ…ÃáƒG«š6røˆÊªÊP(Äó|KkKkkËÀÔMÍÍu õN»CV”¶ö6ç[Z[›[Ç%Æ'L?)-5ÍãöL;N„Øs †«~èUl&„ˆ‚ØÞÑ ‡dE´$IB1˜AˆºÎó<ƈ^ò¦¡jZîÁ,ËÚm6Ó4MC—YSeŒ1Ïq›}Tæˆô´Aš¦ê5Ôc ÓšzíUSUUiëhçžç·Ë5aì8ÇëñxLÓ,,*JINaF·Ë5~ÌØ„¸xUÓ0Ʀ©¦¡ªJ89í·Fnó@ﺂ1ÆXÓ´„ø„x|μ}¹Ù‹¥_JŠa5µ5»÷îVT5}à ´Ô%¥¥yèº.ð¼Õbinn–™eÙøøøŽ`ç¡ü#~Ÿ?>.¡²ºª¦®VVd3§‚2޹³ŒBˆãXMÕl6Û€ÔEI I6›­¼¢¢¾¡A×4Q¼AÄçõ&Æ'ج]/é:Dz,ˆáu{†=pøà©N>!„FxçÎYYYªª^ ñcp%ª¬®œžý—ö²W…v¿x>¿°PÑ”ô´A’$Ñî7Šªjš& Í— -’…eY–a5]3MSŒq("I¢HïôBDQ<œŸ=r”Ò•È륽wTMã8# Y–1¶g'íb ‡X†¥ýyB ÆcÓ45]xž¾™c¹Ž`çŽ;¡_?ô¢ÛÅ0!D×užçíã¦k,Ëy=Ú¢Bx^úcìvºMbBLbÒÞœô%›ÍF'Òmv„œ6K–aéH.“žçiª}‡ÝûÙØ±/E{÷cŒ%A4It^'/û!ô@¯º7„œ¥…±®ë)É)!EQc‡tŶªæ©ô˱Ï÷’èä ¯“N>ÓÅ(úñ/I+t¦—bâþ©)Bè€îhˆÄgÎàf†ÇíF]#{¿Ò¼N5Ú Ø1Àh¥#ýЃ1Ã0‘HÄáp˜¦ÙëPIù¯VW‹ „1–#Œ$+ íˆùµßz=y2C(Ž‚¡zç‹«ohhljºÐ3¢Áâüñ£òŠ Žã.Ô…?Ɔ®Ûlv¯Ç ¡º#„H’”’Üïâ¤ì&u°YmtŽ„‹ÅR[S ¡zq²«ÌEéõî/è !†aB ôÀ]¸›®—vŽ0šúýÐ眱Á'ÚÎuá GëÈ|½S6 ‰‹è9ñè@»³Y¯hùøOrÆÐo·ÛY–QUMQ”/ù<¤ç¾iÎ QMÈȲÙU„¾gœ5Mó\'n‘$žãÆÄ4»¥¬#„pg‘$EUUUûò¨NSv\œûûp1õúi à]»¿himœ‘žÚ¿¿IH4P4¯}'Çq‚ ƒAÚ•>[¾’Þ®¦§‡hº QÊÊË ‹ââüÇEÑjµÊ²L§8Ã06›- Ò˜ôÜ`­o}À0 !ˆe™’ÒÒ¦æfÓ4EA6tH´]ÚöŽŽ½û³ÓRSããã4M£UM“1 aFUUMÓ¬Vkìò ˜Á{Ñ5€+ {ß}÷%&&ÆÖ Eñ¥¿½ºgßþp8\xôèä‰]N§a†aØl6ÉÝ.—d±pWßа?'wÜØ1²,3 ãv»%QTT•a§ÃaµZžÁî°ÓäG„«Õš“—·dùKÇïËÎî߯_Fú ÏÖ®Míßßår™¦év»-’„1VUuÓ–­Y£GaŒDAÄ cš¦ÃáÐuã8·Ë%I’¢(6«UEEQ0F‹å§¿üÕƒ‡--Õµµc²FÇùý’$Y$É$„ò—gžmjjŠóû àt88žWÅb‘lV›ÍfÓ4Íb±8ív›Ízàà¡»¿¸jÊd‹$Ym6Žãh~S—ÓiµÙDQ¤«s©¿A8,Ë644ô, Œ ÃØ³oÿÃ>0oîõÁ`PQ”õ7Ž5*>.nßþlŸÏç[ýÉ»²,Ï»aîª÷?ضcg ¸~ö,BÈ»«þe³ZÌ»!oý|{}}½×ëñx<‡äÏž9#cРˆ,K’tàÐa‡Ýþó'ÿGQ]×w}ñÅÒ—^>pèðí·,´Z­ÿxëm„ÐÍ7.Ø—³ìå¿UUWß8^Mmmœ?.9)qÓæ-'ŒoïèØ²ís›ÕúówïÝ«iÚu×\ …ˆi:ìöo/úÖÕS¦(ŠÒÔÔüéÚµ–VY–¿yÛm7o>xèÈwÜ–>(½¬¼|×{ú§¤LŸvm~aQUUU{GÇõ³få<˜“›7i¯ד>p`AaaqIiMm파k¦^mšæÜÒÒê÷ù¦Lšèt:¡EpÅéÞŒnš„eÙ{ïYôúoþä§?+(,r»][¶}¾iËVžã^yýŠ¢<»xñáü|ŸÏ×ÞÞ.‚(4ü-^¶\SµcÅÅo½³"Ž,^¶Ìår~°ú“M[¶I’ôÜ⥪¦sìì\0ï„н÷?ð¯?D!„%Q¢  ].W8~nÉRM×­V«a‚ ¬zÿƒ¢¢"‚Èko¾U[Wÿ›ßÿ±3^×õ²²òãÅ%ÏB0ƒUU}æùÅ÷=ôðâe˃¡àóK^ä9îÐáÃo¯Xáõzxž“DéØñãO?ûrçí·ÎÏß»?ÛïóŽ“5aÜ8EQÛÚÛ¤¦Ž;&#=ý¾ïÞÛÚÖv$¿ ½³#h©¨¬2‰9hàÀEwß=~ìØÑ£FÜ{Ï"ÝÐÃáÇqª¦õKIYúüsÿõÐ÷?ß±ëÙ–\sõUýú¥|gÑ¢1YY^"Ërss`dæð©©?øþƒ©ýûK’d³Ûž÷xÜV‹eú´kkjjxA „Üûí{~ð¶övÚ¬Ïñü]ß¼ýO>yçí·iš>8#ýÛ‹¾uãüyMM£FŽLNNúîwîÉ/,6tÈCÜÿÐ÷oÙ¶M×9³f~ë®;s¸ý–[îÿÞw¯»ö†Á6›Uàùi×\s×7ïÈHtüxqNnî£?xø®oÞ1dð`ú€+Tï=|>üøãxܘ¬Ñ«>ø ®®~ÖÌ+V­záÅïþæ7EÍ=jäˆÌ'ñKDШ‘#«kjŠŠŽJ¢äv¹§§/˜;×n·G"‘P(…‘p8éèèÐT !dš¦(Ї©©­4q ´ º¡G‘ýÙÙ‰ ñ¯½ñ¦nè3§OË/,Ô4­­­mï¾ýS&MÒu½²²².}Pcc“¬(×Ïš•9|øOñKËíóyÛÛ;Æ‘e„°,ˆa0 6t]Q•`(ÜÙÑ … ÃŒD"Á¶¶¶©©öYYYùö»Rû÷Ç·wt „âüþ]_|1"s¸(ІaD"²¢ª¡p ‡-V«Ýn_·a£(Šííí_{·T¸8ºßæ¥U(?\ýÉÆM›÷îß¿`Þ ³fÌày¾µµeËçÛÿ÷‰Ç1Æ+ÿõþÆÍ›““’æÎ™>h`qiéþœœ™Ó§%'%mܼ9¿°Ðá°§$'WTT^{ÍÔòŠŠ8¿?m@êñ’’)“'ñDzlÞÁƒ+ßÿ`ÇÎ]‹ôƒ‡¾o·Ù9Ž[³n}Jrrú 9yyuõõñþ¸Ù3g(ªºaÓæÑ£Fôï×õ§Ÿ=~ÜívÍÊZ±rÕþìÜÌaÃÞtãÚ +*+¯™zu$æy>¿°0''oÏþýÇŠ‹‡Î´´\5er Ð5=sø°ŠÊЉãÇÎÈhoo_ýÉgã|ÿÁú†«Õ:233-5u_vöšõxŽ÷û}Š¢ø}>«Å2jÔÈ#™Ã†]3õêÕš“—W[W7kÆtŸ×Ýtpù£·y{¯ÍkµZäˆÌ°,Ïó¡PÈét~üɧ‡òóù³'ƒÁÏq¡pØjµ2 £ë:½@Ö4MEC7TMåyžV¡T…¶†Ó·©ªJLj¢ˆ1RÕjµÒ;½¢(Ò.=<ÏG"–a,K4uµªªtj!ú„P8q:º®³,‹1Ž´E1ÚõÓ4MžçEaY–eMÓ£Ó±X,º¦q<§**f:wŽãè*sGû}ÒN¥ªªJ’¨iðN§³¦¦æ‰'úÛ_þ"%9Ê®´°ð¡C‡zoð à ƒ ]£qMQ”[¶Ü¶p!B˜¢éº$Iº®#„0Æáp˜ö¸D"´ó;­þ‰È ƒUU¥o‹D"´…„N>ƒô³Ñgh˜F…Âa†a"cÙC¡ŽE’è“´£}4þʲ]ŒqD–Œu]×õÓ# aŒMá®)èºN{ŽÒÓUìtÂáˆÅbÉÉÍÛ±kWCcSÖ¨QÉII÷W¢ÞC?­à…ÆÌɘþ{ ÉȇÃÑòÑmòŽ> /œH·õúdô™n/щôú‘è2t ¾Ýþepï‹qògAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“tDIDATxÚíÝu˜Eúðªj›_÷MV"›{BHB‚Ûá.wÜý€C8ÜÝAƒâ®»ñd“u·ÑžöúýQ›a#pXdÞÏÃÃ3鮑ýNOõ[UxÑ¢E’$Y–%Š¢mÛÀ¡ˆ¢ë:Ïóš¦ñííí¥¥¥………„ƒÝ0eYÛ·o¯­­åÓÒÒŠ‹‹mÛ6Mó`· ÀÄq\ïÞ½yQB–eÁQ?ÚLÓÁëõò”RvUü€C˜mÛ]ѹ‡¼xÔóñcŒv«À¡¯ûAÆx¯cŽø5ìÓØýò¯ÜÑ7!„~øÖßÚ¯oÑ÷Ñ>àwÃ2—ã8„¥”p°ÅQ„lÛ&„°›BìÖ_Vs?weÛ¶mÛ{Å4!„Ú6 oû'|òã-amãA¿´a ìÃÉ>ùì3ÿCG'”R>þ€ƒÝlp(c‡ó„Žç%fS*‰BȲ,Ý0 éºUày%#!dš¦iY¢ ì{ÐýýÑ7ƈRBH÷Ï:¥T‰©!‚±$‰<φÁº6Ùb1UxÛ¶mJÙö÷ý•ß ÆX× Ë¶d‡ƒ}9iºaS[E›R´û[ŠmÅ¿'ºÝ„~ôwÃ^7ðs±¿/žç !š¦!„$Ibu›{ý¶ŽÔyº|ìÀÃrÙ0Í7>øäËy 5MXÒ瞯ÿnñ²‡žY–åHTé׫èÞ›®»â¦;þyùECú—`„¿[¹æ“oæœõÁ_ß{ÃuC”66·üëîúÞpÕ%Çsg[–n‚ `ŒáLÃ0-K„øM!Q&QÓ´,Ë’$‰RªiÇq’$"„¥š®³ï2~Û¶yž¯©o†Ãƒû• ŒV—mLöûzäd¦Ù=Û÷Ž~>à@²lÛåt.X¶â½Ï¾¼ë_׿ff쪩E…£Ñä$ÿÓwß®é:!ØÐ˜ªZ–…Öu½°GÞ)ÇM6M³±¥Qª¨j^v¥´ª¶./;«3ÔtÝ4-AàóssvVUBr2ÒmJ1Bíë/¿hHi¿ï}hƬÏo½ö¯ÕuõÁP¨¨G>Ïq1UUTmäA=órmÛBmÞ^ÁÂó¼mÛyÙYã•U^·Ûïõ „ ÄÂ|ùÍ¥³¾™SY[×»¨!\ߨÔÚÑ‘š””“™QßÔLm;¢Ä2RSü>o}cSkGgj’?;3ƒ`\[ߨ¨ªÀóI>ŸßëÙ²£BÅÂü¼–¶ö²-[ ÃLMNÔ¯/Úã4?‰mÛ<Ç54·<÷æŒËÏ9cüÔko]yîY…=ò4]ï^¸?Öÿþ¨ÿ`7â,ÓÌÎHï™—ûÙì¹ãF?j8BˆçùP8òêÌ%6l`ÿñ£†Œ)¥¦er·mgå¬Ùsû÷)þï“Ï9$©3з÷äñãî{æ…çï½ó닶﬚0fäÛzù9g>õÚ[—}FœlM×mJ¢øÝ’å¶l …#Ç}Ä‚e+_›ù‘ É>ïUçÿ…çyç—¬\SQ]3fè G^|µ¢ª&ÉçËÎH_]¾ñ¿ÿw­SvÜúàãÿwåÅ©É~„SÇ¢¨êsoÎØ\±óÈqc,Ëâùä›9µMóO;iþ²•Uuõ‚Às„ûïÿ]ûé·ßU×7´w.>óTUU_šñAZJrmcÓu—^PßÔ²`ùJBð ÇÙ§¨à±—ß(ÈËÍÍÌ(éUÔ½w €Ÿc¬Äb£‡ Š(ʳoÎ@]xú)‡ ª(±}‹)è뿌ªi=órŸ¸ó–yKWÌ[¶â“oæÜsÃuÏ!„DA0E‹ç9öAç„Püµí¿œ8-59é¾§_XÒ'ÉçEÁåtZ¶=yâáuMM7ÜóеŸÄØÑáHDàyv ¦ª†i]uþ_–ôùÇ÷œ:uòÔ£ŽøÛmw>g¾Çåä8‚0’%iźò­;+ŸøÏ-~Ÿc|í÷¬.Ûèq»²2Ò† è ‡}^Á0Œ¬´ÔÃF »ú–;o¼ê2Lðê² ”ұÇnÚ^ñÝÒåËÖ¬Ç>røY'N»ì†[·ìØyÄØQ+×oX´rõ×ó…‘³Ož~ܤ ×ßy_UmýœÅK‡(mnmŸùÙW7þõ²´ää_sENFzTQàÔ1øel›Bœ²Ã´,D‘ì!¶M÷ª»Ÿ¾þƒÝrp(£”J’¸£²jÓöŠ±Ã†ˆÿÀ³/µutPJÝ.ç™Ó§jºN0Öu#T]ßàr:9‚cª†µmjSJ0^àyã;ƒÁŠªšæÖ6Jmj[¡pÄå”[;:tMc]ÿ¡˜ª^pÚIýz÷²LSQUYv4¶´645+±˜ßëQbjSK«¢Ä,ÛvʲišUµu¾ 'Éç=yÊ1o|ø‰Ûéê«ù‹Ú;Ôö-,p8$Œ°MáÏür¦i¦%§\uÞÙ£† Ä‹‚ì÷[–µ×YÜï+§-Z4|øpÃ0 ÂP”RžãÆaE‘%I–$M×m›Rô}M «²ßã£ØU½Ùu›RBˆ(ª¦ñgÛ¶n’(Š‚ †®ë¢ °Ç± ñ]³Z7M7\N‡®¬ÜcŒ("I‡‹QŠ8‚ÝNç>åõx®»ì‚`(ÌÊLÙ_ÆÈ¶mÜu yÞ¦´#r»œÜîßÕì)°N§Ž`Èítòg†Ó)W×7ÜñÈ“×_vá°ZÚÚ¢J,Éçå9ΦˆÀøu(¥’(ò<U„Ó)›¦¥ëúÞã)EqíÚµPá~?¦eaŒ=²lÛ¶‹±ú÷n¿F©mSŽ`„¾lŒ»Bœ"D)å¶m[UUŽãX·¸$Š”REUyB¢híî+çº C©ªJ0æ9¢(1V?Ïî€0²)U…ã8JmIÖmÚ¼º|ãýÿþ—¦jxŸ|Œ1¢”5[7M‚qªßguûÝÌiš&Æ(Åï3MÓ!‰~ùÍòuë1&# è[T …ÜN§Ïí6-“=eÛ†¿>ðk©šFU•ÕóD¢ Þ߀ù=&r€¾~𻡔ÆÏdî÷ƒgYûù(Z»ï¿Õ²¬îwÀY{ž ÝëˆÚeWRJ÷¹ƒeY”"Ó´0!—œuZÏœ,M×wßýÐßM©¾Ï‰YÖHJ‘m¡˜ªNž8®¤w±Svôê™o&b£Õ~ô)ð |? Bhôû)î„à0Fºaô)è9 OïH4ú[ýEضív:‡–öµ,[U5£vÁÁ³G…œæ NÓõ˜ªqù ÿ(LÓ Ú=³ü¹ƒèû èð ;6žà·Ýæ^ÓõpP|ÔÏq›’~„òJúü#>ê aíý¢(B_ÿ!cÌNlþÎo4Û)Ïó˜mÛûž A|š·­½m}ùz>~hæ‘™ †‚#Œ0EðHœªåy>#-\SW£iÆv§ÿE~¿?59õ`¶€?¾3ÐYT\”ìO6-£?ÄqømQD^hmk­ØU1hÀ ŒŒ 6¶ö@ïclF}C}(jniVb ‹þƒö1Ã#äpÈ¥%¥iæž“ÙPxBˆÛåv»ÝÝêŒÁ¡†çù˜SU55%•týùkSÛír×××746ðÆ8 Ú¶½Ÿc9J%‡CvÈûý“ïZ–ºzq˜ýïw-¶‰á§[†eÛ¢(²eX~ÿ€"*˧SÖu>íàÀfãÙ´icG Ýåtíþ»þ~Z„P$éß`’?ißîM~¿ÿÑBà§À¡ï1:Ào4[]v9¶mc„yާ6EøuŸ<çǯüéZÛÚ“ü¾®5àø3cKY´w´5 j&û+Æ#„-ËJOK_½zUgGGZjú¾ýùü~·èv»GEåÇ'õd«Tì!Ñíˆ?’ñ8fƒ9dY–$ !¤ÆblÊšÙûTýô ”RjSVç£ëºªjii©†a8ä®Etü±¢(bŒõn­Úï•?‹ßçã8ŽúÁ¡a÷—ÖÚÞ¬Å4ÂLFQdÚÇŒ &û?Òá÷Ý–  -*+ßšš:áðqÉII¦irǪA !–m³É ƇCÓ4v}×ùCŒ»_¦»À7ÄÂÞ2„®ëì•g5öý‰Ç .Yv³»•oذhÉRY–Ç›Ÿ—kÏwÍíÁ¦ÆŒO},‰¢iY†a°ëÙ2XÜî7u;Žÿ€°mÛ¦6FQävyœ²“ÚTvÈ;wI’”·{Áèî›xѱ$Iuuõ†iôìÉž¥”ã¹úúFÓ4 zöÐu¡®o#Û¦lÞÖìî“Ѳ–Ä?{Ÿ×ãq'%ûË7m^½f½Ûíòú¼<Ï;]ÎÔÔ”]•U«×®“²ÛídâÞç÷Ž¢”äÇ‹’èö¸N9)Éïñz<7Çq„#„#áh„ã9„ÐA^Àocd[vjN®Ç°Z7nnî464*7õÌ+t{¼¶mýÐÎGý”Ržçš[Z^˜:eò©'ŸdÆœ¹ó"ÑèIÓ__^¾eë¶ã¦L~ïƒ7mÞ2qüá“×ßz{}yÙ§:bذ7Þz»²ªú¨IG6vÌGŸÌª¬ªŠ*JiIɶíÛý~ÿ9gÉŽ(ökuH±mÛår¾ýî73fÎ|þé§JûöÝ´uëå½ú‚sÏ=÷/g†Ã‘½~lQ»k¶>‚q Œ*Ñ ãËËË3MsÝú²õååg~Zkkëû~4}ÚÔÅK—.]¾¢oŸ>ýûõ{õ7SRRN>aú´ã¦|þÕ׫֬6dÈô©Ç-X´xíúõ¡p¸w¯^mmmápäüsÏNNJ²,+Þáƒ1æyRÊŽât:eÙAá9žç¹¥ËVTUUô;zd$ýxöç­mmÇ5Éír‰‚G>ÿêëc']¶zÃÖí;êëú—öx~á¢%Õ5µ½Š‹ú•ô;ïë£&M ‡Â_|õÍ ÇOmllÚ¹«2%9y{ÅÎP(œ™™>iâx„¢(7'[×t8 ‡ jSÞáíܹý¹K'N´r²ÅP¨qæ‡kÖ®›p󭈢ŸtÔO …ÂÓ§N-,,8ï’Ëî¾÷þŽÎN¯Ï;óÃ-ËšóݼP8¼jÍš7Þz瘣ŽLOKËÉÎÎÎÉ2xpßÞ½ßÿ𣲠ÆŒùØSOµ´¶,Z²T”¤~}û¾úæ›Ó§M]µfÍ’eË].—ÆSãXL=ñøãs³s®þû?¾ýnÞÕÿGnvÎq“‰ÅÔ}3®ëHœÒp$2p@ÿ©ÇN¹î†›®¿áÆ­[·¦¥¥~ùõ×MÍÍëËË·lÛÖÒÚöà£2¸¨ Àï÷åçç•ôé=dÐÀ%Ë–4kÖ¤ fÌœ¹fýú-Û¶U×Ô=iÒ+¯½1dðà¨ýàãOØj·¶m[¶E)Å9DÉáYÜ#Š(Ea§Ó¹xÉò7Oœ0~ݺ²Õk×Ï·€RtìäcÒÓÒ9Bšš[Þÿð“^Ž›—,[qÒôã‹ yž_²tÅÆ›?~õêu[¶n««k¨ª¬®®­ûð£OƒÐšµëuÍhhlj¨oœ>õØÕ«×ÖÔÔ¹œ.BHcCóAð'…1®Þ¾­tÌôÞ{ëç}·íÅ—Jd'öxšêªEIú¡£m²×&lÛöù¼·Üxà O?U¢wßwÿØÑ£ÓÒÒ¾™3§¡±iÒÄ C>áøi_~õMSsKAA”¤äI'dgg—mØSÕ-Û¶¥¦¦jšž”ä9lØÈáà { :´wqq8æApÔÿ›b3óø|ž'y¸G~þ9\Ô#?ÿ‰Göz<û¨Q¼†ÝzÅÅ¿ôìÓÅEE·üç®ô´´aC‡~7~YùƉãÇôÈ¿èüó–,]¶uûöÌŒŒ´ÔÔ¡C÷îÝ»¼|£¦i7oöy}¦a:Žú>¬¨°`@i¿A(Ñ(Û¾eY¶eSJ9ž×MC‰)¢(rÇqD–e¯Ïëv»¶íØqø¸ÃŽ9rÒacǬZ½¶±±é¸)Ç ì_š“%ŠÒú²r%;þ¸É[¶n/íW2bøÐÜœlŒñÖmÛ?ü°cŽž4zÔˆ»*G±®lCccÓôiÇ-_¹ª­½c̘‘„’’Þ¥ýJr²³UUã¸Üœlˆ~pHÁØTU##Ã7zÝä#¿àâ‚+®\Ý« yê±íá0Ïq?Ô·¹go¥‡cÁ¢Å÷=ôÐú²r˲’’’BG1ñ‘ÇŸôû|=òóëÆŽÕ#?ÿ™ç_°,›RûãYŸ544”ôíãq»>rÒ%\™‘ÑÖÖ ‡#ÑHg  ij02 7@`ŒUUsÊŽ{î¼ã±‡î¿çÎ;œ²CÕ´©ð±,K„í;vÜñß{.Z‡ÓÒR5U=râÄO>ý¼¶®nèÁÕµµ={Œ;öå×^oljrÊò·sçmÞ¼¹wïb—Ó5røð Î=»_ß>ííí@ ‰t:#Ñh0Š©*Ý]6jS!D)õy¼©)©ˆ"‘4Mß²eëòå«Ö­-ï]ÜkÁ¢Å_|õÍ¢%K'>.--í£O>-+ßÐÚÚ‡œ41'+ëñ§ží߯díº² oßQa™Ö æ/XôÅ—ß,[±²_ß>ÇY±juCcÓ_Î<ý«o¾Õu½WQQ0 …"¦a†ÂajSã9ÂE£ G ÂR0G¢ò†)„µ[·¶lÛæNN¶;;yÂýÈ6wò)'ççå;e'«ù#765­/+ß¶m{ï^Åžw®®ëÙYYÍútÚqSè¿}GÅG³f©ªú—3Ï(èÙ#=-½lCyzZÚQ“&ÕÖÕ/\¼8Uúõí£FQAOŸÏ‡(í_Z‰F{äåeffÀúï[d\’¤!ƒSJuÃØ«‹Ÿã8%¦´¶µædç° _Œq ܰiÓ¶;œN×e]@IOO_¸hqÏùÇydCcã_~]U]sÒ Óûõé]±s'BhÒ„ –e}·`AsKkQaÇs©))9ÙÙ±˜ZÒ·¯m[I~Ïü<Ã0XíA04M“R‰F½^/ÂÈ2­ŽÎ@{GGK[Û”ÉGËdžM›GŽ>vôÈ‚ž=jkë¶í¨ÈÊÊðù|I~ÿ”ÉGmÛ^1xЀ´´Ô•«Öøýþ¾½{6f4¥tÓ–-£F =j$!DvÈýû÷+èÙƒãø¡ƒeff¨ª–‘ž–••©iz~~®Ï磈ªšæÇ%'%ÃDåàORÊóBMuenQqlÃî¥×úö+Ýbê^ÙÙ·¦¾â7ú]xQssÆ8%%µ{½ÇqÍÍÍøÍ·ßðÀ—”ôëÝ»û'¥Q6M#îZcö|ß?y!„ðÿÜ?1x°Ÿ)øU8ŽcsrüÏ»ýV{d? ºÓbÙ– VØDQÕ4LÇóµEI G"œÀSäˆû Œn—Ëí2M“-à€1fó¸ü:†ã»zcq|Ê·ýoý`?Að«°òÿ¤¤¤˜‹Åb¬³e÷CýF³Zb„²m›Õt¶¶¶Š¢(p\8vÉr$æ8Bm;Sd‡# 9’SF î£* «:ÍÌÈ´lX"~ÙtÞ);këjëëá8èFQbJ^N^VfV$!ø÷8õBå'Š"BÈåru­ŠwŸ!Ø=»x×4û»ò7¿¢ˆ +ƒÞKàøì¬ìh?02د:˲\N×ï¶Óxw¿(Š–ök€Ðž«°øî³·ÇKÂÙrz¿æË þ7Ïj@ÊClÛ¦ÝjØÀÖïÌ–úc¥?ôX´OmÒ¯‡öÃð÷\„w«úƒÌÜŸP÷ Ÿ”ääH4Ê&d÷y½ÿs‘–ÁÆò¸\.ŒašŠ¢°ÿñ‡¸œNŽãâC R’“MË ‡Ã!6_t$ÑôýL»H)õx<¶m+Š¿cœ””‹ÅtfjÜÃÁz5à]àƒ»è¢‹²²²t]äɧÒÓÒ²23[Z[_yãÍô´Ô䤤øÈOÖ‹_ƒ]ÙõOŒ©mÓn7‹‚°yËÖg_|qÎÜyU55™éN§ƒ¥?Û”½ûþh÷HI¿[°pùŠ•¥%%!˲yâÉÊʪýûs·½¢âñ§ŸIINÉÎÌÔw7‰5æ”çù>ú¸¡¡¡¸¸(~H«ëúK¯¾æq»322ذ£xúo"Þið+— Ük#œÙº¿A¿ÉÖ~âv~Ãîûb²'õË6nÿÒÆ÷øÇysA"c9´;|ßšñnCC“C’B¡Ð}ÔÔÜâv¹Øâl¡žçÙ¢+N§“ã8§ë&‚1[ÍÃëñ8N‡$ßv{0aÞ‚… >¯Ïãv{½^§ÓI)u:»Vö`ý9.§ÓãõnÚ¼eöÜïÇaŒMÓ|ÿ£ï}ð¡­ÛwȲüä3Ï>ÿÒË•UU‚(:N¶/žç !^·Ûï÷-\²dåš5‡çy¶ÒˆmÛ~2«¶®Þáp¸œNÇí”åßêµ#„¸].I’dYö¸ÝÝFu¿Ûÿìâˆ/&%ð¼C’BN§ü‹óå§ì·û-û´v›xžw¹\lAÄÚ`÷õ°~¤m¬þlßûì÷I’¤Ý3Íîñ¤~NåK[§ÓqR²,ÿxk÷Ú)Ú=`Íít~ÿ¬ôYüÐswÊ2ÙóÅüM:Á~dƒ{¾§Ý.ï½…_ß ð'³»Ã㔤$žçlJ !>¯×ãv¿ÿÑÇ‹–,Q”XjJòõ×þ=Ž<ó µuõ#‡;÷/g=ýü ëËʆ tù%?ýÜó M­­­C† ºä‚óï¼÷¾Úúú¼¼\UU-Ë4-óŽ»ï GÂMMÓŽ=öŒSOùì˯>šõiŸ^Å_xÛåzý­·—­XÙÜÒÒ»Wq|Pfzºi™ÍšÕÖÖ¶mGňáÃ0Æ!¯¾ýμ…‹rs²¯¾ò ·ËußCWìÚUSSÛ¿_¿»î½¯oïÞcÇŒ¾é¶Û/<÷Ü´ÔT‡$Åb±GžxrGEÅ)'žpÔ¤I¿²ÿ‡eSUu̓<êv»B¥ýú~ÊÉ,ý%QdCaÙ9žã ÓŒ¯^‰vÌÆlž·)a銛6o9ÿœ³|ä±3O?-+3“õ¶Å—-Œ×ãsÇÖÀ]@BDA°l›ÆŠ7ƒÝŸ•ó³V ϦSF‰¢¿¿‰ý ¡£³ó…—_qHÒÙg™ž–ÆIB8Ž‹·ÍŽ`š¦$I†at?ªeåüìG˜a`05%…=½V”RžãÌÝ à8Ž=‹‹#„w˜¦i¢ Ää±âe¶ Û…M)·g{ÆcÃ0œNg[{ÛÏ<{ñùç»\NA ÃŽuee‹—.»öš«Y'düLRü—Àód÷+ÌÞö\Z[Û,^<íØ)lògöjì~ݾ#âo.»’Rî–i¾üúë“:ºGüH$ÂêâoA×8yB¬Ý'Eâ/”a˜lµíø'}—°×M_AmÛ´,6=˾ï)› […îï/ÛÔî-ìñ@"Ø}^”RÓ²xžgaÛ\U]³eÛ¶§¿dÙòo¾óÄ3ϳN?­¿~/½úÚŠU«.8÷œÅK—½þÖÛ;*v‚Áã¦LžñÞû[¶n?î0Qœ8qØÐ!5µuѨ²|åÊ$¿èÁ¯½õÖ¼…‹yüÉÞÅEß|;çå×^_¶bÅ›3Þ>mjüüx.³©„.½ð²òò›n»ý‚sÏIMNá÷Í·sÞz÷ݳN?µ£³ó±'Ÿ~íÍ·W­YsÚI'ùý~Ã0¶oßÑÜÒbÆú²rEQØQÞ+o¼¹`ᢾ}úÜtÛ[¶n•eù×|ÄÙBfÁ`0 _xÞyœ{Îú²òç^|ÉãvÛ¶]]SËæC6MSÓ´êÚZ–Jlî$ök&Þ%eYVcSscc£äpÁʪ*Œñ¶š¦‘Ýß–eƒA]×e‡ƒ=¶³3À¢¶££Ã²mAØ»VSW ‡žG”²fðøèãöööéÓ¦J¢¨(Jg I’iY’(²çÒÒÚÚÚÚ†1®ª®6M3¾ ‹•ŽÎNÛ¶½ÏÒåËyü‰p8‚>†#‘XL­ª©‰F£‚ ˆ¢¨ªjMm]LUEQDÁ0Œ¨¢T×Ö²ƒC’Ú;:ZZZâCÒ)¥I2M«£óûöD% 9Ž–ÖÖí;*¶nÝF©-Bmm¢(²,C¡ ›6íܹ+¦ªìëŠ}Y² ²Ã‰*õ š¦Ù”ÊG{GGsK‹®ë˜`Ùá°m›½†lZCAL˪«¯W”Xü‰s'ŠbGG‡iš^¯w÷s[¶½lÅÊŠ];ÙMŽ¿¢(²77 ÆÿlÛG"ÑhT–ì›&Çb1§Ó …TU•$‰Âs\}CCGg'ûyQ»Ï{ÊÖ*À×××G£QŒ°$IÍÍÍ¢(òý4 9dÇu»fÖçŸ7AjJЦé×\uÅ“Ï>wýßþ–”äÿÏï¹êòËr²³EAX¶båÇŸ~ªéú˜Q£2ÒÓ$QBɲƒ`ÂN`465=ðð£ÉIþƦfv úôó/¤§¥ž4}úšu뫪«ÂW\z±×ë}øÑÇU];jÔÔc§<óü ±˜ê×\yùŠUåŸ}ñ…Cr1qBaAÏgžQ’¤Þ½ŠÎ9óÌç_~¥¡±!tñùç¦ùâ+¯I¢Ø«Wñ™§‚1niiY±ju,[µzm}CýÎʪ>½{>vìbšf~^î%^pÓ­·Ë²#§$§èºF÷ïþ% ‚ÃáX¾råëo¾”ä)±üíšy ®Y·þ¡Ç»â’‹úÙ˜>dˆnUÕÕ¡pøš+¯0Móù—^æ8þÌÓN­­«ã8îéÏ窱Ę$%ùï¼íÖÏ¿üê«Ù³=nw ¼÷®ÿH’ä¤ ›6¿5ã]Û¶òrs/¾àüÛîº[×õ‘Çû}ÞÙsæJ’¤†(Н¾ñfMm-BèŠK/ñz¼55µ¯¾ñfK[ë-7Þ0Á˜ªþíª+¯û¿Oœ~¼×ëyâégSSRvîÚuÏ]ÿÙ¶mû¬Ï?w»ÝŠ»ü’‹¶WT¸Ýî×ßz»güššÚÿõÏ”ä¤û~ÄétºàÜsŽštD,3 ãÉgŸkjjÂ_xÞ¹ó.^³nýƒ>víÕ%„|øñ,Ë2û•”üýê¿>û‹ ”Ò+.½¤º¦æù—^IMI>íä“F Fÿ{ÿ„–ÖÖ“O˜>dР[þs§Çí>úÈ#ÑȊU«¨mŸ8ýøÃÆŒyàáGšš›‹‹Š/½è‚7ß™QWWð÷ï©( %}ú7eòãO=cšfJJò_¯¸üó/¿Z½f-Eôø©ÇõíÓç±'Ÿ²L+--õÂóÎ…%TAY–å”ÇO=î¡G?ùŒ3¯¿ñ¦ýKûöéÝÖÞÖÚÞn[Vcc“Ûåš|ôQO<óÌ彿þ‡>~êq³ç~wåßþ>wÞü¿œ~zk[[[[[ lkk3M# µ¶µ‚ÁÎ@ µ­]×õöŽŽöŽŽ@0ØÐØ4tð Œô´ææf§ìÌÍÉžvì”]»*ÿþÏ}õÍ7šªÅ?y@g pú)'ßóŸÛ1!áHdÚqSjë뮸úš'ž~æ¬ÓO;ý”“f}þÅ 7ß²bå*çûôêýòk¯ßúŸ;›[ZDQ$„<÷ÒKÙYYº®‡ÃáÌŒŒÌÌ ûGkØhw‚ Â~f:bsP‚AvÒ⋯¾*߸qì˜Ñó,\¼t™mÓ^EE?ô`8…Â=òò–­X±£b'¸G~¾išª¦õ/í÷—3Nï_R2gîwáYÍ–7!„hšŽDþ~õ_O?õ”7Þ~»3p»]÷ß}WumMm]Ý#÷ß7vô¨×ßzgÆ{3ûôéýè÷ŸrÒ‰ßÎýn}ù†±cFÏ›¿`éòõ õMM'?mìè‘;wUî¨Ø1qü¸ã§N]_¾á«Ù³G¾«²ê£YŸ‚Á-[·Nœ0þ˜£Ž´,Û0Œœìì1£F>î°K/¾°¥µuÒ„ñ×^ý×7ßygü¸Ã¾ÿÞšÚÚ¯¿ý–"ú×Ë/?êˆ#4M{äþû›šªªªÙ·,;(¾ûŽÛûôéýÁ'Ÿœxüñô¿ã–›}>_g óܳÎ:ç/gM9æè¦M£¶ýÍ·sf~ðÑ Çÿï=jdcSS G"“&N¼çÎ;vUV–oØðÅ×_ßxýu—]|‘a¦eB Ó|å7&>î¡ûî­®­ýfÎ\Ë´Î?ûìÉGùÉgŸßðÏ믿öï)ÉÉe徚={Ôð•UÕ|ô± 𽊋¼ïž‰ãÇ¿õÎ Ý0Ø¥JLQåÍwfœvÊI7ßø¯§ªºzÖ_ÜðÏë/»øbÓ2UUmljŠ*Ñ$¿ïÿÞ]PÐsíúuúYŸÞ½¼÷žÜœœH4‚1vÊò—ßÌnii}ø¾{Gùö{3›rÌàî¸åf¯Çƒ(ºâÒKþùk7lÚ´rÕêo¾3røpÖ0Žãœ²|ûÍÿîWR¢ë:¨¹¥õÔ“Nºñúë?ùìóÊêjDÑMÿ÷¯´ÔÔ9ß}wÛ¿o:ÿœs>øø“·ß}ϲíG¸ÿ²‹/ܺmû—_3rÄžïéøñÇN>¦­½}]Ùúþ¥ýÎ8íÔŽŽŽwÞ{¯w¯^áW_S‰F×®_? éÉ'žÀóä~âè 5˲¯ºìÒÁV×Ô¤¥¥Ž7Î0Œ)GU¢1U=ÿœ³“““ •YS[׫¸èðÃËHOß°iÓÙgœ>lèPUSÓRSB×üõÊâ¢"—ËuûÍÿÁëñüýê«z÷*¾êòËz{Üî¿^qùÀþsë-³¿«FJrJi¿’‡î¿wýú²Q#F$'%±Þžço¾á_…Ѩbš¦ÀóW_yEaAAqaá#÷ß·lÅÊã§7nìXŽ#§²ªjÐÀ=zdee¼0qüøÜœìþyÝÆM›9rRIß>ëË7¤¥¦ºœÎYc\ßP âר”º¢äôg¦¥Ð=‚àv¹$‡ãÝ™3N§Ëåâ8^×õ Î=§´_IuMu’? ’’œ¬ëúQ“ŽxsÆ»Ûvì˜0nœ(lƒ/¿þ¦lÆâ¢"‡CÒuƒõÏX–Õíä¤í÷ysss Ãøì‹/5UKMNq¹Ý‘H4%9É!Ëy¹9‹–,¡ÔîÝ«—Ûíf3;eY×õ‹Î?¯G~£&Ñ3?ÿå×_tÉç™–9dÐ@¿ß—‘‘ñÔ£|ðñÇÿ½ÿ;o½ÅëõþÏ:lphàÑî BÈ”£bÝŽáHDQ”Q#‡B"‘è1GeYf,¦7e²(ˆš¦E¢Ñ‘Ç?|›¯ÿØcŽaG²§œxb,³mû‚sÏ ƒ‡ãÔ“NRc±^EE1UµmûŒSNG"={ô¸öš¿R„4M …Â¥%%ǵ-Ë´,6ƒã VvU””””QLJÃácŽ:òØÉ“¥‘ht¿v¬k¨¾¾N‰)½{—`ŒÆ6¥^—øÅÒï|ºu@Ï”«Žß==B„ã6nÜt×½÷ë†ÞÐØø·«®JNNZ·¾¬¹¥EàyÙሩª®é¡¨¢„#‘ÃûÌó/lß¾ãj-cÂÒÐÔ‰F5MS”XFzÚ;ï¾÷å×_K’øÄÓÏÜøÏë}>¯ µuõO=û\ùÆG1ÑëñCA]ÓŽ=æè}ìö»î®­­;ëŒÓd‡ã±'ŸÞ²mÛÀþý'Mœ°¾¬¼©©Y’D—ËùÙ—_57·H¢¤ªêŠU«–._áv»››[ PTXPW_ï÷ù<ÏÒå+Ö®[ït:[[[ÙsÄišÎR S#‘ˆÃá˜:eÊ‹¯¾öå׳#‘èqS&ß|û”R]×Ùäû‘HÔ¶-Œ1µmQË7m|áåW.^rÑyçöè‘ßÒÚr×½÷}æ±XŒ½Sµµu={†BáÌŒŒ‰ãàáGpÌ‘GRJ5U‹©1MÓBmí…=ûöíó¯›þ—— G؉n·Û=íØ=ÚsÛwE¢ÑAôéÕû†›oÍÎʬoh2hàÒåËëêê}>Ÿ(Š£mÛv<þÔÓ /¹ò²KlÛ~êÙçyß°qÓé§œräGÜÿÐÃcFÚ¹«òÊË.íÓ»×?oüw^^n$A)JÌ4L¶2Œ¢(š¦xü´[ÿsW[{{ùÆÃ†¦”ªªvÜäÉ<úèíwÝ]WWwÚ)'55·Üyï}ŸžªªlÁ²öŽŽÁÔÕ×û¼>‡$†FØ©ZJ)G¸P8ôæ;ïD¢Ñââ¢^ÅÅï¾ÿa89|øÜyóo¸ù–p(?¥T7LIæ­­þle½Ëïß¹³î±K‡ˆoÙ6Çq1Uݶ}{,¦ <ß»Wqrr²mÛMMÍëÊÊ<÷ÐÁƒCá°mÙÙÙY•UU§° çãO>ÝÔÒr÷í·uñ—bɲeáòóó²23ו•'ûý.·«¢bçÈÃ].WeUõï¿ÿØcŽÉÍÍ5bx[{{(ÊËÍåy> nÚ¼%;+³° €RZ±sç¶í;Š‹ Kúö­«¯__Vîñ¸‡ ÔÙXWV–”ä=rd0\½v!dÔˆá~¿?¬Z½a4xà@LÈÊÕ«9Â9Âår±SÄMMˆ¢œœì]•U>Ÿ×ïóñ<·£bgKkÛÀþ¥.§sÇÎùyy‘H4ªDórrvVVe¤§Ë²ÃétÎ7ïÝ™L;îØž=zô+ékÛvuMM[{{iIICcSFzš×ë­­«[·¾,7''++33#c}YYCcÓÐÁƒÙ$²†n¸Ü.¯ÇSYU•—›ër9Ë7lÚUYùå×ß<òÀ}¢(Ú¶-IÒŽŠŠx{*víÊÊÌt:¦i®\½šRš‘ž^TPU¢+V­Æ8@r8*+«ZZ[²²²JKJLÓ\»n}0ÊÉÉÎÊÈÌÈHÛ¸iKssóko½}ó ÿ*éÓgõÚu•UU_Íž}Ïÿ n·;‰ôìÑ£¾¡c\XP°s×®¦¦æ7Þ~gú´©S§L†B‡£û»cYVuMM[[û€þ¥uõõ™„ºú†¢Â‚h4ºrÕj„ñàAyŽëì äçç±Ï¹išÿºéæ¡CŽ9´¬úúúü¼Bˆìp°/•˜ª²¢Aœ²lÛvTQxžCëºî$˲LËú¿ßrî_Î9bxt÷Š7c—ÓI2MS×uY–m˲lK’‘HDÅm;v<øèc/=ó´ Š¡PHžã4]g•K¬cGÕ4„Ãá$I×uEQ$QdULŠ¢ð‚à$˶Eá8N–eD©‹±RQ—Ó‰Rb1„ÓéŒß/òAéºîpH¦i±RE‡Ã!«Œ”eYÓ4ŽÂqš¦9Ã0 Ãðû|Ÿ|öùÂÅ‹Ÿ|ô‘H$ÂÞ’Ä «f1 ò,Q‡eš†aè†át:Aˆ±UÃ0˜°ªDI’,Ëܲu»ìæ/Z\]Ss÷·G£ !xïö8ºa°èt9#Ó´TUíú'BJ,Æê‚8ž7 #‹±ÞyŽãX-ì®ÊJMÓjëêf}öÅÃ÷ß[YU-ŠÂ‚E‹«kjîùϺaPÛæ8NÕ46\CCcsK3¥ôéç_¸é_ÿ,*,TU!´÷»³çs§”J’‹©{½<ÏišÎ>º®ÿíúÝyÛ-}z÷noo'„H¢ÈêŽ!N§“½¿!QdY6-‹-–·Ÿ÷TQ(EN—“UšéºÎ¶ÀSÕx#»Éétš¦¡ëû‡¬ý/ÐØ½¯ö ¼÷«QÛ¦²H®¯ýd]´4ß·áõQƒ¤¦§.YWyÖWA ²(Ƙ²ÉˆYá]¼¬©†av¯VÈEÃÇTU„¶öö^ÅE}ûôî¾:±mÛ¡p˜mƒ‰DØMšÖõ Ìëñ6fL8aÅy¬þ/^$ …⻎Åb,È!ºah»›¡i #BˆalTs|·`(ƒlYÄÝd郺ÖqÔâ7Åb*ÛÆXQvº™&ƘÍÍ›“3dР`0hì^ >¦jHUÙŠžìG®ëì[mõíõ¦³½H’ÔÙÙùÑÂ…I~ÿÕW\®ë:»×ÞíÙ½ån/,b?ãÏcŸ)„5,Þ·îp8TUýü˯(E¿ú*·ËÕÚÖ¶`Ñ¢$¿ÿê+®P5¦‰1Ö4M›Ú‹–,íèì¼ä‚ zöŒ¿¹{¿;{>w„¢ÄöjÚ½BN¼m‡6QXóº?;6» ÛT÷·ûGÞÓP·W ¾…}ob%žû‰`£~6¬!D)²í®‘ ¿O;XÏL|‚¶ÝãM(ú]ÖQµmÛáp,_¾Ä›’ýèçµ9yÙ™>A³É¢ÕWWšË×5¶1‚…Ý/{v¬Šü§WP°™ìœ²U¢®² vX!ÂoU*Îr™ý Q¥{DþæÍv8$ö¢ëúï4>6˜¢kZ¬Û—úoÂírÅb1Ó¶!†Áoh?Gý„–––P8È~Œ§¥¦{<ž}»üºMãƒYïÇì#þØŸ˜…ý©ªÚÜÒ‹Å0Á—;==ƒÐÛëQñYñÓÿYªÿSš1QT­4Ýû¯ ïzoK{zVSSÛ¹‡%;¦`kEB¿j #;NüYÑ€bqº³mñ#ú_ö5¹ß ÆW?pS±²fÇ$ýÏvýö †¢?}zÚŸ. Á¼³àÀáBaŠèÖm[G^n/ÑH¤ª¦29)%';g¯ô—$Iày6e[LUd ”(ЬÓ!ÄæÛÙïêÀ,÷;;;ªk«ssòŠ zP„ªjë6oÙÔ«¸·Ãáè>ø–õBlJ5Mc}Öñi~M30FÔ¶cº9´ñ]’ãÍ9»N™ÜcÊèÄ9LS·­_;ñÖ/x8ûö«ÞÞƒä7ï4ø}^нöò?wŠ1æ¸ÍÒ·üYðQŽç¶oÜîóyKûõgg,ý>ZZúÊUË%IJIN‰ÿÚ%„T×ÔtttZ¶%ŠbQA+×A»Œâ“‡X–UßЖ–ÆÆš‡ÂaEQ2ÒÓãS…Ä?Ù„˜ÛU¹kè¡~ÒÖª6‡Ä•–”ÖÔÖlß±uà€Áñ¶²ã²Š;c1U„‚žn·;ŽØ¶åp8â»þÍ`é‘ßcÃÆõ MuˆÚ' ±mÔ¶dU!¸µ¥­¿Pó8dp—^z©,ËM- ÔuͲLË2u]A„êÚêÌŒLî¶m˲|ã­·-_¹²¡±±ªºfèàA©©)‡C–eÓ00!~ŸOv:A¨«¯ÿïýœxü4¯×#¼ù >þôÓcŽ<Ò´¬$¿_r8â) ‚°k×®ädNNΓ¬þ|UÃÂò]SÆ *jhl´,Ëçó±ò§,o¯¨¸î†ÑÈú²ò/¾þº´_IkkÛÜyó‡ ât:Ýn7«õü¹Í`ÑŸ’’ŠnlhR¢Z8j(QU©ºfôë[š™™Ñ8°I›yžãCáìp‚uÝÜÝ}cjÌçójª¯”g£uœNç•—^:fô(MÓÚÚÚfÏù®½½]×õ©ÇN±mû“O? †B?<)ɉD_xùլ̌“Oû\8¹ÿ¡‡5]_º|Å;ïÍ$„D£ŠÀó=öxKK‹mÛi©)«×®{éÕ×DQ²,!ôÄ3φÂá ›6½ñö;²ÃÁ2–ÚÔ²mÃÔ]PLͤ²€ Ó°©MéÞø–e©ªFŸzœª©ß-X°|ÅŠ3ߟùá‡>Ÿ¯½£#¦ª±Xìg5#>¾LÓ´H$‰F¢ÑH„ý‰@î1Ä4MŸ×Ž„ Ó ˜»9$G[{›ÃáˆOæÇÊÚy^8é„é×ýýš“ŽŸfšfqQÑÅœâôiµuuÉÉÉéé©QE‰F"õ ¹99§ŸzÊ¿ÿï_ëÖ—557û|Þ††Æò £Q¥½½cëöíñyný>_u]ý€âÌQ…–-U•»ªšœìs565'w;ÓÀ°IqN§¦ë¶m»\.Žãú—ös»Ü99Ù>¯7#=íç6ƒa¥{ÜbxÓ4“’’’¼zíê‘#F:6YB0ÔYV^6tðð½VôÑ4M%Ÿ×kYV Tb±p(ŽDdYþò«o>þô³\sÍò•«¨mwtvÔÕÕoÚ²Ù!;¼wCC£a^§¸¨ðØÉLj‚ é:!Ä4‚ž —.ðû¼Orts§È“ìô¤õ6hªš•ͺ)¥ìJ0¬oh@=ÿÒ+ýûõËÊÌ\³vmqQÑ?¯ýÛC?Q[W?zäÈ?™õs›q°ßøýp]tQZZZzZzmm펊íÁH°¾±®¡¡~Ó¦M%}J³³³ãÝ”"žç×—•/_±rɲ囷líÝ«¸¹¹eÜØ±-­­J46vÌè²òòªêj§ì2hPuMíÚuë×oØpñùç÷éÕë“Ï>sÊòÇùõì-[·9ÎÞÅÅìü­ Š)É©kÖ®íèìÀTEÃ7o ‡Â£FŽÙ£­„Deáâ%å7._¹2/7÷ÊË.mniVU­£³sÆ{3A˜|ôÑ={lØ´ég5Ãü¯ÀAÄNó~?šW¥††úêš*]×}>¯â^.—kß¹}A°m;^GÏó¼a!˜ÖW®†Ïë5 Càù¨¢ˆ¢ÈóœiZ¶m[–år¹TUÕt]îV°ÏJûmËÞUµ«µµ….'''/7•`vo[ÔÐ0MBˆ$Iªª"J9žgk?±ék(¥¿¬phÛÏômh÷B%¬ÒQÓ´šß¸û•ìŸñîòîyî5kf|êÖ{¾ï ælø[î•M8³ß#ñxXóئâ+—vŸô4aû™È­PøúC§7÷`k¯+ã_ñ`í>B|Iîýn6>ÝØ í>ÅU÷kº¯{þ‹›‰`™;ú¤}½ ²D?$œï;|öš óçv¼°%èÖøZ‰?qS”¢®ýcL~QзÙ÷Ñïv»yŽcÕ/±nS÷0ÝkxöÚ+Íôx<Ñht¿«»t-‚!Iñ•­~œÓé,Ó4íçÎtÿ?Û Ž ®õkÿù'ž~æñ§œvÁ®Yš1¶mŠ’DQ’$Vú¹×)¢(VVU]péeÍÍÍ‚  Ýµ7ñ*L§Ó9á¢+ÿv-Â]«¥ÇïcÛ{ÛØ6•$éþ‡9錳N:ã¬üß å6J’ÄæãÜk³Ý+|ºOý}{ZZ$Iêþ@v¾ ®+=)¥K—/1lØùçœ=Ñâg_|ÉïóY–¥é†,;LÓܶcÇÖmÛ«kj,˲mjšBHDÃ0Æ^g̨Q², ‚`†¦ëcIÙøË²2ÒÓGaf|±V]×mÛ–e[ÙNJ)BTàùÕkÖzÜîSO:Q©ÿç¿6oÙêt:EQdKlK¢ÈÐ ƒ­éh𦠄MÓEáñz½cFb …³Yþ9Ž^E¶Š:¤? ‘uuø`Œ].WjJrjj Gˆßç/Û°ñGÑ4íì3Ï8|ìa·Ýywg гGqcÇÌ[°À²lžç33ÒË6lœ4q‰Ç¿lÅÊc9úÝ÷?˜õégºa\÷÷¿q„<õìsQE9óôÓòssËÊËKúô¹ë¾ûž|øáêšš'ž}ö•çž}ý­·¾ž='7'ço½2;+‹õíBŽ˜0á¼sÎ>ãÔSοô²>þxÈ wþ÷Þuåe^÷Ž›ÿ½`ñâÙsæX–šš"ð–mÛ.:ÿÜQ#FÜq÷=–e8ðØcŽ^±jÕ”£~à‘Gwîª ‡B½{÷ºñŸ×¿øêk«×¬áö›o**(PfWºŽúmJyžkÆ»÷?üÈQ“Ž8ç/gÞûàC<ÇßvçÝí¶m_rá?ô€Ëéljn¹ý曂Á  7\Ý‚…‹6lÜØÐÐSÕeËW¦yú)'—ôé½låÊÆ¦æiÇ;vô¨ŽŽŽÍ[·8@àøEK—,^¶l@iiumí /¿:~Üa7mzêÙç\NgüTsT‰Æb1Éá`+j}òÙç«Ö®yìÁz÷*~ðÑÇ:::yA¸ó¶[Ö¬]7lèsÏ:ó½>äyþÄéÓ >ýü‹U«×644¦ÙÒÒšŸ—{û-ÿ^½vÝâ¥ËV­^“œ”tæi§¦¥¦uŸJ×Q?ëîèÞ{w˜¦ªí¡P(555Éï;íä“ Ãày>#=---M’¤$¿oÐÀ¹¹9=zŒ>Ìãñhºîr¹EW_yùò•«>þôÓh4zÆ)'÷ÈËû⫯ÛÚÚKKúʲ, Âé§òÞûš¦ùÀ=ÿ­©­å8.O8üð‚ž=¢ŠB¡ßwÙ ß|3{Éâ%wÞv뎊)>Iß¾½ znܰ‘öì‘“‘1dàÀŒ´´¾ÅEN§ó«¯¿ùvÎÜy Ž>Âïóé†îr¹ÆÏõìÑcØ!éi©¡;nþ÷üE‹^}ãMIšt„=?€„´»Â‡Òp8 …c¡P0ò{<ÓŽ9ú³¯¾®v9S’“}^o0Rb1„¦ëÁ`HUÕP( …"‘h86 #Æ4uÆ{3wTT‚!§ÓùÉgŸÏýnž¢Æú—ö³l;‰¨švÄø >ñTŸ^½Š‹ SR’Kúö©ØµKvÈ¥¥%¢(ª±˜­ëœe=óÔÓ½ÿ¾)ˆ§œwîøc§Ô×/,[?ý¼óƒÁÐÿ¼nÕêµíMM !Ó ÚÔ¤(‚¨¢ªÍ ­­-áHX×p8lS[Q”P(‰F£Q¥¹¥åëÙß¶¶µ)±˜ä`@‹-½{B*vîr8¤ü¼ü®ö™¹SÓ\ÉÉöÌ™ä»ï$!B¬¢"qÄ\Rb81Ž“-ˈF ËA„X,æ¶e†áp: ÓAUUžçYNLUA`u™±XŒ-­‹Å(¥²,Û–©©¢”w8^/BH³,#ƺ.½ý¶³²Ë2âyôÝwtùrŒ1úŸó¬ ‚5t(¹àýüó-Y¶"žRU×%Q´m[7 Yv†É"‚®ëZ÷iAaä 1ìý±˜íñø¦OçÌA„ ÛFÙ#J­~ý´¿ÿ]>¥§³"J)AÈ6 Œ&„Æbز(B㮹‘1&S„¨m£ÝÓ)wÕ×[–mšÈ墈8·µñ_(åšš¤?ä6nĆÑô#JíŒ süxÖb›RŒ!ĦQJ±l›`ŒAÍÍâ²eX×¢"õÚkõÓN³SS‰®³Æ`Œ»&ò¤” Àñ¸§G£ÁàзŸ£~Ì󤱑TW#žÇ±W^ί^ÍmÞLjkq,fÓ´4ĆøbŽ¥OŸnûýXÓììlšœŒLí{Ê”Rdš]QN"„ºÝTùíÛqK MI‘^}U~ðAöeCNššjª×\C}>dYÈ4í¬,kÈÿñdªÊ/[æºå~éR„UTd»â êñàý6,c³¤ñ<‡!ý‡¶ý,Õ‚¢¢ˆv{ü?~ÍÇÓOKï¿öœÚ!Ä"Û8úèð;ï° û†,õù("J‘¦aÓ?ù„_¼Xœ=›TV²‡Ûiiêµ×R¿ß9Òê×aŒ8ŽîžkiŽDÐ×áPŠ8Žº\ˆRñ«¯O‹ôi{,ÐÈq\T‰VTlÏÌÌ*,(äy!ªDwíÚ ‡‹ ‹ºzyt=Ìãr‰¢€mj›f¸£Ã4(°f ²í½údBYŽÍžÍ¯ZEE‘ç8’™:ÔîÙ“ué`E!ÍÍcŠ1/;ëëëÛ:ÚúôêžžJ)­­«ß¾c[Ïž~Ÿ?žþ”RŽã|>;Ÿ¬Äb𦠾®ëN§SÓÔxß:Ƙڶßï?é„釭éz |î…—ÂÑh$9ÿì³%I|êÙç‘ÈÆ÷+)Q”Ø}<ê÷û.½ð"—Ï'{<‚$íª®þxÖ§N—ó´“Nòz½ì÷D8î×§°|GãöýèÑù‘˜±¨¬òô !Ÿ×ÓÚÞÁq\W‡>B”Òþ¥¥ÿ¸æ¯¢$}úùç/¿þúÕW\ž‘žÞ|öÅ—õõõS’—›ûä³ÏEº7㡇»šárʲ,ˆâ®ªªîÍ€iœ …°1O¦eY–eš¦išñ †iØÖ÷g>)¥˜`]ÓžxúÙË®¾æ™^ŒÅbïüñà4M{sÆ ·Ûݯ¤dÈ /¾òZuuµ,;¦}4ÏñÏ<ÿF˜R[×´GŸ|*3## =ýü IŠŸ¤U5C±“§í!½3¤%É”Û0 ‚ ¢u‹e]׃¡P{{ûˆaÃ8Â-Y¶|õÚµïÎ|Á¢EGL˜ IBh@i¿_Ð HÄ4äää`(¨ªª(ЦiêºnY–Ëå®o¨w¹Ý/ÄšÚT”Äk®ºâ¹'Ÿ¸úŠË ÃèUTtô‘“?l¬¢(ãú††ÊªjŒQGGgzZú˜Ñ£.¿äâªšêÆæf¿ßßÚÖVWWßÐØ 9Ž3- cL©šš²}×®Ò¢Ìã‡ú«wî 4×þebž×%×ÖÕg¤g¦»e¿(n·;%%¥££Ã²Ìô´4ŽãŽŸz\¯¢¢9óæÙ¶Íq\}CãÏmÆÁ~#à÷Ã[–åv{ÒRÒ—,[¶–E9« e3z~?w&BlN„0!x¯6±¯„aû­ºé>šw›4>cOü»ä—4ƒRÄóòß|cçæRQDN'u¹¨Ë…0¦>Ÿ~ v^¤?àOjѼ K|6¥>ÞmßGr{ΨΉãwîþŽãºß3^6Êý@n²~ÿø¸Üýîc¼×f¿og·ûÿòf`¬^t‘0{¶8kV×äÕlÆ¡¢¢Øm·ÑädÈ}À!`g1ÊÄ”ÖànÊî‘®ÛÙÙá?6‡G¶MD•$õšk´ÓO·ÓÓÏ#Ë‚Ù~j0GñžÁ‘ˆœž1Ã*-es<`Ãp]{­Ð Çcá@€úýT–á ðçÑ¿ŽÃ‘ˆ“~ï=«¨Fä…Ô‹/&õõ®þÓ?l˜óÖ[¹;©ßONDé~–1€?6ˆþýáy‰XEEá>²SS©Ûyé¥à¼yê5× Jåûï÷ï¾øb~íZ*ËÔëíú€!Á€? ˆþÀq8²JJ"ï¾K::H(d—”D~8°b…r÷ÝÔç“Þ|Ów䑞³ÏæÌA¢H}>„1|þº-Ð…+û²m$I] 7²+%‰:¤¹Yüäéùçù BÆ„ êUWGE=¬(HÓÌ øã‰wÂQÿ"é:ây„1"q2 ÜÙIÝnõòËCsæ„ßzË5JX°Às晾#”^{ G£4% œüaAôÿ/{-ïÎfz0MÜÙ‰A?í´ÐìÙ¡Ï>ÓO8Û°Á}ÙeÞ ä{ïÅ­­PøÃâ.ºè¢ÌÌL f¯üYØJ±ª"J­~ýô“O6&OƖůZ%~óãÍ7q `çåÙyyˆã°®wM›ÃŽúö c bE1‡¼ôRpáÂØµ×"Jåôï¾â ~ÃêvS· ý¿ö (8°z÷Vx ¸l™r×]Ôï—^yÅ7~¼û¼ó„E‹$Q¿ Dÿo‡Äq8À“»é¦àҥѧŸ6ûô‘Þß{Ì1ÞãŽ?úÙ6MJb' à pP@ôÿÖX!®ãŽêtª—]š;7üÎ;æØ±ü¢Ež3Ïô}´ã•Wp,FSR`F ÀAÑ`°Ó–…;;Ïë§œúê«Ð¬Yúôé|y¹ëò˽‡.?ü0îì¤~?r8à ð{‚ Ÿi¯B ÒRýä“ãŽÃ–ů^-~ñ…4c ‡í¼<;7‚uÙ6"ð} 8P Âç÷Ò½(3޼øbpáÂØ?þMSþï}cǺ/»Œ/+£.õz¿_ ˆþßQ÷B ^½”,[¦Üy'õz¥W_õN˜à9÷\aÁ$Ë0#à€‚èÿÝÅ :;iVVìÆƒË—GŸ}Ö*-?üÐ;y²gútñ³Ï!Ôïï: _€ßDÿA/ ¨Û­^rIèÛoÃ3f˜cÇ óæyN=Õ{ÔQÒÛoãh”&%A!à·ÑPuŸˆãô“O}ýuW!Ðúõî /ôŽ/?ôîè IIPø­@…Ï@÷B Ûîšè˜c°móëÖ‰_|áxç uÍ„1f+×Ãûøù Âçf¯B aÃ"/¾œ??výõȲä{îñïºúj~Ëêv#I‚€_ ¢ÿ§{!Pq±rß}+”Ûo§‡ãùç½ãÇ»/¹„ÔÔ A€ôü2ýTÝ ÒÓc7ß\¶,úðÃvÏžÒÛoó+WR·V„ü2üÁnøQld¯a`M£~¿zíµúé§sÛ·[}ûâPñðö~ 8êÿ3ˆµµQÇ7Ž:PêøÅ úÿ<0FØpQJuS7M“çyÞítë¼Ñ‡6J©(Š<ÏC‡$ˆ~H8ýp ú á@ô@Âè€„Ñ ¢D?$þ`7þ (¥¿Û¾Ø| z”RŠ(‚è€ýÂó~¯ n,ËBñüÍdJ)OxÑû›¦Y×R§ë:ðñÏq\fF&B¨©¹‰} ”Òô´tBD?ì cÜÐÔà”弜Û¶`øSD‰D#u uˆ¢Œô4Ûs€öˆ¶,«¹µ¥3Ð Ñ{³mÛ4ŒÜââßa_”ÒlOV}C#B4'+[Õ´42¥”çyÛ¶7mÜ Ñûƒ±mÛ¿Ã~(¥–mcŒ–mÛ¶}à¢ß¶mŠ(ÂPÜ ûó»/`ò{îCôÀþìÅñƒqŒñ˜ï{ý U›ì¨¯íB!cV‘ù ìo¿C…ü€=‚ضmJ)Çqhw!&!„k<ëÙ?-ËêÊëݱT÷âý}¾!0Æ{Ä´eY†aPJEQâyŽõ>QJãÙ÷B|£l„ŽãLÓÜ÷ÛŽú`?âiI)±¾±aÓ–Í<Çó<¿³ª²b×NI”8Ž1žò‚ ˆ¢¸¾¼, ‰¢È–Bä9>ª(áHØ!I,¦ÙõûÛÝ÷_!¢(nÛ±}ñò¥å›6¬Xµ" °¯I !!žçY ³ cI9B(¥„žç%I2L££³C’¤}žD?ìî~‘Úv¼æÒ¶-J©¦k@ ±¹QÓuŽã0Æ­mm•U•J,† •ÕUííÑm;¶mÚ²¥µ½cl˜fumMg “%ø0-³ GÏ#Æ‘ššºcg…(ŠŠ¢TÖTG•(!¤3`?#‚¡iš1U­¬®ŽF£<Ï+1¥3ÐÙÒÚRYU]¶q+€Q¼· A_?ü={É1Fñ>ŠA¨®­)ÛXÞÐÔ¸jÍj]×kêj·lßU]×9Bš[["‘È–m[«kª5M‹D#-­­–emØ´1o¯¨himå8îGÎ`LÁ`cSC$ñy}‘Hdã–MÑhtãæÍ1U­Øµ³®¡c\¶±¼½£}óÖ-%ºqË&MÓêêêÖ¬_×ÐØvêºÞØÔdYÖ÷_d!D!ú`¿öè§”Œ9ÂL!ˆ"Û²SSSÇŒ›””´cgESsó€~¥ƒ ô¸Ý–eåde»\.Û¦ª¦eefggd 0¨£³£½£]„h4ÚØÜÈÎÄw·W‡P ûMñê~Œ±C”lßW×a?D?ì×Þ!ßÒÂØ4͜섦é݇tuïU·ìï§_î~ý~¦êäÕu¡ëºn%Fñ‡ÿÈ´B?tS·Üÿ~‹ý°7‘ø‡gp³,+ÉïG»Göþª}}ßiƒº>@OŠŒ ú`_cBH,óx<¶mï÷D(KRá×­«EÂ«š†Æ©šÆ 1óS¯]_f)JLEˆ~Ø´”´¦ææ–ÖÖ½#¶"XZj:¨ªºšçùuà±eš.—;9)¢öF)u89Ù¹¿Ï”ýñI\N×Ý#¥T–å†úˆ~Ø®R™ß¥ê½{ÜÐ=RJ-Ë¢”BôÀ:p']îa4/$ˆ~H8?Øáïç:p Çבùm·lS±ïÆãí~ÊóŠ/‡’Œ~·ÛÍqD× MÓ~äñ,In|³9+$I²-+¦ªöîEè÷ÍYÛ¶îÆe‡Cày„1µí½¦¬£”ò¯×²,˲\.Kr¿Ïçežç›š›W®^3tÈ`UU !~¿ß!Iš®B¼ÓéAE·ÇÍ&?¢”:ÎÕk×>ñ̳&‰hšöõìÙ HOK[±rUJJrZjÚ'ŸÎPUõØ)“g~ðá¼…‹ÚÛÛ9êHJ錙ﻜΩÇN‰*Êwó455%''%%%•oØxÔ¤#Š cªêp8Ö••{Üîßð/MÓLÓ\¼té“Ï>·®¬üÔ“Nt:¯¾ñ&Bè„iSW¬ZýôsÏ×ÖÕM;îØú††´Ô´ì¬ÌoçÌ1|X0š;o¾Ëé<~êqK–/7 cü¸qÑh”Ú¶Çí>÷쿌=ZÓ´ÖֶϾü²½£SUÕÓO9eöœ9ëË6œqÚ)E…E•UU‹—.ËËÉ™8áð›·ÔÖÖC¡cŽŸ÷ÃO>ývî<‡ÃñÈãOê†Éó|$žzì„Ðù_òþG!„ÂÉÁ‰D|>Ÿ¢(<ñ¤ašN§Ó²,Qg~ðá–-[(¢/¿þFCcÓwý7‰ˆ¢`šfeeÕö¢ PJ1Áº®?ôèã]~ÅãO?‰F}â)çËÊËß|çää$Aà’cÛöí<ü(¥ô£Y³>ûâ«+W¾þÖ;’(Í7Æ{3S’“ !;*vÎ_¸hÑ’¥ïôQVfæÓÏ¿PßÐðá'³–-_‘œ”ôÂ˯457³™Tö›?ÏÞÑOVUõäOxöÉLJzç=÷–•o8ãÔSË7n\¾rUjJòÁƒ†ªiz 葟?lÈà⢢‹.8¿3ذqS0jo郞©µ©]XPpöYg 2dà€ÒóÏ9Û´LE‰ò<¯FnNΓ>rÕå—Í_¸øáÇž7vLnnÎygŸ=xРä¤dD©ªªmmíýû•ôÈÏ¿ò²Kóóò‡Ëí!)Éï”副¯¯D‘Rzþ¹ç\qé%`uëó‚pæé§Þrà gœzŠa˜½Š‹Î=û/ÓŽ;¶¥µu@ÿþÙÙYœwÎÆÍ›ûöé}ù%_~ÉÅsçÍ3Mëè#'ýåÌ3Ö¬[wêI']|áãGv¹œ¢ L7îÌÓO+.*ܾ}Çê5k®¾òŠ3O?­w¯^ú€?©ýWø|4kVzjÚàAg~øaccÓ‘“ŽxgæÌÇžzê¬ÓO×4}ÐÀýKûÝpË­ˆ¢ýû×Õ×oÙ²Õ!9ü>_¯¢¢©“'»ÝîX,*J4ªÄE‰…B!C7B¶mK’TV¾¡¾¡aäˆá…={4·´˜–Sb+W­ÊÌHùµ×MËœ4qÂÆÍ› ÃËW¬=r¤iš555E…--­ª¦sä‘ýJJn¼åÖ$Ÿ?%%9 28¦ªaUU-Ë"[¦©éZ$ª„C¡H4jYv, ‡#@ G~þ¬Ï?¯¬¬Z°hq~^Æ8 !„ÒRS/]ZÚ¯D’$˲b1UÓõ¨¢ J£Š";n·û«ofK’ ó²Tø}ì}š—­BùÑ'ŸÎþvÎò•+§;åÈ#Ž¡³³cîüÿwݵã÷Þÿ`öœ9ÙYY“>ª¨°`ÇÎ+W¯ž4qBvVÖì9s6nÞìñ¸s²³««kwXUuuZjjÏùÛ+*F)ð<Çqkׯïƒ.Z,ËŽ+/¿Ìíró<ÿÅW_çdg¬^»¶±©)=5í¨IGhºþÍ·s(ÍËÍûä³Ï·nßî÷û† ôÎ{3W®ZÓ¯oß§Oûò›ÙÕ55ãSA6nÞ¼zõÚe+WnÛ±£O¯âöŽŽ1£Gµ··›†Ù¯¤ouMõˆaÃzƒÁO>ýc|åe—657;ÎþýúõÌÏ_±jÕ_#ðBjjЦi©))NY0 ÿ†M›úõí;î°±ŸÌúlõÚµ G11%99þÒÀ;Í»ÿµyNY©„ãAˆF£^¯wÖ§Ÿ•mÜxëM7D"Q磊ât: !¦i²dÃ0$I²LK7tAØ*”š¦±Þpv7]×Ù8I’0Fš¦;Nv¦W’$VÒ#B,ã‘e9>uµ®ëlk!ö„‹y=Ó49ŽÃÇ´”$)^úiÛ¶ š¦qÇqÄ0ÌøvdY6 ƒx]Ó1!lï<ϳ§Ìó<«ûdE¥º®;’a„p^¯·¾¾þºnüÏ­·ädgòƀ? ¶°pYYÙþ;|"…l™Ë5MÓfÏ{ʉ'"„)¥†i:Ó4BcEQXÅ},cÅïlõ÷XL%ëºÎî‹ÅX Û »‰DØcã×°˜FE…‹©£îÉFÙvd‡ƒ]É íãù«ªjü‰`ŒcªJ06MÓ4÷hF4Åk†B»·`š&«e_WÝ·£(1Y–W¯Y»pñâæ–ÖAdgeAîþŒöýl/Œ0&]™~Þ9g÷..V%¾„|<òâ]Þñ 즮ìs·ý^¿f¯›ØFöûxö ß½þIðþ›Ñõ=´çï¾Æñ^Ûá8Î4Í‚‚žìMÿ~ý «ð'õ¿'mf“ <˜u×ìL¶mû}¾ÃÆŽ¡”*Šr°›¿öYE~¿â½:»Á™añ.,x5.ñ´ç !¢(¢ßk1 ;ÍKáÛÛÛ×®] ³@" „´··ÿ? â‘2Žºg%tEXtdate:create2013-09-27T12:17:02-04:00¤"ò%tEXtdate:modify2013-09-27T12:17:02-04:00ÕJ»tEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/lockdown_permissive.txt000066400000000000000000000013221330160122500256150ustar00rootroot00000000000000Disable Permissive Processes Disabling the 'permissivedomains' module allows you to remove all permissive domains shipped with the distribution. When the distribution policy writers write a new confined domain, they initially ship the policy for that domain in permissive mode. Permissive mode means that a process running in the domain will not be confined by SELinux. The kernel will log the AVC messages, access denials, that would have happened had the process been run in enforcing mode. Permissive domain policies are experimental and will be turned to enforcing in future Operation System Releases. Note if you disable the permissive domains module, you may see an increase in the denials in your log files. selinux-python-2.8/sepolicy/sepolicy/help/lockdown_ptrace.png000066400000000000000000000712301330160122500246570ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“q“IDATxÚíÝu˜Eúðªj—u÷l’M6îÄ‘(îîzpÇw?¸C8܇ƒÃ‚BÜe7žl’u·±žöúýQ»“M²Éa!Gæý<<<“™îûNOuÕ[xñâÅ’$™¦)Š¢eYÀш¢iÏóªªòmmm ((( „é†8ŒLÓܱcGMM Ÿœœ\TTdY–aGºU#ŽãŠ‹‹xQB¦iÂQ?Ý ÃÁãñð”Rö§ØG1˲º¢rŽz±¨çcÿÆéV£_σ Œñ~DZ¿°wcÏË?sGû\…:øµ‡ÞÚÏoGÐÞè‡ð«a™ËqBˆRÊ8X€b„(B–eBØU!víOs;weY–eYûÅ4!„Z oë¼óc-amãA?µa&ìÍÉÞùì=°£J)»Ã‘n68š±ÃyBÇó²µ(•D!d𦦄t]+ð¼ ‚À‚2 Ã0MQ<èÞ{ô1¢”Òó½N)•£ Bˆ`,I"Ï󺮳®MvƒhTÞ²,‹R¶ý%Äö‚1Ö4Ý´L»ÍƾœTM·¨%‰¢E)êþ–bÛG±ï‰W¡CþnØï*~,öùâyž¢ª*BH’$6ns¿ßÖ±·:O»ÁÛ>,—uÃxãƒO¾\°HUÕAýûÞwËMß-YþÈ‹¯ØíöpD.éSxÿ_ÿtÍ_ïúóÕ— Ø#üݪµŸ|3ïáÛþO’DjQÂqš¦!„$QT5ã8B0F˜RªjšM’,Ju]çQ4íOw?ÐÜÚ†êWXpÕùgçfe`Œyž7t=,Ë·>ôÄ5œ½iûΊÊêÛoü]4µÛm”vަª!6ÕQUU§ÓùƇs>øâëûoþÓÐÒ M͹÷¡~E7_w…ÀñÇY¦©éº #B8C× Ó!vBH‚ EÔ0LÓ4%I¢”ªªÊqœ$‰aD©ªiì» €Ų,žç«ëê¡Ð’þ£5e›|ÞÜÌ Ý0zfûþÑ ÃN¦e9Ž…ËW¾÷Ù—÷ü寬´ÔÝÕ5¡P$’à÷={益‚uM*ŠišaMÓ r³OŸ9Í0Œ†æD©¬(Ùé”ÒÊšÚìŒôŽÎ€ªi†a Ÿ“•¹«²Š’™šbQŠjëè¼éêˆ(¹åþGÞóùí7þ®ª¶. ææðUYQG œ—eY&BhËŽ Žžç-ËÊÎHÇïÜSéq¹|7BH×õÎ`èƒ/¿Z:`Î7óöÔÔæ#„ë[ÚÛ“üþÌ´ÔºÆ&jYa9šš”èózê[Ú;’ü¾Œ´T‚qM]ƒ¬(Ïû½^ŸÇ½ug…$Š9ÙÍ­me[·éº‘”à\Òís€IJ,žãꛚ_xóÝ«/8cüÌko]{á¹¹Ùª¦õ¸;Öß{Ô¤Žr¦ad¤¦äeg}6wþøQ#&Žây> ¿úþ‡²>hàÄÑ#Æ”RÃ48ŽÛ¾kÏœ¹óö-úÇÓ/Ø$©#(íWùf^MCc{GçÅgžúýòU•µu‚Às„ûÇÿÝøé·ßUÕÕ·ut^~Ί¢¼üîɉ 5 ºò’ºÆæ…+V‚O>áØ¾…ùO¼òF~vVVZjÿ>…={·ø0Ær4:fèà°,?ÿ满KÏ:ý˜Ãd9zà` úúÁ¯#¤¨j^vÖSwß¶`ÙÊËW~òͼûnþ“Às!Q Ñäy޽EAày!;@-ë¼Sf'%øxö¥Aýûú½^Qœ‡iYÓ&O¨ml¼ù¾Gn¼üâ)ãÆ„ÂaçÙ9€¨¢è†yÝÅç êß÷wÝwƬi³Ž›òû;îý|Þ÷n§ƒãÂÈ.I+×—oÛµç©¿ßæóº1Æ7Þußš²Mn—3=5yxéÀ@(äõº®§''3røõ·Ý}ËuWa‚×”m¤”Ž1lóŽŠï–­X¾vÆh¨çž2ûª›oߺs×”q£WmظxÕš¯¿_ …Ï?í¤™S'Ýt÷•5uó–,V: ©¥íýϾºåwW%'$üí†k2SS"² §ŽÁOcY”â°Û ÓDÙm!IJè~Su{éë?Ò-G3J©$‰;÷TnÞQ1nøPQàzþåÖövJ©Ëé8ç¤Yª¦Œ5MÇUÕÕ;Žà¨¢"D-‹Z”ŒEx^àøŽ@ ¢²º©¥•R‹Zf0v:ì-í횪²®„PTQ.9óÔ’â>¦aÈŠb·Ûš[ê›ähÔçqËQ¥±¹E–£¦e9ìvÃ0*kj½·ßë9mú o|ø‰Ëá8aâ1=?¡°ŸišûÅÝ;rzñâÅ#FŒÐuFø€ÃŠRÊsÂ8$ËvI²K’ªi–E)Ú;¦…²ßç­Ø5z³ë6¥„QUå9β,M×%QAÕuMÓDA`÷c?b»fcÝTMw:lš¦³áFcDÁH²Ùäh”RÄìr8îzüÛý§«. Cl˜)ûô`Œ,ËÂ]¡"Ï[”¶‚.§ƒëþ]Íëtj]Ïqº®;öªºú»{ú¦«.>¨´¹µ5"Gý^ÏqE>|àç¡”J¢Èó|D–B‡Ý0LMÓöŸÏH©(ŠëÖ­ƒ>à×c˜&ÆØm·[–%G£lü{_£Ô²(G0B{#ã®§QJ9‚-ËR…ã8Ö-.‰"¥TVž›(šÝ}å\©a!EQÆ`>ÆQÊš­Á8Éç5{ünf4 c”èó†a“Ä¿üfÅú “‘ƒKûƒA—Ãáu¹ Ó`Ù²àÓ~.EU©¢°ñ<ሌ{›0¿O!èë¿JiìLf¯o<Óìå­hvß,v­iš=o€2÷=Aºß ›µËþH)=à¦iRŠ ÃÄ„\qî™y™éª¦ußìócQªpb–5’RdY:B(ª(Ó&ï_\ä°ÛúäåèºØlµC>d~‚½¥PB½Ð÷2¸:|@œÃiºÞ7?¯´oq8ù¥>–e¹Žaú™¦¥(*‚Y»àÈÙg„œæ FÕ´¨¢rù?†a„tuW‚8‚öŽðzbó ~ÙmîW®€#bïQ?Çq¬$!ü=ê‘ôùŒŸ§³3àr: ÃÐ Ãårvv|~o8xžçùp$âóyÇmÜ.—eQMÓ@zjú‘~Møe°eïĪƒ¬G‡G™Ýà è¨D)%˜X–E5 ãWëÜ£”š¦iQ‹pÄ4MBHRRF89iŸþ–””d„P‚_dÿ´Ûí¡_ö6Q‚‰ªiÁP(ÁïýUŸ}'Œq °,«—c9J%›Ín³÷ú‘ïZ–ºzŽr˜ýïWl›/ÂN3uÓ²DQd˰üúOEÔn·9vMÓàÝŽ¬ÏæÍ›Ú;Ûœg÷çzoY„P88pßç?°{“ïu£±-!~ =ð>uÐa~¡Ùzèì²Óá°, #Ìs<µ(Âÿ} QÏâ9‡þã×ÒÚæ÷y»Ö€à·Œ-eÑÖÞ6zôhL¨®ìSŒ1F›¦™’œ²fÍêŽöö䤔ûóù^·èr¹GEdùÐE=Ù*ÕGúIˆwûâ!ò1Çl2‡Ýn—$ !¤D£¬dÍ!vÁÞU?üG¥”Z”óÑ4MQÔää$]×mö®Et}_Q1ÆZVõúÇÅçõrGýàèÐýáR[ÚšÔ¨J8‚ Á!Š Ëä8‚1Á¤÷#þÀm ‚°pñâ²òIII“&ŒOðû Ãà8Ž%„˜–ÅŠ"Œm6›ªªìï]ç1îy™vÿoˆÃ„½d!MÓØ3Ï&jø ¸dÙÍnV¾qãâ¥Ëìvûøqãr²³t]çù®Ú¬4f¬ô±$ІiêºÎþΖÁâº_hÔã@:ö²,‹ZaD‘ËévØÔ¢v›½b×nI’²»Œîù¶‰ :–$©¶¶N7ôü¼<ö¸(¥ÏÕÕ5†‘Ÿ—«i:B]ßF–EYÝÖìžÅhYKbï=ž39B ùÁÑSJ9Ž“‰—lÇ™ªF8N°;”pHDV–¼WûıeY.—ë»ï¿ëÝäç×Õ×·¶¶¹Ý.—ÓÉ’Âír!„ŸÃn·,Ëírù|>·Ûíu»=n·Û톎£Ã„㸶öööŽ›Íf†Ífkïèèèììõ¼?;ãoš¦(ŠÛwìxôɧSRRB¡PeU¥Ýnw¹\ìl¿Ûí¦”ÚívŸ×c·ÛÝn÷'Ÿ}¾}ÇÎÄÄD]×v»Çãq:ì¦iÚ$Éëõºœ·Ëår¹Ün7!Ä4M«E”ã9Ó4UåxÎát¬Z³vûŽv‡L8âr»ü ~—Û… æÞëõ¸Ý.‚¯|ó–5k7¸\N×Ãó¼ÃéHJJܽ§rͺõv‡Ýår°{ñïõyGQðû}˜`Q]n—Ãa÷û}nÛívqG8B8Š„9žCáéüB0F–i%ef¹u³eÓ–¦öΆúyÓæ¼ì—ÛcYæÁtö9ê§”ò<×ÔÜ"ð¬éÓÎ8íTC×çÍ_ŽDN=éÄ åå[·mŸ9}Ú{|¸yËÖÉ'L^ëí åegŸyÆÈáÃßxëí=•UÇMr̸±}2gOeeD–ôï¿}ÇŸÏwÁ¹ç°#Ê#ý\U,Ër:oÿû›wßÿÅgŸÐ¯ßæmÛ®þÝõ—\xá…ç …÷û±E­®j}ãÎÎ@DŽLLvv¶aë7”m(/?÷¬3[ZZþóáG'ÍžµdÙ²e+VöëÛw`IÉ«o¼™˜˜xÚÉ'Íž9ýó¯¾^½víð¡COš5sáâ%ë6l†BÅ}ú´¶¶†Bá‹/oNNvÿ¾ÅCZº|ÅGsæL4éÝ÷ß_»aÃÖíÛ«ªkŽŸ:õ_¯½1tȈùàãOØj·–e™–I)ÅÙDÉf³³¸GQŠ0‡cÉÒ›6m™ t×®Û ©z}Cc}]ÃI³f¬Y³®ººÖépBê›6€ß(ŒqÕŽíÆŽEï½·aÁwÛÿùr»»ÝµU¢$ìh›ì· ˲¼^Ïm·ÜüÒ³OGäȽ<8n̘äääoæÍ«ohœ:yÒ°!CN>qö—_}ÓØÔœŸŸ›èO˜:yRFFFÙÆQEÙº}{RR’ªj~¿oÔðá£FŒ(ÈË>lXqQQ(âApÔÿ‹b•y¼^÷S=š›“sÁ%—åæä<õØ£·»—‰Åúaص×\~ùËÏ?[TXxÛßïIIN>lØwß_V¾iòĉù¹9—]|ÑÒeË·íØ‘–ššœ”4lèâââòòMªªnÚ²Åëñºa³Ù•9bxaA~递Á¥¥r$¶oš¦eZ”RŽç5C—£²(ŠÇq±Ûí¯Çårnß¹sÂøcN8vê1ãÆ®^³®¡¡qæô ™‘.ŠÒ†²r9=qæ´­Ûv (é?rİ¬Ì Œñ¶í;&L8æ„ã§Ž=r×î=cF\_¶±¡¡ñ¤Ù3W¬ZÝÚÖ>vì(BHÿþÅJúgfd(Š"ÇqY™ýਂ±¡(zjª9~ÌúiÇžxÉåù×\»¦O~¬m¡ÏqëÛÜ·7€R›Í¶pñ’ydCY¹iš~¿!tì”É=ù´ÏëÍÍÉ©«¯7ftnNÎs/¾dš¥ÖÇs>«¯¯ï߯¯Ûå:þØ©W\rIZjjkk[0 GªªA]‡yó‡ÆXQT‡ÝvßÝw=ñȃ÷Ý}—ÃnSTõ#|LÓaÇÎwýã¾E‹—„B¡ää$UQŽ<ù“O?¯©­6tHUMM~^îøqã^yíõ†ÆF‡Ýþíü[¶l)..r:œ£FŒ¸äÂóKúõmkkëìì ‡ÃíáH$ F…vµ¨…¢”zÝž¤Ä$D‘È ªªmݺmÅŠÕëוõY¸xÉ_}³xé²IÆ'''ôɧeåÚB¡Ð±S'g¦§?ùÌóKú¯[_¶pÑ’;+LÃ<¨ôû…‹¿øò›å+W•ôë;bØÐ•«×Ô74žwÎY_}ó­¦i} `06t# Q‹ Ï.‘9#|ÀQsÉ ¯B0T³m[óöí®„«£ƒ'Ü!´¹ÓN?-';Çaw°1„à†ÆÆ eåÛ·ï(îStéEjš–‘žþÑœOgÏœ>¨tàŽÍ™£(Êy真—›’œR¶±<%9ù¸©Skjë-Y‰È%ýújº^˜Ÿçõz¥ G"¹ÙÙii©°þûáÀ—$iè!”RM×÷ëâç8NŽÊ-­-™™l„/Ƹ3ظyóö;çU—]BIIIY´xI^nÎ Ç[ßÐðÅ—_WVUŸzòI%}‹322*víBM4É4Íï.ljn),Èçx.)113##Uú÷ëgY¦ßçËËÉÖu=†aPJшÇãA™†ÙÞÑÙÖÞÞÜÚ:}Úñv›mãæ-£FŽ7fT~^nMMíöéé©^¯×ïóMŸvÜöC—&''­Z½Öçóõ+îsÌØ1”ÒÍ[·Ž9bÌèQ„»Í>p`I~^.ÇñÆ NKKU55%9==MUµœœ,¯×KUTÕf·q—àO€Båà7RÊóBuÕž¬Â¢èÆÜ˯õ+°ÕЫ_q±išN§Ó²LJQ8Áãñ(ЉDÜn7ÇqˆÒP8,‰"Â8z<žP($IG[ÝѬ©«‰D"^¯OÓ4vÀår9ìv‹Z”¢@ À横 ‡xž÷¸Ü!9%„Œ#²œàC6›$ðÆXQÕˆñ¸=¢(¨ªGB^¯G×H$â÷û4MGÂn—‹R‰D¼^¢¨š¦aŒ-j™†I8R˜_G!à7ÍËY¼dѰaðÀí¼ç¶„çe—Ж–öûJ»è¢‚3W¯^)ˆRŸ¢>±ìeü²²²ýÇõcŒ#²ŽDbq»Ý‹—.ÍÎÊJMI ƒ–eE£QvKBH4D"l½—ŽŽvŽãÁ ;ðìììä8. aÚ˜aŒÿkGvÏ)]Š¢È²»¯Óé\³vƸOA¢(”REUY4r§ªjcSÁ˜ã¸ÎÎή ÇfWBÚÚÚ8Ž‹D"ì`¿«ÃDzE,ÄÙí1Ær4é~ƒñ<‘åp8LxRÚ „p÷i!žçÛ;:9Bd9jQ!D0x!‰„B!„çy„P0‹¢ØŒ%QŠF„ l˜»Y}MCZZ*ô÷€£!DÓtYކá´ÙÜ{o]EEËžJüÇó§¥™†¡†¦õ>w’ïu‹=ÿ ‡'Oœ`³Ù‘»ªg¾Bb·ïù÷ØevƒÐÿßÀ¢?6)7öÚQJ£Ñh^nÎ ×]«» é>(fßìEdWÅŽ bج+Ô=Xuÿ ±(›F-Ó²I’ªi’(™–IAQjI„3-“#+AÅîΎ݆R*ð!äÝÆ4E»Èn#Â~·¡”ä竚 «S€£ƒe™)É©‹-$˜Pj ’Ä!Z][kè:&D„%¥½ÎœçÿûÖ)MLLܯö øb¯c¯†a8váGl8ô¾Ø¿Ï …‚ÁÝn†BN‡C–£!<ÏG"!§Ó ‡m’dY–a½Ý&ò3oÃsœa¬ûHQ•#ý:ð À÷ï_R\Ü—ý“RŠ(+Óˆ»ÖÆÀ˜ý?ð#Ï#„þ/“c'ô#? Çq¬&ǽÙ/µGö³ k2-!¦e ¢`†LAUÅ„pŽÔ³¯ÿ;¸Ë.»,==]Ó´Çž~&%99=-­¹¥å_o¼™’œ”à÷Çf~²^ÔØ"ì]ÿĘZíqµ([¶n{þŸÿœ7AeuuZJªÃacéÏ6eußuŸ”Dñ»…‹V¬\5 „iš=õôž=•ƒä8nGEÅ“Ï>—˜˜‘–¦u7‰5â”çù>ú¸¾¾¾¨¨0vH«iÚ˯¾æv¹RSSÙ´£Ø ô_D¬Óàg.¸ßFþwª ô|~‘­ýÀíü‚;=ðÉdê§mÜú©wŒíñçÅñŒr ¨;|ßz÷ßõõ6I ƒ|ôQcS³Ëéd‹o°…Vxžg‹®8ŽãÜÆl5Ûíp8l’ÔÙÙù·;î ‚‚ ,X¸¨¾¡Áëñº].Çãp8(¥G×ʬ?Çép¸=žÍ[¶Îÿá8Œ±aÿùèãû~dÛŽv»ýéçžñåWöTV ¢èp8ؾxž'„x\.ŸÏ»héÒUk׺ÝnžçÙJ#–e}øÉœšÚ:›Íæt8Ün—Ãnÿ¥ž;BˆËé”$Én·»]®ž£zÞì¿vqÄ“xÞ&I!‡Ãþ“óå‡ì·ç5´vŸ«xžw:lAăm°çzX‡hvàmzý‹$IRw¥Ù}ÔyÄÒÖápÄfœÅ”Ýn?tk÷Û)êž°ær8ö>êC>Šƒ=v‡ÝNö}2‘N°Clpß×´Çåý·ðó[~cº;|0Nôûyž³(%„x=·ËõŸ>^¼t©,G“nºñ¡Pø¹—^ª©­5bø…çûì‹/m(+:xðÕW\þì /Ö74¶´´ :øŠK.¾ûþjêê²³³E1MÃ0»î½/546Ξ1ãì3Nÿì˯>šóiß>E—_z‰Ëé|ý­·—¯\ÕÔÜ\ܧ(6 (-%Å0æÌimmݾ³bäˆácŽWß~gÁ¢ÅY™×_{Ëé|à‘G+vï®®®XRrÏýô+.7vÌ_ï¸óÒ /LNJ²IR4}ì©§wVTœ~ÊÉÇMú3ûX6UVU?üØã.—!4 ¤ä¬ÓOcé/‰"› ËÎ1ð§FlõJÔ}0;°xÞ¢T„e+WnÞ²õâ Îø±'Î9ëÌô´4ÖÛ[¶06Ÿã8¶– ìBˆ" ‚iYl6V¬ìöl8?k• ð¬œ2BHÅØåØUì™ í/½ò/›$î9)ÉÉl’!„ã¸XÛXuÃ0$IÒu½çQ-ÎÏ~„éºÞ$%&²;²çŠRÊsœÑÝŽãØ£X¸x BhÂøcTU!ö# ^f+À°]X”rû¶‡`Œ0ÖuÝáp´¶µ>õÜó—_|±ÓéA×u»Í¶¾¬lɲå7Þp=넌IŠâxžt?Ãì¥a¥¥¥uá’%³gLgÅŸÙ³Ñý¼í}!b/.û#¥4öØMÃxåõ×§w|nnN8fãb/A×lhuMm$"¯XµÊïó :äµ·ÞZ°hñcO>]\TøÍ·ó^yíõå+W¾ùî¿Oš=+7''–ˬ”Е—^ZV^þ×;î¼ä ’9Â}óí¼·þýïsÏ:£½£ã‰§Ÿ}íÍ·W¯]{æ©§ú|>]×wìØÙÔÜlèú†²rY–ÙQÞ¿Þxsá¢ÅýúöýëwmݶÍn·ÿœ·8[È,„¡K/ºè’ /ØPVþÂ?_v»\–eUU×°zȆa¨ªZUSÃR‰ÕNb¿fb]R¦i646544H6[gg`Oe%ÆxûÎ UUI÷7„iš@@Ó4»ÍÆîÛÑÑÉ¢¶½½Ý´,AØ«V][ …žG”²fð–e…ÂáH$b·ÛØ7M0ŠF£‡# *Š"I!„縺úúöŽö󢿀ה­U€1®««‹D"aI’ššš:::DQäyžÄ®‚ΨxÒuÔ A545²rW‘HÄn³sWÒ¯ßI³g};þ®={ªª«/:ÿ¼ÓN9!ôÎ{ï9rÖŒk×­/Û¸Ñçñöë×÷üsÎ~ÿÃ:qcÆH’xÆ©§„Âá/¿þšâv»Ž293#cÕê5kÖ­£ˆê†QZ:09)iÕšµÅ}ŠÎ8íÔæ––õee]íÁØ0Œ‚¼¼ Î;wÕêµ³¦Oûzî\A6oÝV—ÊI'QŠžyþ…æ––‰ãÇŸtâì‹Y” ¢`·Û=Çíî*í"{öìa’±£F)Šzè®Þƒýßç.aŒ’’’úõ-vØíÞ?zo¹íö»>ùôÓ@ h³Ûþôûæ|þùwß/LJLTUí†ë®yúùnúýïý~ßßÿqßuW_•™‘! Âò•«>þôSUÓÆŽš’,‰BÈn·LØ Œ†ÆÆ‡}<ÁïkhlbªÏ¾øRJrÒ©'´vý†ÊªJ„ð5W^îñx}üIESÇ=kÆôç^|)UlvÛ ×^½ruùg_|a“lS&O*ÈÏ{îÅJ’Tܧð‚sÎyñ•Õ74 „.¿ø"Ý0þù¯×$QìÓ§èœ3OÇ777¯\½&®^³®®¾nמʾÅ}&Œ÷ÁÇŸ†‘“uÅ¥—üõö;ív[0JLHÔ4•îo7ÿE›Í¶bÕª×ß|Ûï÷EåèÂ…‹Ö®ßðÈO\sÅåO>û|T‰Ž:TÓõʪª`(tõ׆ñâ˯pΙgÔÔÖr÷ìÊwïÙƒ1ñû}wßqûç_~õÕܹn—«³3pÿ=—$É&I7oyëÝ[–™•uù%ßqϽš¦1ÂçõÌ7_’$M×EQ|õ7«kjB×\y…Çí©®®yõ7›[[n»åæï.Š*ÊﯻöOÿwË)'èñ¸Ÿzöù¤ÄÄ]»wßwÏß·oß1çóÏ].—,G¯¾â².—ëõ·ÞÎËÍ©®®¹å/NLð?øèc‡c÷žÊK.¼à¸©S¢Ñ¨®ëO?ÿBcc#ÆøÒ‹.ü~Ñ’µë7<üø7^ÿ;BȇÏ1M£¤ÿ?\ÿ»ç_úg}C¥ôš+¯¨ª®~ñå%%&œyÚ©#GŒˆD"ÿxð!BHsKËi'Ÿ4tðàÛþ~·Ûå:þØcCáðÊÕ«©er҉njûУ565]yÙ%o¾ónmmÂ{_SQú÷í;sú´'ŸyÎ0ŒÄÄ„ß]sõç_~µfí:Šè‰³föëÛ÷‰§Ÿ1 399éÒ‹.„%TãA™¦é°ÛNœ5ó‘ÇŸ<íìsnºå¯¥ôë[ÜÚÖÚÒÖf™fCC£ËéœvüqO=÷ÜÕ¿»áÁG=qÖ̹ó¿»ö÷˜¿àûóÎ:«¥µµµµµ3hmm5 = ¶´¶v-­m𦵵··µ·wõ Æ NMInjjrØY™³gLß½{Ïþü—¯¾ùFUÔØ;¯£³³£³ó¬ÓO»ïïwbBÚÛ;Báðì™Ókêj¯¹þ†§ž}îܳÎ<ëôSç|þÅÍ·Þ¶rÕjçûö)~åµ×oÿûÝMÍÍ¢(B^xùåŒôtMÓB¡PZjjZZªuȱFì´'A¡—JG¬ug ÀNZ|ñÕWå›6;fÁÂEK–-·,Ú§°ðÉG…CÁ`(7;{ùÊ•;+v!Œssr ÃPTuà€’óÎ>k`ÿþóæ×ÑÙI8ÂfV³åM!ªª…Âá?\ÿ»³Î8ý·ßîtº\Îï½§ª¦º¦¶ö±7fôëo½óî{ï÷í[üøCž~ê)ßÎÿnCùÆqcÇ,ø~á²+ëêëO>qö¸1£víÞ³³bçä‰ãOœ5kCùƯæÎ5bÄî=•Íù¬3غmÛäIO8îXÓ´t]ÏÌÈ;zÔ„ñÇ\yù¥Í--S'M¼ñúß½ùÎ;Çóèƒ÷W×Ô|ýí·Ñß]}õqS¦¨ªú؃446VVV±oYvP|ï]wöí[üÁ'Ÿœr≃JÞuÛ­^¯·£³ãÂsϽà¼s§ŸpüɳgSËúæÛyïðÑÉ'žøà?î3zTCccggg(ž:yò}wßµ{Ïžò¿øúë[núÓU—_¦ëºaš„Ý0þõÆ“&Œäû«jj¾™7ß4Ì‹Ï?ÚqÇ~òÙç7ÿù¦›nüCbBBYùƯæÎ=bäžÊª>úXø>EE?pßä‰ßzç]M×YR9*˲üæ;ïžyú©·Þòn»²ªjÎ_Üüç›®ºürÃ4EihlŒÈ¿ÏûÐ?îÍÏÏ[·aýÇŸ~Ö·¸øáûïËÊÌ GÂc‡Ýþå7s››[}àþ1£F½ýÞû3§Ÿ0dPé]·Ýêq»E×\yÅŸÿxãÆÍ›W­^óÍ·óFÁÆqœÃn¿óÖ¿•ôï¯i¨©¹åŒSO½å¦›>ùìó=UUˆ¢¿þß_’“’æ}÷ÝûëÅ\ðÁÇŸ¼ýï÷LËz졯ºüÒmÛw|ùõ7£FîûšNœ8cÚ ­mmëË6 Prö™g´··¿óÞ{Å}ú „_}ýM9Y·aCéÀ§r2Ïsûñ£+ÔLÓºîª+‡ TU]œœ4qüx]×§|DŽDåâ ÎOHH<¨4#=­º¦¶OQá„cŽIMIÙ¸yóùgŸ5|Ø0EU’“’B7üîÚ¢ÂB§Óyç­ÁãvÿáúëŠû]wõU}ŠŠÜ.×﮹zPiéßo¿mî·ó5]OLHPÒÿ‘ïß°¡lôÈ‘ ~?ëáyþÖ›ÿRŸ‰È†a<ýµ×äç<öàËW®:qÖÌñãÆqq»Ý{*+*ÍÏÍ-ÈÏOOOxaòĉY™7ÿùO›6o9áØ©ýûõÝP¾19)Éépbq`Œq]}] Ðû‹E©Ó&J_Zr"Ý÷' .§S²Ùþýþû‡Ãétr¯iÚ%^0 ¤Uu•ßçÇ„$&$hšvÜÔ)o¾ûïí;wN?^¶ÎÁ—_S¶qcQa¡Í&išÎúgLÓìqrÒòy=YYYº®öÅ—ª¢&%$:]®p8’˜à·ÙíÙY™‹—.¥Ô*îÓÇår±ŠÇ»]Ó´Ë.¾(7'÷¸©Sòrr^yýõ!ƒ]wõUi©)o¾óîª5kÇ+ ¢¢(³gÎ(ÈË1lèý÷üýí¿÷ý¢E·ÞüˆĈŒE1%%…çyEU³³2‡Ïçëì ¸œNA‡ßï£y½žžOPRb¢Ëåê×·ø»ïš–‰(ò¸Ýr4j·ÛÙ™ƒW^{½°  !!AQ”P8œ•™áóù¢<Ïó‚ ";iŸà÷‚!]ÓeY%QŠ1Ö4-UX{ü>_gg§ËéLINf'WÒRS;Aàƒ¡(ˆŠªÌš>mð Ò@ (ˆB(=5µ|ãF¿ßÏs<+phF(JLHô¸Ý.§3‰èšž”˜‰Dعn›$aŒ½^/&Äïó!„ÛÚÛ‹ B.§“­ü… ‰‰ 6»=+3séò†a"„óøc|üñ?|èîÛoóx<ÿu68:ð¨{„!dúñDZnÇP8,ËòèQ#!ápä„ã3M#UfNŸ& ¢ªªáHdÔˆá'Œgõúgœp;’=ý”S¢Ñ¨eY—\xA °Ùlgœzªö),Œ*ŠeYgŸ~Z(ÎËͽñ†ßQ„TU Cú÷1l˜eš†i² ò„ Ï=76·@„SNœ­jZ0êST4dÐ M×Ãá°a ñcÇN<É2-UÓ4M;ÿì³Ù°“ˆ,'&&Ž1" pܱ3¦MC”†#‘^ر®¡ººZ9*÷ÇŒ-J=Nñ‹e»Þùt[i^âu'v—ÇCˆpܦM›ï¹ÿAM×ê~Ýu þõÊšš›ž·ÛlQEÑT !‘åP8<á˜qϽøÒŽ;ÿð»ëØ2&!õáHDUUYަ¦$¿óï÷¾üúkIŸzö¹[þ|“×롦¶î™ç_(ß´éØ)“=nw ÐTuÆ Ç?üøwÞsoMMí¹gŸi·ÙžxúÙ­Û·8pêäIÊÊ›$It:Ÿ}ùUSS³$JŠ¢¬\½zÙŠ•.—«©©yð Ò‚üÚº:Ÿ×ëv»—­X¹ný‡ÃÑÒÒÂ#ÆHU5–Ѩ‡m6Û¬éÓÿùêk_~=7ŽÌœ>íÖ;jšÆŠï‡ÃË21ÆÔ²DQ,ß¼é¥WþµhÉÒË.º077§¹¥ùžû8ÿœ³£Ñ({¥jjjóóò‚ÁPZjêä‰zôñAƒJO8öXJ©ª¨Q%ªª*B¨µ­½ ?¯_¿¾ùëß²³³Ã¡0;Ñír¹fÏØ§=wÜ}O8<¨´oŸâ›o½=#=­®¾aèàAËV¬¨­­óz½¢(bŒ¶oßùä3Ï.Z²ôÚ«®°,ë™ç_ä~ã¦Íg~ú±S¦<øÈ£cnj޵{ϵW]Ù·¸ÏŸoù[vvV8FÉrÔÐ ¶2Œ,˪ªžrâìÛÿ~Ok[[ù¦MÇ ¡”*Š:sÚ´‡üÎ{î­­­=óôÓŠ ›šï¾ÿË/¾HQ¶`Y[{ûA¥…ùùµuu^×&IºnD"avª–RÊ. ¾ùÎ;áH¤¨¨°OQÑ¿ÿóa(5bÄüßß|ëm¡`hÜØÑS&MºõŽ»îøûÝùÇMZXPPS[Ûó5µÛí@`ç®Ýß|û­d“ÚÛ;232FQ[[—›““™‘Q±{÷WßÌ•D) I’ô÷Ü?fÔÈSO>‰-³q¤Ó FxñâŃf'—Øè¶¦J¬ê:!Ä´,Ü}s±!+´û2BÀ.BƦiò‡º§Ôƽ°aûÍõµÕ€˜‹û'[$vËýî;f‰•h]@¯II)•Di݆µƒ öy}”RM7$QX°®ê³UuNŸo×®Ú'®* ¼iYÇE£Êö;¢rTÀ¸¸OQBB‚eYMëËÊÜn×°!CØi½ÌÌÌÝ••7¿ ïɧŸmln¾÷Î;::;cOÅÒåË9Âåäd§§¥­/+Oðùœ.gEÅ®Q#G8Î=•UÿxðÁ'œ••5zäˆÖ¶¶`0˜•Åó|g °yËÖŒô´‚¼Z´Èïó]ÍÕš¦±[íßžî-[– …ØØÁØ#ÅÇ*…°†ÅúÖm6›¢(Ÿù¥è×_çr:[Z[.^ì÷ù®¿æEUÙ°ncUUA°¨µxé²öŽŽ+.¹$?//¶ü©a`0ödî÷ØB²ݯa¨{…œXÛ&3QÔÙÙÉš×óѱê&lC×ÓØý“÷`¯i°Ç3ÛÂW±!žûñ`Ÿ£~6­!D)²¬®™ ¿N;XÏL¬@[÷|Š~•uT-˲Ùl+V,õ$f<þyMfvFšWP-²xMŵÇgÈâkÚFÉ™&õx¤÷ßwüío¤¶a|ˆÙÔç³RS-—KS7~Ô Lg·›²|Ð{aŒƒAR]•ƒ/;…1¢ÔJM5û÷W®½ÖÊ͵’’hR2 Di×=oLúÙE)DQá—*Îr™ý ‘e¹gDþ‚X³m6‰}£hšvèÆæB4Uvçþ/ÅåtF£QòöÙ(ëÏ$¤÷—i¿W€ôrÔOinn†ìÇxrRŠÛí>°Ë¯GÌz?±Ø}]˜…}ŠEijnŠF£˜`·Ó•’’ÊNèíw¯Ø„¬Wˆý9ÍÀ˜ÈŠ: Åó—S îyok[Jzccë…Ç$Ì›¿­¢!«ç‘ Ý»Im­6c†>s&RÕ?‡¤µ•«¨ »ws\ @ú gͬÿv/êv›Ã‡#F˜99½ÝßBv;¿b…ôöÛ¤©IX¼™¦>{vðƒp4J% â{üòÓ4£Ÿ7Æc¬)Šª(?°bëÙ`lùÃWŠ•ýa=6l/‡Þ)›z¢?¼<í !¸gšBÝn$HU±¢ MëÙdYˆç».°Ö‚ØààðâÅ‹‡ ¢hJEÅN›Í–‘žÁ B$®®­Nð'ffdî—þ¢( <ÏJ¶Eås Ø))öOö{¢×ÕYîwt´WÕTeef§§$Q„*kjÛÛÚúÛl¶ž“oÙ;BˆE©ªª¬¼AìŒôOn†eY‡ãÛysKKK òr7í¬}sÞî ’§ÉGœ­|ãúÎŽàØ±ã"Ý Ówm:¤n·•Ð{™&R¬(XUQoü—ÁóÔá N'Å^¯§‘`‡BÂ矋_}%~ñ²,³¨ÈÊ͵rsÍü|+%¥+)(µ22Œ‘#ib"úÉž- Y6 dš]ÿQÚuˆzd»(em;’mø±xž:ˆ-¿‡1–enÝ:~íZ~Ã~Ín÷î½)%ÄÊÎ~ó™ŸQŠ#‘Ÿþ-N‚>G£½§y-^4bøˆõÖ{½ž%c•I4M[µzEVVNbBbì×.!¤®¾¾½½Ã´LQ óóÙpÔ}d+bYVSssrr2›kŽDdYNMI‰• ‰ ¶Á«šºeËæaC‡ù|þm•­6‰ËK÷W×TWVîT:¤ça¾¦iÕ55Ѩ"BA~žËå …Â–eÚl¶Ø®B3ØÓ±kWEUÍîĤ$D-›ât‚[š[–”¦¥¥ïÿˆç‘a ]ï=ÔXçÉÁ~›ÿr¯$²,dš 5JÏ#A v;ây×…òË–aY&íí½|!alR¿ÿGG$Æì\¹~Üqúôé4!:Ôå¢.ây¤ªXU»ÉÒê粇|èž ŒÇí³ž§6åùÿ¶õÿ!XQĹsí?ŒdqŽD¸;Ù«F½^+99öxž46âÎNsÐ }Ô(sð`sÐ }Äêp JÂÛk…Žð·58 öFÿ²eËòóó·nß2vôXËê:F°,j“¤Æ¦ÆÝ•{—aIjY–Óé¼úú4MËHOw8×\qyZZ*¥c…Æn—‹ì¬ØµëÞ|þ©'N‡eÑϾøréòåÿ¸ëΨ¢x=‹Rv¢‰µcÛömN§½_ß~Ï|¸nk]Ô4ÍiÃROŸÒùŠ~BFzát86nÞü§›o5b„¦é¡pèÿþôÇp8²zíÚK.¼€Õ-‰D"†axÜîÕ ÔõãC¨¬Ú]YYI)+Ö@¢Çõ-î—Ö]Om¿gñ¿6~…¾×òùìŽKêv#Ë"íí¤¹77“¦&ÜÑ z~õjñ³Ï°,úÆß›$Y™™VV–•‘aåæ#GÆQÙlÔfCªŠeù§oŸç©ÝŽºÏ–÷N×±,#UíÚ Æ¤®NX¶ŒÛºõgvgýzávî,@†Ñõrð¼>y²6s¦Y\lõécfeu}·Y²Ù¸²2÷…r›7Çn¬|²•ž~ÐC“ƒÁ«ª>eŠvÊ)½öd‚ß´½}ý<ÇCA»ÍFÖ4£»ûG•¨×ëQ%6RžÍÖq8×^yåØ1£UUmmm;ï»¶¶6MÓf͘nYÖ'Ÿ~'M˜à÷ûÂáÈK¯¼šž–zÚ)'wOcäeYþxΧN§ó¸©SXDŒqg ³(?»|GÃ÷[:fŒ/î©.«š:4+ÁïkïèÈÉΉ61 £¿~wßq»$Iÿzíõ'Ÿyî÷×]›Ÿ—gÆwß/¬««›8~|RRâï¼ü1Í`ç C/,(ê[ÜŸè.A‰4Më}˜óùTü|rØQ0B8AS·ÛHH@"AØçÐ8!?%)E‡á›o„åËIc#©¯çW­Ú{þc+-͘8Q?^;Ö0 ÂOIŒIK ¿n©®>èOŒ¹ª*á»ï¸uëp,øtý·w ”cèPåÊ+õODªŠ8Žz½ÔíF†G£{Q$bõé˜?Ÿ´·“ÊJ飤—_?üð§íY©©QÏ<+ÊÿÊüÒx¶tµiš–ÙU•—]ÁÒPﱘ_×_tíÑ'Ÿô¿îïÛ·xöŒé>òè…矷|ÅÊ@0xÞÙgE"²Àó<ñä~w­eYÉI‰kÖ­oïè(îÓÇ4-„ÐSÏ=Ÿž–¶»²²¾¡áº«® …ÃajQÓ²tCsJ\§l¨µ H7t‹Z”îÿñ6M“ÍŠ~¼qÌ1ìwÏ{þà“‰¢”º\fß¾ÔíÆ²ŒÜnD)2 ÜÚºw VÏ·¥¢ I²²²ÌÂBcìXõœse!B~ÜKÉ6hYVNŽF!÷b¼a^wOå.ÝÐ Þ{ ÔåtÕ5ÔÙl6žçcõÐ)B¯·ª¶®´Éè‚Úu[+2g KLð:7mjÊHÏŒM2b cEqm6[Gg'ëƒjoo8 ¤¬|c{GûèQ#½OjJòî=•?ªÌQ•ò‡pˆ“®?ïŒtס(ÏS‡&$Pž7FŒPÏ?!Dššøòr®¬Lüøc~ݺŸ¼ êõêÓ§ëcÇR§ó`¹F=³¤Ä,)¡ÇÞs¡ìQÿ†^_ÓIJŒ;:PÁýÊ$„WÇŠ‚8NŸ0áç{èñM"O2Rü6nT…uôwE?F”Ò@ PW_zñå ,)IOK[»n]QaáŸoüý#O>US[7fÔ¨?™óc›q¤_ˆÿ?óÓÎÎÞSÊN€³±·l›ÔëÕ¦MC3g*×^‹Ã៾ ž§n7u¹u®Ø²º†WuŸËéòÛêóa_T?|¤ {í8QŠŸµëÃ:6üàÙ°™Áƒ†¬^³jþwó“’“,ˤmhh(éWš””«ñ@)¢”f¤§<çÓo¾—œ”tò‰³òssÂ>¯7)!±¿¾>¯÷ãO?ÍÎÊòûý)É)Ï¿ôÏŽ@çÕ—_ž‘žöÎ{ï/[¾âª+.ûà£OV®^sÌØ1ùy¹l¤(I#‡^µfeubÇãBmÛRnæ˜Ñãbãú1ƦaºÝn„ГÏ>G)ÍÏË»öÊ+V¯]›Ÿ—÷ý¢E -aêäɬäj†ú+N^‹ ±£ìžL³+xžúý?=Y,««ßãÐbëâÐúÂqiïl^Q”êë몪+5Móz}}Šú8Îkû‚`YVlÀ%ëâÁÝ}åš®{=]מȲ(Š<φiY–išN§SQUÓì=쳡ý–ií®ÜÝÒÒL—™™™•;z6€-j¨!D’$EQ¥ϳµŸ$Qd+¯þ´f€_ÉÏ?ô†ïi~’^Ê·¡î…JظxUUV߸çÙ?cÝå= yîW5“u£Ç p¸‚9[e”-÷ªëúÁ*ÊÅÀšÇ6[¹´gAПР8ŠõRÈ­P›øz°óØÚï±/ŒX°ö¬£[’»×ÍÆØâtkÏW=ÿÒsÝóŸÜ ˆûŒ8âã[Žx ÄåI0ˆoýwövøìW óÇv¼°%vml­Ä¸©½Õq0&?© èÐí€x¶7ú].ÏqlôK´Gé¦çžý6Á†fºÝîH$Òëê.]‹`HRè‡Mäq8¢ °™eªªªªú£¾‡þk{ ÎÔ]¢ùÆ?ÿß)gsâégÞÿð#@ «J3Æ–EB’(J’Ć~î·FŠ(Š{*+/¹òª¦¦&AP÷Ø›Ø(L‡Ãñý¢Å×þþF„»VKÝÆ²ölcYT’¤}ìÔ³Ï=õìsÿø7—oÜ$I[{}¿ÍöáÓ³pôÞö47K’ÔóŽì2|âÜÞbmËV¬9|øÅœÿýâ%ÏÿóeŸ×kš¦ªév»Í0Œí;wnÛ¾£ªºÚ4MË¢†a"„DAÔu`ìq»ÇŽm·ÛAÐu]Õ4Œ±$‰l~€iš©))£G4t#¶X«¦i–eÙí6¶²(”R„¨ÀókÖ®s»\gœzŠUþðç¿lÙºÍápˆ¢È–Ø–D‘-* é:[ÓÑ0 A!ªªÉ²ÌâñxÆŽÍ gÓ•9Ž^Ũ¢¦þà·¢«Ãcìt:“’’9B|^_ÙÆM=ö˜ªªçŸsö„qÇÜq÷½y¹¹ãÇ]°p¡iZ<ϧ¥¦”mÜ4uò¤SNvÜÔ)œwÎý?Âs|QaÑwßÛÖÑnYÖ—^òä#9ŽÆ¦æ;oýk áæ›þ´pÑâ›6Õ××GeùŠ•ºaœuúiýû/_µª¡±iöÌãÆŒnooß²mÛàA¥Ç/^¶tÉòå¥TÕÔ¼ôʫdzióægžÁépÄN5GäH4•l6¶¢Ö'Ÿ}¾zÝÚ'~¨¸OÑÃ?ÑÞÞÁ ÂÝwܶvÝúáÆ^xî9ï}ð!Ïó§œ4» ?ÿÓÏ¿X½f]}}ƒnÍÍ-9ÙYwÞö·5ëÖ/Y¶|õšµ ~ÿ9gž‘œ”ܳ5Ä•®£~ÖÝÿÈý÷MŒª(mííÁ`0))ÉïóžyÚiº®ó<Ÿš’œœœ,I’ßç4 ã¡ûþQ]SÃq\(š4aB~^nD– !4Öe/_Ïývɲå÷ÜqûÎ]»ý ýûõ+*,Ø´y‹E­Ìôô¡C†¤¦¦ö+îãp8¾šûí·ó¿[°pá¨#}^¯¦kN§“`Ìñ\^nîð¡CS’“BwÝú·ï/~õ7%Qÿ»²8 Ä´¬p8¬¨ê”‰“꙾}ú$&&ôï×·b÷n»Í>`@Ö›Ïe>û‹}2Ç4Í3N;uÒÄ ù‹–,=ùŒ3à;iõÚµíQYÁPÈ4­H$"ËrSSsKkK(Ò4= YÔ’e9 †#‘HDnjnþzî·-­­r4*Ù$¨áˆ[xñâÅCŽªêÖmÛòrr=7Éq¤¬|SUMMnNvI¿~;+*ÒÒÒ’›[Zš›[Jú÷ÛY±Ëét$%&îÚ½;11±µµ-??¯£½£ª¦&9)±¸OŸæ––Ý{öØíöÒ’’ŽÎΆƦ¾Å}!»vÛlRNv6¥4 ­Y»VÓôÁƒJÓÓÒ Ãà8®b×®Î@@à…ä䤼Ü\EQAÛ¶ïHIIéST¸k÷nMÓ òó6oÙš••ÉRS[WTTX^¾QŽFüþŽÎ΂¼¼ºúz»Ýž–šº}ÇŽ”ä”`(ØØØ”“““•¥ý¼5Ià7§—ÊN§SUÕž£_ìv;Ïq†i*Šb³Ù4McciAeÙn·›¦iH#‚¢(<ϳ8QEËŒF£li­h4J)µÛí–e©ªŠâyÞn³!Ví¹»T§Ífã9΢Ô0 6ª‡RÊqœÃn×u=ª(l=EQœ‡ªi”RVÀÙn³aB,Ë2 ƒçyEQ$Q4-K×u»ÝΊK ‚ išz² pë%úÙxùýjp² „ž’ÙèøØ_Ø…ýj#÷z¹{,¿Õsf@ÏZÊûí·çTÞ^·+Ïy`íè^»%ä> õR´ùÀ²=ÿÒsþÔ~3ªØ…X…äXªìrÏÍöšÂ½`èukûÕmÞoQ—‰z› ñfŸíY¿þÈÖ²‡Júpøtõ³î¶J"E”u´ìWÆç°b…wPwoÏñµ ##“Ac}2K—-¯©«£ÔrØŽ'ŠbϪ™ì{‚㸨¢¬^·®tÀžçA¨khhmk+0À0 vØ« Éq\ hll7vœa‘¯–ïqÙ…ñƒsgùƲA¥ƒ1Éó\0ž;o>é?¨´´° ¿±±)"G2ÒÓYM·ŸÜ ˆ„çùöŽvŒqVfF$ÒuÝ4uE‘u]-,(hlnì9,RÅ—_{mÍÚµÁ`¨µ­ !”à÷z½~ŸçyBH‚ßï÷ù¼OGGÇ‹/¿"‚Ïçs9å7½÷ŸÙA·ßçóù|ÇÑ®y¾¶¶6;;Ë¢èo.Ÿ[ÖòÖ÷•Ï}¼:1Áïr¹Aè:f¥ÚÚÚ§ž{®¡±©b×®;ï¹gÅÊUmíí‹–,•$Éëñ$$$H’ôšq…ç8NŽDDG†ë×4Íáp¨ªë[ÇSËòù|§ž|Ò1cƨšÖ¼ðÒË¡H$_|þù’$>óü ¡pxʤ‰%ýûËrôGõù¼W^z™Óé°Ûí‚(üxΧ§ãÌSOõx<ì÷D(*é[P¾³aG³vü˜œpT_\¶ç¬IA¯ÇÝÒÖÎq\W‡>B”Òüñ†ß‰’ôé矿òúë×_sujJJGgçg_|YWW7kÆô쬬§Ÿ!ücšeœq…PŠ0Ɔi²©¹†aÄ.è†n™{Wm¤”b‚5U}êÙ篺þ†ç^úg4ýÏÇ)-UUõÍwßu¹\%ýû<èŸÿz­ªªÊn·M?þxžãŸ{ñ%Œ0¥–¦ª?ýLZjj |öÅ—l’;I«¨º]Äž¶µŽ ê·SB,ÝÐ &ˆ"Ô#–5M ƒmmm#‡ç·tùŠ5ëÖýûýÿ,\¼xʤI’$!„J”ü„f@œ †¡'$$‚EQDQ4 CÓ4Ó4NW]}Óåx!ÐÔ¢¢$ÞpÝ5/<ýÔõ×\­ëzŸÂÂã:á˜q²,cŒëêë÷TVaŒÚÛ;R’SÆŽ}õ—WVW545ù|¾–ÖÖÚÚºú††@ ÀqœašcJ­¤¤Ä»w(L;q˜¯j×îΦšó&g{œöšÚºÔ”TÝÐqìÁår%&&¶··›¦‘’œÌq܉³fö),œ·`eYÇÕÕ7üØfé~=¼iš.—;91eéò%cFõx¼„`Ã0öTíÚ¾}û¸1ãMkïŒq0Þ²u›$I<Çséè „#‘@ Hùvþ‚%Ë–ýå\¾r•i™uõõëÖoX·aCRbbFzÚ·óç·wNKOKÍËÍ9}[á c¬ëz^nþ⥠ח—ÍßïøÑ:GBxñ²e’(%'§hšÚ5ˆ#Jiumí’eËMÓxçßïOž4)!ÁßÜܬëúé§žòϽúîûÿ=rä¢%KþòÇT3Žô ¿î²Ë.KJJJJJŽ„åM[6U×Vnß¹½º¦º±¡iØÐ‘>¯·g?8Ḗ––]»wïØYÑÔÜÜ·¸/Fhð RE‰ ¼0i„ʪª-Û¶õíÓgÐÀ†alÚ¼¥³3pù¥çåä¬ßPf·I'ÍšýíwßmÚ´Åëóä糡8„ŒôÌ;w쮪ª«¯«©««¨Øe·9† ÞsïlèNUuueUUUuÍøqãÎ:ãôöö§Ó)G£ïô‘Ïë=ûôÓ‹ûô©®©ù±Í€ôÄŽãšššºÊ·©ªj·Ù; õ†a8®ììlŒ‰aèûͨr¹\<ÇQD-ËRU’¤H$"Ï󚦉¢@)1ÚívÓ0ØKÓ4‡®ëˆRI’LÓ´,‹­Ê‹öÎ%::;Æ))©‰ ‰ª¦öl1]êr9©EƦa„#Qž·, a„1a£6EA èG7Žn½TîD±ÒÊìà:VËs¿{š–…ØIQŒ Æ–E9®«”flnmϪ™!²oíL‹RŒB˜¼_›ØWBH×õ^GÝôœÍËVñíªè‰1ê1­÷ç4ŽV½Tîd‰Ï&¾ânÞ“Û· ÇíS°³ç]ö+ó6Êä›õûÇæåöºwŒñ~›ÝÛÎÊvþ´fÀQïùãûW/ð+€Bfw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýw ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;¼aa9¬k:ÆøH7ÀaD)Õ Í0 žçy—Ã¥ñD?Ý(¥¢(ò<>w ú î@ô@Ü耸Ñq¢âD?Ĉ~ˆ;ýwø#ÝøE)ýÕöÅê)î=RJ)¢¢z…1æ9ýZnLÓDñüáÍdJ)OxцQÛ\«i*:üñÏq\ZjB¨±©‘}&”Ò”äBD?ìc\ßXï°Û³33-Ë:ŒáO!$ ×Ö×"ŠRS’Ý.÷aÚ#FØ4ͦ–æŽÎˆ~ØŸeY†®gý û¢”f¸Óëꢙ銪¦:Ê”Ržç-ËÚ¼i D?ôc˲~…ýPJMËÂ!„M˲,ëðE¿eYQ„ap'ôæW_Àä×Ü!†è€ÞűƒqŒñ!̼Šþ€Q›ì¨¿íB!c6"ó'èm¿Ã8ˆ}‚ز,J)Çq¨{ &!„k,ëÙ?MÓìÊëîØÝ«çàý¾!0ÆûÄ´išº®SJEQâyŽõ>QJc9ðBl£l„Žã Ã8ðÛŽú ±´¤”Š‚X×P¿yëžãyžßU¹§b÷.I”8Ž1–ò‚ ˆ¢¸¡¼, Š¢È–Bä9>"Ë¡pÈ&I,¦Ùß{ÛÝÞ¯Q·ïܱdŲòÍW®^Ùèd_'’(BB<ϳ@gÆ’(r„PJ !<ÏK’¤z{G»$I<6ˆ~èîy‘ZVlÌ¥e™”RUS;;;šTMã8cÜÒÚº§rbB:;;÷TU¶µ·QD·ïܾyëÖ–¶6Œ±nU5Õ,ÁÁ0üܼ)§$%%íÜU!Š¢,Ë{ª«"r„ÒÑÙÉ~F‚AÃ0¢Š²§ª*‰ð?!Üúò {ùP„FáÅ‹‰PËr»\žÞ¸1cTUmiiýìË/ÛÚ;E9ëôÓçΛ·¡lãÙgž^XP¸§²rɲåÙ™™“'MØ´ekMMM <áØc×mذfíºQ#F$$ø óó7oÙ²³bW]}}qQÑøcÆY–õáœ9ííI‰‰cFôx<Ð#øÍÙ¿ݲ(Çq_pþ¿^{ýÏ·üuó–­>Ÿwþ‚ï¿ÿÀó/ýëUUU}òÉòM›€(Š’(²ø{òÙçtMß¾sço¿•£O>û¬×ëùð“O¿¿Àf³=öäÓšnð<…f͘Žºøò+þóÑG!„°M²±„Ãa¯×+ËòcO=­†Ãá0MSÅ÷?øpëÖ­ÑW^£¾¡ñ®{þ ‡EQ0 cÏžÊ;+DA ”b‚5M{äñ'/»úš'Ÿ}. ?þÔ3Ï—•—¿ùÎ; ~Aàm’mûŽ=ú8¥ô£9s>ûâ«•«V½þÖ;’(Í_ðý»ï½Ÿ˜@ÙY±ëûE‹/]öŸ>JOK{öÅ—êêë?üdÎò+üþ—^ùWcS«¤z¤_Døqö~B°¢(§ròóO?9bذ»ï»¿¬|ãÙgœQ¾iÓŠU«“†‡Ý>yÒ„ºº:A)¥_xÁ5W^Ѱn}^Î9ëŒÛn¾ùì3N×u£OQá…çŸ7{æŒæ––Ò32Ò/¹è‚M[¶ôë[|õ—_}Ååó,0 óøc§žwÎÙkׯ?ãÔS/¿ô’‰Æ‚N‡(“Æ?ç¬3‹ vìØ¹fíÚ믽朳Î,îÓBðÕûŸæÌIIJ2xÐû~ØÐÐxìÔ)ï¼ÿþÏ\´x‰Ýn»öê«\NÏó_|õufFFaAþšuëS’’›:EÕ´o¾7¨t@vVö'Ÿ}¾mÇŸÏ;tðàwÞ{Õêµ%ýúrÒì/¿™[U]=þ˜qQYaÓ–-kÖ¬[¾jÕö;ûö)jko;ft[[›¡%ýûUUW>¼OQQ øäÓÏ1Æ×^uecS“ÃáXR’—“³rõê/¾þFà…¤¤DUU“v{iéÀ›7—ôë7þ˜qŸÌùlͺuõ ÇN™œ˜{êà;ÍÛûÚ¼‡]‰*„ãAˆD"gΧŸ•mÚtû_o‡#ÏGdÙápB Ã`Ⱥ®K’d¦¦k‚ °U(UUe½áìfš¦±y’$aŒTUs8ìL¯$IlH Ñh”#Än·ÇJWk𯶆bwAÉѨÇí6 ƒã8ŒqlAKI’bC?-ËAUUŽã8ŽèºÛŽÝn7txMÕ0!lï<ϳ‡Ìó<÷É•jšf³Iº®Ây<žººº?Ý|Ëßo¿-3#–5üV°……ËÊÊzïð ‡eB°iè,×TU;þé§œ‚¦”ê†a³Ù Ã@aŒeYf#î£Ñ(üÎVFB°¦iìfÑh”õ° ² áp˜Ý7öÓ¡ˆ,B¢QcÔ3Ù#‘ÛŽÝfcdícù«(Jì`Œ£ŠB06 Ã0öiF$Á«ºŽBÝ[0 ƒe_W=·#ËQ»Ý¾fíºEK–45· .-ÍHO‡Üüõýl/Œ0&]™~Ñçɲ[B>y±.ïØvU×F¸Y¯Œýe¿«ØFz½K¬ û…ï~ÿ$¸÷ft}íûÀ{®q¼ßv8Ž3 #??ý XR]=€ß¨ÿ^´™?6dë®9Ò >’,Ëòy½ÇŒK)•eùH7~"°Š|¯b½:GºÁG˜®ë±.,x6¿-±´ç !¢(¢_k1G ;ÍKáÛÚÚÖ­[Õ BÚÚÚþ[4H÷¶n—%tEXtdate:create2013-09-27T12:18:10-04:00¸=%tEXtdate:modify2013-09-27T12:18:10-04:00AtEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/lockdown_ptrace.txt000066400000000000000000000023411330160122500247070ustar00rootroot00000000000000Disable ptrace capability on your system. The deny_ptrace feature allows an administrator to toggle the ability of processes on the computer system from examining other processes on the system, including user processes. It can even block processes running as root. Most people do not realize that any program they run can examine the memory of any other process run by them. Meaning the computer game you are running on your desktop can watch everything going on in Firefox or a programs like pwsafe or kinit or other program that attempts to hide passwords.. SELinux defines this access as ptrace and sys_ptrace. These accesses allow one process to read the memory of another process. ptrace allows developers and administrators to debug how a process is running using tools like strace, ptrace and gdb. You can even use gdb (GNU Debugger to manipulate another process running memory and environment. The problem is this is allowed by default. My wife does not debug programs, why is she allowed to debug them? As a matter of fact most of the time, I am not debugging applications, so it would be more secure if we could disable it by default. Note: Disabling ptrace can break some bug trappers that attempt to collect crash data. selinux-python-2.8/sepolicy/sepolicy/help/lockdown_unconfined.png000066400000000000000000000655211330160122500255370ustar00rootroot00000000000000‰PNG  IHDRþšî !igAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“jLIDATxÚíýw”÷ç{¿+ ÇîÐ9‘Ý̤H1*ç,Ë Î²-§ñîÌìÌîݳ÷žóì™Ý{öÙÙ½ÏÞM3³žñÚr-ÉŠ¶rŽÌYÌd“sUõüØM6©`J$…ï뜖Ø@¡ê‡ê>U¿úB!DÉP6mÚte0¤½½±±1 Ã8ßeB!Ä9¢ª*áp˜¦¦&ÆÆÆPÞ~ûí¬ÇãÁãñàp8Îwù„BqŽ¥R)‰‰D=•Jé , ²²MÓÎwÙ„BqކAOOûöíC…BTVV¢( ¦ižï² !„âS…êêjz{{Ñ5MCQ,Ë:ßåB!ÄgD×uœN'ºeY~„BñÅeY–¿BQJt@‚_!„(º„¾Ÿž¢(¨Š€……iZùÇT¥¸Œeiš¨ª:ë$[Q”sÚ¨VUU°ò'óæ>×…rÊðI·¯Êm™6¡ª*€4âgYVþŠ¿ð‹âãS…ÉXŒ¡ à à÷Qª OÐ?4T `·ËEMU„î¾*Cx=n&&£ŒG£ÔUW¡Mç§•3 ºzûHg²¨ªBÐï'RQŽ¢(§-×78Dy @*&“ÍRSùDï¹h˜ÉØ 5Õ8r†Aww6]§º2R<úLö9 ßTBœ¼p˜yÿq/äµüàSYY)Á/Ä' ( #cãüú©çxù÷Ù¾çCú††¸tùR¶ïÝÇÿù¯Ùwä(Ûöîcht”Öæ&þË?þ‚úšêbÐ~x诿·‰K–,Äép̪=€“Wæù„üÕ¼¢ä+\ažŸŒMñ·ÿð36nßÉÎ}صï ¿ÚªJTUÍ_¥ã“QþñÑÇ)8ÚÞÉ#ÇX¾hª¢ ©jñËdæÊÌm©ŠÂï_|…Ÿ?ö$‘Póë9ÜvœÿçýœáV/_‚Ýn/Ö ^£L—¡øÞŠïiöv ¯+ÄûÌeLÓ,Ö(Nhä{K”"EQ8ÞÙ;ÃG¨ …Èæ Þݲ\Π¢,xÖÏÅÐÐTõ ñi(ŠÂ±ŽNµç¡û¾ÌÂùÍ$ÓiœÙ\ŽêÊýƒïà°Û±Ùt2™,†iÏÈMÓ$ª`åÒÅärÛ÷î#g$S)æ54àq9iëìbé‚V†FG‰Æ¦Ð4•\Î`QË<ö>JYÀϼ†zåd;o}åæ7Öó³Çžd×þƒ,]ÐÊáã'ˆÆbùõº]˜¦‰eY4××./FF9z¼p9är9.Y²UQÙsð0õ5UÔTF°ÈWç[ÀûÛv°¸eomÜB2•BQòÏí?|”þ¡a‚? š›èìí#™L‘H%©Ž„™×PÏ‘ ôûXÜÚX~‚ûû¹bÍ¥ïìfb2JÀïctb‚}ýŽœh§»·Ÿî¾~®Þ°–t:Ížƒ‡ ••q¼«›/Ýt=í=½ “Í´w÷pÉâE¼½y+KZ[ð¸]är6]ÿäó<ðÍ{ïbqËüÕΦت_ññY–E¤¢œ‡¿úºzúØ´s7ÿôÛ'ø³o} ¿ÏË5Öa·Ù¦«öOÞ‡ÓŠUø ¨  ë7]u9~Ÿ—GŸþ#c“hª†ªNWÁ+/ ½»›ç^}“oÜs‹Zæ?ä…õ-nOks µÕ¸N^o#×lXÇe«Wñß~þ+ö< Š‚¢€:}ëàh{±xœ¿|ø!ªÂ!2™ £ããìüð·“šÊ0 µ5³(–ü¬Y±œ_?ýwÞp‰T’Ξ>r9¿×‹ÃaÇ4MÚ:ºP¸tù®Z¿–ÿùÈoèê àõ2ä°cZ»÷Ä0Mn¼òr.]¾„¿ÿåoéæàѶü­ŠL†£':XÐÜDÀçãK·Ü@cm †aÈw—(Yét†¡‘QÜ.'042J*•Æá°Ÿñ5…[drÅ/ħ ª*‡Ú޳mχT…誊a˜–Y¼òeúÿÑ©)>/9Ã`羌ŽO ë“±),3¥^¸­ `aáv:I¤RlÛ»öî^LËblb’žþj*ôuv2:>AYÀ?ãöť˖°zùRr†A<‘ ,àà±6,Ë$‹±|a+ݽýù°Å1-“в2r9ƒ­»ö®(§¶*ÂkWóë§žCÓ4¾rÛMèšV¼E`š&¹œÁ%KòUÿˆò`€Þx˲èâ•wßgIk ¡òr Ã@UULÓËBSUzúØsð‹[æ*/ò,¼‡ÚŽгÐãÆëq£ë:u5T”•¡ëz~F±,B”"UQØwä(Žãþ»nàµw? :fÝ%ËÏØ£f´ê—ŸLáJ{xlœ#':ðy<|å¶[hª«eb2J¨¼Œ¶ï´Ljkh¨©¦µ©‘Ξ>:{ûq;,_¼y u8væ5Ôãóxp94××Ñ\_ÇõWlàÈñ¸].ª+Ãïì¢<äË·ÞÌlâðñ¬_¹"_‹ i´ÎkÂépÉf1M§ÃÁ=·ÜÀ7³çà®Ù°ŽËW¯"›ËÑÕÛßç%ì-g~C=wÞx-Û÷îçDw×lXCKcåÁñD‚–¦F¬é µ,‹šH„t6ƒ®iTGÂX–E¸"à‘P«–.¡h·ËIe(@¸¢ ]Óh¬­¡¥©EQèÂítR_[ͪ¥‹y{Ó6v|¸ŸXʦM›¬eË–ÖíGqvJ¾™=Ùl]×P }â‹-Ó§M•S»ìY `Y&J¡o½eå[î“o Ÿ_âd£eºÚ߬Sîå)ªŠeZÌìðVl¡?c=…ß ÿ)ô˜Ù-(žHð¿~Œæ†:¾rÛͳ¾HæjQ?óýZ0}ÿ}ölŸ…mϵÌÀÐ0†iÑ;8Ès¯¾ÉÃÜKë¼&²¹Ù\‡Í(ù[#2V€§rê8!gzͤª_ˆO«ð¹Ñ¦ÃÈ8ùÄœ}Í-Ã8óºfo±vBqî(ŠÂÁƒO^ñËÔ¼Bˆ‚pE9‘PÅçÖˆÎnÓ©€³7,„øÓÉì|BˆÓ|ÞcîËwŸ½â>2ô¥BQ:ô™ãp !„â‹©pK_d0 qÁø8]RÎå”.zÖE6G\~Š!„}`hS1Ñ5óZœ_¹\Ž@ €Ýn'NŸïâÌ¢i>¯Ó4 ‘Hœï"}"Š¢P(£ª² ›Ll#DIÓÓé4‘P„ò²rLKÆ燪¨ŒÑÝÛÍò¥Ëñù|ç»HE Ùl–ÎîN†G†™˜œ •JaNO9;s { 8¨ÆÜi˜¦ñ¹._˜Úvrr]ש©®¹àjT„Ÿ]!?/¶ªª(–TŠó£0ç|6›Ååtuá´;±°°Ûó“ÎLNNb&¦i‘Igp¹]dÒù‰1 ÓÄ0 œét·ËE:“AÓ44U%“ÎârëdÒÙÏmyÓ0°Û䌚ª‘L&Ï÷îB| §Þn<“s«Tê÷ÅÅâä|õ’üpºùŸ1}µ,Ë÷;Ÿk6,‡Ó1ëÿ.·ës_^A!›Ë’ÎdPµÏ~ !Äg#•J219iZgl±c»ƒ`0ˆz–·$øÅEAáB[¢p¦­ª*Út€êš~Q4òshlº EU6~B\|EáDû 4MÅnwÿ:Ræ\nhh°¨¨ñ;T‚_\p.Ô+~‹ü—6ÝŽ¦šhšö§¯øs`š&±(eÁ€ Í-ÄE*N³xÉbR©9Ã@-Vý+Å@ @*>ëh¼g þÂDa>íO2¤oaö0!> Ó2óóNΠªj~ÒEEU?ÿá¥g^ñF–\.‡Ûå*ž À'k“p¶×œëAµ4U£¼,xÑœ¨!N§(ù9“©$ÙLEUPuÖì›n·;¿ìG¬KŸ{ ±XŒ·Þ}îž¼7^wuuµùedYÉt»Í&_4%®piæÕ»ªªðc±®® sHd26nÞÌÁÃG°é:W^~9‹-üXeH§Óhš†ÍfûÈé*g¶?uÙB+Š‚ËéÂé°Š'ÄÂår1¯¹éc…µª*k;A6›eѧmçD{étú´ç>¶Sμ-Ë"›Éa÷ØåŠ_ˆ‹š‚M·¡j¹lŽ\.‡ªª8.tMC×>^WÝ9ïþ«ŠÂæ­ÛØð ×^uóš›Ñtí´~ _è¦i’Éd°,‹D"ÁcOüžÎ®®|1Ã0fõ˶,‹l6K2•²,R©Ù\N¾”¾`Ú;:ÙwàÀ¬I ö8@WOÏYÿÖ–iÍ:ÖŽ;Æko¾ÅÚÕ—²léÒâ±hF±-@áߦi’N§ÉåòŠ?¾ð";ví.>o˜&ÉTjÖòÙl–©xÃ0H¥Ó$“ÉYí Ší ¬é+~ÓÈ·¦×54]£«§—á‘‘âïš®åÒ) jjñ1È9U¥`¾þt›^\NÕT2Ù }ýýôôõ¡ëúiëQTeÖ6 ÿVTUSQT…\. §”gúy¹É/ÄEKQ¼^VWÑC‡‰OʼnŒÛ¾¯¥àöx>Özô3¬›ÍF&Ö¯]ƒÛífÓ–­ôõ÷sÏ]w²ÿÀAN´·³vÍj^}ý b±Ë—-,Þ|ç::;ùÒwÒØPÏ‹¯¼Êää$ ´rÝÕWó‡^ ¿€L6‹ßï'—ÍbÞ÷"áðÕ¨K|:ù+áƒ<ñÔÓ<ü‡¸âòËØ¸y3?äW|ók_¥¾®îŒ¯5-sV×RMÓ0rét†Ë—ðû9ÖÖÆ¦-[¸ÿÞ{ãý>à†ë®ã÷ß§`€Æ†zšyíÍ7ñx<ŒsÙúõ¼öæ›ôõõSUáŽÛneÛÎìÞ³, ‡Ó‰M׉ÅbÜ}ç´¶´Ì® ßoßfÏ7–Ó4 UQÐ5-ߥNÓÀ‚h,ƶí;‰F£Ö¯[C4š,gäX¹b9º¦ah]]=>r”K/]Éþýc``…­-$ ¶N¯' ²háöìý+.ß@,ã½÷7r÷]w044LgW7·›öÎNì7\w->¯˲ðz¼Å“!ÄÅIQUÆŽbòÝhlj"Z§áHÇ0ú8þÔÓ,ûÁ÷ù8×Ïs^ñ†Á†õë¸òòËyᥗù»Ÿþ#¢ª²’÷ígppˆ»wãv»éììâà¡Ã¬]½š–ùóX´`!MÜ|Ó,^´7ß~‡¡áa.XÀo½MOo/½}ýÌŸ? ëÖqüÄ î¼ý6‰:kqq¹úª+Ysé*~ö‹GøÇŸýœŸýüÖ\ºŠË6¬?ëëLÓ,þär9š¹çî;Ùºm;÷¿~Ê7Q ÒÕÝCÛñì?p€L6ËÄä$[¶mcak+K/¡¡¾ž–ùó¹|ýz6¬_Çî½{Ùûá‡,]²˜Ý{?dï¾ý ãq{¸í–›ik;Άõ먨(g˶íÅÂeY(…1/]ÓÑ4½8®é¨ªÊ®]{ÈårÜtÃõ¤’)¶mßÉÖm;hjlà®ÛoË× iíílÞ²KV,gxh˜ñ‰ ¾tç¬\±…»öËÜtÃõ$I޵'›ÍÒÑÑIGgÇOtÐÓÓËÑcmø¼^≷›Ûn¹‰‰ñI†††°ÙòeŠMMÉgKˆ‹œiŒÆbT/]ÂØûï1ÚÞÁÀ–m8Siõ ¡(ý9?ãN‡ƒ›n¸ž¿üg?!TQÁ /½LUe„p8Ä»|ÀÐÐ0Ë—-eÅòeÜxÃõ¼·q#›¶lÁårâv¹¨ Gp»Ý 3›b`p…­­8Nt]'SY¡†aä¿H ÷rM Ó,ôÛ–/¦/ ˲ðz½|÷Ûß䦮£®¶Çó‘·rLË,6NS…#ÇŽñú›o ‡fþ¼yØí6V,]Êÿû ÓØØÀàÐ0ñxœÚšj¶ïØE"‘¤¬¬Œí;wR^^Ƽæf9Je$RUä»ÅX¦a`&†aNÌ7ûÄcfã>§Ó…Ãn¢©Z~h\Óäðá#Ó£äÙilhàðá£$I:ººØ°v-]ݼ÷þF.h¥¾>›cÕÊKðx<¼þæ[,Y¼˜›6óÞ›8ÑÞA(TÁÒŋٵgo~=]\¶a5ÕÕ¼öú[Ô×ײ~íþþ§ÿDsS•‘p±-Ba¸^EUÐ4 ˜œˆâøäã%ÄELQôT[WÎŽ.:öí#ÕßO™ÇM®« ×¼’Ó·èÏF»ïþûþ¦¦¦¦x•Qo œ?{¸tÕJ®¼ì2TUÃãq³}ÇNn¸öšˆÇãtvuãr9¹ñúë©®ª¢¶¦Ã0ˆDÂ,]¼‡ÃÎÐ𷛚šjÊÊ‚ÔÕÖ ø …BÔTWá÷ù¨«­¹ Æhç†Ýn'Ÿµe½¢($SIÆÆÇˆ„"ÀÉîl…Æ{†iÒ2>×]s5N‡—ËÅþƒYÐÒÂ%Ë—“Τééí#›ÍrÍÕWR_WGMUu~‚ŸÖ–ù„C £iUU•”TUVQ RV¤¦ª ¯×7ý\°¦Š¢›Š‘ÍfòCæº](Š‚ÇëÁãñ`·Ûq:,_¶”ªªJ ÃdåŠå´´Ì£¡¡UÕH¥ÒT„*¨Œ„©©®fÙÒÅ躆ú:êë™šš¢®¶–­-,hm¡¼¼Ã̯gþüyØívjkjX´h!áPµÕ5,Y¼¿ß‡Ç㡪ª’€ßG0 ªª—Û…ªæûûÚl:º¦Î÷!!„øEa`°ŸHUVO7Ù§Ÿ£¶e>SU•ü~Êödb÷o½±è$ªªâ÷ûçì422‚òø[kÖ¬¡¼¬|ÖB…ñûá䯪ª9zŒgþðþì‡?Àïó»4–+L¢©j~¬pÓœ®U`ºUµªªÅ+©|¿h#erÜ">Š¢06>FÛ‰6–,\rÚsÅ®¡–EÎ0P…ѱ1~õèo¹ïË÷ÐP_€¦ªÅžlÆôr…cË0 4UE™>® ÏÅã´pœ+PU•Á¡Aâ‰xq–>›Í†ùÆ}…Ï »ØŽíÂzt]/ör)0M]×§·« ªZ±l…2ºž™Ÿ]Ó0- Ã4Ц_[xišÅÚ“d2‰ÍžoØP× h…¸ÈìÞ³‹eË–¡Xƒ/¾L*™D¹l=LM¡½¿‰š;î rå*ö~¸UѨ¯o8-OEáðáÃg®êŸYÍ9SÿÀK—,Á?}e>×2§¾væÝ©¿þ}ê2¢tÍuLz|¨ªÊðð5ÕÕDÂá³G§íGm÷LËXä«ÑMË"—Ëár¹Šjœ:VÁôzfž´Ì¬=((„ø©'3_wêzf>oMÿ{æ´Ú…åTUE%_íŸJgp:ÒeVˆ‹P6›%“É066†ËåÂ{ý X“$Ò)t·ïý÷‘õzéíí!árºÎzrÿ‰†ì5M“uk× ËÀ<â34óÿ—1Mêil¨GÓôÏ¥¦¨жéFrº¦ç?\s UYxìlÏ}NË›–I8T!5jB\¤TU¥ª²ŠÎŽŽâàgÅÙú,‹á‘‘bÐ;jªkÏ]ðC¾µ¿Ÿ%ËüxÕÐ'¯¤?ŸÐ‡ü‡ÍívO$˜ŠÇq9LÅãx<Ò©ª¦¡kÉT ¯ÇÃÔT§Ói˜ä ã¼,oYét¿Ï—?©B\T4M£¡¡‘úú†µüGÕìƒ_A¹(f_L…nf6›l6‹®_XóGår¹|?}EÅÂÊÏwoè6§Ó‰Í¦cYÔé–ô&ÖôsŽ|[ÝB;oËëx—×uàôì]BˆÒ¥{=^¢±è÷E+Ja„+”—•_pUÒ '϶½ïÅw’¬L_1ðùÏl(„¸°èå,hY _â¼+Ün²,ë‚anægä¢lo!·ó„ÈàÝâ‚!¡$„Ÿ½YÁ?×´»ŸÅWqa¬ó?¥kQqªÔ³”ÿL}Üõ×q–ç„Bˆ‹‰öðÃÿM("‹ñÿþÿI$¢²²’Þ¾>ùõo¨(¯  §·*,ü~róÂ}Ä3=ŸŸ+ü­wÞå7¿ûo½ó.G£²2BY0X\f¦¹Z2*ŠÂëo¾Å¦-[Y¼p!º®ÅøÏÿõ¿qàÀA–/[†Ãnçýù‡üÁ@€úÚÚâ`'§¾‡\.ÇïŸ~šžÞ>´¶Ìznr2ÊÏù%^—ªÊÊ9ËøY:u~¦Ûš±Í‹Õ絯.Tg{良_„'‡ìU ¿d³Yö8ÈädUQH&“:r„h,F*•"‹111I</®$36>N|ºuq2™bl|>Q|ùñáóe>z¬Þ¾>bSS¤Ói à ‹‘H&9|ô“¨ªB"‘`bb‚\.÷™‘†ÁØø8##£Œ÷Ëg!›Í’H&1-‹©xü¢I1‹1>1ñ™•¿0ï§aÆgº_MÓdj*>gMZ6—#Ÿ“š+kzäÂs±®™ûÓ²,R©Ô¬Q…çÞ¬~ü…1õ-€â¡Ï¿ø›¶nEAÁápð£ï¯¬ñD‚¥‹—pÕ—óìÿÈàà••î¿÷˼øÊ«ôöõ‘N¥©«­å_{'Ÿ~†þ\.'ªª’J¥å™çþ@:!‹±úÒU|åË÷ðü‹/±c×.ÊËÊùÆW  òÛÇžàø‰ Œ°hÁ ש »ƒÊ毼ö'ÚÛ‰ÇãÔ××åÇãÑǧíD;^›ï»ŸÏËo‚¡áaúû…BüôŸ~ÆÒ¥KX±lÿÓäÎÛnC×5TU££³‹_ÿöwŒŒŽ²ê’K¸ïË÷àv»?“ÛšªÒvâ÷¿~J¸"„¦i”•—q×í·Q[SS¼²-Ü2™Y30shØ™s"̼qj€íص›C‡s÷wðècqÏÝwQW{rô§üœ `Yœ¶½S·1ó÷™e<õ÷™Ë§½=e™B9϶ÞÂcÇÚŽóôsÏQ]YÉí·ÝJ$žµ/NÛ'¸›ëöÓ\ûtrr’‘Ñ1ZæÏ;møÝ¹Ö3³¬ÛwîBQ`Ýš53–51Më´mÞsí§˲ÐT•¾áažxêi¾ùÕ¯RQQ^\—¢(|¸?[¶nãáï<„ÝfØ޷…×Ï<>ŠóoXÖ飄CCClÞ¶®½¯× XÅãbfYáô[m3ÿž§îÏT*ÅãO>Å ×]GsS#†aË?ó8õØ›yŒ2ý`Î|/Ó¿¨Óßo3‡F>uÝŸô8οF™sÈh‰âBtú()…ÕŒ‡¢Ñš¦ñõà‘ßü†·Þy—¶ã'¨©©á–oÀ²àÅ—_!“ÉðÇ¿ËãO>ÅsÏ¿Àäd”ªÊJÖ­YÃ/ó(Ý=½\{ÍÕ1ÁàôqRUY9c~…ššjÚ;:سw/ÌŸ7ŠŠòÓŽD"Q<ö*++ †A_ÿÉd˲¨¯ËŸð÷ ’ÉdxLkË|ÚŽŸ ›Íâóz±€ò²2/^”ÿ2žœ$™LUPWWG:•"™J˜þ b±)ª*+Y²h>Ÿ—T:EUe%v»ÖÖR©Tq`M×hl¨§¢¼œ7Þz›ááá|õs"AkK õõLLLàñxhh¨' 2Ÿü–eQUUÅ7¿þ5úúXuÉ 6mÞ ÓÕ×.—‹ÚÚ¡ûD·éTUVR__‡×ã)Ψ›š"O¯ÄLÓ,ÞÖÈMW×®]³§Ó‰ù1‡—ýTpØí”—•áóù¸å¦ùïÿìùðC6mÙŠ×ãe2:É׸Ÿ-[·±s÷nèîíå¯ÜË˯¾ÆWîù~¿ŸG{œ‡¾ù \®üT²=½½lÞ²Éè$Á`ùÍÍùYëò'…"( ƒCCüýOÿ‘†úzFÇÆ¸òòËp¹\<ñÔÓ,lmeÉâÅìÞ»»ÝN,ãš+¯ÄçóòüK/SQ^΂ÖV Ãà©gžÅçó3ä«÷ßDZ¶6>Ø´™†úz²™ v‡ƒ'Ÿ~†úúzšq9üî÷¿GU&£Qn½éFt]ç÷ÓË454 ‡Q…x"A_ñx‚žž^^ó-’© [Z8rôÂívawÞ~?ÿ審Œ„jª«äÏ~ø*+óÓ>ÁèØ6]'N155Å˯¾–o£rÛÍ7£©ccù[Zï¾ÿ7]=]ÝÝ (Ü}Çí<ñÔS\yùå$’I¶nÛNYYýòãï?̃‡èš.[o_÷å^6oÝÆÔTœWßxƒ%‹q¢££Xöü‹/ª¨àÀÁCÜ}çí\{õÕX–EÿÀ?ù‡ƒ©XŒµkVs¼½}zîà–o •NsèÈ޶µ±}çN¾þà<öäS'›o"•LñØ“OÒÚÒÂ×]KY @"™ä?ò¿ŸD"Á¼æfÖ¬¾”¿ÿé?ÑÔØÀ²¥K8ÑÞI*•$ΰ`A —^²’'ž~·ËEmm->Ÿ§Ÿ}®¸ßN=Þš1<òëߪ¨ ª²’²²2^xéeFFFHg2\²|Ë–.åç¿üUq™p(„Ëé”>+â‚¡B¾úÖëõpëÍ7ñÖ»ïòý¯xô±ÇY»z5 *DÍ骷Šòr®»öÞyï}þ?ÿîßóÄSOsåå—ÑÙÕÅ¿ûÿþGz{{¹õæѦ'11McÖà!…05‹Õ…j;+¶(,]²¤ø¥Çñú¼\}啘†Áþ/ÿ/;wíΟEêd㥠ëÖqÏ]wâv»AÉW»]qÙTUá?ü§ÿÌû7rï—¿Ä]wÝE[g'ÿÏÿü;Nt÷à X¶bïnÙÂ#¿ûYËÂð(/ãõ·Þ¢¾®·ËÉØø8æô•Ù'¹ç^xÏ3,ËDUÎÞðÊ¢P«¡»÷|HwwN‡ƒ®înÚŽŸÀ–-]Ê·¿ù ¼ÙL–æ¦FvíÙËá#G)/+#TQQ¬b­©®bá‚VÊ‚AŽ=F4C-4„YáoN§‹û¿r/_¾ûn6oÝÆøÄõµu|û_grr—Óɾû®¹êJÞxûÞ|ûV­¼„ï÷;\uÅåìÛ€®SÊœ¯R…H$œ¿º²òï3à÷Ó2'Ú;Øà‡ƒ±ñqö|¸¯X}ðû™?¯¹ø{Ey9K/fÍêK¹ýÖ[°é:W]~9·Þr3»÷îåºk¯æ‡EQرkN§ƒ;n» ë× UðÕûïÃÂbtltº9ßî¡2æ»}›ukÖ°s×.V­\Á’E‹øÆW$ b³Ù¸ó¶[¹í–›Y±|9u55˜¦ÅŽ]»Ù²m·Ýz ß}è[¬X¶Œ\.G6—C®¼ü2¾öà$SIŽ;Æá#Gøúƒpçí·çgý›þlLÅãlܼ™ë¯½fFùwãp8¸ëöÛX¹b|ýÁøò—î& r¬í8û,î·½ûöaa1þ<¾õõ¯qÍ•W²qófÉdq;¦eÅòe¾åf¸ï+„C!úúû9tJÙ Ã ›Ébõµu|óë_cAK ÇO´³qÓf.Y±œ‡¾ù š››0Œ“ÕÜ;víÆírñƒï~‡«¯º’m;v²|éR–,>¹?=n7wÝ~;÷Üu£ccìÛ`ö{ùp¦eQWSÃCßø:-óçç«õ§«Óo½ùf¾÷ÐC9vŒžÞ^?_}à~ÃÃÃ|û›ßàþ{¿ÌŽ]»yõ7¨(/çßû.wÞv+½½}ìûˆãMþÝét²`A+ãlݶ]×I§3lß¹«x‹ÂétÒÚÚ‚ÍfC™qûCˆó­XÕ¯iwÝ~;+W¬`2ÅírÓØPÃáàÖ›o&›Íàp8øÆWÄåtQQQÎâ… ‰Åb”——S[SMsS££c„Ã!"á0‘p·Û…ßïçÏ~ð}B¡6›ÿë_ÿ+ü¾|•áŸÿäÇTTT0^‘H›®ó“ÿºÚZ.h¥íø #GËüùTUVò/ÿÅ_288„®k¸Ýnì6¦iâóùø7ÿÇ¿¤®¶6?OQüø‡? ¼¼œP(Ä_ýõ_Ñ?0€ßá ÑéD¡ñ² LLL 55Rðã÷û¹ôòËòûdÉbj'&©¿ñFü~ꛚ¸ìŠËéëïÇçóScªj¾;ƒiæÏ æÍe"NÍz\r&Ä 'u•„ÎÓ_›Í255E&æ÷ß§2RI$’ÿBnjjdþüfZç·ðö{ïaÓutMËÝnY¬^µŠß>þGµqËM7ï횦Å[ï¾Go_M ùË"•N“N§É9‰ÆôýLUUòãçOŸH)(Øl:‡‡ÓA:“!™L‘L&±Ûm¨ªJ<ž ›ÍkRü~_±Ìó›çáv»ƒ¼òêkô÷ðà}_á_}wÞ{ŸÇžx’k¯¹ ·+_ݼ µ…ªÊ*ª«*ùúƒòîûïóØïŸä¯þüŸãtžÜo…ž%(ùö(N‡›n#‘L’L&ÉærØíöüT¶º†Ý¦c³Ùò“ßèúií5TU-V¹kš†®ÛÈd3$‰é^"*N§“©©8Ï<÷/ZH¨¢<’lZÄãqr¹\þ$òLj¢`Óm躞ߧd2Y&'£hš:=ã_þ»ªªhš~Jùm(Š‚ÓáÄn·k¤ #ÿ7s»]ÅýV[SÃÈÈ(¹lŽt:M<GÓ44U#“L&I¥Òù3MÆ'Æ©®ªÂ4óÛ?­läÇ\°°Ðõü¤Av»¦Oê'ÆóyMcv{ »Ívò8IäoÙí62™ ñD›®OO7¬¢ëzñÄþÔ÷ÒÛ×n³áp8ŠÓ¶¡ëŠZh ¢iN‡§Ã‰a$IâÉššßF"‘ “É`›>&Îv¼ýî‰ßóÏ~ôC¾õõ¯±}ÇN~ýèïxðþ¯àp:¨ªªbÅòåøý>B|óë_cÇô2õçÿ UÓp9ø|>é,λY÷øm6-óç£h–¦å¥XµMù2¦É¼ ŠW ­KçHM7`©on¦aÞ¼üx.Çüùóò „L“… ¹,_¶ Ã0P€Å‹aš&‘p¸øüâ… 1MÛMe$_íj™&¦eQUYIuUUþ1Ë„é/Rå‹cÅãXÃÃ(¦‰CQXâõB[êóÏÓÔÑÁ¼tâq”#GÐ&‹ª.«Á²¨šy?β¨Z¸ã²Ë0l6j…UÓ­Â ‹¬êjRßúVEÅiá¯( ÃCC8ìvæÏ›ª©`MMŸ5øÃÆãl:p»]Üpýµ¼ýî{ìØ¹‹ò²2Ö®^͉öŽü»6;.—Û3k}Š¢pèð~ö‹Gˆ'Ü}Ç”•yû]…'žzšÛn¾¯×ƒ¦jhš†Ãé ½£ƒØÔ , ¦ºŠ×ßx‹]»÷pÅå—åo n—+²1=Ó_MM «W­äñ'ŸÄn·ÆŠl=n77ž¡üŠª GX¹b=ñ$n· ,‹… Zéêî.î·ò²rìv;cãüü—¿"‹qÏÝwa&¿æùÍ£ŒS rÍÕWñÊk¯³}ç.úúú¨®ªbõ¥«f•M×u<»—Ë=½ïóáºúÒUüî‰ßóO?ÿGŽcÅò¥ÅÏêÚÕ—ÒÙuò8¹å¦©(¯à½6òû§žæ®;nÇëñäOJ4·ÛMkKˬc ÿ^l¸§·;3ô£Ñ(O>ó6]gÅòå4Ô×åký€Ö–ù´¶´ðÛ'žÀ²,®¿öZç·ðÛÇçþégÌonæê«®dé’3oÕUU óæÛïH$‡C4Ô×sùúõ:r„ÁÁAV,[FßÀ¯¾þ:‰D’H$ŒÝîàÉgžaé’%\}åmñÅ¡lÚ´ÉZ´hÑɳPEA;~}ÇÈå>ÕJ-‡³© cþ|,¿ÿ [V@×óÿÿD+·N^]g³¨ƒƒ¨ÝÝh]]hG¢<ˆÚÖ†’H¯Ä•t’I”L&ÿ:]Ǭ­ÅX°3:k”tm×.´öö3Éí&öì³ä6l8mŸ)ŠÂ‘£‡imiÅãñù«çLÖ७]|Øc*v#É_ܽód𺆪©øý~Ü.Öt›…±Ñ1ì;ååʼnX\.±©)œ‡ƒßüî1Eá›_ûê¬+l6KÿÀš¦áõxp¹ÝŒŒŒàt:§¯ÖãTVVb×uNttð¿ù÷~énjjª‰„Ãd³92™4^¯UUI&“LF£¸œNüÓóñ‰ &'' ‚ƒâñ8£3ÊœšnÔi·Û¨ŒDÈCCCXTVFp»\¤R)†GFPP¨¨(Ç‚Y˸f\íº}ºÝnb±v»Çt’ÉÉIÒ™ »ÝF4ÃãöËeÉårx<¢±X1”5Måý›yçÝ÷øò—î"‰P1=IÏd4J6“ox™H&ñ¸ÝØl6&&'Ãçõâñ¸q:ŒŒŽ’L$ …*Šanv»›ÍF,›n#£c=vŒ7ß~›õWÿ¯ÇS|os—ßͦ“ÍæƲ,Ü.7€Ÿl6;k¿©ªÆd4ß6ÇãñÛ ’ÉäÛòø|^l6cããôõõóø“Oò£ï?L]m-Ã#£Å²ýÕŸÿsEÁf³“Ëåðú¼$ Ün““QFÇFùÝ¿çÆë¯ãŠË.ËŸèOw>õ8)ìÏàtƒA·ÛÄ ü>™LfÖ{QT•L:ìªÏcSSü—ÿö?¸ö꫘?¯™ªÊ*T5«Äçõ¢i™L†‰ÉÉ|™`0+ejŠ‘Ñ1<7¡ŠŠÓ¶5óx«ªŒ iCÃäÓi¡0>Ÿ—\.ÇðÈÙl–ò²rûÉeÂa|^/“8v\.×§úNâ\P…ÇÏѪ_U±?û,®¿ýÛ|À~š† aÖÖbMŸqÏÚ¸eaÖÕ‘¾ï>¬`ðŒUäs|bíÄ ÔãÇÑŽGíïGD™˜À²Ù°Ê˱ÊË1ü l6ÌšŒ%K0-Âòû±t«¢³¦&br¶“l­­ upp®½ˆ¶w/úþý˜••gÜ_F.GßHŒ·ßé¦ÜkçšKªØzhˆ»§H›#Ý|õŠ*<.Û¬p¶Ùlņf…ç}^/¾éÀ°,+_ÕÊÉ{䋞Þ^¾|÷]Å{•3×o¿qr½µ55ÅßË‚Á|mFaý6óçÍ£¼,ˆaš8vœNG±Í€Ëå*~©¶S^VFEYYq^¯·r…2|¾YÛhjlœU&§ÓYl]ßӖ)ðL¥eYøýþYϧˆ*< °, ›®Áô¾)<6ýÇŲLÜ7 Z[±éz±Æ$8}lY–EÐn/îƒ` P|®ð|¡ÆêT…í§÷óC‡äȱc´Ì›‡ç”Ï͙ʟ?ÕgýíæÚo‘pxÖ2Š¢Ìz@{G''ÚÛéëë#SQQÁá#Gé(–Íï÷ŸÖÐëñ ( CCÃì?x€ñ‰ TE¡±¾áäí3'³ö猿Aáßs½§Ã1ëï›ïº§ÐØPOSccñªúä~²°ÙlÅ}Püù|Å^÷x««­-vµ, ]ש©®>ë2eeÁÓŽW!ΗӃß4ÉÜy'VYd³ŸüŠPÆÆÐ÷ìA;p å}ªT }ãFìO<ñÉׯª iXºf]ÙnÀX¸cÞ<ÌæfŒ††“'ŠR| švr{…šƒ:¹QUŒÅ‹1–,™óéìUWå¯ò5íŒë²,ƒÃ£ìîŒÓXéçð‹‡QmvR†Êäøw_ Òwr’šÙ¯µÎ°Î3/WøR7L“ËÖ¯£±¡aÎõœm3U”Wpë-7át:Šá7×6çZ¿u–õŸö|áïr¶×̱ÌÇ)Ï™~Ÿ¹¾S‡«ž×ÜŒg:Ð>Îûþ8ûøLÏÛív’É$K/âÒU«Š}É?éûù¤e9µ}áž{$á–›nÌ×*Ømg-ÛÌõè6}ú$ÎÎ׿ú ÕÕU³ú±Tæú÷Çy/N‡“[o¾™òòò³nïÿžð´eN-ÑGÛøârzU?`)`©ùÁ|UýDWäd³(Ñ(ÊÔT~Bð™á®(èû÷c{õUÈd>ai,¿³¡sÞKªªÎ\æ|ÅÌfôqË6k$¾év9Ÿmº]’„¬s›³ª?“É06>F:Â4MtMÇëõ?ñV ¯ÆŸC¦¾žÌí·êÂ[–E4%$—J ¤“Ø¢eÅÆ<’\Î tóÍëøÍ[ì9šÂ­eyàòJV-¨dpp ØµñÜ~i›îC–e•\èÞ÷ç"¦ir!Œï6×ßú“”í|+¥xŒ ñiƒ?‘LÐßßGEEÅô¨a:‰d‚~âñ855µs†a˜_, £pÆ}–«nEQP§ÇâŸùØÇ½º$‘LP[SKÀïÇÂbdtŒþ>Báâ}ÓS·©MwËNGà£«âæºêý¸eV5•d*Icu%ß¹Qeûá!æÕDX6/ßX(‘LÈÈ^B!>:äÏ”ûúz‰D"TWûXø}~Ü.7Gatl”H8rÚ=¸m;v04< (x=V¯Z‰Çí>ë(Uñx‚£mÇX¼pa±öàÐccã,\ÐzÖ.bS1&£“,Z¸ˆdNåƒýƒ8ì+æUà°Û9Ñ~—Û…Ýf/¾FQ&&'Ù±s¹é~ÜÍM456‹MOÄ‹#À}e®«©ãDûqÚ;N`Z&›ÉÔè [FO * ª¢± u‘TQ !„øÌ©ùÑÁ¦Š£ŸFvú'‡adQÕ|·©±±Q óô*Àç_z‰ƒ‡3‹155•ôcF-@aÜÿÂ111Á3Ïý‘Éh4%®ªkkãÍ·ßÉw]›¾’.ü¿ ?¥à0¡Š ‹_¾rˆ·÷óÇ­½<õn§ —ËÉøØØ¬×©ªJ__O?÷ƒCCtvuñ«G˦-[éègÏÞOÞËœaë\•Ù²,"‘J¶.&TQI¨,B(TM¨¼ŠPY˜H¨ŠE‹–˜Õ¢\!„øl芢N¥ò#^Rý^àrºH§SX¦'kËóÝ_¦íX¹|9š®“ÉfxâɧH¥Sd2Yn¼þz|^//¿ö±©)–.^LScÃ##üöñ'ˆ„ÃÜxÝu'WQ8ÞÞÁÆM›±Ùm\{õUÅI` ?pmMN±°¹’TÆ`׉an\U…Ó霞'`öýr ¨«­å¾/߃ÇãáƒM›yýÍ7¹ëöÛq8  M?>ņuk ‡Âç¬ÌåååTTTÌùGø<ï% !„(m*ä¯ls¹†aËåfý†A6›³una@Žç_|‰ÿõ³ÿÍK¯¼ÊÄÄ·l¡¾®Žl6Ëo½…¦iÔ×ÕQWS˯¼BOo/^›õk×b·Ûyö̪*LMÅyêÙg±ÙmŒóÂK/Ÿ2UªJ6›Ã®ƒK·H¤s¤39üNP”ü<áª2÷ýò™S°.Z¸€t:Íá£Gùpß~Þzç] X}¯ª*ccãhš†ÛåBUUV¯ZE¨¢‚m;wÆHg2ç¬ÌB!Ä…B·, ·ÛMÀäðáC´¶.Àçõ¡(*¹\–¾^z{{Y¼hééÝÍ…L&C_?~¿/?š`˜¦e«°?Ü·ŸŽÎNn¼þ:Ú;;1M‹h4ÆÑé´‚Á eÁ {öîcb2JUU% [ÐÜÔˆ×ë9Ù/زˆ„+Ùp½½]\±´†õ‹*QÔüh€ÇÚŽ¡ëv9‚ß²c÷ž½Xä§:]uÉ%TT”s¢½US¹âòËxóíwxoãF¶¶ž“2 !„íá‡þ›P(„Ïç'™LÒÙÙIß@/]Ýù«Ú‰IæÏo%0c(Ò™òÝèèëëcr2J}}6]§µe>†aât8X¶d ý Q_WÇ È9zûúH¥ÓÜqÛ­ÔÖÖÒÙÝÇífíêÕ:r˜®în‚ 55'‡ÃÔ4` H__?ƒ 122ÌÐàv›“–ù-§ÕL(ŠB6—£¯€Á¡!ÆÇ'X¾l)7\{-¦™r3›Í²mû×_s M ô÷Ÿ›2 !„ç[¾üÈì‘ûbS1Æ'ÆÉår¸\.*Ê+°OG~¦Í¥0llA¡Ñ`aêÓBCBeF+øB¿úBÍ‚eš¨3¦Ýœ¹MÃ0˜˜˜`*>…ª(øýâ¤g2s¨Ñ¤3G,LŸZ¸Z?—eB!Χ9Gî³°ðù|³ô£Ÿ}ÜçfZxîÔÁsNû}Ž1Á Ï«ªJEE¡P¨øØG…íœcxÏxM¡¦ ðÜŸ\æ™ó!„€Ó&鹘º–]Ðeµ,Ô‘Èf1ËÊÀnÏO¤('¦—ûÔ³ !„Ÿþ§¯BÌIUQ»»qý§ÿ„‹a˜ÕÕ˜µµ˜••ùG"X‘f8ü©fAB!>) þÏŠe‘[±‚ì5×àúÿ%™Ì?>=M°åó‘½ñFRögùàB!>Òç쳤ë¤zˆôw¿ úô9ÖtÕ~ö¦›HüÛKnõêü-!„âs0+q ­Ó•sXíüIÖõi·;³Üç²ìJ™°,,¯—ä_þ%™;ïWPè3¯ª*›·låñß?ÅÚÕ—ât:‹]ç }ï 3â:z išüÿþÛÿà‘_ýš×Þ|‹­Ûw`M hÓ³jÚÉ×Ö©žRÞ¹ÊT(ÿ (//Ï??ýž­éýPØÆY{XV(„1o¶;ÉÜ?©ñ/0++ÑŽËŸ¼õj"Y[‹ ækä@!Ä9rZðÇãqž~öÜuÇíÜ|ÃõlÙ¶ññ Ö\z)=½½ŒŽŽâr¹ÈårlÙ¶cmÇF×uFFG#6#•LÑ?0€iY8TE¥eþ< ೫›Ñ±1ÓCûv÷ô084„¢ªØtn—‹P¨‚ÁÁAÜn7©tš¾¾>Ü.©tšŽÎ.Ò™4gÖ:Ïýñy.\À×x˲xþÅ—¨ª¬¤©±‘ñ‰ ºººI¥Rx<FÇÆaxd„d2E,c`h›-_»ÑÑÕÅÐÐ0Š¢`·ÛQ•ææ&Æ'&gphÃ4q»ÝLLNÒÕÕE4ÅívŸ6bà,–…YW‡‰[¿žÜš5䮽ËëEß¿û+¯ oܦ‰USƒåóïãD!ÄD!øgÔå+ À‘£G%ÎPWSÃÛï¾Çó/½„eZ¬]³š¯¿ŽG÷9ੱ‘†ú:Þyï=‚ ““”ƒÄ¦¦¨¯«åænà•×ß eþ<Þ߸‰M[¶â÷ùøê÷36>ÆÓÏ<‡Ëíâ¦ë¯Çï÷óæÛoSVä‘_ÿ†~ï{ óú[oñ?ù O?û,m'Nàp8øúƒ°zÕªå@C}=ë×­eÅòettv±}ÇNæ57ñO?ÿ““X¦Å—ï¾‹Ž®n>Ø´ ·ÛE"‘$ð311Éúµk¸úª+yô±Ç™œœ$ qíUWñêo0o^3Ïþáôôö¢ àõzùÞCßâ©gŸ£½£“ò²2~ò£ÐÜÔtÚ¬|§ìu2·ÞŠ29 Ó£óç“ü7ÿ†ÌÝwãxôQO?ç_ÿk²Ï=Gú»ß%{à X~¿ôõBqN̾qmÁäd”\6ËWï¿ ë×ñò«¯¡ë:‘H„W_ƒááìv;Üw/ÿê_ü‘p§ÓÉ?ÿÉ)/+£eþ<~øðw¤³»›l6CÎ0H§Ó”ƒ¬[³†šª*’‰$.—‹U—\‚ÖV²Ù,ÉTŠæ¦&"á[¶ogçîÝ\²|9]ÝÝlÞ¶¦†F&''yëwOXëäÈzš¦¢j*lÜD"‘äßü«ÉúukùË/199A]m ùÏ~B6›åºk®æ¾{ïáÀ¡C9ƒ•Ë—S]YÅÁC‡h;~‚l&‹ešd³Y.Y±‚?ÿɉÆb9ÖF6›¥ºªŠËÖ¯#à÷¼Á„tkz´A 誊±b‰ÿï™zä2_úúž=xþüÏñüä'ØÞz 2™üýéï/„âO0«õž¢(|íû¹ü² ˜¦ÉèØ(`™¡Š n¼þºb5½ÛåÆï÷£i6ÝF¨¼¯Ï‹Çã!£iz>4-ÐT•uk×ðûyçý÷H¦R¬]})¦i²iËV‡†X²hN‡ƒk®º’_üêרí6î¿÷Ë Œ¢**†iréÊ•´ÌŸÚ\ƒÃCì?p=~HGg'?|ø{ôõõ“Ëe‰Åb$ ö|ÃA§ÓI¨¢·ÛßçÇíraš&ï¼÷ûä’ËqØdsY,ò÷ó¼7áP§Ó–Åu×\Ñ£Gyîùðz½ÜtÃõo¯Ïu‚`šàp½újr—^Ší½÷püüçØÞ|ÛæÍdô·¿MnÅŠü(€R „âS(¿¢*øý>4MÃ4 Ó$pû-·ðÂK/s¢½úú:Ün>¯'?qib·Ûðz=€‚ÇåÆép (*>¯‡ÓÏç%glÙºýàr¹˜?¯™ƒ‡ñÎ{ï£j‹.ÄëõâõxAQX¶t ååeTWUQ__Oe$†ukiïèdÌá µ¥]×óWýŠ‚ßçãÝ÷ÞgÇÎ]„**xð¾ûXs饌7Op¢½¿ûé?ârº¸ÿ+÷rèð¬±Q@Áëõ`³éhº†Ïë%‰ :Lo_n· ·Ë…ÏëE×tÜn7»¯ÇK:“á÷Þ£¯¿ŸªÊJêëêþô¿†eåzâì|†a0:6†ßçÃáp0M“á‘&£Q‚åeeLF£x<\N'‰d’d"A0$¡ë:N§ƒh4ŠÝá Jã÷ûH§ÓÄ ì6;€Ÿt:M,6…ª©r¹‰éõ(ŠÂÄÄš®ãŸnà–L¥Â0 *+#x=žbÇÆÇI§Óhš†Óé,¾FQÉ$±h ‡Óßçg*>…iø|>ÆÇ'ðxÜ(ŠJ<>…Çãetl4?°ÓÓá$“Íà÷ùˆ'躎Ûåbbr§ÃA6›%•Jãr¹ðù¼ç| Bµ¾Úׇýé§qüö·hÇc47“þæ7ÉÜ{/f}}áu¾%!„°Âì|³§å=C·´YÓΞ²ÜÌÙéæú÷'ýýŒ³ÞÍœçÔÉyf–oækf®çŒe´¬b×¼39Û{›¹ÌgfúÊ^kkÃþä“8µ¯ÜÊ•¤¿ým2·ßŽk „BˆS‚¿8€ÏG¹fÁ;Ûl|Bù>Ã7žÿ_(DîŠ+ÈmتŠmËì/¾ˆ¾g¸\˜µµàrIø !„8ÍÝùÄoºMCnõjrK–¾çœ¿ø¶7Þ@ß±ƒìM7‘~è!²6äOLSN„BÌ"Á12Mp:É]}5ñ•+±½óŽGÁöÒKØÞŸÌ]w‘úÖ·0–/›Mîÿ !„(šUÕŸ¿On’ÍeÉ9°øôcÔ #G.—Å0ÌâP¼%ŲÀáÀX´ˆìM7a66¢¶·cýu쯽†26–°¼<ßN@®þ…¢dªúg5î‹Ç§;y¿Ü²°;„*Âò„=ç’išŒŽŽH&f5ìóûƒÁó]¼ó£Ð §û3Ïä{´µa´¶æÞsO¾ @~žïÒ !„øœÖ¸/dhxˆªªjjkêˆD*ñû$’ †G†ñy}s^QÏœÔæ#'«9åu§¶¾?õ±¹X–E__/¦eÑØÐDmm-áP‡ÃÁàÐ ¹\·ÛsÚë êœZÖO2•ï§-óçÉ É­[GÀëEß»ûK/¡oÙªŠYSÏŸ¾!!„•Y“ôºº»¨¯¯§¢<4„º®ð˜œœ$™Hà;eÒ˲xé•WyûÝwÙ½w/ÇÛÛ©«©ÅétžuÃÑh”·ß{êª*v;Š¢ÐÞÑÁþƒ‡¨«­9c+ŠÂøÄ8SS1Z[00‘æ•m]´õF©‹ —èéíÆíñ`ÓONÍ«ª*ƒCCüþ©§Ù¹k"™JR‰0>>AOo/eÓãœë2î ="²W^IîòË!—öys¾À‡‚Û¿úw:¥ú_!JD!øUEQ˜ŠO¡ë~ŸÃÈNÿä¦A$f":qÚøø¦i²}×.l6‹, ©±›MDz,²Ù,™L¦ˆ¹\ŽL&ÀÔTœ÷>ØÈØØÙ\MUééëc÷ž½˜fþ*<—ËaÆi:::B8b4šä—¯¡c,ËîŽ(¿{ë(–¢áõx;má‘‘Qö|ø!µ5Õ”ƒ¼üêë¼úÆ›LLNÐÓÛW|?¹\®x®Ê|^LÏ»ôRû·Lýâdn¹}óf—®¼„ááýÝãx}^n¹ñFT%?±Ž¢À®={ظy º¦qãõ×ÓÚ2¿¸íT*…ÓaçÄ`”‘¸É¼ ŠÍΉþa&§’Øì6¢Ñ©Óo;( ‡¹úª+ñy½ÔÕÖòû§ŸÆçõ2Ÿ¢íø Þ}ÿ}2Ù,W]~ÕÕÕç¬Ìç•ib¹\d¯¿žÜš5ØÞ|ç#`{áô÷Þ#[˜`Ù2Ðu¹ÿ/„_pj~\.W¼bùcš&©t渮éL†­;vðÒ«¯²cçNâñ8ÝÝÝ\sÕUÔÕÔðÁÆMxÜn6¬_Ǫ•—°qófºº» U”sï=_béâżðÒËÄqTEa|b‚?<ÿU‘J, ^|ùeŒé)l4M#•Jãwëøì&‰dšD*¤@!¾¨T°ðù|$“I¢±(ªªaYV±Z_QTúú{ñûü§5î³, ·Ëŗﺋ¿øÉŸq÷w ª*~¿ŸÆ†zjkkÉå †††Ù´y 'ÚÛɤ3$“)'‘H˜%‹1ÇQ•X,ÆØØ8}ý˜–IMMͬm–——ÓÓ×Ke™‹;×Dpæ&Ùãܽ¡]5¥¬¼|99¼oWwv»¿Ï‡ª*\wõÕ,\ÐÊ+¯¿Î‘£ÇaÓ–sSæ Fá ¢‚ô·¿Mì7¿!ùþŸX®ÿú_ñ}ë[8úSÔþþ|ø_·,„BœSºeY8*#U:|ˆææf*Ê+P5•t:COo7ãc,]²ì´êsEQH¥RlÛ¹“áÑQ¼ååe˜¦‰iYX–‰eYœèè`xd„Ë/ÛÀÑé«Ê‰‰ 6oÙJo_õuµTUV²eÛvúhnn¢¢¼œÆúzB¡Pñ„ò,BaFFF8zì0­ ,m* sààA‚þ2|^ßœÁßß?À˯½Žeš<|˜«¯¼‡ÃÎÑcǤª2BwOGŽÅ0ŒsRæ Òô¾1Iþõ_“¹ã>ŠýÙgqÿ»‡ý ýï¹ùf¬Š ™@!¾@ŠÝù¼^/š¦ÓÝÝÅñm´ocxdUÑXк·Û}Z˜æ»ÈåóårY4M£¡¾H(D}]‡ƒp(Ä’%‹Éf³$IV,_Æ‚ÖÊËÊò³ñÜ|ãTUU‘Ëf) ¹|ý:FFG™ŒF G„gÌ% ª*åeåD£1º{ºéèh§·¯XtŠpE˜††Æ9×iš†¦ª¦‰ÃnçŠË6°fõjl6ŠŠ l6'Ú;ˆ„ÃÜpíµ455’Íœ›2_°fö¸újr—]–ï°iö^@ß¿ËëŪ©‡CÂ_!.bsà“oè—Ÿ>×4Mì6÷¬}Õ5M›5siš¨ªRMofù†óËœIΜcF¾™Û4ÏÐà,™L’N§Q§Ë‰Ó៲`ѱ1|>»‘ÑQ<Éd²¸LEY9“ÑIâ‰9#G,c|b‚t&Mue6›í´òHð !„() ù@Ÿ˜œ r¼½æÆ&Æ'ÆI¥S|~F,ÈårèšFÿ@?©t*%­(¨ŠJ2•âø‰ãøý~0 “Úšš5P…ÅèØ(–i1$3ÒÑÕIY0Hgw'ªª06>F<§2¡«§›H8ÌðÈ0Á@~MÓel|œH8\ÜvaÄÀ96,Á/„â Ì:yÅ?ëÞ·Á@ùÍóh;qœÁ¡A’©ó›çáõxÅt]#K“ÍåÈf³øý~r¹5UU Š¡ë:ét†D21gæ¾ ?y˜ŒMP©¤»·‡D"ŽÝn'N“Îdˆ„Âtötƒ·›l6K<ÇfË/S8)/+£¹±‰¡A à®¶v®MJ«~!„_så«Ëé$‘H02:ÂèØ(“““xÜnPòWó©TŠd*‰ÛíÆ¦ëLLNH$Èær¤Ói:ººðz-Ó4 ±¾~Î!{gV÷+ŠBۉ㘦ISC#º®[Á›¦Y¼²/Ü0 MÓŠËÌ\€aä'R5uÖ€=Š¢pìx­ó[f嬅5kY˲ŠëËêt+ý39Û2§–¯ðïÉh”mÛ¶Ë¿Bˆ/†³õ‚?µ{›‚‚¦iØíöY|j*ŠrZ_þS×uZKþS¶cáñ3­S?Ëú>Î2g@Zõ !„øÂø˜àX–EMu5(|öµÝÊ…3T¾mŸÜãBQ‚\®ü}ñÏþ6÷Y:òÎ ¥àBqÑS›ncjj ¯×{¾‹@*•BS5P žHàt8þô•~J¦i’L&óßï#„Bü©E!E‰Æ¦ÎwqŠe*/+&Æ'0Ïs#z§Ó‰×ë•àBñÅ`³ÙU„>×ÙîÎÆ²¬â­—ÓuÞËeY}JŸ¿Bˆ/†™A{¡¹Ê%#÷ !„% Pã Á/„B” ~!„¢„Hð !„%ä¬ûEAUòà *€1ÇL?ŸµÂð‰Š¢ÇPþ<œ:.ó™¶­ª*ªªbšæœ3!É©c> !„Ÿ‡3¿¢( ³}ÇNbSS475±ê’Øl¶\é\|™L†Ý{÷ÒÑÙ…ßçcíšÕ„C!LÓ<ëºgNvðiX–Ŧ-[Àçó²nͼ^ïiA}ôX':ÚYÐÒBScãÇZ¿¢(D£QbSqª«*Ï{!„¥ãŒUýÙl–ÇŸ|Šîž^~?CCC˜¦Yœ±@U•âLG…MUiïèà¥W^-®«°|a™ükÕbˆªÓ3 Í @UUÙ¶c'¯¼ö:Á@€ØÔñxœt:ÞÁÁYWå¿Jã™?ü‘D2Y¬±˜¹MeF9æ*äG8zùµ×9ÑÑišä 3/M×>X–…¦©ŒŒŒòøïŸÌÌ`šÅ™’ ûH9å÷™ïs`pýgšùþOÝOrb „â\9ã¿išLLL²bù2®¹êJÜn7éL†^z™Ë—Q[SÃÛï¾O]m–e²iËV4Mã²õëyé•רµg£ccÜuÇíŒñþÆMØl6®¿ö/¿úZ~8CM#000ÀÊ+ذ~]1øb±º¦³rÅ "‘0º®óÞyöÏsèðî¼ý6¼^o¾ý¹\Žuk×r¢ýÏ=ÿýýýÜqÛ­ttvÑØPOUe%o½û—¯_O{g'{?ü€ßÏÍ7ÞÀ‡ûö“Íå¸îš«óý@‡ÝΊeËX±|6›T:Í~÷™L†t&ÃM7\χîãh[¡Pº¦³uû9ByYW_yÇŽçè±ü”Œ—oXσ‡èêîfÙÒ¥„C!4McûÎ]k;ÆÔTœH8Ìm·ÜL"™ä·Þfjj ›ÍÆ­7ßDe$"·„BüÉÎxÅïp8¸ç®;9ÖÖÆÿûàÍ·ßÆ4 ÆÆÇØ¼u““lÚ²Ó4xáåWˆF£,hmÅívQWWK$æ’åËÈår<õÌsxÜnb±/¼ü ““ìÚ½‡%‹ÑÝÓËÐÐ Z[yåõ׉MMïçoX¿Žúú:þé¿à7¿{ŒÞ¾>ª«*©¨¨`ÉâETWUât:Y²x1Á`€ç_|¯×G¨"ÄŠË ìùðCI§Ólß±ƒ¾~žûãq¹\475¡ª*N—«8aäÛ3¤R)^zåU~ö‹_òêk¯399ÉŽ»h?UQyûw©­­!±fõjºzzxýÍ·hm™ÏÀà Ï¿ô2‡¡££“--lÛ±“öÎN®¸l õ ³ÿàAŽ=JÿkV_ÊŽ]»9ÖÖÆ‹/¿‚eY¬\±‚ý2>>q¾!„_g ~˲XyÉ þüÏ~Ìm7ßÌ˯½ÎÁC‡Y»z 'ÚÛÙºm;åee475qíUWaZ[·m#“ÉP[SM8bå%—L&éîí¡³»›ÉÉ(ÚtµvY0Ȳ¥Ki¨¯£¶¶–%‹Ëf‹Û¯(/ç¡o|ï÷;Dc1ž~ö9Âá0åeA–.YLuu5SSS8x¾þb±¡Šr*ÊËX¹beÁà)Uî>¯—¯¿Žþþ~vïÝK*•býÚ5\¾a}ñŠÚ²,\.÷Ü}ñ“?ãî;ï@QUÊËÊX±|9 ´J¥©(/'°hA+Ã#ÃÔ××qÍUWqù†õttv’ÍfimmáÒU+â’å˹tÕªâ Gá§¹¹™•+V U04¯©™^~™wß{Ÿƒ‡3¯¹Ó41 UU©«­eûΔƒ”——åß·a—±, Ó0p¹\„C!Þ~ç]V®XÁd4úq§˜B!>’öðÃÿM(:í‰l6ˉöŽŸ8A<ç†k¯eù²¥Øl6¢Ñ(mÇóÀ}_Áf³±wß>öí?@]M W_q5ÕÕ¤3iFFÇX²h! õu9ÚFo_/eeeT†ÃX´ÌŸaD¡ àu~ v»˲áð‘£ 0¯©‰[nº¯×‹ß磻§‡H8DSc#]ÝÝ$IZ[Z¸dùr¼^/==½44ÔS_WÇ‘cǘœŒÒÔÐÀüyÍ|¸?ÇŸ`ÙÒ¥¬[»†žž^2™ÌÉVùŠÂää$### Ç©¯¯Çép0þ<, Ün7õuµ((´ÌŸGuU‡“¶ãmDÂnºþ:U¡¼¼Œšêjjª«çÐáÃ8v"án·‹êª*¡ÕUU¤Riš›šX¾l)ÝÝ=oo§¯¿ŸËÖ¯§¢¼ü|+B!.bŠ¢022‚²iÓ&kÑ¢Egì£nŠª¢(`šù«á?¾ð"“Ñ(ßøêƒÅªtÃ0Ð4  ØR˜Õõ®p5]xþÔç Í,daš¦'`(l³PæÂz ¯ŸÙúÈ_u+*ª¦×a˜º¦ÏjM?sÖQPX®°-EQ°LeF™g¾fæºfncfùf¾‡™­ûS©†aÐÝÓËo‚þãQY)û„B|zŠ¢pøðá³àcš&L‡S!sR©Ý==\}å•hšVØff÷¼âk§‚3Ÿ?Ókf>WÜ™Ï|ÝÌPk=3OB 4U›ºs¾÷SÌ\¾øïËmŸ™ïåLÛ-œT´?Áû7‹M±aÝZ**Ê%ô…BœŸxZ^MÓøÊ—ï¡¼¬ìT'>˲hi™Oe$ŒªªbMŠBñ§úÄÁ¯ë:U••rúrØí8Ãa@†ôBqn}âà £Ïƒìc!„Ÿ…ÿ?Á"‰¶R rÍ%tEXtdate:create2013-09-27T12:15:22-04:00âò%G%tEXtdate:modify2013-09-27T12:15:22-04:00“¯ûtEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/lockdown_unconfined.txt000066400000000000000000000015431330160122500255640ustar00rootroot00000000000000Disable Unconfined System Processes By default any system process that is started at boot that do not have SELinux Policy defined for them, run as initrc_t or init_t. These domains are unconfined by SELinux. Other similar processes which do not have SELinux Policy written for them run also unconfined. By disabling the unconfined module moves you closer to what used to be called strict policy, and locks down your machine tighter. Disabling the unconfined module will leave certain unconfined domains running on your system, specifically the unconfined_t user. If you do not want unconfined_t users on your system you would need to remove them from the 'Login Mapping' and Users Screens. Note if you disable the unconfined module, you may see an increase in the denials, and if you have processes running as initrc_t, you may need to write policy for them. selinux-python-2.8/sepolicy/sepolicy/help/login.png000066400000000000000000001162461330160122500226200ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìÝu|GÚà™ÝÕŠ-33Cf¦&MÊí]R†»´÷õ¨½233'i“†ff'Ž!Žã˜™$Y¬´0ßc+Ší¤mÚÄMô>×_N0ZíZ³ïÎî¾3ƒOœ8ÑÔÔ„ÒjµŠ¬ Œ\|0Æ!!!\KKKhhhzz:Æõàb¦(Jii©ÍfãÔjuFF†¢(²,÷÷Z8‡X–MKKÛ·o§( BH–e†aú{­œC’$©T*µZÍBèKÞ.bŠ¢t…~ˆûpÑó†zÎûnó‚óÀ·‘1îÑæð¾Bk£ïã_ùE§¼…:ý»g^Ú¯_1úÑÉÐ|ÀyCc.˲!BmpЊ")ŠÂ0 } !Dߥ·£~)ï½+EQE馆!ŠBƒ·ò3j¾wM躱 ƒÎvÅ8Ghå¤5ŸÖùÓµN!œ÷ý½ÚàbF›ó ðçtºBÔ¼ !$˲G”¦ë]Ç9].•JÅ2 BH’$I–y•ªw£ûdëcDÃ0¾uât !cµšç8NEzi“p¹•ŠSE!„.¿÷Y‚÷[0Æ(+²V£¡'·GTˆ¢æy…Ô}”¢ËGÞã„Ï[èŒç =Þà—¢ûÇq øÝn„Z­VE’¤çÖުΑnPíÀ¹Cã²(Iß,Z¶zËv·Û=0+ã…=ºyçž×>þ\«ÕÚÎì´”ÿýÈÿ~ê÷ß5d@Fxóþ¼eë6¾úøcj5O°¬ÇãA©yÞíñ°,Ë0#Lq{<µZ!DE–aç‘g^jikGe¦$ßwË ±ÑcŽã$Q´;ÿ}å­n½¡¨´ìDUÍû“ËåÒj5„t…{ÛMR«Õ²,»Ýn½^ÿÍâå‹V­}ñŸ ÉÍilnù¿ç^ÉLMþçC÷¨XŽeYE–=¢¨R©0F ÃJ¢(ɲJ¥ò¾…âyƒ‚ˆ$ɲ,«ÕjBˆÛífYV­æˆ·ÇCeü"Š¢pWSßÐÑÙ98; atðHQp )!&Z”$ߨÞ3ô#¸àÎ%YQô:ݶ=ûü¸úÙÿû[ldDEM-B¨Óá |ÿ¹'ÝÃ`Ñ#ºA–eŒ°ÇãINˆ»nöLI’[Z!NAˆ‹Ž"„TÕÖÅEGY¬nG’d•Š‹)¯ªf&&"\!#Ôn±>zÿ]Cr²ÿõâkß-_ùÄßþT]Wßa³¥$Äs,ë§à9dPb\¬¢È¡£ÇO° Ãqœ¢(qÑQã²Êªƒ!0ÀˆEÑjë\´zÝÜœåë6VÖÖ¥§$!„ë›ZÍæÐ  ˜Èˆú¦f¢(v§+"4$ÐPߨÔj¶„FGF0×Ö7:AÅqA&S`€±¤ì„šç“ããZÚÚ”E)48hPv&:å6?‹¢(Ë64·|ôíw÷ßz#Æø½¯æ>xÛMÉ qnÇ7qßÛÖ?Ùêïï•9Y’¢#Âãb\¿iüÈáG Gqgë´¹p±Óé6pÀÄQÃŒ !’,±,[Z^¹|ý¦©Ï¿û‘F­¶ttäf¦Ïœ8þ¥>ùøÅgÖnÛq¼¼jÒ˜‘󖮸ÿÖßûjî}·ÜíöxB4<¿y×ÞÂ’R[§ýŠK¦lÛ³ÿ«…KT¼*ØðÐ7s§â¸]ûóNT׌:èO¿müY–Y†Y¶ncmc“Ùb½ã×lݳ¿ª®^¥âX†}þ±¿­Ø°¹º¾¡Ýb½ûÆ?‚ðÙw‹ÂB‚k›¹wN}S˶½û_5cZFJÒ[Ÿ“‘•–â{u €Ÿ cìt¹Fdw:?üö;„Ð×_7nøP§ÓÕ;™‚‚kýà|À nwb\ì;Ï<¾e÷¾-{ö-[·ñ…>¢âX„¯RI¼Ìq,­ˆ¼JÅq*„÷Q”›¯¾<48è¥÷?˜•d2ñ¼J¯ÓÉŠ2sò„º¦¦¾ðÚßî¾cÊØÑv»Šãè=— ˆ’üÐ7ÌÊøûS/üá²™—MŸò—ÿ=·rãV£^Dz ÂH«Vï;\p¬¼ò§41Æ{ê…ƒGŠŒ}TDذܦ•(ŠQa¡ãF ûóãÏüë¡û0ƒ)$„Œ>´øø‰Í»÷îÉËÇM9ü¦«/¿ïŸO””•O;j~áŽý×nÝaë´ßr핳§Nzô™—ªjë7îÜ=47§¹µ}ákþõ§û‚ƒÿóð1á§nƒ³£(„aV#É2"H«Q3 £(¤GWÝ>®õ÷÷šƒ‹!D­æË*«ŠŸ;l¯â^ùð³6³™bÐën¼ò2·ÇÃ`ìñˆ¡êú½NÇ2Ø%¸"ŠBBŒy§â8ËY::NTÕ4·¶¢E¶uÚõ:m«Ùìq»é¥„Kæüñšìô4Y’œ‚ Õj[Zšš.W`€ÑéšZZN—¬(:­V’¤ªÚ:S‡1Èpí¥3¾Y¼Ì Ó͘8Îw×è´;ÇòÎ3O ˜3oÙ*•ª®±éõ¿˜:~L\T¤Ge…03™ŒÆªÚú»öŒ:86*RQ5¯jnm­olr{<,ǪT*‡Ó•“‘:qôp·Ç#˲ÇãEvCpvBtÍ®ƒy~3ÿÎë¯E}øíw£1C‡8éu­¿+Ǧ¬õ÷ʃ‹!#Ün±.\¹æ«…K5õ¼&=%¹ª¶¾ÃÖyß¿þçp:³R“Ÿ~äaS@À׋–aŒuZÍôqc FB­Fƒ1"1 “3vøÐ7?ûÊ ×%Åŭݺ£¬²úí§þûêÇŸÇFF\:e‚Ç#"B :­Óî§ tº»oøÃ—?,Ùs(Pvæu³gÖ56¯Ø°%<4DÃó¹Y3'Mx÷«¹ÇÝpù¥SÆŽZ¸rMK[ûÈÁ·›®¿ZÍK²Œ01h¯â8–S©TFCJbü‰Êj—[H ŠÜË±Š¬p,˜’¢ªÚ%¸SãgNÿÞWó •µ™- 1Ñ×Ìœ¾fëŽv‹uXnNfr’F£Æ+vCpö$I yèö[F ˆæUªàÀ@Y–{ÜÅ=™9½cÇŽáÇ‹¢>àœ"„p,‹0ît:µjµV­v{<ŠB:™ÓB³ìO©Š]Ù›]eB†áU*ÁíæXVQ(ªyžW©Ü¢èñxx•Š~Žž(x¿šæº¹=¢^§ñxDšn„1F1©5§ËEblÐéžzó½£ñ‘ûætØ:iš)Ý{0FŠ¢à®WÏq !æ›A¯c»Ï«é&ЋNæ›A§ãXVEN[]ßðÔï>zßÃæ¶´µ9œ® SDz A ì|à×!„¨yžã8‡Ó‰Òé´’${<žžý áyþСCáÎI–1ÆF­VQ§ËEóß}ÎF‰¢–Á Ùwq‚!„e°¢(‚ °,K/‹«yžâŽa4+ž,÷QåîbÞw{Œ1Ž’O½AÚ{r…D_$„ô* Ë2!H’dÌ0÷ÜôÇĘ(·ÇÓ]nÿQñôº1KW’¤("BÈ%3'ÏJOÕi5i‰ñ¢(!Ú[팛 ÀY89 B¨¯}ÉpÁø9Œ‘G3’s3ÒíÇoµG(ŠbÐ醿dʲ"n½vAÿ9%Ãnóàåöx\‚›e™ßp§$©SQ÷ÈB°»~t2Ã.øà‹ö'øm—Ùc¸úÅÉV?˲tHB8 ½è]èÑçB_—z@;%ôó<×ú/zcY’ "Çõ÷ºœ%I’!Ë¡ ¶ªÊ²|AºÀ…îämÞ¶ö¶ü‚|è>~qË¢ƒjko»°B'í Ërldx¤F­©m¨u»Ýc‚.˜J7ã¸ðÐp:fg¯ðwœÅjIIM  –d _X!ü<§jmk-+/c¶¥­… raýÖ3!Á!‘‘‘A!Ê´ Œ±Gô444D†G², Ñô/ŽaƒÞ`0|òŒÁņã8Á-ØËì ˨Õê òâAf‹YÍ«#Â"AP1ª §ÑB Q zCSc“ÛãÖëôúÁo…N{×ätWt8„Ü킌à§Ð9Š¢DX†½€˾0ƒ±‚B’$ɲ|Á]¢$„Ð{-èßü>aŒ;::Eé£Z¢Öh´mŸ;K×?¨Ž7úûbŒY–EøÂü¹»W™öDazŒEû»§(ŠB.°Ãø=££ñ™­í>ç‘'‡EAÙíöI§ÎÕ…¼¡¿Ç}çöE>3\ƒ Íå¥}è3óǦ÷[¾ ùùËüÉ%÷€1–ˆ„ºšõ6d¼†Á{‡g õX·³8¯ý­v…(ê¿Z-ÛÍí£F E‰îc„°,Ëáaá°˜Ía¡á½¯çs½§æy–ãœN'BH«Õ"„A€kA¿g=èéâ)F¸ë‚Fˆ –eU*•à~jéˆãX„$ɾg ]Y+*ŽçyZ[ˆBÔžeY—ðSË<ã’û„&L×p:´ÕO7S§Ó©T*BˆÓé”$É€»§tw»ÝjµÚáp „†Q©T¿hL|z•L­V³,ër¹Bµaìr¹¼ßþ‹~#…(ˆ  ñŒ ü>Ñ´1ÇÝÚÞìv¹–Á ƒBIŠÌ² Æ f0êë¶×cAjž¯¨ª²X­CD-!„dgf¸cL*´EŸú¶¹¼m"8NœO„•J…òx<ôW 5zŸâ!|²Õϲ¬ÍÖYW_Ÿ‘‘æ]m–2 ƒ0" ¥œp*Îl¶ „‚ƒ‚dY¦×‹0ƒ !¼Šojj®­«2h A„×ð5Õµ«5';‹¶¾i¤+äu·—½ v¯jkoï½dDN–¡+ƒÂËŠL?Nß%„¨TÜÖmÛó ÂBC'Mœ¸dùrkG‡(Jq±19YYeåå#† Ã;ΆƦø¸Xïþ†‘e™þé¼kȰ,RžçO”WX­–ÁƒaŒ ‹‹ !Y™™‚ Œß]c¶¯Ýî&¾« ÀoBX–U«ÔœZò¬ìö0,«Òê{'¯âé°ä}:åÔUQ^w0ïÐ’e+xµZ£VoÙ¶mæMÆ£Ñh Ò¨ÕŠ¢ôú À@ƒÁ@ÑiµAAAAAAjž7i mùübY¶Ýl6[,F’$Fc¶X,VkÏûþa„Y–e93X£Q·[Ì7oå8ŽeY†a4M`P`` IÅ«0ÆzƒÞh2™›š›š[é“£Þ gcF§ÕÖÔÖ½ñÖ{Å%%FƒAQ”/¿™»zízµFm 4˜ô§âL¦À @Žãx^e 4Œ¼šoêkɼš7šL¦S ‰åØ.ë‡Øt:ÝÆÍ[¿™??)1±¦®Îl¶xDñƒO>mmmE"¨º¶ö‹¯¾Q…a°ÍÖ¹}çN†ahÕ5!Z­Ñh$Y6 ÇôÐh2™!’$iµš.ZºL¥Rñ*Õ¦-[×mØh0èõz} É¤æyI’uZm@@€^§•eY£V›L&“)€ã8£Á`2™ÔÝó‚¢Fc4èio_­V«ÑhÚÛÍó¿_ÐÔÜ2ã’i£GŽ\¹z̓yƾêòË·lßQ\rT¥éS¦ÌË«®­½ô’K†L;Ýô÷Ÿåâ§(Š^¯›÷ýºï.üøý÷r23‹»ÿOžsÛm·Ý|cg§½Ç…i–e±‚̰ Ë«x£ÁÀ1œ¢(*µªº¦fÿ<žç'޲gïc¥Çy^•; 'ÈHÙ¹ko}CƒÅb“=bøP·ÛÃ0,¯â‡ ¼k÷¾Ñ#FìÛP«ÕÅÇÅvtØÖoØätº ÊÍLO[»m£ÃéÄ]:sF{»åPþ‡Ãh2͸dš^¯Wq*ï’s²³ÆŽÕØØ¸iËv†aŒFÃÔÉ9Ž#„0˜‘‰ B›ÏtΖ¦æf§š5sÆ®½Æáp´¶µÅÅÄ^}Åaa¡Z­öHAÑh$„Ȳ‚0 ;^V¶s÷›­“çU÷Ý}×Þ}ûeEž6eÊ÷?ü™‘qèÐáñãÆŸ}ùÕÍ7\¯R©$IV«Õ½A–e‚±F£Q«Õmmíó,ljnž1mÚè‘#V®Ys ïа!C®¼löÖ;–”ˆ¢8mÊ䃇ÕÔÖÍœ>mèÁtÀN¢\@½ÐÀ…(„ÓhlååÇ?ú4gòd9&š·Ù.Î;txÒŸ@ý¬V?êžcHQºv0Y–µZÍü wïÝ7k挈ðð½ûö/^¶lÚ”Éß-øáPþ‘²'òž2qââ¥ËvîÞsÙ¬KFœØž7c—K¸úŠ+b£cþü׿oؼåÏý{ltÌì™3\.Ÿ;4Ýÿϲ,ÇqËqÇ0ŒBÚʶX,‹—®ÈÎÊ4è +V®.)9¾ïÀÁ+.ŸíÜUÕ5ÇOœ(+//.)Á˜™:eÒº N—F­Vq*·Ç=(77;3ó³/¿9Q^qÍ•—{DQ£ÖŒ>|Äðaë7l®®®Ý{à`Nv¶G”Ö¬[ßÞn>œ_0fÔ¨²òŠ}û–WT–8¹äõ7wtØ–ÿ¸&=-uÐÀ܃y‡1Â*NÅv¯0"H‘:íœÕj½lÖ¥II‰sî¹ïÙ^lmmå8®¥µåù—_yø‘G—._Áó¼(zèõýöööu6–WVnÛ±óòÙ³Ž•ß¶cÇ‰ŠŠ¼C‡y•jÓæ­‹%$$øý>~ë½÷5^¯EQ‘eY–E–$Q”$I’Ôjõ¼ïìÞ»wæôé¡¡!»÷î]²lÅÔI“¾[¸0ïðáÒ²ãž4aüâ¥ËwîÞséŒKôz½(JtW’b?øÍaŒ«—挃,Èß²¹ôÓϲ´:l46ÕUó§¿Ãô^Œ,I¢$éõz­NGq8œ¼îÚ쬬«V‰¢x´¤DÜEG˜dEÖh4cG9bø·Ý’•™±rÕït¦à< 9-&“ñ7^Oˆ¿uÎ] ññï¼ñz€ÑØ££íPJ¯0ÝWQT*^oЇ†„ÔÕ7˜L¦Ù³f^~Ù¥vÇŽ]{dg9<%9I­æ z½^§3 9Ù™r²Ý7§âXŽQq*— \yÅìúÆÆQ#FDD†Ë’IJlyeeMm-DZ.Aˆ‰Ž9bØ×_WßÐ`w8RR’&NwùìK‹KJ´Z­Þеäœì¬°°êšZ·Û=ã’©éi)¡¡!˜eXŽaY†^ð¡­~zÍG”$“Ñøø¿þùþÛoÚŽ·Þ{ŸcÙÐÐ'ÿûïÞ}çš+¯p8jµF§Óé´ZZh2± ›“•9bø°Ü9¶Nµš7°"ŠâõøC§Ý~¬ôø÷Þãr Þ+K¢( zEËáp\wÍUY™™+W¯ñxW©T !N—+#=½¼²ò›yó.Z¼÷Àì¬Ì–ÖÖY3.q¹…¯çÎÏÉÎÒiu#‡ŸsÛ­Ù™míf«Õj³ÙÚÌæKg\â„oç§V«éå~8çfä8QRÙ:kk)-5+ ǰgˆÂìµ×]¯Óêhzƒ$I‘‘‘)ÉI‡ò󛮸löä ã÷8¸bÕªà믽67w€,Ë7omniIOKcY6$$$5%ùpþ‘å+W†Ý|ã ƒB`èó‡N2®V«‡ LñˆbïKüN—³¹µ9((ˆÎ‡Ë`3ŒÍÖi±XëëãÇ“_P¤Õj®º|vrr¢V«-,*nljŽËÌÌ0™L!!Á±ÑÑA²,¥¤$«Õj3¢$ÆÄDËrWâ0Çq£G´vt”8‘“½ÿÀA‹ÅªR©n¼þmíí»÷îïè°ÅDG_6ëR§Ë(ŠbVFú ¹EÅ%MMͶΉãÆr*Žæ&‰’ˆ E‘nusKKaQññ²i©)7ßp½$I«µ¡±±ªºF’¤ŒÔÔ¶vsCSSeUu É”c4RSRœNghpðÈÃËN”=v,-%%;+óxÙ‰«®¸|ܘÑù……™ééÇy<žˆˆðää¤#G šš[.»tæ¸Ñ£:´zíºààk¯º";+KQ”ÍÛ¶7·´¤$'±’”_PX¸rÍÚàà ë¯»N¯×y»RÛívƒÞ@ï^ôw­6BÇ©jª+cSR]……ìg_efç”Hž­.³¦þÄ7ßdßyWssÆ8$$Ô7ßeÙææfüí¼oÇ"J¢wZýà"ãmõ-ÊHËø™aÇã=¢'(0PQ”>z‡ýÂ8ÙÓ!ôS*(Šâtºt:­V«„®&3˲V›Õ%¸RS<ÏWWé¯ÐÚÞ¥æ¡ï ø BJJŽÖÕ×2˜!DQ©Õ,Ã"D<$Š˜aT*UNvndd¤7éãL­~pcY–vÓ=CÇ"ú®N¯5`½(‰tȇ³ë‹D?Ec7êvÓ±dO·4‚ˆŠUkdEv{<´õMéºÍKQÈ…8Ÿ¨ï¸Cü&0ÆYYÙééô)!„ŽÒµÓu'õõ¹¿p!„á ôbG¢ãzDg‰úÉ8N«„šWÿúÞ§¾‡ ºØ3/“–a†çø“KÀ˜Á ˲’,ýÄu­ß+ºg2C¿Œ1ÇåtNw~É)ŠB«c÷oà"„,Ërpp°(Šv‡ý‚û¡i÷NÚÚÚÚµþPs#„¢(AAAt°¹þ^!pñ8»êÄé´ºÚºÚúÆú_¹#Amþ=cÆ%¸âbâ¢"£.ÄÐb0£æÕ˜ÁZV”Ä n$šÜÉó<\ö¿\tTtnnî¯LǤYý½-à´¼Y1²,ëuúþ^³$Ë2‘Çqg>ÃýÝ‚Ëýà÷ƒó-{Ö¡c,ŠbK[ LñøûDÑj´¦@zfváNÂÜ5t÷ÀÈØ;ÀïǯmªcŒ%Iª®­VdhÎüNaŒ-‹Û펊ŒºscúÜ¢þ^.l¿*ôB8–³:¬ 䧦÷U ëìªýˆÍTU]Ùßëø]øÕè1RE¯Ó«Õj·ÇíM\SÁiÕ,Ë`Y&.QÆÐXë'„Nç7¦Ï«%ðÓàW~ƒ{³¸ë,¦¢ˆÎ÷¢beBÊ·bÔ°I:B(+ „˜ó®+¬c„Á˜á8®÷ ?²,_ Ðgádè?ÝU`Úó'Z…¸+¾`Œ…hÕ\m›cá–¦öQ–ÅøXS@õòa:^’/†kÍïχ1#IRmmM©ØÕjMtTtá$}瘥uÀ;Î/¥( BÝóEBG¶9ݪzÓ;ºÞzu†ò¾óÑÓ¥ÿöþ”wö]üÜÉЯ×ëi¶P›cYYQBG¥Rù¶ O9“õ1Æ!^Ŷu ¯Ï-i.m¬Gt¼­þHà±Sçv8î½,•íž œ7¸!¤¢²<888!!AîÎ2d¦¥µ¥¢²<--Ãû:ЕÏ`0x<–a8•ŠŽ¶öKÞƒA–$:…ÇqÆårõNs$„p,Ërœ¢(ǹÝn½^§(„ÁØ%¨GÅCˆ¢V«EEÑ;n¨Z­–D‘ã8(z‡úñ~P§ÓºÝž‹ã^7¿‡èp¢ø¿ýÛíöˆ’8|èÐÑ#G47·t:술뮾ª¶®>0ÐÄqœ(Što:éƘaŽãEé5©yvåŽÊò‚†Rvß]£Æ»uûÞyó6%ž¸»H?sD‚]á²ÏùÇ2¬Óé”$)-5ÆJú:!$-5}×îN‡Ãh0ÊŠLáUªªêêÏ¿úº³Óøè_njn9—wÇ­·¸ÝnšJã8}Ì0 Míõ×ã=]$é‡ÿ2{æÌ+fÏ%©¦¦öå×ßxä¯IIN’e™N0&Šb 8”Ÿ¿gßþI&/+›yÉô÷>ü¸ªº&#=í–oÀóûòë˜èè·^{åÒK¦ëtº–Ö–=ûöWUU·µµ«¸®™rÛÛÍ,ËbŒA`Y!ä=‚@a0–dùxÙ‰O¾ø²ÍlÖ¨Õ_Ï›·wÿ~§Ó¡Óéœ.—­³S£Q3ó<_×ÐPz¼¬¼¢‚eÙÀ@Ó–mÛ:tÝ5WÅDGaŒB55µ²,³,«R©DQ,¯¨8ZRb6›†á8ÎÖÙùøSÏ„?tß½©))ÿ}ê馿f†a:ŽšÚZº„ãÇË\‚@Ï0Ʋ,ûð]|†a0sèp¾N§2xÍf+>Z¢V«u:ÝŽ]» ŠŠlŸØîžsGjJÊÇŸ}ŽŽŠŠ|ðÞ{^ûºú†Ð ¿üéAz]!İŒÇåPc0èµZË­p 6 ‡ìÁ`Aý#D(Š’,ɲŒq×õzWEï~cE–33ÒwíÞ³wßþÑ£Gt:^ÅWUW}ñõ×UÕ5þí¯1ÑÑo¾ó®Ë-˜Œ7ßxýû}üŸÇþ¯±©ùñ§Ÿ^8÷Û=ûöoß¹óñýS’$Û=h`."hÕšµ²³¬VëÌK¦#„6mÞ²tÅ „ЈaÃn¹éÆ·ß{¿ªº¦££#&&Æl6ç:ÜÚÖÞÙi_²l…N§5räç_}íp8tZíC÷ßg¶XÞxû]S€±ôxÙ´)SdYÖj47oÖj5zà>·Û3 'çhIÉö;[Z[ËÊË1Æa¡¡ÿËŸµZ-Ï«^|õµéS§Î˜6õßÿ{rʤI“&Œ·Ûípø!„Á‰’ØÔÜRW_ßi·;ÎÆ¦&:Ë”Is²²þò§‡fNŸ>wþwVkÇÐ!ƒ¿[øCEU• “'ŒøÁÝnËÒôŒ±*'=°Ó-äå{jêšUœ\|¬öØqÆ¥9©¡ôv8ÿèï-Š¢ÜQ½ƒ81 cw8n¹áúëÿpí¢eËþÛ#eåå£Äø„W^|aÀ€œ¼C‡-]òî¯i4ê-Û¶ÇÆÄîܽ§ôx™Õb-(*Úwà@Nvvס»\®{ïš³k÷ž^}íî9s c}Cã‚Å‹ïºãöÿþó±»vÏýî»òŠÊW^xîŽÛnaÜaëèì´Oò׿|ÿâ¶¶¶q£G9:e›$Iááá·Þtã5W^9xÐ@·[p»Ýˆ ¸ØØ˜èh­VS_ß ÓéŒF£J¥Â³,Ë«y„0âJ£VwØlZÖívϹí–ìÌÌ¦ææ¨È„Çq4H’¤¹ ‹Š+«ª"ÂÛ¶lÛ>|èP–eébƒM’$aŒB'Œ7›Í_Í7pÀ€ðð0¸æüPw†!vG‡Í¦ÕjµZ­$ɧ#+3ããÏ?”››•™ùòko<ò—‡¯¼löÜïX,šJáp:—‹Ð|‰î,Q–#B_{üº×?]$¿î𱊄¤ ,ãe¥Åú/>ÿäÞûp»Ýp~}ža„¢èQñ<˰';X°¬(L†Añ¼êÝ?*,*Ž‹qº\³/ÙÐØèr¹Æ.—K–å뮹ú•7Þ¬®©­®©yèþ{332jjjÃî»úª÷>úxÒøq±±±j5O¡³³sʤ‰¢$yÜž›-..vݡϾô²^« ðþûžxê™ÿ<ñd§½“c9I’— I’Ë%B¬ÖމãÇ-innáy•ZÍϾtæ{~ÔÒÚš¤ 7'cìr¹r²³ÿpí5Ï¿ôJRRbuuͤ ÆŽ=ÁÑã!„ЃBèõ·Þyþ©ÿÅÇÇ-øañ7Ÿær PÂ;vì!>.öè±c¥eeQ‘sÔ74)²¤’”˜äm=)„¨8Î#JuM6‡3<8HÏŠO>ùôö­#"¢7oßéñx`;ÏŽ;{0ïb­V«È2˜Æ}—ËEdrÄh4TRZZ]Sc2™dYÁi4šòŠŠºúúÈðˆôô4I«ªkMF£±¢ª*)!¡±©©¼¢â’©S·ïÜ5ïû¾û6M?á ïرcРAG«Ñ¸=Ú)Æ›Á©×ëi2}àv»µZ­ZÍK’ìt:yžÇ7·43,“Ÿ(Š¢7 +Š‚1Ãq,êΪv8ß7?**jöe—Óy#ûûà/èß¿¸¤8.&N–å£%Å6›aúº¢(Fc@vV¶ŠãŸÐÏ«T¼šÇÓ”•JEgQçy!äv»ÕjµF­v =ä«y^VQ5oæ }‹V-ºdµZM¯2éu:Ì0‡ƒN½K³øé[,ËÒEQTó¼KT*•N«•ÅårI’¤Õjyž—eÉíöH²LOaEÑh4jž÷ˆ"킠Ѩ%I–eY£Ñ¸Ýn:à3Ã0O=÷|ZJÊm7ßd±Z/Ð9¿8 }ÌÍët¹hà¦géLÜ6›îÀôÃ0.—Ëår!„†A¥Ra„é¼¾Lé¢DIB¤ëÒ‚V«½ûž{i> ÄýóÉ{­Ÿ6º‡I1½YÜ‚rjz»ÛãÜnúqš}Oí´™LøfÇ»>v¹\ÞB„oÕ¢\‚@óì]ÆX–åŽê®E´»­„ôã¢(Z»¿Ú·ú~Ã0n·›}ú‚е N§“a·ÇãñxE1™ÆŒéàjðS'C¿ï>à»/î„Õ‘ ‚»û÷÷¸]ÆžÚ÷Òãñ`ŒX&u9¯èÀ ôðLq:½ËôŽ€¾!Õ÷©÷żK轨¯0}Ö¥S—Öûã§ûºŸ\mßòô«†yè¾ûdYöv÷Àßüª(Œ&„° +K2Bˆ¦îœ¡<œY÷QQw„v.Ƙž»@Ü~ë×6ÀeY6mímUÕU<ÏCŸøß!Œ±Ýn ƒ+ô÷êü.@Ð~ŽCÝãžõ"0Æ¡!¡.—K–ä m®lÿ@)ÀÄó<˜෼ўÃÓ~4¿¦„Öiu÷·ˆBdâ>þŽ&p":-{Ss“ÙbfYýŠ«5ä×|œ{ŽÌø9ŒdY AqMÍMñ‰ñ1Ñ1p.n4Q»µ½•s .ƒÞòÓSq¸`Ñ ßnnïììä|»Þô÷Š€B´o¯].š é3W+æ:9­n×<Šò3ïú¢x‡éïÍw9?™ô>õ¦%tAzJNšwF0ïtg˜þ÷ÌzTZèP_3ƒúNþì­o=fŠF½êmÑ{2ž;ôûÈëÿùÕã3•¤ËéšÇv!ð³)¤çm§Óu-öú™ƒ’ïr Òú ßÈÞçuïÒÛþð}Šzuñ=<ôþxot¯ÐO9VZ¯×¼¯xg[Eyï3 SVv\o0DGEÓiùÏÞB—h ŒŠŠFUVVèõúððï~Èçý;öhÐÁŽç·ˆÒóÚ£Ýn¯ªª%)4$4..¾£ÃZU]…’eÙ 7¤§g””ÇÇ'ÐJk6·765ædðÖUïF´iF+m©õ8]ðV~Ç]U]§Óé¼³{ë§ïG¼µ·¿ÿlà,yÁÓýŽÞ I Ðê—œ”b4Buuµv‡=3#«¾¡^–¤øøo ih¨ojnRó|LL\`` ÷ãÕ5ÕŠ¢p—Ÿ`4øž ŸÀØ#äz«1ú-Ž=ë,Ë‹/lniö®m³{Og˜n¡²ÇB ƒ½/z—³tÙâï̳uÚB6­/(<â]]o/ú~]×Ðo¼,Zål¶ŽEKnÛ±uç®í[¶mFUVU,üá»÷íÞ½³°¨€²hIW¥E™-æ’’£È§®ú¶K¼•Viﻨ»ò757!„l+W­hkkõýHǾm—þþ›³$¦6Ap»…ezTÈêšê/¾úlûŽ­!‡Ã>ï»oW­þ!´ÿÀ^ú"Îù?,^x0ïÀšu«Ë+N „hŸÊÊÊŠ ç8¸oÃÆu‹—.r8ÞxØ#0Ò/í]}+íYëÙêÇ zOƒ£ª««JŽ .aìØñ ñ‰jµº½½­ÝÜj D%'¥xÜnƒÁà Ù‡#))Y¯×GFF!„’’R2ÒÒÛÍ툠ؘ¸¨èh­F—˜˜ät9#""ÃBÃìû€œ1ѱ õN§#*:&8(ø×l¸@9]NZ!Qלqr‡­£­­UÅó—L¿488Ø#ŠÇn·wÚl,˦¤¤:NQ]‚Kôˆ11±F£1..^\ ñ :^„¬Ì숈ˆ††ú°°ðøøD§ÓÁqÜUW^Co䆇…ÓïJLH’e¹µ­5"?~æÀØ;ärÚeþ¾ûBcøœYŸë Ào®‚ß•þ­¿yÈíÃcÜnn—efï¿§ƒv©à÷àbª,ËZ;¬cŽb4ƒƒ‚EI„‰œÀïAHptå¿M…$ˆ¨8í°Â!„xϲìo2.€ß'zåŠWñˆöæ…iuÀOt'~ù„ݲ,÷>E „Ð×O—#EQåâ˜ì\pèÈTãŸYEA3p ÎÈ›üsæ«&4ú¹ØÏ,Ó#ÌÒ{´Þ9Q¼·li=÷®žï¤)4àŸÍ°S}î<cÚît~þ^Àoî—ŽÙúà'ý¢^?'úýd™a–v·:Ãΰz=r8÷zot,Y¶<$8È`0t zEƸ¢ªê“Ï¿p¹\)ÉIÞ® ¾=qÌfóª5k3Ò3¦ïXzóNLAÛì=Æsöí~E|`Œåî18i®}û|3o~Mm]zjªïîá]ˆ·®Òòë6lÜBxXXÁ{{tQþFQºÒéiÜ/,.þè“ÏŠÍÉÊ¢ãÿиÖ#646~üéçÛwìLNJ 0½3VùÖ½e¼Òw9å_}ó­ÃéLNê ³‹—.›ûÝ÷„ä¤$»ÃñÃ’%‹–,­¬¬ÊÊÌä8îpþ‘¯¾™»eë¶ÐÐPoe¦9ü‚¦w]W®YÓÔÒâ}…XÞxë ÀÀÔ”dBB'gÃð~Ülµ.]ñ#Ë2+׬™÷ýŒ±,_ 7ÍÁ9Õc¢úÔÛÝÑ;»ò™ä‡–d»g8bY¶µµõÝ>̃qº\=z ö¨«ti[·o/)9†Ní8ã;{Fÿa@ÿ`ÌtW›Òãe/¾üê°¡C›šþ÷̳]%N½ÀBÇ |âégÃÂBMýû¿‡³{Bt†2ݵ”ÆÒ®eŸ(¯8”Ÿ¿}çNúöùŽÝ»§NžôÁÇŸlÚ²E£V»÷„ñãŠKJ>þü „P§½sÐÀÜÁƒ=û‹¾õög]ð¡ÇŠÚºº>þÄãñ457=:ÿû<Ïÿå¡ ŠŠåçs*nð ËVüX^Q™œ”øÀ½÷¼ÿñ'wÞ~›(Š -¾òòËÂÃÂÚÚÚ¿þvžÅbiooÿóƒô÷ï~¿hëû£O?9bøÐÁƒ_zõõ»î¸í›yó;íöƦ¦ë®¾jæ%—¬ß¸éÇU«CB‚ÿñ·¿657;ÿ;·à¾îÚ«ÓSS_zí žW555ÿólÚ¼¥º¶6ïÐaFc6[Þ|ç=ŒQkkëŸx`@Nö×sçÈɾãÖ[Ç;|h6[ŠŽ6e²ïúH²ôÆ[ïÞ=çvQ’¾™7ÿ±GþÞß!p^Ñ0xðС•«Ön÷£ýË–mÛ&NùìY—L›v÷-9–•I‡¯ª®þþ‡Emmm·ßrs»Ù:ç¶ÛBÇJïÚ»§°°hÐÀÜéS§¾þÖ;ÇO”]}Ådž‡…Ñ2ÇËNlؼéê+®@ ‚ëãϾ8^v|ò¤‰×_wÝÌK¦K’tøÈ„Óé<˜wè‰ÿ+11AQÈâe˧M™rû­·pg±XóBM7În·¯Xµ:!>Þ`0ønÓcÛ”nôl‚>–!ôþ‡ÈÎ~ú‰'¢"#ÛÍæ7ß~wðÀÇ=ùìóãÆŒIJL¼þºk4ó’KæÜvë®={·nßq¢¼Üáp8Î#……!ABCCÆŽ=fÔ¨9·ÝŠºo¾y¿Ï÷YÿÐàw¡¤´´­­ ”_P Âá#GfL›vãþ°à‡Å ó,üÓ÷Ý{ׄ—_{c̨Q7^ÿÇ?þ¤èhÉñ²ã÷Ýug¹ó¿Ÿ>mjbBü ¸îhɱƦ¦£%%÷ß}WNvö²<”Ÿ¿rõšë®¹æûíÝ·ù+AxíÅr²2].!Dë?!DQHAQ¡Óår8œG ûûÎ7’>ùü (Þw÷¦ÖÖÖØØ„Z͇ÎÏáåWúëßö8¸jÍÚ#…÷ÜugZjj]}]tT$]HDxxsSËÄ ãs²³¿™7ßát<ûäÿ&ŒÛØÔAË„‡…šÛ-!ŒñÜï¾·Û;ŸyòãÇŽ¥Q‘î2›-*„ŠŠŒt nY–9Ž+¯¨\°h=Š`Œ·lÛ>ï»ïT*˲§œÂún[ùr½ÓEr,ëv»›[[§Lšd4ÂÛ:íöúÆFZ=rø0•Š3èõ1Ñ1,ì]¿>ïða½Nçt9u:Ïó<¯ 4™! Ë „ŒAÁA&“ ùL;Éôš­·¿hð» æyF‹ D‡……¥¦$§¤¤„„EGEffdÄDG·µ·‹’4}êÔÁƒjuºŠÊÊÔÔ”˜˜˜ô´4–eõ:Ñ`Œ‹  ÅÇÇÅÒ·Tw¼ìƸäXÉè#ƒ‚‚JJK'Ž0 õfn°ÝR«ÕÒúl2ô÷œo4$½ðôÓq±1o½û~Kkkttô‘#…¡ÎÎN³Ù2lØÐ{ïºë_ÿx4++óî;ç\yùeï~ðaAaQrRòÑ’ct! ‘‘#† ‹ŠŒZB!,,4>fÀðkô¼3';»¦¶ÖãñLŸ65+##,,4-5U§Õ…†Èɦj¡]Åèc¦;7®ë)Ë2÷~— Ä`Ì0Œ·‹ïé–À²,}Ë÷w:cܽïg! Ÿ.Ž!†eY¦w«hÖ&M ÀÝ=YhýñÖCZ’æáѧ´–ÒÏBBX†ñ.Ä·„X†ñývo÷Hß§ÀßȲBïøzóŒi’zúУ—¯7´zûÜz#ž7„þœ2²,{oÕrGû¯…0Ì)K@Ý]héBè+="ê)¡¿wÜ¥ÏÐsÌûø•éñugî üPNàô±÷Å „>KÒªOŸúþ‹1f»{ œn!=ú¦ ˆø~e{¦ÆôY%zT›>«1êUÙ~²LïïbÆ›¬Ó;€Ÿ¡ºBËü„~ð;úÀï@è¿Ó÷mU…ô3Æ#õ¦OôxA>>8¿¼©Š¢ „{Ü‹àñæ€ùþÿo8^?ÍÍ÷F]šJä}¥;³¨k8Ã2ûý ÆègÄnoúDÏ÷Ÿø‡>›èÔQË!œ7´™Û= çOäõ{‹uÔ+ È»;xÇ*÷îô©·|ïeö ý4ý¹²²J”Äô´4:z¢$É,Û•òLV„ŽãDZÒãC‡ FÝÍ.Žãšš›=nO||]Tÿ:àÂæÛlAÝé9Žë‘7½k÷ž–ÖÖÑ#G8”gЦNžä»+ʧöèïm0o…¤q¶½Ý¼~Ó¦ðÐÐÉ“&öÊ´ŠÒ.J‚ ¬ß¸IQ”K¦MÕëõ’$Ñ×}'ÕêQÆ[i^?í¼ÒÑѱÿàÁ˜è˜ì¬L…ãÃGŽ=*-5Õãñ:œ_V^ž”˜0vôh:Üòþ%Iš2iRxø)“Oôl@Ñ7vìÞýÃâ%¨û`Âq'›Tô0B7²±¹ùí÷Þ§½è[¡UkÖ.Y±AóühÕ¢ñ½¢²jáâ%ÇÑ=ŠV9Œñæ­Û>ÿú›˜˜èw?üðpþ‘à   éÑ€³æ­ ô´¶þóñÇkkkç/Xðö{ï#„$Iò^¡q’aI’ž|ö¹ýîܽû¿O>EÛÍ]³J°,­É½Ëxã'˲\wtݰyËko¾½`Ñ"„ƒñò•«Þyï³ÙòØ/>zT’ä ›6Y,–Ï¿üú‡%KBG «ª«këêŸ|ö9—Ëå{Æ|r úe›¶nýnáûöíOOKkim 0Ÿ~ñeRb"Ëq‹—. úü«¯×¬]¯ÕiC‚ƒ÷8pÅe³›šš¾ÿÝÖí;†TUU½qÓæÒãe•UUsÀœïÔEßÎÿnÇÎ])II_~ûíÂE‹;íö¬]¿á›¹ójjk^yý „°^§[¿qS|\\î€t-o£iñÒeq±±N§kåêÕ9ÙYý½eà‚ä[!·nÛ>xð å?®äUªþãѱcFúù#† ¦í’N»ý‡E‹W¬Z{âDù¼¼×_~iÆôé?,^²wß~‡Ó½tÅs¿ûN£Q×74äÊýågLŸ¾hÉ2½AŸœ”D/ë/_¹jÞwßK’˜š’’•ÔÒÚ:qüxY–_{ó­¿=ü§«¯¼B‘åUk×]>{ÖØÑ£ÇŽ-ÉÒ®Ý{fÍœ‘’œzmò™^lhlœ8a<ð‰ñ Ñ‘‘ƒssY– ¾|ö¬Ý{÷®\½&3=#2"";+3000##=0Є|NÌEY´tY‡­£Ýb^´tYo¸PùVÈÉ“&z<žú††¹¹¡°ÐЈˆðý~öåWÏ<ÿbñÑ’oæÎ[·qãŒéÓÕjuyEEFz:]HrrRMM,ËZ­væM›·l5sFtTTEeUfÆÉ2ÕÕ5!†a–­øqó–­³gÎŒŒìñ_’%:þMcSÏ«’’’B¹X­VEQT*•ÝáøqÕšk®º!IJì¢%KúËß’ôz½o(>å‚ÏÎݻǓ““•¥(ÊìK/->Z²ný†;n½%¿°`û®]3/¹D«ÕÖÕÕ—WT"‚Ìf‹F£AÝ÷Ý‘»w«Õ¼,ɹ99™ééY™™ífsÿ^àBEÏï¿ûn„Ðö» }ZZJttôÄ ãÕjµ$Jy‡+²âv»ãbcR’“F:nÌèè¨(ï5V„!$((P­æÕ¼:4$¤¿7 \¨NVH‚vìÜ¥Óé z}Ee%BH–‡Ã; 'gÔÈá&SÀ5W]™‘ž¾vÝzŒqpppuM ]HG‡M§ÓÝtÃõ¹99k×o¼ù†ëÇ›”˜è-cµv„ÓÇ;ví¾ñ3zTnNN×ýT–£÷@S ÃéjiiAµ›ÍZ†aEVžzöùÉ'Lž8ú뮹zãê•¥eeòù^ð9%ôÌÍݱsW]}}Iii[{[NvV]]ÝÂÅKþ÷ßÿìÛ`ÇÎ]—ÏžõÃâ%[¶m¿|öl·ÇÃ0LSsÓ¼lXLt´Óét¸œv»!d6[œN'B¨¼¢bמ½ûÜ·ÿ€$ɇ#ïp~aQacSSo¸P¬wÎÙ¹{Ï÷ ~¸öê«¶nß¾oÿw?üÐh4Œ=jÔˆá³fÎŒ‰q¹\·ßr‹­ÓöÊëoΘ6­¾¡qÅÊUK–-¯«¯Ÿ5sÆ’åË«ª«‡ ¸pñâʪª†ÆÆ ãÆ565yË\:sÆòWV×Ô 4páâÅUÕÕuõõ fjjk ‹‹O”W5ôƒrs?ýâˢ⣟õõìK/EÝ~ϽµuµÃ† 9VZÊ0̾ýªkj,V«ËåR«yßÍ9åZRb‚ÛãY±r¥F£9|xJr2Æ85%eøÐ¡²$gef˜^][[PX˜ž–:mÊd‹ÅZUUÓa³-]±b@vö­7Ýàp8ƒ‚‚2ÓÓ-kjJJDD8‚[¾à¬0 ³rÍš+W Èɹãbc;l¶‚ÂÂ)“& úÍ[·ê úqcÆšL!!!)ÉIífsî€FƒaÓ–­ë7nª¬®*)-˜; -5eé²åN§3w@Îð¡Cû{³À…êd…síUWEGGEFD,^¶L¥Rýý/ët:Y–iVä¾ýæ}ÿ}P`Ðm·Ü–“½zí򠮮¿üéÁȈˆUkÖšL¦ËgÏ:^V¶výµZ=h`nNVÖª5kšºÊ¬\½Úd  eÖ¬[¯×ë3ÒÓ,Z\S[g4*++ÇŽ=jÄðŠÊÊu6Θ6õê+¯(+//**JLL<˜—ç„!ƒý¸jõ’åË·nÛ~Õ•—O™8ñ´ãõŸ.DÃèçp!¢7舞§¯ã®[²ÞÞ4Q‰ŒNÐtOÔÝ›ÀÛScLwÞlkz„cø5h-RB§oöÎô ( ˜(ŠïpäÞI#¼YÿôuïcßÎ_œ…Ò0{t—=yCcc…†Íîb¾³›àî‘Ãég.Cç–@Ýiþ!YQè·zÇë§…½œ}œ}7¤g—®o{Ÿzôˆæ¾½ÙÓ}. €³Ðþ|2ÇÙ÷utšÉ!z–ÞßÛ.=*äé¢\Ï@zêø§¯ÿ§ÊôžÁŠõy¡Ï W¼mñkS£ÀEëtíh˜€ßÐ~B?ø_ú{êM€‹›w„Îþ^‘_ì×Þæ…ñúþÉ7y†¡Üßkô ôœ`KVÚ! !$wÍè€ÑÞWdY–e™"Š"AÂû"BÈårÙívEQ`Ô6ðëy›Trwµ·¦!„¼U‘–ôV]/‚NvU ~=ßH“îT×Ô0_Xmÿ]ºN&–BX†¡WoºzraÌv1M7»¶®î¥W_ÿà·èðÓt×ZºâG»Ý~ßÝwÁž~=o>2Û=U‹oš³ï D}fXc„p÷á|üz´Ò(³/¾dµv´›Û¯»æê?^{mïžS¿[§t°Z­òòV­Y[PX„1Þ·ÿ€ÝáÀïÞ»ÏårEÙð Åb]±rÕ×ßέ«¯W©T,Çb̸Ýî5ëÖ/^º !$ËrÞáÃó,ܵgoo¸€Ñ€^XTÜÒÚŠ:—çñx¬Vë¢%K×®ß Š"Bh݆?,YBÇn;œdó–­{öîó]ˆÃéÌ;t!ÔÔÜ\T|qö;~’ kÖ­£¡¬\½FÅ÷ß~ó™ÿýïû…‹ZÛÚ|»ŽÿÎr€Ê?RðÌ /657½ðÊ«òò~\½zËÖ­6ÛM·Ýq´äXÑÑ£Ÿ}ù•(‰­mm¢(>ýÜ ­­­ ð,óôs/lß¹“ ÔÚÚ¦V«ÛÚÚµÍëo¿}¬´Áxýà¬Ð]èãÏ>?œŸzåõ7ëþñïÿÔÔÕuØl²,;oþÞýû[ZZ_{ëm„Ðs/½¼nã¦v‹!ä½ÞØÜÜüÊo"„öí?ðé_"¨àlÑžzî…m;va„Ë+*&MJOK -;q]8m‹SB¿¬È9ÙÙwÏ™sßÝw-[ñãÌK.É;œ¿yËÖÉ“&),ض}Ç„qãÂÃÂâbcEQ´Z­õZ!4tè`§Ó¥æù°°P§Ã9n̘k®º23=Ý;5g' À¨ÕêBAAZfØ!MMM±1Ñ,Ç­ß´YÜf‹¥ °¨³³3**òûî¹|Ö¥¾ª0 „ÒétÆþÞp£— ‡ ìt9yžŽŠ"µµwMI"ɼäBÑ#Ã{Ün„PEe¥V£0nìg_~YRrìõW^zêÙçÛÍæï¿ýzåêÕ‹—.ÿçÿ=ºc×nBˆÍÖÙØÔ4cúô‘Çÿùo( Ñé´µuu!Q/ŒÃø]¢­'— 457wÚímmíQœsÛmÇJKÿö½úÂóÑ‘‘±1ѳfθéúëyµÚn·Ë’„2›-²,DtZ-Çr---‚ 4·´Ð¡ü8;ô¦îŒK¦5òÏ{D„Y3g¼ôÚëW]qùŽ]»eI8`ºpÆ.;%ô«Õêü#ÿzü²,?òׇBÆ imk‹‹ÍÈHw:œ&--- ÀøÃ¢%áé©iFãŽ?û<"<üxYYjJò¨Ãå¡côGFFõ†þÞ@p¡¢Íö«¯¸ü³/¿>œŸ)Iòëo¿m±Z'Œ›•™qלÛ?þìó?ýŸ÷ŒÆÛ½«?þÔÀ¿øÖ@Ô]?}çEò}LN­±Þ´šsít:½O}3z,>ís÷ë±2À?)„('û b»Ýîv»{×ï[¯†q¹\N§“é ÿd˜=M™>—ƒ1ö Ë´cA‡Í†|ÂrG‡M’dï][‡ÃÑÙÙÙû&nÏYº|Ã:Ýߎ‘ôqk[›Ç#ÆDG]p½À§ÏÎ"ØgV oï4I´Zö(ÿþG•(7™LøÏ´Ký w¯ó݆yçý2ÒÓf^r‰ïì}v2þÆw6®O>ÿ|מ}¡‡î¿oäˆá²,3>óCx;î\½fñ²e¢(^{õU×^u•o‡Yo\=sEQ0ÆkׯÿàãOgLŸöç@Õ74¼þÖÛ­mmñ±±Oüçßn·û¥×^kimãXîÿkZjêŠU«\¹J–å‰ÆÍ¹í¶S¶ÂûˆŽÐÐÒÚz¼ì„ÝáE±ôøñ¶övº%ÇJ;;;BŸ}ùÕ;ïÐÒÒ™ à\ko7ÓZZZEIjo7Ÿ(/Ï;t˜Ž×/JRaQqQñQI’ŒkëêÊ+*A’$µ´´—”!„öíß¿f݆«¯¸bâøñ„ ¶öö£%%tø~:Mžý,+­êÍ--y‡+=îñx|ׄÒÒÚ*I²$It àŸJÏ?R€Z¿qÓþyŸôÁ-7ÝøúÛo;].ßy„jjkæåɲ\YU5wþwÏ=õäÓO<þÍ·óÊ+*Íf³µ£cl6›÷îßo±Z+*+O–™;¯ìD9mÑcŒÍËþ›šB9ÙÙÓ§N1[,ô+^ëA~ûÅç‚ÛýÉç_˜L¦9·ÝöùGŽ=ò£O?G 2øý·ß|ú/[±’sïê±×\{MzZ:í+¿{ïÞý÷‰ææf£Ñøå×ß>rdåª5q±±Š¢üï™çN”—¯Û°16&öÇU«+++%Y>t(Œ‹ÎZïÿ÷Ì3:9)éÁ¿üuÔˆáÿzâ‰'*vîÞUr¬tü¸±/¾úÚ®Ý{››†²xÙòïþpðÐáÊªÊøø¸»î@„/ѨÕÍ­­{÷ïW²mÇöŒô´Gÿù/»ÃñÃ’% ä$'?óÂKV«u݆£Gލ©­}òÙçA8|äȸ±cR’“éj`Œ%Iúë£ÿ=b¸Ùb}â駯¾âŠþþ óŠ6ÃßýàÃÍ[·µ´¶ÆÅÆlݾ}äˆá9ÙY)ÉI7o ÄWTT˜ÖoÚôÅWߨl6­VSv¢\­æ/1#8(èØñãˆ%Ë—3˜1™þóÄ“5µµjµºªºZ§Ó]:ã’à  ãe'ìû ¹ã²'ž{ñåšÚZI–²³²L­mm “'Nhmm]·aÃÃ=¨Ñh"ÂÃW¬ZuÕå—aŒ7lÚ:rÄð£q÷Þ}ϼðâØQ£¦O›JOJ\‚«¬¬ì” >’,§¤$?÷ô“_;—að O>½}çί¾8fô¨Ûn¾éãÏ>߸yË—Í®®®yèþû¼S¤pŽÐ¹?B*•Š¢Õhzà>—Kxý­·ö8ØÒÚúÎë¯!„šš›W­^󿫝„††Üÿ§‡##"’ÿýÿX¶âÇ>ü§‡¶mßþÏGÿþŸÿ=åtº"#"þóØÿ-[±âHa‘V«-=^:fÔÈ¥+VìÝ °¨hæôé7Ýp½Ãáp¹tjg•J…0Æ æ8îWl¸ ‚0FN§Ë#ŠÓ§N‹‹s8’,ÑwU×ÖÖv0/¯®¾þ–oTd¥Ón>lذ¡CKËNxC%˰‡ãù§ŸB=õÜó³/qÍUW!„æ}¿@’ºåÛ6Ÿ÷ý‚™—L¿æª+éÔÓ,ËúÞ –d¹ëSaÔ5AÅ‚E‹‹Žýøýwi± ÀÀIÆ757GFDx—|J & áyBˆaYQ’B¨RqÇu_‹"Ï«ù¿áÆíÞ³74TB¹Ýî×ó–u:’$)Þý ø†Á„Çý{AQÑSÏ>ÿà}÷Ž5ê‡%KþxíµEÅGÍfË¥3.1Þû±ƒ |î¥Wç¹îê«]¾Âát*Šrôر뮹Êãñð<¯(ŠàvÓ…4ðÇ•«|Ê\-‚F£QEp ¾«á=0DDDð*~ÇîÝW_qźõéðkËW®\±råë/¿¤Q«i¶Â€œì9Ùsî¹ïXéñÓ†~oçš+¯xéµ×ûÏNç_z000ð¹—^þç—$éÉÿþ§¡©iñ²åï}øÑŸ¸¿¿pñ"!4zÔˆoæÍ?wÐnïäX–†q:cÇŒ^¿iÓÿ%%9ùÏ>píÕW=ûâKË7vİa+V®Bݶ1˜þwMÞEïý2Ø%—ͺtÛÎ7oÖëõrrn»åæÿ=óLuMMÑÑ’—L_º|ŪµkŒ²,ÿóÑG†üÌ /!hôøï8~òi§ÝÌóªÉ'îܽûÞ‡þ$·Þb4EQ¤ãË.\´¸´¬LÍó&S@||ÜŒéÓþü׿+„Lž8!;+ëOýûUW\þÐý÷ýã_ÿÎ?R0jäˆk¯ºjú´©>e2ÿü·¿_yyw™ü‚1£G]}å|üÉÆÍ[\.×ãO>ýÜÓOþõÏzå7Ö®ÛÀ0Ì+/F»à|ú9qà·õ3ǯü9Å|ËîŽè=`Œ}õœœ~Ä;dt½:†ÏiT{$œ"„:ív­FËq¬o©Ï÷õüø9ÿÀEªÏúÓ#=!$Š¢Ûí¦=lÏз«Ç§ø¥zÔ® ›6/]¾Âð§ï‰ñŽóJ¡á’Î÷PXTôå7ßJ¢tç·<¨GPý9eèÓó¾™7oÜØ17þñ!— |ôɧGKJÆŒuל;l6Û§_|Y^Yþ—‡ Úºmû²WŠ’xÝÕWO<É·òŸr,Â˲lµZé¸?¾kFß²X­„ÇóÄSÏ”;Fß•$Él±x—(NÚl±¸ÝnØÍÀ¯1v8v»!ä;R,­“‡Ãf³!„öîßÿü˯ÐÑ 1ƶÎN‡ÃáÝs¬V« ²,··›¡B‚_ƒÖº› c| /ïËo¾}ø¡âãž|æ9„Ó5J»Ájµ2 ÓÒÚúÂ+¯]yùå³.ùÌ /¶´¶zƒ*!„ÖIß2Ïv—ñF³Åâv{BµZ}¬ô8]™×ßzÛîpü÷_ÿܲmû‚ädg?ú׿ð¼ê>D=xß=÷Ì™óÎû´›Í¾''ÇëÇ×ÖÕ½ñö;[·ï¡¦¶î‡%K&Œ»yë¶å?®LOK{ñ•W·íØár¹ê¾ž;¯¨¸8"""Àhxõ7·ïÜU[W7dР_}mÑ’¥›·nݾsמ½{—.ÿqäˆáz½Þ;øÆøù—^fY6>.îïÿ÷Ï!ƒºßíïßü¾ÐZñãªÕßÌ›¿gßþ¸˜Ø÷?þT§ÓÆDG?ÿÒËF£±¤ôا_|¹ïÀÁ¨ÈÈ…‹—lß¹³´ìĸ1c¶ïØùõÜy;v펎ŠâXö‡ÿ’¤`ɲå…ÅÅ‹–,­­¯9|˜ïyCm]ݳ/¼8cúô-Û¶/øá‡ñãÆÊŠÂ@…§ò­»÷ìÍÊÌØ°ióÀ9Ó¦L>lØòWÆÄDG„‡wtthµÚ¼C‡Þÿèã»w–WTºÝî9·Ýš–šr¤ €eعß}/BbBÂþ÷ÔªµkÌÔÕ×K²tÇ­·¤¥¦),rº\r²1ÆmmíϽôÊê5kœ.W˜èhQ”š[Z&MoíèX¸xñcü=6&&**jɲåW\6;)11$$¤²ªºÃÚ1iâ„ȈˆŽŽŽ‹ÇDGÏš1ƒn¯ÿ”Vÿñ²ó]sÕÓ¦L6dpAA¡ ¸wíÞ“; §¼¢â`Þ¡k®ºjʤ‰“'N˜›û¿ÿm¸±Ÿ}ùUk[ûÄ ã?þì󯦦›íŠËfÿ塇ޗ•½øì3f×î=!I’¼óZ¬V:ïRk[› ƒß‚Ó 7§6mÙJºûŽ;ÒÒRS’“ÖoØät:Ë++sä¬^»!|÷œ9Y™™—Θ1lÈÐW_x^’Å?ýl`n.˲o½û.!Äát¾üüsááaáaa¯½ôÂæ-[].ÆX–»*¤$Imíí!‡ÓÙ5ÿ Ì zñ­÷ßswLt´Åb 0Òw Céñ²g_|éÑþ{÷Þ}ù…Õ5µ·ßzËðaC[ÛZ݃ý ³Åò§îŸ2iÒ’”˜ðÉûï]>{–Õj5èõ]eô:!B_Ï—÷á»ï\uùe´ºŠ¢HOƒ5Ï#„ô:¬ÈŠ¢°,»wßþå?®¼ïž»èªkj›¬V«ÓåòmaŸ ýŠ¢L›2ùõW^Z²lÅï¼’›;àÓ/¿´Ù:FŽ1røð7_}eɲåï}ô1ÏóŠ,ëu:„P»Ù¬VónÁý§ûï  Rq\` I§ÓÑaíBCCè—1Ýè_Þ©ÐhÔCv)èmw¿òÂsÆ}ò¹çwïÝwÅìY-­­ŸõõAƒT*Õ³OþoâøqO<ýÌ¡ü|ƒ^/+2B¨Óf—eÉårfgfÜrÓ.A B……†j´Z“)@V„Ã2Ýç¿]·ÂTÇó|o7øò­?õÌ‘ÂÂÌŒŒ=ûö#„›š[ÛÚ¦NšøÔãÿýè½wF~÷œ;~èÁ7ßyoɲåssó éB***SS’#ÂõZm]}CJr׸ži©©EÅôqyEeFz}ÜÔÜœœ”„Òjµôê¥J¥Rój„PLt´G;†:t8?"<œa˜â£%}úÙÓÿ{<2"‚–Ÿ2iâ'¼g±Z÷í?à»9'oó2 ³oÿ£ÇJ‚ƒƒNœ(G]6ëÒÛïºçž;ç»÷î=vüxppPEE%B(..öÕ7ßþïcÿwÕ—;o¾$IƒA­Vwtt¸ÝnY–, BÈÚÑ|¢¼â‹¯¿ ´Ûí·ßrszJʼï”(¯¬¬Â œVƒÓ’$é‡ÅKTÿò+'ÊË3ÒÓ§M™¼zÝ:ß2ÿüïã—Ïò–©ÈÌH›:yòÂÅKV¬\ÕÞÞn0è~èÁÛn¾éÃ?ݲm{QqñKÏ=ÛÒÚzÓíwd¤§mØ´ùÈ‘‚[nºñƒ?á8Îív˲< 'Ûw[N™›—çùæ––°°Ðî½G£ÑDFDlÛ±ó×^­R©ZZ[ÃÂBï»çnF3tÈàÐÈȈ쬬ø¸øæ––èÈÈ¸ØØô´ÔäÄÄ ÀÀÜÂÂB““³22èÜñq±QQQÑÑQ“&L`6$8ø×]˲,\è}bF!JCcã¬Kg̘>Ö“šÚº»æÜŽ" ihlœ}éÌiS&ë´ÚÁƒšFáñˆn·;)11::j@NNxXXb||fFºÉdåö¸C‚ƒcc¢£##3ÒÓFŽn1[&N?mÊd:Ã*ÔIЛ·Bξtæô©S†™4a¼$K“'M¼|Ö,ßTKŽcëêxË7°,;aÜXF•‘qË7p›––š•iw8R’“ÂÂÂÆ=µLpðÉ2v{JJrXh¨ÃáÈÊÌœõör¤Kö&bCgà[뼑Ð[ ½¼±Ô[L–„NésÛ#x"„~²Lzëó.C§öí]LË#ïóS7¤çܼ¾-©ËgÏê Уî{³½Kún³÷1}à}Ú£vºö=øÖ.Œñ?þöWï9uÊì-Ù£÷¨Š=žöþΠGUéQÙN÷:Ƙeqï…ô¨Þ?Y¦wEíµötïöüà6²Ç¬.ô¯ÞóÎÎOŒá×ñÁï TH~pž ~B?ø³´Ñ[Ø„°§ÞFðÞ•îïíþE–e‚Ó=Nä€óC¡>>·õ©GÂϯ)#˲wdDk>!ÞWdY¦ÉÍt Ãp"„˜^9Hgú1Æl¯õƒL Ð/úÌ7àœ"„03?¯ñsš#?Y†võ]ïGh€Þ>§ÛNéÍ‹º‡hF>]h´w¶ï+å‡ç''%ѱ„è‹扢HMýñs€‹ éFŸzÇõÖR„¢( -Þ½g¯V£Y¸hqMmmvVV.Št. ÒÝ¡€³C|0 Szüø§_|yüøñ¬¬LÇùö±ò¢c2ñÕ×»÷îMNJ2èõ’,{söQw°íQÆ»(ß2Õ55ß-Xàtºâiå_¹zõ÷ `&1>Þát®øqåÒå+jkë23ÒY–-,*žûÝ÷Ûwî é{äNŒ±Ùlyùµ7<ÑÛÅÀ{îìíÂà=)=^¶zí:ï[t!?,YZPX„ üF|«bÑÑ£ï~ðmˆøŒ¾båª-۶͘>íãϾyÔˆ=Òµ8'¿š·BÒæï3/¼˜š’RZVöôsÏ#Ÿˆï0ÇO=Ãó<Æøÿþõ— p§ž¤öYÆ›[ï{ý§øèÑ­ÛwnÚ²…®Éç_~½nÃÆ¡C†¼ùλÛvìäUª¶ö¶s÷<øé—_!„ÚÚÛ’R’“Ÿ~þy›­³ïñúB_~óͼïœ(/ þañ’aC‡457¿ðò+Ó§N=ZR²rõFýâ+¯­]¿!,,”e™šÚÚ©“'mÚ²õ‹¯¿ÙwàÀ„qãöîß·}ÇÎí;wÖ742¸¿&p£ûOAaá'Ÿ¹iË–¤„„¯¾»rõêêÚÚ‘#†ÿâϾüêHAa\\ì{~$ŠR»Ù¼wß~VºÛ’,¿óþéi©¶ÎÎϾørô¨‘ý½eà‚t²B~ñåú¸jÍÚ˜èè9·Ý:~ìØ¹ß}Ÿ“•F¯ÔÕ×úÅ—KW¬ˆŽŠ,¯¨¨©­ýÏcÿ7zÔÈÍ[·étºW¯q:I‰‰ï~ðÑ×sçrœª¡¡±¾¡áßýßèQ#·nßNÉHOGy<â'Ÿþõܹ.AÈÎÊJKMÕé´­­mÇw¹\Ÿ|þÅc>2zÔH“1`é?^qÙìÁƒeedØíöâ£%3¦OKLHHJJ,/¯°Z;.½t½5ÛÇxýcGNMI¹ùÆF R^Y¹wÿþü‚‚…‹–TUU¯Û°Q’åÔ””Ûn¾iðÀÜ?ù´££ƒž¼öÖÛI‰‰×_w-ÆÈíöŒ3ú±GY¹fMSs3‚8àlÑzóÞ‡ n÷·Þ1zäȬÌÌ;o¿M£V1ü¾{ªÚ²mÛØÑ£ädß~ËÍÑQQW^6{@N6ÍA }ÜE9—çp:ívûþƒyý½YàBu²B Â]wÜn0š[ZâBZ­64$8ïpþ˯½þ—G=˜whÙŠóçßulj‰‰5µu±11t!Q‘‘MMÆ NOMûnÁÂÖÖÖÿ<öب‘#ê½e"#"ÚZÛBãù 4·´üç±ÇF Ac©è%IBµµ·«T\XhB(66Vp ²,sWS[»pñ’Ûo¹™.aÝú |ò©N¯£×£¼›sJè ÓëõY3Ó§LÙ°isiéñ‡z`ÑÒ¥õ ³fΨ¬ªZ»~}k{;ÇrN— R©B¯¿übCCã·ó¿—$‰çUtĸ˜¨(‡ÃÙß?¸€ÑSܧÿ÷xxX臟|f±Z#""ŒƤÄD–eÎß²u˲ŠBL¦€°Èˆc€111Î$Á2L÷™2Ñëô<Ïó<hêïÍ*Ÿ öá'ŸY;:"#" ‹ŠB‡Ób±8ðÖ›nzø¡‡ÒRSîºãŽÓ§}øé§ee'ããïšR±©¹)<,tüر±±1š9czllL ÉUÚ]¦±©)&&š>.,.ž1}ZttTLL4½èÏó¼Z­F…‡‡;]®êšZ„PUuµÑhdY¶Ãf{áåWï¹kNî€Zþê+¯Ø¸zem]ÝÎÝ»ûžª!d4è].ç·ó¿3[,³/½tÓ–­uõõÿËÃßÿ°H¥Ø˜˜ùß/°;œƒæZ¬½N—¤`ç®Ý­­mS&OܾcGÙ‰n·»³ÓŽjkoWˆ‚8[tÚçÒãÇÇ[]S³eë¶Ø˜èÊʪW­nljúná¹rŒFƒÃáp8œ6»!dn7»\Bhßs¿ûþ‡%K.Zìrº"?®Z½aÓæú††þÞ,p¡êQ!×oØxý®=|¤`Þ÷ žyá…Ô”äœì¬¨¨(:6xaqQNv¶Šãæ/X0aü8I”ÞyÿÃ7ßyWÜ3/¹äí÷Þ?RP8cÚÔO?ÿr˶mEÅÅ'Œ—$Ù·Ì»|XPTtÉÔ©Ÿ~ñåÖmÛ‹Š‹†Ù»ÿÆ-[ò^½všç§OúÞ‡-]ñã·óçß|Ãõn·ûê?^ßn1K¢´uÛv†a–ýøã¶;6oÝæt:£"£|7çäµ~EQ´ZmBB|m]]fFz@€1:*jü¸±‘Q‘‘S&MŠˆÏÎΪªª²ZmÓ¦L3z”ÓédYÖf³í?pð¸vìèÑ Ã¦§§…ë´ÚÌôtF÷{ÁYc¦¨øè¶;Æ{Í•W„„„šš[šÇ“œ”¸k÷Þ”ääIÆGEFÄÇÅEGEiµÚŒô4­V[Rr¬¢²ÒãñtÚí™™#† Ý»ÿ€Ñhœ4a|Zjjo¸Py+䄱c¯¾êJ£Ñ8(w@ÞáÃ)ÉÉ÷Þu'ÇqÞ{¼µuõë7nŒ‹»kν~ÔÈ¥Çs÷ç‡ÐëõUÕÕáaaãÆŽÁðºk0hŒ‘ÏøÑ²¢0ÓÏž¹{?í5‚ºSÜh¯]Î;¾O1­¨]Å…tWTo·Fß§œÒw> ßbÞ×}Æë—Qw6§oh%Ý]mI÷ÂÏP†öÝ¥_Áq\×AÃtÅgïêѼ|ºï û®aÏÐïÛEØ»1Þ=ºÈ÷Þ‹ØÓ ÐÀÙ9ÝL}f蟬± ƒN-ü&~æ€øgÖ¿whý™eú¹§.Á·¯/:cµ‡.àw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~B?øýàw ô€ßÐ~‡ëï€s‚röÆ#ü,ç÷ö]Ý_ÁBÎ×ÀùAÁ#„è¿¿~Q¿~9¿“ž~ VU]Uz¼3Á!pÃK²ÔaëP#L~a\£Á F­Fëp:Nǹ^a£Á¨Qkì»Ãé g¿tµÎv!„¢D„GDEDq¦SFZ†Ûí>?G68w0Ʋ,·´µÄDÅt5gÏ"°„0eXŽc££¢ÎixTdÙ%¸c@@€V£%„œÍ:ÿ¼í"ˆÈ²ìètpŠ¢ÀÀE€ÂqœÅjQ«ÕI‰IЬœ]È&ˆ0 ÓÞÞ¾?oÿÈá#LŠ¢œ³hŒX†­ol()=6iü$Z£Ÿ›ØO·Ël1>tnó.*Š¢0 #K²Kp1ÌÙ$1ÒCÂHQ5Ï»Ýîs×>¦ßÅó¼,Ë!§Ëyîþ2]ÛEœ»¯€ócLQˆrÖ9,¤ÆXQ.Ïí Óï"çö !„þU†äNÀE‡¢(Š¢(¨;sFQ…–a|/ɲŒ1öžȲÌ0 ÄŠ¬¥”oúòI˜9Ý:ø¾{æÂôU¢zž®ƒ,Ëô¸›ï:ЭëqZó“«$c™‚†Ð¸ÑJ㣢(†W©:ívo³š¢ÓédYö&¹ A$IB)ŒÒ;"ÚY•IDATÇc¬æy(Ò…°,ËqœÇãéýí¾—V0²"ó<’$étíú®CN÷ s@Á‰’äp8|º¢(Z­–"B@Ïtú\+3]yýýýÀo cL›ÏŠ¢ÐÖ±Á`Ø´eKaQñ½wÝÉ0 =*èõúEK–ÆÆÄ :Äív³,ûùW_O76..Îãñx[ßt™„–eNç¡üÃéi齞ޮ­¯ËÎÌbY¶«B!BˆJ¥jhlTE§Óʲh *:Z¬(JrR²F­î3úwš( !„çùÆÆ¦Ï¾úŠe†e‡ 2}êzØ`F’$ƒÁ°nÃFŽe§Lžäp:9–õ.Ó-Š*•Š.ž+Ðô]zM c 9.6ô¢¶7’J’ôãª5ó,¬©­å8c¬â8‡Ãq /¯¢ªR§Ó!„:::vîÚÝn¶0LwVˆoƒc,JbYEyiY)Ë²Š¢;Z][#Ë2]&Ã0,à „8–UÅbµX,fY’ Bµu5«5:*JÕ}Û çýgܽڄ(ŠÂ²lKkkaQñ¤‰F¹xé²oæÍ×étÇ ‚ÀqœZÍ=ZRZÊqœZ¥r»Ý#µZÝÒÚúòëo ‚@Qq!DEžç½ç@Þ”Nhõ.6„Y‘i°ÓjµGKJt:í·Ýºvý†ü=»©¹ùãϾðˆžâ£G§OZRrì?TqªÖ¶6­V+Š’Òû}—‰–e%.&Öét¶›Û.ƒ™ð°p„Pm}]}C=ÆLjRrpPPáÑb§Óië´%Ä%ˆ’hw8›šDIlhlt{ª³32yžÏ/<’–œª×ëibýŠBHB|ü„qãt:]llÌ3Ï¿0{挕kÖ–WTÄÅÆ>tÿ½F¥â†Y²|E~A) àÞ»î\±rõö;­VËŸx€ãØyß/$yú”ÉãÆŽ7=  ¡Zý€‹A!…(Š¬È²,Ë2˲;wï1èõé÷ÂÅKŒFý‹Ï<5 ;Ûát|5wîØQ£žøÏ¿""ÂÁåm÷¼bŽ!ŠJ¥ÊHËÈ/,¨ª®ÎÌÈ`ÆbµVVUf¦gFGE•ž(«¬©¶;#‡ˆŽŠ&ˆtØl²,G„‡‡‡äæ D±µ­­ÓÞérºt:]¯PE–eEQYVÅíq[;:šššB‚‚ ã²WîÙ·ÖŒkÖ­ß²u»V«E—;¶`ÑâiS&Ÿ(/ÿfÞü+.›•œ”øçˆ‹ýð“OFcFzê›ï½×Ùi§Ýèò´úŒ1"H!ŠBD …EÅ‚[°vØÚÛÛ ‹,˨#t:½) ÀawX­ÖÁƒ™L:­NQˆï…‘wP1Æ’$EEF¶¶µôzS€ ât:Õ¼:",Ü ×WÕT·›ÛƒL&­V¯V«é‡.DÅ©ÔjulLLSs³­Ó©âTnÛwá'/Ë…¢æÕƒV«]³~Ç²Š¬¢ÔÔÕM2966¦ôøñà`‹ÅŠ©«oÈ0``n.FˆSq‰ ¢(š-ÖÐÐPI”®¼ì2ïÑäNŒ!ÃpÑ¡T–d£Á°kÏ^‡Óñ櫯ï¼ÿÁò•+'M˜ðÕ7ߺ\®ƒ‡ ÈÉtß½‰ ¡¤Ä„ð°PFCyå7ïºý¶1£FÖ74DEEò*žeYY–}³BÙ»îº+22’æ·ö÷ï¿ Ã0‚ ˆ¢¨Õh%IB‹’8xàÀð°0·Ûœ”dÐëGÑÒÚ:vÌèŒôôƱ,çr S&NLJJdV!#$É’Ùbމ¡·d !,à F½NGc3ƒ±^§ 4†‡‡¹=S€))>^«Õ˜ìv{pp0=0Œƒ!ÀhT©Tjžï´Û1fR’’%I¢Q—a·ÛÝÒÚv2U­ŽŽŽâU|``àuW_•™a4“KËN°,™’œDJNJš8~܉ò ÁíŽŽŠ  KKKE„DGEŽ6ÌãñÔÖÕ…†„DFDx1Š¢446à;v 4Èãñ@è\мcø8Žà `Q !†e‡Ó‰1æ8N«ÑtÚí½^ÅóŠ,;].QX†‘eÙátÒû®,Ëz<žòªòQÃG°Ý©“c–eiâ?Åqà*•ЦÓÐu`Y$ÉÆј‹±$I,ËîÏ;%Š]­~Žã::: Š‹r2sè·Ó\R£Ñ@ÓðN§ÛíFiµZV«(J§ÝŽ 0N§¬(F£uÓj4Z®³³S’¤€#ÇrnÇétÒÅ2 #ÉRÞ¡<¸à¸Xt7_»;Œ1z ÃB< ,ËZ;:hIÚ}×l6û>¥ý°èÇ}/úÐàîÛJö†oši $I¾‡/Ú3€cÙààžZpט£Þ¿¢(¶¶¶y—IÏ<G§ÝŽ»sC[ÚÚ†Áµ´¶âî•w8v;½Ç`6[BL÷Ç錎e ¡pQÁ…ÐloxíΡìù¸wŽMǸ;ÝÞûzYgx«EQxž”;ŸÚá–iPw†ÏÉ ñéPæ}÷X7E!§¾ˆºï{Ëû~œÞéEá¸hЊ¬…^œ9ëE1 £…výUŸ¦ÿío‚^Û‘…ÁŒ¢(,Ãþæ“´œò'ÂX’%Ì@«p‘eY¯ÓÛl¶¶ö¶³£a…(,Ë&Æ'646†³šðåg~’Ùáp&%&Y­Ö³eúço—¬È&СpQa&:*Úî°åWMw¥ÓêÔjµÓét ®sú"ãÐ0µZ­Óê\‚ë\OÏd1[ ô.*ôöl )ðWÆPI’DQÔh4z½þ\¯3ý.µZM:wˆB–Q…Ã>ÎõæÀ¹FCYŸ96¿t9 Ã…ˆŠxÖùü|!Dͪ1Æœ(‰v‡½GÆ€‹!D”DQ9Žå´-˰úÀAç4Ýæ4ŸÓ éòy5ϱ‡1f–aÆî„B‘_™úKy{ŸÛí"D¥R!„8B=®¿£ü¾ÑN¹u unŸÃôž.,ËFFD"„šš›|{uýæQÂÃ"† è cÜÐÔ ÓjãbbE9—¹ˆa»Ã^×P‡Š3Œçè1²,7·¶X¬Ü ½(Š"‰bljêyø.BH´1ª¾¡!-tO.¾ˆã8EQŠ‹ŽB耾œ:ÒιC‘c„–»G;G_¤( Aa˜ úrÞSÏçBVô©W(ö6ÆÏܶ÷[ägdmÒVå0 Ó5ŽôÙ¦áôõ½ÃÈp§b:3M¾¤I8ttêèÊô]ï¸ÿôuï§|“÷{!zÌ€dY¦s¿ð¼šãXzõÉ;cpŸ¼ ¥_Á0 [¦÷ÑZýÐo´$„ð*¾¾±¡¸ä(ÇrÇ•WUž¨(Wój–eyïò*•Šçùü‚#6›çyžç9ŽãXÎátvÚ;5j5 Óôõ¾¾îä!„çùÒ²ã;÷î.(.Üw`ŸµÃJ'jž§£{rG:}À`¬æy–aèT\Ç©ÕjQͳZ­îµmú o§Ì¢E'þ¢¯)ŠLq{ÜV«µ±¹ÑíñÐY±ZÛÚ*«*.f«ÕZY]Õnn'ˆ”–•—”´¶·cŒEIª®­±X-?9>³$KI ‰S&N -+?Áó¼Ó鬬©v8 ÃX¬VzÑa³I’ä„Êêj‡ÃÁqœÓå´X--­-•UÕGŠ i_oïzŒÐ}:õ*9ÆÈ{ ‡ •JU][s¤¨ ¡©ñ@ÞAÇSSW[rü˜Ãéôx<,Ã4·¶Øíö’ÒcÕ5Õn·Ûî°·´¶Ê²\X\dëì<~âDKk«wÖß>aÌX;:›ìv»)Àd·Û‹JŠGÑÑ£.A8QQ^×P1>RTÐnn?z¬Äît•»Ýº¼üà Ö‹Çãilj’eùäŒ „„~èÓ)×Ç ! ö3 à ‚Y 3rlPPPYù‰¦ææÜìœA¹ƒ,Ë1QÑz½^QˆàvGEFGGD Êd¶˜ÛÍí¼Jåp8›O¶¡çyŒÓéÌ/,ðˆâ€¬œšÚ‡Ã¡R©Ì³ÅbNŠOhmkkln 0÷ÿ·wæÑQUy¿÷¾ýUUjIU ©„TØBB6YB³Ù"bO〸€â ŠÎ™?æô™ì92g–3Ë™Ój#¢­s´[{(ˆ D°e!!Q– $$„ ©Põö÷îüq¡(CpÆia¼Ÿ¿^Ý÷ÞïÞ[uÎ÷½úÝßýýôþX?Ïq}W®\,;?BLCsã  H cXUUURRbMÚL¡P(I:.tŒŠD’I”½®ë$ü†ç¸–ÖVÝÔ#yù¢(’ðÝ0LÓxžäKˆ'â’(1 à ƴLÇqxž‡& €(d¥c,BsK xBQ±~=‘ÙÖK¢w ÓdYWâ üÙIBŒJ‚A ‰çÁ !„Žã˜–Ås¹˜eØøÕUU4®ŸB¡P†`ÐË0ÆØ²,’ñØq €i™ Ãü~âQÁó'ð<9†úÒ|v0ÆvH4'9E*>Ê!Àø[]&ËÊ;sG²,{ÜžÔ{S7 ¤žJF÷CE^pp²¯k¯ýTú) eH;Bnì҂в¬ì¬l€®©[ºR½ê¶s#ýrjû©®mòºvp­-%Ä(yûw¤ºÕ©Ý¿a‘J?…B¡ †H$¼u7Û¶ý>¸¾³÷êë†Ó¤î¾M“B*ý …r3B„ªªÇqœ!B‰’r쥢¡¦ë@ˆ€¦ë$ó_z½ö0@QTžç©ôS(Ê„ÒCÝ==—z{owG¤"X(˜ 8×Þβìízñ‡Ð¶,—Ëð¨ôS(Ê`0Æ¢(fg¸3)û“I\²ë¶öˆ1–$©«³‹J?…B¡ ÁµP™;õž*÷·µGŒ±mÛc*ý …rKnߢëÝí‘îæ¥P(”Tú) åGÇ->I?×í+œ¬#óÃZv0Nn‹¸Ùxr£Ýÿd^Éò7 …òÿ‰[J¿Ûífd¦®ëßq?QÒï+ß$g… Žm«šæ\/B³Î:Žó}K¢È±,€;Π”uc–e%QÔ Ã0ÌïVu’²ãάïS(Êdé'%€:Üwåʨ‚H8'ÇÁ8™ (™Wˆ\ɲ,ÏóñxœÄ¢’öÔò•d¹š<’é&ž?{î܉ֶP(8nÌAdYÖ4ØOG¹\®x<µ^° o½ýGªkEiýúëû¦Lñ¦¥Ù¶mÛ¶Ëå"JîózEIbY¶»§§¦îØÄ²RMÓB>ŸOÝ0Bi,Ë<Çñ<ïö¸Iò#Œ±,Ëuõõ¯¿ùËrÕµµ9#FDòwîÚÎÉñz½Žãø|>I!„†aì©ü²dB1„@àˆã8Dz,–e}^¯(Šº®»dY]×!’$½´î}}ººJK&„‚AQ%Qt0ÆÿÛ¯^éíí ÓsssÓ<–ãt]—$Ñ%»\.—iš’$¥¹Ý.—ÜÐØtàÐáéÓî“DQv¹X–%ùM½ii²Ë%™ÎÝþ) å{À0LOOÏÍ¥¡mÛGªk^xnõÂÄãq]×?ß½{BqqF(T]S›žCÛ¶¨iÚÂlþd˾UÑhôûçcŒ?Üü±K–-|0¡(_îÿª»»;ðûýþæã-÷Ï›[Ÿ¯jš(Š MÍ·ûo×þµ®ë–e<|xÃ[¿ihj^úÈbY–ûÁï?xQumÝÆß¼}þÂ…‡ZØÙÕ †²2‡ïÙ[9eò¤ØÀ@å¾ý.YþÙ¢‡=jšæOÊˉvÛýÔò'gL›¦ëzoïå»vEû®hš¶lÉ’Ý{÷66ìÑ%‘üÈÙsç>’“=gö¬–Ö¶óçÏǘ?¿¾±±îXýÔÉ“däÈ­­§NŸéìê]PP>s†ã8[**úú®ÓÓ§M’––F=B åžc°Ýq0Ã0+W,ïwïÿÕK¿<ÑÚæóy+÷íßSù%Dzï¼÷[]×_Y¿¾¹¥%===‹ñøÃ&UQ×oÜèõ¦mÙ¶}Oå>Q_]¿Á0-–eãW¯.Zø `峫?Þº‘ {½^EQ^}}ƒiY²,Û¶ÍóüæO¶´µµa€ß}ÿƒ®‹ÝÿOÿ|5çy⬳gÏóôŠ–ÖÖ±cF¯YýìšÕÏVîÛgYöOçÏ{òñÇŽ54,}ä‘gÿ왟Ì*Gº\2Ïq³ËË_öhA$ÿäÉSuÇŽýÅ‹/<¾ìÑÑ£FQѧP(÷(CGøl­¨È†JK&lÞ²åâÅîùóænÚ¼ù×o¼ñIJeºn”L(._¸öåuƒâ¢¢ mm_‹‚èózGE"‹,p»Ýªª&Š’H(ª¢(êÀÀ€i˜ÇqAhj>ÞÙÕ5uÊäü¼ÜžK—,ÛRµ¦¶vø°Œw÷¾e[óæÌnim5M³¿¿ÿhuÍ´©S-Ëêèè¸É¿t©WÓõæÏ/7×ù½¾ôô@,60±¬TÕ4 ¦i¶m#mËÒ =žP® Ä ÛvTU½z5ÞßߟWìÜyö칯ª†sr „±@(þd÷Þ½Y™™ ~z$ä©3gjêêæÍ™•™¹{ïÞ–ÖVÇ•ÕÞÞ1«|æ¹ööP0˜—>yúô´û¦r,Ë0L}cãGŸl9PuP’Ä×<ïv¹Y–ýô³Ï³³²"ù#ëêë/vwgC÷Ï›«Æ{öN(Ÿ3"gÛŽ_Ÿ<éóyËJJ6}´¹¦öXáØ±‹ÿäá]_ìnïè(Ÿ9CUŽãZZ[ëêêÔÔ|sêÔ˜QѾ¾éÓî‹F£–iŽÛÞÑ>eÒ¤Q±XlÛöŸ®»§G–å¢Â¼p¸º¶öÓÏ¿àX.L×u=˜ž.KRqqÑñ' ÇŽ-Ÿ9c[ÅŽºúú®‹çÏ“$¿: …Bù¿Yæº6¯,Kšª!†á8.‘H¤¥¥UlßÑÔÒ²î—kãñDz E‘e!dYyA6MSÛ² Óà8ŽT¡ÔuxÃÉe†a}‚ @tÝe™¬ô ‚@Bz8ŽSU•AH’¤dêjÃ0ˆ5¹ ¨jšÇcYÃ0ÂdAKA’¡ŸŽãp§ë:Ã0 ƒLÓJÚ‘$É2M–c Ý€‘ÞY–%SfY–Ä}’ RÃ0DQ0M!&--­³³ók_ú‡u/ggeѲÆ å^njjÚá+AÛ2‰®éº¾»²rÉâÅ@Œ±iY¢(Z–€*ŠB"îUU%Áï¤ú»ªjAÃ0Èeªª 1Hâñ8¹7ÙBdP„ªj‚TeO$ÄŽ$Ф‘Ú'õWÓ´äD „ª¦!-˲¬o #‘H@uÓ„€ë,Ë"‘£äq•jGQTI’êŽÕ8x°çRoIqqVf&Õ} …r/2´ô“ ^@ˆ®iúÓ+–.(P%YB>)yI—wò€œºfä¦Ë†lL¶ :EŒ yKr ƒÄwÐG‡Ƶçз'žZãx†a,Ë92ü¡)*,¤® …ròß'm&É&––wÍÝðÝÄqŸ×;sÆtŒ±¢(w{8 …ò¿„7U‘’¤Wçnø.cšfÒ…E¿ …ro‘T{!Äó<¸SÅh( …r· ˼!6Ö××Ól …òc!Fÿ ­;¼àçå%tEXtdate:create2013-09-27T11:09:37-04:00Yþ%tEXtdate:modify2013-09-27T11:09:37-04:00kEáBtEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/login.txt000066400000000000000000000014221330160122500226400ustar00rootroot00000000000000By Default on a SELinux Targeted Policy system, all users login using the unconfined_t user. But SELinux has a very powerful concept called confined users. You can setup individual users on your system to login with different SELinux user types. This Login Mapping Screen allows you to map a Linux login user to an SELinux User. Default SELinux Users: * Terminal user/ssh - guest_u - No Network, No setuid, no exec in homedir * Browser user/kiosk - xguest_u - Web access ports only. No setuid, no exec in homedir * Full Desktop user - User_u - Full Network, No SETUID. * Confined Admin/Desktop User - Staff_u - Full Network, sudo to admin only, no root password. Usually a confined admin * Unconfined user - unconfined_u (Default) - SELinux does not block access. selinux-python-2.8/sepolicy/sepolicy/help/login_default.png000066400000000000000000001213201330160122500243110ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìÝu|Göð7»+–,33CffjÓ4enš¶)·wíýz½^™™)mSH“´IÃÌÌèâ8Ž™™+-ÌïµÅqÒ^ÉMô¾—OO–F«]iöíîìÌræÌ™êêjÐét²$„B—BH[[[KK‹ŸŸW[[ëï˜HF}„ºœÉ²œ——×ÚÚÊi4š¤¤$Y–%IêîµB!ô'bY6!!áàÁƒœ,Ë IÃ0ݽV!„þD¢(ªT*FÃQJ•§\B]ÆdYný÷Bè²ç õœëo¼Í‹þî'„Nç®g”Úèþøw~Ð9/À…_½øÒ~ÿŠ!ÔΆ~lðA%æ², ”Rå„C  €ȲÌ0Œò(¯*·£þW®{W²,˲Ü)L3 CeY Þò¯¨ù®5QÖeø­+†ÐŸD©œJÍWêü…ÎN(¥œë ݽÚèr¦œÎ3 ÃrœÍf—)Õ¨U I’S¦ýUÇÙìv•JÅ2 ˆ¢(J’Z¥:ÿ¤ûìÙ7!@)Ã0îuRj³óÀ¢Ñ¨9ŽAiÚT Øí¼JÅɲ,Sª,ÿü«×§BœNA’%V«œNA¦²F­–)…Ž£”²|p'Ü^‚‹^7tz ¡ÿ•²qÇ0ŒÃáF#˲(Š®­]U£°Ú¡?—Qœ·dźí»GÏ”¤×žzbÛžýïÌ™«Óé,V[jBÜëÿyüþÿ¼ð¯ûfõé‘B€l;ttÅÆ-o?ó¤F£¦2eXÖét€F­v8,Ë2 !@(¥§S«ÑÈ” ‚À2 ït>þÒµõ ;ûÖ£ÂC !lj‚`±ÙþûÖ÷ßvcv^þ™âÒgÿñÝn×é´”¶‡{§ÃA4$I‡Ã`0Ì[ºrÉÚ ¯ÿûñ>éiU5µÿ÷Ê[Éñ±ÿ~ð˱,+K’ST*!À0¬(¢$©T*×K V«ÂP ¢(I’¤Ñh(¥‡ƒeYF @€R‡Ó©ËúŸÈ²Ìq\iEeK[[ïÔ päD¶¯·9*,TE÷ØÞ9ô6ø ?“$˽~çþƒ‹V¯{ùÿþTXZmV«¯÷§¯<ïp:†NÁÎó’$ N§36*âÚ©“DQ¬ª­Jm<B)-.+ ijnq8¢(©T\dxXAq Ã0aA2¥ ¡©ù‰ûfõIK}êõw~\¹æÙf³·—)7ÿŒF­ŽŒ¨­o8‘{JD_Ÿ^©ÉpÎm„~Y–9–­¬©ýâ‡ï»í&BÈ'ßÍàö›c£"N§{Ç}×¹þÙ³þî^yt™“D14(0:"|õ¦­Ãö9¨?p×ÚfùvñR›ÍÞ¯g‘ƒú3„PJEIdY6¯ h妭=’â_ýø ­FÓÔÒ’žœ8iäð7>ûrÎë/mعûtAñ¨!,_ußm7}òÝüÙ·Þêp:eJµjõ¶½²róZÛ,Ó&ŒÙ¹ÿÐw‹—©Ô*_³×ƒwÞÂqœŠãö:z¦¤tHß^ï}õí™âR³94(ðHfö«OþC¯Ó>ûö‡O>p·¿¯7ØìüÐþ}l<ÿÅ?žý²gJ’Ù¬V« z½$Ë“F(¯®þ÷kïüãî;Ç Üf±¨8N¹`çyA”¼ó–ž)Iÿ|áµë®˜tÅø1>÷Êš-;L=Ë2@@§Ñ<žyª è£Ÿñ6›!ÿxáµ#'²MFCHP@¿ô-mmf/• !þÃô{ø™—žzp6aÈ‘Y”Ò¡ýûæœ>³mßýG3ûß|õ•³ÿýln~Á˜¡ƒedí>tdÃŽÝ­m–[¯¹jêØQO¼ôFqYÅ–=ûú¦§ÕÔ5,^½þ©‡føú>ýÈýaAV› o£ßF–)Ã0zV”$  Ój†‘eÚi¨nmýݽæèrF)ÕhÔùEÅ9§Ï í×G­âÞúüëúÆFJ©Ñ ¿éª+N'CˆÓ)€’ŠJƒ^Ï2ÄÎ;¨,S™R†µŠSqœŠåšZZΗÖÔÕS*SYjm³ôººÆF§Ã¡4ý€çg^?#51AEÏëtÚªÚºÊê›Ýîíe²ÙùêÚ:›Í.ɲ^§E±¸¬ÜÜbò1{]3yâ¼¥+ŒzýÄ‘ÃÜw6‹mh¿>½ôlÿži V¬V©TåUÕïÎùfìð!!ÁNQdÊÂ0›LÅe[öîÜ·wxH°,˵ª¦®®¢ªÚát²«R©¬6{ZRüÈÁýN§$IN§CÜ Ño#Sª×j÷9úù¼…wÝp |þÄÀ¾}l<Ïœ×ÖßÞÃGé²ÖÝ+.g”R¤¡©yñšõß-^®Õjî¼~Fb\lqYEKkÛì§ž³Úl)ñ±/>þˆÙËëû%+!zvü°!^F¥²N«%(†a¢#†öïûþ×ß ú˜ˆˆ ;vç•|øÂßž37<8hò˜N§”õúÖ6‹ƒçmèOE)åXi³ÙtN£q8²L)œíÓ¢ô²?§*¶÷Þl/#SÊ0ŒZ¥âŽeeYv ‚F­V«TAp:j•JyŸr¡àúh¥¯›Ã)ôZ§SPºB€C@£ÕÚìvJeˆQ¯áýO¼L¦ÇgÏlimSº™*{! Ë2i†ª9N¦´±¥Õhг×ÕÊ&(N-­F½žcYAôz]IEå ï}üÄì»úõL¯­¯·Úì>f/Žee î|è÷¡”jÔjŽã¬6èõ:Q”œNgçñŒ”ªÕêcÇŽaô×%‰bÒédY¶ÙíJÿw·«Q*Ë”eÀÙMH{§”R–!²,ó<ϲ¬Ò,®Q«)¥6žçF«VKmå¬ÛÐ0àyž!„c›Í®ôŸW ™R›ÍƲ,¥²F­:žsòHfö›OÿŸƒwó:àB€Reµ¢Èâïm–Ü®›••E‘ðó6‹¢¨Õ¨—®Ûxàx!Ì€^éÉq±­­­F½Þl4Š’¨l²,ãÞ‡~/Þá <¯ôç±Xm¤«óç$rÀ¶~ô—¡”ºîdvYñ$©‹ª(us½Ú)Ç8νAz~r™RPž¤”žW@’$JA%Â0÷Ü|}tXˆÃéì( ÚdJçݘUV’Reì€˲*•Šwð¿´tà8DQr¿Zhïµ¢âÔjµR[¨L5Z5˲vþ—–yÑ%w‰¡L{:å¬_ÙL½^¯R©(¥6›ME³—é˜ÒÝáph4«Õ èTªÿ)'¾ÒJ¦ÑhX–µÛí Õh€»Ýîúôÿé7’© .Å+.ô÷¤ts:u 5»ƒaÂ0(ˆ²Ä² ! atu[Œë´ Z]X\ÜÔÜܧgO $çd.¥459ÉÎó„娢œg)ºŸs¹Î‰ð8ñW¢”ªT*p:ʯ  Ô8ÿÈÙ³~–e[[ÛÊ+*’’\ËQNK†TVf)§œŠkll_I’”ö"ÂJ©Z¥®®®)+¯èÓ«'ªÖªKKÊšš›ÓRS”³oå¤=äuœ/»NØUjU}CÃùKz¶Œ²2@€H²¤¼]y•RªRq;vîÊÈÌ ð÷5r„·÷²•+›[ZAŒKKIÉ/(Я!Äf³UVUGF„»¾ WøfF’$å«s­!ò ËjµúLAassSï^½!Y99”Ò”ädžçÆ} „íjwPv÷ÕFèC(¥,ËjTN£eYVr8–Uéô¼¥M­R+iÉ»tÎ¥«,ËzƒþÈÑcËV¬Rk4ZfûΛ·n5y™L&“V£‘eÙh0øx{FJ©^§óñññññѨÕf//_-v[þk±,ÛÐØØØÔ¤ÕjEQÔjµMMMÍÍïûS @X–e9–0D«Õ445nÙ¶ƒã8–e†ÑjµÞ>ÞÞÞf•ZE1 f//o³ÙìåUU]S]Së­üáe2 ÃÂèuºÒ²ò÷>ø$'7×d4ʲüí¼ùë6lÒh5fo³—ÙË`Ôs*Îìååímööñæ8N­V™½ÍÞ>Þ&/“Z£®îjÉjÚìm6›½ÌÞf–cÛq¬+Žr`Óëõ[¶í˜·paLttiyycc“S>ûò«ººzAp…’²²o¾›'Ë2ÃÖÖ¶]{ö0 £T]“ÉZF«ÕŠ’d49Žó2™”C£ÙlJEQÔé´‡Y²|…J¥R«T[·ïظy‹Ñh0 Þf³F­EI¯Óyyyô:I’´Ùl6›½8Ž3f³Y£V+7¥Û“eám^ô‡"dIö 7 R]öÉšÆæªÊ*[vNtD¬Ñä%˼žîÜà#ËT«ÕšŒe´¯N§Ójµ ZT]S;q¸Á®Y·þð‘£ýúöž~å•ÛwíÎÉ=)âø1cŽ=ZRV6y„¾}z+ƒnºûk¹üɲl0èü´ñÇÅ‹ç|úIZrrΩS÷=ôðÌÛo¿ý–›ÚÚ,¦Y–%2aÃ2¬Z¥6Ãɲ¬Ò¨JJK>ªV«Gà·ÿÀáSy§ÕjUz4³7¥tÏÞ••MMÍ=ÒRôïëp8†U«ÔýúöÞ»ïàà:¢Óé##Â[ZZ7mÞj³Ù{õJONLذs‹Õf#“'Mlhh:–qÂjµz›Í'Œ3 *NåZrZjÊÐ!ƒªªª¶nßÅ0ŒÉd;z$Çq”R†0"#R Êé³2gKuMŠSM™4ñºkfX­Öºúúˆ°ð«§M ð×ét'23M&¥T’d p:?Ͼý­­mjµjöݳ<$ÉÒ¸1c~úùç䤤cÇŽ6ÔËdúúÛïn¹ñ•J%Š’F£1Œ’$QB´Z­F£©¯oX¸hquMÍÄqã°fýúÃGõëÓçª+¦îؽçdn® ãÆŒ>rìXiYù¤ñãúöé­$ì¤ò%4 ]¨L9­¶µ àô_¥-……ª[[«/=zìø¨ÿ> ~ÕY?tÌ1$Ëí;˜$I:vá¢Åûœ2ibP`àƒ‡–®X1nÌèý|,ãDþ™3G3räÒå+öìÛÅ”É&“/lÿ2„»¿zÚ´ðа‡ûçæmÛ~ìŸá¡aS'M´ÛÝîÐtü?˲Çq,ÇqÃ02••³ì¦¦¦¥ËW¥¦$ ÆUkÖåæž>xøÈ´+§ÚyGqIéé3gò rrs aÆŽµqó›Í®ÕhTœÊátôJOOMNþúÛyg g\u¥S´íÀþýôï·ió¶’’²‡¤¥¦:qýÆM Ç32‡ ”_PxðБ‚¢ü3g—¼i˶––Ö•«×'&Ä÷ê™~äèqDũ؎ ²$+ÓÎ577_1erLLôÌ{f¿üÚëuuuÇÕÖÕ¾úæ[<þÄò•«Ôjµ 8•öý†††›·íܽçÊ©SNåÞ¹{÷™Â£ǎ«Uª­Ûv455ùùù~úÅœ>ùT«Õ zAdI’$I–%QQEQ£Ñ,øqѾ&ïïï·ïÀe+V5êÇÅ‹?ž—úȱã£F _º|åž}û'Oœ`0ATv%I–0ö£?!¤ät^Ú!°hQÆömy_}¢Ó“©º¼D}á6æüÅH¢(ˆ¢Á`Ðéõ”R«Õvýµ×¤¦¤¬Z»V„“¹¹<ïÈ>yÒËì%É’V«:xðÀýï¼ýÖ”ä¤5k×»¦3E¥O‹Ùlúè½w£"#o›9+*2ò£÷Þõ2™: ÔP”*m'LG+ŠJ¥6 þ~~å•f³yê”IW^1¹ÍbݽwÔ”ÁûÇÅÆh4j£Á`ÐëMFcZjr´Tooo‡ÓÁ©8–cTœÊÎóWM›ZQU5hÀ€ à@IY–-(**-+ã8ÖÎóa¡¡ô»é†k+*+-Vk\\Ìȑîœ:9'7W§ÓŒíKNKM ð+)-s8'ŒMLˆó÷÷#,Ãr Ë2JƒrÖ¯´ù¢h6™žyêߟ~ø¾Åjýà“O9–õ÷óþ¿ÿùâãf\5Íjµj4Z½^¯×é´·ÙÌ2lZJò€þýÒ{¤µ´¶i4j³—Ëqþ~~‚ ÜpÝumË©¼Ó÷ß{ÝλZ–A4J‹–Õj½vÆô”ää5ëÖ;Γ¹§xŸ}ò¤ÙË,Š’V­2hààAƒn»ùÆäÄĵë6Øí|ÇUJGvt¼F BDž‚‚¤áƒO7mæÝ1÷?p$!Æ÷Š) mmË^èlƒ9w!„çùԔ䂂ù \¶|ž{¤¥Õ××_9u2Ï;¾÷Cz4ƒA?dÐÀ{fÎLOKkhhhiiq:MMWL™bçùyóèt:œpî/Cáy‡^§}í¥>xçÍ×^zA¯ÓòhpãXŽeYŽaYŽc)¯¨8rôøŽ]{LF“ÅbY¹jÍò•«ý|}Ƶ{ïþmÛw–””²,g·ó‡Ój³Y,VÁ)´¶¶±„åXVÅ©DQ´Z­þÕž>tˆ¥Í @Ž=–•}rØ!‡“ÒÚÚzæLÁÚõCƒCü|}««krrNnÛ¾3-%EÞîP–, bCcSxX(Xüó²Sy§mV›ŠS± §¬vûýRÚ~=ªQ«wìÞóÚ›oÏ8!Š’Ÿ¯¯,Ë5uuûضclj¬,Q’ŠKK¶ïعiëÖ3…EV«çùú†F§ÃÑÔÜìt:õ:ý‰ì¬#GžÌ;¥R©–­Xáe2…‡‡}ùõ\•J%Sj³Û“ ŠŠæ-X¸xÉÒ‡§¦$×ÖÕM™8Áî࿟¿0-5E¯Óìßæí·¥&'Õ74677·¶¶Ö76Nž8ÁÎó?,üQ£Ñ(Íýx5Œþ „eÀÆs‚¨jm+;uª6/Ïèë+75q {‘(Ì^sí5‘‘z^éÞ Šbppp\ḻŒŒÊªêiWL=bøÁÃGV­]ëçç{Ã5פ§÷$i˶5µµ‰ ,ËúùùÅÇÅÏ8±rÍ?_Ÿ[nºÑËh”)fþë(“Œk4š>½{SJ‚p~¿Ín«©«ñññQæÃeC¦µµ­©©¹¢¢2::røÐ!™Ù:vú•Scc£u:]VvNUuMP`@rr’Ùlöóó  õñö–$1..V£Ñ0„DÑÛÛ;,,T’Ú;s7xÐÀæ––ü3gÒR“ÃÂB>ÒÔÔ¬R©nºáºú††}µ´´†…†^1e²Ín ðóõ ññö!%)±WÏôìœÜêêš–Ö¶‘Ær*Né›$ˆøùú ‚ luMmmVvÎéü3 ñq·Üxƒ(ŠMÍÍ•UUÅ%¥¢(&ÅÇ×74VVW—x›ÍQ‘‘ááa&“1>.Îf³ùûúÐ?ÿLÁÉS§ââRS’O矙>íÊaCgde%'&rçt:ƒ‚cccNœÈ¬®©½bò¤aƒ>vl݆~¾¾×LŸ–š’"Ëò¶»jjkãbcXŽõóõ‹‰ŽÌÌÊZ³~ƒ¯¯Ï ×^k0è]C©-‹Ñ`Tî^tw­A—6J)Ç©JKŠÂãâíYYì×ß%§¦åŠN/>¹´â̼y©wͪ©©&„øùù»÷÷cY¶¦¦†ü°à‡aC‡ùùø ¢àʇ®Õjõ:âày«Íf0”Pât:y‡ÃËdjŸù×bQ«Õ„«Õj4]eðo·puxïôå+½?ëê³r²b£c]“Írçm6+CÚ,Y–ŒF•å6K›ÃéÔjµþ¯½õvpPð·ÝÒÔܤR©Ap:^^^‹EžªÓê8޳X,Êø)•J¥Ójmv»^¯­V“s2÷ûù ŸyêIF-ËtÛö™99O=ñ¸ÃáhmkÓëõJï4×’Û,m¢ †…†î?xpÑÏËžùÏ“JÄg¶ÕÒ*‰Rb|b{æNJõzN§“$™RÚÚÚ >ÞÞJR§Ói³ÛÍf³ÒÙáp€( *•ºµµÕh4ʲìt8ŒF£L©JÅYÚ,:Îf·SJM&Sss³ëÛÓjµz½žð¨Rkâ\c³”zxâĉ.FóB좵µµ½¿%pJÈVq*¥IQ–å6‹…eÙ¶¶6è ÈqœÍfs8FƒA£Ñ «Õnç9Žã;)KniiÑétþü˯íu?l(‹½ø2•2 è9õÙ%†eYQ¡]ëïJÙ3‚Éц¢äq¹ ]_r²,+Õ±#åº †H’äëë+‚Åj¹ä~heø‚^¯÷÷÷¯««k_ÿKèt…Ȳìãã£$›ëîB—ßV8½N_V^VQUñ;w$¬Íg ÃØy{DXDHpÈ¥ú€!ŒF­! Ñiu‚(\r™p”Îjµ›}Ðßšžžþ;»c*½8º{[йzÅH’dк{u~#I’¨H9Ž»øîß6÷£¿ΕZö7‡~Bˆ µõµ8ÅãߥT§Õy›½•+³KwæöЉ‘/9¸w ¿ß{ªNE±¤¬D–ðtæoŠÒÔÔäp8B‚C.ž1]nQw¯B—¶ßú)¥Ë5[›†IŒOìª@ûÜU»‘’𩏤88(¸»×!ô·ð»è ȲlÐ4Ãépu\“)%: Ë2D’¨]ž¬uJ©^¯wåé²µ„<Êpo–´·Á¥‡((ó½¨X‰Òü*«Õ!›´lLžR$™Áó—kë(! Çqç'ù‘$ém@GýgCÿ…Z•¡˜¿pVHÚã !D–©NÕÕ[o¯n¨$Iˆ 7{ù4_9 ÀK¯¥Ë¡­ùÒâúùaDQ,++í4»F£ í”NÒ}ŽY¥¸2áü¯dYè˜/šR%³Í…VÕõX¹£ëªW)ï>½²±ÊÏ—kö]„<ÜÙÐo0”Þ>Ê„ÚËJ² N§S¥R¹Ÿžs$ gëB(€ZÅÖ·ñïÎÏ­É«å›OèÕ­'¼û ;¿ÅzïñlÇ\Øè/C:PJ ‹ |}}£¢¢¤Ž^†,ÃÔÖÕ$$$¹Þ¢$úP²òF§ÓÉ2 §R)ÙÖþ׃·Ñh”DQ™B€ã8­Vk·ÛÏïæH)åX–å8Y–9Žs8ƒ^–)Cˆç¡SÅ ”j4Y–Apå Õh4¢ pçWª×õzÃá¼<îu#ô{p d€„çžúÃáD¡ß¾ƒ¨©©m³Z€ÂµWO/+¯ðö6s'‚2‹·2é!„aŽãdYîÈ5»fwQAf¥ÍŸ=kÐðaCwì:°`ÁÖèÞ#÷e& ˆ²ð6ûüõX†µÙl¢(&Ä'*±RyžRšŸ¸wß›Õj2š$Y¢”ªUªâ’’¹ß}ßÖfñöö~â±Gªkj=zçm·:¥{¨Ç•Ç Ã(]{]éz\— ¢(ÞÿÈ£S'Mš6uРХ¥eo¾ûÞã=#I’2EBeÙìåu,#cÿÁC£FŒ8Ÿ?iÂøO>ŸS\Rš”˜pëM7BÔjµ(Š®îÈf³ù˹ßDGE5Òb±hµÚʪªù?þÔÐØèe2Ý|Ãõq±±ÊA‹aYQAxçƒ97]w]hhˆ2Åu`èî¡¿Jr󪚚Ùwßõâ³Ï\}Õ4 Ä`4TTTÖÔÖòÇko½}"+KEZÍó|Yy9Ã0,ËŠ¢Äó|Kk+aÚ31„H2ÍSnCC#˲„žçY–×€çyJ)Cˆ(I§óÏ|ùÍ·õZæû :d³Yõz½ÍnomkÓj5 !jµº¼²2ït~Aa!˲ÞÞæí;w9vìÚÓÃBC!PZZ&I˲*•J„‚“¹¹ Ãp×ÚÖöÌ /ùùú>8ûÞø¸¸ÿ¾ðbuM Ã0mVkiY™²„Ó§óí<¯\ B$Ir? "ä9Ú|†asìx†^¯ïÓ»WkkkÎÉ\F£×ëwïÝ›™ÝúeëÝ3›óõ\$$$ø{ïy÷ÃÊ+*ýý|}è¥]–qÚ­2eŒFƒN§µ;dŽ!&“Ñj•¼“u@AQ%I"¤½½E¹Ç+‚+…!D–¤ä¤Ä½ûö8xhðàAF½^­R—óý÷Å%¥Oüã±°ÐÐ÷?úØîàÍ&¯[nºáÓ/æ<ýäÿUU×<óâ‹‹çÿ°ÿà¡]{ö<óÔ¿EQt:½z¦…µë7ôHMinnž4a<lݶ}ùªU0 _¿[o¾éÃO>-.)mii kll¾¾'NDGFEF„Ÿ’TZZ¦ôcY¶¤´ÌßÏ×l6gfe9BÏô¦¹¥åÈÑcz½.<,L¯×[-V£ÑÐÖfñ𯨨LLˆ«ªª9~â„ÉdêÙ#Í×Ç'7/¯¤´40 0"<Ìl6K’LhµÚ‚ÂÂòŠŠàÀ ÄÄQŠKʼÍ^&“©°¸8&*ªªºº °pÂØ±»öì]ðÓ¢Ï?þP™M!áš ‘ìÞ½»W¯^N§S§Õ:œNePŒ«§Á`P:ó)‡N§ÓhÔ¢(Ùl6µZM©©­aX&:2ZW@—e™†ãXèèUmµZúqaHHÈÔ+®Tæìî/ÁS(ßNnNDX„$I'ssZ[[†Qž—eÙdòJMIUqœìúÕ*•Z£&@”.1*•J™E]­V€ÃáÐh4ZÆÎóÊ!_£VK²,‚V«uï9£¼¤T-eÉFie2èõ„a¬V«2õ®Ò‹_y‰eYå¿‚ hÔj;Ï«T*½N'ɲÝnEQ§Ó©ÕjI§(IÊ%Œ,ËZ­V£V;A‚ ÕjDQ’$I«Õ:%á3Ã0/¼òjB\Üí·ÜÜÔÜ|‰Îù…ÐoÐÅܼ6»] ÜJã¬2wkk«²+†±Ûív»†áy^¥R ʼî ¦Ê¢QÚÞ´ Óéî¾ç^¥? Æý¿’«­_9éîßo ÒÓE–dÞÁËçvow8¼Ã¡¼]é}¯Ú•Ódå{ïx;Ï+ív»ëI ”ºª–ÂÎóJ‹Õª,Š"IRKK+tÔ"e¸€R •· ‚ÐÜñÑîõÐý³†q8JÐW>‘çÛ7Áf³1 ãp:N§,Ëf³×Aí<¶ö u6ô»ïîûÒ…žeVG ”tŒïït»Œ=wì¥Óé$X'uùK)‰”Ã3¥Ôf³ž_æüèRÝÿt=Ù©€k ç/ªÓ3L—uéÜ¥ÿö }Ü/®¶{y壆ypölI’\Ã}ò4¿+  ”R–a%Q¥ëÎEÊã•uw:â žçB”kŒûÈcýÞpI’L&S}C}qI±Z­Æ1ñC„‹Åâåå¥$WèîÕù[À <ùó"!þ~þv»]¥Km®lÏ@ÁìeV«ÕJb>„ÇrE{Ž¢Œ£ù=çAˆ^§Ç¸ÿ·Ee*É÷òtJNP¦e¯®©nljdY~Gk ý=oF>‚Gf„<I’ü|ý€«®©ŽŒŽ ÃV`„º¼)µëê8;o7Œ~¾~¿<B¡K–äÚÚÚ8÷¡7ݽb(ãx»{-jwÙTH·¹Z pvZÝö <²ü+ïúR*»ÒôŸÏ}9¿~™êê–Б‚ôœ>i®Á\è.2ýïÅuª´8AW3ƒºOþìªofІóêm§'á¢#ÿ<Ê'vѯÿ×WwB.VRYNû<ޏ ¡_M¦o;]hh±Ë¯ü‹Ü—ƒ•ÖC¸Gö.Û½;UH×ù‡ûŸpÞ`÷ÃÃùoïî>/ôSJOååFFD F×3®ÙVÀu7˜a˜üüÓ£14$T™–Üöe9ÞfïP(**4 A® üÀ­‰Iù;ÐáŽç±¨Ü¹íÑb± ¢èïçÙÒÒ\\R ’$ ÆÄĤÜÜœÈÈ(¥Ò666TUW¥¥öpÕUW #åÔL©lÊ™Z§ËWåw:Å%Åáaz½Þ5°«~º¿ÅU{»ûkC¿‘ë¼ÐïèªJ¥úÅÆÄ™L&(//³X-ÉI)•’(FFF¹jHeeEuMµF­ ‹ðööv½½¤´D–eŽã¢"£L&/÷‹p ŒB®«Ãqüè^%IZ²tqMmk ”sv×å ÓòÏœ®ªª†!®']ËY¾bé‹´¶µÀæ­›2³N¸–¦¬·kQ®'Ý?®»ëê6®“,¥Êµ¶¶,Y¶xçî{öîÚ¾s.þùÇÃGîÛ·'+;“RºdY{¥€Æ¦ÆÜÜ“àVWÝÏK\•M©Ò®W¡£òW×T@k[Ûšµ«êëëÜßÒé±û¹Kwgè7ây^™¦M9 àyÞáà;•éT!KJK¾ùîë]»w€ÕjYðãk×­€C‡(O*Ñ933ã祋=¼~㺂Â3 Œ©,**\´xáá#7oÙ¸tù«Íꊇ£ò¡çWc÷Jû›u>ë'ŒF£rOC9F•”çž:éïлWŽãNdfÔÖÖj5šˆˆÈ¨¨h//sCCýéÓy‚(° Û¯o­N§¼×ÇÛG’¥í;¶NŸ6C§Õéõ†ÖÖ–}û÷ªÕêÞ½úH’”_ït8õ½É`*-+‰Kˆ‹‹¯­­ÉÈ8ܳgï{¸Ns”XQYQ\R4ûîûCCÃN‡òRddÔ=³îS H’h4š\7â¼L^111‚ œÈÌE±µµ%½G/£Ñ˜‘qlذ%¥Å­­­*Ne±¶ 0xÏÞÝI‰Épnåg£×é9•JÅC‡¶´4'%&ÇÆÆä>•—™™‘›— ”öíÓ?11 Ïý/-ÊïuâÄñCGÞ~ÛLo³wsKóó¿:dx¿¾ýÝÍN߆ )(,¨¯¯ËÊ΢”*=åµ­û€ùŒÌ “É4kæ=”ʲ|NKFDDä½wß_^QþÃüïZ[[§óÀÁý®Àx¦ _†aû÷ë¯Õê\!7<<"::æÀÁýv»}À€&£é÷T¹Î'×@–eeS†)))^¹z¹J¥:zìðÞ}»32Žíعa˜ÃG•–•dd+*.liiÞ¶c+¥ôȱÃP–Cáü„q«ªªòÏœVkÔ”ÊJÖßòò²5kW•”ïÞ³S’¤Ý»w:|ÀjµnÚ²¡¢²båªå¼ƒßµgç¾ý{ÏÿÒ‘'p]_+»J\lüÈᣖ­XúÂï+*Ê€c¹êêêwßëÕ×_Ú¸yËr’$¹ªJeUå¾ý{eYÞ·OEEyKKóº kjkk9$ŠbIiÉ‰Ì ??ÿÃG­Y»*+;SÙo²,»f/“e™e˜»wìÚµC’$™ÊUUUkÖ­¢”®Z½¢¼¢¬µ­µºº*&&ŽSa2ÚKUŸ>}M&¯ (++]°ð“É+½GÏNe:µ@:Žÿ€ôé?.ZX\R4dðPQ€R*K2tD­ ã&ê´Ú?ý`Ó–J‚qeÜ+§RÕÖÖ~øñ{‹/ìÕ³wHp¨ÕfeY¶=0–ïÚ½S–å#GË8–™™±}ÇV†e=TV^¶}Ƕ“¹9 u‹þñwžjœ—ª€a­F«ü™wúTP`и±F›••“Õ»WŸqcÇÇÇ' F­FC&00hÔÈ1½{õmh¨w-H–e³·÷˜Ñc·ïØÚÜÜÌ0¬’óÝËËl³ÙœNgpPȸ±ãCCÂ’“S®švµN«ËḬ̀Ûí:½Þìenii¼”öHú«Õê±cÆ?ôÀ#ÉI)?-ZÐØØÈ°¬Ÿ¯ßì{îðGÆŒ£ô½sUZµJm4š!z¾ÿ'L€¶¶V“—Ã0zN¥R è?pûÎm#†ô÷PöU ” ‚’$I²D)íÕ³wŸ>}Y–U©T§N¤2Õë ½¡©©‰aØÈȨAÇDÇÖÕKò{©Õš[nºÍÇÇçó9ŸúøøÜrÓmÊdD:êœûFF’¥ÃG² “’œ¥L/j:R‡„„Þ|Óm³îº·¶¦fɲÅÐ1¢^’D??¿I§8ÎèèAÅöÀèp‡Œ5¶Oï~µµ5¹§r{õì3nÌø¤Äd›ÍZ\R¤ÓéL&/I’ÛÚÚàwtÊïâ6¯ÃáØµ{‡¯¯ðAAùù§÷íßs*/7))Ùh49zX¯7TTTøûØlV§Ó)‰’ÅbÞÁŸîŽ‚Ýn·Y­I‰Éyy§¶nßÒ«gï½û÷ÖÖÖ¤¤¤—9§Åj‡ƒ·X,‚ ´YÚÒ{ô,)-æíöˆðȰ°ð{¸5øÈ„0gÎäïØ¹-::¦µ­Õh4ét:Q›2Nw8f³wß>ýx¯TZŽãÔj5Ïó”R‹Õ"8I­V‹ÉËËf³íܵ½²²‚a˜¶¶¶¬¬ÌÞ=û>¾¾¾¾µuµMMqq £GåX(BAàX6.6>$4Ôjµr,›–Ú£±±(uŒN§S§Ó 8Ø-䆌>²©©±¡±A¯ÓEGÇü†ZG±óöüü|2oþ¼+¦^áëã{ñ3åÕººZ›Í¦Ñh/ùiÊä+âÍùÎÅʈ"°,¸^¥pòxõõþ¾þݽȳ\dߟT!ÿ¼{ñe665®]·¶‹ÛSîW7®~ÐÊÄÙm˶í[B—(SY™¨«}0›,SI:;3»$¥¥²,“Ž^Ê*•ŠÂ0ŒL9~œÌ™#OžÄ\=ƒ*À3)OÕ鮚{Oü‹Œæuýy~Ÿ}÷ýàÖ{ºS¿~E§nÔd*åÝ× ;"_.ò;vY!ÝÇ0¹FóvêïÛ©‡~§òîÕ©Ó 'ei„N!þ¸.ÅœkY].±Óèùؘؘè{]ëG(*¥„R$²D¥:ûUº"8œÍ¬l%ÙÙ™I†x{ÃûïÓM›˜o¾õëɸqTp§‚ßq]ÒdY>ïÆÚÙÑ’]—ï´¸Ïq6:½«S™NŸåZ²û3ú îþÂП«Ë ٩Μ_ÁàÜšÓåÛ]º¬™ç‡\J/¸Ì_Ã}_è"‡ÏÅߪmW§†š†xà(-Žƒ‹¯ËBNilBÚKªÕàt³ÏBÏž$ [~<Þ5E+Ý[!»<<üþr„†ÆI’:ÏÞGé9á[yl6ƒV’ 6ðv®¾A›wZ{:««­Nž„•+ÏFó 2PJµÚÆ{ïqFDQÞAÃý֯7¬ß£Fµ~ð¾uäHÂó`³Ãà1ÀÓXmVeH-B—S…dY¶¹¥™ÂQJM&“¯¯ D–A’j pçÝ Ø¶ ÊÊ€RX·Ö®%6;ë DüˆغBB@.² !^^&YIG)ÂÍž OÿÞ{O?í*Í}³á‘G !$ œNÀæTOâçë‡CùÐßÇeS!)P§R¬pD’Ô Ë²lç¼N'”•ÏÇAYüø#œÈ„`³°,„„@ïHè׆ØX ‚ƒ!>þW®‡J–Á}ÂXµÞ}† áþõ/îãOàûypß}ðØc²ŒÑ!„~¥åJ­RÇ{{ËʽYB`Õ*زt:°X`ÿ~ÈÈ8Ût£œÔ‡„ÀsÏ—¤¤Àðá]\À¯¿ùÐ)šS ’×]ãÇüyðî»ðöÛ0>|÷Lœ’„?!ô;)#ËÈ®‡ꓚf,*¢{öÇAÛ£¼É@Xˆ"˜Í0}: j5£ôÕQ.‚::I’İ,ÃuÏ„R*Ëò/Ovã ñ |ô¼ø"_}·ßŽÑýfJf*BȯœnI–e „Áʆ.ÊÕùçâÙ4•èwñb¿²Œ$Iîy=•{´®9Q\·l•zîZ=WªZW¿~rö]£ÄDxúiHL§ ,¬‹fI–m?µÿ“v JÛ[xåËá®» ¥Þxþýïö—ಘ/ !téúõ=~ïÐ×?è-}€<õ¼ô<ó üç?ž!!f3€(‚,+¾ýFÃ,[±ÒÏ××h4¶'½¢”RX\üåÜoìv{\lŒkhƒûHœÆÆÆµë7$%&1L×}`Ï"¤ý#I–cÆÀÖ­°d ÔÖÂĉ Rµ_—`Pàš˜B9gï”ÏÙ}øuC‘:rp*ã¹:Oï‘@mv»û€×B\uUYÚŽ]»rsOÁ¹gÜgÏèî/u†!LGµÉ;ÿú›o÷ëÛ§ªºú¹—^n/áÖÀJ®Àg_|9 ÀÏÛÛüäþkµÚ:&D‹”騥J,m_ö™‚Âc»öìQ>bÎ×swïÛ7vô¨Ïæ|¹uûv­Fãà#†ËÉÍ3÷h³´õê™Þ»w¯—_{½¥¥Å½ÞrnMö„tÙ¢+ÊÊË?›ó¥Ó鬮©ñõñÉ>yráO‹Ôjõ£>™s,#ƒSq½{õ\±juAaQlLôý÷Þóéœ/ïºãvA/YzÕ•WÔ×7|ÿ¦¦¦†††‡¸ÿ—¿iŽI‚ÄDذyV¯†Gµú÷‡wß…ÁƒÛ ÐeG9ûþ⫯èß·wï7Þ~wÖ·Ï[°°Íb©ª®¾öêé“&LØ´eëêµëüü|ÿõǪkj~Xø£ƒw\{ÍÕ‰ñño¼óžZ­ª®®ù÷¿ߺm{IYÙÑcǵZmccÓû}BÔÕÕ=tÿý=ÒR¿Ÿ¿ ;'§GZê·ÝfµZ?úì󯯦ì“'Çí¾>¢$¾÷ÁÇwϼCÅy >ùø?»ûB)% 9vlÍÚõ¼ÃñÄcnß¹säˆáWN2aܸ»ïàdî©Ô”d%…xqIÉO?/©¯¯¿ãÖ[›üýgÞ~;œÊ;½÷Àþ¬¬ì^=ÓÇûî>“õ´iÇ(eNçŸÙ¼mëÕÓ¦ÏÛç|ýÍéüÓ£G¼áÚk'M/Šâñ'Àf³9zìÙÿ<%ËtéŠ•ãÆŒ¹ã¶[9Žkjj>zìŒ6Ìb±¬Z».*2Òh4ºoÎ9'/®yZ”›Êů,Ë’,À§ŸÏ鑚úâ³Ï†746¾ÿáǽ{öä8îù—_6dHLtô ×^Ó»W¯I&̼ý¶½ûìØµûLAÕjµZm'²²€çy¿¡ƒ4hæí·ÛÇÉn×yØ4Ë‚,CP,Y'OÂ_ÀÈ‘°o\}5ìßßþ*ºLåæåÕ××S€ŒÌLžçŸ81qܸ›®»nÑÏK+«ª.ZüÐý³ïu¥ôÍwÞ2hÐM7\ÿùœ/³OæžÎ?={Ö]é=Òæ/üiü¸±ÑQ‘7^wíÉÜSUÕÕ'ssï»{VZjêŠÕ«ed¬Y·þÚ3~úyɃ‡V®^Ãóü;¯¿––’l·ó ÔJ©,ÓÌì,›ÝnµÚNdfu÷ƒþjJHúrî7NA˜}÷]ÞÞæºººðð0ÐhÔ~¾>Ç32^{ó­ûÇ¡ÃGÖ®ßp"3ëžYw%ÄÇ—W”‡†+ ¬©®9bxZjê¼ ­6ëËÏ?7bØÐªêêà ¥L`€cCBæÿø“ÅÒöÒóÏ :T‰ŠJrhllR©8_ vðI’8Ž+(,Z´d‰r!„lß¹kÁ?ªT*–eϹ„¸â Ø»8Ž8îó@º¦‹äXÖápÔÔÕ5Êd2TUU·Y,UUZf`ÿ~*g4ÂBÃX†Ù°iÓÑãÇ z½ÍnÓëõjµZ­Vy›Í”R†eÀËËäãëc6›ÁmÚIæ¼ÙzÏùÖ•ëY†¸8¸÷^ؼ>üjj`út8p[~.cµZ«Õoo $ >.6..ÎÏÏ73+;4$89)),4´¾¡AÅñcÇöîÕS§×ÅÇÇ………%&$°,kÐëMFSDxx`€?!$2"\yIÅq§óÏBrOå0ÐÇÇ'7/oäðá@ÀßßßÕsƒí¨:N©Ïf³Ww1详„¤×^|1"<ìƒ?­­« =q" ÚÚÚ›úõë{ï¬YOý뉔”ä»ïšyÕ•W|üÙç™YÙ±1±'sO) ©¬ª Я_Hpð‰Ì̱£GÆð°ðSyyJ™ŠÊʈˆöÔ÷§òòFéïç¤ÜP«ÕZ‚‚mv{qq1šÍ^,Ë644¼ùλßJr’Rþª+¯X·rEEUå®={Ýã*gÐÕÕÑ•+ɰa5vûºmÛÕ½¡¡_\œÁhܹ{·A¯·óü¤ ãûôêùÎ\1erƉÌ;n½%1!^¯Ó¥§¥ùùúJ’ÔØØÈ0¤ ¨h˶í/=ÿì¶;9Ž#K–¯Pq\Yy¹——WQQñ¶í;B‚ƒ7nÞ¼}gÏýû¯Z³V”$A¢"#SS’7lÚ¬V«GZJÊ ιíŠþJ”ôQ€Çƒ'ž€½{»»V ?žy½¼¼Ö®_ßÚÚš—ŸOêëëN§ •UƒôŸÿãOß|?/**rØà!áaï~ð··^§ëÛ§÷šuëÀbµ¶¶µÊ²ÜØÔ$BCc£Ó鬫¯W^jljºñºë6nÚ=xàÀïçÏW«Õ‡íÙ£GfVÖÁCGtz,ËW]1•e˜%Ë–sWYYÙÝ_ú«BDQ<–‘Ñ»WÏm;vnß±ó†ë®ýàÃs¿û>çdnJJrrb¢,Ëþ°wßþȈpZ³låª7_}yþÂß~ÿI”$Iž0nì[ï½?~Ìè)“&Íùzn[›%88häˆáK—¯p/óîŽÝ^Æb±ôíÝgמ½6m*«¨X¾rÕŒéWM™4éãϾ7fô²•«ž~ò_6›múõ7†755mÚ²uâøq?/]æeö’DÑf·GFœ3ù;îŸÿˆÙ¿öì!›7µ<”õÊ+°p!ßÐ:i¢ŠÒ¼3 Ã8ŽÐÐ+¦Lnllª®©9bXßÞ½x2÷TqqIhXHXh¨··w\LLXh¨¯ÏñŒÆ 4pÀ€þýNdfúùù9²GZªN¯kmm›1ý*†aH\lLFæ eγ—)( çd.¥”çù€ÿȈ®fÀpuþ€ÁƒaÓ&ÈÌ„k¯…€eìðs9Q®;ÓRSKËÊœNçøqcS’’üâãõ:½¿¿o´´Þ½zfeçN!-5eÔˆáu ,Kî™u—¯¿¿\l¬V«‰ˆŒˆ ð‹‹óõõMJLˆ‰Öé´ÁAÁ½z¦‡†„8tÈétFGGõîÙS«ÕžÊËЯ߰!ƒ«ª«Ë+*BAHJL4``Ff¦¯¯ï¸Ñ£ccbºûB5†aÎî;ppôˆW_5Í ×÷ëÓ;'÷TjrÒÌ;nçX–vܨ­­Û¹kwlLô¬;ïÔëuC*)-5 Ξ­×ëjk낃‚  ×é³src¢¢è^¦¦¦6((P)“™•q"3S¯7¤%';gÔÔ^ééz½¾ ¨è¶›nêÛ§OuM­ÙË«GZj}}½ÙË”_PXxðÐá²²Š{gÝ¥\œªå‡N õû ýé'ât¶÷›ôö† `Р¿oåîî³ÏÂ+¯€^|÷Þ‹·|‘s¢¿€ÒG©h©rf‰è²Ø¯)Óå».’QüBå•~ý •DHO‡ï¿‡ãÇéÎâ¾}âÝw‹ÍÍòGÉ¢$‰¢(Š¢Ò™Uê Ü–$I”$¥EIy²Ë2®´ ç?;(å]þr²$e#gÌ€ÔT°ÙàÈÀÿË{¢ƒ•'@–eÑ-鬫âB\%]õ:jéمȲûBÜ+°(IÊ{]uòüúŒ<$ÉîÕ  ½Jœ?ï¹Å@:·¢ºª¥BM™öÇ@¿"ŠíKp¡® ïê;ÓiCÜ:w&$ÔTî7`î\P©`Ñ"HIažx´Z$eU§AðîºÿOe¸s³>pHцQ„¾}áÇ¡W/øõoD—”N©”Ç®'™s;ØwYRÙ©”?ÝÿKa;F \h!ƦÀyÕy–=§>\(5H§jÓe5†ó*Û/–9ÿ³X†qõÓ$„t ¡©®Œ²ši× ‚„`xöY8t”)Y¦½#Íßá|‡Rp:ã`÷n˜0@º{Bè’ávhR©@’`ÌX¸ÛŸ¼á¸újxýuظ*+aÚøˆâÙq3‹’ÂA­«Þ}jk!4´ýð÷¼-B3ç¶“(ãú÷‡ìlؽ6m‚%K`åJXµ (£®»î¹† ;§EI©æ>_ãŸA‰ø² UUðÖ[°|9”–Âøñ°d ˜Í@)ÞãE¡_ƒÌ›?Wøúøž½Aìž•Óé„‚8v ŽƒµkAt0|8ÜsxyµŸþ§¥AZZûý×à÷ ”ßi†H–m?©xä˜3ÂÂàê«áÅÁÏûö „ÐŹ÷ðéêON†µRR 9n½ž6m‚>‚½{aÏ J#³>øfÎì:•¦2Ë…t™5¨Ë'8p-‚  ¨’’`ûv i?H`Ü÷lJ†adY îÅ!ô'qu!»øýÿ?0_¿Ò™ÇuYI{ãz¦# Nû.p‘evÝ1†QnêBG3‹òÏd‚뮃k¯…={àØ1  ±ZáÕWá®»`ëV>||h` ‘ààöF†ù…î7î· ”ò > @SSû½e­†àž{àÞ{!$DXGry¥{åùY3©[ß3ìƒþ2JoàŽ4œ¿Ð¯ßUì7—óz¹vW®r×Þ¡üé*þ2;e%í\QQ± ‰ 2¥ ȢIJ,¡T†ãä#舀Õé"Šâ˜Q£Ï™|¢sèT^ؽo_YYÙŸú·r0á8–R êÕÀ*ÇBª ‹>|ýõo¾ý†Û¹“ÍχšRRrjåJR_ŸDËË¡¾¶o‡íÛ/ö]j4~6 ¥ ÓAß¾0y2ÄÆžÓÜŸœ ¾¾€<žC9m阧¢èȱc7^w­ëdG¹øÝ¶cçüºÿÞ»?þüsF3ýÊ+;-¤Óh„~3÷ Y[W÷ôsÏ'ÆÇoÙºõDVÖã=ªÄt×é¶RLÅç_~E¥Rñ<¿c×®÷ß~ËÕûþ"e\1Ú5Õ"lÞ¶ý«¹ß 4ðÅgŸaY¹f튕«z¦§?ùô3¯¼ð\LtÌæ­[Ífó¶í;**«n¼îÚ™YÅ%%”Âó/¿òÞ[oèt:׆œ ýÊlÛ¹óà¡Ã¹¹§†¼výú¾}ú„õÍ·×^}µÑd\±rÕðaC/YÚØØ4uʤˆðp£·7Gi5ïX–wºÍbyôž{އ,[½¦_¯ž¡ááwLÂ,^ Àq]L×NHûL,C‡þª)·”Q®Æ(tYsM]´bÕj»Ý~ÛÍ7-øé§­ÛwÔÔÖÞ3sæÖíÛ<;cúUó, „9™{êè±ãÆ Q«ÕîË‘$iÙŠ•“&L$i˶m×_{Mwoº$¹WH‹ÅòÐ÷¯Û°1>6öÉ'¯«¯ø±—”DGE)§#mËÊU«‹JJn»ù¦ÚÚ:‹Åòé‡ÀÝ÷=°wÿÊÊÊèè¨ýû/_µúÈÑ£S'O‹Åúé‡ïÀ=÷?¸uÇŽñcÆ(SV¬\³öÈѣÇ™4aÂu3®ÖiµJ¾~I’V­^óÏG0÷ûyï½ùÆSÿ÷/•JµdùòÝ{öÝxݵS&M¼rꔣǟ>“ßi@ïÙÐÏ0̱ãßÿ°à©=n·ÛÕjõÉÜSMÍãÇŽyá•W“†Ù½wï´+¦¦¥¦Øíö?ùôáîgXöÅ_òõö¾êŠ©²ÝÎØí>,{ÍÄ Ï¼ðb¨ÈþwÜ¡lÀſԳÿ=ÿO·UÄ ï9”‹Ü—^{ÝßÏoú´+†ŽŒ îžÎ²ŒŸŸï•S§Ìýþ{•J•œ˜ÔÒÚšš’ìíí””èím·²,/Y¾bð §sÉòúÑoã^!¯ºò §ÓYQYÙ§W/ð÷ '’îÙ·oøÐ!i©©i))²,O<9çdîÆM›ï¼íÖŒ¬Ì]{÷Nš0A§Ó•—W…ÆÆ&­V ÷Ý{°Ìîƒ5:(Óé=’““SRR›ábÿ$©½'¨ëŸâY¶ó?¼ëI”û¾»ï€]»÷†„„¸ÐÐБ#†k4Q?.K²Ãላ‹Ø¿`€ÿ°!ƒCCB\m¬@)õññÖhÔµÆßϯ»7 ]ªÎVH »÷ìÕëõFƒ¡°¨$I¶Zmáá=ÒÒ ìo6{͘~URb↛!¾¾¾%¥¥ÊBZZZõzýÍ7Þž–¶aÓ–[n¼aøÐ¡1ÑÑ>ÞÞ®2ÍÍ-~JË6Àî½ûnºþº!ƒ¥§¥)78–S®k½ÍÞV›½¶¶uZ-Ã0²$¿ðò«£GŽ=r„rš팫·¬[“—Ÿøè1÷SðsBÏôôÝ{ö–WTäæåÕ7Ô§¥¦”——/^ºì¹ÿ>}ðÐáÝ{ö^9uÊÏK—mß¹ëÊ©SN'Ã0Õ5Õ‡Õëuwß5s÷ž½ËV¬âT\cS´´´´ßÄP&ø½Ð?l~E]Q@u:ÝÝ3gîÙ·ïç¥ËŠŠ‹3NdVWW¿õÞûýûõ µÙlV»Íb±@cc“Íf€‚½û:|äà¡Ã¢(Y­Ö£Ç3²²³ªª«»{³Ð¥êl…¼kæž}ûZôó5WOß±k×ÁC‡?þüs“É8dð AúO™4)<,Ìn·ßqë­­m­o½ûþÄqã**«V­Y»lÅÊòŠŠ)“&.[¹²¸¤¤O¯ž‹—.-*.®¬ª1lXUuµ«ÌäIW®^SRZÚ»WÏÅK——””WT0„)-+ËÊÉ9SP˜sÒh4ôJOÿê›o³sNÎýîû©“'À÷Ü[V^Ö¯OŸSyy Ã>>ɉ‰MMÍñqqAAp~Ú}„~†aÖ¬_¿jÍÚii×θ:"<¼¥µ53+k̨ÑF£aÛŽ£aØ!Þf³ŸŸ_\lLCccz&£qëö›¶l-*)ÎÍËë™Þ#!>nùŠ•6›-½GZÿ¾}»{³Ð¥êl…ì‘vÍôé¡¡!ÁAAKW¬P©Tÿ|ô½^¯dÊTb~òñö¹ýÖ›ÒRS×mØPYUõèC­]¿Ál6_9uÊéüü ›6k4š^=ÓÓRRÖ®ßPYÝ^fͺuf³—RfýÆMƒ!)1aÑ’¥¥eå&£±¨¨hèÁƒô/,*Ú¸yËÄqc¯¾jZ~AAvvvttô‘£Gí<ß§w¯Õk×-[¹rÇÎ]Ó¯ºrÌÈ‘çäëwÍ{¡ÙÏBèR¤ÜPú]p4/!í]ˆ\£”®©,˺(wÏ c4k¤!D9ܹz[+G­í9¦ËÊËßxûÝÏ>ú€ã¸Ž¹ñ`ùªÕ‹eöݳpOC¿Ÿ«?2Û1U‹{7g÷ˆºìaMHÇñzý~î‰øyžùõ7š›[®qõõ×\óËYŠÿ6ÎÐÜÜ|øèѵë7dfeB:l±Z !û´ÛíT–9ÒÔÔ¼jÍÚï˜_^Q¡R©XŽ%„q8ë7nZº|H’tôøñ…‹ïÝ »·]”€ž•S[W‡u:ÍÍÍK–-ß°i³ °qó–Ÿ—-Sr·Ï8±mûŽýº/Äj³=vªkj²sNÂEg¿Cèñ<¿~ãÆŸ—-€5ëÖ ‚ðé‡ï¿ôÜs?-^RW_ï>tüoîœTƉ̗^{½º¦úµ·Þ>|ôèêuë¶ïØÑÒÚzóíwžÌ=•}òä×ß~'ˆB]}½ /¾òZ]]Ã0,˼øÊk»öì¡uuõ¦¾¾A§Õ¾ûᇧòòÀ}L3B¿š² ÍùzîñŒ xëÝ÷+*+ÿõŸ§KËË[Z[%IúaÁ‡ÕÖÖ½óÁ‡ðÊonܲµ¡© \í555o½÷>íÊÝ{÷I¢Ô³G¸tr—ú5MƉ̧žyN’¤Ç{úõéSW_ž””h³Ú´ZmBB‚——éç%Ë‚‚ãL¦Ýs¾žx:??>.vЀþÇ2N(9úƒƒƒLcwo ºT)§íWO»òëo¿?ž‘,ŠÒ»~ØÔÜxàÀÇþõ&>6VYnwoºô(³3BæÍ_PT\œ˜ß#---5eò„ñÿüד:î_ÿ|Œã¸K(¿ýÙ|ý°mÇΛ7?ÿß§Õjµûftz`·ÛeY6 ˆ"PªR©š›› ƒJ¥êî-B—»Ý:DQl³XÌ^^ʹ•$Ivž7èõîû›û B¥Xk[›Ñ`¸TNÇÐߥ´¥¥Å=Ö9N•JuIDü æëw:¼ƒ×ëõJgjÒÑSµÓ­VÛþ !Ë*Ûìíí­ìrÊK®ÿv÷Æ¢K¥T úJuâ8Χ£¦Ã0FƒÁUÒ•©¼Ó‘ÀËd¢gBBˆ{¬“eY­V»þìîµûœú èŸçfçÿ…]åîwíݽuè’w~Ń T­ Õ·ŽÚ7êú½:ÍJr)ƺ³¡ŸRêãããããÓÝ«„BèÏÕ9‘özF¡Ë^çD—â• B¡ÿ öy@!ƒ¡!„<Îo ý8 ºä`EYn¯WòE+˜ëêEn¦þš2ª±+wŠÉç‡èóë?sþ¢]Ë’ÝÞï>kxWw|Õȳ¸×@訟îó"¹?¦çÖXW·¥ÏµÍfsýéÞ£¡Ó•?»Üý:­ òL2¥òÙ1ƒÄb±8Žóóõ»×+†aìv»Ífc:2០³(Óår!îaYXÐÒÚ na¹¥¥U%×][«ÕÚÖÖvþMÜγt¹‡uecÜF*ëêëN!,4ä’Å€.9]!n³J¸Æ ¸¦IRªe§òŸ~ñEþ™³ÙüÏGV†ä(otíuî{#Ã0}úYRb¤ Ü3°w9Èy÷Ù¸¾œ;wïþƒàÁûfÐ_’$Æm~×`Ø5ëÖ/]±B„k®ž~Íôéîf]qõâedY&„lØ´é³9_M?îáÊÊw?ø°®¾>2<üÙ§ÿãp8ÞxçÚºzŽåþõÏÇâãW­]·zÍZI’FŽ6óöÛÏÙ ×#%CCm]Ýéü3«U„¼Ó§ë” hkkË=•×ÖÖ_ûÝGŸ~V[[‹=AÑŸ­¡¡QIäP[['ˆbCC㙂‚£ÇŽ+ùúQÌÊÎÉÎ9)Š"CHYyyAa!¥ Šbmm]Nnnfv6½?ýðýŸ{fŪ5J0w­;㚉 ‰ÊXù}<õßgkjjL&Ó·ßÿpüĉ5k×G„‡Ë²üÜK¯œ)(ظyKxXøêµëŠŠŠDIêß·/æEA¥Þ?÷ÒKZ­&6&æG4 ÿSÏ>{æLáž}{sOå 6ôõ·ßÙ»oUMuÿ¾}–®XùÓâŸ;^T\1ë¾ûyžÿyé2­FSSWwàÐ!Y¦;wïJJLxâßOY¬ÖŸ—-c&.6ö¥×ÞhnnÞ¸yËàJËÊžùžçŸ81lè¸ØXe5!¢(>öÄ¿èߨÔüì‹/^=mZwCè/¥œ†üÙçÛv쬭«‹Û±k×ÀýÓRSâbc¶lÛîãíM),,ò2{mÚºõ›ïæµ¶¶êtÚü3zòĉ¾>>§NŸJ—­\ÉÆlözúÙçKËÊ4MqI‰^¯Ÿ>„Í[·øÐßËdÚwààK¯½>tРñãÆ*%vÞžŸŸNƒ(Iqq±¯¼øü÷?ÌgòÚó/îÚ³ç»æûøx<èö[nžóõÜ-Û¶O»bjIIéƒ÷ÍvM‘ŠÐŸD™ûT*¥T§Õ>xÿl»÷ƒ>R[W÷Ñ»ï@uMÍÚuëßû-¿ûz$8((&:ú?ÿ÷¯«V>r䑇ܹk׿ŸøçÓϽ`³Ùƒƒ‚ž~òÿV¬Zu"+[§ÓåÎ2hàòU«:œ•=iüø›o¼ÁjµÚí<œ;ØE¥R!„!ÇýŽmB—$J°ÙìNA?vlDD„Õf%QyUÅqõõõGŽ-¯¨¸õ¦›dIn³Xú÷ëׯoß¼ü3®PÉ2¬Õj}õÅà…W^:yâŒéÓ`ÁO‹D±}Qîçæ ~Z4iÂøÓ¯R¦žfYÖýn°(Iíï"@ }‚ŠEK–fŸ<9çÓ•b>ÞÞ£F ÏÊÉ©®©  r-ùœLeªV«€aYA”ÀéT*Žã¸öëkAP«UN‡Ãf·ÞìB&¥n9Nžw€Ó)! !„eV+Š¢ÓÑÞ&Ã0 PöCJ)˱í µZ¥RK’$I²S”݆m?–¨Õ*• f/shHÈËÏ?׿_¿}ûøû‹àp8:µç3,k³ÙDQ”]ûò$ C(¥O>ñÏÌìì^~õÙ÷4èçeË®¿æšìœ“M“'N0™L®û±½{õ|å·Žgœ¸öêéO¬\eµÙdY>yêÔµ3¦;NµZ-Ë2ïp( ïÝ«çê5kÝÊ\Íó¼V«•e™wðî«á:0©UêÝûö]=mÚÆM[”ôk+׬YµfÍ»o¾¡Õh”Þ =ÒR{¤¥Î¼gö©¼Ó ý®œWM{ãwŸ|ú¿V›íÑðöö~å7ÿýßgDQ|þ¿OWVW/]±ò“Ï¿xèþûºûç@—/J`ð ó,<|ôˆÅÒÆ±¬rD`Æf³ 2xÓÖ­÷?òh\lìÃÜÍÕÓ_~ý Žå†: _¿UkÖBGÂ6†(ÿ#í“w)÷~bçù+¦LÞ¹gÏ–mÛ C´´Ûo½å¹—^*)-Í>™;qÂøå+W­Ý°ÁËä%IÒ¿Ÿx¼oïÞ/½öº¯àI‡qåéüü˯Ú,?__µZ5zäÈ=ûöÝûàC<ÏßyÛ­&“I%¿ìâ%Kóòó5jµÙì1qü¸‡û§Léè‘#RSRzìŸÓ§]ùà}³ÿõÔ2Nd8àšéÓÇëV&ùáüóª+;Êdd<èꫦ}6çË-Û¶Ûíögžñ•Ÿìá‡Þzï½ 73 óÖk¯?ÿÒ+©))o¿÷ALtÔÃÜÿæ»ïµ¶¶ñ¼ÝÛÛ>Þ--­-­­,Ë…àà •J•}ò¤ÙÛÇÇÛhÄiˆè Ú©Ã)´Y,:­ŽãX÷§nŸ×ùíú/€.S]ÖŸNÝó@‡Ã¡Œ°½ÈØ®NïBèÕ©vmÞºmùÊUf/¯‡¸/<,Ì•ç•Rª„Ke¾‡¬ììoçý â]wÞѧw¯NAõ×”Qþ<|äè¼ † rÓõ×€ç¿øò«“¹¹C š5óÎÖÖÖ¯¾ù¶ ¨((0ðÑðññÙ±s׊ÕkQ¸öê«ÇŽå^ùÏ9B$IjnnVòþ¸¯™òRSs3¥Ôét>ûÂK¹§N)¯Š¢ØØÔäZ"ÏóJ:鯦&‡Ã»ú=!V«Õb±€{¦X¥NZ­ÖÖÖV8pèЫo¾¥d7$„´¶µY­VמÓÜÜÌó¼$I X!Ñï¡Ôº–ÖVBÈá£G¿÷Ã#ÞñüK¯Óž% !žonnf¦¶®îµ·Þ¹êÊ+§LžôÒk¯×ÖÕ¹‚*¥T©“îe^î(ãŠþMM‡(PFs*ï´²2ï~ð¡ÅjýïSÿÞ¾s×¢Ÿ—xyy¥¥¦>ñØ£jµê£Ï>_ŸfßsÏÌ™}úYCc£û…ÅÙ|ý„²òò÷>ühÇ®Ý<Ï—–•ÿ¼lÙˆaC·íعrõšÄ„„×ßz{çîÝv»½¢²òûù ²sr‚‚‚¼LÆ·ß{מ½eåå}zõzýíw–,[¾mÇŽ]{öî?p`ùÊÕô7 ®äG„Wßx“eÙȈˆþß¿ûôîeìxµ»Sô÷¢ÔŠÕk×Í[°pÿÁCaáŸÎùJ¯×……†¾úÆ›&“)7ïÔWß|{ðð‘ààÅK—íÚ³'/ÿ̰!CvíÞóýü»÷î áXöþGÍ8‘¹lÅʬœœ%Ë–—UT ìßÏýº¡¬¼üå×^Ÿ8~üö»ýüóðaC%Yf°B¢s¹WÈ}û¤$'mÞº­g´qcÆôï×oåê5aa¡A---:îè±cŸ~1gϾ}>ÞÞ…E‡cæí·%ÄÇÈÌdvþ?ñ<õôs/¬Ý°ž!LyE…(‰wÞvkB|܉¬l›ÝÞ#-•R_ßðÊo­[¿Þf·§÷H ±¦¶vÔˆáÍ--‹—.}òñ†‡……„„,[±rÚSc¢£ýüüŠŠKZš[FÔÒÒ²hÉÒ°ÐÐ)'*› äë?ç¬ÿtþ™#G͘>mܘÑýúôÎÌÌâyÇÞ}ûÓ{¤9zlÆôécF=rDÏôôýó#† ýúÛïêêFŽ>çë¹UÕÕ-­­Ó®˜ú胞ÎÏýå—´ZíÞ}û@E×|§MÍÍʼKuõõ&¿E ÜœÚº}¥p÷w&$ÄÇÅÆlÚ¼Õf³¥÷H[·a#¹{æÌ”ääÉ'öëÓ÷í×^%áó¯¾î™žÎ²ìL)µÚlo¾úJ``@`@À;o¼¶mû»ÝN‘¤ö )Šb}CXm¶öù01':{…¼ïž»ÃBC›šš¼¼LÊ«F£1ïtþ˯¿ñÄ¿ÿ³ïÀÁŒÌ¬’Ò²;n»µ¿¾uõu¦ŽdF£±±©é¡ûï3jÔgs¾Œ‰ŽúòÓO®œ:¥¹¹Ùh0´—1è• ßÏ_ñùÇM¿ò ¥º ‚ \þZ­V†0µ z½$K²,³,{àà¡•«×̾g–²„’Ò²ªªêææf›Ýî~†}6ô˲Y¶beÏôôŒÌ,e!……Eñq±A:®¼¢2.¶=¯gB||fvŽò¸ °()1Ay\]S:Ni½T©TµÂBC‚pòÔ)8v<#(0a˜œ“¹_|õõ‹Ï=¤”3jä—Ÿ}ÒÔÜ|ðÐa÷Í9{›—a˜ƒ‡Ÿ<•ëëësæL\1eò³î¹ç®™^&Ó¾N>íëëSXXáo¿ÿáŸü¿éÓ®üaÁBQF£F£iiiq8’$655@sK aÈ™‚Âo¾Ÿçãím±Xî¸õ–ĸ¸?-Ê?SPTTL¼¬F$ŠâÏK—©ÔjIËÊʆôÍ÷ó–/ú –,_¡Ñh$I*++1|XuuÍ{}üà½÷4¨¶¶.!>ÞÛì-Ë´¹¹Ú,«Í&KRsK øî‡ùeeå Ëx›½¯¿v† ~úYÞéÓZ¦»7ý}¹*¤,I…×]3cËöíϽôJyyù¸Ñ£CBBdYV©T„µë7´´¶ôúÜSy×\==2"âñ'Ÿ’d)$$xèàÁOþç¿WNrÛÍ7½úæ[g ’ǽnãF÷2ÿþï3WNq•)LNJ;zôâ¥ËV­YÛÐÐ`4yðÛo¹ùó9_mß¹+;'çW^®­«»ùŽ;“6oÝvâDæ­7ßôÙœ/9Žs8’$õHKuß–sææU«Õ5µµþ÷ß{V«  Ú¹{Ïõ×Ì U©Tµuuþ³ï¹[«ÕöíÓÛßÏ/88(5%%2"²¦¶6488"<<1!>6:ÚÇÛ;½G€ÿؘ蔤$eî‚ȈðÐÐQ#F° ëçë{ýµ3"ÂÃY–ņ~Ô%†ad*WVUM™ûÂKjµšòO=mçyîÜ‹Ô.˸úÖ»·ÿäœ<¹cמ­Û·+k2÷Ûï7nÞÒ·OŸ÷?úxçî=j•ª¾¡¾gÏôCGŽ|õíwPßPû⫯¶¶¶u¯¾7oÁO‹Îøøøþ¼tY¿¾}ªkj^{ó­ñcÇžÌÍ]³n½V«yý­w6lÚàϲLiYÙØÑ£¶nßñÍ÷ó>xÐ@³ÉkùêÕÓ®˜Ú»W¯”¤$‹Å’s2wâøqÑQQ11Ñ…ÍÍ-“'OTnÍv‘¯èàÁñqq·Ütã€~} ŠŠ:”‘™¹xɲââ’›·ˆ’wû-7÷î™þù—_µ´´(ï|ðaLtô ×^C8ΡC?ùÄãkÖ¯¯®©€ƒ~+¥Þ|òùÞá¸ó¶[ƒƒƒ˜’œ|×·k5šúϾgVQqñö;‡Ü#-õŽ[o ¹êŠ©=ÒR•>ÊwY–=jµÙ,Ë¡#G»{³Ð¥êl…äùYwÞa4kj뢣"@§Óùûù=žñæ;ï>úøGŽ[±jõÑã³î¼3::º´¬<<,LYHHppUuu¿>½ã~\´¸®®îé'Ÿ4p@EU•«LpPP}]=B.ZTS[ûô“Oê?@‰¥‚SEêT*.ÀßÂÃÃy;/IÇq¥ee‹—.»ãÖ[”%lÜ´ù³/¿ÒôJ{”ksÎ ýƒ!%)‰fü˜1›·nËË;ýȃ÷/Y¾¼¢²rʤ‰EÅÅ6mªkhàXÎfçU*¼ûæë••U?,üIEµZ¥dŒ ±ZmÝýc¡K˜r‰ûâsÏøþå×MÍÍAAA&/SLt4˲Çglß±“eYY¦f³W€Ÿ_pPÉË¥Ì$Á2LÇ•25è jµZ­Vûx›»{³Ð¥Ê­B|þå×Í--ÁAAYÙ9`µÚššš{÷ìyÛÍ7?òàƒ ñq³î¼sâøqŸõU~þ™èÈÈS§Û§T¬®© ð>thxxØácÇ&Mæm6‡†„äu”©ª® UgåäL?.44$,,TiôW«Õmv{Ii—”˜L&–e[Z[_{óí{fÍL”¿úªi[Ö­)+/ß³o_×Sµ€Éh°Ûm?,ü±±©iêäÉ[·ï(¯¨øç£üôóAÃÃÂþ´Èbµõê™ÞÔÜdÐë3NdîÙ»¯®®~Ìè‘»vïÎ?sÆáp´µY ¾¡A¦2 ô[)Ó>ç>=|èÐ’ÒÒí;v†‡…¯^»®ªºúÇÅ?§÷H3™ŒV«ÕjµµZ,ÐØÐh·ópððáù?þôó²å‹—,µÛìèêµë6oÝVQYÙÝ›….U*ä¦Í[n¸îšã'2ü´è¥×^‹‹MKM Qrƒgåd§¥¦ª8ná¢E#†ñ£O?ÿ£yÞ1i„?ùôDfÖÄqc¿šûíö;³srFŽ.Š’{™?û<3;{ÂØ±_}ó펻²sr†9pèЖíÛ;¾nÃFZ=~ìØO>ÿbùªÕ?,\xË78Ž«¯¿¡¡©QÄ;w1 ³bõê»woÛ±Óf³…‡¸oÎÙ¶~Y–u:]TTdYyyrR¢——)4$dø°¡ÁAA!ÁÁcF LMM)..nnn7fôÁƒl6˲­­­‡¹þºk†Ì0lbb‚Ÿ¯¯^§KNLÔjµx¿ýf ÃdçœÜ¹{÷ð¡Cg\5ÍÏÏÏÛÛ\S[3lÈØ˜è½ûÄÅÆŽ1<$8(2""4$D§Ó%%&ètºÜÜS…EEN§³ÍbINNЯïC‡M&Ó¨Ãâã»{³Ð¥ÊU!G zõô«L&S¯ôG‹½wÖ]ǹîñ–•WlÚ²%2"bÖÌ;àòNŸæ8îáï7 Å%%Æ!„9vÜßÏ/.6vЀþ§ÜÊø WÊ=uàÐ!–aâãÛ,–ž=ÓûöîÅ0LNnîÍ×_?xÐÀŠª*ŽåR’“+**ôz}rRböÉÜÝ{öž)(˜uçÊuÀ/äëG!tq¿3_ÿ9e «|ýÈ t*ßE¾~PFɲ’ Z’$¥s’ë{>èödЄ€[þhI–B”÷^|xB¿†2j:º¸)£v9W†}·nÄJEm/&Ë´£¢º†5ºÿ‰ÐoÓ©BºÏ'á^Ìõ¼[¾~ :zsº‡VÚ1Ô–v,ü"e”±»ÊGp×¾GP`˜öøìZ=¥_¾²× »¯açÐï>Dص1®†ÈŸ¿²Æ‰1!¿IDAT±HÐÐos¡™ºì¡¶Æ2 œ[+$úCüÊ„øOë~hý•eº¹ç.Á}¬/\´Úã„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!ƒ¡!„<†~„ò8úBÈã`èG!Ãu÷ „П‚RúÛßL€ù–ówû¬Žà(¥Á‡!„Ð_ƒRJå¿¿Q¿9“ÏRB½ò)\€@qIqÞé<ÂÀCBèG%±¥µE–e„þqMy !Äd4é´:«ÍjµYÿì6MZÖbµXmVå à]í_³] S9(0($(„3{™“’Ç_sdC¡?!D’¤ÚúÚ°°öÓÙߨ(žçY†å864$äO ²$Ùy‡ÉhòòòÒiu”Ò߲οn»(PI’¬mVN–elðA](¥Ç557i4š˜èY’[Ȧ@†ihh8tôÐÀþÌ^^²,ÿiÑX†­¨ªÌÍ;5jø(­F+S™ü9±_ٮƦÆãÇŽãm^„ÐeE–e†a$Q²óv†ù-•CeY£V;Ž?ïüXù,µZ-IØì¶?ï›iß.åÁŸ÷1!ô×#„P 2•sÚ"˲.ÿÜV>‹þ¹m0”Rå[‚;B—J©,˲,CGÏY–eJY†qo’$‰âº2$‰a%Ë’Lå.ºÜ¸º[‡™ ­ƒû«/¬6„Zíe!,Ërçt:Ïÿt÷¦D’%µZ ¢(^è¼¾ýÓ±ÂÇyyyQJ € ŠV«Õ= Ë²¬Óé(¥<Ïw ôLÇQ¡ËµbÓÞ¯¿» „ú#B”ÓgY–•³c£Ñ¸uûö¬ìœ{gÝÅ0ŒrT0 K–- ë×·Ãá`Yvîwß64""ÂétºÎ¾•eRJY–µÙlÇ2Ž'&$ å>pYEyjr ˲íÅ¥T¥RUVUɲ¬×ë$Iò6ûdŸÌ‘e96&V«ÑtýÛ/Md™RªV««ªª¿þî;–a–í×§Ïø±c”ÃÃ0¢(Æ›·p,;fô(«ÍƱ¬k™AP©TÊÒ”kåòªÒ¦DÁD¡ËҨ튤¢(®^»~á¢Å¥eeÇBTgµZ=ZX\¤×ë ¥¥eÏÞ} M Ó‚eê~BMD!¿° /?eYY–sN,)+•$IY&Ã0,ÃDz²,757555J¢DÊÊK›š›CCBT· :ß&«M©,Ë,ËÖÖÕeeçŒ9bðÀK—¯˜·`¡^¯ç8ŽçyŽã4uÎÉ“¹yyÇiT*‡ÃAh4šÚºº7ß}ŸçyJ©Šã(¥‚ ¨Õj×5«K'žõ#„.7”RI–”`§ÓéNææêõº»n¿mæÍÿúgjuMÍœ¯¿q Μ“'Ç››{ê£Ï?WqªºúzN'¢ÜûÝ—I€H’n³Ùlv;C˜À€@(«(¯¨¬ „‰‰õõñÉ:™c³ÙZÛZ£"¢Q°X­UÕÕ‚(TVU9œ%©IÉjµ:#ëDBl¼Á`P:ö(±_vC)ŠŒ1l˜^¯{éÕצNš¸fý†‚ˆððï»W«ÕªTÃ0ËV®ÊÈÌ4{yÝ;ë®UkÖíÚ½§¹¹é¡ûïç8vÁO‹DQ?fô°¡ƒyÞ¡\(¡ÏúB— SY–dI’$IbYvϾýFƒ!))ñȱã<ïX¼t™Édxý¥z¤¦ZmÖïæÏ:hгO?Èóv×Ùqçs”Ê*•*)!)#+³¸¤$9)‰a˜¦ææ¢â¢äÄäм3ùE¥%«u`ÿ¡!¡hKk«$IA~¾~éi=DA¨«¯o³´Ùmv½^ßé#dY–$I–eY’dYv8Í--ÕÕÕ~>>F£iÅê5ûš2qâú›¶ïØ¥ÓéHî©S‹–,7fô™‚‚y N»bJlLôÃÜþù—_™L¦¤Äø÷?ù¤­Í¢ vS–xÖºÌB€‚Le™Ê@çù¬ìÞÁ7·´644dfe755 0@¯7˜½¼¬ksssï^=}Ìf½N/ËÔ½a¤ÓTBˆ(Š!ÁÁuõuFƒÁìeJm6›F­ 4 Å¥% >f³NgÐh4ÊGYˆŠSi4šð°°êššÖ¶Öàà`§r8î ?Û,CeJ©F­ñ2u:ÝúM›9–•%™R¹´¼|ì˜Ñááay§Oûúù655ÐòŠÊô=z¦§NÅEGE ‚ÐØÔìïï/ âUW\áÚ"¥s'!ØÃ!tÙQ¨$J&£qïþV›õý·ßò2™>úô³•kÖŒ1â»y?Øíö#ÇŽõHKëÝ«×û}ç’f¤‘¬Ã–u|ÉòÍecÂØ Y˜„,7[ûÇVjwa·`kÚ£¶Bˆ!„$[9HvIa0e!ÁØ`clY–-Y¶¥Ø’¥Ñ9£©»§Ï÷ögµGò@¸dÇÎ÷ûkÔ3óº[ªúºõú{ßG,Ë-‰—œÎFU”ŠŠrY’£Ñèm·~iñ‹#áHMuõ‘cÝ‚ ”——ÕÕÖ0„jkj®ZwEwÏïM˪(//-)Y° 1VQ^¶fÕ*Û¶Oö÷Ç‹‹ËæÌñ¯1”ÒÄ`ïÚµ«±±Ñ¶mý€óš_ÃG×õ¢X‘ã8Œ1UUBtÃÀ‹¢PÕIM ‡B’,SÏ3²YÇq B<ÏÓ ƒ?wÁ¶íž=—¬^#L¥NbŒAà‰ÿœ(Š<‚K’ÄÓiø1‚€r=cŒxÌÅØu]Aš4WÍWQ^î8§îúEQÌd2míK.á{繤‘H˜§áë†aYB(J餦!„ "Ã0¾2@„⢢™-øTÍQÿÁ¯ã8££cþ˜ü?]×'5 O冎ŒB0B#££xêàuØÔ4þŒ!•g‘©¯ó ¯e ¡pAÁ3Êx6‹^§r(g¾>3ÇfÆk<•nïoŸ± ë#ÞšR*ËrcÃ2<}Á-¿Ò © ŸÓ'’³ Ìߎg¥lúF4õÄØÿ|î×ù“^>€  ˜`Ê(ŸœùÔCB(£|é¯ò!ëo?|nÇ£”`B)ˆð¹7i™ö+ÂØõ\Là®pñuÅSFA¨®ªN F"áOÕðåcî yÔÓu£¦º&Nº*Óÿ¼<ꩪ-ŒBè\P!åš®1ú™Ú]AEQ ÃÈšÙÙ ý1Œq¼¸DQ”` ˜5³³Ýž7§Æ!ô.(üñl´0úc¨ëºŽã¨ª …fû˜ù¾Eá…f£Œ„R*â³}z0Ûx(Ë›cóIÇ!„0Ê꜅c>;ûbŒ)‚‚1×ÑtmFÆ€ cÌqÇuDQj@ „~ÈÅЬ¦ÛLÃ#ð¬6häãËŠ, ¢ˆ1ˆ@!P»B1Ä>czè'å¯"žÝóbL’$„Èã×µ³wu€?n|Qn¢ß²-<‹é=§‚P6§ !44<”»ªësÇ--™C ˜ cœJy••”ÒÙÌíD„M×úýˆ¡9¥%‘pd–öˆög=åñlî²z ¯3B±3þÑk`Ï|‹}Œ¬M~×?cBÈ©:ÒŸ6 'ß~1†Êð!¦bÞ™‹'_ò$ÞM¯®Ìßõëþóíþ·r“÷ϸBÌè€<Ïã½_dYEÏ>ùƒó¾ðå» „ðÞ2g^à®òð£%cL–äÁDGW§(ˆ¢(öœ8ÞýûEVA%Ùò’$ɲ|¨­ubbB–eY–EQQ7ŒImRU¦ùö|»;} ‘eùȱ£»÷îië8¼oÿ¾t&Í/'Š,óꞢ(ò€Î_ŒYá­¸DQTÅqÔxJQ”3Î B?ä7­‹oüÅ·Qê1Æ,ÛJ§ÓƒÃƒ–mó®X£ccÇO7²YLH:>Þ{"™J2ÄŽ;ÒÑÕ5šLbŒ×í=Ù7žÿƒõ™]Ï­™_½þªõñxüXO·,ˆaïëÕ 2žNó#2®ëfMóxo¯®ë¢(Yc<=>2:rüDokûa¾VÀ_À¯1ú ¯é³ä#‡!I’zOöµ¶·%†÷h¶m»¯ÿd×Ñtðm[ dxtDÓ´®#ôöõZ–¥éÚÈè¨çy‡;Ú'&'vwŒŽú]ó˜¤3™Á¡„¦i……š¦µwuèºÞÞÙ™5Íîß÷ô'0Æ­ímÉT²óƒ.ÍÐÛ»:,Ëêïï?pè`bp0·m{phÈó¼Ó2†bú ¯ióãŒ1ÂËÞ`BA QÆãñËÖ^‹ÅŽõt 7,^ÒØ°,{žWY^ …(e¦e•—UTÌ)olhL§’©¤,Iº®N/Û0sB#dÆ¡Ãm¶ã,]´¤ïdŸ®ë’$¥ÆSã㩚ªù£ccƒÃCáˆiYéLZ–¤ÔøøX*)ŠbYéœ5«ÖVWUÇ¢±Õ+Vʲœ{Áp×yåÆaƘ"+™‰Œnè¦e&SIUUF„˜çº’$aŒø-¿G=Ûq:(B8¢”RÏ5-Ó±MŒ±$Š‘P¸añ’ºêÚÜ’Ég& y”ίªºò²+lÛJOd$Y’$9ZX¸zÅÊX¬(‹QJ;»º*+* !²,G W-_1§¤ÔvŒ1¥®G=Û¶ŒlvÚÿ!xÌ ùMcŒ±ã8sJç”ÆK›¶ì;°?Ì­¬ôΨ1blÚ.ý¶ò”1I’x•åH8’ûÝÜ…¹oùÙýcUV(ó÷uê¶B?ä5s"äô*-Œ]×­¬¨DY–»¤+wVÝ£§Ë/çnÏSèÔ"¯S/NmËI1ò¿þe…>ì­œ¸zDý0‘øÃ+¸yž‹FÑÔÊÞÏ´¯Ó“6(w ð,!Aè€3Œ !Ùl6‰PJó>å‘T?SeaŒMËÂc‚LË≘Ÿû£×S3„ #+Ë2„~È£¤¸dhxxdtt¶wÄ;‚•ÄKF'z{EQœ­Œ=× …ÂE±"ý0cLUÕÊŠ¹g§d¿_Ô! Íêc@ 1€ÐyœJ•9+Yï¹á~V÷Èó<1¡>Ôì=t=·{„Õ¼ð'B?üÉùÐ žköû}d>ß‘)cþ²ˆ3÷Ú}œóòÛßÀ…äCC8bÛŽeYñ}I?iøæ5+E¡ž—5M:Õ„þÌ8K)ý¤ƒTUE„1£tFÉ:Ƙ(ŠUµlÛ¶Žê¼dÇÙy¾gSžÐÏ[ï~oOj||A}]Õ¼y”1¿_WˆREY–5M㹨|{nûJþ¸š_ürŠ,?q¢£³«¤$¾èâ‹E ƒ¦iòñýÁ !¡PHÓ4Þ“_<Ïãý ü}ñ„Æ îžžÑ±1J©"+ /¾Èo†À631±·iuUUii‰ã8¼ë1¥Œ1F±mÛqœ`0˜{<(gñžFp~î½÷Þ²²²Ü~ÁŠ¢<÷Ãÿy_“a|pÉš5…žçyž …x$ª€(ŠCÃÃMÍV®Xnš&!$ªŠbÙ6!¤  ƒ²$ɲŽ„yñ#ÆX0lniyúûω¢´oÿþysçÖ×Õ¾þÆUóæRJ£Ñh@U1ƶm¿µó·Ë0FЬ`B(¥‘HÄu]Q£……ªªZ– E±, c{âŸjM¦Rý‰ÄòÆe%ñ¸ªªU¥Œ1ÆþëÛOŽŽŽ–Ä‹çÏŸ_‰ˆ’dYV  †‚¡P(ä8N (‡C¡àÁC­ï¾·ç²K/ ¨j0E‘×7-,(†BŠ¢ðÓ9×AøA>³50ö<ïý}M?pÿM7\¯išeY¿Ù¾}YCCiIɾ¦ýÅÅE%ñ’­¯þÒ4Í›n¼aóË[Þ~wW2™¼þº Œ±_n~) Þ|Óºaüöß Åb±XÛáöë®]__[›5MUU¶¶EÂá|ôï,Ër]w÷ž=Ï<÷ƒƒ­m·ùÖ`0øÓŸÿ!ô¥[nÞ·¿ùÙüðdÿ-_¼i ‘(‰—T”—½µcçšÕ«2;ß~' þÙÍ_|oï^Çq®Z·N×uFi$þúƯ]~饖eŽŽ½öÆÉÔ¸išwÜvÛö;µ¾ó+·ÕÕÖ?qb÷ž÷çUV^sõ•í]'OžÌLL\¿aCË¡CÍZÖ®^]T««©éèì<ÖÝ3H\T_¿îŠË)¥[¶mK¥ÆãÅÅ—®]SPP3B€óÎÌitJ™ ÷ܽñ'?{þoû‡ŽÎ®h´pçÛï¼µó·’(þè'?µ,ëÉM›ÚÚÛ‹‹‹3™Œ,ËŠ,óð·éÙï;¶s䨱Ÿÿß Y#»éÙg ¶l}õ­o«ªúMÏØŽ+Š¢69yóM7"„î¹ïþ—^y!„V•€¦i………†a|çég× ƒžçɲ¼ùå-]]] ±?ÿóÄàÐ?ÿÛ¿Ojš,K®ë?~âè±nY’c˜`Û¶¿ýÔ¦{zxÓ³ß×tí©§¿'‰bk[Û/^x¡¨(&I¢ª¨GŽýï'ŸbŒ½²mÛk¿úõ¾¦¦çÿ÷EVv¾ýÎ/_Ü\\TD9ÖÝóλ»v½·ç¥W^)/+{ö‡?H$¶lÝöþÞ}E±Ø~ü“¡áa^Iõ\ÿà“™ú Á¦iþÅ­_zî™M«W®ü×ÿøÏÖ¶ÃwÞ~{[{ûÞ¦ýñâ¢ËW¯\iYv:“ž_UµjÅòúºº{¿yÏx:}¸½#39‘L¦zûNRFkkj6~õ««V¬XÖ°äž»7ºžkº(жãÌ­¬|æ©ïüÕC¾óîî'¿ûôºË/›;·ò7.ol,Š!ÆLÓK.]¼h~UÕ#>P5ožªª¡pX–¤X, ®¹úÊI–c÷|ý?Éði}Q’îºãöÇ}ôÎÛoswA}Ý×7~í–/Þ42:Ú°tiEEù7¿qw{gç‹/zèþûºÿ¾o¿íºÞ6\ûµ»îà<•?Ãç•mÛJã%Ë—mÞ²epphõë_ؼù»ßûÞWï¸Ã²ìÆe K—,~ôñ'C K—ö tu} *j´°pA]ÝÍ7܇³Ù¬®†®YÃ0²Ží „(¥Š¢´¶H$Ö®Y][=xdÄõܬ‘mÚ¿¿lNéö¼ë¹×^su{g§ã8étzᆭK×®u]·¯¯o°®vddÔ´¬ë7lX¼hÑc?+Œe2+W,Ïš&BØ4MÏóÁžëZ¶¥éÆäÄ„¦ëžG³Ùì䤖N§çWUm{ýõãÇOün×îªyó0Æ™‰ „PI<¾{Ïž%‹)Šây^6kZ¶­bL7Œ@0‡ýævEQ2™Ìçž– gÇÌǼ¼ å+[_ÝþÖŽ½MM7ßtã†õë%IOí|çwÿ­¿Á¿øÒËÛwì¨(/¿á ×ÕÕÖëéijn¾öš«+ÊË·ïØÑÞÙ‰„++*z{û®\wʼnÞÞ’x¼z~ÕÑîîK/Y+‰¢ -‡½øò–wwíÔGz0 ‹¢ø«_ÿ¦²¢¢®¶¦¹¥eph¨4^rݵë-Û~ó­Ë–Ì›;oëk¯pôh4Z¸¢±ñ…77í?°xáÂ[ÿü–7ÞÜÞÛ×·îŠË³†!IR{ggssËûMMGŽ»xA}2•ºìÒK’ɤ븋-ìíë]³jÕ‚úúL&³õÕ×1Æ<øÀÐðp0\ºxquUÕ¾ýûõ›7%QŠÇ‹-ËŠ††¥‡;:/\¸îŠË·n{­¹¥%18¸aý5ÅEEþ¯þøñǼù{óƒ3kA$I×õ‚‚‚m¯¾ÖÚÞþÄ?<ªiº$ŠºaƒABˆëºüÙqEQ<׳[’$Þ…Ò²,>Î?fÛ6_ ( ÆÈ²ì`0ÈŸô*ŠÂSz$IÊf³!@À/]mÛ6 !Ä¿‚2²Ù‚HÄu]A0Æ~CKEQüÔOJ©$I–e ‚ Äq\œ@ à:Ž(‰¶ecBøÞEQä§,Š"ÏûäI¥¶m«ªâ8!BAAÁÀÀÀ·}ì_žx¼²¢Úμ±pkkkþ M3Ážëð¸fYÖö;o»õV„0cÌq]UU]×EaŒ Ãà÷Ùl–'¿óîïÙ¬I¶m›,›Íò> ¡iÿ®¿…‡i„n„lÖÄåFv]×ù8Uåy¢½MÓôOcœ5M‚±ëº®;í0t]Ç[ŽƒBS#¸®Ë3Gùå*wÃÈæ-ïîÞ=<2ÚØÐPQ^qp>Êúy/Œ0&§bú7îÞxQ}½a~ y?äùSÞþ þÖ©AÎøXÞþ–oñAò~Å?†ÁwÆç?ŒSסé'žÛãxÆ8‚ ¸®[SSÍÿ¡Yºx1LõÎS¸h3/~°rùr>]s®ø\¢”F ¯¸ü2ƘaçúpàSÑ]äóòguÎõŸcŽãøSXðÛœ_üh/BdYFg« €s…?æ%„ˆÉd²¥¥ªÀŸBH2™ü9~’0[téB%tEXtdate:create2013-09-27T11:38:38-04:00šp$(%tEXtdate:modify2013-09-27T11:38:38-04:00ë-œ”tEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/login_default.txt000066400000000000000000000007731330160122500243540ustar00rootroot00000000000000The Login Mapping Screen has a special Login user called __default__. This record is used to setup the default login user for any login account that is not specified separately. If this is a desktop system you might want to specify the user_u or xguest_u user. If this is a terminal server the guest_u user might be a good match. Then you would need to add the admin users or a Linux group with a different label. Perhaps as unconfined_u or staff_u. You could use %%wheel to indicate the wheel group. selinux-python-2.8/sepolicy/sepolicy/help/ports_inbound.png000066400000000000000000001631621330160122500243740ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýwt\G–à ÿžKïà½!Ћž)‰”åM•ÊvUWuu÷ôÎ7;{vÏîwvþøöÌîöÎNÏ´©®îªê*•J®äE#zï-‚á‘0‰ô™Ï|$2  E©$‘ãwHàåÍxñÞ‹x7âÆ{¥—^zɾYTTô76›mŽeY6@ |-$)•J¥Nõ÷÷ÿiš¯©EEEß®¯¯ÿÏ%v»ýF×O Á‹-‘H,lkkûÛ––E:zôèñÙ³gÏSU˲ntå@ |ÁH’D"‘àĉÇU AUULÓ¼Ñõ@ð%`Yv»›Í6K5MS3MSÌö@ øšcš¦¦Z–EöG Á×J_ ‚¯9Y]¯fÊ_ ø|H’”û=ÛÆË—$iB?›ìØQ±u™L.S€Ï~þìyÆ~o²càæ"Û÷U@˜ú‚Ï$I¤ÓiÂѦiâpØq9œ¤Ò)¢±8`aY i*—‹p$ŠËåĦi$“)©$^·Y’ø¼=P’$LÓ$Ž`š’$á°Ûq:ã`X‘h§Ýn蘦‰ÛåúLçŠD£$Si|^ª¢`Zá‘0²,áq»oôcn dI‚1ý;û¹G}U(}àó1‰ðÞÆ-:q ]×™Y_Ç Ï?Ë¡“§xñw±i*¦iQ_[Í÷žy‚¿ûõïxþñuÌk˜eYojf÷Á#üùw¾Çí&Óm¥Ü@\–eLÓD’$$ýÌÑÏÆúçŒD"üß¿øC¡šªRQZÂSÝÏŒ©µ¹–E(4¯^ù#÷ßu'=½ ñÝgž@–$dY½²Ì™²/±ç’$xoÓV¶ï=À ßzŽ¥wÌ¥íRÿøÛ—¨©¬äÇß|§Óž©©eaŽZ:ÆZ¬Ü±Ë2™óH£W–ibž,Lóòàa]èêíc(4Âôº)4¶œ£ /@yIñU¿3ÎÔ/:@ðÙe™¦³çÙ}èO?ü5å$’Iìvx<Ûåä§ß}»¦a·Û‘$‰ÐH„t:Q~¦IiqKÌŲàb{¦e’J§))(@ÓTzƒT””ŽF‰'¹s—s©»§ÃNqA²,c&#‘O>x5å¼üîìØ)Õ•t÷ö‹Ç)-*Ä4M‘(étšiµ5”!‘h”®Þ~lšŠašT——!Ií]Ýäù}äù|X–D,§pˆOv量¶š­»÷ÑÞÙMqa†iÒÙÝËPh·ËEiq!ÁÁ!Òid*EžßGa~=ýA†GeÊKŠA‚®ž^’©²,STÝf££»UÉ dÂÑ('šš1 “Âü%…olÂ2Mî˜3 I’A’ Gؼc7²"3gÆ4fM«ÏNTsý­õR'Ûöî§²¬”_¿úŠ"“H&©(-eÙ‚¹¼»i ùýosàøI.´]bþ¬™lßw€‹î`÷¡#<ùÀ½Œ–—)óè©F.´_"‘LRU^ÆŽ}Ù¾ÿ ª¢àt8xhÍj$Y²àDS3ýCL©ªà•w?¤·ÛE~ÀOËÅV~ôÍg°k¿yíM¾ýÄ£äùýX–…išÌ¬ŸB$ãõ?¦­£“¹ 3%Ã4غw?­—: G£Ü{ç Nµœ¥/8ˆª*¨ŠÂŸ–íûÒz©ƒ‘H”‡×¬&™J±uÏœ;Á¡!ž~èú8ÙÜÀ]KS[UÁ«ï}DYq15•åÔÕT¡:Ÿ{‰D ¸U±,‹YÓêè yûãͬ»ïæÌ˜~MSÖ'·Æ/®ò¨©,ç¯ø=Ž7áÈÉÓì9|”¾õ³µËåDQì6YÅ,šÔ3nÝ0r¿ß»êN¼n7üàcúÁºÜQMËbÉü¹´wuñÒÛïñøýkY0»Ë飓$|^/ß|ì*JKø—?¼ÆŠ… X¾p>ÿø»—9xìdÎônš&†iÒtö—ºzøÙwŸ§´¸t:Í/~ÿ*ÇO7ár:ñ{½L©®Â0ŒÌòƒeQRXÈŒº)¼üÎÙµ—‘p˲p»\,ž7›¦ápØ1ÍÌ:ukG'v› Y–ˆÅë6MÃåt"Ë2ªªO&9ß~‰àà–e’Leœv;¡‘0ñD§Ã1Î9÷¡{V³hÎ, Ó Ž`·Û¢³»—T*ÇíÂÐ zûƒ9ÄLýLºûú0Lƒ€Ï˪%‹xûãMØí6Ö®\ŽÝ¦efY¿ÓdÅ”P]^Îæ{€Ìºã{›>aju5…yy躎,ËhšŠËáÀn³ÑÞÙ͉æ3L©ª¢0?Ã0Ð4¡ÐýÁRé4ªª¢©*SkªÈøs>ª’±£~Áí†,Iœlna×Ã/ÕåeÌ9Ûwa·Û).ÈçDÓâ‰$?ýîólÚ¹‡#§šX±p~ÎQ® @–$RétÆ[ßéä‘5wóñöœ_¿‰uSX»r9ÑXœcÍø½|3¦Ö²bÑ>Þ¶›fã¾Õ+h˜6•õÛìD£1fÖOÍ .LËÂëv¡©*»¹3¦c™&N§ŸÇ×㡬¸˜Þþ~ Ë¢ ?`t‡ø½^ óó.ËŒú,˜ÝÀ¦{8ßÖNppˆò’"ò|ËÙì8ñD—ÓÓa'ÏïËYÄ{Kp»bÅ…<ñà}Ìuî+ÌË£0/ïºú†´gÏkΜ9ö ‚kcZ©tšD"‰ÍfÃåÈ8ñ¥uTZ•ÊxàÛ5d*=:Ïxµ«Š‚iZhšJ:­£ª ™ïkš –E2F‘e²ñ’v›D2ØG·Z–E2•FÓÔQù Òè@@7 6²,“ÖutÝÈ lZffO&L™ºað‹_¡ ?ï>õظëÎ\›•Û–Ö ,ËĦi$Óiâñ6› UÉÔE–dE&•ÖÑTÝ0ˆåd’É$i]çRw¯½¿žï?ý8 Óê‰DI¦R£ƒ ”žÆ¦i™ ÁmŒ$IÈ’„1Éî›k}çôéÓÂÔ/|^$Àa³á°Ù€Ëñ0TYFuŒOqmY»mÒr,ËÂnÓrý0û»$K8'I•mš&vÛe…ŸÅa·Mèø–e¡šÍ³ŽyYSùX w.I’8{±®Þ>^sW.N@–ì@aìy4U”̵hZn@rµë´iZnà`YÛöãèé&LÓdÎŒiÔTV`Z|nVöÚlŸúrn,Ëb¬Ÿa×ý½œ©ÿ‹Œ &Ü.LÖg¬Ì×%;Ùgãö¬O•ÿ´ò¯<þir’$ápØyâÁû¨©,çÊ$^Ÿvîë¹Î+e–Ý1Ÿ)Õ•Ø4å%E£ÖóšçŸ‘¤G ŒÃ²,ªÊJ©©˜¨ô¿,|7¯'yL¼‚/ž |DGc¹^ÓáÁ•fK@ðå bõ @p› à£(ŠXßà6 7ãn&Ä ôÚÜJ[oųn>ÔÁZεŒÉÌ%Ü Ó ?¢(Äâ±]kba!K2n—·ËÍHx„x"þ¥žSUUü^?Á`xòË=ߟ‚„„Ë墨 ˆT:E8Æ0Œ[jÐ’eì³öy}·ä5cQ#ÑuÞ:€ n’$1<-WçîîJKK(-)¹îsY–•«¿$KÈʘk± /‡ªªƒX¦…ËåÂn³3ž ¥Ìèà XçùóH¦’Äb±I•böYgMý’$qîüyŽ;Æå-Ó§Õ3gÖ¬ÏÝßu]§£³‹’â"ìv{®íõööÅEEÒušŒ.ëÍ/¸A†‰n˜` QRÄ©©º‚&øCèi‘¨‰aŸªø¯ú&”$‰Æ¦&~ù«_³c×®Ë_å\àlçÊýÿÈÑcœ8uŠh4ʉ“§H¥Ó¹þX²Ê`Ó'[8ÝØ„ª*ô÷i>s&÷²Ëž'[¯¬2{lìÿ‚›ƒþþ —::Æ»ÔÑAp`àšßËÎþ²Š´««›-Û¶ãv¹èèìä·Þ&OpªË΢³?pþÂEvìÜ…®9™¬\öw]×/FFg•û±åÀåm®ÎÝÝlÚü v› EV¸ØÚÊù Ùºc[Û2ß³¬œclý¯<_n`aeú ¢(¹Y‘)(( ¾®žü¼|$YÂãöà÷ù‘•Œ¬ªªYYÆápPUQ…ÝnWŽ¢((²2ñØUddY¦°¨§Ã™;Ï•?YKÀØë¤ÌN¢Óì?x›MCÔŒ½þÏò\R©'Nž¤¿?È[ï¾GgW7’$q¡µ•‹­­“¶•Ïú¬Å®'ÁD–%,ËD’5Òézª»: æ ¦™B’íkšô霫NÃu]çÄ©Sܵz.¶Á4 6~²…d"¢ªÜ·v ñxœÝ{÷‘J&ÉËËã¾{×¢Œ*ë,éTŠ-ÒÔ|†ÊŠ Vß¹’Í[·ÑÝÓCey9S§LáÝ>Àçõ ¬¬€h,ÆÞ}ûéìꢲ¢‚•+–³s÷z{{ ‡™1m÷Ü}ÇŽçÄ©Sø}>¸ï^“à&@’$öØÏ‡ë7ðó?ÿ óçÍåø‰“üâ_ÿ•'{”‡xàSÓÃæÒEcáõz©®®"Ó›H I[ÛØ»étšEw,dæŒé465sôøq4Mcõwfê"Ë€ESóvïÝ‹¦i¬½ûn òù`ýzzzz)++ãžÕ«Ù²};±XŒ‘p˜åK—2wÎlvíÞÃÅÖV*+*X{Ï=ØGóÞK’4ê\“q^“‘Ç¥¸ÎË 0oî\.¿Ÿ'C™Ž+IH$ ¶íØÉ…ÖVjªªXs÷] ²}×NbñË—,aö¬†qË™òUEwÿt]§££ƒ‚ü’É$ ˆ¤**~¿—Ó…iš ().AUU†‡‡ñx<  j*ÅEÅtvub·Ûq9] ‘——‡¦j¤Ói†††(((@UUR©Ф`YùyùØmv2ƒr.×Õ²¬q£ªÊJ¦ÔÖb&ƒƒ<ñè£ôôöòû—_Á0 ¦ÔÖÒÓÛKooee¥Ÿþ\*+X¹|9æÝ÷? ©¹™u=”¹ßÈôƒìص›P(ÄÌ3˜3{ë7lü”g}7v»]¤-ܨª†Ýî N1®¢«û<ù âñ4ùEsI¦LvŠú鎿“ $I¢¿¿Ÿîîî¹k5ÉdŠÖÖ6‘fêÔ)†Á»ï@k[MÍg˜3g6í—.±yË–\‡G";q’ÃGqøÈQV¯º“¹sæ`w8¨¯›Ê¢;pðð‘Ì ¢‚††™Ìš9ƒþþ §ùdë6ZΞeá 8ÝØÈŽ»8}ºUUY²hÛv줽½÷>úŸÏËÌ3n‰ýß· +–-£¬´„¿ÿÅ?óÇ·ÞæïñÏ”–”°xá¢k~Ï4M ø<ƒ¶,º»»ùxÃFN56‹Åèêêæ·ßÆãñRS]Í;ï½ÏC‡y÷ƒ¨©©ÆírñÇ7ß"#áo½û.~¿Ÿx<Îû}„eYL2…óçsøÈ=ʱ'(+-eê”)lúä.^leý†TWUQ]U……5®n¦•™…OVçK¼úÇ7xùµ×¹ØÖÆ…Ñ?£ 䨉ìÞ»ú©SÙ³o'Nb÷Þ½œ¿p‘ùsæàñx&µ0dýTU7“„èïï§´¤EÍ̶=ùyù´µµa™ôöö2<÷®¹‡“§OsüäIRÉä„ú!7õgë\[SÍ¿ÿ=^øÁŸ1µ¶kŒ³«ifƒCƒ´œ=‹Ãá$–/[JyYÛv줻§{ü cTñ_iêÏ*X—ÛÅph=­“ÈG–eTUES5òóóI&“D"\nyùyx<†CÃø|>lš––š¦‰Fp8¤õ4^Ÿ7·vhZߟ?hÉír“J¥ðx<Øl¶‰¦þÉÌæ£ƒ&Ó21FÿÎÏËcÁ¼¹~ZÎ}†çrâ$©T Y’)(ÈÇïóQ7u ……H’D<‘ «»›%‹²tñ"Š‹ŠhmkÃíú”gJ S¿à¦Âf³ãõøG"˜–ŽÍ¦ODéèÃnw`³Ù®«œ Š_’ žHpìø ž~âq~ügßçϾóÎ_¸ÈÀà ‘H„3gϲ{ï>ÊËÊðz=ƒAN56räØqêëêp»\œ=wŽÎ®.,ˤ¦ºš–Ñï´œ=K[[;ÇNždö¬ü?–eáv»9yêMÍ͆,Ë̘>£ÇޱyËNndÖÌ™XdœLËÂ2Mbñ8.§“E Ð|æ Èb­ÿ¦À4ÍQåÿçü/ÿÓÿÈ_þìÏ).*úTïmÓš¨$‚ƒ8tˆ»v“H&™3{6>¯—Í[¶²ñ“O%‰Ë–’H&Ù¼e+›·n£¸¸˜ââb::;¤¢¢œšêjîY½šU+–ÓÙÕ͉“§h˜9¿Ï‡aè†aè£ × SXXÀÌéÓ9xø0CÃÃÖÞ³×:Nñ›™\ö»‡Ã‘ÙY`˜£³ýŒÿŒÇí¦¤¨˜ysçðàý÷QUYA8aάY(ŠÂÁC‡'(~Èx˜«ŠšûÉ®¹«ŠŠÇí¡«» §Ó‰Ýf'Í(ÎH$B0$‰äv”––æ”¶ËéB–e¢Ñ(^¯Ë̬…R\XLuU5ùùù æüœ'²,sþüydY¦¢¼MÕruùTÅod~,벯…n\êèøŒÏåCCæ„„¦i8xˆ¶öv ÃÀápP]UÉŽÝ{ؼe+ýýAêëêÐuýs=kàF!I©TŠ’âR Ã`84Dû¥¶\L‘ëAyö¹gÿSyy9N§3Wp*•"žˆ³|銊Š(*.²,4Uãð‘£Ä <.?ô ¡Ð{÷ ™LRY^ÎÚ5÷ðèéé!??Ÿò²2–.^„Ãᤩù ¦i2kæ ,Ë¢£³‹êª*fÏj`zý4‚ƒ8NJJJðz¼¬X¾ I’èììdîœ9,[²˂ʊ ü¾L²ŒŠŠršÏ´ÐÚÖÆ‚yóX´ð4M»ÑÏG0ŠeY¸œNjkjp8W}yfffq‡2Šfì÷MË$G0-‹Õw®dæôéÔTUÓÓ×G*™bí=wS_WGYi 8î[»†â¢"††‡q{Ü,]´ˆ‹mmt÷ôðû™R[ƒ®ttvQUYÉôéÓÈ ¨®¬Ân³c·Û)ÈÏçøÉS  ±rÙ2ê릎ë\º¡322B^^Þø:›fƉ®ªyŒò+**¢²²‚žž^ÌŸG~^gΞ#S^VÊàÀ ÇOžÄëõr÷êÕüþ\™’$‰DH§Ó8N$YÊ󑆆†ˆÇã¹{ÜÑÙA4EQúûûq:Øl64Mò,z{{‰Ec™eU¡««‹‘‘\.]] ‡2kÿ‘H„þ¾~É===D"R©š¦188ˆnè¹ókš†¬dâ È’L2™Äãöà°O|ö™¤Ly”””`š&6ÍFuU%>¿?ç¥=ÏeÅòÌs‘%™©S§P^^F_‚ü<ü~ÅEE,^´ˆp8œyŽ+–1­¾€êªÏð¬uÓ4q»Ü7º[ nS²»íº»º˜:¥c´ï (/«Àíöp­„’$ ‘^}íUkñâÅäçå똊¢ŒåjšÆ¹óçùý˯ðW?û)3ÚŽ]»8|ä(?ûÉ 8Žq[š²ÿ›¦9Ϋ¬³ÌØód¿ò{YYÃ0&•Ï~þy÷G n<’$184ȹ ç˜5cքϲ¾cg`c÷ÊgÝ#nFîû—ËÊ8úeËÉÊfÛÎØí‡Š,cŒi»™Y»1®^©TŠK—˜Z;uBYF#åv±[ô²×0¶ß\H‘zúzˆÆ¢øýþËý[‚X4†¢(Øv° baáq{r&þìš¿Íf#‘L$ñz½¨ªJ$AUUì;‘pMÓF— ËäPp88N¢Ñ(šMÃf³DsÊ>áñxÆ]ÓàÐ ÅEÅø}þ –žlßÎfí{¿>ës1M3w<Û.Æ>«ìûbl[Q%ßázžu2•Ä0 Š ‹Ä;FpC$™¾þ^ÎoaÙÒ ôq±õ"½½½¬Xv'EE%X×X’’$‰æææ«{õmôí*ŠB^ 0Ná:|£³ï+;ÚµÊË~®ëú¸s|Z=Æþý=[Ö•²‚[“¬ÃÜX®öl¯<þYƒÀ\K>[öÕÎ-I™À=H“—s=uû,m6ëÕ/Ëò¯~Ÿ/­+PÈ?j)ÀÕ­æByZX`‘I/ë•rœ|Öz‘-Ëçóå¼ô±È•mYÖåóYÖÈWgkòÈ}Wþ=ö^|žç2öïëy—¤ÆœãzžµeZ×mJ¾2ý?‹³aãÇ ‡†1 €ß?:X¾¾éu»À[–EyY?þá°Ûl¹ý°óçÎeö¬Y›^ð…q«xO‘­YçÊ*ÑÌìøæÕ?¶Î·º%.»ä$¿àFbš&šªQ\\Ê‘£Çèíë§´¤˜)5õ¨ªvÝï¡Ï¤­eYÆa·;–õÞ¾(n•˜îWÆêÿ²ÛØ·cCöÞÌH²4>hÎ-ÊØA—@p£¤ŒnVÃ,fΘ9nySdçܲ¨ªŠnè¨ÊÍß4³ÊÌn³£ëú—nõʬc+ rKÌúu]Çn³ßòJFŸµa ÇaÁMAVÑÞÀRj6 ‰abŸªà†!K2†aàóúÐuø-Án·SQ^ÁÈÈñÄ—[gI’2kñD¢‘}é×UßÒâR’©$áHøFWçOÆn·ãñxné% Á׋ÏÛU‡ÃAp ÈPhèzý‚/ ô´NQa……“:gÝŒd£æ¹œ®/ݹtìîÇ“Ys¾‰“Æd—$<–gü.„[”l\àVG-)*aúôé_Z§Ep=ŒGÜ2&Õ\B IúJꜽO·Š3mn;°zk<Ïë¹àVG…Ñ\Ó_‚æ'⌄G0tCä±\‡ÝßçÏ9ŠÞŠ/Ù¯²Î·Úý¹Õê+|ùÒ¦ ©Tо¾>1ã\ÉaÒé4%Åן£^ Ÿ/EñK’D2™DUUÊJËÄv?Á§’L&éîíMO _<_ڌ߲,ìvûUã³K€,g¬·ønÁŸÈg݇*‚ÏÇ—ç!$]ŽÅ=á# ÂqKý bI¿K¥²È‰Ó&#–oO$IËB@ðð¥»Oö2?si„ ûz Æ‘%¢BùE.îš[@i¾óFßÁ ›n ‘H084@*•"³ÝDÊýo³ÙÈÏ+È%¹ZY™L &'§ø-Ë"Ng²Uf²ÊnOÊeÅݳ|½áI³³¸¬¬,K´õ†ùýûgé9Û…¿ˆ×™¤§ÅI]Ã>ŠÄxvM-~·]¼¸o3$I)“$¥§·›‚‚BòÆo±¦»·›êÊê ¾#’$ljÅâ¸\Nì£á¥MËBù–,ËMV¥æ–©Òét®o\l’šleYF×uÒé4š¦}ªL6ƒÝØsH’DZ×ÑÓiTUͥ܌l’-aU9Ňùïÿô ,ËBUUfLŸÆœY³  c·Û¹ç®ÕtttRPŸ[»«ÜÇþ-K2¦dŽ3áZl?x‰¶æ.ZÏ}g)sçÌädã9^{ã E±¹-w±vqµXó¿ÍȶT*…aè”— ËÒ¸¥I‚ââzz{H¥’8®1ŸIœnlbý† è†×ëåùçžehh˜“§OóØ#£iÚ¸´ÏW¶Û±±®ü=›ûoÿß¿cÉ¢…<þè:dYæäéÓ¼ôÊ«üðûßcæôéãb÷g¿/Ë2gδpèèQ–.^D_†3xû½÷…¨®¬ä±uàr¹rßû}Ó4y÷ý¨ª¬dÙÒ%¹kh:s†­Û¶ŽDp9¬^u'óæÌÉ ²uD£¼öÇ7xäÁ)//›:[ ²‚Û .Ïb±ß|îYÊËʰi6B#!4ÍÆàÐN§“¾¾~~ó»¹çî»X0·›`0H8¡¨¨·ËÅðð0©tš‘‘ òÉ– &gÎõ’ŽDXz_%‹ÍÁëõsÇ<™½û[hïâ\›‡{—Ô &&·YS¿i™èºŽeL¼O’À0tLÓš$gËöíóغGÆçõráb+ÇOœ ¾n*>¯—ŠòrTUedd„p$‚ÏëÅáp022B À0 FFÂäçç‘N§‰F£$IB×uºº»Y¿q ïX@qQ}¼óç/Å1 ƒàÀ†aPŸŸÉ{‹ÑÝÓCsK ]]]Hò4McÿÁƒœ¿p‘‡¸IÊøÂ ‡B ’— 0šî¶?¤¯¯Ÿ³çÎåRàʲLgW¿ÿÃˬ\±œ¹³gsîü^~õu¼/x(,,$‹‰F)., ºº{ˆ' âq»Ñ4PhMSq:Åòš@p;‘›ñK’D<‘àÐá#f7Ì$qòÔ)ìv;²,Ó|¶…¦–RéN§¯×ˇ}Œª*x<žyêIþðêk QR\ÄsO?…,Ëc²ŠI˜FÓ´Ðl’ªª ©Nb1ËHg IbÊ;!ÉRn)?Ö¯²W’$Òi+CMJ’ÄÔÚZö8ȡÇY¼páhû’¸ÔÑÁÖmÛéëïç™'Ÿ$??·ß}FOy÷êUlÞºo>û ýÁ ¿ùí‹üÿ—ÿ™³çÎqæìY¾ÿoç–¸*ÊËñz=lݾƒªÊJ Ã`ÎìY†Áæ-[9qòHPSUÅý÷®å­wßcxx˜áÐN§ƒÞÞ>ŽŸÓ‚Óéä¾5kp¹\TVTÐÜÒ‘£ÇèëïghxMÕÐlßúÆs(ŠŒaè¼þÆ›,˜?… ðòk¯sçŠåÌŸ7÷–O¢#®Ÿq‹’’$a·Ûq:¨ªF*"X æÍcz}=Ï=ó4 æÍcÇÎ]Œ„G(,,äð‘£tuw£ë:Ë/æ©ÇË­)fTUav} 3ÍÑ“qšÎt308ÂÑœ½h×cT;diÜ÷ÄÏmðÃe³³®§s‰£®üÑu]OOØýaY÷ß»–gž|œóZùoÿø Nœ:…L2…ýÙ÷™1}:MgΰeÛv*+Êùé ?¦¨°c'N’Ÿ—Ç‘£Çhj>ƒaœ8u’§OS_W‡ÍfËGQdî[»†ó.ðц ÜïZ¼^/½}}ì;p€Ç]Ç÷¿ómšÎœaýÆMôõ÷óãü>üv›T*‰eš,˜7¹³gñغ‡1 “CGŽr±­•ÒÒÎ_¼ÈÉÓìÙ·†3øóÿˆ¹³g3ɧR©Ü€Ü}àr:I$“¤Òi–/[Êw¿ý<„B!@Âáp0­¾Ž#ÇŽÓÖÞÎHx„ªªJaên3Æ9÷ù¼^ÖÞs7Õ••X@_H™uÖT:3—eitqtr:òäãQTXHx½\.¦™I"’5õ˒ăwÍâÈÉNŸà¿þâ(Eù:z†ŠDp:Úh9dhQ@@¼n#²Êß"Ó®LÓœ<þƒ$¡ëƤŸÅãq¦NÊÔ©Sùå¯~͉“§˜>mš¦a³Ùp:$It]G³Ù°iš¦‘J§Y0>o¾ý>¯‡§Œí;wc·Û˜=«aܹLÓ¢¤¸˜gŸz’áÐ3§OgÛŽ¹³ÍfæÙe™T*…e<‰¢¢(È£´’”qtØíx½^yðAê§NåÜùóÈWqÈ›2¥–M[¶p¦å,Óêëèè줹¥…gŸ|’½û÷ãrºp9]hš-çX˜J¥˜3{6ûäÃõ˜:¥–<Ñςێq¦~UËüiæ¼ðe4U£° €-Û·3¥¶†šêjÞûðCV,_ÆGo ýÒ%òóò%UU¤ŒY‰Qsj6P”çñÿùÉZ^~÷ Gwsºu€¢"EŽ^âýg9ÛlãõW_æ'?ý á|‘õê—$)3»7I»¤ÓiLÓÈ, ŒA×uÞýàCššÏàõze™eK3É%´Qd‡ÝÎ’E‹xïÃùçŽÉ$O=þ8ÅE™Œ€yùy,]¼„õ7QS]MA~þe§U$´Ñ>2Þ<,Ë$O ( ee¥Ì7æòÆ[o£ª SjkyàÞµ¼òúüëoþô¨ç½¬((ªŠ¢(¨£J]S5î˜?ŸîžÚÚÚñû|Øì6V,[ÆÛï½GWWÛÚ˜=kÙ!P7e Ü{/ï}ø!N§“x,ÆŠ¥K™={ûÊí:Ð4‡Ãͦñþ‡ñgßû.ee¥|²e>ò¿ÝèÇ.nÒž={¬™3g’Öu‚Á ùù¹m|Ñh”x<Ó夽ý%%ÅØl6úúú(((ÀçõÒÓÓKp`¿ßGYi)án— ÃÌl?ª(¯˜0£$‰x2EOˆD2×íÀLEùío~Åöm›©¬¬æWÿöâ-“Lð§cš&ç/œ'?/Ÿ–³gH¦â(Š2.y”DfP`Ó4Ìœ5n œeY Ò×ßH”–”ŸŸG4#‰PTXHhdË²È ŽšÀóòòÈÏËò,úûƒØí6|>½}}8Nü~_îºaìRPp¹X–E0ˆ×ãAÕ4zzz0 “²Ò¡‘::;ÑT ¿Ï‡Ë•1ÇÛív’É$^‡áPˆÂ‚†C!zzzq8ìTTT`·Ùèêîfxx—ËMQagÜ5÷õ÷‡q»Ý£(2ýÁ .— ‡ÝNÿhŸ$ Q_WÇî½{Ùµg/ÿáoþÝU#k ‚¯’$ÑÜÜ|Yñ[–5Î/+4ö÷+·8e¿“Å4MdII"4B–åI–Ü^h $†‡‡Ù·o/>ŸeË–‹ÿm„išœ;Ž¢¢" Ý ««“h,:AÎårS^V>nÝ=Ëø­£ã·—š¦9î³+·óãbT\-^Å•}d²ïMvþ,W[¾ÈÖïÊúí_W«ÏØ{™%5kT>[ßlÙº®óëß¾HmMÞ¿pên#²ŠÜ”úÊ—ÀØ—ÌÕ~¿ò;¦eåB®|ZÖ±ï0Ë4ñûý<üð#“–+øz“5õc¦iL™2uÒ¶cYÖUÛÆdŠqì±+Ûð•²c˽Ú9&;~­ï]O°«±õ»V®»>“ôÏlÙ©tšŠŠ²Ñ¥ 1ÓnG¾T[úg‰¿~e01Û¿½¸²­ˆß—ƒÝfã¡ûïÏY)ÁíÇ—¦øE Äb %.øTR©Ô¸ ‚/‘ I |)Šß²,váp˜¶ö¶OC.¤R)Ün·PJ@ð%ó¥ÍøeYÆï÷c†0) >§Ã™ñâmE ¾T¾ôýrbKžàº°D²@ ø*øÒµ²x™ @pó𵞎gwˆÝldöXßèZàväk­øCq“¡˜‰nÞ˜ VîØ•Ÿ•ñŸI’Äž}ûÙ°ysîx4™&Ï­Âh¶·ìO,ã—¿úmíí¨ªŠ¢((Š‚,ˤR)þùW¿¦­­=§¤%IB–åœ\öﱟe²2Êèg’$¡( ‰D‚_ÿöw\hmW¯]A7Œq¹Ó@ ø²™têm†a`Ól†‘;.I§N7òádzîá‡)/+åБ£üáÕ×ùé„$ÇãÁ¢‘ñD‚—^y•;W¬àŽùó¦ýR§«)**"/`phˆD"A^^»áá^o¦œH$‚Çíf8"O`Zåe¥Øl6B¡½ýý´œ=‹Í–©«,IÄ“:¥> ®°T¦IwOñD‚`p€p$B$¦´¤‡ÃN{û%Nœ:EÚЩ®¬Äét’H$è ÅEE¤R)âñyyB##È’„„ÃaFFÂä””cš&í—:èìêâìùóܵjUÎ`Yà²+È’EÚ°Ä–>@ |eLªø³3{ iœâ8qêµµµ,\0Y–Ys—‡æ3g8~ò$§y|Ý: CçÃ70sútο€®¸Ý., µ­»öEyæÉ'èëïg÷Þ}¨ªŠÓáàÞ5÷ðîûðø£fÊY¿ï»—ß¿ò*•åX¾t)sgÏâõ·ÞƦÙh¿t‰Y 33V ’i¿KCB·L!²$c™&¿yñE±ÛíÈ’ÌÏþü’ɇŽáä©ÓTVVðô“OðæÛïÐÓÛ‹®ë,Y´ÇÍá£ÇøËŸþ9~´‡Ó‰ad¬ ¥%¥ø›¿ú9çΟç“mÛñy½ƒAdy¼qÅmW‘°ÐuÕ&Ò à«aRSNñKÒ3*¦iãdTE%‘LH$0 ]7ˆÇ4̘ÁÔ)µ<öÈÃÌ=Ë4™?o.ßÿη().fÛŽìØµ›%‹òÝç¿I,çȱc$’É\9‰d‚”žÆátðøºu,Y´ˆsçÏsäØqœN'ßûöó,]²8çC`è&i]Çë²Ä8óúØàýº®s×êU¼ðƒ084ÈÐÐ0>Ÿo>÷,?ÿÙŸÓrö,oÜÄÅÖV~ò£òÍgŸaûÎtuu“N¥$‰T:M:&J3{Ö,~þÓ?Çá°s¦å,;wíá±Gæ§?þ5ÕÕ¹e‰¬3ŸÓ®"K ›æ-!A _&Uüº¡ç¶ðeÍþ†‘ñ@ŸRSËÙsçi¿t‰h4Êñ“§ Q[]®ëÄ ’É$¦i Éi=®gÊÌ–eZ&zZÇ2ÍÌÌÜÕÉVæœÙr ÃÀ4MTEAÓTìv{Îa.[ž9êÜgš&‰t»*aW'w_È.©Ë’„ËéÄét i¶œÏ€eZ`e?ÆèÀF]LJ̺~"™$N“J¥2…IN§‡ÃÓáD×utCÏ95^é(hMA•,tü¹" àkÍS¿„D*™štÿ¾išÌŸ;‡¾¾>Þxûì6;©tŠû×®¥²¢‚¢ÂB>Z¿›MËùT”—³ió$2Înç/\äÅ—_&á©Ç£/dÏþý>v ›¦±dÑ"‚—˨ªŠiZH(ªÊìY 4·´ðû—_a`pº©S1M“dJÇiSÐT%s5£JU’$dIʘö›Í†"göìv[îzßÿè#Òé4S§N呇"‹ò/¿þ ºap÷êUÌœ>½ûð‹ùWÚÚÛ¹kõjdYу¦iä¬Z¹’wÞ{Ÿâ¢"‡†r;²3~I’ð8TRi°ßèv ‚ÛiÏž=ÖÌ™3s³RI’èîí&<ÆëñNú%Ã0$™JâõxðûýH’D$¡³«§ÓÓ餠 €D<Áàп°Œ:òÈÏËò¬Qç¾$ùùy¸œÎq帜.¼>/‘p„@ÀO2™"™Jðû …BqØíø¼^|>#ñºì`Ùœzeü¬ß4MúƒAü~?‘p§Ë‰Ãn§?$//ÁÁAÂá0¦iR]U…Ûí&ÓÓÛ‹¦j”–– I  ‘r÷Îïó àö¸±Û2¾ñDÛMIq1vûe/I'Ïw€¡SUì¿)ã àëƒ$I477O®ø[Û[I§Ò8Ϋ~9;skÊ{2Š6{l¬Ì•ßË:¾e]YŽeYH€9úYîØõŠÄñøóY0sê¤{ñ³{é/{Ø[ãŽ=çÄs˜XãõÆžclYc¯õÊëÍ~ÖÖÝOppˆºŠ"¡ø@ð¥’UüLý–e‘J¥%ù+ ÕûEG’À0tœö«GÌ*ß±ÊùÊccoÒøã™¥ƒ«÷[ÖµÊËÖÕã´Ñ«§¿Š[,0f?«”t=㔆ôÅ)ä¯ɲpÙo¤B›¦žql¡{@ð ¦Ói‘pnvšJ¥ˆÅbhª–1ißB&h Ë2ñºÀͯL5UÅ®É £ªb/¿@ ¾<$IÊ„ïéëÁíuãr¹r–”” Ý‚{Ì,,\N~¿ÿFW庰ÛíTWTÒÛ×KJXü@ð%‹ÅèéëAµ,‹šê otnKòóóÉÏÏ¿ÑÕÁלà@sçÎeø|™è‚/‹lp&àfE´QÁ­@n'Ý®ˆ@ðiLýP ¸ÙŠ_p« ¿à¦G(~Á­€h£‚[…«fç …†sñù'.—ë¦÷’|}™ì¥ ‘N¥@’°Ûl¸Ýž Y¿¬ºD"áLFI§ëO/PpËs­Ái<'‹"N§ —ËE4%e¾ 8N;ápŸÏ¢dvùÄbQ ÃÄëõ^gM®Ž®§ …B¹@c.— ÇU‚´}¦i2Æ4 2ÉF2×îv{p:?_™‚¯ŽI<çíwß$‹£¨ >ŸŸ•+VQ[S{ÍÂÉÍÍML2ŸïÖð¬ÜüLöR5M“Í›7ÒÙÕ¦Ùp¹\,ºc1³f;¦ò7Lƒ¦¦& )-)ý\õÑu;·S\\Â’ÅKoôíÜ$˜ÖDS0ØÏŽ]ÛéïëÃfÎâ®ÕwsðÐ~ŽŸ8†ÝîÀ4MæÌžÃ´úé¬ßð!O?ù,@&œù©Ó' G"Ü»æ¾?¹~ýýý¼ùö‘eEQ(..aõwQXXtÍï ‡†ikke挆\ØñD"Áú?dd$D*•BUUdYæ®Õ÷0{Öœý(Ÿ‚:ùa ]×Y½ê.ŠKJÙºu3gÎ4Q9ºõ,SXXˆÃᤩ¹‘d2™åí?°—px„ººi”—•ßèë| ÈÄg˜8›J¥SÌ›;Ÿ¹sæ³oÿN>¦i„F†‰Úš)~º{º1 ƒÒ’2FÂ!ÜGYi³fSQQÉàÐ #¡~¿ŸÂÂ"LÓ¤··‡X,Š×ç§° ÁQ™~¿]×1 ãFßÁM„eNl£--gàûÊXMe9—Ò»²¢Š{îY‹Øí†‡‡H§Ò㢊––”‘Ÿ—" öcZ™é%Å¥¤Ói"‘0¥¥eôû‘%‰d*…ÓáÀïÐÑq‰‚‚B|>˜(ŠÂíò,¶lÙLk[+>ŸoL)Å0 š[š1 ŸÏÇÐð§Nž@×ujkj)((Äáp°îáLJGض} õõÓ˜1}&áH„ήNÊËÊH¥Òtwwár»IÄã膎Íf§´¤EQèëë%RTT„×ë»Ñï¶B½Ú–§NŸÄyá<ÉTв²rŽ?JsK36› ˲X²h)ÇŽES5ŠŠŠÐ d2EGG.—›²Ò2±< øÓ±&7õK’Ä… ç …B„BÃLZGwwÍÔT×àp88Ýx’žÞ$IÂëñRRRB<§¯¯ÇC4åØñ£Øív‰8Ë—­d84LSs#n—‹ÂÂ" 9v,+“`ñ¢%"•²`–eM:ã/+/§µ½•ã'ŽQSSK}Ý4 “¼§·›íÛ·"Ë2óæÍÇawŒkW–eÑÖÖÊH$ŒÓåâã ‘—ŸO$¦¶v ^¯óçÏñøcOrøÈ!\£Ëmí­”•–ÑÑÑÁý÷=0¦6©TšC‡™L¥ùyùìÞ³k\™1}& ¸¸¿?@$&‘LÒÚz¯ÇKAA!²,Ð4M³áñxÉÏ/àRÇ%Ž?Ê?MWw'ÇŽ¥¶v 'N£°°ˆH4ÂìYsðù|úøfÏšÍÌ ¼ÿÁ{œ=ׂM³±páb¦O›Æàà Á`ËWR[;åF_›àkÂU×O-p¹\3kÖlª«jØ`U•U<ôà#ôõõrôØî¹{ >¯÷>x—êªjJŠK¨««gîœy|¼ñ#JJJ¸û®5lÛ¾…ƒ‡`Z&³f³`þèzš›6äd¶nÛBcÓé ‰¤‚É¢œÖÖL¡ ¿ööV›9á<ô(i»åååH’ŒÛíÆÐ3¤ìR•$I™"GÛ¾ªi¬ºó.zzºii9ƒ¦Ù2éÆe9“®\–Y0—8tø ?´n‚_–%<UU5˜¦Iû¥öq}ÄÓÕÛífõª»),,¤µõ"Ñh”5÷Ü;!æˆiY0Æ"W7µž“'ÓÚzîžn***ñù|¸Ýn~h-g›9vì(—d2IYi/^ 8Šÿ+äŠßbÔÖN2k:‡ƒþþ~ÜnÉd¯ÇK²,!Ë ªªÐÕÝ…Ó餸¸D¼2W3õ›–I}Ý4–.YvYv4Ï„¢(8NTU¥§§‡‘‘ÜOÆÌØßGww»ƒÐHˆKí„B!òóó‰F£ôûèìì@-'•&/G8fpp€H$‚Çã¹Ñ·Hp0Ùv¾óÎMûí}_F&ŠÝf§¨¨,%ÝÒI§Ó\¸xǃ¦ièz+cò,TUÍX\±°ÙlD"aZÛ. ãvyˆD"™¥W‡“`0ˆ^§£ª£¯yËBS5–,^Šß`hxh\‘$ §Ó•q”dYAÓ4Òé4í€E~~Áå ´.+·ÛÍôé39r욦qïü;$•JÑÓÓM0Äãõâv¹‰D#¸\næÎ‡_ø„}¥Lê%Ë2ù¨š–;æp8X¶d9Éd’cÇŽRWWÏŒ™ yØm‡ÇÃôi3hk»È¹óçÄöÁƒ5y¦Ã@ €Óé¸,fYxÜn|^–eá÷Xºx]]œ9ÓÌ R]UÃŒ3¤©¹‘9³çâóø8tè~¿ŸËW²lÙ ’É${÷í¦µõóæ-ÀëõrèÐ<–,^Ɣک„FBƒý7úîn&œZ–E,ãLK3;vn'<båŠUx<^¼^ñxœ;·³}ÇVΞ;‹f³áóú8vü(»vïäÈ‘ÃØl6|>?𦑗—ª(ØíþÕÕ5”•WpâÄ14›†ËåäÜù³”””rÿýÑÛ×CooO®>š¦‘_P0n2˜´T“ÈËå)*,¦ªªšÆ¦ÓttvŒ»FE‘É äåvH’D}Ý4R©·‡¢Q‹C4ãÈÑCÄã V­\ÍâÅK)((¤¯¯‡‘ðŠzMã³à FzõõW­µkÖæd¬®ë(Š2ÁCÚ0 LÓDU3©ou]G–圜iš†,K(Šx˜‚?D"®ëfÖº®#IRnëdÚ§eY—g9\Î8©d³í[’$TUÅ4MtCGUÔ\;6 ÃÈ8C)Š2AƲLtݘ´n?t]'Ig1M]×Ñuͦ¡ZE Ãçª(2²¬dfø£ã‡Œ?cîWd%×þ²QUUͽ³KO¦iæ¼öÓétîw¸Üî³ïî+ëŸí#–eåΕ•3LÓ0Ç•—-3󾿬FFFxçÝ7Y¸p1sfÏåôéS=~„Ç{·Ëû¾®ëÄq4UÃn· ëðW@°Ÿ-[·Lnê—$)÷’¼’ì‹0‹zÅHml¾(&³©“ÌƶͫÉ]Ù¾eYÆ&Û®(GelQWÊH’Œ¦‰v.¸ÌdmT–el66Û•íK™´­jÚÕSŠg ÙuýÉÊûû•ïðk½×ÇöI’rçÊ•++(òÄúfÏcïÁ…‹ç‘e™šêÚ\=ÁÍÎÕüPnGŠ ‹X½êî\Сêêj ‹®:è|õ¨póç­,ÄKUpó"! ÅOF—TTTŽ;æp8?w„@ÁKV׫‘HdÔÄt…s Ÿm»²ò_†|2™D×õ›¦>B^È_‰®ÄâqÔ‘ÐMQ!/ä'"‰DP Óâw{‚¤Õ4¦ibWeâi]!’4pj2† ºiá²É„^‡B,e¢Ê’ò_‘|ä&«òWÊÇo²úy!oà¶ËDS6c„²…òô³Ïþ§£ÃE˜6}Q‰¨®05:†AµÙi´°ƒ ™`LÅFë …¢Ù阡 y!/ä…¼òBþ&•·ÛíX²Áp‚*[é¥W^±vGg2bùŽ¥1ÍQ“”‰‘û¬9áZÇ„¼òB^È y!ÓÈË@m‘›>ÌB[#ªä¹l’Ê@$,]þRÖço¬ïß•ŸMvLÈ y!/ä…¼ò7‡¼ t §)Ò $¨0ÑéO§r_0-rª²$M8.Iòè1ËʆlÌÄ–ÈŒ2Lsâ÷Ç2î{“ž#süÚ²–uù¼@ Æc™õÅv††e’™ñ\*š¤q®Ï@‘¡¶ÐNM¾¤nÑØ'3P‰†;¥~­I.ö'±,(ñkÌ,uM™œîŒO™8l³Ê\øœ gzt‡Òã³”4êŠìÈ’DKo‚ž‘420¥ÐÆ”Býá4Í= tÃÂïR˜UîD–àtgœá˜]“˜RèÀm“iìNO›Bù @p²,q¶7A‘–f†”gž}ö?µ¥ NÙˆ¥LlªÄ¢7E^•i%j í4vÇY5ÍÚ>4UbU½—ˆŽ¢H|kY>n»Âìr'e~óýI`neFñ¯¨óp1˜$7Ç™"f—;™Rè Ä§²¨ÆMcW‚ºbO-ÌCS$–Nõ K05x~i>å•y6æT8iêŠSäÕxbAËë<œèˆ12¦|Á×M‘XÛà#7ˆ$ dIâÊTè™4©’h‚‚iYXdÖN- lêäí6cÍÌ´Óìß™uÚ«·]s´}gÖu3Ï«•ešP]`ga‹‹ÁŒYÎÍ2YŸ|}0-¨)´ã×ÒKý¯þN½ˆ„e'ž21-hHÑ6˜"Ï­PàQ9Û›ä‘yÖŸ ±áô‡ÂÜJ'ù.•”nñû}AZƒ)îå#¡›,¨ró‡}ì>az‰ƒ|·Jswb\#î éœïO ÊuÅNtĸo–ŸÆîo"’0¸{† (Øø·]AŽ_Šsg½—Xʤ¹;Á…`’é%™ïŽ$„â¿0-XTãæ[K (ñÙˆ$ FwNó²zº»&#Ë+ë½Ì¯rQâÓè éWŽ ‚/›*±f¦ùUN–Lq“L[TçÛùö²Ëí67XRëayŸC!ÑYPífa‹ùU. £ããWX€ß¡°zº—¹U.êŠÃ:)ÃbN…“UÓ¼”ú5úÃ:ÓK,âf~•‹åS=¬¬÷â²Ét§IèÖåõß+ûTÊ Ñ?ó5 nnlªŒj%¨PƒÈàÔdüN%¾G–áY~îmðÑ=œÂi“Qd‰Þ‘4¦eq1˜ ß­QÐèNa˜Ð;’&–2™Vì š2Žé$u“¶Á$å»gxynq>÷ÍòãÐd ÓbéO/Ê#30-ð9:‡RX–Eû` M‘˜Rh§?œ&ž6‰ëô…Óy5tÓ"©›Ÿ9ÈàÖF‚̬$iÒJ37XQçaN…“–žQª<wÖ{ÅuÖ¸¸kºH›+øj±)wM÷bYOY¬› ž6sí67XYïaÙT7Á°ÎÓ¼,ŸêaE‡R¿FR·xjaå-—´ .…µ >’i‹Ê<ëæ˜Sáäá9~†b:ÓŠ<8ÛÏœ 'ó*]ô‡u£:á„AÇPš´aMXzÛ§Bqã3^­àV ©›èFÖWŽé™uøÑÖÒ->>âŽÌ­tá¶ËÈxJNAÇRá„I¾;“-Ê¡IhŠDXÇmSpŒ&0ñ9F½#iÚ“ô„RfÆLµïB„_nï§À£Ro#©›ä¹TL <öÌà`0ªp©(²„¢H¸l2‘d¦afÓ@›VöÁ× º†S#:Ç.E饙QâàX{Œ=ç#œíI`Ý¡4[›Ãì>aF™MÃCÁW‡$ID“&GÛcm¢)}#iúÙvÛJ3£ÔÉñK165†8Õcf™˲8ÝçýãÃDS í9ÓÖÉY’ 3Øs>ÌúS!ª l,¬vÓ1”bsã»Ï…©/q`S%Îô$ØÚi K ÁW‡,Iøœ ú“è&Ø5‰¦î8єŴƒQqüN•¥Zû“ì=aQ­›º"Å>•ÃmQš{¬šæ¥¡ÌIu¾|·ÂpÌ`E½‡"ЦHljáLoY’˜Uî$’0ØÜ4‚"KŒÄ º†ÓD“&>§B©_ãÒPŠ¥S<¹2 <*çû’ Ç êK F ú#ºXBýaZ0£ÔIÀ–¦ÀêCúý+¯XÇÒ³±ü\L"K Èn»LÚ°ˆ%3/ÌìZº,a^`Y ÈŒñ0½üÿ•²c‘$pÛ2¹™³¦û±å.EdâX™Ñ3€yEyÙs n/F—sq#$@•%R†ÅŠ:‹j\ünOhRøn cßMcßcÛ-cŽ« üôîbŽ_бÿB4³/M,³¶ÐÆóK øÍ®~‚=÷N¼òY¤IêsµúNæñ/¸õ±¯C¥@áNws&;ß•¦E(fdAv Þègæ'»m$ûûØÿÍk44Ë"g–çh2ZޕǬ+Î1ö3ÁíÇdÑ©²æ|ôH¤M’ikÜçÁWÉ•ïÉ ÇrÿdK$ÓkVʰrAҮĴ2K£IÝ7šìW«Ïçù\p c×!ã2Ë;ª„#¦"q¹!Žþ“%ŽEZÖå5«\c±>»¼ô%—/äo?yE‚SqÎ÷%0,ë†×GÈ ùë•·,‹7 ’Ò3J_šD^–¡'”楽9kìÍR!óÊKRÆ·N=¨<ýì³ÿ©5YH~ÀK8aŒ:’((²Äô¡„Á¬r'†ù.•ò€DÚbN…‹HÒ¤¶Ð.ä…üM%ŸiÇΛ¦>B^È_¯|ÏHfÿ½y y§M!©[7eý…üÍ)?»Âɹ¾$éTŒi®A¤W^{ÕRÊ#»ò±, U–r[<t#³öd˜™„$e~W•ÌgŠŒòB^È y!/äobù´fb³ëª$Á½³|äçç!àëÉà Î¦îLš^ óFWG Á—IV×Ë7º"@ ¾:„âà6bÂ>~Ó²ééíÃfÓ¨©®ÆápŽDèîî&‘LRYQA~^ÃÃ!:»»r[óìvU•Øl6‰½}}Ø4ee¥ôöõÑÝÝM^^U••ÈòÄq‡eYô÷÷‰F©¬È”ÇééíÅårQR\œ“ëêî&80@yYE……„ÃaÚÚ/át:¨©®FUU àýÒ%"Ñ(5UUø|¾}߀D"A,#//é+ÚH?88„$Kä7úò7ˆ Š?J±yëV.\l%3wöl¾ùܳœ8q’MŸ|‚iš¨šÆÏ~ò½½½¼ÿáG Itvv‘L&ù¿ÿóÿAjhˆW_ÿ#ƒƒƒ,^¼˜Ç×=Bk[;¿ùÝïðz=ƒƒ<óÔ,]¼xü¹ÓiÖoØÈÁC‡)(Èçûßùyy›·lå­wßeÁ¼yü»¿ü9’$qàà!Þ~ï=TUE×u~ò£’——Ço~û;†C!¢Ñ(w­ZÅ£<ÂÇ7²{ï^$IÂívó³^ °°àFß{ÁçD× :Äì†ü~1ˆܺ45Ÿaçî=üü§?AUÕ?½Àë`ý† Øl6ž{æé/¤¼sçÏ“L¦˜=«aÒÏ#Ñ(ÇŽŸ`ùÒ%_Ù5 ®Í„§`³Ùxô‘G°L“-Û¶sìÄ t]gá ˜7w ñÿû?ÿ/Ξ=ÇŠå˘>m†aò«û7^‡ùõop8üõ_þ¿ß@OO±Xœï<ÿ<ï¼÷==½*sôøqvíÙË¿ÿ=ª««p»\ܹrñxœîžâñ8ë7nä¡ûïgɒżúÚë|ôñ*ÊË‘$™ÿùüœ¿p‘ßþþ%ÊËËØµg?øÞ÷(++åïÿñŸØ±kO?ùľ÷‚ÏÉé¦Fþå׿aåòeÜ»f µ5Õœ:ÝH[{S§L¥¤¸˜‹­­D" ˜3{Š¢Üèj n39rä(šÍÆâE ‘e™¦¦f"‘v‡;æÏ'™JÑØÜÄ›ï¼K^ÀÏ+V`·Û9vâ½½}ÌžÕ@Mu5§›èíë#‹QQQNOO/>Ÿ¥K#KÒùƦ&B¡$IÂï÷sþÂ;‹-Â0MtøjÏŸ¿0®ïH’Ä™³géêꢲ¢‚úº:šÏ´ ‰DÙ»?áp˜§žxœ¥‹£iZ®<˲ؽg//½ò*Ý==ܵêΜÕVp㘠ø%IÂn³ñú›o²þã<¶îl6[Î,âÔ)À¢ºº Y–±Ûí´¶¶qáb+óW?'süÄ ÊÊÊxñ¥?0­¾žî»—ÚÚR©$ÿ‹_H$xlÝ#tttrº© €;æÏçø‰“ ±~ãFÜ.=ð5ÕUäçåá÷ûéîéA’$‡H&’ÌšÕ€ÛåbÑÂ…üáÕW‰D£,˜7ÇìY ¸œN>Š×ãaÊ”Zv;sfÏæBk+–e}e¦5ÁK"ž !•N±wÿ6}ò 3gEilnâÕ×ÿÈ’Å‹ÙøÉ'­žšêj‚Á Hw®XNqQo¾ó.ùùyôôô2¥¶–§Ÿ|’­Û·³qó'ª*+¹wÍ=?UUcå+Ð I–I¦’¼úÇ7¨©®bæŒé4·´“þp(D<Ç0 °Àát`šf®ïôöö’ŸŸÃá íÒ%Ú/]¢£³“¢¢"::;s“'MU  ÐÛÛK^^ƒãÊ”$H¥’´µ·c·Ûq:7úñÜö(Ï>÷ìš2e n—€¡áa^~õ5>Ùºcdzrù2Ýq7ÂéÆ&EæÄ©SSZRÂá£Gq:Üs×êŒ ÉfÃfÓøèã ìÝ¿ÀÏC>@ÝÔ©\¸x‘=ûö“J¥yê‰Ç'8ØqàÐ!¶nßÎ¥ŽN}øaŠŠ yç½÷9|ä(¡QÅÇ‚ùL2…ý±gß>Š‹‹xò±Ç¨­­axh˜ ›6ÓÛ×Ç3O>AÃ̰uÛvŽ=Êü¹s¹wÍádr £¨*ÉD’=ûöSTXÄüyó8xø0ûöÀ4MEæ£7ÒÚÖF<ç©''/OD¦|u¸œN4MãСôµ_"ððûyç½hkk£³³“ÇÖ­Ãëõ2 ±pÁzzzp¹\¬ºs%Mgšin>C<gZ}=]ÝÝÔTUãñxèëëãŽ;ÐÑÑIYi)K/¤±©‰æ3ãå«++)/+§?ØO󙢣;¥fLŸÆ¾ýÑT•-Û¶±gï~9ÂÐð»ƒM›?áb[±xœgž|’Ù³h>s†ýx쑇éî饪ª’ò²2Gchx˜Ò’þðÊ«ìÝ—)s`pysç0<âðÑ£L©­}ñ‹Å¸ØzéÕ×_µÖ®YKQa1ÝG"Q‚Aœ%%%H’D:Æ4ML3“ßÜf³¡* º®#IÒç©ÁA¢Ñ¥%Å9S½iš$S)4U½ªâ'ô÷÷ãóúüX–E*•Â4ÍŒÅpØí¹:% \.Wîü–eFÑ4-7ûƒÌ¶]7p»]ÂÌÿ5À²,’É$ªª¡ª ©TŠX,ŽËådϾýìØ¹“~ôÃÌŒeL;¾Jb±º®ç¬£¿ø×_ñÓÿ˜ò²RÜnwîšÝv  ( étšX,†ÝnÇn·c²,#I†aäv3I²Œ"ËW•—eÃ0 ‡±Ûl9­h4ŠÍfÏY°@QdöîßÏŽ»&ôÃ0H¥ÓØl6YF×õ\ù©T UUI¦RãÊÌÖ'=ú}YXßnýÁ~¶lÝ2¹sŸ×ëÁëõŒ;®]e}ôj ¼ ?Ÿ‚üüqÇdYÆép\³bN‡ƒêªªqõ±_åÅ­iÚ„zI’„Çã™ ëø”ó n-$I÷Lm£/5È$§°Ùm¡ ËŽàâºb-]U òq»3Ö±ÊsìäIÓ´ÜŽ(ÿžÍþ>öصäE™°gßëõNZ_I’&í;Š¢àS¿+ßûÙ¾LúŽWE쬹‰oEÁ׎¹sçP]]…*^4‚›ˆ²²2~ôg6éÄäfaîœ9TW‰¾óuG(~Á׎ü¼<òÅ:¢à&Ãåt2}Zý®Æ5}çö@,¶@p!¿@ ·Bñ @p!¿@ ·Bñ @p1Á«ß²,‰áHUQ üÈ£"‘zZ'ðc³ÙH&“D",2û?UUÅãv£(Êh  ’,ãݳÇ…p»Ýø®²2Áv’É$EQ0 ƒh,†¦ªãÂ=F£Q"Ñ(~Ÿ/·§[×u†††Ðl6cöµ†FFH&“äå剽Ý_s’©–iŠØ ‚›Ã0Ðuýª±J¾ ’É$ÀWzNÁÍÅ ˜J¥x÷ƒ9}º‘´®sÏêUÜß½:|„?þ˜t:MUe%öÝïpîÂÞzç] êW–$þ÷ÿõÅfÓøà£õœiiaÞ¼y<ýÄãôõ÷óâ^&Ž€Ï?÷3gLwnÓ49pè0Û¶oGUU~øgß§ ?Ÿ­Û·óö»ï±`þ|^øári"_ÿ㌄Ãðƒï¯ÇÃko¼Isó,,[÷w®XÁþƒùpýÇ$ ¦Õ×óç¿ySï¥üilݶ¡á!¾õoÜèªפùL æ{ßþÖWàæƒõcÓ4[÷ÈR^Oo/zZ§²²bÒÏÉ$mmmÔ×Õ‰ >7 bõ˲Laa+–-`ßܹb9~¿ysç²|ÙR>Þ´‰Â‚æÍ™Ã °lÉzzzñ¸Ýܽzo¼õ]==<ÿÜsÌ›3»ÝƱã'8|ä?ùÑi9{C×™Õ0s\ešš›yåõ×yðþûY»æòLd+I&žH‰FY¾t)étšßüöw4ÌœÉ7žy†ÓMM\êèdhx˜Ææf~ö“È øàÃõTVUòÇ7ßbÝÃqßÚµlÞ²EQ©¯›z£ï½às’L&ééíÅív‰FÆãñÐÛÛÇé¦F> @ÝÔ©ôôôÐ3šÎÙu•ŒdÁ—A<çLK ƒCÃøü> Ó¤««›žÞ^Âá>¯— ­­lÙºÇÃÈÈHî×~é­­mØì6œN']ÝÝttvréR†apáb+áH„€?€$1A¾»§‡þ¾~‡2)ÌÏž;ÇàÐ ^¯—£ÇŽcsçÌžPçh4FWw7ݽ™l~I’èíëãÒ¥KX–…Ë墧·—þþ~ºº{øpýz:Lii)¿\H^˲8rä(ÿú›ß’— à÷ Kà $«ÂŒ_–eŠ ùà£õ|¸~=kï¹'—Q)??ŸöK—(È/ÈÅ…îíëãBëE^øÁH&“ì;p€ÚšjvíÙÃÌéÓY¼h!uuSI$üý?ý3‘h„Ç×­cppˆŽÎNjkj8pè0ÑXŒ³çÎÑ ²zÕäçåQ[[CuUMÍÍH’ÄÀà #á0w®XAII1÷Üu¯½ñ&Á.X@eEÅEElÚ²…Ý{öâr:YtÇ8/\Hcs3Üw¯ˆÙ‹ÒÙÕÅo~÷"ÿñßÿ>zŒc'NðìSOòëßþŽÂ‚ZÛÚ˜?w.7mæÀ¡C‹Çyá‡?¤ºªòFW_p ë:¯¿ñ&=½½$S)–,ZȬ†þöÿý¯™ôåÜ»f >¯®înŽ;Îù‹ùÆÓOãñxxç½÷ñú¼˜¦É¿ÿ=~ûû—ˆÅb(ŠB†™38á"?}áÇ$SIÞ}ïƒñò/þž¡á³f¸ØÚJwO‹.Ìd¼Ê»ïÄÉ“¼ôÊ+ÔÖÔ008ÈóÏ=‡Í¦ñÇ·ÞÆãv‰Dxöé§yïà ‡(**âì¹³D£1:HUeÅ„Y}ËÙ³´¶µ±}ç.JKJðù|7úñÜöLêÜ'Ë2µ55ÌŸ7¦æ3„Ù÷ýÁ ¿ýýK,Y¼hÜŒyëö”—–2}Z=±xœXÚÚÛùdÛ6¶lÛF_ƒƒäçåQ^^Fk[¯¿ñ&º®™‘#£Õ², ÝÈ}™,Ë"N]>FF>­ë¹Y¡ðoeLÓÊ={Ó2Ñu‡QXPÈ_þì§Üs×j$I"žH0«¡¿ùë¿¢¤¸˜Ý{÷Üèª nzz{Ù±{wÎj÷Þ}$“Ißÿîwxþ¹çرsáafLŸÎO~ü#æÏKsK Ûvì`84ŒÃaçØñtw÷ Ë2k﹇§Ÿx—ËÉ÷¾ómÊÊJ9{þ;wíž /É2ko?ÿM-¼ƒéÓ¦áv¹9~â$ÉdòªïÀd*EII ù³ŸrçŠ|¼ië7ldvCýó¿ ¾®ŽÍ[·bwß½š¿þùϸsåJV®XÁ·¾ñ ~5’$±rÅòÌ5þðL2åF?“¬ñëºN,gÞÜ9~þËßý7"Ñ(‰d’_üò_ðûý¬½ûnLÓD–ezûú8xèßýÖ·Ð4 UU)+-eé’ÅÔ×ÕÑt¦…žÞZÛÚ)**¢aÆ 9täßùÖóܱ`~îÜy%ÅEÜ·f ^—õ7’L¥H§ubñXΙ0?/דI ìrrððafLŸNiI ‡Žaõ«¸pñ"†i°rùr~÷ÒK465SSSÍéÆ&–-]"”ÿ-Œ¢È$’ÉÌ 3Ã2MdI&‘HH$2™ÂFs—«ª‚¦ªHR&w¹@ðU !a·Ù)++eÁüù——-eMÓ2™öäÌ;H‘YÆn·'$™üü|fÌ`vCåe¥X–‰¦©¹¬£Š¢`³Ù°, Yž\ÞéÊ8B¿ñÖÛ¸ÝnJKKhkoDz,bñ8Éd’´®c™Ù¾¢bYŠ¢ iZ&ëêh}É$‰D’d*…Ýf#:špÍf³e>O$ˆÇã8â‰Ä˜23ÉyLÓ È3„sõMÀ„5þàÀÿöâïÙµg{öîcZ}=w®XÎ;ï½Ï†Í›q»=?y‚üü|JKJسw/±xœÇy8×c±ë7läð‘£$’Iyð!ª«ª8|ä({ö§›u=4ÁìêõyÙ²m;‡ŽåTc#w¯ZEuUo¼õ6[·ï £³“®î.˜Oii 6nbמ½èzšçžyšéÓê9Ór–õ7qº±‘￟¥‹¡i*ïø{÷ ¸¸ˆÇ]'Ö™na4U娉Þ°‘­;v°{ï^úúû±Ûllúd —::hmkãÉÇcö¬YìÙ»’L&yüÑGimm¥²²‚êª*LÓ`Ç®Œõ¢¸¸˜ûÝ‹l-³··—†™3¹p±•CGŽP[]MžÈpÃÈ®ñK¯¾þªµvÍZŠ ‹€ÌŒ¿«»›Î®.Ü.7Ó§Õãp8&‹aš&ùùù¸].Âáð„T¸étš‹­­„FF¨›2…üÑô¼‘H„‘p—ÓIàŠ4‘Yúúúimo£° €šêêÌšþÀÉd ¤Ì2DIq1Š¢084D(¢°°ïèù‰½}}8Š ‘eÓ4éI$”‹m^_†‡‡éíëÃçõár9ñûýŒŒŒÀápàózyówà᤬¬tÜöNàË&NÓÛ×G*•¢°°þþ~þû?ý‚o=÷••”—•‘N§‰'ø}>b±–›ÁÁA‡†ñz=F33}YÎmaŽD"hš†Óéœ\ÞfÃápŒ:ìuár¹ðx<Øm6zz{ñy}$’‰Ì2¨§ƒ“§O³ù“-|ó¹g)+-¥¨°I’ ‡‰D2‰‡P(„ÝnÇáp`š&ƒƒH’„ßç£?¼\¦ÃNAA±XŒp$B~^ž˜tÝ@úƒýlÙºe¢â¾.üÛ‹¿GQd¾ÿïÜ誜;žùõoø_þ§ÿHÞU&>7š­Ûw°wÿ~þ§ÿðïQa’ÿº‘UüâÉ ¾¶,_º¾‚›ƒÂÂBôÑqAÈn6¦Õ×áñ¸…?Ìסø_[fÎüÓ ¾ ~?«V®¸ÑÕ¸&•TVTüé njİN ‚Û¡ø@ ¸Š_ ‚Û¡ø@ ¸Š_ ‚Ûˆk*~˲21ò¹œ7Z{Ÿ ä™tºY¹ì÷Òé4©túº+2¶¼qå^£N¦i^µNW–“•Óu}B}MÓË2à®,/N“¾Žkš¬¼«Ý§d*5.ç€eeâÐgsfº®+3û¬®¬{¦Ü‰uºòüWã³”9™ìÕîÉ•X–uÕç(ÜJdûû•ýS ¸Ñ\u;_k[ÿð‹_òغG¸{õ*^yíuΞ?,Ë r×wòÄc²yËVvìÚÅCÜÏÝ«Wc[¶mgϾ}˜¦Éª•+Ys÷]¨W‰ÏœJ¥ø·Ïp(Äü÷ÿC.¥ãC‡xé•Wùw£‰!††‡ùûúSkkùŦO¶°gß>dYfdd„Úš~ò£NˆÌwâÔ)Þ}ÿ€\<é¿þù_àñxؽg/GcÚ´i<¾îÂá0ï~ðÍgZ(,(àÏøÆ¦&4McÝó`~&)Ò}D$ez}=O?ù$.×Ä}¿###|´aç/\¤¸°Ç{”¢ÂB<ÄÎÝ»¸{õj/^Doo/|´ž¾þ~ê¦Lá±u`³Ùظy3ûÂn·óÔã1«¡aÂy Ãàà¡Ã×U¦f³ñÉ–­;~§Ëꇤ¾¾Ž––ñ÷díš5Ø4m¹úúúøã[o384ÄO_ø1ÅE“•2M“`p€@ÀÍf»ýF ¸&±XŒ>ÞÀ¬†vîÞÍóÏ=‹_DŽÌljD£~eeŠ÷Æe&ÄêH$“¼øÒØwà 3gÐ0s&ùÌœ1º)SÙ»o?w,XÀÔ)µôõ÷söÜ9¼^/³gÍÀ0têëë¨(/çí÷ÞgÞܹø¯’Šqïþý¼òÚë¦Éƒ÷߇,Ë òË_ý†––³¬Z¹’²ÒR,Ëâ½?dýÇÉÏÏçΕ+ðû|L«¯cvC'Nž¢¨¨ˆ%KOHÀãr:™R[˼9³éîî%‹rß½kÙ¸i3{÷ïgÍ=w3»¡¯Çûï@k[;O=þ8­mmœ<}š‚ü|^~õu¸ï>*ËËyëw™9cùWÄœŽD"üò׿avCóçÍcÃæÍ‘ŸŸGp HccÓê멬¨ÈÍæÎ™,ËlÞ²…Ë—¡(2åeåÌj˜Éû­§ººŠÒ’’ ÷íý>¢µ­u=DGg'-gÏRŸÏ^}•{׬¡´¸˜6l`挼ýî»Øívî¹k5‡!‘H0<<Ìæ-[yæÉ'1M“ ›7³xÑ¢ ƒ¦K¼ôÊ+ŸZf2™ddd„O¶nåñGÅ0 vìÜÅÌéÓù·_O )+-pMáH„ÁAN76±tÉ’«†Øíù§_þ n›¼¼Åd*&3uJ-uuuìÞ»—–sgY0Þw‡%{A6›ùóæÐÓÛ‡ÍfC–dJKJH&“¼÷Á‡Øm6ÊËÊ&¿wÁ óó™9c:ñDœ÷?üˆÞÞ> Ã`z}6»Í[·ÒÚÖÊàà3¦OcÖÌ™œ?¦æfœN'‹-äŽó™1}‡ãâÅÖqÙ¢Ñ(º®_³ÌsçÏÓrö,uæT3¦O#//ÀÞ}èìê"ŽŽ»'gÏŸ›p€Ò’î_»–#G^³ñ=vœƒ‡34<„išT”•óò믣ë: , ¨°7ßy¯ÇƒeÁwžÿ&S§Št ‚¯Žx"Á†M›Xµr%ÁAÞýà,ËâÞ5kX0¯¾þGe™Ç}”p$Ìú ñ¸Ý¬¾óNŠŠŠøÃ«¯¢isfÍâÑGž0¡9zìxå5ŠŠ ¤¬´”àÀw®\Á}kÖðòk¯Óß ¾õçxé•Ly‘H„¹sæðÔã“yá‡? ±©™=ûö¡( ±XŒ¿ùËŸ³aó'ttv"Iß|öyéåW'žwÅ ¸ÿ>^ûãtvuM/))fxx˜o<ó ;wíæÀ¡ÃhªÊŸ}ﻬ{ÝÝÝüÓ/ÿÛM,ç‰Çeú´z^sßžxìQšÎ´°ÿÀ|^ýÁ~.¶¶]µÌ±ï C7¸ó&¦ôe2a¿§·—ׯçî»Vãñ¸‰Çã¹uíX,Î'[¶rת;Çe93͉kX==½¼üÚëܽzÅÅM¶†aðþ‡˜ÝÐ@*•"žHpº±‘CGŽpßÚ5H²”3ß¼ñÖÛÌ3›ò²R‰Dn ܲ,6}ò ³fRUYɵصgn·‹ysç‹Å  ˆÇéèèà7¿}‘S躞‹Qí°Û±,ˆD£(ŠdFñv›}Rÿ…€ßÏ=wßÅ˯½Îÿõ·ÿ…Ý{÷åÂsf×û®–45ŸaãæÍ¬{ø!œÎÌl;•JÉTŠÞ¾¾I¯åÞ5kèèêâ?ÿßË‹/ýT*Í´iõ4ÌœÉßÿâŸù/ÿõ¿qöÜy|^>pÛwîâ?ÿíÿÃ{~ˆªª¤R©ÜufÒ)+¤õ‰×T[[ˬ†O)óƒPT•¥‹ãt:ø?ÿöÿá~ñÏ RRRÂ=w¯žôžL†a£÷ùêÏqÑw0sÆ ¾ó­o±xáB6lÞLMu5ÿþ¯ÿе÷ÜM,CÓ4~òã1¥¶†?þý:ü ‚/ Ó0"•NSVZÊOücžzüq6nÞÌGë?fxx˜Ÿ¾ðóæÎáíwߣåì9âñ8K—,aêÔ)ôõ÷ÑÛ×Çü¹s™7wΤiÄãñ8€ŸŸ¾ðcEaÙÒ%<ôÀý>rUÓ¸û®Õ¬X¾Œ®înŽŸŸ—¿øÉ T”—s±µ•Õ«V1Þ\~ò£RXP0áÚ’É$±XŒç¿ñk×ÜÍë×óñ¦ÍãïÛ{ïÓ짪²’¿øéOx䡇˜7wÎUË\´0ûÞxž%‹Ýè&rC™0?yê­mmlÙ¶³çÎãr9©­­eŲ¥;q‚x"Á²¥KLÊóŒB31ÍÌ,Ëôôöò/¿ù •ÜïÚIíÀà BÓ4Ú;:8wî<¯¾þG’©$=½½¼ýÞû?q’d2I0HcS3¡‘fÃæÍ<¾nmííœi9Ë_ýÅO'˜vÆ …ع{ë~§ÃA4¥¬´„§Ÿ|‚šêjþÛ?ü#]ÒØÜÌìY 4·œÅëõ0oöl6lþ„¡¡aLˤ·¯wÒÐ›Š¢ðøºu,[¼˜‹mm ‡†™RS›q‚3 ,ÓÂ03Žo’$qæìY~ó»ßq÷êÕ,\°È8ëÕ×Må¯þ3þëßÿ'OfîìÙÎ5­¾Žÿð7ÿŽÎ®.>\ÿ1.—‹‚ü|~ð½ïÒÙÕÅéÆ&¢ñee™ [Óëëéèìâµ7ÞdæÌŒÁ™³gI&“´_ºD*•¦¼t¢uÁåtòƒï}ïSˬ›:…ââ"þêg?ãRg'{÷íçü… òØ#°tÑ¢q÷d2,Ëu ÌüŸ]¹²ýØvTUÅa·£¨*#á0åeec2Df²E–S^^N{G–iÂèàM øÒ‘.·[Y–±Ùm~’É$ᇼ¼ùùù$’ î¿w-åee¬ß°öK—xæÉ'ؼu+§›øëŸÿšvùu-Ûårâózñy}¹åZY–éêêâ­·ßeJm šª‘J¥Ñl6~?é´Žªªtvvòæ;ï2¥¦MÓ ‡I¥’¸ÝnÒé4Š¢‹Å3·†ÉÒÅ‹˜>máHdÒó"C,›TÞãqãóg,¯¦eáp8Pd%·ôa˜fF¡ŒbÊbš‰D’P(„;wß H&’X¦E^^€‚ü|¼^ò5Ê´Ûl£ï ÇU}În&\ýŠeËh˜9Ó4yíoŸŸÏÜÙ³H$lÛ±ƒ•Ë—ç2K ñÞ²wÿ~ìv;ª¢ðÈÃño/þžÝ{÷rÏ]wño/þžgžz’àÀª¢2cú4òþ÷ÿí%Ö9Ór†>ÞÀÃ>€Óéä‰Ç#OH$¸wí–-YÂ’E‹0 ƒm;vr±µ•U+Wb˜&Ûv줾n*Sjk¤éL K-·.vøèQl6-§`ý> 3gðò«¯Q^VF0Ⱥ‡fÖÌ™üö÷¿§½½Á!ô/\Èé¦&þîþË2©(/gVCÊ¥×ÌÒÝÓö;ijnfá‚LŸVO{û%Þÿè#N56!N3wÎþû?þ==½”””000ȳO?ÉŽ]»hmkǦi\êè`í=wséRýÁ w,˜Ÿëð©TŠ}rìÄ ¢‘(Ï<õ$YÙ½wçΟçÁû €‘‘0;víæTc#…ù¬Xº”D2ÉÉS§ùÛÿ÷ïGÂ,[²˜‚‚|víÙü9sðñɸž2W.[†eY?q’‡ÓÙÙÉsÏÈHOGE%;+ ­VË/ó"¶ØX‡™U\DAA>§“„„,3#n7Ò¤íJH}ÜëÇ^©’–š‚kØÅ+¯¿Á–ÍpäØñÈí$â)3›®înÞÞþ.=½½,[²˜%‹ñ»×^¶Ûºµ÷ÓÒÖ-75%…áÛ”Ǧ ëÉHOcÛŽ(ªÂ‚yó¦ûð˜6›–·«»NGbBÁ`æ–VÒÓÓ°˜Íø|¾h¯bbc(*( ®¡‘áTUE£Ñ––Ê¿þâ—<²i+W,Ÿ´ÇCo_¹99~ÞÒÚJbBË͉‡x<^22ÒQ…–Ö6l¶ØèD»m;vÐÖÖ>z…|ódßÙÕ0!H¸Ý\¾r…AÊJKÉÏËE’$::;iii%99™ü¼\dYfdd„šÚ:`Vq1N§“ÿó/ÿÊþì§êÝÙÕEù ÒÓÓ˜UT„^¯ghhˆú†ÆÈ¨ˆªš’BJr25uuüUÁd41»dV¤g]U…Ïë£tÎl òóùçŸÿ‚ŒôtžyêÉèv"ÿ<²¬avÉ,âãÈ¼Š–Ö6òórÉÏËC–e†\.Î_¸ˆÝncvI ÖÑöt8œÔÕ×cµZ).*äÊÕkìÚ»—¿ø³?0ùÓ–©ª*—®\ÁåfVqééS¶‰×çãoÿþØüðÄã¡§§—–ÖV$IBQUòssHºÍÌ~§s€–¶V232ˆ§¡¡îîr²³ijifç®=lzh9YÙFoÕÂÝ088ÈßþÃ?òÝo¿@8ÂåFoÐ3{Ö,L&½}}ttvb‹µ‘“EWw7õ ˜LFf—” ©ª©FU¡¤¸˜ØØ*«ª"·U°ÛmÑ<÷™´¶µ“9:œN232¨­«ÃátORR"n·›Ô”ÈDéîž²23¨«oÀátGzZ:ƒžêšZ›š8uæ ÿ¿ÿú_ƒÔ×7 ÉE……hF¿ÿSm7';‡Ó9åë³23éîéA–e’“’hlnÆëñŸŸOss3ÃÃ#˜L&4™þÅ/ÙøàƒdggQ:{6ƒ¾¾>ÚGÛ-7'›Þ¾>$ %%EQhji™²L£ÉȬ¢"<^/-­­d¦g”ôå=Qðu1––÷cÿ—Å5<̵ë×Y:Ŭñ/“ªª\¾z•„øøI_¶Î®.ZÛÚX¶dÉÇÞbø¢Á .\¤d\p¿Sjjk Ì-+»£Ûq¹\\+/¿cÇÑcÇ8sî<ñïþ,¾p÷•߸Á+¯¿ÁøwFÂ÷›¿ªšššq séÊø·ô‡ÓrÑ\ßÐÈ/_|‘ÿüÿþ¶O÷ŸÝXà¿+7:bcb¸÷ž{îøv$IbñÂ…wc—HOK»íŒû/“^§»k³OǞƸÓbccïèñž–΂ùó@¬›"L·Ç承Ãë_¶~§ƒ /a±Xxî™§§m¤,66†K—Š[twÈ]éñ ‚ ‚0½Æzüb­~AA˜ADàA„D~AA˜ADàA„D~AA˜ADàA„dÒsüþ@€Ý{öÒÚÖ†F£%!!Ž'³ÉD8æƒ}108È·Ÿ.ºpM]}={Þÿ€gž|’ÌÌ =Y"W§‹äzߺ…”ääI¿V^΃‡ÐétȲÌú×Q2ú,ù'•ùÄc[ ‚lï½È:ìÀ’Å‹§\C_øfQU¯×‡Á +ò _I^od‰óâ¢"®•_gúuãrI|}ƒAÊ+*(,( v\¢¶;éÓ|ß@$Àhú^áãMêñ.^¾LRb"K-¤töìhZÝʪj^~õ5N9ƒ2l=¯¿õ6{?ø>G$úµëב%‰Å‹²`Þ<Ì£KüÞª¾¡‡ÃÉ¢ X´pAtÙÝO[fWO7uuuÌ-+cÉâEÑ%b…o¶‘7/þîw446ͺ§( ¯—P(I¢(Gÿ.w›F#“œ”ˆßïçØñ“ôôöE3ŠŽ †BÑó(DtùýþèÏEÁç÷Gñ[%µr{<„B!‚Á wÂk|>_4ùTeªªŠßï¾&ãñxo¾' âõù‡Ã„B!ÚÛ;ðù|(Š‚ßïÇçóM¨ÓXF×Û}÷Æê=¾^cÛ¾µ®¡P—ËÅooù¾ßZÞ¡#GÙûþo)S˜Úä•ûF9ô;$%'QPN§cxd„Ýï¿ÏŠeKq G?Ô#ÇŽ£* K/W„Äk§s@â‚eXIDAT€9³gG×öŸbS¸=nzûû(*($Î÷™ËK]›Ÿ—;娂ðÍsæìYö}´Ÿ††žyê)Š Ù¾s'}}},^´ˆÌŒtöí?€ªªX­Vž~â‰)SC ¸z½œùóæÑÓÛË‹/ÿ«ÅÌ#›61«¸ˆ÷?ÜGCc#V«•-›add„÷?ÜG8fíýkÈÊÌäÝïár ³`þ<Ú°~R–Êëå7رkWdu;5²Ú]o_|•+–óÑþý\¿QAŒÕÊSO<޼ûÞ.\®a.˜Çª•+Ù¹k7äædóø–-ìùà*+«Ñëu<ÿì3¨ªÊÎÝ{øý~žyêIúúûiniá׿} ­FËÈÈ[·l¦lÎvìÚMSs3@%‹òè#O¨³¢(l{wíx}>Οφ×QQYÉ‘cÇ †B¬X¶”ü¼<^}ý ´Z>Ÿ—ó/QßÐÀÓO>É=+WL(³§§—]{ö200ÀàÐ/<÷ìǦþ@óÔÓOýe^^^4µ¢$IètZ$I¦££ƒCGŽ2§d6'OŸÆét²æÞ{©©­cͽ«iïè`ûÎ<¾u -­­–šŠN«‹d¥âÃ>"--•Ô””I×jµÈ’ŒßààáÃȲŒN§cûŽOSfééhdEQ8}ö]]Ì--½£kç ÓÏh4RY]Í–Í›Y´p{?ø`0ÈsO?MnnÍ-­\»~çŸ}††Æ&šššY0Þ”é¡áNðx<ìýàCr³shimåGßÿ}bbbØð ^¯+×®ñÌ“OÐïppîüzûúhmkgÓÆ defR[WÇÁ#GxhÃz òó‰³Û'¿UÕ5TU×ðÝo›CGް|ÙRÒRS9sî<))ɼþÖÛ¬X¶”ªêZF†‡Q…‡óІõ0<<Ì›ooãžU+™[ZFbB"½Œô4Ê+*èwôsõZ9³Š‹Xsï½?yŠÂü|Μ;GRR"W®\å[Ï>ƒ? ºº†p8Ìõ7øî·_ ³³‹÷K-šPgEQع{ÙY™¬Z¾‚÷?ø³ÉÄž÷?dåòeÌ™3›ïíÂjµrþÒ%Û²™ùsçÒÐØÄ–Í›Y¸`>†[†ó ]ÝÄ'ÄóÌ“O`‹ßõÛðx<457Mîñët:Ö­]y‘×Ë_ÿÍßráÒ%Þß·‹ÙÌÞ?¤²ºšïíÂ90@Ss3GŽçú ŠBbBK/bÉâE¨ªÊ?ýë/¨¬ªfþܹ“*QXP@Qa!»öìåʵk4µ4º2+«˜WVÍXwùêUÞÞ¶·Çƒm\JYá›'Ö‹Ùl"=- «ÅBWW‹. ##r«G’$)™5‹~‡ƒ#ÇŽ …&¤i„;J’" ô=I‰‰X­>Øéég¤§S\T„Ûã¡¢²Š'ÛŠÙlæ½={¸÷žUÜ{Ï= ¹†9|ô8ùy¹defNZ·^’$âãídf¤“”˜HrRª9ö÷÷32óÔ“¼ðüsœ>s–úú¾ý­ç8}ö,C.>ŸŸ~‡“a×0›"=-«ÕR$¥¯$IÄÆÆ’••EwO/===´wv’˜@fF‰ ñ  MÙ4Z­–ì¬,-\ÀGRSWG0dÞ¼¹Øm6vìÜ…Ãé$ÎngVQZnôûž:å¼N‡Í‹,KSv0…É&~—ËÅÞ÷12<ŒkxƒÁÀüysÉËÍÅëóÒÐÐHww%%³°Z¬,Y¼¿ßOcc³Š‹‰±ZÙûᇴ·w éêéfÃëèìêBÒÆ%¶9uö,×Ëo ­míl\¿Ž¼Ü\Οÿ‰en\¿ŽªêjŽ8‰,Ë´µ·³pÁ‚hÊYá›K§ÕËûö¡Õj˜[VÆ¡#Çðûdgg*-­­<|„ó.°hÁ‘ìC˜6N§“‡ÓÖÞNA~>÷ÞsooßΛïl£¹¥…E ÐÛ×Oll ƒºúrss‘%‰¤ÄDjëêäÔ™³x}>TU%#=¿ß‡¢¨‘{æŠ2an@^n.ÙÙY$ÄÇ“”@^^.míHãÊìêŠôÊ3338{î<==½TTV²dñbœÄÆÆ’–’¶wwPV6‡žÞÞHÊlE‰Þ§WUuôÌ++åÅ—_aûÎ÷¸~ãÙYYÔÔÖréÊU$IB’$æÏK(âÊÕk âñxXûÄx¼^Þzgf³«ÕBQAW¯_#¬(5šÑïûGhµZE¹Y&°dñ"’“’¸pñ"á¾Õ÷ˆ‹üO0)ðë òrséêê"//—…ó˜x3­dqQE……,˜7oô'ùXÌrssˆ‹#;+‹P0„N§cËæÍ$%&ð÷ÿø¿¹÷žUZJ N犢pÿ}÷1«¸Y–ÉÉÎþÄ2s²³èîé!7'×Ë¢… ˜WV&fyÏF£‘o=û,7**FG¨îÇj±ÐÖÞ1z2ŠÜcmkkcÕÊ•¬\¾L ý wªªÄÇÅñ­gŸehhˆ’âbV­XA||F£‘Úú:X³†ùóçÑÐÐ@}ƒ‹ysç²rù2‚Á n›ääD~h&³­V‹N«E%2ypVq1)ÉÉ‘sâ#• À–G!3#ƒï÷;\¹z ׋^¯G«ÕâWfœÝN8F#ËüèûߣtÎlžöjjëX±|yy¹d¦§súì9º{zˆ±Zy|ëÒRSIˆÇl21»¤„¤ÄDÊJKùÁ÷¾CM]=¡`­V½}+~ÿÆnÃ:œN’’ùΠߢ° Ÿï¼ð-._¹J(dóÛ0<¹õ1,f3ƒaÜ÷]O(œP¦$I¬\±I“Ñ$nõ~ w%;ŸÃéäБ£l\ÿ †î¸#ÇŽsæÜ9þýŸþ Zí]É<-Ô74ò‹_ÿš?ÿ“?!%åë;éxppÇCsk+;ÞÛÅøó?#1!aÊ×úúûQ…—^y•eK–ðІõ^£( ý·ÇêU«¸ÿ¾{§{÷fœ±ì|w嬘™t!wƒÝn‹ö~a:´··³lÉ’ £¥_Gí8tÀÏã[>r=¯×Çá#Giko'/7—U·Ì¾‡È(HNv66›èN§»Òã„»iì¾£ò¦K(B–å¯ý1¨¨*¡`I–£ë¹|Ò~+Š‚N§»íí5EQ¢÷ü…»ë®öøán'aº}Sn1É’ô™&Ê}šýþº_ }ˆO@AføAa_AføAa_AfIIz‚¡gΜåÌùóTVUÓÞÑNVf&Z­–ÁÁ!.\ºDKk+ééSÎÎ ‡Ã\¹z£ÇOÐïè'55VKo_¡ªºšø8ûmsSqøè1.]¹‚V«%11‘P(ÄŠJ.\¾„ÝfÇò Ëòöôörðða£)ƒÁ ÇOžÄát’ž–ÆËũӧ9{þ®a©©©»êß­eNUÏÛíûTjjë8xøÍ--$%%a2áèñ\¼|£Á@||<Š¢P^QÁá£Ç$m´ž]™í¨ª:¹ž½½TUWOØ÷ã'NLY^Ww7/¿ú*å¼·{7>ŸŸWßx‹KW®àtð¯¿üMM\¸x‰7ÞzÇÃî÷ßg÷Þ÷áw¯½ŽÃ餯¯ŸW^{¯×;i;Sµgooï¤2÷¼ÿ‡sògäàƒ>bÿÁC8xãí·¹rõÚ§úÜÇö]Qö8ÈßüýÿâʵëÑ×7·´ò÷ÿß?òæÛÛP…€ßO[G²¬áÄÉÓ¼ÿÁ‡·ý<|>ooÛNgg焟ß.ÿ· Üm@··o§­½=šcÞç÷O8nëêØñÞ®;~Üž9wžÃGÞö÷}ýý¼ùö;¸Ýžén6á.™¢;ª"KÉÉI”ÌšEAA>ƒ?ÚA¯ç™'Ÿ$>>îöÏkƒAbcbÐé´**«PQùÉHX óWÿóo¹rõëÖÞ?é½ápY’ˆ‰E«Õ¢Ñh°Ûlüøû?À54 Ÿð9wþ]]Ý,\° ú3çÀîÛÏ’E ±ŒŽd¤§óô“OÐÐØÈÕk×>s™·Ö3òüª4aßõzÔåIRäu³£Á€Ao ³«“æ–þìßþ1‰ üë/Åá£Çp °vÍ}l\ÿ W®]ãµ7Þbù²¥„Ãaôz=²$122rÛgco­§¢ª?yrB™o¼õ6²FF’˜ð]¸|‰+W¯±qýƒ¬Z±‚]{öröüyÌŸ7åö¦Ú÷†Æ&Î_¸ÀòeKÑŽŽ¨øý~víÙCA~*‘¤±±±<±u í455EzF·qöÜyÞÞ¶7*x|ëf—Ìbßþƒ´´¶°`þ<²2³8sö,¯—Ä„DÚðàmG˜áN$äímÛ1™MÜwÏ=CÁÈq[QÁÆõë9}ö,.^¢¯¿ŸGy˜ó/280H díš5N*·©©™ã§NáÛëÑhdŽ;Fk[;9ÙÙÜwïjŽ;No_‡Šª*†‡Gèííãñ­[0ÑòTUå£y{ÛvÚ;:xê‰'(ÈÏ›îæî°IgoVÇü¹séîîaçîÝüó¿þœ¾þ~jëêhikãå×^ãÿüëÏihlœ²ÀØØÈó¡#GéîéÁd2ÑÛÛKRbz½³ÉDrRýýý“Þ+I)ÉÉ446rôø dYF£‰¤€Ôê´|Ò¸®ÃáàÀÁƒl~dSd©L)r`øÑ~RR’Y¹|ù„×wvuóú[oÓÝÝC|\ü§+óvõ”ebb¬öÝl6MY¦Ñh$&&†ã'OR][‹Õj¥¿ßÅl"6&Y–ÉÎ΢­½׋ôôHb£ÌŒ Âá0>ŸŸä¤$._¹ÂùK—¢·3>©=5 Á`áá‘ e†Bašš#·ÆFƒƒ”Ì*æÀ¡Ã¼õÎ6ŽŸ:…Ç벇rëçn±˜ñù|ìÞ»—Ë–QTX}ßÙóçq¹\lÚ¸ÍhŠO×ð0Ûw¼Çµòr’oû9§§§“œ” òY™8t˜Ææ&Ö®¹ü¼<Ú;:¸xù ³KfQS[Ãû>£Â]¥ª Ñh˜?o.esæ°çƒˆ‹‹‹·ó摟—Knvi©©,]²­FËÑcDZÆX‰‰áµ7ßdpppR¹-mm\º|yôØ®åƒ>⣹z­œ²ÒR.\ºÄÁǹxù2.—‹E ™EnN6óçÍ›´ÀŽ$Iädg‘””È’%‹Iˆû”{(|M üƒo=÷,þ§Ÿý_ÿ®áa*«ªÑét<¾åQþðg?%=-•ƒ‡Ly2Ýð¥sæðßþóbË#°ÿà!ŒF#}}B¡¡P—kˆø)°ÁANœ:ÅÏ~ü#þÛþOh5Z.\º©¨$!!!ÉSGUUÙwàõ 457SW_ω“§8sî{?ø¯ÏÇÅË—©¨ªâÂ¥Kädgñïþäßrïê{8xøð§*óøÉSTVUqòôé õ¼xù ž´ï>¿R¹çÎ_@£Ñð—ÿå¿ðÓýSgÎ ÁívÐßï 5%£ÉHww$3ÖÀÀz½Ž®®.ùÿþÏù‹?ûS›šihlúÄöÔh4\/¿1©L­VKzZ½½½·|Fñ<ö裬»ÿ~tz‘ž6å\ˆ[?÷‡sòôNŸ=‹Ãé¤üF/]æüÅ‹¼óîŽÈ=ýK—hhjäȱcƒAâãâøÉ¿Ïw¿ýGŽ›²íÒÒR‰gÞÜ2R’“©­«cñÂ…,\°€Üœ$I"==5÷ÞËšû¶–`0x7¾O‚0JÅh42gÎlÊJçOBBsËÊÈÌÈ ++“ää$/\ˆÉdÂd6³xáBߺŸÏ͈w«ôôtÖÜ{/÷ßw/7**(¯¨`Éâ…¬^µ’óæQSS‡V«eÁüy¬\±œœì,²23™3»dÊ•õ²23IˆgñÂ…Øíöén8á.˜t¸ÝnNž>C0Ä90€ªªäædSŸGCcÙ™Y ‘žšŠÏçÃëóMHÜGEe§Îœ¡¾¡‘”¤dæÏ›ËÉÓ§ywç{„Ãa<^/óçÎc``£ÑˆÉéët:, —¯^£³«ŸßGRbƒƒƒ”ߨ ­½ËW¯’ONv6ƒCCÄÇÅ!Ë2ªª2{V z½P(„ªD&јÍfž{æ)B¡0×®_4²††ÆFzûú‰³ÛÀf³ r¹>¶LI’Ðéô“Ꙙ€kØEùŠ›ûžœ ªJ¿Ã-Àf‹exx„SgNÓÕ݃Ýf§¸¨ˆÄÄDÞywéTTVòÃßÿ]:r”p8ÌÅË—™[ZJVV&ªòVUƒ^-6–AŒFÃíÛÓç##=ƒÁ0±Ì²RÖ¬^͵ëå·|Feèt:²²2q8èõz–/]Š×ëýÄÏ=)1‘ÌŒtžöY`ôþ»YÒóчÆívÓÖÞŽ¢¨h4Zº{zhmk#1!‘Þ¾¾èp¤Ûíž4™S£Ñ ×ë8}öV«•ÜœNŸ9ƒÝnͦâp8¨¨ªâÒåË|c–P¾>Âá0J8’»^Q4½NÇ™s爉±b1›q8œœú(y¹¹dfdP]S˹óçIOK㑇6òþ‡û¨ªªfÞܹÑáÚ¼Ü\T›IOOã‘M‘œ”DfFUÕ5øߺ›-–ú—Ÿ“ž–FRRdX×`0PXOGG'}ýý¬¹w5 , ¿ßÁ™³g±X,„B!bb¬tvu±gïû,Y´­V‹$I¤¥¥R:{6esæ`6›X{ߊ )).fNI i©©äçå±rÅrÚÚÚ8rì8—¯^%)1Ç·názù ö¼ÿ e®Y3z!4¹žù·ìû–GáêµëÊHKM%66†Úºz [ÝLjJ ùy´´´ÒÝÓËÆõ2oî\²23‘$‰Êª*òóryäáM¤$'“™‘NCS>ŸG6m">ÎÎ?ýë§hÏù ÈΚXææ‡7‘˜@VæÄÏ(';‡ÃÁÎÝ{á±-RŸÏŽ]»>ñsßüð&232˜3»„9³K°Ûm,^¸€óæQXPÀœÙ%äåæ’˜˜ÀÆõ244ÄÑcÇ9á"áp˜§žx—ËÅC‡™?wV«Õg·ÓÒÚJJr2‹-ÄéàFEf³EQ8vâÃÃä§¥ñð¦‡0»¯)wC  ¨°0rËO‚²9sHLJŒ·ÅE…ƒAú²3³¢÷å>ò ;~œ¶övº»{PUFéÓgnÛmdVq@€¦æ&æÍ-ã¾Õ« …Âädg‘ObB<ƒƒƒARSR8yúL´LEQ(-ƒÕj¡­½ƒÜœbEêôo¬±YýŸ);Ÿªªø|>ŒF#@€WßxƒU+V2gvÉg®@Mm-ÇOžâ÷¾õü„É&ŸÖ»;ß#>>žµkîûÜ …ðûý˜L&dYþRʼõü4¾h{ÞŽ¢(ƒÁè#I>Ÿ×Þ|ós-¯×‹Á`@«ÕrüäIúžØºõS½_U##2GçôÙsüÉÿ‘øÂׂËåâ¯þöïøýïü³ŠŠnûh8¶…/âseç“$):Œl0øþw¿û¹3-Qü1ø'y|ë–/œåéælü/¯Ì;QÏOã‹¶çíȲ<á9d£Ñø…>÷OÚÖøaýÕ«V}¦ý{­Á`Äû©Òˆ ÂW$ËÄÙlô†=æÅ±-|>S_¾@äqÉOXèI¾*TUÅívc2™>v!1ql _Äçêñ Â×^¯ÿL9ÄaºI’ô©ÖšǶðekõ ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  2iå>€!—‹kׯÓÑÑIŒ5£Ñ€¢(446RY]$IØFWwêéíåÚµë8Nìv;:­–@0HUuudéI£é¶IdB¡µuuTVW£(*v› I’èw8¨­¯Ÿð\·Ï磾¡çÀv»=º¤nk[×ËoàñxˆýùT¦ªçTeºÝnjj먫¯' c·ÛPU•öŽ**+éíí#66ö¶3k§*"i¯—ßÀçó‡$I¸Ýn®ß¸AGG'¶Ñ2o×ÎSµÉ­¦zÍí>‹©ê㦶®ŸÏÝf¸m}A¸=EQèìêB¯ÓMûrÑ==½(JxÂzÂÌ4¶rߤÀïóùxù•W©«o ¡©‰êÚZ̛˩3gyçÝwéêêáè±ãddf Óêøù¯ÃéÍ5Lqa!;wíæÐ‘#´´´ræìYf—”3Å£*gΞcÛŽø|>=F^n111¼³ý]^ó-Ìfstu¸KW®ðâK¿ãÚõrVß³ ½^O}C#¿yée¼^/ÇNœÄb1“•5i;§“_üú7ãêé¢töì)Ëljnfï‡ÒÖÖÎÑã'HMM!!>žƒ‡PU]Íå«×hïè`nYé”ÏÛNUfEU¿ýÝ+tuusìÄ z=III¼üê«\½vŠªJªªk˜7·Œ3çÎOlçŒtâââ¦l“ñï¼»cÂkB¡;nù,æÌžM[{/¾ü»h}ôzy¹¹ì?p—_y ‡ÓÉŠeË$‰c'Nðλ;&Ô'9iz×|ƒ9v›Í†Ùdúâ —Ìï÷óó_þšÌÌŒèÚ÷··í\¾zÜœœ;Z—ß½öá°rÇ·PQYI[[;éiiSþÞårqìÄI²23?v½áθmà÷z}|øÑG,^´”ädZZ[™7·Œ·¶mãчæ©'Çápp­¼œ¼ÜŽ?ÁCÖøñûý¤¦¤ðÞ®=üä‡?`Ãh¾w×+š¡j¼‹—.384ÄCÖs£²’ââ"ÒRS),Èg``‹ÅBéìÙ$$$’’BSs«W®D¯×ÓØØÄµëålÙü­mmÄÙã(*œœÃÚáppøèQÚ°@À×çcÑ‚S–i·ÙX²x1«W­¤ªº·ÛÍ‚ùó(ÌÏgþܹ¸Ýnšš[X¹bù”WòÊ\µ ­VË›oocVQ¿ÿ½ï`1[Øè0:–êêþäÿˆåK—°ïÀAôz=ÇOžœÐÎW¯•³bÙRŠ‹‹˜Ð&ãɲ<©Ý::;'|W¯]c`p€òFëóÑ,[²„‚|´:Ã.Ë—-Åãõòêëo°å‘GÆÕç:Ë–.¹+«ÞÎå+Wùù/E_?v› »ÍÎÙóç9~â@$8ñ×ËËq:HMM'á® CìÚ»‡Þ¾>ªªk0™L´¶µñó_þŠþþ~ŒF#‡aÏ ª*I‰I\/¿AyÅ ªkj‰‹³O9²§ª*å7*8tä}ýý‘õüOžäÔé³  ’™‘ÃáäÀáC\/¿A\\ç/\¤¡±‘†Æ&þéôôôðÑÁƒ466’œ”4å2ß===œ»pëå7¢ß#€+W¯qîÂ|ÞHr²ËW®r£¢’kׯóáþœ;!’Üë–ப*8È+¯½ŽÇë%9))šÎ[¸;Æÿ¤³·Éd$/7—÷vïaמ½¤§¥áv» ƒäçç¡×é(++¥··‹ÙB||/¿ö§Îœ%;+‹žÞ^¬V i©i˜M&JŠ‹iïè˜2…oA~>Í--üêÅ—p{<¤$%#IÒ”Cé&£qtÔàær–é„BA~óÒK465‘™™1åÎÆÇÅw³ž9YY‘凧(S«Õb2imk§«§‡²²R$IB’evîÚÍ»;ߣ  N7å¶Æ—)^¯§ÓÁ¬âbô:sf—àóù¨¨¬"3#=’Q.1‘ÌÌ ÊoÜ  MlçѤ±11Ú¤··—]{öòλ;¨¬ªž²Ýº{z&~³fQ[[O__ÿ-õñ3ära±X¢=hI’ ¼µ>ýøo“.÷nÑjµÈ Fƒ½ÞÀ‰“'9täqqqhuZjëêywçNü~?ï¸CGŽNyü Â"IV,£·ÖÞxûm¡0²FƒÁ`À ä£Ðh4Fü~?omÛF[{;MM¼ô»W£)ºÇ«ª®æwßÅl6c0P•` ˆÉddûŽ÷8{þ<¯¿õ6½½}Øí6$)rKT«Õb·Ûyãwhimå•7ÞÄápRY]ÃŽ]»§ü~ÔÔÕ±}ç{ÑïÑá£Ç8~ò${Þÿ€p(ÌŽ]»8uú |ôç/^D’$dYB§Ób¼Ím…èw×hãÓhR—µ¹¥…ú†þýŸþ Á`—_}’YÅ(ŠÂÈÈÉII¸GܘMf®\»†ªªüßÿé?RS[ÇÁC‡Ù¸a=¯¿ßÑhÀívc6›'­?‡9pè›6nà¾Õ«yãíw8xä/<÷lôµ·.Y-I£F{›‡¥¨°gžz’ÃG޲oÿJŠ‹']4\¼|yB=÷<Ȳ¥K‰³Û'• ÐÙÕÅ+¯½ÎŠeK™[Z €A¯gÓÆ¤¥¥²oÿA|`ím‡¼£eJY£aphˆ\ȲŒÝn£¯¯p8Œ,Ëx½^R’“ééí›ÐÎFƒaÂd¬M$YŽî§F«™´}“Ñ„Ûã‰~#n7±±1¸\Óê3¾Ín®yo }l}¦CaaY™™¬[{?ùyìØµ‹{V®`ÝÚµ=~‚¬¬,žyêIRSS8qò4Ü¿F¬x&Ü5ªªb1[¸ïÞÕ ~ñëÉÌÌ ;3“ÖÞOIq1ƒƒôôôòðCq c4yàþûIMMåÿù«¿¦½£“YÅEʽV~ƒüÜ\Ûò(¹¥ Ë=½½¸†]\¾zÞ¾^þâÏþÛè<VÃ’ù Y±|9.^¤®¾žÊÊ*òòrq»Ýh‚«ñE%;ú=Jåȱcè´ZV,_ÆCÖ£Õj9éZ­–U+W°ö¾ûðûŒ¸G¸ïÞÕ“ÚD’$JçÌ&3#ƒ‡ÚG$Ü}“XQðûý8œ¨ª‚£¹Õ3øèÀAîYµ’CG²`þI[{û¤úÄÙíttvÒÑÑA_d%#ƒÌÌÌ õ™?Þ´O’% P©©«#99™„øx**«(™5+:yqì¸hlj&99iÚ/V„™GQÂ(a%Ò› ¬*P[[GJr2zŽÁ¡Ajjk‰‹'384ĈÛ,k0›L465 …‹ÅJœÝNeUMÍÍÄXcèìêbßþ<õÄ4·´b1™P…«×®3kV1¶ØXE!¬(¨Š½ IJJdþÜ2òr󰎦;oïèˆnËj±¢(a¼ÑïQéiiFªkjÉÍÍ¡¾¡¬Ì ›š£#z½Ž®úîhêáή®qõܺðüTW×PV:çS-S,|ù&Ýã·ÙlX-VÎ?O[[ëXËü¹sÉÉΦ¢²Šó/Q—Ë#›6‘“E àì¹ó ¹\lÙ¼™‚‚|ÒÓÒ9{î7*+Y¹|+—/ç­mÛr‘—™`"Ë2ÙÙYÔÔÖríz9élÞô^Ÿ»vÑÙÕ…kxÇKéìÙœ<}†SgÎ ‡ioï ¸¨¹eetw÷pñÒetZ-O>þ­míìÚ³—yeeÑ€œš’B ŒÖs룛ÉÌÈàÄ©SÊœU\DSs ×®_Çh4RSS‡^¯'11í;ßãБ£TUW³níýð›—^Æn³‘”˜Dfòž8uú–z1·¬”®®nNž:Åbæ©Ç#++‹«•£ÇOÐÖÞÎ#›bnY)ÙÙYÚùÑGÆíñLj“¹£· Æ ²s×îèkÜ/K—,žôY¬¾g99Ùtw߬ÏÓO>Ñ`àƒ}û¨¬®ÆçóÓÓÛË‚yó(*,¤¢²òf}Þ4í_«Õ"I—®\!)1‘E PQYÅÙóç£Ã8@[{;²,óøÖ-"ǸpW)JäI Ù%³08œN/\ˆ^¯·Å……´wvÐÔÔL^n‡¥¾¡¶¶v6<¸Žôô4ÞÚ¶ËW®pýF.—‹Õ«Vâp:8~òC.³KfÑÕÓCcc&“‰Ë—QTXÈ‘ãÇ©®­%#=ŸÏGFzÆh îfñ¢…d¤¥sþâ%›š°ÙíØm¶ ÛF¯7pðð‘è÷艭[™3g6­mm\¹r•ŒÑ·Ãé$;+“Ô”bb¬T×Ôàr¹HMMaûŽ÷ÆÕ˜ysçâ÷û¹^~ƒÜÜ\âìöéþ¨f”±{ü·ÍΧ( À„I\·æf‡GO¸ò„Ÿ…Ãaôz=½}}üêÅßòíçŸ'7'{Â{UUEQ”hlìßãi4”Ñ«U$ UQÑhä =zYŽüûµ7ÞÄl6óøÖ-SÞ^_Ï©Ê«ÃØY–‘eŸßÏàà ƒ!rÕ]]Íî={ùƒŸþ„ؘ›T>®ž·ŽD@d¦/’4!Íæ­í|»6™ª§zÍøÏb¼©FF¦zÿí>÷é6þsWFGª ÇOžâäéÓüÁD¬Í†Vôö…i0~ø|üßÇ·cßÛ·›¿þÛ¿ãùgž¦¤¸8:Ù.G{Óc·UUÅçó£ÕjÑé´„B! F£!zn (ŠŠÁ0ñÞøzƒAÂa½^ýßÖ‰S§oû= ‡ÃÎÙcï›±cª2ÇŸ“ÆÚ@¸{>1;ßT³¶oÍÍ>fªaTFýyB|<ÿöÿÍ”³TÇ Sý{ÊúÈ“·5æñ­[£ò'ÕóveNõ^£Á@jJJôß…ùùüÑ¿ùƒèäOSÏ©ÚnªI‚·¶óíÚäãÚñvŸÅÇÕçvï¿Ýç>ÝÆ×W–eL£eY ×+‚¾0mÆŸGÆÿ}ªóè´Z¬ë„öS}'%IÂdºù­V;é £ÛÍg_NÇøÓÏäóãí¿G·îÃÄ÷É·-ó“~.Üwee Fs×îåX,æ/^ȧ Òc~u-œ?Ÿ¢ÂBô…¯ ‹ÅÂOôCGo~ˆïÑ7×ô.)%w@LL 11âù`áëC£Ñ™‘ñÅ ú‰ïÑ7—X«_AføAa_AføAa_Af)gõºº»HMMÅ0š'ÞåráHˆŸðÜh ÄátÍ)ß×××YÞ$R§ ‚ ÂW¤À Ù¾c'Õµµ(ŠBɬY<÷ôStttòë—^Âátò_þÃ_‘ž}Ïûöñëß¾ÄßüÕ§¬´”#ÇŽsàÐ!B¡0éi©|ÿ{ß „/M8æFE%ùyb­oaƪ®©Ån·“š’|×Êt8tuuO™f]øú˜´VÿˆÛͶww°þÈÉÎæÒÕ«¬Z¾“ÉDRb"5µµ,[¼$šù©©©™·¶mCEeÅòåè´Z^yí ž}ú)Ú°žã'O‡™UTôEê)QµuõüóÏßï'.ÎNLL õ ”—ß #ËMÍ4·¶àõúFÓ“Š¥A…»'ÓÔÜLk[]]]įćhniÁËàà =½}H²DccSôX‹³Ó×ßOSK Í-- Bll ~¿Ÿò7¢ïw ó/¿ø%mímØãì$ÄÇO:Æ{ûú&• …¨oh ©¹N‡Ñh ®¾žŽŽNšš›yëm´µM]f0dÏûðÞî=ÄÅÅ‘wÛôäÂWÓØZý“züV‹…¢ÂB^{ë-4²Ìª•+1Œ¦bÍÏÏC§Ó1–¹9°ûý÷Y¼hMMÍHH´wvb6›˜SR‚ÑhdáüùÔÕ5L™öQ>¾þ~úúû©­¯gΜÙtw÷°{ïûdge"kd:»:yóím”ΙM[{;my”•Ë—Owµ…Äãõò¯¿ü5©)ɸ=ÒR/qïê{xõõ7ø‹÷g\¾vk×®³|éR^ëíè±úÄÖ­467qñÒe²23éííãûßû.7**¨¬ªÆh4ríz9÷Þ³ŠÞÞ^‚Á íL:¿<|˜K—¯DËùÁ÷¾Km}ç/^">.Ž÷ïç©'çç£õŒ‹‹£»»‡ÀmÊ + ]‘Ì©Õ55Ì**Šfþ^&Mîëè줹¥…ßÿÎwxþÙg©ª®¦£³¸™ŒA–#é3g¨ª®¦0?×°‹ŽÎN¼/`p4#„Ba´ZÍÍ$ñ‚ðÍŸ;—¢ÂBž~ò æ••qâôiV®XοÿûÜ·z5Š¢’‘‘Îð}Ö®Yñã'"Éá.Q­Vã›áúS›hmm"kÛKDæC!23#Çê÷¯áè‰¸Ýæ–•ò‡?û)y¹¹ì?xã'Oáñzðú¼\¾z•””ÊJKÙ¸þAX{ÿ”¹U‚Á e¥7ËùèàANž>Ãæ‡7ñ?ù &£‰sç/`±˜ylë~òÃPV:‡N]¦Ñ``Ų¥Ì™3‡ï¼ð-âã㦻™…ÏiRxx·ÛMJr2ªª ( ŸÏ‡ÃáÄëóát:ILH ßáÀd6³ÿÐaêêëÑh4<ùøc„Ãa._¹BNN×o”óÀýka_ø²Èrä¤ÙßïÀ›ãC¯ÓÑÛ×ÇȈ­.rH«ªJ8Æíñ`4™Äh“pWI€ª‚:zþ”% ³ÙŒ×ëchhˆÁ¡¡h6LE‰«#n&£q4«J0Âëób·Û±˜Ídee2¯¬ ½^GLL ’,á`xxƒÁÀððêèx¬ÉhŠl_½YN\\F£‘ÞÞ>úûûñx<ÄÄä‘Ac™H?®LFƒ×ë¡¿ßABBü¤ä@Â×ä{ü111ø}~Ž;FyEK/fÙÒ%\½v7ßÙFOwÍͤ¤¤ðÀý÷³þX¶d)ƒƒlÙ¼™E `µZøð£ýœ»pÂü|6mÜ î _FÃàà 'N")!‘²Ò9?y’s. †Ðhd>Ø÷Í--ôõõñø–GIú %?¾ù{Þÿ€ÚúznTT²léV­XNMm-§Ïž¥««‹ääd’“yÿÃ}£Çj?o}”ήNŽ;A}c²$ñäã‘”˜Èå«WéèìD£ÑPR\Œ¢(;qF‹,Küæ¥ßqöÜyΞ;‡¢„q sâä©h9O=þ8éœ8uŠ‹—/“ÅÚ5÷QWWÏܲ2ìv;Á`ˆã·)33»¤„•ÔÔÕQ2«³xbëkeì¿ôÖ;o©¬}€¤Ä¤è/Eadd«ÕÉGïóáñx‘åÈÕ¨ÅbžªÕëõ¢Ó룙œ†\.qv»¸*¾t¡Pˆ·“шÁ``dÄkØ…-ÖÆ…K—8|ô(ßùö $'&;ÝÕf—ËÅÿŸãobVQ1‰‰ h4<ά £‘sç/Œ;V“ˆáw¯½Îðð0[6?Bbb"f“ UUq ãõx±ÆX±˜-¨ªÂðÈH$½®VËððŒöÏF#Ûwì`xxdB9n‡`0ˆÕbA«Õâñx¢ó¸åãË´˜Íx¼^‚Á 1£±Aøúèëïãð‘ÃS?Ç/Ëò¤“¥Ñhœ'úV·>«o'[áÒjµµZ-X­–Ñ©Fr³³ÅE§0-T@–$ÒÒÒH÷hœÙl¾eBÜäcUUUbccÈÎÊŠ¾J’$l±±Ϋ’$Oø÷­÷ÜÕÑ™üã˰Ü2!o|}dùãË"¢§ÿµ&ΊÂ7Îì’’’’DoD˜6f“‰çŸy†ÔäÆ~ªcõ¾Õ«¿”¹Ð_V9Â7üÂ7NJr2)É_Þ¢&‚ðYét:ÌŸ÷‰¯›êXÍÏËýRêðe•#|óˆ.‘ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì Ÿø#K>QU•P(„¢(Ó]çh½n¥(Ê]©_0¼ívTUÅçó᦬ã' ‡Ã„B¡;¾‚ ÂÌô‰¿½£ƒ_½ø[\.¯¾ñ&×Ëo|¡ ‚AZZÛ¾P€öûý|øÑGôööÒÖÞŽÏçàäé3<|ä ÕÏátÒÛÛwÛß{½^~ýÛ—hjjžô;EQØ·ÿó¿þÿýOÿ<åk>ÉÑãÇÙµwï„2ÛÚnî£ ÚDøfú4çÆ®în††\Ó]UáknÒZýÁ`öŽz{{Ñêt¸\Ã?y’Ë–qìäIÒRRÈÎŽ¬¥( ƒ 2<<‚ÉdB–eÝ==x=Ìf3>¿§ÓÉÀÀµuu¼üÊk¤¦¤‹ªªttv284„ÉhŒ®^5<<ŒÏçÃh4244„?Àh0088„ßïÃá@QU~ûò+èõzâãâ¸tå 5uuØbc CX­– ÉYÜ===„‚!ÌfÃÃÃôz=ƒƒƒ‚Av¾·› —.““•…Åróýáp˜Î®.ê8vâ$óæ–a·Ùhkkgxd«ÅBWW7¿ýÝï˜?o9ÙÙ¤¦¦q8œôôö`4™Ðëtx<ZÛÚÑm  ÑØÔ̹ ñûü,Y¼€ÎÎ.þéç¿À`0`³Ùp»=hµÚÈzõCC„¯×ËàÀ ƒƒCèõz´Z-@`BÝdYfhhˆŽÎ.B¡f³ùk›¸æf›è£‰GN'ííí¨ªM4â  OZURî´/~nŒ™”ßdxd„_ýæ·ôõ÷‘’’üµþ Ócl­þI øôöõ±íÝŒ¸Ý 6¬[‡,k@Š,A9~)(×Ë?þÓ?¡×ëq»Y¼pm\ÏöwwÐÑÕE8bÅòeX,Þxëm232ñxþøþ€Üœlúû¼úÆø|>‚Á ›~˜Úúz$I≭[øí+¯RTPÀå«Wéw8°Ûbyî™g0™"Ë?yŠCGŽ`µX"#ªÊî½ïSS[G(bͽ«Q•ŽŽN*«ªq8˜L&öíßÅbÁívS˜ŸÏóÏ>ëo¼Éeàðä㑘˜Ào^zVK}C#‹-ˆ¶qeU••CAdYâÒ•«,_²„eË–òÛ—_á¾Õ÷pöüyzz{A…´´T¾ýüs|tà µuõ„Â!î[}¥³çðË_D§Ó‘™‘Á“mýÚÄh›˜Ífâãâyëmèõ:æÏ›‡ÍfãíÛINJÂãõòÂsÏ2»¤dº«-Ì _ôÜøÂsÏQ\T8¡ÌÖÖ6®]¿NcSf‹™Í›6¡Í"ŸÅ¤¡þ„øxî[½šÙ³fQWWO[G;²,EÓꎿÀTÂa<>›y˜}ÿû\¸t‰ƒ‡SßÐȾÿû<óÔ“:r”öŽN’““ùÙO~Ä·ž–â¢b~úß—G_?Z­–… š’-»dÖ,zz{¹rõ}ýýtvvréÊ)ÌÏgÈåbÁüyÌ.)á÷^ø‹-UeÙÒ¥üáüŒØ˜ZZ[¢å>{–P(Äþ짬Z¹’½|éåxÜX¹|9÷Þ³Šž£1’„hÄíæÈ±clÞ´‰ŸýøGäåæÐÙÝÍÁÃG°ÇÙPU•ƒ‡P:gÅÅE<ûô“dfdàõzQÇ·láÙ§Ÿ¢¾±‘ëå78wá)ÉÉ8œNN9Ãù 1›LüÛ?úCÖ­½Æ%1^²xQd¿õ<«W­bö¬Yœ»p‘ÆÆ&†\Cäädãr¹X¹|üo~FWW7áÐѣѺ>r ·ÇÓ9@Zj*‹.D¯×O÷±÷¹EÛä…o±dÑ">LéœÙüÉÿ>°–@ €Ýnã~úæÏ›Ç¾ýļ á®ú"çÆŸüðäO*sVq æÏçÑÍóðÆ"è ŸÛ¤Àíz9{?ø­V‹N§# … ƒ(ªJ ˆÞƒR­FƒÕj%.ÎŽ,Iü$YB¯ÓE‡ªTUÅl2a‹M¡¢ŒÉ>óä“,_¶”m;vpæÜ¹h=’ÉHOgûÎ÷(-)¡ ?ww¾GA~>ñññ ªètºHnvåæ$:ƒÁ€A¯Çd2ß¼W‡ÑŒî“N§CEE’$|þÈ@¤G-£×ë&ÝcS…P(„¬¹Ù\áPI’ˆ±XYºx›7mB«‹ä´ÖiuhF×ÞÖj4˜-f,f  €N«#6&†õëàž•+H’„$IÑÜ×c"û(G÷qÑÂ8œNv¼·‹âÂBâãA’°X,Øívôz=^¯‰›u{xÓF2ÒÓùé~@ à׿ý-ýÇt{ŸÛ­mâ÷û#í®ÓEO†ƒ[l,±±1F'§ ÂÝòEΪù …ðûýÑ?’$¡Õj¾2¬…¯¯ICýa%̈ÛMwOO$šÝΈ{„½|ˆÕbáýö‘›“K^nòè½éw¶¿‹$IÌ*.bÃúq8øù¯C(â¾Õ«‰‰±ÒÑÙ‰¢(ÄÙíØív^~õ5{ôQ*ªªèîéA#k&ôB5 æÏãÄ©S|÷Û/0ärqüäi¾÷{¿‡V£A§Óa6™ÈËÍeÛŽȲŒV«¦Öiu®ˆW._NMmÿç_~Ž×çeÓÆ „B!Þzg;¿ùíhžk™‚‚|Nœ:Íö;yòñÇ0 X­VîY¹’ww¾GjJ }ýýdfd°bÙRš[Zñx½Øl6$IB§ÓE¾ £AH§Ó!Áè—VKIq1%³Š©oh >.ž¼Ü\–-]Âå«Wùßÿü/tuwS:{v´Þƒ¼Ü¶íتª,Z¸€ÌŒt>üh?O?ù8H@€ö}Äå«×0™Œl|pÁ`p\Ýì´µ·sðÈQÜn7FƒñkÝ[ß&’÷Ý»š··m§¥µ•ùóæ*••üüW¿¡»§›-<2é~© ÜI_äÜøÒ+¯ò­gŸ¡ªº†ËW¯"Ë2Fƒ'¶neVq1‡ŽÁd4²~Ý:‘ˆJø\¤·ÞyK}`í$%&‘É} ‚Aì6;‰ ñôôö¢( v›Î®.òró°Z-¸\.þòÿýkVß³’¢‚B ò1™Lx¼^ºººÑé´d¤§ãóùp»=$%%"I‡“ÁRSR¢«§»ÍNnNö„´Ïï§¿¿Ÿääd”p˜¾~))Éh5zz{IˆÇ?:Y&91UU + ñqqôõ÷c6™°Z­Ñò†††èíëÃjµ’š’B(¢¡± Ÿß‡=ÖFrrƒöŽdYCFzZô‹ …hmÒ«•´ÔTTU¥¥µ¿?@zzqv;½}}ÄÅÅáÂh2áv»£#ÎR’“q»imkCB"++“ؘúúúèêîÆd2éÉ¡»§‡¤„DìvæÈñãü×ÿôÑiµü¿û{R’“Y¼h!yyØl6¼>­£uËHOÃl6ÓÔÜŒ×ë#+33úY|]EÛ$1[l,ôõ÷“––JuM {?ÜÇã[%3#ƒ¬ÌLq‚îª/znLOKchhˆÁA$4²LfFZ­–öެV+)IÉãï Â'êëïãð‘Óÿg1ärñWÿóoøñ¾OaAÁtïÓŒ‡ùç_ü’‚ü<6oÚD(æþÝß³zÕJî¿ï¾é®ÞW‘cÇ9sî,ñgöµÙ¾¾Ä¹Qø* ü_(-¯Á`àµ÷c·Û§{fŒ`0HNVKE÷“%‰Õ«V’•5ÝUûÊÈÉÉF’EWH˜>âÜ(|•}¡¿p÷MüCׂ Âgñ¥ôø…»olö¿ ‚ |¢Û(‚ 3ˆü‚ ‚0ƒˆÀ/‚ 3ˆü‚ ‚0ƒˆÀ/‚ 3È'þîžÞ|gÃ##¼·gÕ5µ_hƒ¡p˜ÁÁ¡/´Þt àô™³ 044D0àÊÕkœ=wþ ÕÏãñ02â¾íï}>ooÛN[{û¤ß©ªÊù ø‡ÿóOüò7/ÒÞÑñ™·öüy><¡ÌÁqû(|²[ÛP¾>͹q,]¹ |“¿¢(ŒŒŒ000H(bdd„ëååü*«ªéëïŸðú`0ˆ×ëÅëõF¦ª*^¯ŸÏDV›óûý‘\ÀMMüë¯~EWw7¡PUUq»ÝŒŒŒL8àƒÁP4£Z(tóïÁ`@ ÀËE¿ÃÉ/_ü-UÕ5ªkj¸pé2=½½Œ¸'oEQðx<ÑŒ|·– ùèÀAvìÚ…Çã™”ØÅívÓÙÕÅÅË—BUU†‡‡qnk``€m;v’œ”]80âv300@8ŽÖchhhÂ8 Òßï ªºšú††èχ†øåo^¤ªº¿?€ßˆÖ+8ZÿP(„Ïç›Pç[ë6¶¿.—ëkâP…@ Òáp8zQtk†F“œ¸=žhÛ ÂÝòÅΓ³I‚AÞxûŽŸ<õµÿ ÓkÒsüÝ==¼úÆ› “™ÉÊË#ËžJ ‘å Ï{<~ù›#®×ËÚ5k¸gå öÁPˆöödYŽ, {ö,’,óðÆô;T×Ô"Ë2¡PˆäädÞ|ûEÁ5<̲%KØüð&víÙKm}=F£‘§Ÿx‚8»×Þ|‹þ~MÍͬX¾,ÚÆçÏ_àø‰“tvv²eófjjëXµb9sËJyõµ7X°`•´µ·ã(›3‡G7?©Óg8{î’,³iÃòóòxãí·q8äfgóäc2§ûøû\::;ywç{üà{ߣ¢ªŠªêjßò(o¼ýN¤ [šY¹|9áüÅ‹ BJr2Ï=ó46[ìtW_˜¾è¹ñ;/|‹YÅÅʬ©­åÐá#X¬FFFØúèf±$µð¹LêñÛívÖ?ðË—.åÂ¥K4·´NX%nüÒ1¡PˆÖövVß³ŠÍ›6±oÿŽŸ<ʼnS§y|ëVî]};ví¢¹¥EQxáùçxâ±­äóÝßû6YY™\¼|­NËšûî%))1ZvNv65µµTVUQYUÍõòܸQAcSééi´µµQ2«˜â¢"žyê ÌŸªÊ‚yóø7?ý @`BÏùÌÙs4µ´ð{/öV«•úÖ­]Ëæ‡7qþÂEnTVrðÈfÓÛÛËá£G9wá"ƒCCüáÏ~ÊÚû'®·¿`þ|Š‹ŠxúÉ'X±|II‰œ:s†öŽ››HIN¦¥­¢¢Bžö.^¾Â‰“'Ù½wo´n»ßŸÞ¾^®]/gö¬Y,[ºöë»v“ßï§³«‹°fxx˜Þ¾>Ξ¿p³ ׬A’$ºº»‰å»¿÷ýŽ~Nœ:5ÝUfˆ/tnüö äææN*³0?Ÿ²²RÚ°õë«w ŸÛ¤#§©©‰÷÷í£»§EU£Cª¨£ËŎ˯Y“:#=²²R$ ÚÚÛ1™ŒäåæŸ—G ÀçóOvVÉIIèuzâ㱘ͼðܳdefòæÛÛ¨¬¬Š–––FbB"»÷¾OaA>™éì~ÿ}²23#Y©‹Å‚Á` Î7Ú{•°Ùb‰‹³c³ÙnÞw @Vf&¹99¸\ÄÃaE½˜QÑéuX,fL&3qv{ô‹!##[l,z½·ÛÛíÁå&!>žÅ `4ÐëõÄÆÆ`½h0 $''‘œ”ŒF«ÁéÀï÷300@aAÅ……8âìvâãã0›Ì.®Ì3z½ž8{³™¥‹ÑÑÙÅûö“›MJJ ²,“š’BIq16[,­mí¸=7ë¶hÁr²³ùþ÷¾Kcs3o½³×ððt{Ÿ›$I(ãnÃH€Óé׆‘QY–HJL ';›ÌÌÌI·©áNùBçÆ„ ãR”1˜Œ&bcbˆ‰‰+x ŸÛCý½ RXP€V£Ål6ãtpèè4 &/7—Œôt$Ibxx˜ƒ‡ ( )É)¬_÷¯¾þ&¿yée<^/sËÊHIN¢­½p8ŒÕjE«ÕòæÛï°qýƒÔ76¢Õj …B8¢õÐëtÌ›[Æ?ÿüü‡?ÿw¸\.þùç¿à?ýû?G§×¡ª*zŽÄ„xÞÛ½FÔ )ã-Y¼ˆ—_}ß¼ô2]ÝÝÜ·ú$Ibßþýè´ZZZZ@\pœË—.%#=-úe»gÕJf“—›CJr2qö8RS#½iI’(,(Àb6£×éY±|9³g—0·´ˆô,³23IHL$3=¬¬,²23ÈËÍ¥° €¬Œ bbbÈÉÊ¢° ŸYÅEŒF#Y™ädg“›“M `vI ‹. n4«—V«¥ /«ÅJzz6› ·ÛMo?Ï<ùZ­–“§N£ÑhÈÊÌdÓÆ ädgS\\­[ff&v»¡¡! z=?´ì¬¬¯mÁd2‘“Ïç§tÎl–.^Ĭâ"rsrüÌmÖÖ6NYY™¬]³†Ù%%_Û}¾^¾Ð¹Ñl&3#EQÐhdâìvââìdfdP2kv»ä¤$Äñ,|&‡¦æ¦/–/šsú‡? 0?º÷iFP…_þv›§Ÿ|‚p8Ìÿø»¿gõ=«¸ÿÞ{§»z_)c“B¿ó·¦»* #ÎÂWÑ—’O§ÕRVZ½§*Üyþ@FÃ’Å‹€ÈbIq1 ññÓ]µ¯œœìlÑ#¦…87 _e_¨Ç/Ü}Š¢ Ñëõ"¨ ‚ ŸÚ—Òãî>Y–£ ‚ Âg%¦„ ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "¿ ‚ Ì "ð ‚  "H’4ÝõAá‹õZTèîéÆãñLwA„@UÕ;RîøNìÚÆç©Š Ó_†G†AmRbz¯×;ÝuA¾ÁTT†G†q»Ý(Šò¥–-I&“ ‹ÉÂÀЀš÷VÂl6c‰Á5âÂðOkð—$ ³ÉLB|Z³ÙLrRòWâêHAøf’$ ׃N§£tv)Yó¥–¯ª*ýŽ~ºzºÈLÏ !!yoc‡ÃazúzqSTP„-Ö6muß>åŽr´ªª2öGA?€V£E«ÑÞ‘¿Á``Øå¢ 7V;­qM£Ñ`µXéììÂl2O{ŒkŸß‡vZk"‚ Ì(ªª¢(Ê üªªFFÓGÿ>Ý$)r{clŸ§·.7ÛD~Aáî „Š¢‡¿Ô¢eYFUU$Iâ«ôœš„„¢(ïtˆ¶’ü‚ Â]¤‚¢(“‚ $IH’4eÏ8:;~Ü{n ¤ceÞ.èOx?m0–P™¸í[ës»w"1e_–o.£óq·Û?ý¶>Þø6_A¸kÆzüã¡$I8ðx<¤¤¤ ‘'®-×ïp`0ˆ±ZHëëïÇf³a4¢e¨ª_¿E8Æãõ`6™Ñh"“ ƒÁ þ€³É„B!´ZI‰ Øl¶)ƒûÀà ’$a·MžøqKS½vìÚE¬Ü'‚ Ü=êÄûücgû»ü?ý?éé鉼ltØ^QvíÙËÅK—$ Y–ñz½¼úú4777{³cCÙãI’ÄðÈç.\ ­£ˆ\ 4µ4sùÚU|~4€Ž_@’$dI¦§·—¶Žvúý8œN¨®­¡·¿—P8}Ïí“$ EU&ÿ¦æfþöþ‘=ïÀŽ]»øù¯Ceu5±e9ZÞÁÃG8züD´¼ñ¿æô™³‚Á m6v!3ÖÆÑvVD_A¸‹ÆàøÞm_?]Øbc©ª®&-5•@ ÀÊJZ[Û¨«¯'7'‡·›+W®ÒÑÕEgW7Š¢N¸x¸ýp¸ŠF«¡»§›”¤d‚¡ ýÇè#…*>ŸÁ¡AdY&·V«epp!— Ç€«Ù‚^¯' ÑÖÑ¢„1ê £Õê$‰¡Á¬+:.ºÕ±KUQQ$%ºÿáPˆŒôt¾ÿ½ïb4Øè0ïíÞCúO~Lww7MÍ-dge2«¸˜P(„,Ë(ŠB{G'Õ5ÕÄÇÅSV:‡s.°}ç.º{zX¹b9‹…«×®ã÷û™[ZJBB|´.ãÛGôøA„»f|o,ÕÖÖ‘”˜ÀÚ5÷qõz9€sç/°ÿà!ôz=áÑÉ€~´Ÿ‹W®`0+áÉe)êm¶ ¶˜Xl±6ZÛÛhïè )1“É„Ïç§¶¡Ž!—‹Þþ~šZš ¡¹ UUF‡Ç%@U$)2Q®µ½¡¡!¼^-­­SOXT'ö¼#TdYB£Ñ`4X¶d1ƒƒƒœ;»v3är±c×nêê룽ûþþ~Þzçúû<|„³ç/à÷ðûýŒŒŒà÷ûùpßG\¹z•æ–¶í؉×ëÔÖ zü‚ Â]"ö?«? qþâ%º{ºñú|Ô74ÒØÜ̵òr–,ZÈÚ5khkoÇårQUSÓm%3#ƒŠÊJÂáp4¨É²ÊžrÛ²DfF•ÕÕ˜ŒF²2³©Çår¡„ ó ðܨ¬ cµ’—“‡$Éø~T@¯×£Õê•쬬ёƒ~LF‹£Ñ8å¶oÕ¯(‘ UQPTŸÏHÔÔÖÒÑÑIlL ½}}tvu3vc¾±¹™ú†FL&Î'­mmÜ{Ï*²23Ø´q’$qéÊUÌf^¯¾þ~ܞȂIªªFG Ĭ~Aá0«_’$ºº»ésôsß½«‰±Æ022Š ¬V+-­mtuw3är‘š’‚Á` ¡± ½^ÇãAU'ÎP•ÛÍêWQ“ÑDéì9h4šHUT½^O(Æ5<Œ?àG«Õ`2™ÁíuG‚¾ªÂØÌ{U>›Ÿ”Hum CCCäçOý”€Šª ©c³óUÁíñÐÑÙ…,Ë>z”¼Ü222p8,]²„U+Wž–F×án†‡¤§¦Ǽ¹sY}Ï*ââ …CøýZZ[IOKÃf‹%#=ysËÐh4˜M¦è¼‚ñ=~Í~ðƒ¿LLLœîÃAAø“$ ÀO0Ä 7D{Á HHlÞô9ÙY˜Mf::;¹gå ªª«¹V~Ÿ×Çܹ¥Ì*.æì¹ ÔÕ×óçÍ%6&&ÐBáCÃ.R’“£³í%I" âóûHˆOÀd4¢Óé+ n·›”äd´-=}½x½^232ILH`xd„ž¾^±11hµ:´:-Vƒ-Ö†V«Å10@0 ?7oÒä@ÀÓ9@¼=~Â#{n·›«×¯ÓØÔD}}‰‰‰lÚ°ìÌ zzû¨¨ªÂé ;3½AÏÅK—ÉÎÎ&!!Žë×oÐÕÝMRbéii r£¢’œœrs²)¯¨¤©©€œì¬èóû]éééA:}ú´ZRRò•XåHAøf’$ ×° ¯×KŒ5æ¶ ÍäšèôzäÑÙêÁ`p8ŒN§›hímÌ--C¯×G§ŽöÒeiâ´¶±í@ä‘¿ñ3âUUN¬›êq¿±m×Öס×éÉËÍ´ÎÀËEm}ù9“GÆF)$)r¯üï}>²FƒnôB €N§C«ÑŒÞˆŒTŒÕ!Gë …ƒèuº õŽ\(//Cý‚ ÂÝ£¨ÊÇÎÀŸp¢\UÕ nükÇ—=Õsü‘Õü&ÿ||`¼õy|I’&ÌПŠßïÇíq“–—ú‰û<6Ô?Õöo½¿ÏúÑzD.x´Ñßý~ì¢aìâÅpËû£m«¨âq>Aáî‘"¶Ý¡µú#“×îY–ÉÉÊÁb±|쨹žÞuúÇÚ'¬D&TŠÀ/‚ Ü5ŸüÌý+éî…~NGB|üÇîËØ“ _… b­~Aá®Òê´Ñ{çÒСPˆk n­V{G¶q«Ûýp8™ÏƒßïG¯ÓÆ’¿|áPƒÁ ¿ ‚p穪ŠÑ`Äf³Ež¿½`«ÅŠÕjexd˜®îîéÞeôz™é™  âõy§µ.’$aµX‰±ÆˆÀ/‚ Ü=1ÖbcbïHo<àt ïæˆÿ”TU$ЉEQB¡Ð´ÕG’$dMd2¡ü‚ Â]óq)h¿h¹ýŽ>t:ñIILÿ-u ¯×COo$éPœÝ†9.˜žGçÃá0N§“á‘aøA„¯?UU ƒd¤§GSèN7³ÉD¿ÃªBbBâ]™sðq¡05Þ:øA„oŽ)—ÍÆºDþ?ýõ’$ I–AÙùA„oŠé¾±?U•¦ÿžÃ­_Aî)úŸ¯ 1Ô/‚ |#L^Ç [’w,ð­KôÞ* E×П° i,ËÞ§¶Ÿj "Ggùk4š/u^ÂÇÝV ø‚ ßSéÞ¾^†GF(*( £«UUÉÍΙðÚñëÞ‡B!jëëÈLÏÀf³MxÇãAQU¬ã–éý¸‹ iÒ<~I’hji¦¯¿£Ñ€,Éäæä`‹µM¸ÐK]|ëšü“^ƒ½êñø}>bcc'Õgì]"ð ‚ ßX¡P˜`08îß!EÁðð…ÃFŒ†Hªà‘‘Ü#î5’º×ãó¢×é1›L´´µ ÉÍÉÁj± q»ÑëtX,–É3÷%¦|‚/ ‘œ˜DVf&­ímttub‹µáñzñz<˜L&ŒF#n£Á€F£Áíq£×é †Bx=Œ&f“ ŸßG DQ âp8ÈÏË'6&fòȆHÒ#‚ |£M1Ì.I]]ô;ú1Œ„Â!Š ¢¯¿£Ñ@ úýx<Ü7ɉI ãøéw8Ðiu467ÉÊÈ 1!ñSßðù} Œà÷û1™L¸=ÐétƒAòrsiïèÀk#1!Úú:R“SèëïG«Õ )È/ ··—>GV‹¯Ï˰{„Þ¾^Ì&ÓäÀ/fõ ‚ ßhãbðøÞ¸c·Ù™S2“ÑDGg'}ý}dgeQ˜_ˆÅb Îɾ§¨øü~HNL&?7·ÇsÀ‰F£Åï÷ãp:§¬ÂTsTUÅ5r¯\U£ÓÆß;×h4ÄX­£E~ºÇùt:Ý„ú•©ÓêÐÇè'lO3:Œ?þ½zýÍ×Üz¡3vp»F_Aøfø˜%{UˆäÊ% ©º¹õgŸ4"þ±¿—@úŒêŸfþóŒÒKˆ|A„ošO¹:®Ýf>_½Suº[õ_AøÚ“$ ¬Áïóc6›?Óûî”@ €,ÉÑ¿ìü¦ª ~N'¿ ‚ðõ'I±±±8œ NwuP•ØXÐÓÛ‡,O_×?’¯@KŒ5F~Aá›Ád4a4¿2O©_'Àb±N{½dY¦·§W~Aá›áÖ¤9_ãƒýW¥^bAA˜ADàA„D~AA˜ADàA„äc'÷I’„,E2 ©*Ñõ€ï&Y–#‹1© ¨ê]›Ùî͉ápøöm$Ë(Šò™ë6~YHAA¸>6ð»=q»IKM#3#}ÂzÁ·y„!ò ã¡( ­mmtvva±’—“ƒÕbA’eTUáv1s,^ªªÒÔÜÉ|„ŠÑ` '''’Êñ‡“Þ¾^’’’HˆÿÔÛ,+_‘‰ž‚  pÛÀ¯( ;ÞÛE{G' ñqÔ74òÔã¡×룽[y4 LLÐÙÙEK[+–-ôû±€}½ªFÖWM60þ÷×Ëo°s÷n2ÒÓñú|Ö¯§ ?³gÏQ:»„øøxE™°í¡¡!®^/gù²¥Ñ@­ŽŽh4‘<Åc#*‘žü­uS…ß½ö¡Pˆä¤$ìv;)))XÌæÈþŒÖuhhˆW^£ÑÈ=«V’”˜m“±r%IB£ÛûSSWGccmXV«‹Öq¬ã/°>Ïh‚ ‚ Lå¶? R[WÏÚ5÷qßêÕ„Ã!$IâÂ¥Käåæg·SYU…ÝnG«Õr½¼U…¹¥sØè/_fphU+Và÷û¹tù z½ž%‹‚$qõÚu\.F£‹ÅJwO7esæPŸDF šš›1›Í<ÿì3Ñ”ˆå¼þæ[,Z¸uk×`2™¸tå Š¢0î\jjëØ¾s'===ܳj%N§“Ä„Dlv••Uáp:©ª®Æb1³xá"ZZ[‡ÊJçD°^¯gýºu,Z0;q·ÛM(fÅÒ¥\¹v•ÊêjÖ­]KJR2MÍÍÔ74ggni)ítvu ™WVJk[;­mmäççaµXˆ‹£¡±‘ήnIMIañ„B!.^¾‚ËåÂb±°pþ?mít÷ôg·ñâï~GVF§ÎœÁé@¯×sêô-\€Á`@UU, •U\¼t™P(HJr2‡“ó—.‘š’L^^Á@®®nº{z¹tù f³™ú†FrsrÈÊÌ`Ïb2±Ûlüîµ×ÉÊÌàííÛQU³ÙDjJ 5µu R\T ü‡Ž¡¼¢‚7*éíïÃf‹å·/ÿŽ´´jëêèíë#ÆCuM-¥³gÙóÁX,fÊËo04䢡±‰3çΑœœL{{;ç/]"%%™k }ýý\º|•~‡ƒËW®žšÊC‡ÉÍÍáìù 444þý(™ULbBÂt+‚ Âט$Iô÷÷ü¬þõëÖñ?ù1é©©üö•WhhhbéâETU×P~££AOA^>ùyy\®aìvsf——›ÃÃ7â÷ù©¬¬¢ßáÀé ­­pX!1!x€Â‚B òY{ß}øü>ü~?žÏÉÎæÿàgŸ¹ee<¼q-mí,[²„­›7³há‚Èí)R·ÒÙ³yø¡$&&ÐÖÖNeUë\Ǻµ÷“””ˆèè ‚ _–ÛõƒA.^¾‚Éh$;+ ­F‹Ûí¦tÎlö<Ďݻٰnƒž9³KHINæwßÅl2‘™™Áðð0MÍ-ôzâââ˜3»„¬ÌL¬V Êè½lUUFgì«DîšæLUߨH__?‰‰ ¤$'1<2’„ŠJKkÉÉÉ8|˜á‘æ–•ÑÙÕ…,Éšš›)*,@–ezzz‰‹cÄíFUaÕŠ´wtðö¶wIKM%!!ž`0DaA~t8]UTdIF£Ñ¢ª*¡PE‰ŒDª¬¢¨ á°‚ª($%$P[WG}Cu õ$$$ Õjat.Dll Ì™]‚ÉhŒÞÏaÛ®N§Ãd4r£¢­F‹Ïç“ÿA„/Í”Cý’$áõz9tä§Ïž¥©©‰¥K³bÙ2Ìf3½}½\»^Î Ï=‹N¯çȱã\º|‹ÅÂ=+W™™Ik[Í--Ì-+#.ÎΕ«Wiik#66†¤ÄDúÊJKq8‘ÉsÉÉt÷ô0·´£Ñ@ee8@EE‹…Gy˜„øxÂá0W®^#>>Žø¸8jjk$!>ž¥K(¯¨ 7'›8{gÏŸ§µ½³ÉDqQÇO¢º¦–´ÔTV®Xεëåt÷ô0{Ö¬h®©«¥º¦Žªšj:::IOOÃãñP6gn‡P(LnN6gd?2ÒÓâÂÅK Â#›Âï`6›)ÈÏ'11•\¼|EQ±ÅÚ…BÄÅÇCNv6íäçS2«˜sç/RQUIGG'+W®øLO ‚ ­Ɔú¥Ó§O«%%%SNS¿ß"2ßð Müð÷¿‡F£! áóy1 Ñ|Ê¢ ( ­Y’ñùý„Ãa z}tæûØcwcåÞ:C_UU‚Á ¡p£Á€F£‰Ö3 !Ë2²,ãñxeý¸²C¡0Z­I’p{<È’ý} $à÷c2™Ðjµ“Ÿ4 2Û¬G.IÒ蜇›O2Œý|ìgcƒh44MôÙÿ±ß‡B!|>†[ö$dYжÅX9¼ôÊküìG?$##]LîA>7I’¨®®þøçøeYÆd2Eÿ­ª*@€ªê–/]Š^§#¬(ètZtº˜Iï ¤ªªNz~lqœñÁvüßÇ^£×ëÑÛþ­öfÕÍfó¤÷ét7o¹å÷½~B}nÝ. ÞSÕy|ªÅ±ÿªû÷­1‹Å2©¼ñõ$‰ªê.]¹L_¿ƒ¢‚Èhú‚ —ás¥å]¿î²³²OÃJ~ßtªª’––Ê‚ð|dY&'';ú”ƒ ‚ |QŸ9ðët:f—”ˆ`t‡Øm6âãâ±x ‚ðåú\=~ˆî¬±•ÿAáË ü’xfLA¾ñ´N§“êêê鮇 ‚ w˜ÓéäÿwÞÛïù$E%tEXtdate:create2013-08-30T12:28:19-04:00¯Û(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshotï¿>IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/ports_inbound.txt000066400000000000000000000005171330160122500244210ustar00rootroot00000000000000This screen shows the network ports that processes running with the '%(APP)s' type is allowed to bind to. SELinux controls the network ports that a application is allowed to bind to based on SELinux Port types. This screen allows you to modify the port number/port type definitions, which the '(APP)s' is currently allowed to bind. selinux-python-2.8/sepolicy/sepolicy/help/ports_outbound.png000066400000000000000000001473631330160122500246020ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýwtW–à ÿ"2"½…÷ zﻩ©éïêëë-Rmmíá)S¦LWÓ4¯wæ@ |ËH’D<çÈ‘#‡`’¢(†q½ó%à*`š&6› «Õ:Y1 C5 CŒö@ øŽc†ª˜¦IæO ÁwJ_ ‚ï8]¯d>å/|3$IÊ~ÎÔ£¡Ç2Ç%IQÏF;ömäch^FK—ÎÀ׿~æ:CÏí˜@ ¸±ÈÔ}SýÁ7@’$R©‘(†a`·ÛpÚ$SI"Ñ`bš ª n§“p§ÓUUH$’Ä“ <.²$ñMk $I†Ap ŒaèH’„ÝfÃa·ëXH€nš„#6;š®a.§ók]+‰H¦ðzÜ( †i2@–%Ü.×õ~-Á-,I0¤~gÚ+1ÔW„Ò¾¡p˜O×mdÿ‘chšÆÄ±5üøùåì?zŒ×?XUU0 “±c*øÞÓó¿}ç{˜é“&`š&‡OÖ±cßAþä¥gq»\¤«­”íˆË²ŒaH’„ƒ¿‚1øÛPûœP8Ìßþâ7ôƒ¨ŠBiQ!O>°Œ Õc² ¦I0â7o¿Ï²»n§¥½ƒžÞ>^~úqdIB–åÁ;K_)Ó€ ½–$Á§_lbË®½üø…g˜?kMZùÙïÞ¤²¬Œ=÷4‡-SÓÄœé:»`f}™&}iðÁ4 ÌÁkƒ‰a|ÙyAÌ.´vtÒ 1¾¦ €õgÈ ø)),¸ä9æúE¾²,sòt;öä©´„x"ͦ‹Åq9üéËÏcSUl6’$ …I¥Riågä3oæ4LÎoÆ0 ’©…¹¹¨ªBGw¥…… D"Äâñ쵋 ¸ÐÖŒÃn£ 7Y–ÑuƒP8Ì÷ßKei o­XÉÖ=û¨ª(£­£‹h,FQ~†a0ŽJ¥7¦’â‚|$ ‰ÐÚÑ€UUÐ ƒŠ’b$Iâ|kŸ—€×‹iJDc1ºzûذccÇT°iÇnη´Q—‹n´´uÐ ár:)*È£»·TJ#‘LðyÉË ÐÞÕMÿ`š’ µ½ƒD2‰,Ëäçæ`³ZinkG±¤;2‘GNÖ¡ëy9&‹b±\ï¢ \s$I¢½»‡•ë7qûÜY€ÄÖ=ûxtÙbJ .«ÓMÓŠ_ ø&˜†A~N…y¹>qÓ0˜5u2’$ƒ$³~ëd‹ÌÔ ã˜þŸÓ41 ƒ‰c«G£¼·êsšš[˜6i²$£:›ví¡ñB ‘Ko_ıúÓtv÷¢(‹…=¿œ-»÷Ñx¡™P8ƒ‹ï$‘L²iç^vÝ}}<õÀ}töôp´®€»æÏeLy)ï|ºšâ‚*ËJ¨©,Gq8¾ñ‰@p³bš&“ÇÕÐÑÝÍÇŸ¯àá{ïaê„ñ—êÏØâd×øÁ•£›&•e%üÅ¿Çá“§8xô8;ÔòãžA"=mít:°X,جV2ŠYœROw¸ 4]Ï~^zÇíx\.Þ_ù9=½`~YQ ÓdÞŒiœomåÍ?å±eK˜9e_çfL’ðz<<÷èC”ò«ß¿Ë¢Ù3Y8{?{í-ö:šz7 Ý08yú,ZÛùÉËÏSTG*•âo¼Ãáã'q:ø<ª*ÊÑu=½ü`šæå1¡¦Š·>YÉ÷܉,K\hmÓ¤º¢‚”¦søÄIŸ<…i̘4Esgñoo¾Ãù–Vj*ËIiÝ'êØ¾÷š®sçü9Ìž6…_¿õÍmíBei Ò`^‚[ ²66 ~–¸2}.FüÁ7@–$›[¨?{Ž’ÂBÆŽ©`Ãö]„˜¦‰Ëédîô©XU»Ý†a¤×©›[°Y­È²D4‡lý“°ª*N‡Y–Q…X"AÃù t÷öaš‰dÚhÐa³ ‹ÇqØíÃŒs¸çNæLŒnèÂØlVzúúhië ™Láv9Ñ5Ž®î¬b:m膎ßëáŽysøøó/°Ù¬,¹m!6«šIdì ƒE³gR˜ŸKEI ë·íÒ뎟~±êŠ ò4MC–eTUÁi·c³Z9ßÒÆ‘ºST•—“—@×uTU¥/¢«»‡d*…¢(¨Š@ue99~_ÖA±¤gôA;àVC–$ŽÖÕ³}ï¹÷¶ï=€ßëaÖäI—í³êWŽ)A_0Äæ]{ …#8ìvî½ó6ª+Êééë'™Lñ›w>À0 j*Êyáñ‡ ø¼lر›Í»öâtØ™5e2¿ÅbÁïó`UU,Ÿ×CEI1Ó&ŽgÝ–íØl6 rs8rò±x‚?}ùy¾Ø¶“ƒÇN²höŒ¬¡\®ß,I$S©´µ¾ÃÁC‹ïæó-ÛhXójªXrÛB"чNÔáó¸ñºÝL¨â93ù|ó6¬ª•{ï\ĤqÕ¬Ùl#‰2qlu¶sa˜&—UQ°Û¬L›0Ó0p8ìxÝ._U0M©Y&c/I`³Z‰'’ mpk iš$’)TULŸFìhºŽÝjE–eRš†¦éÙƒUM¬c‰–©é:¿xýmrs¼üä£Ãî;}ofv["@JÓ1M«ª’H¥ˆÅâX­VK:/²$c±È$SªbAÓu¢Ù4‰)MãB[;ï~¶†WžzŒIãj…#$’ÉÁΆJRKaUÕôNàF’$dIBe÷ÍåÎ9~ü¸˜ê¾)`·Z±[­À—þ0YF±qmš&v›uT9¦ib³ªÙz˜ù,ÉŽQBe†Íú¥ÂÏ`·YGT|Ó4Q§Í3†y™©ò¡i€ìµ$Iâô¹&Z;:ypñ]Y?2…¡×Q `Iß‹ªf;$—ºO«ªf;¦i²y×!jŸÄ0 ¦NGeY)æàì‚×åÄÌLLº»»‰%®îõþ$$œN'ù¹ù$SIÂèº~SuZ2 }×^÷¦¼`(J8¦ÆSƒßï½sÁuC’$úûûimoeü¸ñ’E{#"¥G³=½=´´µPXPHQaÑÕ˳©Tжö6úúûèíí%‹bb"eû †«½èXæ; ߺ{5ÓK’„Íj# “—“GYi‹åÆ}Ÿ_ñìMÓ¤§§‡p$Œ×ãm¥à¦F‘°Z­8l SØÕ ®²$µFI$xÝ^åÆ_…’$ —ÓŹÆsŒ«wÕólU­èºNOO)-…®ë$âINÑh »Ý†®躎Ýn#át:ˆÇX,–tô¿x§ÓyUÓ»œNt]G“5zzz(.,Æaw\6jØNæ]÷öõâõx¯wv‚?ˆlKeÞ”]qÁw…Lùº½ôFU u‘y-ò,IRvÄlš`±(øýŽ´ÃQ<üÙmöaÿœç౫—Þ0 B¡¬ƒç˜˜˜†yS+~Y–E)¸a0 M×0´‡OÅ¢|­åúX%¸¥ÈL+ß J"­îÚäyèT»,ËdV™U¹á¦Ï- €I–²ü¹ò§B‚…H$L$:ŽNi¤cȲ·Û‹Ûå¾"Bñ n8nÅ?tìµÈ³išéõtIÂf³¡&Ùò‡ ¾ „q»]YÃ0nŠwz)Ä–gÁÀ@8D,EQ­8E±bš:‰D‚`(¾ÛãþꥨË*~I’Ò!0¿fo73å`Æ7ª0Y#"QÑnI.ž6—$)m6ˆ®ëW\6äAC3ý*(YJOõKH¦dJ—ÌóÐ:ôMêTFfæüd2E*•Ân÷€9¤®Hd ï2߯*™Ë *øô%%ÜnVÕš>f2lª_–åÓ’ßFÇ`´èdßV[’y×Wýy —@×5¢Ñ0EÁ4üùØl.t=ÁÀ@`ât¸†µ=£qIÅ/I¡öìÝǔɓ().¾¢Ê#IuõõXd ¥¥%tttPZRò•†O™N‚,Ëôƒ „)-)[gnb2ÖÝCô+ 9tô,IÝ==lß±M×q»\Ìš9ƒü¼¼+ºþ…–ºº»™6eÊ·¾eÕÀH+6iô躦`öQ˜›À¡*èšUÖñ9úÐR^ÂÝпRñ_²%”$‰'Oòo¿ù-[·oÿòYÎÆÎT®ì±ÁÿkqäØ1"‘GŽ#™Jeü¡d”=À6rüÄIÅBWW7u§Ne»Ìu2ùÊ(“¡Ç†þÜtuus¡¹yر ÍÍt÷ô\ö¼Ìè/£H[[ÛØ¸y .§“æ–>øècb±Ø£ºÌ(:ó' gϱuÛv4MϦɤË|Ö4íËÎÈàṉ̃¡i‡ž3T|9¢Íæ¹­/ÖoÀfµb‘-œkl¤áì96mÝʹƦôy¦™Ášÿ‹¯—íX˜™“”¦a±X-2¹¹¹Œ­KN I–p»Üø¼>d‹ŒÅbAQ”tZYÆn·S^ZŽÍf´Æò'[F»DY–ÉËÏÃawd¯“ùÓ4-»Æ?tª?£ü­V+ÇOœ`ϾýX­*–ÁNÍÐûÿ:ï%™LräèQºººùhŧ´´¶!Ig9ר8jYùºïZìz\OdYÂ4 $Y%• £%;°)ý`ôbI$Ù–žM“¾z€sÉa¸¦i9vŒ»î¼ƒ³ç †BºÎº IÄãX…{—,&‹±c×n’‰@€{—.Á2¨¬3¤’I6îÛÇɺS”•–rçí·±~ÓfÚÚÛ)+)¡ºªŠ+Wâõxèî顸¸€H4Ê®Ý{him¥¬´”Û-dÛŽttt`¸qÜs÷]:t˜#ÇŽáóz¹ïÞ¥Â'Á €$IìÚ»‡UkÖòþä™1}‡å¿þ5O<úÜwßW†‡ºOÜãñPQQÎÀÀñ8’$q®±‰]{v“J¥˜3k6'ŒçÄÉ:jFUUî¼ýöt^d09YwŠ»v¡ª*Kî¾›ÜÜV®YC{{ÅÅÅÜsçlܲ…h4Jh`€…óç3mê¶ïØÉ¹ÆFÊJKYrÏ=ØãÞK’4h\“6^“‘‡í{üLŸ6§Ó‰ßçãÈÑ`ºâJ’ñxœÍ[·q¶±‘Êòrß}==½lÙ¾h,ÎÂyó˜2yÒ°åƒÌ¿ª(ÈRZÙʦœñ67“›“K"‘Ò‘‹‚ÏçËZÛ÷ööâ÷û),(DQúûûq»Ýôôô ¨ ù´´¶`³Ùp:œôõ÷P•T*E__¹¹¹(ŠB2™Ä"¥gr9ج6zz{0 ƒ€ß,ËÄñ´²Ò1*/+£jÌ Ý §·—Çy„öŽÞxëmt]§jÌÚ;:èè褸¸è«ßKY)·-\À¾XñÙJNÖÕñð¤Ÿ72]ÝÝlݾƒ`0ÈÄ ˜:e2kÖ®ûŠw}76›M„-Ü(ŠŠÍf'•JÒ7PNk[¹9qb±9ùÓH$ ì6;å«í~FíH’DWWmmíÜs×$I›‡ÙwàÕÕUèºÎŠÏVÒØÔÄɺSL:…ó.°~ãÆlã4sèÈQÔâÀÁZî¼ãv¦MŠÍnglM5sfÍd߃é@i)“&MdòÄ tuusüÄ 6lÚLýéÓÌž5“ã'N°uÛvŽ?¢(Ì›3‡Í[·qþüy>]½¯×ÃÄ nŠýß· ‹, ¸¨ùÅ/yÿ£ù—_ü’¢ÂBæÎžsÙó #½W<;‚6MÚÚÚø|í:Ž8A4¥µµ>þ·ÛCeEŸ|ú{÷`ÅÊ•TVVàr:yÿÃ@úƒA>Z±ŸÏG,ã³Õ«1M“êª*fΘÁƒ9P[Ë¡#G(.*¢ºªŠ/6làܹFÖ¬]GEy9å嘘Ãòf˜éQøhy¾ÐÜÂ;ïÀ[ï¾Ç¹¦&ÎŽøT ‡ŽaǮ݌­®fçîÝ9vŒ»vÑpö3¦NÅív:à K2ªª ZÕì[–e‚¡ ]]]aQÒ18Ün79ššš0 “ÜÜ\:::èïï§þT=Ý=ÝXd ^¯¯ÇKNNn—¿ÏO*™"7'-¥qòäÉìùn—›þ¾~Ξ=‹nèäææârº8á|Ú¸¢ ë鯗ÏF×uR©Ô—3.©Á`µµ”—•QQVFMU3gL¿¢÷RY^N2™äà¡Cx< ˜9}:e¥¥4œ=Ç©úzV|¶’p8̔ɓٰiµ‡sèðW¼ksø»Îtò‚ë…ÏãKÏb!e–ÒÒå!aTLYH$bxܾ+ZŽº¤â?~²Ž Í-¬þ|-íí¥‹ï¡½£ƒp„¢¢BæÏËÂó9{®‘d2•]e™Æ¦&ÊÊʘ9}:5ÕUhšF}ýiŽŸ8I$A–ersr¨,¯ ¢¢‹EÆ0M›˜6u* çÏgÒ¤‰œmlDQ,Œ­©fÒ„ñØl6¬ª•‡x€¶¶víÙK4vãº1½•0M“‚ü|~ú“?¥²¢‚×Þx“ÊŠ ~ú“?%??ï²£§‹•®T”—óÊK/òÿò/À4Ù¼u+Ñh”Eóç±pþ|d‹ÌÁÚZv; æÍeáüyôûéïïG’$úúúhkkçüùó „ÃØí¢Ñ(õ§OsâäI"Ñ(¡P—ÃÉØšÆÕT£ë¹¹9,]|GçðÑ£$‰ùC>ÕŸÉó˜Ê ~øÊ÷øñ¾Oõ˜1˜CŒ] #Ý1èíë¥þôiìv; ±pÁ|JŠ‹Ù¼umímÃ;Å?X?4MCQEA’$œ.'ýÁ~´”FŽ?Y–QUQÉÉÉ!‘H‡qºœ˜˜r¸Ýnúƒýx½^¬ª•úúzü~?ªªŽ„±Ûí¤´¯'»vh˜iÛ¯/íhÉåt‘L&q»ÝX­V, ¹¹9ÙµöQ§Í;M†i ~Ï ˜9}~¿ú3_ã½9J2™D–drssðy½ÔTW‘——‹$IÄâqZÛÚ˜7g6óçΡ ?ŸÆ¦&\ίx×ɤ˜êÜPX­6ÂS?ƾÿ ßé%Ξ£§·—p8̩ӧٱk7%ÅÅxñD‚õ7±~Óf ((( ¹¥…žž^JKK¨¬¨àž;ïäŽE iimãÈÑcLš8Ÿ×›ö6§ëèº6¨puÈËËeâøñì;p€¾þþkï™{¦øt,{»ÍŽÝnOï,ÐÁÑ~Ú~ÆírQ˜_ÀôiS¹Ù½”—•23uòd, ûö¡øaоÉ×íI¯·®¹+·ËMk[+‡›ÕF4’Vœáp˜îînÂápv‰ ¨¨(«´'²,‰Dðx<˜Fz-¼··—‚¼*Ê+ÈÉÉ¡··7k'à°;e™††dY¦´¤UQQ, ñx²Öð£*~=ýgš_ÚZhºÎ…ææ¯ù^Ò××nèHH¨ªÊÞ}ûi:~ÐË Šò2¶îØÉú›èêêflM š¦}£w-\/$IBB"™LRXP„®ëôû8¡)ëSäJ°,fù-))Áápd'“Ibñ çÏ#??Ÿü‚|LÓDUT¬%ãv:yðû CìÚ³—D"AYI K߃ßç§½½œœJŠ‹™?wv»ƒ“u§0 ƒÉ'`š&Í-­T”—3eò$ÆGwO/‡ƒÂÂBŸ—‚ü|æÎ™ÃÀÀ@ú=.ZÀ¸±5T”w­i†ËéºÞÕJp‹’Ùm×ÖÚJuU ú`Ýëé¸—ËÍ寯û^ ÃÈÏ”‹¡ï*Ó^ -+ŠÅ’õïp%ï:‘L ë:ùyù¢\$I¦³«ƒ3 õ,˜¿ˆžžNÎ5ž£££ƒE n'?¿ó2KR’$QWWwi«þ¡…Ò½]‹ÅBÀï¦pív;ÞÁÑ÷Åírò2¿kš6ì_•¡ß3Ÿ3².N+¸9ÉÌ åRïöâã_× ÌåÒgd_êÚ’”v܃4ºœ+ÉÛ×)³«~Y’ÓNzÅ¢`š&^oÚ[WÆ¡op¦—’uå™q¨ãõx‘ü>’<|ÿrÏcè³ø&ïeè÷+iK’C®q%ïÚ4Ì+žJ®éÁB,cíºÏéö£ë~Ÿo°³|eÒ+67M“’âb~ôÃ`³Z³ûagL›Æ”É“…5½à[ãf±ž:":Z¿Z×:³%®õev»Ù°À_†ÓÍn$Èþ~µÓäå#Ë2¡Ð°½ñ7+™%'¡ø×Ã0P•‚‚"Ö¢£³‹¢Âª*Ç¢(ê·C_K[˲<"JWf;‘@ðmq³øt¿ØWÿÕVlC—Á\.±xœX<ŽÍf%á°Û³Öí‹…D2‰Ãn'‹cµªFz¹ìj¦7t‹b! 'ÈŽøo–ø —âËNŽPü‚ë‡$¥gà&OšÌÄ ‡-oŠè|‚›EQÐt ÅrãÍŒ2³YmÙ­uW“ô:¶”!±Ìt ‰ôwI“‘ì1$dÙ˜ƒ2®fz«j% Ë26«í¦Wú0ø®uC n2Šþ›:–R2It]ûT× Y’Ñu¯Ç‹¦iÄn 6›Ò’RB¡±øÕͳ$Iéµx‘´±ž$KÄqÕB<l R)‹"‹Ç°(2Z*•àsÒK€&I‘H&\ïWõc³Ùp»Ý7õ’…à»Å7-‹ŠÝn§»§›¾`ß ×[p !–ÒÈÏË'/7oT㬑Œ×<§ÃyÕK‡înp»Ýé5ç8hŒ,§—ܦ;mx“·/‹ELõ ¾(…ù…Œ?þªUJQQWÂPôÀM3¥š $I×$Ï™çt³Óf·+7Çû¼’{nvŒ5}4,#4B×tÇZpYì6;>¯/k(z36²×2Ï7Ûó¹Ùò+|—¹jÆd2Igg§ñ ®ˆþx?©TŠÂ‚+Q/‚¯ÏUQü’$‘H$P…â¢b±ÝOð•$ Ú:Ú†yÓÁ·ÏUñ›¦‰Íf»¤v åôl€‰ÉM¾ÛGðòu÷¡ à›qõ,„¤/}qøI‚˜Æ…®8Ñ„ŽÏ©P–ïÀa•K·&’$‰e!@ ¸\uÓàÑóSB¬ÝÝA_w YÒÈÏs““ïä®i¹å8®÷3\2á&âñ8½}=$“IÒÛM¤ì«ÕJN 7@æR²„1™@ ŒNVñ›¦I*•JG«Œd•Ùž”Š5¸gùJÝ“fFq™´²,ÑÔ1ÀŸ¦ýt+ZìG‚öz5“f²:eùâ1ø\6ÑpßbH’R:HJ{G¹¹yü~†o1éïï§­£Š²Š¶#’±Xœh4†ÓéÀ6è^Ú0M,ßÂ2‚išÙ`UC—%R©Ôˆc“ R“ɳ,ËhšF*•ʆ²½™vC¯!I)MCK¥P%rw42ù³* «øøçŸÿÓ4Q… ãÇ1uòº{º …°ÙlÜs×47·››“]»ªÜ‡~—%C2†Máš&lÙw¦ºVüj;ϼ4ŸiS'rôÄÞý`ùÑiÔ–8Y2·B¬ùßbdÊN2™D×5 ‘eiØÒ$AAA!íí$“ çß$ŽŸ8ÁšµëÐtÇÃóË—Ó×ßÏÑãÇyô¡QUu˜¿û‹ËíP_ÎÄÁþ»øGæÍžÍc<Œ,Ë=~œ7ß~‡¾ò=&Ž?Ìwæ|Y–9U_ÏþƒµÌŸ;‡Î®n&MœÀÇ+>¥?¤¢¼ŒGz§Ó™=wèù†a°båJÊKËX0^öêNbÃæ-„ÃaœwÞq;Ó§NÍv2yG"¼ûþoú˜,Ë´´¶òúïßâ¶… ™6u gÎòÖ»ïáq»ÉËË#ŽD(ÈË ZÛÚ‰Åãôôöâv¹PU•`(„ª(8byM ¸•ÈŽø%I"³ÿÀAü~?S&M$‰rôØ1l6²,Swºž“õõ$SI;‡U«?GQ,¸Ýnž~ò ~ÿλôôõQXÏ3O=‰,ËÙ†,KzÃ0Q­vìv;’ŠbAUD£¦žJ;’ÄÿVB’¥ìR~*¥]Òe¯$I¤R»š”$‰ª1cؽwû`îìÙƒåKâü…f6mÞBggO?ù99>^ñYÚ·<wßy;ë7mæ¹åOÓÕÕÍ«¯½Îÿñ¿ÿoœ>s†S§OóÊK/f—¸JKJð¸ÝlÚ²…ò²2 ]gê”ÉèºÎú›8rôHPY^β¥Køpŧûûéq8tttrøÈQ‘0=½}ìØµY–(-)eͺu˜ƒákŸæúƒA>Z±·ËEãù&æÏ››½ßºSõ8î]²§ÓIYi)uõõ¬=DgW}ýý¨ªŠªª¼ðì3X,2š®ñî2kÆtfÏœÉ[ï¾Çí 2cú´›>ˆŽ@ ¸r†-JJ’„ÍfÃáp (*ÉT’H$˜`šÌœ>ñcÇòÌÓO1sút¶nÛNh D^^ÖÒÚÖ†¦i,˜;—'{4»¦˜ùS SÆæ7RÔqòT=½!j4súœAL‹R^`G’¥a牿[à/§5-• uñŸ¦ihZjÄîÓ4Y¶t O?ñ8 gÏñO?û9GŽCB¢¦ªŠ?úþ+L˜0žºS§Ø¸y e¥%üéD~~.‡Ž%'à`í!NÖB7t=Ê‘ãÇ[SƒÕjÍ^Ç"ËÜ»d gϲúóµÜ»t ‡ŽÎNvïÝËc<Ì+/½ÈÉS§X³î ºººøÑ~À#>ˆÍj#™L`š3§OgÚ”É<úðƒèºÁþƒ9רHQa! çÎqôøqvîÞͤ ø“ýÓ¦L6%ŸL&³rsÐ÷Óá žHL¦X8>/¿ð<===ƒA@Âa·3~ìX:LÓù „B!ÊËËÄT¿@p‹1̸Ïëñ°äž»©(+Ã:»:AJ¯³&S鑸,Kƒý€´¡“Ãá ?/'{”ü¼<@Âãqãt:1Œt‘ÌT¿,IÜ×dmæøñþáµäç¸inï§/Æao¢¾¶›¾95øý~Ñ ÝBd”¿Iº\ƒ#ßÑÒiš>êo±XŒêê*ª««ø·ßü–#G1~ÜXT«ŠÕjÅápÇÑ4=}LUQ•d2ÅÌÓùðãxj·q¼±‡ü|'ùöb]§9]gå½wÞâÿôÏ„ò-Dƪ_’¤ôèÞÐG ì’J¥0 =½40MÓX±r'ëNáñ¸‘e™óæÒ fÚXd›ÍƼ9³ùtÕj~Ùüâ‰O>ö(ùùhZŠœ@€ùóæòùº/SQNnnÎ0£Uu°ŽÌœ>Ó4ˆÅâX,Š‹‹˜¡Oãƒ?F±X¨3†eK—ðÎ{ðëWÿÔ å½l‘±( ‹epFLUTf͘A[[;MMçñú¼X­V-XÀÇŸ~Jkk盘2y2Þ!PSUŲ¥KY±rN‡ƒX,Æ¢ùó™2e2{öïGÎ;R°ÛíX­*Ÿ­Z;÷2ÅÅElظ™Gzèz¿v@pvîÜiNœ8‘”¦ÑÝÝMnNNv_$!‹ãp:8þ……X­V:;;ÉÍÍÅëñÐÞÞAwO>Ÿ—â¢"úƒA\N'º‘Þ~TZR:bD!I±D’ö® ñD ËŽ‘Œð»WÖÍë)+«à7ÿþúMLð‡c gÈ äPú‰d ‹Å2,x”DºS`UíLš8yØ8Ó4éíí¥³« €¢ÂBrrrˆD£„Ãaòóò†B˜¦IÀï§{p <`š&]]]Øl6¼^/8|^oöš®¨#¦iÒÕÝÇíFQUÚÛÛÑuƒâ¢Bìv;ÁPˆæ–TEÅçõât:ˆÇØì6ñ›þ`¼Ü\úƒAÚÚÛqØí”––b³Zimk£¿¿§ÓI~^n·{Ø=wvu100€Ëå¢ ?‹ÅBWw7N‡»ÝF×`~{z{ ƒŒ­©aÇ®]lß¹‹ÿüWyIÏš໇$IÔÕÕ}©øMÓfˆ—I4ôóÅ[œ2çd0 #=Ò$‚¡ ²,ªø3d\ö¦g@%úûûÙ½{^¯— Šÿ-„aœi8C~~>º¦ÓÚÚB$‘ÎétQR\2lÝ=Ãð­£Ã·—†1ì·‹·óÃ|T\Ê_ÅÅud´óF»~†K-_dòwqþ‡Ö¯Kågè3„ô’š9˜>“ߌlMÓxõµ×©¬¨àþe÷ £>à"£ø‡ ©/n†62—ú|ñ9†if]®|•Ö¡m˜iø|>|ð¡Qå ¾Ûd¦ú1AUUªªªG-;¦i^²lŒ¦‡»¸ _œv¨ÜK]c´ã—;ïJœ] ÍßåòtÅù¥~fd'S)JJŠ™1}šé ·(Wu.ýëø_¿Ø™ˆíßZ\\VDÇïê`³Zy`Ù²ì,…@ ¸õ¸jŠßb± :b1…|%ÉdrØÁÕACWEñ›¦‰Ýfg``€¦óM_é‡\ H&“¸\.¡”à*sÕFü²,ãóùÐu]L) ¾‡Ý‘¶âeE ®*W}¿œØ’'¸"L,F ®W]+‹Æ\ ‚‡¯Tü™]V7¦yq@ —Uüº=QpÂàf¸[-ùn UÊ_ ‚!\Vño<cË9PRÆ0oŽ‘¿ Ø,&3 á™™N\6ù†ì´ˆ%@ \.©øc)ƒƒÍ)æ×äàwÝ\zºnràl§ZCŒñj¤ôËŒÍjÃívs·*Áµ`T.IÐ5¨ÎUxv† E¾Æú_¢Z$ô¸BS[+%H7ŽÃ4èéí!QXPx½³#‚[ŒÑ?Šëä¸,Xn2¥ééþ\—)™C àæF[¤ˆ;âttuŸ—/Fý@ ¸¦\bÄ/NèøÖl\ï› Ó”Èq©tõÉ躉$ÝXë銢`š&º¡ Å/‚kÊ%µN4¡ásX¾ {abpYHêÆ°He7 ’$¡*jÖ?½@ ׊QGüºa¢é»e„ZÊøRO$hš†Õfꪣ†•$iXüòLÐUU¾5KûLŒqÓ4‡x ”ð;URšn˜dú.¦i¢i‹eÔ‘v*•ºäoßÐF‘+Ë2Éd\‡@ ¸fŒªáRº„‰ËfÁˆi™?Ã0غ};ÿãŸþ™¿ÿ‡âç¿ü7NŸ9ƒ$IXd9›Îb±`盈Çã(ŠÂúM›X¹z ²œV‚™´²,gcæûÐß2ò2CÓY,¶lÛΧ«V‹øèž{f9eelßµ‹_ýöUþËú Iø¼^LÓd``€H4Ê/~õ+–-]Âüyóèïï§áì9Æ9JqQyy¹˜¦IWW7±XŒ¼¼\ìv;=½½ø}>LÓ$ áñxèíë#ašåå娬Vz{{imkçÄÉ“Øl¶á÷!Ï©‰§p¨é΀¦ittv‹Åèéé!‰DÈÏËÃf³ÑÒÒÂɺ:R©$ÅEÅØí6’É$=½½X,rsrH¦R$âq|>áp8ÛÑG"„Ã|^/yy¹†AGg'œklbÞœ9ÙÎBæY¦R©ëýþ@p‹1êT¿¦H€Ãšñƒ™8xˆ‰Æsçí·!K99Ž;Îþƒ9P{ˆ—žMÓx÷ƒ™>u*§êë1 ŸÏ‡$É44œeýÆ „ùÁ+/ÓÚÖÆú ›PU‡ÃÁã>Ìo½ÍË/<¦i¼óþ<ýÄüë/ɘÊJ:::Y|÷]Ì›3›ßüî5ì6gÎ2kæ €ìHÞ"Kø*‘x„\— Ý0$ ]×x÷ƒƒ¨VY–yñÙgˆ'>z”“u§(..â¾¥KYûÅtõô kÓ¦NÅétrüÄ ^zþyÖoÚŒÝfC×uj&/7þ`?ßù%ššÎ³kÏ^\.'=½½€™T˜™­H%SƒyàZ0rª_JOõ«²‰Ýšî ULš–Ân·§, ª*VU%‘HdzÓÞ±hŒ9³f1qÂ^~áyæÍ™ÀÂóùë¿øsÊÊJY³vë¾ØÀ=wßÉ_üôψÅcìÚ³—D"‘•'Ðt —ÓÉ+/½È=wÝIÝ©zvï݇Çíæ¯þü§,¾çîaÓüiÅ*áuªÄ“ºa ë:†n ZÓhZŠ9³gñôÓ×ßOo?.§“ï[Æ Ï.çì¹slÙ¶óÍ-,â î_¶Œ=ûöÑÞÑA2™Â0t’Édö¯¦ºšž]ŽªZ9Óp–½p÷wðìÓOQR\Œ¦éÙi~]בÐRº®_ï2 ‚[ˆQ×øI C1µX,Lš8‘ã'NpöÜ9"‘{÷í§¯¿‰& iñx‚D"‰a¨jz4­ Žt/§» íLÓD–-XdY’% ]ׇÉ);#àr:HiFf}Ý0FÈI’„Û®’H¥0ôÌz½ž]g°Z­XUEQ²yÑu}°£`Ò42‚% c‘OÄI$Ò ?“«ÕŠ¢(ج*)-…¦i¦1xïƒ××õ´|]G’$RZ ÝŠ_ ׎Q§ú) ŸÓ:Bñ›¦Éí‹ÒÖÞÆo÷6›d"É3O?Íøqc)-)á÷ÞÃf³¡§ƒêª*>üxŠEÁªªœ¬;Å?þëÏèííåG?ømímlØ´‰»va·ÛYºd1]ÝY9†a X,X­V$$,JúóÂyóøõ±cüÓ¿þŒŽÎN¦Lž<,¿N›‚„‰6¨h ÓDUT,Š‚Dº#¢~ÖuƒM[·¡i¥%Åܾh!‘H„÷>üÝЙ=k&c*+9|øï¼ÿmímÌ™5 01Í´,‹Å‚Ûåbæôé¬ß¸‰œœúƒA$9½Ô0tçCfô/ÁµBÚ¹s§9qâĬB’$¨¿ÐM~n€ª’¼Q·è¥R©A#¹8~¿¼Ü\$I¢?ä\c#.§ ·ÛEQa!‘h”ÎÎ.òrs0žž^¢Ñ(ùùäc]Dc1 òq»Ý#ä‚Á y¹¹Äâqâ±8yy¹t÷ôÐÑÑÃá àø‡å³'æÀ±zŠ}6Kz[a_?n·›h4ŠÝfÃjµÒ×ß×ã! F1 “¢¢Bv;‰D"kÜ—¹ÏŽÎNB¡<7^'ûŒÜn7}ýý8TU¥½£ƒD"‰Ãa'7'«Õ:ìYCA øÃŒ(@ ø¶‘$‰ºººÑÿñ³­L¬.'×ï5ŠÜÐõt ;u>Úṉ̃/å$aQ,x½>n[tc*Ç\VX<§®î$ÕUÕx½¾ë}o‚ï£5ª†a°~ý:ZZ›QU+N§“9³æ2yò”Ë*ÝÐ9yò$yyy}£ühšÆÖm[(((dÞÜù×ûñn säTww[·o¡«³˜4q2wÝy7ûöïáð‘CØlv Ã`ꔩŒ;ž5kWñÔËñû˜¦É±ãG‡YºøÞ?8]]]|øñûȲŒÅb¡  ;o¿‹¼¼üËž×ì§©©‘‰&a³ÙˆÇã¬ù|¡Pd2‰¢(ȲÌ]wÞÔÉS¯÷«|—س—ŽœwçwQPXĦMë9uê$e¥ettvÅÈËËÃnwp²î‰D"ÛËÛ³w!jjÆQR\r½ïOðÀdôÑT2•dú´L›:ƒÝ{vrìøTU%ê$ÆTVá÷ûhkoC×uŠ ‹ Ù»o7ÅEÅLž4…ÒÒ2zûz ƒø|>òòÒñ#::Ú‰F#x¼>òróèéíLãÇçó¡i"¤²`8¦1²ŒÖן¢§§‡û–=ž5•e$I"™JQVZÎ=÷,Al6;ýý}¤’©aîÍ‹ ‹É $‰Åbtwwa Fú,,("•JPTTLWw²$‘H&qØíø|~š›/››‡×ëҋŃ<ŒišlܸžÆ¦F¼^ï:R„®ëÔÕ×aè^¯—¾þ>Ž=‚¦iŒ©Cnnv»‡|”›·ldìØqL?‘p˜–ÖJŠ‹I&S´µµât¹ˆÇbhº†Õj£¨°‹ÅBgg‘H„üü|<ïõ~}·—ܬošpìøQgH$“—pøp-uõuX­VLÓdÞœù:\‹ª¨äçç£é‰D’ææfœNÅEÅby@ð‡crɘgÏ6  û©®®¡­­•u'¨¬¨Än·süÄQÚ;Ú‘$ ÛCaa!±XŒÎÎNÜn7‘H„C‡k±ÙlÄã1.¸þ`?'ëNàr:ÉË˧'7C‡2iâÌ3Ì%„à:cšæ¨#þâ’Ï7røÈ!*+Ç0¶fŽÒÞÑÆ–-›e™éÓg`·Ù‡•+Ó4ijj$ÀátòùÚÕrr 0fL—††3<öè8¸çà2BÓùFŠ‹ŠinnfÙ½÷ ÉD2™bÿþ½€„Íf#'ÃŽÛ‡Õ‘ ã'²oß^ ðùü„ÃÄ Ïáq{ÈÍÍC–eü~?ªª ªVÜn99¹\h¾Àáõ<þØS´¶µpèP-cÆTqäÈ!òòò GÂL™<¯×˾ý{±Èlv÷.Y&”ÿ5ä²^z</…Ì™=ŸÏÏêÏW2eò&N˜Äg+?åô™z¬ª•Ù³ç2~Ü8z{{éîîfÑÂÛ3¦êzß›à;Â%×OMp:0yò*Ê+Ù³w7åeå|àáÓø²,á÷ðûý”—Wbç/œVGܭ͸\.î¼ãnòòòhl?}ý}Ãêˆ$I8ÎÁ¨¥2Ù‚ªª¤R)š›Ï&99¹_Þ ù¥òp¹\Œ?‘ƒ‡¢ª*KgÌ¢¯¯—d2I{{ÝÝݸ=\NáH§ÓÅ´iÓñ ›°kʨVP²,“›“‹¢ªÙcv»ó’H$8t¨–šš±L˜8 ¿?€Íš6øp»ÝŒ7¦¦sœi8#¶·¾F™ê—$ ¿ßÃaÿ2™iâv¹ðzÒá¤}>?óç. µµ…S§ê˜5s6å•L˜0‘¾Þ^NÖ`ê”ixÝ^öïß‹ÏçcÑÂÛX°`‰D‚]»wÐØx–éÓgâñxØ¿/~€ysP5¦š`(Hww×õ~:‚€Ñ:§¦iF9U_ÇÖm[¹mѸÝ</±XŒmÛ¶°eë&NŸ9jµâõx9t¸–í;¶qðà¬V+^¯UU rP,l6;~ŸŸŠŠJŠKJ9räªUÅétp¦á4……E,[öítt´gó£ª*9¹¹ÃcþQëHe0”y~^ååœ8yœæ–æa÷h±ÈüìîI’[3Žd2‰Ûå&pÆ!r°v?±Xœ;n»“¹sç“››Ggg;¡–ø›é÷Þ1—,^’}A.°š¦a±XFXH뺎a(ƒA|4MC–ål:Ã0ÐuY–°XÄËüáÄãq4M1²Ö4 I’²[Ÿ`0ð‘i‹5¡ié–:͔ؑoI’PÃ0Ðt Å¢d˱®kèzÚÊb±ŒHcšš¦ZG·š¦Ž„ñޤ3†¦ihš†jUQgEu]fj±ÈȲ%=Âì?¤§ñÓÓýÙ’-/Š¢dÛãÌÒ“aY«ýT*•ý _–{e”lCëˆišÙkeÒ醎¡Ãäed¦Ûû/u@(â“2{ö\¦N™ÆñãǨ=|Ç}—Ó•=_Ó4bñª¢b³ÙÄìð5 «»‹›6Ž>Õ/IR¶‘¼˜LC˜áâ`>C €@ðm1ÚìÑh¤†–ÍK¥»¸|˲ŒU¶^$Ga¨¨‹ÓH’ŒªŠr.ø’Ñʨ,ËX­V¬Ö‹Ë—eÔ²ªªÖKÊÏt2ëú£Éúùâ6üríúÐ:"IRöZY¹²‹<2¿™ÎóÐgpö\²,SY1&›·ËÍj¡;<î?Ü?àë#†ä‚á¹Op£s);”[‘ü¼|î¼ãî¬Ó¡ŠŠ òòò/Ùé\{@L±nxLD£*¸q‘„â'­KJKˆ³ÛߨC àÛ%£ë€p8Œõ2SLÁõ$‘L¤×äÅæyÁ ЦkÄb±ìîàF$CFüé=£¢Ç*¸ñ°ÙlØmvQ>7,Š¢àóúDܰHHÃGü.—ë[ !àÆ$‘LƒûøÅÚ”@ ßm2º^ìGàB(~@ n!,ËŸYþ_«ªªp9]Ùƒ=½½Ô:D,#/7í—YÓ4Ž;΃µ`šä7 ƒsM?y—Ó…Ó9ú¶¯#³½½kééé%'ÕQË¥d&’INž¬ãìÙsäææf÷޶¶µ±s÷:::ÈËË»äžÒÑdf¨;uŠsM”“J¥8vâÄ`>{Èr­¡hšÆ©úzö8Hk[99l6ì?p€“u§P ¿ÿkå³?ä@í!ZZZðz½Øm64MãD]ÇOœL~?ÉdòŠòùudÆãqöîßω“'9Óp–ÐÀE…£Çe¸ïH _Ÿh4ʹÆs#¿išlØ´™w?øÞ¾~-˜ÀºõXýùZ’É$ë7n$??‚V®^êի‰ÆbTƒÏ72ÂÒ•Ê,,ÈG×u~ûÚëC!9BGG'S§L¡TF“)IMMM¼õÎ{lÞº•ùóæâóù8¡™_¿úï P{è0Í--̘6m„‡ÁKÉhimåÿü¿ÿ>r”‡|€h4ÊÖmÛéÙµg/±XŒI'ޏ÷X<Φ-[hkoçØ‰4661}ú4êNbÿƒôõõ±yëVÆÇ@8̯~ûêWæ3 òêk¯ÓÜÒ¹ÆFŽ;δ©SؼuëÖo ‰°mû p¹\lݺí+ó9TæÙÆFŽ]RfZÁÿã?ÿ+’$‹ÇQU•šêêoý;ŽÖ¶Öl§(C2™dåšÏÉñûq¹\‚á¤4•«×\¶Ž¨­åܹF*Ê˯wv׈K*~I’¨S‰ª¨ƒAÌŸG8á­wßå™§žâ±G&‰p ¶¿ßÏÇŸ~Æ Ï=Ë=wÝE~^Þ¨£¾+•yðÐañ¡Pˆÿø—ÁØšV¯YË´iSq_TxG“)I>¯—‰ÆsüÄ æÍƒÏçcÍÚµ¨ªÊOò§Œ7–OW®bü¸ñää®Hf*•âíwß'™Jâõz¹ç®;q8Lš8‘òò2ΞCQfL›6âþUEaò¤I,˜?¿ÏÇæ­Û¸óöÛ¨¬¨`Á¼yÌ™5‹Í[·Q\T̉“'±X,_™ÏÓ ìܵ›ÿü×É‚ùóX¿q#ùy¬ß¸‰ûî]Êò'Ÿ¤?¤îT=‹Ìgò¤¯Îç•Ê}†¼¼<úúúذióe˪išìÚ½‡=ûö±ÿÀAE¥ ?ŸöŽÖ~±žÃGŽ ¶&«×®åð‘#ìÞ³—O>ýŒæ–|>/E……Ãdv÷ôðË_ýš]{ö`Õcƈ:r Qü£®ñ[­Öl!$‰þþ~ Ý ´´Y–7v,Á`Z ´··³zÍZþñ_þ•Í[·šòJeöööRŸOOo/ú)_lØHWw7ñxâ+ef°X,Øíö¬b3M“ŽÎN*+Ê‘e™Ò’œN'Ý=ÝW,ó@m-í<úÐC(Š%ë÷ ‰ðÆïßbßþýT”—_²Ó£( ±hŒÍ[·1sÆtœNgÖÇöÎÝ{°X,TW¡­½ýŠò™›“ƒÅbaÅg+YýùZš[Zˆ'Œ©¬dÛŽ¬þüsÖb``€ÈäóJe†°Ùl”—•±cçn~ù«_óÎûJ¥¾ÝwäpF;v왿ÛMyY996mÞÌÚZ¦LžL^nMlØ´‰œ@€{ö°ö‹õbçŠàšO$X¹z ñD‚X,Æk¿ÿ=u§êùÝobUUúúûyý÷oqôØq6lÞ|Ù²j6m¢¹¥›ÝÆo½ÅɺS¼þæï  ª*¿{ã Nž:Åê5kQ, ¥%%_Ö‘@`Dþì69rsr)/+ñUn1.ù¶3Ê Àép¢é:Á`H¯;NR©S&O懯|û—-cíº/èéíå›Ê´ÙlÌš9ƒçŸ}†ð@˜¾¾>œNLjïh2‡*3Y’€/»œ.:»Ò 4‹‘J¥.C}¨ÌÞ~ï}dYâÔéÓœ?Ý{÷¢i¿Ÿ¾ò Ï=³œ›7“HŒÞA‰Åb¼ýÞû¤4'}‹,cš&ûö`ÕšÏYþä“ât8¯(Ÿ%ÅÅüø‡ßG–$zzz$‰â¢"–?ù3¦M¥«;'¾¨¨Y–ñ_A>¯Xfaùyyüç¿þ+þÿÏÿÆŸüèG¨­¥µ­KñMÞQ2•¤¸¨ˆ9³fŽWQQAQQ!‹, ¼¬Œ£ÇO°pþ|îºãv&NH”••òðƒpï’%9vì’àj`š&‡ƒÛ-ä¥çŸ#³}çN¬V+O<ö(?ú­­mtuwSQ^>¬¬jš6BžEQ˜5k&Ï-_ŽÏçcÛŽôôöòø#ðÔ£ÚZ°ìÞ¥,¹çn X´`þ¨Sùn·›ªª1Œ[ÃÜÙ³…=Í-Æůi g9ÓÐ@Kk+GÇãq3¶¦šÏV­fÇ®Ý|±asfÍbüرhšF<φ{´È2áð°Â{¥2çÍ™ƒÃá`lu ³fÎ$‘H²`þ|\NçÉL¥RtuwsøÈQºº»8zì8½½½Ì™=‹cdzeÛvÞÿèc¼^/U••_)óØñãÄ n[°€òòrº»» G"ô÷éìêâðÑ£$ t]Ï*µ‹eÆb1^}íu6lÚÌŒiÓhniEÓ4öîßÏßÿã?QYYމI__ßç ´¤„ùóæ0eòdŠ q¹\Ì™=›Ò’ìv;óæÌ¥§·÷Šòùudöõ÷³yëV¶nßζ;ðzCGg'ÁàMç9~âåeebSpM‘€d*E[{µ‡£( Ó§N%‰²mÇN¶nßAN @Àï§¿?˜-«eeôööq°ö¢öPºŒ†Agg'NÖ …˜>u*‡ƒ­;v°uÛv सMÓ²azÓuätvvee¯—®înÞ~÷=Z[[yäᇘ:y2W”ϯ#s``€Ý{÷QW_Ýnçé''•ÒøÍ«¯~«ï(??ÔB«( v»ƒuuäç3gö,Î_¸ÀƒµX­é‘Ëú›èììÄëõòØ# #@Á5%™L²ú󵜿pžÞ>zà~fÏš‰ßïãÐá#¤R)ž|üQâ‰ëÖoÈ–ÕÇ}„¦ çùbÃÎ66röÜ9rrÔןáD]ܾh·ß¶ˆ²ÒŽ?AgWÞ?cÆT‹Ç˜)¸æC!þûßþß{ñE&ŒwÉ:q%eU×uþæüOæÍÃ=wÞ)¦åߘ®î.6nÚÈ×n¡Gëz†¬CßyûíÜyûí_«ñ¿X¦Óéöý›È¡ åÛiµªX­oUæ•æÓn·úÝ£Œl¯4Ÿ_GæÅ\{ÿºd®­( §ÇBàZ"I‡‡Ã~Ù:q¥eÕn·ã°Û…Ò|+|í¿@p£‹ÅˆÅãü~¡ø×Ã0èíëÃçõ^VY_IY5¾¾>vû°Ù8àëòGüÁNz¤%HÁõC–åž?GãJʪ£nɾ)bó¦@ ·Bñ @p !¿@ ·Bñ @p !¿@ ·£*þX,Æ¹ÆÆ¬ûSH;‘hkoç\c#É!~ÏCœ9{–þþþë}/@ ¾‚Šß4MÖoÜÄÿõÿüwÞyïýl¤¨¦óçùçŸýœÿö7KgGºCL&yÿÃø?ÿ¯ÿ›[¶^ï{Ü"hšÎÎÝ{C×;+Á·F$eûÎ]7”ß|Ã0¾²®>ÓÀñ'¯wV_ƒûø%IâöÛ‹Åhkÿ2âZqQß{éE~÷úf:ô®¢(<úðC„Ãat]¿Þ÷"¸E8~ò¿úí«Ü¶pK/fLeÇŽŸ é|ÕUÕp®±‘p8Lnn.S§L~È×MÓ²utCgÆ´éøý>ºº»9q²«UeÆ´iD¢QÎ44‹Åiïèàóu_ÐÖÞηßFOOíD£QJKKhoïÀëõ²`Þ‡ÃÁ™††Ë–yÓ49}æ Ý==Äcq&MœHqqá0ÇŽ'™J1uÊdì6ÇŽŸ žH ùäÓÏX¸`>K/¦¦ºj˜Ì`(Ä;ï¿O0äÉÇcþܹ»àMÀ¨|r|>ß0Åïp8(.,Äb± -Ë2ùù#\ì W“x,N<# ‘L%Ùµg/_lØÀ¤‰‰D#œ¨;É;ï½Ï¼¹sY·a÷/[Æ=wÝ)¼ø ®±XŒýuªÆŒ!qèðž~ò ^ó-rrD"Nœ8IEE9ï¼ÿ·/ZD$!ÓßßO"‘àÃOV * v»Ÿ­dé’Ŭ[¿§ÃÇ㦷§—ŽÎN9ÊœY3Y±róæÌ¹d™7 ƒ÷?úÓ4ñy¼lÙ¾ƒÿðû¬Z½†h,ŽÃncÏÞ½,]²˜_þæ7ÌŸ;«ÕJl°®Åñ÷iè:ÑH”H$Bh`Ã0¯÷£\—5î»8†zö$Y%íõ¾Á­ÂäI“¨ªã=Ĥ سw/wܶˆçŸY΂yó0M(//çûß{‰û–.eçîݤn éSÁwÃ4±Z­m*³fÎäÁûîÃf³^ïG/¸FŒø3>¦»º»éimk£° €X[µšúÓ§9}æ wÝqwßyº¡³uûvZÛÛyìá‡ðz½D"Q¦OŸ†Ãî ³«‹ƒµµTVTÒßßOEyn·›ÎÎNfÍšIsK ÅE…äæärìÄ úúú üäå³iËVÎ56‹Åxú‰'8{îo¿÷>âà¡Cx=^NŸ9CmíaêOŸfâ„ %);â®&¦i’H$PE±L&‰Fc8vîÞÃÖmÛøñýœœì¢L ®1¡Pˆÿö7ËÓO>Á„ñãñy½Ùß≲$aµZ1 Ã0²Ê2ÓÎf~“eI’ÐuEQÐ4-{,Àb‘±ÙíìØ¹“­Û¶+󚦑L¦²£sY–ùŸÿôÏL›2…;n[„ÏçˎΓÉ$¦ib³Ù0MM×Q,–l{ŸH$PU5;³‘iUUE!™L¦¿[ÅTÿÌ%£óI—PÞŠ¢ŒÚ“-†»@pµ‘$iXÙ³Z­ÙFG¬6+ùùù¨bô!¸NȲL ¦ôaQY–‡M[,–¬5þÐã™¶whìó})W’¤eþâ6[×u$ÀãñŒ˜ª°%IVo.®k£é¡ðo.D«(øÎ1mÚT**ÊQÄ>ÁuÂétòÃï¿Biqñ5¹Þ´©S©(¿|™—e™çžy¿ßw½à:#¿à;GN â— ®+Š¢0~ìØkv½+)ó’$Q]5æ:?Á€0¿àB(~@ n!„âàB(~@ n!„âàb„U¿išÄâqÂá0ª¢â÷û$‰d2I8I;öAÂív]ÖYO*•"‹áv»³ûQu]'‰`³Z±ÛíW,SÓ´l@p:8Nt]§·¯H[µZ,B¡ÉT d»Í&‚ @0ÈÅÅx÷ý8}æ †apß½÷²øî»Ø²mï}ðEE…ȲÌS?ÎŒéÓFj¯½ù{¶mßÁ?üÝß’“ ­½OW®¢­­e÷.åöE ¯Xf]}=ÿúó_››‹$IÜuÇí,¹ç>[µšÚÇ1 ƒÙ3gòèÃññ§ŸR_Y–9×ÔIJ¥KøÞ‹/ÿÑß! ÃàLÃYÊJKq:×;;ÁL0¤»§‡šêê«zöŽ´”FYY騿Ç ššš[S#BY‡¡ømV+Ë–.ááîçøÉ:Ö¬]ÇÂó ‡#Œ­©æùgŸÁåráõx.)ôðÑ£ìÞ»$ M׈Åb¼ùÖ;äåæðG?ø>ùƒ|ÂW$3‹áóùøþË/á÷ûñ¸ÝD"QvîÞÍÃ>€®ëlܼ•û–ÝË“=F2•¢¿¿Ÿø—eü¸±BéÇhl:ÏÏ~ùo,]r çÏ'?/ÖÖ6Ú;:(,,ÀïóÑÓÓK4ÃçñR\\$âG®9ýÁ .\Àn·SYQAOO/ýÁ~b±8ùùt÷ôàv¹(¯(gã–­ìܵ‹ï¿üÕUUôƒD£QLÓ¤¼¼|T·Ó‘H”®înb•óŽÎNz{{ÉÍÍ%?/öŽb±±Xœ›730æ™§Ÿ¢ºjÌ0ånš&‡á·Þæ…çžaÚ”)x/ò:(øn0Bñ+ŠByYÀ`”\¬ªŠÍf£®¾žß½ñ&åee<öðÃäååŽ800ÀÊU«YzÏ=>z‹,ÓÖÞαÇY8>[·mcÎìYLœ0»Ý~E2­V+]]ݼùö;äçåñðƒPYQÁ¸±cyëÝ÷°ÈÌŸ‡ÃáÈFaÛ»o?…Ìž9óz?cÁ·LcSMMìܵ‡’âb:::yÿ£ÉÍ 0eò$ì6;o¿÷>c*+èéíå¹åË™5sÆõζà"‰ðo¿þ †aRTT€Ûíæwo¼A$Åb±ÐÕÕͤ‰8{î/¿ðõõ§i8{Ž­Ûwàv»ù寃×ã!‰2nÜX^zþ9TUv#GòæÛo3¦²’žÞ^žæ¬V•÷?ú·ËE8fùSOñéªUûƒäççsúÌi"‘({÷¬tĨ¾þôi›šØ²m;E……BñG/ÃÎ]»Ù°i/=ÿùùù2î\&OžÄ‘£Gi<ž™Ó§I™¦É'Ÿ}Æù Íܶh!dÊäɃ!ö8Àüys±ÈÖ¬û‚ ãÇ1aÜ8æ}…LŸ×˼¹s˜1m:]ÝÝìܽ›²Ò¶ïÜÉ}K—R]]Åá#G˜2q‡P(Ä›o½Ãý÷ÝKuUÕõ~Æ‚o™œ@€“§êyùÅç™1mï}ø“'Mäåž§ªªŠÆ¦&zz{øë?ÿ))McßþýÌŸ7O„æ\3’©»÷îŪªÌ™5‹Šò2vïÛÇ·ßΜY³8YWÇ_ü‡?ãTýi<ãÇ# óWþSEeëöí<÷Ìrî¼ãv>[µŠ ãÇðû‡]£áì9zz{ùë?ÿ)š¦³kÏΞ;Ǹ±cyå¥ioïàØÉ“$âq-ZÀóÏ,'4¦°°|ïå IJÛYklâ¯~úg”––Š™²ï™è|#ZBÝ0ؾso¾ó÷/»—Ò’’t\hLÜn9œâñø¡±xœóç/Fù蓜nh`ÅÊUÄâ1*ÊʸóöÛ¹ïÞ{‘e‰žÞ^ ó«e¦‰ÃáÀïóQŸO*•¢««›P(Ĕɓ˜1m©Tо`?»öìÅj³2k†å}ÉŒR"‘()-¦I4EÓuLÃȦQUY’ÅRàšc·ÙøÞ‹/0aÂx~÷Æ›œ¬;…,˨ª‚:8ƒj±X°F¼S…d2E4Å0ôt œÁ¨™yáH„0ab±8¦if˹$IXdUU‰'Äã É$6«I–qØíX­Öôïñ8±X,klý¥Ì‹ÃÐ Ö'Áw“Sý===üþwèëëc˶íœ8YÇ^ù{÷ícæ͘¦I àÅgŸåø‰ttv²tñb$IÂa·ó—þSt]§««‹ßüûïxñ¹gÉÍÉáä©SüËÏ~Žªª2¶ºš{ö°ñ+dœª¯ç㟒L&±Ûí<þÈ#L˜0žS§Oóêï^Ã4aæŒÔTUF©=|˜%÷ÜËåúÚDpãc·Û™§?Äïóáõzp:Yeîr¹‡Óª*TVT Ið»7Ï>B0âÍ·ßAQfÏš…Çíæ—¿ú5á0¦i2~Ü8òrs9vüD¶œ?óÔS8Þ}ÿþõ¿@UU–?õŸ­Z•ÝOž8½ûöñÑŠ,]¼˜·Þy7+s\M ÷ß·Œ’’^ÿýïùÞ /P]-fL¿‹Hï¼÷޹dñòóòH¥4z{{Ñ4 ÃLlj.(( Ó ‚ ~¿UUùŸÿü/L<™‡|`„`]× …ðz=X,b±gÐuƒqckp¹\D¢Q‚W 3‘HÐß$¥ix=îìºS*•ÊnçËÍÉAQt]' âñxQUÑØW‰Çãôõ÷ãõxp¹\ôôôÐÛ×O^^.‡aíxþÙ呟—'¦,×]×éèì$ ‘››KnNalvY&‰àózÓÛ¦U‡ÃA_?ÉDÕªòÿüÍß±lébÆGÙà”{ggº¡ƒ v‡£Ç³~ÃFž{fx9 ‡ñz<¸Ýn‚Á 6› »ÝŽaôôö"I>¯—®înt}P¦ÝFnn.Ñh”p˜œ@à²[¶7]Ý]lÜ´qäˆ_U Fœàt:‡í‡×4'{ŒÒ’ÑÃNZ,ö»Ãá`ÚÔ©ÃÒ¸œN\W Óf³š§ôìAÁˆëæää\ïç+¸ÊØívЋвßsssÉÍM†š&xß—†r™õú¡Æs™cÁPY–¨©®¦j̘ìï%µ‹iß'#˹×ã¶CÊçû2 ¯,ËÙ]UÀ°üep»Ý¸ÝîëýW‘oÜ**ŠÂøqßnØÉ«!Spë1nl n· Ykû‚›‡ÝÎã>B^nîeÓ‰r.ø¦ˆáà;GYi)e¥¥¸ à:`µZ¹}Ñ¢¯L'ʹà›"ºŠ@ ÜBÅ/Á-„Pü@ ÜBÅ/Á-„Pü@ ÜBŒªøMÓ$‘H’Ò´aÇ4M#‘Hd†¦iÙ?Ã00MsØïú·¦iLJ»º®5ô{æX"‘q<‘L¢ É{F^"™¼ÞÏ[ †qqûu-®w­¯)¸±±/™L²fÝ:|Y–¹ÿÞ{™7wµ‡³fÝ:âñ8S'Oæ‰Ç¥îÔ)>ùl%k·Ûù‹ÿðg¸ÝnvìÜEí¡CŒ7ŽÇ~ˆÐÀ~ü ç/\Àçõ²ü©§(+-‘¡3 lÚ¼…x"ÁKÏ?ONN€=ûö±jÍçL™<‰gŸ~I’hkoç£OVÐÚÖÆØêj–?õ$v»uë׳gß~l6O>ö(“'MâT}=Ÿ®\E0bîìÙ<ôÀýX­ÖëýìßÃ0èîîÁï÷‰÷(¸©9Óp–c'NðèCŽˆ”wµX·aª¢²äž»¿y¡PÝ0FÊñ°šŸ—'âfÜ ŒˆÎgš&0cz:ðͶ;X´pöò4mÊV®ùœÂÂÆÕÔ0¦r Ó§N¡­­ƒH4½K—°î‹õìÚ³‡Å÷ÜÍ”I“ð¸Ýì?xm;vðÊK/qäØ1b±“'M–™¦óçùÍ«¿clM ‹. ° ‹E¦««‹æ–V"á‹,@×u~÷úØl6X¶Œ»v³aÓfž~â Ã`݆ Œ[Ãkoþž©“'3oÎ>[µ ŸÏOEyùõ~ö‚oHWw7?ÿ·_ár»XU•p8BWw7öN‰F ‡#˜¦!:‚ë‚®ëtwwÇq8Ù@;‘p„T*…ÍfãÔéÓlظ‘1••¤R)œNgÚín(Do_VUEQ"‘¡Pˆ¾þ~dI¦»§‡TJÃnw IŒ’>J,%68ÃÚÝÓC<Çn·³c×nb±ØOª)M#‰Œ¨;±XŒP(„$˨Cä‡ÃaV¯]ÇÁÚÃTWWa³ÙG¸Ç®?}†ßüûkTT”ãv¹PDÜŒëF&:߈7 ( ÆgÇ®]ì?x)“&aµZ©(/§¢¼œÞ¾>TEÁªZñxþ˜ööyèA¢ÑÁPH‡Zݵ{ñD§ÓI(Ä0t@eÖÌ™tu÷p²®I’èí룽£ƒ?ÿÉO(--!‰°rõjZ[[™7g³fÎ`ÂøqÔ>Ì–mÛ‘e™e÷.ÅåtrúLµ‡sÇm_í CpcR{è0û ¯¿Ã0(-.á­÷ÞCÓ4fÏœI~^~ò ·Ó„—žN\S Ã`õÚµ>|Ó4¹wé*ÊËùÙ/ÿ ·ËE4ã‰ÇC–dÎ4œåÝ> ¿?È+/½ˆ×ëáÝ>D×uŠ yvùÓ¼ú»×èìêlÁçõ ùÉÿ]×yïÆ¥ÿ÷×^§££“ŠŠròòò8qâ$áH˜eK— IÒ%GÞGŽå½>ÌÖ—_|UQx÷ƒ‰Çc8žyê)>þìS:;»°Ûlœ=×H8Áb‘yù…çq8Yy¦i¦uÉ`š|菱0~üõ~=·<£¾}Ã0ÒÁ"T•öŽŽl¸Üp$¿›šêj&NœM¿}çN\.'Ó§M#¥{—±ÍÍÍüöß_£þt=­­­ø|^&ŒG à§þôNÔäÕ߽ƫ¯½NcSmííèºFWwk¿XÏG+>Å ³j˜FözÉdC7-éì;vR©ÑX EIO—©ƒ=ßp ‰LÔá°“J¦Ä×MÌœY³˜8a/½ðsgÏfíúõTVTðÿâÏYrÏÝDcQTUåôGT©dÕ矋£‚kJgW«?_Kaa!²ÅÂçk׉D‰F£<ÿì3,Y|7«V¯!4bÜØþüÏ~¸±5Ô>ÌÚ/ÖÓßßÏ˜Ê ¶nßÎù ˆD£ÜqÛBžxôQ¢Ñ(?xåe\.ÇNœ`ýÆM#Ò‡#fÏšÉóÏ<ÂysYrÏÝäæä²uûŽ´Ö%‚V ©;cøtåJ>]µŠœœ?ùã?Æår±fÝ:BÁ³fÎà?üäO¹ý¶EÜqÛ"^|îYìvû0y’$qû¢ELœ0?þÑ©©®¾Þ¯FÀ(kü…¸tÉb&LÏßüýÿ ¯¿Ó4yý÷o‰„ùÞ‹Ïg܃A¶íØÉÃÞÃn'‰P\TÈSOJN ‡-[·ñÀ}˘6e À`„ª­Ü~Û"ž}úiö8ÈŠ•+‰Åã8ìv ÝÀ40Ì PT•ÓgΛ“ËɺST”—SXXÈ©úÓÜwo‚ó.L&™3s&ïô-­­”•–r¦¡šêj­í&Æf·¡( v› ‹¢ ¤¸xH`‘tð’‚JJJ8ßÜŒipÖP‚D"–J0ÆVWSŸ$IØívòóò0 “xb#Éd ‡ÝÛåÂëñÅGÏTÕÊ#>HnN²$áñxðz=xÜÜ.n—‹T*E$Å"LŸ——‡Ûíâ£O>!40€Å"£kzÖèúbƒéL›˜©;¥%ÅœkjÄjµRR\ŒßïÃïóÑÖÞŽl±—›KN €Óé$Od•þPãmI’p8ìX,2»ãšÙ1.ÏÅßÓÓËG+V`³Ziïè ¸¸˜€ßÏŠÏVòÁÇsû¢E¼ùö;,[º”I'p ¶«UeöÌ™ø¼^&MœÀ[ï¼KIq1ÝÝÝ<òàƒ”³â³•üóÏ~N0âöÛá\Ïʰ`þ<Þÿð#â±8ç››™>m’$ñÉg+Ù´e ý}ýüî7yñ¹g¹ÙRV®^Ãö»…Büð•WÈÉ ðË_ÿ†¿ûŸÿÈ@x€ysæ0{ö,Î_¸À«¯½ŽÓéÄ0 1Í“c³Z)).âý>à¶ øøÓOikogò¤‰˜¦IÝ©z^ÿý[44œeÙ½K²ñÈ‚kAQa³gÍ¢··»ÝŽÓéD–eZÛÚx÷ƒéèìdÞܹäü˜ ¸¤A?ý ²rÍÂá0¿«jE’$LLÈ~F’°Y­Ü¾h!+V®‘Ìôú~o/˜&š®cµZ lÛ¾ƒÒ’NŸ>C8Æ4Mª«ªp8ìœRwî_v/§ƒW|Ê…æfzz{yòñÇø|Ýdú •ååìܵ›?ýŒ;o»+W‰D0M“1••,\0§ÓÉko¾É³ËŸ¦²¢âz¿ž[é÷Þ1—,^B~^>ñD‚cÇÓÔt·ÛÅÜ9sÈÍÉá\c#ÝÝ=˜¤ßvuUy¹¹´¶µÃÃ;†#ÖÖÒ××ÏÔ)S¨®ƒ$I´´¶ÒÑÙ‰ßçgLeňu&Ã08UšSõõ2sÆtEáLC¡Ð@ºb¨V¦Lž„Åbáì¹stvvQYQAéàžž^NŸ9ƒÛífü¸±X­V’É$õ§OŽDWS ß*¸yéíí£éÂyÊJKÉÉÉ¡¡¡öö*+*8×ÔÈÇ+>ãÁ¼‚ñãÆŠ‘†àš3S__O<‘¤jL%±XŒ¿ÿ‡âþe÷RQQΔI“I$ôööRQQAWW¦iRŸOÃÙs´··“››CMu5ø¼^U¥³³“ŠòrÚÚÛq8üþQÓ{=^ü~]ÔÕ×ãv»ÈËÍÅãñpêT=………ô÷÷“L%Á¿ßGsK Ÿ­ZÍ÷¯;š›éê°â¢".47gå'S)Î44 * ¥%%œª?•éóy[SCgW]ÔTWá2Xpméêîbã¦#¿@p³³iËvíÙËÿú¿ü',²Pø‚ƒ3 üÛo_åÿû¿þü>ßõÎΨlÚ²•]{öˆºó%£øÅ¦JÁwŽ’âfΘÂ~SpáõzY8oÞ ½ìTR\,êÎ-€ØP)øÎ1aü8&Œw½³! £ ?Ÿ§Ÿ|âzg㲈ºsk Fü@ ÜBÅ/Á-„Pü@ ÜBÅ/Á-„Pü@ ÜBÅ/Á-Ĉí|‰d’O?[Éù °Xrs,òIÚ;:X¿qL2…Å÷Üõ×/\KLÓ$‹c³Y…G>Á O__[·ï`éâ{†Ä“¸º$“I ÓÄn³ú»aÙpÁ"nɭLj*™dÿÁƒäçå1wö,¦Lš„¢(˜¦IeE3¦OgÕšÏ9U_½ó.¸E ‡#üöµ×h8{6Ä0 ¢±š¦aš&†aü,\/âñ8míílß¹“h,†a$‰lÄST‰İà6C¹Ty6M“TêËH£™à;©TŠ ›6³rÕjRš6ªÌ–ÖV~õÛ§§·7Upë0rÈ.I˜¦IwoùùÔÔT£ª*ÕUUx½^¶mߪªø¼ÞëwÁ-ʮݻù|í:xvùrÆËLWWsfϦ¬´d0ˆˆ‰Ûíæ™§ž¢ @¸¤\;LÓdçîÝlÚ¼…p˜`0D{G¿þí«(ŠJ8æñÇ¡¬´”?þ„Ph€™3¦óÀ}ËFŒÀOœ¬cåš50XžŸ}úiÅŠÏVÒÑÙIQQ<ô «Ö|N{Gº¦q¦á,áH˜þ`—ž‡Ã1,oëÖoàó/¾ §·‡—_xA8í¹Å1â·Y­Ü¿ì^Š ‹8s¦ùù/²xZZ[Ùð Édí=Iàj3eòdjª«yôᇙ6u kÖ­à¾ÿ}ÌŸGOo]ÝÝ<þè#†Ég«V‹QàšÒÛÛÇÊÕkX¶t)/>÷>Ÿ—h$Jk[?x?cÇÖ°uÛvNÕ×säØ1.˜wIåÛÕÝE÷`y6M“+WòéªÕ„xê‰'èîîfÍÚµ465Q—ÇsÏ,gö¬™Ìž5‹GzÛEÓý’$1{æLªÇŒá™§ž¢¢¼ìz?.Á5fĈ_UU–.^ @4ã¿ý¿ùÆ&JŠ‹™1m'Là_~þ öìÛOÕ˜1×;ÿ‚[¯Ï‹Óé ¤¸·ËE[[³gÍÌFh”c‘Oœ0îž6mÙŠ¦iX­ÖëuÁ-B0DÓ4ÆG4AUULL¼^/ååå´wtÒÞÑÁ¬3 …ظy+ÕUc(/+Å—ÿÐòÜË6`UUfϚŸ±5TWWs¦¡Åb¡ªj ÕUUE¡¨°pÔüü~œNåeeÃf·#(båšÏ  c³ÙWSÃö;éííÃf³ÒÞÞÎÂùó®wÞ·(ª¢àõzYýùç(Š…iS§²aÓ‰$å€IÓùó¬ß¸‰½ûö1{æÌ:0Šà»GQa!@€·Þ}Ÿ×›+è†išÙuûæÖ$I"?/úÓ§éïïgÇ®ÝÄâqLÓ¤´¤„d2Éùó²åyÁ¼y8N6mÞB(âÄÉ:î]º˜m;vfg¶ òóØ·?6mbæŒlÛ¾#+³¤¸ˆ±Õ5H’ÄG+VðÐý÷Q<$¬ºà»ÏÅoµÙ¨3†¶¶6ªªÆ0kÆLòòriimåäÉSÄq}øaÌŠ_p}°Ûí¼øÜs;~|p†êÜ.š[ÐuÓL[5_¸pÛ-bÑ‚ùÂrYpMq:üÑ+¯°kÏžyú)jªªyú‰Çq:Lš8‘üü<\N'‘h”‚‚<zà>N'Š¢ * &`±ÈH’4¢<+Š‚Ï祥¥…åO?ɤ p»Ü°hÁB$IÂáp`‘-(ª‚ªedZÈËÏãû/¿LÓùó(¢S|Ë!½óÞ;æ’ÅKÈÏ»2ã'Ã0e±ý_pã’‰)þ_þÓD[N79¢< ¾-ºº»Ø¸iã×wà#”¾àFÇï÷ ƒ%ÁwQžß6¢û(øÎ1sútfL›&:©‚ï¢< ¾m„â|ç$I¬é ¾3ˆò,ø¶]H@ n!„âàB(~@ n!„âàB(~@ n!,ËŸYþ_«ªªp9]¤4]»v³kï^Nœ¬£¹¥™ò²2E¡¿?Ⱦh:žÒ’’Q·—èºNí¡ÃlÞºîžnŠŠŠP…ή.ÖoÜÄɺ:rþKÆ¥îï²qóÔÖ¢( yyyhšÆ±ã'Øwð~Ÿ—ËuÙ›êèìdýÆäåæát:Ó÷•J±uûvzz{)).& ±cçNvïÝGh DQQÑec»_,s´|^êÞGãTýiÖoÜDcSùùù8ìvÂá0›·ncÿÁƒØm6rrr0 ƒ£Ç³qóúûú)ÌgKk+ë7läD]>¯¯ÇsÅÏóR2G{GÉÁ0ÍÖ¢ë:ùyy£Z_îÞÃá0_l؈Å"“éakQwêc*+I$“ìÛ€í;wÒÖÖFAA¶ËøÖ7L$ aë,¸Ñu'ë°ÛíÂä -·™pºWÛbÿJ®c†Ø9p F9×xnäˆ?‘H°bÕ*š››1 }Ð÷sKk+ÿúË_²wß~"‘(— s~üÄIÞýàìv_lØÄ¶í;èëïç׿ýwšÎŸ§áìY~öo¿¢·¯oĹº®óá'ŸpüäI Ãàwo¼IGG'á0›·må½>ä\Sãeo,™Jñû·ßáþã?s¡¹9{ü@m-ÿýïþëÖoÒʨ­­Y–ùè“OÙ=èZó+e¶4cšæÈ|vvr²®nؽoݶmTymííüî78zü8Ÿ|ú)ñx‚7Þz‡µµôööñóûgÏcßþ¼õÎ{D£Q>]µŠOW®"óÚ›¿§§·—®®n^ó÷Äb±+zž#d~¶j5==½#ßQo«×®eÝú ôöõñÖ»ïR{èð½÷̽†Áç_¬çoþþP{øH6}cÓyþþþ‘·ß}Ã0H&\hiA–-lÛ¾“U«×\ò}ÄãqÞ}ÿZ[[‡7/U(‚kL2™âÝ>àBss6’i<‘VnOŸià£OV\õr»kÏ^6nÞ|Éß»º»yûÝ÷ˆD¢×û± ®£ GMdI¢  Ÿ‰&PSSÍfcÍÚuجVž}úirr¨ê¥]¤R)¼ªª`·Û8~â$&&úã£:ÿíÿý[jféâ{Fœ«ë:²$áõxQ‹Å‚ßçãOþèG„‚ðudÏÞ}´µµ3kæÌì±Þ¾>Ö|¾Ž¹³gáœ(-)á™§Ÿ¢áìY>üµe^œÏ´+Miؽ[­¶QåIR:ËéÄn³a³Úhmk¥±©‰ÿü×I^n.?ÿÿ·wßáqù÷¿Ý“fƒAÎD`ÎI¤(Ф(‰Ê+íJ›“7xîì{/¼÷Þ³}^ûλö&í®V9PÔŠ¢3)æL‚È™È9MÝïŒT&! õyJÀLOMMO£]ÕUõûå¯8pè0ƒƒlܰž­›oçÂ¥K<ýìó¬\±œh4Š^¯G–$<Ïu÷¸¶žŠªräèÑIe>ûü ÈIbÒwtæü9.\¼ÄÖÍ·³fÕ*^}m7'OŸfÑÂÓ¾ßtŸ½¡±)–XdÅr´c=*Á`W_{‚üUUŒŽzèééåþ{ïÁh4ÆËSU•·÷îã…—vÐÖÞÎC<@A~ÞLï>á›röÖiu,œ?Ÿ®®n^Ùµ‹ŸýÇÏéí룶®Ž–ÖVžxúiþí?~NCcã´&$ĺœ÷ÍÈÈÛ¶nE#Ëñ.Æ‘ÑQvìü—ÊËq'%]÷{NOO'Ù òY™ìÝ€Ææ&6nXO~^mííœ=’â¹ÔÔÖðÆ[o‹Þá¦RÕX2œ… æ3¯´”×Þx§Ó;n, ?/—ÜìÒRSY¾l)Z–C‡`µYI°Ùxú¹çšRnKk+çΟ;¶kyãí·y{ï>.^*g^YgÎcßœ=ž‘‘–,ZDvf¹9Ù,\°`ÊZÿ’$‘“…ÛIJeKq%:gz× 7Á”Ào0xô‹ð—ñçü§?ýSFFG©¬ªF§Óqÿ=Ûùãïô´Tö88íÉtϾý”•–ò×ÿý¿qÏ]w±gß~ŒF#½½ýD""‘##Ã$Ns€  ñαc|ÿ»ßá¯ÿûC«ÑræÜùXE% Iž>ú«ªÊ[{÷RßÐHSs3uõõ¼sô'Nb÷oâ8{þ<UUœ9w€œì,þóŸÿ·¬[˾>P™GŽ£²ªŠ£ÇOªçÙóØ»ÿÀ”ϧ”{êô4 ?þÿƒï}çÛ;q‚p$̨ǃ×ë ¯¯ŸÔ”dŒ&#]]ݱý38ˆ^¯£³³“†ÆFþë_ý%ÿå?ýMÍ446½ïþÔh4\.¿2¥L­VKzZ===×|G‰Ü·};›n½^‡d¤§M;âÚï}ïþ=~‚ã'OÒ?0@ù• Ξ;Ïé³gyñå±{úçÎÑÐÔÈÁÇ ‡Ã$:üÑ·¿É×¾üžvߤ¥¥’˜˜È‚ùóHIN¦¶®Ž¥‹³xÑ"rsr$‰ôô46Ür Ö¯§º¶–p8|3þžaŒŠÑh¤´´„ye¥$:q¹\ÌŸ7ÌŒ ²²2INv³tñbL&&³™¥‹sÿ½÷èêîž¶äôôt6Ür ·®¿…+”WT°lébÖ­YÍ¢ ¨©©C«Õ²háV¯ZINvY™™”–O›ä'+3Wb"K/ÆápÌôŽnH9ïMÙIDAT‚)G×ëåèñ„ÃaQU•Üœl òóhhl";3‹Á¡aÒSS øø€-€ÄD'•U;q‚ú†FRÜÉ,\0Ÿ£Çóò+ âóûY8ƒƒƒFL¦XËX§Óa±X8ñ]‚ÜI.†††(¿RAk[ç/^Ä•˜HNv6CÃÃ$:ȲŒªª”Ì-F¯7‰DP•Ø ³ÙÌ~ˆH$ʥ˗A¬¡¡±‘žÞ>œ;ƒƒƒØívÂá0Ã##ïY¦$Iètú)õLr¹¡üJÅ»Ÿ=9T•¾þþx™v{££Ž8NgW7»ƒ9EE$%%ñâË;ÉÈH§¢²’oãë´wt²ÿà!¢Ñ(gÏŸg~YYY™¨j¬Ë[UU z=ö„‡0 ×ߟéé †ÉeÎ+cúu\º\~Íw4NGVV&ýèõzV._ŽßïßïÝ”DfF:_zä`ìþ»Z­–íwÞ‰×륵­ EQÑh´tuwsµµ•$W=½½ñîH¯×;e0§F£A¯×qüä)¬V+¹99?q‡ÃN’˨ô÷÷SQUŹóç)*(YÍ„›.¢DTUEQ4½NljS§°Ù¬XÌfúû8zì8ùƒA›¨olÄdŠõþMzZwݱ•×ß|‹ªªjÌŸï®ÍËÍEU¡±±™ôô4îÚvÉn7™TU× …¸ÿÞ{±Ûøé¿ÿœô´4ÜîX·®Á` ° ŸöözûúØpË:/ZD__?'NžÄb±‰D°Ù¬ttvòÚî×Y¶d Z­I’HKK¥¬¤„y¥¥˜Í&6®ß@Qa!ÅsæPZ\LZj*ùyy¬^µ’ÖÖV>Âù‹q'¹¸ÿÞ{¸\~…×^Ÿ27l»šZÏük>û=wÝÅÅK—'• –šJB‚Úºz ÷n¿›Ô” òóhi¹JWw[7ß΂ùóÉÊÌD’$*«ªÈÏËå®;·‘’œLfF: MMîÚ¶D§ƒŸþÇØŸ ‘5¹Ì»ïÜF’ËEVæäï(';›þþ~^Ùõ£÷ݳ‚ü|v¾úêû~ïw߹̌ JKŠ)-)Æá°³tñ"-X@aA¥%Åäåæ’”äbëæÛæÐá#œ>s–h4ÊC<ÀÈÈ{÷`áüù“Z­V‹Óá åêUR’“Yºd1ƒ\©¨Àl6£( ‡ß9Æèè(éiiܹíLîk ÂÍ …(*,ŒÝò“`^i)Iî¤øq;§¨p8Lß@?Ù™Yñûò¡PˆíwÝ…Ëåâð‘#´¶µÑÕÕªªh4Ž?ñî±}ÇVæÎ)" ÑÔÜÄ‚ùóX¿n‘H”œì,\‰‰$¹"“š’ÂÑã'âe*ŠBYY)V«…Ö¶vrsrHHH˜é]'Ü ã£ú¥ç_|^½mãm¸“Üïû"UU FB¡O=û,kV­¦´¤øCW ¦¶–#Gñ•G¿4i°Éõò+ 11‘Öä‰Dƒ˜L&dYþDʼõü >îþ¼EQ‡Ãñ)I@€§Ÿ{î#ïï÷^~¿ƒÁ€V«åÈÑ£ôõ÷óÀ½÷~ ×«j¬GæÐ‘#?yŠ?ÿ“‰€/|&ŒŒŒð·ÿð|ã«_anQÑu§Ö‰c[ø8zûz9pðÀ‡ËÎ'IR¼Ù`0ðͯ}í#§ŠœSTÄœ÷8ÀßÏý÷Þó±ÓT¾;ÿ“+óFÔóƒø¸ûózdYž4Ùh4~¬ïýýÞkb·þº5k>ÔçßÖ`0bOH¸î ‚ði#É2N»ƒÞðžÇ¼8¶…O‡jñ ÂgA(ŠM—|Ÿ…žáÓBUU¼^/&“é=Ƕðq|¤¿ |èõzôï±êŸ |ÚH’ôÖšǶðIkõ ‚ Â,"¿ ‚ Ì""ð ‚ Â,"¿ ‚ Ì""ð ‚ Â,2í¨þᑪkj@…â¹s±ÛˆD"Ô74ÐÓÛKÖXÒ‡éæ›¶\½JGgçØs»¼ÜZZ[èÀd2QZZ‚F–ilj¢«»›œìl²23ß³²½}}tttPZR‚N§bÓ[ªkkIMI!Ùýî”Ä«­­x½^ŠçÎ×sÔ㡾¾ÂÂl"[› 7ˆ¢(457“š’ò¦Þ}Øíáã˜Òâ<õ̳:òûâÉgŸ% qêÌ~ÿô3”_©à—ÿæºÙùš[Z8qò'Oæç¿ú5Ͼð^Ÿßüî v½þ:'OŸæâåËDÂaŽ=Æã¿{‚ÃGŽòúïTTV^·¢@€Ÿýüü÷¿þŸ  ¢räè1þô?ý%GoÛÓÛËÿüÛ¿ã_þíg(Jl½jEQxéåüÙ_þÕuë.|6„Ãaö8HÿÀÀLWE¦ yüwOÐÜrõm‰DøÍ¿§¥µu¦«>­ã'OM›l\[{;‡Ž¼3ÓÕ> )-þp8BGg'kV¯.\º„ª(t÷ôb6›ÙpË:ž}áE¼>ß´Þ²v-ëÖ¬atÔCwÏ?±qÃzŒ²,³zåJ.X@jj ‘p˜ýrßöí,Y²˜_ÚÁ›oïaîœ9Ó&T9üÎQÉÉΊó®®nöí?@ñœ¢øJrÑh”Ýo¼‰ÙdÂjµŽ%ÇÐp¥²’K—/3wN‘HÑúwñÒe~ûÄïY¶l)Û¶l¦° ÓgÏÒÔÔDñܹ¤§§QU]Ãèè(Én7Ë—-÷ ÂÍKUÕÕŒz¼Ì-*䨉“øý~V­\A²ÛÍñ“§ðz½ †††Ùµûu._.gÍêUdgeQWßÀù p»Ý¬]½Š¾þ**+ð,Z°€@ HuM .W"Ë—.%ÆÓ^/]²˜ü¼¼)õjhl¤±©ÇCA~óçÍ#pöÜy)-)&';›§Nãóùðz½ì=p€ä$7wnÛÊÊåË'­Ü ÙµûuNž:ÍÀÀ›6nÄnëýšMiñ›LFòrsùî×xõµÝ¤§¥¡Óé(ÌÏ£¹¥…_ýæwx}>RÜÉÓ(Ëh4.^¾„$É,_º Y–IKM娉üâ׿æÉ§Ÿ¡µ­H$B~~zŽyóÊèéí#8M*ÖöŽ޼s”ûî¹›[²$‰Dxíõ7˜;§ˆ… 0Ê/_¹BcS÷n¿N‡,Ëx¼^v¿ñ&›6n$+#c¦÷¹ð1iµZd£Á€^oà£GÙð N§­NKm]=/¿ò Á`×ß|‹ý‰‹=á&“PT•Ógβã•? ÑÈì|uUÕÕôõ÷óÔ3Ï200À‹/¿LCCcìv¤©É)D£Qž|æYjjkùýÓOŽD8tøGŽ¥¡±wì$RU]ÃSÏ{Ž`0ĪËØýùªêúP…ü¼\›šx{ï>Ö®YÍþC‡X´pz½ž`(/3‰’’L$¥rìj¹¦¶–¹sŠX²x1í´µ·3<šš›®Ÿo|ÝÄnUUãƒå‚Á ÿþË_±vÕ*V޵ì'¾öÚî EQPTy¬aâããùÞ߫̉u¸váøUétDŽϦh4Š,ËH’„2ÖSe08rôGçßý v;ZÑÚfÀÄsÍø91‡Ñéôh4ò¤mTU%‰€ªNJÄ …PUÐëuH’4åvíßA @£Ñ`0PU•h4ßV–ežzö9"‘<ô f³Y~÷ýÇÏï×Öü3@ì<{m™²,Oy½ðéó¾Ùù¦Ë·.IRüKÕëõ|÷›ß˜öÊnº×ʲ<íjAó½¿W™ëðAû°Û Ÿ=O0²,ÇY–0èõØDÐfÌÄsÍø9Q£ÑL:n'n#IúifŸ\›ïÚsص㷻Ʒ½v–”F–Ñ S²N<¿O÷>ÏëÓͼºöõ§×GNËûAÓHÎt™Âì³xáBŠ EЄiܱuËLWA˜a9ð §•ÍfÃ&F ´’\®™®‚0ÃÄZý‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹L;ª?‰Ð×ß$I¸ãs6"É•DBBlÔ´×磻»ƒÁ@jJ EQèííÃð“’œ,VqA„O‰)? òêk»¹RY‰UX´p÷Þ³ªªj^|ùeB¡0f“‘o}ãë$:üö÷O208H à¶[oeÓÆ[9xø{÷ï'‰’ž–Ê7¿þ5vûLVás"r¥¢’‚ü<±îƒ |ttv1¯¬tÚçÅßÔì2e­þ†ÆF^ó-¾÷o³háÞxëmÒÓÒØµ{7+—/ç‹?DCcõ ¤¤¤ðæÛ{øò—¾H$¡³³‹œìlžyöyùÂCܱe3GŽ%2·¨h¦?«ð9Q[WÏÏ~þ ‚Á N§›ÍF}C#ååWˆD£È²DcS3ÍW[ðû8v±b£pÓùª«khïèÀb±`0èàâÅKtvuát:âRy9ýý8v:»º¸zõ*W[[1˜§é- 446rõêUq8h4º{z¨ª®Æçóá°Ûéîé¡¥¥…¦–Ž8Éko¼ÓáÄ•èDwÍ ×þM‰ÜŸOãkõOiñkµZ¢ÑXW½Á`ÀçóL~–.^D¢ÓÉšU«xaÇËØí ¸\‰üû/~E à+>JgWf³‰ÒâbŒF#‹.¤®®A¬‘/|bzûúèí룶¾žÒÒºººÙµûu²³2‘52<÷ÂK”•–ÐÚÖÆ}÷lgõÊ•3]ma ‡Ã<ÿÂKt÷t£Óëyçè1¼ÿ>ž{á%ôz©))¤¤$óû§ŸÁl2“‘žFjj Ͻð">Ÿ“ÉÄž}ûùþw¾Mbb⤲;»ºù—ŸþŒÒâbºººY±|‹.à÷O?C’ËEooëÖ®¦½£“³çÎSR<—ÎÎ.zzz©®©anQѤe}aòßTIñ\232fz 7ДÀŸ›“Ãwlå­½{ ‡Ãôôöâr¹ˆD#C! Ö-¤Ó騬ª"ò½ï~›ººzŽŸ8Ɇõë…ÂD"±$‘H­VKP-Ÿ€…óçSTXÈ|€’¹sùןý;«W­dÛØR¤‡Ž¼CFF:ßýÖ79pè0‡¼Ã²%K¦´ráFéì좲ºŠ?ûÑãt:ù›ÿý÷¼úÚn‚¡ òÃïÇU6› ¿ßOjj*V‹…H4Ê-ëÖ²võj~òþ™òŠJ6ܲnRÙŠÅf³ñØ¡»§‡'Ÿy6vžNLäûßýgΞãµ7Þ #=%‹òÕÇãøÉSèt:¾úØ£Ó®§¿pÁØßÔPZR<Ó»O¸Á¦~Fæ·²pÁ|Ž;N4eþ¼2Nž>Íñ“§X¿V˱')™;Ç @²Ûßççìùó¤$'‰F8á999\¾RÎm·n@„}á“"˱ e}}ýøsèu:zz{ñx¼hu±Cz<+™×çÃh2‰Þ&á¦2 H’LwO¡P%ªàt:iko§¯¿§Ó‰F£áÁû¦†gŸ³Ù„,Ë(ªJ $`0!  ÕhˆD£ ªDÇ‹^¯Çn·ÓÐØH__?=½½X-dYF£Ñ¢ÑhÐiµøü>úúúILtâóùb™‰ó屬}ý}øüþio1ŸSîñœ:s†w¼LwO?ø9ÙÙ¤$'sèÈÞ9v³Éȃ÷ßGnNmí:r„¦¦f¶lÚÄ¢… °Ù¬¼ùöN9Ca~>Û¶n­-á£ÑhâcÇp»’˜WVÊ‘£G9uæ ‘pFæ·Þ¦¹¥…ÞÞ^î¿g;™®¶0‹XÌf´Z ¦¼â Ë–-aëæÍttv²ïÀš[Zp8ììÙ·ºúz, kV­æüÅ‹œ¿p‘Êêj²33Y¿n-/ìx™·öìãÔéÓÔ74âv%±gß~Z®^¥®¾;¶lfõª•455säØ1‡†¸ÿÞ{ðù|ôzJŠç¢7è¹|å µuuäçæ±óÕ]ï–Yß@ñܹ„ÃaÞ9vŒ¤Déé3½ …`ü¿ôü‹Ï«·m¼ w’;þdOo/^¯äd7– ÷‚¼^^¯»=!žJ7‰àñzÑj4“FƒŒ …p:Ó¦p„cü¸3 </#£#Øìœ9wއñÕ/?FrR’¨$ÌUUñx<(ªŠÍjE–e‘h4ì x<<^/‡“ÑÈOþ韙[TÄêU+Iv»ÑétŒŒŒLj÷ôôð‹_ÿ†¯åËdd¤“èt"Iáp¯×‹Þ`Àl2 âçjŸÏO8Æj±àõz'•i³YQuÒß”ðùÓÛ×˃¦ŸÇŸìvƒ{êã‹‹eò ­V;íT=»8Ù 7еÇÕjÁjïµR1äfg‹‹NaÆH’4%K¤N«%%99þ»ÓéÄét±±SII“[Ü×^¸öõõ£ÕiÉÊÊÄép¼[¶N‡cÂï×o³Ù˜¦-1íz–gEás§¤¸·Û,‹…)…ÏY–¹oûv’’Þ;mnJJ2>üð¤ÞXAø0Dà>wR’“'µªá³@’$ÊJKÞw;›ÕÊ¢… fººÂg˜h ‚ Â,"¿ ‚ Ì""ð ‚ Â,"¿ ‚ Ì""ð ‚ Â,ò¾_UUÂá0ªª‰DPe¦ë‰Äò¨ª:©¾£@ þX4Åëõâñz'm  (Ê”2A>ËE‰/Ð#×zßÀßÖÞί~ó[FFFxêÙç¸\~åc½a(¦åj뇾€¿ø×ÑÙÉ¿üô§üøý-Ý==@,]åK;wòw?ùþöï¹ P…·÷îãÿãÿáoÿþ'ìzýuÂáØº×ªªòÂŽ—ùóÿüW ßô/|4Š¢ÐÚÚ6éâN„wUUWóÄïŸ$4–XíãêìêbxxäºÏ{<^ÚÚ;fúc Дyüáp˜ŽÎN‚Á )))ƒ!Ú;:ˆD¢tuwãñxâÛ*ŠÂÐÐ0`THNv£Õj …Bôöõ¡Õhp»ÝC!FÆ–ðmïè`ÇÎ?ð•G¿DQa!Z­†®înTU%5%eÊjS½}};~FÃ]Ûîˆ'[ÑëõÌ+-ã­={ c÷ÉÓg¸r¥’o|õ«ÔÔÖðü‹/‘•EiI1sŠ 执ŸañÂ…dgeQU]þý„Cá™þ.„¨³³‹Ÿýâ—lݼ‰%‹ã°Ûé ¿¿ŸD§«ÕÊÈè(Á`‹ÙBb¢s¦«,Ì2Š¢000@(F§Õ‘`£³« FCzZ†ááaúú°Ù¬¸“’bçÞŽN4ÚØ6Šª288k¨¨`µZ±Ûðù|„BaÌfÓ¤í5 >Ÿ¶öv®TTÒÖÞŽ2MOæxïg(Âá°c³ÙPU•þü~?.— “ÑH?áH„`0Ès/¾Dnv6›nÛˆ;)iRÒ«h4ÊÑãÇ9vâ$ßúÚWq&:‰D"¸‰D" `µZõ Ñê´¸“’e™¡¡azûúp¹ItŠ¿Ó›eJàïéí套wâñz1 lÙ´ YÖ€²$MJ¯ëóûùןþ½^Çëeéâ%ܱu3;^ÞI{g'ÑH„U+W`±XxöùÈÌÈÄçóQ]SÍÎW_åKK—Ë©¨¬ÂíNbëæÛ™STÄÖú?pðW*+IOKãö'­Ä–är±zÕJŽ=¯RUu5K—,fNQ!ÙYY¼sìW¯¶²tÉb._¹‚Ñ`Äd4á÷ûÙµ{7ëÖ¬¦¦¶‘>ð³£²ªŠŠÊJÂáf³™Dg"Ï¿Ës¾pÁìv;/îØA²ÛÏïç±/>BI±H5*Ü<^ŸøçÁh0RZZB4¥¹¥…H$Âúuk)+)å—¿ù :ŽÌŒ î¿g;o¼õ6µuõD¢Ö¯[G~^.ÿðOÿLZj*:­VË~ð=v¿ñ&¡PƒÑ@mmlû[Ö®eåŠåüîÉ'fppƒA?íiíí½û8yê4V«V÷¿þuš[Zx{ï>´ÚXΕûîÙοÿâ—ÇÖí¿t¹œÆÆ&Ì3woÛ6)µo(âôÙ³\./ç»_cÙ’%8t˜?ûÑÓÖÞÎëo¾Å=wÝÉ/ÿ IIIŒ pç¶;˜STÈ“O?€¢ª|í±GIKK›é¯nV˜ÒÕïJLdýºu”ÌK]]=­ímȲ?€&f7U¢Q|wßu'ßùæ79sîû ¾¡‘ï|ó<üЃì?xˆ¶ö’““ùþ}‡G¿ôsŠæð½o‹ü¼¼XÏ€VËâE‹HMI‰—ÝÒÒÂŽWþ@²Û̓÷ÝKNNö”Ê+ÑñÛ±JM¼ ÑÈhdEmsõj+Ï¿¸ƒÍ·ß†Ë•ÈÞaá‚ù‚††‡ãke ŸnË–.¡¤¸˜¯<ö(Ë–,aß”•–ðçò#n¿m#¡P¬%óƒïý ,à­={‰ˆûÂM¤* Š¢pß=ÛY¹b9‡¼ƒÃá@UU<Œ×çe``´ÔT–-YÌÀà ûÀá´msˆ`0„^oà+=ÊW¿ü(½½½\º\Num-n·›ýÅ·?xø0••Utuvó£ïŸï¿÷º‰vFFG)(ÈçOôC¬ oîÙÛ{ö°á–uüñ¾ÇãáØ‰“¨ªÊ=wÝÅŸþð,Z¸€íwßÅ[·N ú&“‰õëÖ²pÁ|¾óÍo²lÉ$$._.çâ¥Ëdgf¢ËÎúÕÇåÞíw³gß>öî?@CciiiÔÖÕQ^Q9Ó_Û¬1%ð_º\Îî7ÞD«Õ¢ÓéˆF¢D#QBá0Š¢ …â÷çUˆgås:È’D(B’%ô:]<¯ªª˜M&ì cëK«(ªŠ,Ë<üàƒ¬\±œ—vîäÄ©SñzÌ™3‡?ûÑñú|üÛüœã'OMªg4% F ƒ(ŠB^n.UÕÕŒŽz¨®©%‰™‘ÁÕÖV~ñøãÏ)bíªÕø.—_¡pv¼LMm;^ÞÉÀààL ÓéeU‰]äƒAdYF§ÓÅOJƒ{B 6B׌„M%–HÊnO@¯Ó!É6‹…åK—pç¶­d¤§ó½ï|‹P(įûÝÝ=H²ŒÍbeùÒ%ñÛšƒž„„RSR())æù—v ÓéÈËÍxwû;î ¢ª*²,Å*D…`0ÿ‰D¤X°¶'$`6›cçϨ‚N¯C§Õ¢ÑhP%^‹Å‚N«EQb #eš2õz}ìïQU1 ,]²˜½PQYÉÒ%‹‘% N‡ÍfÃápÄÎÛ F£‡ÝÎ÷ÞKñÜ93ýµÍSºú£J×KWww,šÃÇëa÷obµZxý·ÈÍÉ%/7Y’æÅ/#Isç±eóíô òó_?>Ö­µ›ÍJ{GŠ¢àt8p8<ñÔÓÜ·};UUtuw£‘5èõúx=ŒË—.eáüù\©¬Äëõ¡(J¼»ÿÂ¥K¼öú446òÛß?É~ˆukVS]SÃOþéŸl¸åœÿø/ÿÊ…K—0 üâ×óŇâOÿø‡„Ãazzzyüw¿ã¡÷˜># y¹9¼´s'’ëoYÇ /í åêU.X¨TTVòó_=NWw÷ÜuWü"Tni,ЩÄrG¬Z±‚æ–«øü~ìv­mmì;x¯×‹A¯'3#cÒ6»#~1‹ª"I+–-å7ßbÓÆ[ÉÏËcåŠåï–™`gÁüy~çþï¿ÿáp­VKKK ¯î~%ª ª Ë—-#‰rêìiFG=ôöõò¯~…æ–«¼½w?ï;ŽN§gõÊ•ÔÔÖÆ»xçqàÐ!Ì&3ùy¹ìØù Š¢¢¨ +–-£¨°€@0Àïž|ŠÇ¾ôE/Zc•EvVm´µwðÄ“O144Ì-kÖPVVJ[G;õ 8‘Të&’žñyõ¶·áNŠåá ‡Ã446 ‡qØ$¹éîéAQv;äåæaµZáÇów¬[»š¢‚B ò1™Løü~:;»Ðé´d¤§ðz}¸Ý±A!ýý  ’š’ÂÐÐ0Ý]8ìrs²?ð z`ppì*YBUÒRSq8ŒŽŽÒÒÚŠÅl&++ Y’hkoÇç󣪱 ‡ììlLF#‘H”ÞÞ^Üî$‘Âõ3dÔã¡«»wRö„ÚÛ;èíë#--•êšv¿ù÷߳̌ ²23ÅIE¸©¢Ñ(=½½$: üW¯^% ‘‘ž†Ùl¦©¹¿?@Vf&ÉÉn-cÛ¤§§a³Ù ÙíF£Ñ‰Dèêê&1щÙlžTfzzI.###´´¶ÆRôÚíX,ÚÚÚU…ÄD'oíÙKgg'·ßvÙYY¤¤$£( ]]Ýøü>RRR°˜Ít÷ôÄëiooÇf³a6™h½¦Ìd·›îž™üÍßÿ„åK—r÷Ûhhlä_~ú3îÛ~7ÙYYä忢Óéèë룽³“ÑHvVƱó²pcôöõràà©-~NGñܹ“ËËÍÿìr½›22Ö¥aÁ¼yÄ7›LäçÅ·X,X,– e$âr%±‘ª™™ú$:Ó¶Ðm6óJK'=–•uÝr´Z ii©7|‡ Ÿ,›ÕŠÍjÿž™™?ŽªªkHt:XµbÅ”û‘‚p3h4ÒRß=¯˜ŒFæÎ™Ü•]Z29Ÿqšm&–¡Õj'+§+3!!ùee“+)ž|>WU•ŒŒt–/[L–eÒÓ'¬›øÞFƒ‚üüë–yíöÍ--„Ba–-]O“ÉIJ¥KqØíñí’’’HJJº‰ßŒ3-¯Á`à¶·âp8fúsB\NN6’,¦iÂt.˜tƒ§1…ñ٠ãAÝét²éÖ[1L¸+Ìœ)]ý‚ ‚ðq(Š‚$I“æû 3ïº]ý‚ ‚ðqˆ15ŸnâÛA„YD~AA˜EDàA„YD~AA˜EDàA„Yä}Ww7Ͻø£xí5ªkj?ÖF¢Q†††ãëý¡Pˆã'N288Èððp,m%páâ%Nž:ý±êçóùðx¼×}>ðÂK;hmk›òœªªœ>s†þ·ŸòËÇC[{û‡~ÿ“§O³ïÀIeMøŒ‚Ø'ÂçÓ97ŽŽŽfºªÂgÜ”À¯( ‡ÁÁ!"‘‡Ëåå„‚!*«ªéíë›´}8Æï÷ã÷û㩪Šßï'Äéø|>šššø_ýŠÎ®."‘XR ¯×‹Çã™tÀ‡Ã‘xFµHäÝŸÃá0¡Pˆá‘úúøåo~KUu ¡PˆêšΜ;OwOïÔà­(ÊX.ëдå†ÃaÞÞ»¯¾ŠÏç›’ØÅëõÒÑÙÉÙóçFUUFGGñ޽×àà /í|…d·›Ô”"‘¡P×Ëàà`<ûŸ¢( Oú‡ÃôõõSU]M}CCüñ¡áa~ùøo¨ª®!  †âõ Õ?‰&ÕùÚºÞ‘‘‘Ïü‰câ>ÿ.C¡ƒƒCØñ áóùÄÅ0c>Þ¹qj6ÉP8̳/¼È‘£Ç>óÃÂÌš2¿«»›§ž}ŽÑÑQ²33Y½jelÙS 4²kÆ÷I{{|á!òssyþ¥ŒŒŽ°lÉbÒRSÙõúèt: z=_|ø ñõÃáfø¸çƯ>öè”åxkjkÙà «ÇýÛïKR É”¿Ãá`óm·±rùrΜ;GsËÕI‹1L\‡)‰pµ­uk×p÷¶m¼µg/GŽãcǹÿÞ{¹eÝZv¾ú*Í-WQ…ǾôE¸ï^ òùÚW¾LVV&gÏŸG«Ó²aý-¸Ýï®Ùœ“MMm-•UUTVUs¹ü W®TÐØÔDzz­­­ÏÜ¢"~è-\ªÊ¢ øá÷þˆP(4©å|âä)šZZøÊc_";;‹—v¾BGg'ƒƒ¨ªJGgV‹…K—±jå zàþx>k¿ßÏî×ßdÅòå|ÿ»ß!;;›îž^^}í522ÒÑh4¼º{7¥ÅÅðà}÷aµZ¤¯¿ŸM7r÷Û8}æ,W*+Ùwð sçÌ¡§§‡‡qêÌY††‡ùãï·®Ÿô},Z¸9EE|áÁXµrnwÇNœ ­½Ææ&R’“iim¥¨¨/=ò0gÏ_à£GÙµ{w¼n»^žÞ.].§dî\V,_†î3œh|Ÿ<üЃ,Y´7÷ìÁá°óÇßû#nY·Ž‘ÑÑø…›Ýng÷oÆ{[áføXçÆ/?Fî„ü(ã óó™7¯Œ;¶laó¦ÛÄ"9ÂG6åÈijjâõ·Þ¢«»EU …ƺ–ÕX7•Ê»Ýß*±õú3ÒÓ™7¯ I‚Ö¶6L&#y¹9äçå …$&&’•E²Û^§Ç•˜ˆÅlæ±/>BVf&Ͻð••Uñ²ÓÒÒHr%±k÷ëä“™‘ή×_'+3“w2Kþc0p:œc­W »=§ÓÝn'z·›w`p—ËEVf&¹99ŒŒŒFcKKŽ}^‡ÅbÆd2OJ …õxÈÈHÇž€^¯ÃëõâõúÅ•˜ÈÒÅ‹0 èõzlÇ. ÉÉn’ÝÉh´ ƒ RXPÀœÂBúûûq:±¬[&ó¤‹+³ÅŒ^¯Çépb1›Y¾t í¼ñÖr³³IIIA–eRSR(ž3»=«­mx}ïÖmÉ¢EädgóͯÆæfžq#££3}ì}dïîF£‘¾þ~ÒÓRq¹\$Øl€„Ãa'';›¹sŠèëï_¸©>Ö¹ÑåšvM{£ÑˆÉh"ÁfÃf³‰åp…lš®þ†††(,(@«Ñb6›dÿ¡ƒh4öî?@^n.ééH’Äèè(ûDQR’Sؼé6žzæ9ÿÝøü~æÏ›GJ²›Ö¶6¢Ñ(V«­VËs/¼ÈÖÍ·SߨˆV«%‰008¯‡^§cÁüyüìç¿àÿùËÿÌÈÈ?ûù/øoõ—èô:TUE¯Ó‘äJä»v¡ÑÈÄÒD¾{‘2Ѳ¥Kxâ©§yüwOÐÙÕÅúuk‘$‰·öìA7–·5vÁqôÄ v¿ñ[n¿½^Ífc~Y)/½¼“‚|:»ºHKMeþ¼2E!Ñé$-- I’PUE¥«„±‹¥± &EQ),È'/7I’Hr¹HINÆåJäñß=Á“O?CUM-¹9Ù“öC’+‘WvíTŠçÎÅ•èä­={ø_ýÿ¢‘eÂá0ÇNœ¤µµp(̦·2::¯[Fz]]457cOHàêÕVBÁÐL{ÙÄï]–%–-YÂ[{ö288DaaªªRßÐÈ+»^ãry9kW¯þÀéžá“ðqÏ÷n¿›¦æfªªke½^Ϧ·’‘žÆ¡#G°Ù¬¬YµJ´ú…DóÐúq^^s,mnjJ2V«½NǺ5k˜WVJVV&v[Ë—-Ål2““•Ùl" qøÈ\.y¹¹lÛº…Ô”JŠç¢Ói)Ì/`ã­p¹\äfg“ära1›ÉÏËÅb1“™™ *x¼–-]Âê•+ÑO¸Òu'%1^e¥¥¤§¥2þ<æ—•a0HOK'77—â¹s°Z,¤¥¥‘•™E^n‰ÎX~èÜìl,3Kã[TX€F#³dÑBV._NFzZümíšÕÌ-šC^n)ÉÉ8NRSc­iI’(,(Àb6£×éYµr%%%Åñô—²,‘•™‰+)‰Ìôt²²²ÈÊÌ /7—‚²22°ÙlädeQXÏÜ9E„B!ŒF#Y™ädg“›“M(¢¤¸˜%‹áËx¨Õj)ÈËÃj±’žž†ÝnÇëõÒÓ×ÇÃ>€V«åè±ãh4²23Ù¶u 9ÙÙÌ™S¯[ff&‡ƒááa z=wÞ±…쬬Ïl‹aâ>IKK¥¬¤„dwÁ`ˆÔÔT<Õ55ädg±bÙ2V®X.î… 7ÕÇ:7šÍdfd ( ŒÓáÀét™‘Añܹ8v’Ýn\.×göoX˜>Ÿ¦æ¦—oxd„¿ýûŸðÝo‹Â ¹š…GQ~óÄïqØí|áÁˆF£üïü?¬[»†[o¹e¦«÷©pððNœ:ÅùO!¾0#ĹQø4ÏÎ÷±ú‰tZ-óÊÊ0|n¼`(„F£aÙÒ%@¬K±xÎ\‰‰3]µO wRsŠŠP?~Q‚ð‘ˆs£ðiö±ZüÂͧ( áp½^/ºùA„l¼ÅÿÙÓ5KɲŸf(‚ –*‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆ IÒL×CA„h<ÖkQ¡«» ŸÏ7ÓuAfUUoH¹±7ê=>J}TT˜ùê0ê´î$7z¿ß?ÓuA>ÇTTF=£x½^EùDË–$ “É„ÅdapxP(8ßVÂl6c³ØñŒ g4øK’„ÙdÆ•èBk6›Iv'*®ŽA„Ï'I’ðù}èt:ÊJÊÐÈšO´|UUéë»“Ìô \.ò ÞÆŽF£t÷öàñx)*(ž`Ÿ±ºLÜ?åýåhUUeüŸ ‚ Ü(¡`­F‹V£½!-~ƒÁÀèȹyè´Úk«ÅJGG'f“yÆcìøþ hg´&‚ ¬¢ª*Š¢ÜÀ¯ªj¬7}ìç™&I±ÛãŸyfëòî>_A¸9Æ¡¢(D£ÑO´hY–QUI’ø4ÍS“PeRà ñýƒ$¿ ‚p© (Ê” (I’$MÛ2ŽŽŸðškéx™× úÓÞŒ%$T&¿÷µõ¹Þ+‘˜¶Å/Ëï.£ó^·Û?ø{½·‰û\~Aá¦oñO „’$108ˆÏç#%%ìv;Fƒ!^†ªª±þõkD£Q|~f“&6¨0 1›Ì“‚ðµB¡ªª¢ÕÆÂ¥,Ëx}>EÁl2ÅË{ÏÏ¿ßÇñý¬* ‰¿ ‚pÀ‰­ÛÞ¾>Ú;:±'$PU]MZj*¡Pˆ+••\½ÚJ]}=¹99x¼^.\¸H{g'](Š:éâáúÝá*­†®î.RÜÉ„#aúúûǦª††‡e§Ã‰V«ehhˆá‘úû±š-èõz‘­íí(J£ÞÈèè(Z­I’Äj±¢Óéâï:~) **ФÄ?4!#=o~ýk öì?Àv½Fú}—®®.šš[ÈÎÊdîœ9D"dYFQÚÚ;¨®©&љȼ²RN9ÃŽW^¥«»›Õ«Vb±X¸xé2Á`ùee¸\‰ñºLÜ?¢Å/‚ Ü4[ûãÁ¨¶¶w’‹Ösñr9¡`ˆS§Ï°gß~ôz=ѱÁ€o¾½‡³.`0ˆ*Ñ©e)êuÞì¶ì v®¶µÒÖÞŽ;) “ÉD ¤¶¡Žá‘zúúhjifph†æ&TUë—dppUQ¤Ø@¹«mm ã÷ûh¹zuú‹êä–w쟊,Kh4Œ+–-ehhˆS§Ï°óÕ] Œ°óÕ]ÔÕ×Ç[÷}}}<ÿâ‹ôõõ³ïÀANž>C0" âñxƒ¼ùÖÛ\¸x‘æ–^Úù ~¿ʾÑâAn‰X·÷ÄQý‘H„ÓgÏÑÕÝ…? ¾¡‘Ææf.•—³lÉb6nØ@k[###TÕÔðà}÷’™‘AEe%Ñh4ÔdYŽweOûÞ²DfF•ÕÕ˜ŒF²2³ðxêA‰*æ …¸RYA(Âfµ’—“‡$ÉCAT@¯×£Õê•쬬±žƒ>LF‹£Ñ8í{_;ª_Qbª¢ ¨*@¨©­¥½½ƒ›žÞ^::»¿1ߨÜL}C#&“‰Á®¶¶rËÚ5def°më$IâÜ…‹˜Í&üþ½}}x}±“TU÷ˆQý‚ ÂÍ#1iT¿$ItvuÑÛßÇú[Öa³Úðx<\©¨ÀjµÒrµ•ή.†GFHMIÁ`0ÐÐØ„^¯Ççó¡ª“Ç ¨ÊõFõ«¨ŠŠÉh¢¬¤F«Šª¢×ë‰D£ŒŒŽ Ñj5˜L&<^¿7ôUÆGÞ«j|n¾Û•Dum ÃÃÃäçO?K@EUÔñÑù ŠªàõùhïèD–e:D^nô °|Ù2Ö¬^EzZº =5§ÓÉ‚ùóY·v .g"‘h„`0DËÕ«¤§¥a·'‘žÎ‚ùóÐh4˜M¦ø¸‚‰-~Í·¾õ­'%%Íôá ‚ |ŽI’D0$ cÐâ­à†ÆF$$îÞv9ÙY˜MfÚ;:X»zUÕÕ\*¿BÀ`þü2æÎ™ÃÉSg¨«¯$.˜O‚Íh‘h„áÑR’“ã£í%I"p%º0èt:¢Š‚×ë%%9­FKwo~¿ŸÌŒL’\.F=º{{…B$Ølhµ:´:-Vƒ=ÁŽV«¥pp(D~nÞ”ÁÁPA‰“¦ìy½^.^¾LcSõõ $%%±m˲33èî饢ªŠA²33Ñôœ=wžììl\.'—/_¡³« w’‹ô´4‡¸RQINN¹9Ù”WTÒÔÔ @NvV|þ>ÄzWº»»‘Ž?®*V9A>Ÿ$Ibdt¿ßÍj»î´ñ‘üã]Ó¡P^<6Z=FÑétSm(¢­£•ùeóÐëõñçÔ±Vº,MÖ6þ>›ò7qD¼ªªñuÓM÷ïÚú:ô:=y¹¹SÖ¡¶¾Žüœ©½ã½’»×?ñù@ €¬Ñ ›B …Ðéth5š±Û±žŠñ:D£Ñx=#‘¡p½N7©Þ±  åå墫_A¸yUyÏø“îƒC<€«ª:)ÀMÜvbÙÓÍã­æ7õñ‰ñÚùø’$M¡?`0ˆ×ç%-/õ}?óxWÿtïíEÐÄÏ  «Gì‚Gnüùñ‹†ñ‹Ã5¯ï[EÓùA„›GBŠMm»AkõǯÝ<²,““•ƒÅbyÏ^s%:³ëôP)¿ ‚pÓ¼ÿœûW6ÒÍ ý:Wbâ{~–ñ™ Ÿ† b­~Aá¦Òê´ñ{çÒ БH›Õ†×çE«ÕÞ÷¸Öõ‚~4g°ÙƒèuúYò'/‰b0DàAnAáób¦oìOW¥™¿çpm…DàA„FŠÿçSCtõ ‚ Ÿ Ó…×ñłƗäO|í½×ŠD"ñ5ô'½‡4žeïƒwÛO×Fã£ü5Í':.á½n+ˆ|A„Ïi‚tOo£E…´wv ª*¹Ù9“¶¸î}$¡¶¾ŽÌô ìvû¤í|>Šªb°Lï{] HHSÆñK’DSK3½}}dI&7'{‚}Ò…Æxêâk×䟲 Rüª'  HHH˜RŸñW‰À/‚ |nE"QÂáð„ß#(ŠB0$ ‰F1 ±TÁ¯Ï‡ÇëAQc©{}?z³ÉDKëUÂá0¹99X-VÂá0¯½N‡Åb™:r_bÚ|‘H„ä$7Y™™\mk¥½³{‚ŸßßçÃd2a4ñú| 4 ^Ÿ½NO8Áïóa4™0›L‚Bá0Šephˆþþ~òóòI°Ù¦ölˆ$=‚ ÂçÚ4Ýì’$ÑÑÙI_Fƒ‘H4BQA!CCÃôöõb4…B Bo>Ÿ¯ÏKr’›ÑÑQ‚¡ }ýýè´:››…ÃdedäJúÀ·Á£Á`“É„×磡±NG8&/7—¶övì v’\.jëëHMN¡·¯­VK8¦ ¿€žžzû{±Z¬ø~F½zz{0›LS¿Õ/‚ |®MˆÁ[ãJ4ŠÃî ´¸“ÑD{G½}½dgeQ˜_ˆÅbÀépƲï)*`—ËErR2ù¹yx}^Ðh´ƒAú¦­ÂtcTUedt”úÆz‚¡ Y™ôôãñzÐh´Œz¦ °:ÀÏïÃï÷ãõzcùê%)6·}|®½û8!¢* ¡Pˆ¦æ&TEÅ`4 ª*²$‰FˆD"¨€V«Åj1““MjJê4­}麽éii”Ì-ü’$¡×é±Ù¬äçã°Ûq:œD"aZZ¯âJt¡ÕjÑëtïnãpÆê¥Ñ Ñhe Š[xJ]¤Ø˜øA„χk¬ªª$:±YmÔÔÕRU[F£ÁäFUUº{º©¬©"“™–Ajj*íííÔ5ÔÇFõkcÁtÔ3J8A§Õb·'àóûh¹Ú‚ÍbÅépÒ?0ÀÐÐÑèÔµø¥ëLçÓjµÈ²Œ=ÁN²ÛM{G;»£ÑH_<‘‘^¯`¨’èt’ära˜°ª(h4Z4²Œ:6èI¢¡©1v»bš$?~\-..þÔ¬t$‚ –¢(tõt‘“•…,ËSž …B¨ªŠ^¯G«ÕRߨ@0$#=“É„^§CUUÁѨ‚V«A¯Ó‰Dƒèt:tZ-&P C,ýn €$Ñ`œtO]’$êê(*(œgc‰„$´Z-Š¢‡ÑëõD¢ £Á€,ËD£Q¢Ñ(z½>þÚ@ðÝmEˆO …B(Š‚Á`˜°z ÄðȧOŸƒûA„χë-“#Ë2&£&ÎoËœç°Û'M—3M“¦ÐéõúؽrU˜xï\£Ñ`³ZÇŠü`Óùt:ݤú—©ÓêÐÛô“ÞO3Ö?ñµzý»Û\{¡3~p½$¿ ‚ðùðKöªË•K,@'%%Ó/tsícï×#þžÏK }ÈõÒÿQzé%Ä>‚ ÂçÍ\×aw-€Þ¨:ݬzˆÀ/‚ |æI’„FÖ 1›Íêu7J(B–äøÏïÙƒ©ªB0B§Ó‰À/‚ |öI’DBBýƒ  ÍtuP•„;ÐÝÓ‹,Ï\Ó?–¯@‹Íj_Aø|0M ÆOÍ,µ‰ëX,Ö¯—,Ëôt÷ˆÀ/‚ |>\›4çÓ`b°ÿ´ÔK,à#‚ ³ˆü‚ ‚0‹ˆÀ/‚ ³ˆü‚ ‚0‹¼çà>I’¥Xf!U%¾ðÍ$Ërl1&U½i£"cïûî@Œh4zý}$Ë(Šò¡ë6qYHAA¸Þ3ð{}>ñx½¤¥¦‘™‘>i½àë‰MaˆÍaü8Eájk+XmVòrr°Z,H²Œª*\/fŽâJUUšš[b™P1 äääÄR9^£¿€žÞÜn7®ÄÄü¡PˆP(„ÅbåS2ÐSA˜®øEaç^¥­½W¢“ú†Fºÿ>ôz}¼u+¥„ÉI:::iimeÕŠåSžÈñíU5¶¾òX²‰Ï_.¿Â+»v‘‘žŽ?À°y3ùyœ*Í·¾õ­DzM¦ÕjQU…wŽ£¡© ›Õ†Óéà·÷022BzZO?÷é¼½wmí$&:±Ùh¹z•¶ö òIv»yiç+AZÛÛèêîÆé°ó›ßÿž¬Œ Ž8ÁÀÀ z½žcÇO°dñ" ªªb±X¨¨¬âì¹óD"aR’“éïàô¹s¤¦$“——G8¦³³‹®îο€Ùl¦¾¡‘Üœ²23xí71™Œ8ìv~ÿô3defðÂŽ¨ªŠÙl"5%…šÚ:‡†˜STüû¤¼¢‚+W*ééëÅnOà·Oüž´´jëêèéíÅfµQ]SKYI ¡p˜×Þx‹ÅLyù†‡GhhlâÄ©S$''ÓÖÖÆésçHIIÆfµÑÛ×ǹóéëïçü… ¤§¦²wÿrss8yú $Øl¼µg/ÅsçärÍô±"‚ |†I’D__ß{êß¼i?ø£ï’žšÊoŸ|’††&–/]BUu åW*0ôä哟—G(bdd‡ÃNiI1y¹9ܹu+Á@ÊÊ*úúû¤µµhT!ÉåâöÛn£° ‚‚|6®_O   ±îùœìlþäßç¶[7püäiv¼ò òóÈÊÈà¶[70·¨‹ÙL$ÁïóÑÕÕMNvY™lÛ²…ô´´ø‡„g0(,Èg`pp8‚V«åöÛ6²më–x7» Œn] |áAÖ¯[‹„DR’‹Í›6±|ÙRÉÍÉ!-=•[7¬§³«‹Ô”yè!6mÜÈ…K—ÌŸ7;·n¡¥µË–qïÝw³dñ¢Øí)V·²’î¼c+II.Z[Û¨¬ªbóí›Ø´ñVÜî$DC_Aø¤\·«?söüLF#ÙYYh5Z¼^/e¥%ìÙ·Ÿ»v±eÓ& =¥%Ť$'óâË/c6™ÈÌÌ`tt”¦æ z=N§“Ò’b²23±Z-(c÷²UU±¯»k>–3yL}c#½½}$%¹HIv3êñ€$¡¢Òrµ•äädö8À¨ÇÃüyóèèìD–dB¡MÍÍ Ë2ÝÝ=$:x¼^TÖ¬ZE[{;/¼ô2i©©¸\‰„à òãÝ骢"K2UU‰DÂ(J¬7 VeEUˆFTEÁírQ[WG}Cu õ¸\.´Z-Œ…HH°ÑÐØHiI1&£1~?¼‡aü}u:&£‘+h5Z€ü'‚ |b¦íê—$ ¿ßÏþƒ9~ò$MMM,_¾”U+V`6›ééíáÒårûâ#èôz>¹óç±X,¬]½ŠÌÌL®¶¶ÒÜÒÂüyóp:\¸x‘–ÖVl¸“’èëïg^Yýýý±ÁsÉÉtuw3¿¬ £Ñ@eeoïÝKEE‹…íw݉+1‘h4Ê…‹—HLt’ètRS[ËÐЮÄD–/[J(¢¼¢‚Üœlœ''OŸæj[f“‰9EE9vŒêšZÒRSY½j%—.—ÓÕÝMÉܹñ\SWKuMU5Õ´·wžž†Ïçc^i)^ŸH$JnN6ý±Ï‘‘žÎÐð0gΞîÚvÁ`³ÙLA~>II.®TTröüyEÅž`'‰àLt’`³‘“M[{;ùùÏéÓg©¨ª¤½½ƒÕ«W}¨‚ ‚p­ñ®~éøñãjqqñ´ÇE! Æ»ÈÇ»Ì÷ìÛGCcßþÆ×Ñh4„Ã?ƒ!žoXQEA£Õ K2`h4ŠA¯|Ÿv7^îµ#ôUU%‰F1 h4šx=#‘²,#Ë2>ŸY–ÑO(;‰¢Õj$ ¯Ï‡,IñçCá0¡`“É„V«:Ó€Øhÿñ¹$IccÞÉ0þøøcã?‡Ãa4 &>÷üùH$B ÀpÍg Y–âûb¼œöŽ~÷äÓ|ÿ;ß&##] îA>2I’¨®®~ïyü²,c2™â¿«ªJ(¢ªº†•Ë—£×éˆ* :Î6åµãTUÕ)sàÇÇ™l'þ<¾^¯G?áýÇiµïVÝl6OyN÷îó–kž7èõ“êsíûñà=]'¦ZÿÿÄ®úñ߯½ˆÑh4X,–)åM¬‡$ITU×pîÂyzûú)*ˆõˆ /‚ |>RZÞÍ›n#;+‹è ¬ä÷y§ª*ii©,Š.D–err²ã³AáãúÐ_§ÓQR\ ‚Ñ â°ÛIt:±x ‚ðÉúH-~ˆn¬ñ•ÿAá“ü’˜3&‚ Ÿ{Úª««gº‚ ‚ Ü`üÿ0žËø–¾ ¦%tEXtdate:create2013-08-30T12:28:19-04:00¯Û(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshotï¿>IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/ports_outbound.txt000066400000000000000000000005321330160122500246170ustar00rootroot00000000000000This screen shows the network ports to which processes running with the '%(APP)s' type is allowed to connect. SELinux controls the network ports that a applications are allowed to connect, based on SELinux Port types. This screen allows you to modify the port number/port type definitions, which the '%(APP)s' is currently allowed to connect. selinux-python-2.8/sepolicy/sepolicy/help/start.png000066400000000000000000000334601330160122500226410ustar00rootroot00000000000000‰PNG  IHDRþšî !igAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“6+IDATxÚíÝypçïûow¿»ÞWû. vfÇÆà%ÞÇv'“q'™åœ™ÜšsofÎÉLš[÷VÝ;Ugî9S3gN&gLâıãðÛ€m6f;bhßõnÝÏýã•d ãÇýûTQ é}»û•xõí~z¹þX—{mm­¸n¶8ÐÄÁƒ‡Èd2ýºEDD|鲇¿££-L&ÙÝÝsc2™ÌÚ¶ƒ1f¢_·ˆˆˆ/.÷ Âá---¥Ž,Ÿ9s±X ˺ìë"""r—=üÿãü#wÝuÓˆD¢c´Å/""2A.{ø·nÝÊ­·ÞJ Äó¼‰~½"""¾vÙÃoŒÁó;7 E_DDdâ]ö-~Û¶µÅ/ò1=fä}táÙ1ƘѶ Ÿûûzï]lžö¸±Ëù»ÌÿÂçÌ[¿GD>ž+2Ô(ü"¿˲p]ÁA²Ù,ÁPX$‚1†¾ÁÑ÷”m[$òòJ ˆ„Ãd³Y‡’ÄbQÎÇ¿†F_ÿ™lË‚P0H,½hØû ,Ë"N“‹a[—2w˲H¥Ó  ‘‹ 1Æä¾®Kº+~ùhRé4¯m~‡ oma0™¤²¬”?ùâÃô òßûÑðûÊ¢ ?Î_|íËüû¯žcîÌî^³ œj9Ç/Ö>Ï—ú4“««0žcŽ»±m Ï{åÁ°,ð¼ÜèxÃï]×óøÞ㿤éè1‚¥ÅEÜ{ÛÏŸ‡cÛ¹÷º1 ¥Rüô™µÔMª¡¤¨[·óÇ_|˜x,†mä‡ežé3²R`ŒÁ¶,¶íÞÃOžz–ûï¼ûn]MO_ßùÉÏIe2üù—¿HYIñèïÏórË:<í‘×–ûÜûÆ}nô{`Yã–eäq#¹Þh¨_ä*eÛ6çZÛXÿêëܸtKçÑÛßO~*ÏóÈ‹E©­©æXó)±‹ç12™ ooßI4aReeÅEXŒßRíèêæ•›©®(ç…×ßä\k;Žc…¸ÿŽÛøÕ /óÐ=w’ÉfYûÊîZs/¼¾‘•‹òîÞý,œ3‹ªò²1[Ñ6ÇšO‚1´¶w2kZ=`ý¯_Ç äêŽ[s[Ì4Ÿ>Ãk›ßaöôi¼ºùmvïo"RQZ‘ÍÜsëjæÏžÉŸø+-äöҒܼ<êŠr  žzáe:ºº™7³Ád€­»ö°cÏ>úúûYº ‘d*Í»{ö‘ŸŸ``p¯>üͧώ>fùÂL®©äÙ—^Ãvlºº{¸yÙJŠ ØðÖVæÌ˜Æ-+–ñÌK¯0¹º’šª ª#e££"×Î'r•2ÆPTPÀøÒØÛt˜w÷îgóö|ñO  'à pÆì¿·°rCçVn™Lc<\×eþì¬\|ýô šÏœóp]—†ú:zúúùùsëY8w6·¬\>ºµ1€Áu=,Ëæ7¯dþ¬™übíóTU”óùOÝÃÏž]Çëoo~÷†ç{¦å;÷îç¡{îdÞ̱êF¾ÿ‹'™3}³gðÆ;Ûð\—ÉÕUtõô²ïPîû2¥¦ššª yð~¾÷ó'9xäÓëëFóÎÎÝ>ÑÌ”IÕ~ÐÁ2"—ʲ,úؼm'­ÎÍ’ùóhëì$ òï¿Z $â|ã+Ha~>ïîÝÏžƒ‡ 86ËoX@QA>ŽãÏ‹åŽö· ‘—GYqKÌãí;É‹Å(*ÈçÄ©Ó4=ΣŸ{í»÷òÆ;Ûùäíkrñ8¡@€t:ƒçyضÍí7­äÙ—_åßõ¥ÅÅÜ{Ûvî=À;;w‘J¥IÄó¨*/ãö›Wòæ;Ûxgçn–.häÖ—S[SÅö÷öòÙ{ï±m\ÏÃ2†p(D~DZÇM77 ˆ!oí]Ýì>ÐÄ'VÝH8w:ÝÈôŒ1£¯;à8£×"J >p]€±¯}ŒeYìØ³×6¿ƒëy”Ò8kC<%‘}{"ד+~¿ÞL"͇½g.öùßôþº0Öc¾ò±§áçÛã¬áóæo½q æÌúÀ°úo›÷¥¾Î–e1sj‰xÆ@Me9yÑèEÜÓï(¹Þé<~¹âŒ1”rÛËñ<ﲟ.gŒ!‰ÐP7ÈJè6áâW:_D&Œëº×õüD®F:ODDÄG.{øS©¶m¿™0—=ücoŽ!rµÐJ¨ˆøÕeÿ¼9óèëïãðÑ×}v"¿‘çyÄãqª*ªñ¥Ë^âúÚzq‡êªjŒ§_¶2A,H&“ttv@ÅD/ŒˆÈĸüCý&7Ô …ˆEc:…F&LîþòÖðUÞDDüéÊý4|ØuBD®ˆÜUà FÿEÄÇ´é#""â# ¿ˆˆˆLøaö#Wö³ÆÜƒûB–eaÛ¶®º%""ò1Mhø=Ïã@ÓAš$ ²`þ|&Oª÷˂޾>Ž;Μٳ¸Ô[ûctí°,kô†/ã>—ýúï""×¢ ê·m›ã'šyü‰'pÒ™4£¿ÈßÿcÓÞÞÁú^dh(‰mÛ㾌û·mÛìØ¹‹·ÞÙ‚£ûi_÷úûû9uúô¸ Euvuq¾µm¢MDäª4a[ü–e188H:aÞœÙÔ×Õá ßkûè±cl~ëm‚¡·®Ym[X¶e[œomeÃëoL¥X¹|93¦s¢¹™›ßÂó<æ7ÎãÙµkéêî¡£³ƒ»>ñ Ârr¹¶Ù¶MÓ¡C<öƒòÅÏ?Ìš›o¦åÜ9þù;ÿJÝ”Z¾ú¥/iåODä¶Åïy Ó§³rù2~ö‹'xì?âð‘£ôõõñäÓÏ‹ÅèííeÝó/àyÍdynÝzúúû‰F#<õÌ3´¶¶ñÌÚu±dÑ"*+*¨ª¬¤¦ºŠY3fâèj×-c ³fÌ`îìÙ|ï‡?âéçÖòÏÿò:::X}ÓMºR¤ˆÈELØoFc Ñh„‡x€Õ7¯âׯmàßœ‡?ó§OŸ!à8d³YJKKsûëm‹Á¡AŽŸ8A$¡¯¯` ÀùÖVúûûY}Ó* Àª*+I$Ì3›L&óc°m[ºÆcˆÇã|í+_Á²m¾ÿ£S;iñçά™3õó¹ˆ ê?ÑÜÌ–mÛ©®ªbhhˆx͹sçÙôö;tu÷°tñb¦ÖÕÓ|ò®ëÒÓÛK6›ephˆÁÁAÜlîsÞµpßËÊý‘•»ñN·ßz«¢/"ò[\ö¢üôÇ? dÃܹsWM™0ú¹±Ãú#ÓùÜU]ÏÃÀD"‰0¼ðÿ[.ÉPrˆ³-g™>uºFzDÄ—&ôè'cÌh|ÇFxìÛÈ/ç ÷Ñýûb[xc§7òï±Ó¸ê£`Y7l øò˘’ÜI“ðjks** Æ„Bà8`Oøàˆˆ\tØóÕ̶É.ZDø‡?$øøã b"L,†)+í­%»léÏ~¯ªj¢—VDD®ÚL¼šƒW[ËÐßþ-nCd2X}}ØçÏc9‚)*"»l¦ `¢—TDD® ÿÕÎóÈ.^Lò¯þ STôþçL~>^U&×€""rI.ûP¿eY žñrtÄõGg ÉûîÃ:p€è?ý&?·¼œðc|óM’ôG¤?ùIÜ’ð<ð÷!.¼¦¿ˆˆ]öðwuwQ^]No_/‡žè×{í²,œ»ïdÚ®„ZÎqø¯¾IÙ¦ÍT¾øyßúüê)N<ðiú—.…X,· àº.Ñht¢CDdÂ\öñá/}éK/ùËç7®²-íYøX›àþD¿ýmú¿õ-¨®&¸m‘ïŸà /àÙ©"ùõ¯ãΙ“;Ò_+0r£'?ºì[ü#çÏ;¶3z~¾üî¼Ù³I~ã8Ñ(žã]¹’¹s Þu‘Ç#öÓŸÙ´‰ä×¾Fúá‡s§ýiø_DD†]ö[—-X°À^¸pᣕ••µÚÊú=°,LYfd¸Ú‡qçÎ%³f ¦ €À®]„žgçNˆÇñjj VüEDäò‡þüù ÿ•` ¦°ìÊ•dW¬€L†àë¯Z¿ûäILu5^yyîb?Zñ-…ÿzb X^M Ù5kpgÏÆ9}šÐ+¯üõ¯±’I¼º:L~þD/©ˆˆL…ÿzd „B¸³f‘¹í6¼’œ={½ð­[1yyxÕÕjë_DÄgþë™1˜ü|²Ë–‘]µ Ëu nÜHhíZœ£Gñªªð*+5ü/"â# ÿõnä†FdW¯&ÛØˆ}î\nøÿ•W°úûñjkÇ_PDD®[ ¿_Á ^CÙÛnëªÂ9p€Ðúõ¶lpoòd ÿ‹ˆ\ç~¿1“]¼˜ìêÕܼ™àÚµ8‡á•”äöÿZ¹)ü~42ü_VF榛p-Âno'ôê«_~»»wdøß¶µ "rQøýÌðêësGÿO™BàÈB/¾HpãFp¼I“ /Oñ¹N(ü’‹z^î‚dn¹B!o¿MxíZûöaJKsÃÿÁ VDD®q ¿äŒ ÿ“¹ñF²K–`õôܰР/`·µáMžŒ)-Õð¿ˆÈ5Lá—ñŒÉ ñO™BæÖ[ñ¦OÇ>~œÐóÏܸ ð&MÂÄ㽤""ò;PøåâŒH·±‘Ì­·bòó lÝJè¹çpÞ{“ŸW[«á‘kŒÂ/¿™1˜‚²+V]¾k`€àozé%ì³gñjj0eeþ¹F(üri, oÒ$2·Ü‚;w.Ns3Á—^"¸aV&“Ûÿ¯›ÿˆˆ\õ~¹tÆ@8Œ;{6™ÛnƒÂBï¾KhÝ:;v`âñÜÕÿÂamý‹ˆ\¥~ùèŒÁ$d—.%sÓMXÙ,ÁM›­[‡}òdnø¿¼\7ÿ¹ )üò»³,LUUnøÞ<ì–B/¿LèÕW±††rÃÿ……½”""2†Â/Ϙ›ÿdn¿SV†³k¡µk lÛ†‰DrGÿG"Úú¹ (üòû1|õ¿ìâÅdW­Û&øÖ[„Ö­Ã9z¯¢"wõ? ÿ‹ˆL(…_~¿, SQAfÍÜ… ±[[ ½ò Á_ÿ«·÷ýáý_™ ¿üþÜügÚ42·ßŽWSC`ï^BëÖ|ë­Ü®º:ˆFµõ/"r…)ürùÑ(îÂ…do¹‚AÛ¶Z»§©éýáÿ@@+""WˆÂ/W„)-%³jÙÅ‹±;; ¾ö¡_ÄîìÌ ÿiø_Dä PøåʹùO]]nøÊZ¿žà¦M`Ûxõõ¹á¹l~¹²Fnþ3>Ù5k "°u+áuë°Òi2·Ü¢-‘Ë(0Ñ >4¼?ß6Áÿú_ÉÜqáû7LIÉD/™ˆÈuOá—‰ãy ’¹ùf2+Vä¶ôµµ/"rY)ü2±ŒÝÿ/""—Ÿ=Ñ """WŽÂ/""â# ¿ˆˆˆ(ü""">¢ƒû®3–eaÛ6–eaŒÁó<œ žs]Û¶Ç= pkÜãŒ1˜®1ÛþàzãÈãmÛ¾è׳Ùì˜iåŽës]÷¯Á±m\Ï7oãyXÃËŒ1Øc^ÓÈ2Y–5:½‘åý°/|½Æx¸®7nYF¾o#Ï >ø–ñ<ÏórËí8£ß‘«‘±,‹ÎÎNöî?@ÿ@?%ÅÅÌ›3‡L&˶wwÍd1ƇY±l)û›š(-)¡¾®c ©tš›·300€!Ñ¥‹SVZJoo/šÒÞÑA~~>ÕUU>r$<ÛÂx,Xºx1åee4Ÿ<Éž½û°, ˶ðÛÒ±ã'XÐ8D"ÁÀÀ»÷쥮¶–3--”•– سožçaɬ ãžkCÉ$ïlÙÊÑcÇxá%—“§O³uûfΘã8ã~F#?· h¹Rþkˆëº¼öúë 2wÎÞÜ´‰[VßÌ®ÝïQ^^Ƥš~ð㟟Ÿ “É8$ Œ1 %“ìÞ»‡üD>Ñh„ââ»1Æcã¦Ítuwc[óæâyM‡104ÆpïÝwq÷wðOßþ6÷÷ÿÚÉ“äî;ï`îœ9`Ìo<ŠÝŒ~,ËfõªUlÛñ.ÿÿÈ´©S9rô(EE…,]²xtžçQQQÎìY³xêég¸ûŽO0©¦ÏórÓò< ÐÓÛËŽ;q‡Êòr*+*˜;gét†¾¾ó,llÄu=º{z°m›óç_6 ™L†g×­çí­[9tè0õuu4ΛËÚuë)((äÎOÜŽçy¬áEÞÞ²…†éÓ3º–eÑ|òM‡ñ©û¼œòò2ÞÞ²…Ù³f±gï^ÖܼŠ]»ß£´´„D<ÁÞýûxðÓŸ&/Óˆ€ˆ\qº-ï5Äó<Þ~g ­mmTVT°qóffLo`ç®ÝØŽMôiœmi¡µ­ Û¶ùÔ}÷²rùr²®Ko_/©TŠþþ~Ül–óH¥Ò¤Ói‡H&“Ô×M!‰L¦èg`pˆ9³f2kæL¦ÕO¥½½sçÏF™5s%ÅŤ3Òé4sfÏ¢ ?ÿË<”Lâ8óæÌ&SXPÀ¬™3èìꢵ­• Óùâߣ´´tÜólÛ&cŒáŽÛo£ºª c ]ÝÝL›:•’’búûû¢¿¿ŸP(ÄüyóÈËË ³gÍbáüùD£QŒçÑ8w.‹.¾eY¸^n¥ ›Í`Û6Ë–,æ3>@^,ÆÑá]÷Þ}óæÌ!?'“ÉÐ0¼‹b``€éÓ§QUYɉ“ÍòùÏ~†E7Ü@Ý”Z‡0ư{ϦOþåÞn»v¿Çò¥K‰„Ãý_JD|è²—ø‘G <úè£,X°êbçuËG300€g áP˜ÁÁAòòb$‡ã:rT|6›ÝÇ>vŸûX#ÃÏcWÆF†û/|0úy×uGÏmÙZ;Ÿ åæ‘;v`ÜçÈ—0r-‹mùŽ,ߨ¯Û–5º{áÂeû,kÌk·†ïôÁy\ø}{=€±¯ñÂG–cä±Ö˜ù|œJ¥ÿ3²m›T*E"‘@ï™ê¿ÆÄãq€áóñ 1Æ …F?7öÂ:cc|±0_,¸¿iÈ õXÞo8m-7‹|î’Ÿ{Á¼Æ|üaËêÜñot>œþaóÿmß— —Ã\äã`0HQÑøŸ…пˆL…ÿc.>Eä꥟‘ˆ\m4Ö(""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â#+5#c Ƙ‰~½"""¾vÙÃDq]—¡ä¶£‘‰tÙÃ?”Âq¢‘(ŽãLôëñµ+¶ nYÖD¿VßÓØ»ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">¢ð‹ˆˆøˆÂ/""â# ¿ˆˆˆ(ü""">rÅîÎ'""r­s]—®î.’©äUqÇYÛ¶)Hä …éêé"NÿÖç(ü"""—¨»§ c<ª«*±­‰4O§Ó´¶·“Íf)*, ¼¬‹ß|o…_DDä%“)ª*+ˆEcWÅ$¡·¯—ÖÞ¦MöûÊÈį®ˆˆˆ\3 –m_ÑaY†K¿ ®Â/""r©®Ê[Ì[¿ux,…_DDäZg}ا?¸R }ü"""—èb}õ<¬ë p=Ïu üa2Ù,¶eá8ÎçcY—¾;Áâ¢[ü®ë’ΤÁ€í8„‚A,ËÒ¿ˆˆÈ%³Æ'Ö²,úúû8xè Ùl˲èììäȱ£c°,kôÏØçœh>A[{û¸ÇX–E:¦»§ûÏùMûð/ü’eY´¶µòî®4>ľýû8ßzпˆˆÈÇây†L63æc—l6K:“!•J‘Íf …BÄóò0ÆÐÛ×ÇÀཽ½äÅb ÑÛ߇c;ä'´œk¡µ½©uõbŒ¡§·Û¶ÈOä`„àb[û¹-þ‚üf6Ì ½£ƒ³çZ(+-SøEDD>¾qãX–Eww7'Nž ?‘ÏàÐuµµàÔéSÄóâ¤Ò),,zz{éîéf`püD‚d2Éàà]]äÅò8uæ4ét×s)*(bò¤I¿uiÌðr¤R)ºzºéëï#Ž:¸ODDä÷`8µcÆÜ=Ï#1£¡Êò ζ´pîüyÊJÊh˜6‚" †D"A,ñmúúû)).¦°°éS§ázmímd³.íí²ïÿ⻆’INŸ>MGgSjkJ)ü"""—êby d3Yúúú¢§·‡`0ˆm¿?ïy.¶ãàØ6éLšL6‹ç¹¸®Ë‰æ¤R)b±;.ÀsÝáËï'@‘Kw‘M~Û¶™T3‰Šò ì„:˲>ec pÈOäc_V  Žžó?"//oÜÇÁÀø¯G"‘ß²T\²±Gÿ[X£×PøEDD.Ù¥]×CA~þèÊÀe¿²ÿG¸’°Â/""òQ\bdcÑ(±Ø¸‹Ÿõ‘º¯ƒûDDD.U0$™L^Òc \Öè[d³YܬK(¾äåÒ¿ˆˆÈ%*È/ §·›þþ>ÚvöåaŒ!ÏKÐÙÕ]]¿u¹~‘K )-)»üÃ÷—À0rD.ô‘hä’&PøEDD.‘Á\#õ.ÍÈvýG] Ñ>~QøEDD|Dáñ…_DDÄG®ŠƒûlÛÆ²,Œ1xž7aó‡Üm¯ÔÑšcçû›æmY¶mÿNߟ‘靖ˆ\áOg2;vœŽŽJKK¨›RG8º¤çÚ¶ý±WŒ1œ=ÛÂñæfBÁ õõuùâi[ÞǪeYœ9{–ÖÖ6Œ18ŽC]Ýñø×Û×ÇéÓ§ÉÏϧºªê¢·d¼˜l6ËÀà ‰xÛÖàŽˆˆLpø-ËbÃëo°uûv&ÕÔ°ïÀJŠ‹‰Å*0ÆÃóÌh°ŒÉýÛ"w&EwO;wífåòe„ÃáѯÃû[Î#7(0ÆŒÛòYY°m›S§OóÃû eee¸Y—L6ËÊåËØñîNJKK˜Z_ëºã–#NóÎÖmÌ›3‡’’âqÓÙ2™þ…ós]wôµ¯áEšbj}=¡Pˆ¢¢BŠ 1ÆŒN#ÎðÔÓÏÐÕÕÅŠå˨¬¬$<|7§±Óµ,p]˲FW ÚÚÚysÓ&î¹û.ò‰ÑéŽüq°÷ ŽtˆˆÈÄ™Ððc8|äuS¦ð…Ï}ÈÝMh÷ž=äç3¥¶–cÇOÍf¨¨¨`×îÝôõõÓ8o.MñäÓOsîüyÖܼŠx<ζmÛJ%Y´p!%Åż³u+]]ÝxžGYYgÏž¥vòdÌŸãä¢×ÚÚFÿÀüÕ¯RZZ‚eYœ>s†ŸÿòIÊJK¹óŽÛ©«Â–mÛ`ÖÌ™¤Ò)~öó_pà ¹ý–5“»tbÝ”)¼·g/U••`Á®Ýï°dÑ"8}æ Ë—. ³e[¬\±ŒûÁ²m6¿ý6½}}ô÷õ³xÑ"zzzxgËVnX¸Šò :Ú;Ø»?¡Pˆ…óäàá#¤R)fÏšÉÀÀšRVVÆ´©õ”––ÒÖÖÆ¶íÛéíí#‹±bù2"á0ÛßÝÉÙ³g‰F£Ì3›šêjÅ_Dä:7¡ã¿–e±ææ›9yêÿòØ÷ع{7Y×¥¹ù$/¾ü ©TŠ—ýkΜ=ˆ7Þ`ñm›þþ~€ÑàÏcý /°¿©‰ÖÖ6~ù«§éêîæÙµëèêîâÀÁƒ¬{ᜀÃSÏ:ÌÓÏ>‡íØØ¶MOO›Þz‹½ûðÜúç±›77mfÇ»;Ù¶conÚD4áµ×_çà¡Ã—¼ ADD®]~c Ìç/¾ñç,¾a!Ï<·Ž77nↅ 8wþ<{ö§‡Æ¹ó˜2¹–H$L˹sD£QfÍœAMu5wßqñD‚Ýïí¡½£“ÖÖ6ZZΑL¥ÈË‹só7qÂTWUqÛ-·‰Dèëëú/,,ä¿öUþÌC´´´ð½þˆ¢ÂB¦ÖMaé’Å,Y´ˆp8ŒôôôÐÞÞAqQ“'ÕpËê›™9£!7\n[ÃÛ8 ÓI¥Stuu iœ7—/~þáqûÚÛaÉâE|ááÏrß=w‰Dˆçå±zÕ*nY}3TT”SYYÁM+Wຮëò¹‡äÁûïçø‰fÚ;:˜Z7…Oò>zûú˜²ÕmYçΟç­w¶`Ù6ÕÕÕ áyŽãpúÌZ[[Ù¾ã]vïÙÃÂó‰åÅ0äö‘Ÿh>IWwÁ@¶¶6Î?Oww®ë2{æLî¹ëNöìÛÇÛïl¡µ­÷öî·ÅïyÆ>þÀË;0r|ÂÈ£Œgp]×u).*dhhˆ¦ƒ‡ØßÔD,–»å£çå]XPÀé3g8y긞7<½Üñ¹crÇrà@gΜ¥¿¿o"ÿˆˆÈä\îÌŸ?ß^¸pᣕ••µ%»®Ë–mÛyýÍ79tø0Óêë¹ãöÛÈ‹Åp=_¿ºÏ<ø•lßñ.onÚ„g +—/cúÔ©ôöö²wß~¦Õ×3µ¾Ž½ûösäè1Ǧvòdη¶2kÆ Ò™,ÃôiÓ8s¶…†éÓ(,,àÔéÓ¼ðÒK¼·g/éTŠOò>jjjƒìzï=lÛfJídŽ?ÎùóçI$,Z¸üü|Þݵ‹’¢"¦ÔÖ²û½÷8xèNÀaöÌ™ìÛ€í;vǹù¦›hoogç®Ý,hl=ïôé3ìojâÐá#>r”ªÊJ™9£@ @gW³gÍ¢µ­™3˜gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìu|ÅÚÇgÖåx}ŽØ|5vþþ?fô‹]€ƒïýõÔþ÷‚GŸ¥Ÿ|Xsiš „p‡ (`Û6EQxïÅÃQ‡JlìʶmÛ¶÷‘iŠ¢mcñ¶Ç•+ .MQàp F üIà‹_ùøš?Xï!ÄÄN8ÒÅ&ü“ÁÝyŠ¢h†‰F!žc–eé†IQ{ö² U–eiŠ˜¦iZDzûwºî}C¢(ªóµŽŠ**€‚ç9†a ÃÀ¦M|€¢¨,ËØ¶m#„Óßÿ-!– „P× Ë¶DAÀ'M7ldóg#ö>¥pú öœè´ üê{Ã>»„Cß_ ÃP¥i€çyÛ¶MÓÜçÝ:v©3h/ä²#üy`]6LóïfÎ^¼LÓ´~=ó¿ë¶E+V?ûæ;¢(†#Ñ^=ržøï¿¯ûïƒÿ¹öŠ}zB­Û8sî‚gç9d#Цu]ð§é:MÓ!€!Mמ·2 ƒ¦(U×ÿýð“Í­m€‚œìk.<7£[*„aÓ0ÂÑè=O¿xÝEçî()+¯Ú}ß­7*Š"ŠB{ä^×4Ïó–eiš&Ëò‡_÷Õsž¸óßûönhj¾ýѧ r³ï¼á*–fhš¶-K7 –e!E›†aZ˲±]Žc)H!€LÓ²,‹çy„¦i4Mó<iºŽŸeÂ!aÛ6Ã0»ëê¡Ð€^=¶îðyÜi©†ivÖö}¥ƒáÏIJmY’–®^ûù³¹ýÖnÉI»v×B‘ˆÏëyíÑ4]§(h膢ª–eAu]ÏÎH?óÄ)¦i64·„¢ªšžš‚ªª©MOMéð4]7M‹e™îÝÒ*ªª)ŠJKJ´‚´uøo»öн{Ýõij3¾›uß­7V×Ö‚ÁœŒî M+ªUµaûg¦w³m PXZNSÃ0¶m§§¦@Ë*«\‡Çå†á†¾š=w`ßÞßÍ]PYS›—“¬khlio÷zÓ’“ê›m‡£JR|œÇíªkhliïˆ÷zR““(kꢪÊ2Œ×íö¸œEeå<ÇewOonmÛZTlf¼ÏÛ¿WøÅ0ð»°m›¡éú¦æi͸ö¢ó „¯¾ÿñõŸŸ‘®ézgÇýX_ÿç^ÿ‘.<áŽeš©I‰™éÝ~˜·p̰!ã†0  …ßûâëhTܯϸáC(B¦eÒ4]RQùݼ…}òs{ešÀó@ß‚¼)ãÆ<ùú[o>ñðœ¥ËK+ªÆöÉ·ß_{Ñy¯¾ÿñ5ž›‘–ªéºÀq‹V®Ù^T …O>vâÒÕëÞÿâ–c}n× —^À0 Ë0+×m,¯Þ=rPÿçß~¯¼j·×íNMJܰmÇcwÜ*‰Â}ϼtÇõWÆû<€¨¢Ž20ªªÓ>šQX^q̘‘–eÑ5s†Æöÿ¥gŸ¾dõºªÚ:–ehŠ~ìŽ[¿Ÿ¿¨º®¾­Ãåyg©ª:}ÆW q¾š†Æ_}Y]cóÒ5ë( žzÜ1ù9Y/¾óaVz·nÉI={ät¶n¿aTQF ìŽFßøhàòsÎ=dP4ªìïL!¶~Â_@Õ´Ìôn/?|ïâUk¯^;sî‚Çïü7ËÐŽeMÎb_ˆË2 ˆ ۾ഓâ}Þ'_{«_Ï|¯ÛÍq¬,I–mO™0¶¶±ñÎÇŸ½õÊK'Ž ‡Y†ÁcŠª¦uÃ¥ôë™ÿ¯?kꔩ“'þßýÎZ°Ä)K4MDž_»y[qEåËÝëq;!„·>øø†­;œ9%)apß>PÈíb ÃHIˆ=tðM÷>|× ×@ nغ!4jÈ ¥å‹V­Y½q „`ì°!çŸvÒ5wÞWTV1qÔðu[¶/_·aÎ’åÁPøÂ3N9qÒøÛ~²ª¦nÁŠUƒúönjiû⇟îºñšŸïKKJŒD£dè˜pxØ6¢(JÓ²¢ÀSeÛhŸ©º°õé’þÉ „xž+«¬ÚYZ>jð@Žež~czk{;BÈ!Kç2UÓu B]7 Õuõ²$ÑTT dÛÈFˆ‚c–aXšéÊ«v7µ´"d#Û †Â²$¶´·ëš†MÿEU/;ûô^y=,ÓŒªª( Í-õMQEñ¸œQEmln‰F˶%Q4M³ª¦ÖpzÝ®3Ž?îïg:$é¸q£;ß¡ptÔà/?|ß~½?™ù˲µ Ͻùî¤1#ÓS’uÓ°lDAHAàv:«jê¬\=bЀn)ɶmóÛÔÒR×Шé:ÍÐ,ËF¢JïüÜq#†hºnY–®k†aÛpxØI‚°rÃÆ7>üôòsμñÑ ÁÈA£ªJígëßãáƒ]ÖŽtá ÿdBÀ¶ÿ³~zÿ‹o¿ôìÓór²«jêÁÐ5w݉F{æf?ôï›Ý.×_Í„J¢0yôH—É- „!@QTfzÚ¨!ƒ^˜þ¾C–²ÒÓç,Y^VYýÒƒ÷<óæ;Ý’“ŽŸ8V× €C’‚¡°¦ªQUuHÒ•çžõޗ߬޴¥¯‚3OœRÛÐôýüʼnñqÇõí™?eüØWÞÿ˜a˜sO:~â¨á_Ìú©¹µmØ€~ª¦áòóË04ò¬ËéÈÉì^^Y­hj–7]ÕTš¡mËfhÚçóädt/¯ªVT-7³û”ñc^}ÿ“íÅe­íi©§O™üÓ’åmþÁ}{dg ´¹ ‡i𠾏.¹pøÀ~@Že}eYûŒâþì9½|ùò!C††A<|*!†¦„¡hTäy‘ç5]·m„ÀÏ>-ØËþ—âïÍ=ÇØQű¬ªi MÛ¶­ÏqËj†¡ë:Dzø<ü¢Ëûºiº!K‚®ØÝB  à!ª(š‚Izð…W]N翯¹, a7S|÷@lÛ†{¶ Žal„ÚA‡,Ñ{ß«q°Ñ©=tHCÓ†aH’X]Wÿàó¯ÜvÍåƒûõmnmD¯ÛÅдEn>ÂÿBˆç8†a"Ñ(@’DÓ´t]ßw>#BÇmÚ´‰xøþ:LË‚:EÑ¶í¨¢`ÿ÷No£È¶MA~–l÷ˆ8!DSжmUUišÆfqžãBQUe(Jà8k¯­œî45  ª*!CSѨ‚ýçñ¡h4JÓ4B6ϱ›wnض㩻o×T îç€!ábë¦IAïq[Þ›q!MÓ„Äyܦi <÷õì¹k6oÚ¿oANv0tH’Ûá0-WÙ¶ÉÝGø_Q5 ©*öç G¢ð@æÈØú ¡ØHæ/<Ë:À¥hí=,¶wŸãë—¤û!·x#Bh¿,ËB˜¦)êªóÏÎLKÑt}ï±à`÷¾ßÀ,.$BÀ¶ €¢ªS&Œé™—+‰BÌî†a<[íW«L ?‡B¨CçNbð!tq ºaägeöÍÏ G"ÔaÛ¶C’õ.°,[U5@f펿ðð!üB M×U£iê¼)LÓ ØYˆÜn„#ÈÏ>ÄàC tÏ'øcÓÜ'\pDø¹×OÓ4IH^Bÿñõ9Ú$\ç„®Ì/¤Ÿã8bëÿÇ!´L Ä0Ì_—+¦eþÒL½D‘e¨ ]–Ÿ‡y[ÛZ·lÛB¦ÿ³†‘–šhmkþSϪåy>%9Ù¨©¥iOüXpdºÿ@@@–儸„#Ráèéðwääæø<>Ó2á_ „¿˰-­-ee4E7·6#€þ‚ÿÄÐL(òx<ÝÒºíy¹¼òØÈ&Â?|#´µ· >RÈ0L,×B eY‰ ‰6¬ïhoOˆOÜßžÏ0E‡ÃÁ² @ þzPÏ£¡+GèblÿŸ1 €{ >pÇqÇ4M7 ãW$qÏí!j&)“2BÈÞãRfÛ¶$Š6BªªRÔAgÌ"„A€*Š[Ý¶íØÆ_9÷×˃lD”ŸðÏ/Å®ëZK[“¦hMA ÛXi[4MAHA pUºöI‹e٥˗oݶ=>>~üØ1>¯×4Mš¦c.˶qðB¡ š¦áíø]BØù;ÚûBžø/躎[ûÒÀƒîíõC€âX®ºz÷öí…ÏõíÝ+))Ñ4MЦ6²)HuîÄrŒeÙ–eQ4…uGÝÄßüùò¢ ÓV îykÄÃM8®ì†M›DQÌëÑG”Å;(±šãÃA(,*Òu½OïÞ±8,Ëé†Ñ§W¯ØU‡SÀ×§eÛ MãD:Ç,ŒƒÙ€Ä,!ü“€!š¦y–gx¦iKÓ)šfEI ‡8–ÃaÉÈ/䨶m‡Ã±hÉ’g|–•UW_ßÚÚæt:²ŒÅép\N‡×ë•eYàù>™UÛmÛ¶Óéôz<’(Ú¶ít8<Óét;.§ÓétÃÑŸMÓmííí‚ ˜¦)B{GG‡ß¿ï¸?@š¦i†¦(JÅú††™ßÏÎÌìΰLG É’Óå¤(Ša—ËE3´,Kn[vÈ.·síú MM ñÙ!»=.Ù!S%É¢Çëv:.—Ëétº\.–c)Š¢÷‚ùØàcš¦(ŠßÏúqÅÊÕÏ›¦eÛ¶,I>G’$ìhàr¹²ìp8/]öÃ?É’är:¢ ¸\®õ7ý8û'žçEQôy½’$\.'~ûôºÝ–eÑ4íežç=n·Óáp8d»3ÈÞããO üýØ–ŸÖÍiX-; ›Úý õ Ñ;3Ó³N—m[{ÇýE¯!Ä0tSs ˰SŸrÖ§›†±`áâp$rú)'oÙ¶­¨¸äÄã§|þÕ×; ‹&ŒKAêƒ?Ù²më¹gŸ5tðà?þ¤²ªzò¤‰£Güfæw•UU‘h´wÏž%¥¥ç¢óÏc𢩄?Û¶eYúä³¹3¾øâÍ×^í]P°³¸øÚoºìâ‹/¾à¼P(¼ÏËMÓІ¸Ë¯©º¦ªùùyÇ3I×õEEeåÇ3Éï÷/[¾jÜèQ[¶nß¾³0#==;;sÎÜ.—³yì˜Ñ£F¬^³®¸¤4?/wÌèQ›·l-)-‹*JzZZ Œ(Ñ?ÎåtbË>EQûò¶LË’eYÓ2²!¤gþ0kgQQŸ^½N˜r\ xïÃjjk/<ï\‡,C›š›ßûð£‹/8Ñ’¥6m*¯¨1l8Bè»fèßèàÁŸ|öùygŸÕÚÚúÖ¬¯¾âò]••ÛwîLNJÞ²u[[{[fFÆY§Ÿ†_ „ÈFD÷ ÿAVT”N{»÷„ VZ* 6|ñõÆM›Çßs@àwõú)Š C§LšuÉU×<úÄSí.·ë‹¯¿¶,kÁ¢ÅÁPhýÆ~üéq“ILHHKMMMK8`@A^Þ—_³uûö‘ǽøê«Í-ÍËW®âx¾WAÁ{}tÊIS×oܸrõY–-2møB¨(êi'ŸÜ-5í¦[þ5Ñâ›nùW·Ô´§§(*ì¼üš¦†aÆ0Œ^= &Mÿú´·Ÿyá¥Êªê”ääuë7ƒ¡]UÕMáHäÓÏ¿5@ع+2MÓ CŸ{ö™O>úpÏü‚7ßy/>>®oŸ^›¶l­¨¨:dPffÆy眵aæò] q>¯7?¯G¯^•UÕºa”•—{ÜŠ¢EQì‘›Ÿ×£{z÷¬¬Œ¹9†a2 Í0{r‰õú±¹ß¶m¡À ²$ñ¿aÓæ?nÂøq'L9nÎü»v]xÞ¹ãÆŒÊèÞa™•«V‚ÁóÎ>{ý†C4p`NN¶mYë7n<ñøã'Œ7yÒÄ­ÛwLš0aÉòå»Î?÷ÜŸæÎ«­«;fâá † š™™Á^£“mÂ?MU5’’¬1#6O9æäˮ̺îú =²|SOh …š>Ø;s‚ ,]¾âÉgŸÝ²u›eY^¯pÌÄ Ï¿ôŠÇíÎèÞ½®¾~ÔˆáÝ»¿þæ[–e#dûÝõõõ= òDZÇLºê²Ë’“’Z[Û‚¡P8îðû5M ‚†AæÍÿ)@UU“Dáñ‡|ñÙ§øAITM;`k3ô9±¶¶þÅW^[¹zµßïOŒO@65bøâ%ËZZZûöîÝÔØ”šœ<|èo¿›å÷%Q\½fíŽí;ssrdIØ¿ÿ™§ŸR—Âሡ@ÀÐÍH4ªé˰4EÓÍÐ žÁkÛ6²‘mÛEQ6mÙ:oáÂe+Vö,Èûiî¼E‹—Ì™7ÿ¸c&%&&¾ÿÑÇ+W­Þ][ÛÑáŸzâ ii©<ñdß>½W­^»zõší;vhº1hÀ€š³xÉ’…‹÷íÝkԈ዗,­¬®¾þš«>ÿêkEQ òóZ[Ûðµç÷û ÃÜóø±m‘÷NÂ? HS ª2†ÉC5ÅÅÍ%%ŸÏîè`(úW:ÚôgžÑ=½»$J{³°¡±qËÖm%%¥y=r/¿äb]×SSR¾ùîû“N<¾_ß>¥eåß|÷ªªœwnVfFbBâÖíÛ&OšTS[·lÅŠH$Ú« _7Œœ¬L·Û êÓ»w8ÉHOONN"ë¿ÿàEÆyž8`BH7ŒýMüQ%ÚÔÒäõz±ç/CÓQEÙUYUSSët:Ï?ïlŠ‚ ë6lLïÖmüØ1­ííË–¯¨­o˜zü”ÜœìÔÔ”Úºzš¦G!\µv]{{GF÷tžãâââ’““,Ëê‘“ !ôz½ÝÒRñ¸+MÓŠªð<ïrº ÃÀEUTµ¡±©¾¾¾¦¶îŒSNeXfíúõ#G ŸŒ½?[ÛZ·ïÜž™›^ËqœÓé´m lÛ¦ õ⫯ŸyÚ)Y™™ØÝ ÿÑáp˜eY—Ë¥ªj8v9],ÃØ…B!žç€Š¢¸]®`(ÄóŸ|Åe¨¥¥ý‰§“/¹$û„ׯ_Ër|Ü1íÅ7þÖ­[÷õë‡F¢Ñp$Ûât:—¯\™Þ­[Rbb ´m[Q|$EQŠ¢D"ì-ÞÑÑO¡i: ⎧ßï§i: AâÚÿ'³'Nï°ÿ;þeYV{{{ì\§ìؼu+CÓ¹ÙÙ†i"„ÞÅ2¬mÛmmmEq ‰Dp"4MãÅfñ?NÓ´¦é Žåbàù{ŒìBƒÁ ßïÇ"MÓþ@ 6Ä0ŒÖÖVÐi!CŠ¢š[ZhšÆŽü±júýþØY€¶¶6¼½µuÏ—`(„Óo÷û©½sM°ôˆ“áïEQºnD£Ó4eAèýè£uåå-•U,Ee=ÿ¼79Ù2MÃ4uÝ8àéÌSìü3O7V„p$‚wuÖ콇¿wÞûŽ¿ÐDô°_ÿEdšVNVö ׿<é÷—=bÐ,ÃîùÞù³÷+C3üBJ3;ÁÞXr±öL ë´’WçË¿%à:Ç~è ¢óY±¹å1cŽmÛÔÞ/¸žÄÇðÁ¶­Ä„¤eË–RBÈfyž¦hÐîÚZÓ0 E±,Û»W_lk݇ß^;ÉF(..ß½Gº¦„ÿ𦱥eíC9N€e[¿ñöðûÀó ÷ï´‘e[G6h3èNŽ@ø!ìÙ³W^^>þ‰ð” €xY$ÜÍ:à°ð7ÞqèbýƒÀ½uxž?Ø’)ø2`ûGdˆð¤Y†b¶mïy-8¢PÒ ¦hbð!ü3€â8.ã`}‡±Å±V&îDôÿî@ Z–åóù ÃGÂÍ !4M31!ÐÒÚBÑàHJ.Ü3xœ”LÜ{ÿïE–‘D©¦¶¦®¡ŽtƒþÁPU¢éié)É)™ôhšæ8 ;dì[ydÛı~>²%!Ž,LjJjß¾}µƒÌ"ücÀou–eÉ’ü—e"âXrGÅÖyå¡ËÂìqxøsVê UàÿræÎ>9GÉø*¹Î ð{<|ÿ0Ž”öÍ%Žˆ»=@ t9ˆôB—ƒH?@ t9ˆôB—ƒH?@ t9ˆôB—ƒH?@ t9ˆôB—ƒH?@ t9ˆôB—ã79Ø!ÛFxU¼?a¥-„eYx}G^ø`ë„líY@ ¿&ý!‘çeY† …åàØš×¿?o„Ïó‡# éºp»]4EC¡ýC}!„†‘e9‰t^]ž@ ‡ÊA¥ëòÖí;¾ÿñGUUûõésÒ‰'àE½c+\ƒN+£š¦i˲±µÁÁŸ8I’¶nÛöÕ·ßÎYùù¶múÙÍ--—\xÏó1}Ç3 ÝÔÜ9)Q× ¸—#݆ð7ãÒí*¢(î(,üï}÷ççõ izóÖm§ž|’,I†iêº.Š">’e˲«×¬}á•W_}áy·[6M“çy€ªª¶m;!^“›¢(˶E±mÄó\EeÕ+o¼ÑÑÑþæk¯nÛ¾ýá'žLMI9ûÌ3œN§$ŠBÙ‘H”ã8—ËUWßðõ·3G Ú#7GÓt¡ªªØFD å> á¨âÒOÓ4ð²$·´´446ÞzóM'w,Ã0íþÿõïS¦žxòÔ©oN§µ­m̨‘3>ÿ"U®¸ô’ï~ø¡´¬ìÚ›n¾ì⋲³²^yý —ËyÓõשªöæôwlÛ6L£g~þ†›rssn¸æjŠ¢ û÷¯Ú½{á¢Å‹—-KMNNMIa¶©©éµ7ߪ««Ÿ|ÌÄ‹/8æÍ|ôI(âxÞétοàãŸ÷ÌÏ»â²K]NçQž@ø Ã8ÒE ~æÒíémímu u<Ç1ⱇ|÷Ã_öæi'Ÿtåe—Æy½ÏøüøãŽûòëo.½øÂ÷?ü¸¶®îÔ“OJKM4`Àæ­ÛÎ>óŒ”ää{|(';«®¾á¾‡þïí·/Y¶ì_7ß4Ñ¢šsñ…çO{ûýú{Ì1UUS’“O9éÄ[o¿£oŸÞ—\tá¬Ù?ÙÈ~ê¹ldŸuÆi¯¼ñ&Ër³fÏ.ÈÏ4pÀ73¿ÛYX4ííéÇ›»`¡ªiW\vq]]ݯ/LL A@Âܬ\l/=ÒÅ!Ø¿×ÏÐL‡¿Ã);SSS5M7fôÙgžñìo½ýŽþýú^}Åå7Üú¯éï¾çñx&OœØ3¿`ùÊ•[¶më‘“Ó£G®(g~ZUuuSssÜÜŒîé<ÇG"‘Ä„„³Î8=—–^rá…óæ/lmk§) ÄÐŒ¦igœrêšuëO8î8QáP¸ªºúúk®:í”SfÏ™7gÞ|UU/¹ðI’.^RV^nš¦iYýúôñ¸ÝNÙ™Ñ=ƒ‚ÄK•p4‚bY¶¸´XÓ5Y’‰ôŽö•~EQ’$%&$~ýí·>ùtF÷ 4(9))3#cЀÏ¿òê×^ãr¹^|õ5¿ß¿uÛö^ù'O=QÕ´ó.¾ôÌÓN2hP]]]vVVvv&DzMMmííÍÍÍÁ`°µ­M×5!„”ª©­mm,Ë>óøcN‡ó³¯¾jmmóù¼ÇM>æµioÍž3·¶®îÉG~çýo¿ûžŒôôšššK.¼`óÖ­MMÍn·;+3Óåt2 C¤Ÿptb#›çx<6F =ÐW\qErr²eYxŠa˜öŽv–aEAx¡[ZšÛå8 ÿ5W^‘”˜Eñ§yóÿsË-qqq ÃPuòÔO>ijœ×›Ÿ—çpÈýûö=áøcUM3M«gA~VfFJJrÏü|·Ë•Ÿ×#£{w¯ÇÝ« §×ã±L“ãù¹99ÙÙ¦iš–És\VffvvÖ°!CdYºò²K{ 4Pàù”””Ñ£F :dø°¡þÇqýûö‰‹ÃVTD •Pjjir»ÝË!Òë'ihšnjj‚Ë—/ïß¿¿®ëB„Ïóee²$''%#„² „Ãa]×Ýn÷#O¤‰/¾ ·nÝzP¿~¡®ëí±Ÿ,˶··—œwöY˪ªŽDBá0OÇD£¡HOúÅ'B)Šjïè i:"hš ¢(š¦)Š‚§ïâUUÅ©B!ì JQ”eY±’àŸŠªÆÒ?ÒI 3>›í+¬!Š¢^yþYçÑÈþšKuÚÔ9þÛÙy„ð`?;ÇØç0pð`@øM˜ß(BˆeY–ec/­ÄÒB GÍZ‚Â!xžgYö€Òÿ›Ï<öõë[þlÛþ³GÕþ‚‡ßŸT‹Ã3:#„hšþ#Ûþå!Û ¦pá¯á¥Ÿaš¦±ó~ìFµmÛF8R2L3vpç;cÛ6˲ÇÅvá—‰Ø|Vç½ûk_ç±]±ŸxBH†a:'ûó1{Ú¿,dçì“õ>?ñ11ç¢t’ÂÎ_öMçYü¢<¬ÅïlœŸs>>6±ÓápÈ¢ˆÂïRYrì-Öý]••~¿?>>~ûÎo¾ónœÏ'í  Äó¼Ëéìßž]‚èxä1šaâ|^¯Ç³«ªjëöíq>Ÿ$IMM•UUå»$Iܸy‹ªª ¦iò<·«²ê¥×^;î˜cz÷Ꙝ˜‰FkkkƒÁ ÓáX·ac{{»Ïç›ööôØŸ Eqμù­­í ·Ë%Š"C3eõ ññ à „vniikÖ®{öÅ“=n·(Š[·mß½»Æãq3 ƒ½¿›šœNg(ò Ãà¢=n÷ÑÇ›¦éæ–fâ×O8JÀ~ý‡ ýÜ[·~ýÊÕkââ|ù=r)ŠzçýJJJ·íØ¡ªjJJÊŠÕkN=iêì9sç/ZÔÐÐXTR2vôèwÞμ¡pH¥%Ë—ÕÖÕAúöîÍq\{GÇ—ß|ÓÐØHѰGÜo¿ûžå¸…‹—D£Ñ¬¬Ìg^xQÓô…‹äõp¹\E565=òÄ“QEñü‚ <û‹S?¾¸¤ôíwßëß·ÏÃ?U”@Àϱì¬Ù?µ¶µ{=ŸÏû⫯©ª>oᡃ}7kÖGŸÎPõý>A}7k–(ˆ½{õÔtÙömwÞÕÖÖ¾|åªå«V…B¡of~Ü1“V­YûÎ{ÔÔÖ.Z²l̨‘|üÉ’eË#ÑHssËq“'¿þÖÛmmíËW®ôzÜéÝÒ(Š®¬®~ú¹çO;ù”g|öü˯\}Åå/¼úZ{{»ªi;v†Ãáïgýx”ã>üäÓ¢â’mÛwèºæõzoþ×m š£jÚÁƒB»*«fþ0«½£Ýëñx<ž™³f9Ž/¾þ&=½[4ª¼ýîûѨ²rõêÁÐ4-ÂÆM›^|õ5˲ ÃhniùèÓgž~Ú×ßÎ\µzMœÏ÷ä³ÏÙ¶­jj(™·`a ÈÎÌêðûßûð£H$²|媱£G?ñìsë7lÜUUõõÌïBŸùu~^^rrEÑ›·lY²l¹,;æ-XŸŸÿÚ´77mÝjšæÌfí®©íðûÝ.לyókëë!ýúôˆ‚°pñ’ÚººŽÿÜ &M˜0ã‹/gÏ™[XT´³°pØÐ!Ï¿üʦÍ[W®^F›šV¯]ŽDz÷êùùW_¯\½&»Ý®”ädŠ¢v×Ô<ñÌs§ž4uÁâÅsæÍ‹‹{ðÑÇÃáðWß~›•™‘––fÆÑ©þDú GXúÁà!4 #!>þ¹§ž8 ÿÛï¾÷òko455Ï_¸ÈãñD£Ê÷?Ά24F˜=›a–eç.X¸³°hã¦-ßÂ%K::ü.§sÉòåõ ÆSåŒÓN}èþû „6nZ²l™ÇíŽF•fÿJJL¼ë?·sÖ™ÛwìdFQ”ýû 8à‚sÏ9ã´Ó‚¡`A^Þÿ¹mìèQ; ‹æ-X …¼^Ï¢ÅK«wïÞcn‚PÓôÔ”ä¡C=: –”–î,,œ8~¼®ë©))Æ?vtÏü¼Ý|óøqc¿ž93‰x½ÞEK–VïÞ-‰â9gžyý5WÓ4ýß;nÏÎÊ**.–$QUՑÇçäd_wõ•= "ш(Š7\sÍe_¬iÁ¨#öï?fäÈIÆßzóͱËtÊÉSyð~AÞÿèã›6ÝyÛ¿žzüÑÝ55ÓÞžÞÞÞñä£ßuûm?Ι3°¿>½z=xÏÝùy=4M3McØ!¹99x¾!„Pày€Ã0<Çkª–Þ-í‘8õ¤“>ûò+ЬÜ@  ‡6ÌKÓ´ßïoljºèüó/½èÂe+Wjº&B|\Ü™§zË7¨ªj&€¦è8Ÿǫ‘Üó_Žc5M …öm™–¥jZ TU!€#ò«šmËBшaš,Ç!d»œ®îéé÷Üyû°¡C¢Ñ¨mÛq>ßS=êp8þs×ÝííSŽüÅ×ßì,*9l¨,ËO?ö¨ìpÜ~÷=ÍÍ-†aø;üËéêžÞíž;o>tH8D£QQ£Ñ¨Ã2¸7†»dª¢Z–ű¬¢DY–¥išf˜P8d[žÃ¬ëF Œ*Ša˜BI”’’¯¿úª³N?=ãihcG~ëweYºøÂ ž{ñåÄø„ÌŒ EU Ó ‡ÃÇ!€8Ž‹‹ÇM‡ÇNUµm I@-ËŠ*j‡?€Û=ƒÀ M¼^O¯‚‚G¸/-5Õ0 MÓúôîõÔ£窱¼ûþÓ45MAQЦ(šÂëî躎gn†§}LÓ¼ï¿w>üžܲm€ÐßáÇ.@`Û¶UѨ"Š"B ‡B!Ó²œN§nèáp8 ᑆP8B¡ðµW]yÉ…¼øêkßÿ8Û!Ë–eQ …†1tòLÇq{.bŠD÷ „Cᤖ–—ßvç/¹òª÷?üèš+®ÈÉΞrìäµë7,_¹ª¦¶65%% ½óþçœuFyÅ®%Ë–gfdŒ;æ¡Gôɧ‹KJÆŽUXTôòk¯Ó4!TUmø°¡EÅÅ/½ö:MÓØ°Ëд¡“'MJLL˜¿pцM›u]°,[YUõâ+¯VVUege!„FQYYEQTïÞ½ ‹‹_|íõʪª¬ŒLŽåÆŒõݬYŸ~öùÉ'ž?ᢛ6kºÎ0 ESB\š¢hŠXÞ`R¢(Ц(Š‚á¢óÎûáÇÙ·üçv—ËuÍ•W 2ä¡Gsú;ÑhtðÀƒ \¼déêµë‚Á –Ô4mèÁ`°Gnî¨ÃÛÚÚè i<ðAÙ¶Ý--íÄ)SÖ®_¿|å*<´€§1SEÓ{þ˶Ç=óû¾™ù$J4ESÒ48ã´SE]°xñŽ…íõ]³výko¾ …r²²-Ë:fâ„å+Wææä$&&®Xµêµ7ß …BÝ%I:tð˯¿¾rÕª Î;'.X´xÇÎBܧ†EA\}HÓ4)ì%!d–¢(üIÓMÓ`ðå7ÞX·aCzZ7†\TR‚ÿ\²‘À /¹ñ–[%Iºð¼s'MÿÊÓxøÑ!ƒ]qÉÅy¹¹÷=ôð´·ß>ó´Sûöé“–šöÈOUUW4cƬÙ?y½Þä¤$˶MÓLMIILH¸ýî{æÌ_Àó<Çr[¶n{ð‘Gç-\tÁyçÚ¶El)Âïç 1|R’RtCßÿ%Ú¶íP(Üáïˆóù4McY¶¦¦6$'%yÜîÖÖVEQ333›ZZ[â=Dz»kkEIKK“%±½Ýoš†ÏçŚŲl‡ßoš¦ÇíŽ*Š,I¦iêºîr¹4M«ª®!9) Ú¶]W߉„{äæÒ4íp8îºç¾#†~òÉ~CcÞÅq¨µµf˜8ŸOUUœNJr²iš¸¦‘hTEÃ0°¯ Öü6`š¦eY¢(F"ŽãdYöûýÁP(5%;ðÔÔÔX–íõzdY†VVU#d§¤¤{ý|¸q(ŠÂ_hšŽ* CÓ,ËF£QAß½»6‰¤¤$K¢ˆën†iZ’´§<4M·´¶r,+J’¦ª²,«š†lÛåršÚ:ÇM"º®ï®©ôÈÍA!ýëŽ;n¾á†^= @m]=Þ@µ´´H²ìu»;ÚÚ:ǘ (*Ë2E©ª*Ë2³Áq\¬qAÔteÝ0ž§(ª¹¥¥¥µ5+#Ãår!„ü€iìùsñJjÁP(‰defB†iim5M3%9Ù0 †ayŽ‹óá5>ÛÚÛ}>o$­­«KNJJNJÂ'nÆ]•UñqqII‰ËV¬øñ§9—]rqRbbœÏ‡9ÒwÓ 1|G±>‡,ý8¦MÓ¦i†IQ§ES”aš¦ib±SUãX†a°[7NX–Ų °ó –a„Ø=9ãõ~)Šâ9ÎFÈ0 ´w½ß½Y¨Ç••—?óü‹Ï=õ„(жms‡5 p,‹2 ãçttRÀ¶mœµ÷'.L¬xUaš¦mÛ¶, k·®ë}I-ËÚãZÃs@ü‰µUÌ”¦(˶±…¦m˲÷6n±òì³ 1n^ìäŽãá›–ÅÐ4Çq–eÅV€¢( ¯Z£(ŠËéœõÓœ =÷ô‘H½4Mþ¤,ËZ–eš&v—Äéà‚½±’bîÜ8x#~wÁOn†¦uÃ0MÀ2 „?ÿ¹Eá7œ/OÔu€Ÿ+†a)Y–5 ƒ¦i–a Óì ÒO8Êøíðm¿r¦aXk( ‚½a×ÀÞy›±]ø0|ßâÝNǘ ÓTؘR@±—BÈ´,ü%©-VœV#Ó4Ï:ã4‡ÃŸ^sÄF;§ƒöÞ~8¯}îÆX°NáŸø9„¿Ã½çb…¨ªö›Üó›2÷~±™uç¦Û?ëXú±.mçSZ–¥(Jç|mÛVU5–…,Kgqºm#|–º·:7Ξpx{Ó±Gãà1J}¯ŠãŸ±¿2V$ütŒå‹¯Ø[ÿ¹øzØç0¼WQ„P4홟ït8ý€uë>pÔrÈÒ½ ó–΂þ›ÇüÊYð·†hš–×£Gï^=E=c#Ó_Ùø{ªó›Iýžú‚ƒ‡…øeøEã@¨¨ê¨#°Éå×ç÷ä8Ô?ú0š.ö炃B¨FfFFÜÜH$rtÚy„£œÃ‘þ?lsˆ[ðÏCM¿%`3Å^<<Ý,«àh–˜6æ>¯ÿ$pÕ4M#!» „ÃãˆÝ9x²¾¢(Šª@†E‡å¡ñ'…ìgYÖ4MEQt]ÃÖê£Ù$Ö˜¸ƒÇÃÁ!†Nû{A–j þŽL¯Ÿ¦éÚºš`0 EQ”m™‰ ‰ñq †ù‹ ™!k¯Å;Ëï“6"ÿžØý1)üÍ#!„ ªªJES(Š „ÒR»9Ž}¢ÄŠÀ¯‡Ô6B¿b¤þõ½û4f}}]  h `ÛvB|b||ü>³[B–eà^ÝüÍ6±,+Ö¶øÕç`j‹#²ÑD‹ „¿ µôc‡òò2˶û÷ë/Š àïØ¾s‡a))©1ÁÂaÚ|^/€‚PUÕH4º­Ùãñ@ñ‚Ž¿ž)ö×üsý‹Š‹<O¿ýyž·,»­­¥¤´$3#ËãñÄÔ!Äóœ,;B¶m‡ÂáØcà÷@Q”Èóxpõ€È’´ÇOé7³¢ !»w¯Þ’(#€‚Á@aQ¡®k©©iû4¦×ëÄ'jš†V†‰ ï_B§ÃŽD°ès‡×ËÜ¿Ž¸<ÏG"‘?è2!.µô3 ÓÒÚŽ„ÇWÛ˜9»È)²gNÈ3£{»?ôð‡ëZUjcuäékyžõù| ± ÉÇ555­\³fèÁ£F OKKeÆétbçn·Û=gÞ‚ 74ˆã8Y’DQÄá—qthÜÅ!…9–­­¯ …B.—“çyŠ¢DQ´’$ †ÃLBmËjooËÌÈP”ˆaè¶mÙ¶‰„|//ðmímxLG.,.ÙYX8|èÐÆÆÆW§½Éд( C‹¢ˆ§%ã°Æ<Ï;€,I<ÏÑ4-Š¢¦kÕ»wS%I"Ã0<ÇA%IbG0®Ú½Û¶‘,É–eñ<ÏsÏq,Ëò‡á4E765¤§§Û¶©ëªm[¶m©j”ãØøø¸ÆÎɲMÍÍK—//ÈÏÏÌHŸþÞûßÌüζíݵµÏ ‚€#<ã¶¥)ÊétF¢‘Ùs樊ŠË¿«ªrÙŠ• MãUzbÅ$‰ã¸Úºº…‹—ÄŒHá(ç/íõ#€€ÑhÔí”vTµ f@‚ÛévlØVÙÔ’D±¥µ-&ø9‘˜–’j˜FvVÖœyóW¬Z¥ëFRbâ…çŸ;kölUÓJÊʺ¥¥=ñìsmmí#† =ñø)ϼð¢ßï/ÈÏзßG3f®¾ârÓ4UyêÙçý@sKËÔã?ý”“¿Ÿõã‚ÅKX–éžž~Õå—†a![ÓTŽãb“¤pI@4E©ªŠ§2€=&ºoŸ>ÇO9Žçù7Þ~›fèY³ç¬Xµ*1!áê+./-/ÿfæwÇeef”•Uhºæp8œGiYÙ¥]”™™U”öŽŽ÷>üxwMÍAO9iêGŸ|ZTRÚ=½ÛçžX¸x±nè×_sÍ×ßÎ …B}z÷þôóÏEQ<ÿì³2ºwWu @FyŽï<• @p×jï¬Å€ÜœœSOžÊóBnN΋¯¾ªØUùå7ßtøý'O=±GNî ¯¼¢iÚàAƒŽ41Ž<õÜóo¾áz—Ó% /ðkW¬œ5û'žçÏ=ëÌü¼¼of~·bÕªööŽ„„øæ€2ðOä/íõC°ÇLލI^¦õ†Öh]S0Õ‰dVT•e¹ÎFš¦w×Ô¾ûᇯ½ùÖ®ÊÊú†˲î¾ã?[¶mmnn1|X¿>½O?åä—_Ýåt^wõ•?Í·bõêÒ²²ÁŽ1òéÓ§Lž|ÝÕW¥¥¦nظ©±±©°¨xÂØ±§Ÿ|ò÷³~,.-ýú»ïnºþÚá˜3µÇ'Osµ,˲L<Y7t†¦ÁÞN-Bˆc¹EK–Üvç]|üÉ—^RYUýÁÇŸ;iRQqÉç_}­ëú®ÊÊK/ºPÄúƆÛÿuë¶;zäO9vò_}­(Ê–mÛÖ­ß0wÁüÓO9yÔˆá•UUöùØÑ£Ž›|ŒÐŠ•«â—¯\ÕØØ¸rõj–e_ë­¾½{SõÒkop<Ñ4­é:^/ O-ÆUÓhšèÎñº®ƒ¡ÖÖÖŒîÝyžßQXXV^ñÓ¼y…Å%~fF†$‰gqúq“'?ëÇÒ²òøø¸[n¼ąQoNW×uHÁ@ øú›oõéÝBøæôwªwïþöûn¾þº3N;Õ4-Òá'þ.üÕ.¶m§$'ï(.ÊNO¸|rwÝ_çBíמԓ¦`õîÝ©†y) ÃèÓ«çKÏ=ûî›Ó† lZf~^^ZZZZZ*BÈårÆÇÇ»\®†ÆÆ)ÇNîÕ³g^Ü¢â’䤤áÆ2,cæ”c'÷*(p»]ضãóùrssrr²½^OQq‰×ãéYP™)Ë26©3 ãv{Êw•;.€iš–e˲Ãð‚Á„„Ę„дÌ!ƒß|ýuÞwÏqÇS±k—mÛ••Ýs²³MÓÌÍÉ)ÈÏ÷xÜi©iéééY©))Y™Y,ÇRÅ0Ì1'Üxí5_};sÁâÅy=rºïžÕkÖ~÷Ã,dÛ¼À÷ÌÏïUPðîRÕ«  ¥¥µ©¹YàùAà‰¸¶m''%—W”ñfúûï—”vøýsç-¨®®E!ªD].Wzz·ã&ÓÑÑÑÚÖ†W …ÂM<Ç 6¬¸¤4)1¡   %9™eØp¨üµ½~MÓìÖ-†ôÂ%‹{gÅ?vÕÈ{.îà‚Å‹R’Sã„; ßšþîK¯¾¾aãFMÓÛÛ;~Ã0#‘h‡ßϲìÐÁƒßx{úû~T¾kפ ãëêëÛÛ;º¥¥9òãO?óí÷ß×74F£Šªªþ%ª¨ªÚÐØ4tðà††Æ7Þz{ÙŠ8ø "Ô#7¯©±iýƵM;œNQ’êëV¬Z‘‘Ãó|Ì®)J‰*„™™™.§3 äç'$ÄÇù|#† 홟Gpi£ŠÒÞÑnÛV[{{TQ¢J4 Y–… ‹‹išîžÞmÑ’eUÕ»ÛÚÛû÷ë»hé²@  † Ã>.7;«{z·„øxI³³²|>oFz·øøø¾}zCÛÚÛÏ?çìÜì,Ass²eYî×·oMm][[[ÜÜäÄÄÌÌŒônÝ232DIŠóyûöé=p@ÿªªÝ-­­–e;i’a˜Ø„’š’VSSS\R´eÛæŠ]þvÏüÞééé±âAB,˦¥¦&ÄÇ[–…ò¸Ý=rs6oÝÖÑÑÑ=½{bB|rrRzZEQi©ii©©²$çde¹\®¤ÄÄŒîé ñq¾µëÖÓuåe—9޵6¶´¶^zá99Ù‡œ‘Ñ=9))3#cÔÈN‡£Oï^eå5µ5ÉIÉ©))Xýqc¶·¶nݶ¥´´¤¹¹¹[ZFÏž½öoL‘4]§iêôSO3j”®ë™Ý»3 ³jõꌌŒsÏ>+¯G®®ë»w×L7®gA~jJJSss|\Üçž“œ”¤jšÓá8ý”“ ‹Kjêj òóòóz{½Þ±£F¥¦¦€:Åà @Vé"eàUº9rçÏó¡P(BN§ ½G¥i§Ë „¥(Q†,UœN‡ªª8²¿¢(B‡ÃÁ2L8ÁaUÅ) ‰°,k™&˲8ˆ›$IÁ`0¤wëöÊÓÂáð½wÝÙÞÑgíÒ4ÍÐL‡¿C×u B·Çòì>aq[14›m€·H’ˆD£x%÷P8Œ]b"‘ˆÃáÀNôÏ+ª*Š‚iš‚ "„TE±lÛẮ+ªê娢ض×ÕueY\UÓp­nLŽx–€Óé”$YÓÔ7&¤BŠ¢DEày–al„xžG¶‰FmÛ–e™¢(dÛŠªŠ¢HQ  …N§Ã0LMÓ\N'À“¢QA$ID62L3é«ú¨ƒDî$U~Ðæ?°8–/À²¬˜Kû>ÇX¶ ÷úÅãEY¶Muò@X¶ öFÝÁQ…quìN¡’c³‚cSO?ÿêëÍ[¶ø|¾«/¿,>>¾ód]l÷ÅË<` Ÿý'¸vÎtš.€¿àbƒ_ºùw>>6#aoÀdB°uöaðû€_Ìæ9S½’c6¢Ø ‰Î»:”Ž%r°R‘~ÂQÆámþ£À ò³éü a™iÀ:ŸÒ9„@,ö^Z sú±OBÀùçœuö§‹‚`Y–ñË Xébаâíu²sT‰Ø¹ø ÝiöØ+÷?à÷Vç€iYV,ÃßÓ˜Œðs°ò°H¿^*pÔÒ¥½2lÑ4­jµù{[þ½JK Ž ]ZúA§X Ðu8ã,6ïâ¸ðÜû¿èïåñë¥Ýg½­XÝÿ¾e&‡,ýxüÓét:†Ù÷¥BÈqÜo¦°Ï`×ÏC…àõcÿöpú£€ò¯,Žó# Âïl?¶î¿ÉþÿÂáA ýÂß‘C3ø`÷ð`0¸rÕjQssr96ZË0ŒnMÍÍ ñ Ø5ìuÙ+4@ ð<„ Uð“ömžã ñ"‹þ¶6Yvà€ xô²óT˜Î QÅ|lbÁ8c6¨9ì3–Ng§ìàÒY¿ö>0°ïþ¾«_u^ºË4ͦ¦æøø¸XÐÍX!±ËMQI 3##æäÓ¹Fx­öC­{¬ð±¦¬;BR V°ÎµÆc³Ç…ÃáÎÏïÎŽRûä¾ÿ.œ¦ªª8>è3">?ÂÑÉ!Ü™±Ø¿?þ䲕+?ÿêëµë×á“^¯×ívsW__ÿÔ³Ï[– !t»\>¯{ÊSåõx<·×ã.+¯Ø±³(11k„Ã!—ïÚµ}GaBBB[[ÛÓ/¼(<>ÇFŽ‹E1ÖG ‚çp8°«;V(§Ã!>.N–e§Ã±~ÃÆ¦¦æ„„Ó²p:’(Ú¶Íó¼Çãöy½’$yÜnô?VM‡ÃáõxŸ$IX¸GœÏDz,ÖÙøøxÓ2ŸxöÙp8"¼ÏçÃ%X–åv»ç/\ôÆ[oéºîñx¼ÖM§ÃáõzeI2-Ëápj݆ñù|85‡,ãlð\r‡Ã!˲Ïëa˜¸8ŸÓá°m›eY·Ûíóz‡Àó~ÿŠ•«;×ÝåtÆÅÅñ<Ë]EܼxŽÖ)ËrœÏçr:ÛÚÚ?ùìs]7xŽóù¼¸€ãªú|>Y– æ áhäzý!çËÊË›š›_}ñy†aÚÚÚ ÓÔ4íãOgH’x”)Ecwxá÷?Î…B“™äu»#ÑèWßÎŒD££GŽx÷ƒÛ;Úýÿ X– …Âo¿ûž?ˆF£©©)M}:ƒç¸ã&¿³°p݆C ìÝ«—¦i–e+víZ³v]NNvz·nõ C G"›6o8 ÿ®ÊÊUkÖæfggef¾ôÚëÝÓÏ<ý´Áî,,\·aÃàôï_\RRYUÕÒÒÚ§w¯Ý5µ–eM9v2MQ¡ÕkÖÖÕ×Cs²³7mÞÜ¿_ß~}û"Û^½fm]Cð!ƒ»¥¥uttü8gNMm¡¢(466Í[¸(;+säðẮs·{÷îO?û<77§gA(гçÌUUuܘÑ ›6ûýþ´Ô”~}úƒÁC­{[{û×3¿x~ܘћ·nÍïÑöí-[·åæælØ´)x=^š¦›š²³²âã|Ÿ~þEVfƸ1£ëêêË*v565º]îã&óù—_-[±ÒŒ1\–eütY¸hqm}ýˆaCózôؾcǺ Ø·O/UÕð®‘Çege­ß¸qgaÑ ýÓÒÒ²23DQ¨kh\¿aCZZêˆaÃJJËjëjkëê{äæ 4hŸ¥ÍÂÑÀ!ôú!„QEØ¿^nîå×\ûþGa³ÆË¯¿ÑÞѱeÛö?! ¼iš¢(~òÙg›·lmïð¿òú4üþæ[›¶l±m; Ú¶mšV[{;Ø£Í0MÓ´ZÛÛhŠŠF£ Ãlܼå³/¿ª«¯ý­·Ç[ï¼[T\Œ§ÅVïÞ}ïƒÛutø#‘È«oL‹*Ê΢/¿ù¶©¹ùžDuø;Bá„0‰hªVV^>mú;‡sÚÛïìÞ½{ÉòŸù•iYw?ðP8ž»`ÁÌïÛ¶‘m?÷ÒË +׬yå7XŽ}æ…Áà·ßÿ0ã‹/[ZZ{ê鯯Æ7Þš^\RêeÓ²‚¡Ðó/¿Â2Ìw³~\°h±,K!Ó´(šÖuCQÔWßxsùÊ•E%%ϾøR}CÃÓÏ=¿³°0CŠ:¤ºC£Ñè3Ï¿ÐÐР¨ªªªÓÞšÞÞÞÑÔÜüֻﶷw<ñ̳ťe»kjž|ö¹âÒÒºúú^y•a˜™ßÏZ±rueõîg_x‘a˜Of|¶hÉüúÒÚÖŠ§/ȲüñŒÏf|ù•(@ b×®ioOw:Ó¦Oß½»æ«o¾ýô‹/DA…B«Ö¬yö…—$QlmkkooÿáÇŸÊ+v=ù̳­mm}òé¼ V¬Zõîr÷Â+¯îª¬Ìc"Ž6Mú-Ë’eù©Ç½õ¦wì,|â™gkkk·lݦ(J[[ûŽÂ"!Žã¢ÑèÊÕkTUmooßUYµ}ÇÎݵµÞ{Ïe_4|èÐþýúŽ1üÂó΃ꆑ’œ,Ë646–”– 4pôÈ3>ÿ’çy—Ó™“=åØÉ‡Ã0  ‡]NgZjêÄ ã €n·KQ” 7åäd{ÜnË4+«ªë놡(hZ–®UÕÕ­­­6²UU ƒ‘HÄF¶Çãv»\#† 6dpJrr$Å££×]}Õºõëï¾ÿÏ>ü`ê ÇO{ç]—Ãyú)§hº~ý5W¯ß°áîüü£lÛ..)™4a¼Ïëu¹œÃ‡ 4p@ï^=§¿÷>  𦠣Šòs~U C‘hT×uEQt]Ñëñ¬ß¸))!±z÷îqcÇ.\¼xãæÍ¢(øý·ÛípÈ}{÷9|¸Çã‡Ã M†‰F;::ž§ij݆I‰‰Š¢$%&®Z³6‰àñÓ<„ºsרÔTRZ*ËÏ Á`¨µ­U×`0ˆŠ*j8ŽFUÓ‚Á ÏqN‡£OŸ^ÆéÞ=}ÃÆxòš¦i–m†ÑØÔT^^îtº8ŽUU5//÷öÝúÌ /ÖÔÔŽ9Üép 6tèAÉÉÉ4MßùŸÛžéå¢ââG¸ÿ¶[nþòÛ™÷>ôð=wÜF»¥¥­X¹²¡¡aýÆM)ÉÉxµd€aÄÔO ZäN–eË+v½ùλ‹–,©©­½áÚkòóóAX¸xIqI‰( úõ[¶|yuMÍ9gž±tÙòm;v(Š:zÔHQ>ýâ‹M›·dtO/ÈÏ_´tim]ÝÐÁƒ¶mÇÅù–-_QWßЧWÏ’²²ñãÆvtt´´¶žÎY»*«V®^]S[›×£‡Çã¦(jwmío½½»¦v`ÿþÆé––úå×ߦ¥¦œ{öY…ÅÅoNgwMí€~ýÇŒåt:fÍþÉ4Í“§žXYYµrõêÝ55}zõjim¡WÏ‚M›·Ž3º©¹Ù¶í!ƒjšÚ¾cçÈáÃÁPTQF ²aÓ¦!:dÞ‚…‹–,8 ÿEœGSô§Ÿ^V^Ásü9gi™æÂÅK*víJMIé––j˲; wf¤wïÛ·Çåþaöìõ6ž~Ê)½ ò ‹‹ÇŒ…G¿B¿³î^¯WUÕ´ÔÔ` 0ã‹/KKˆ øüëojjkâ|qôßµ«rì˜Ñª¦îª¬>tHz·4EQ/]V^Q‘‘Þ¢©¶¶öñcÇK¢4nì˜M[¶®ß¸qèàA<Ï3 óÓÜù_~ó-C3'ŒŸ0vÌ®=-VÛ»WÏÕk×~öåW4MŸtâ -­­o½ón8™0vlvVVaqñ%œßÚÖúõ·3UU»ñÚkêxŽ8`ÀÆM›{äævKMÕ÷®ÁÐ5!‘; G‡¹{˜P‡„PÓ4ATUU÷z¤Bº®Ë²lšf8Æ2¢ àð“‚ Ð4MAhàùøe‚a  ÃÄN‡xåtìDÈsœ?`/3  (JÓ4UUãâât]Eñîû˜rÜä ãÆF£Šax—aX^qø3ŽecéÄœ1 Ë+¶lŸø'Ë0Ø<%‚¢(øÓ²,I’ Ã! Ù¶Ýcéà¸:‚ àp,Ëjš†<¼ºAƒŽã8Žóûýxù_Ó4ñé±tðÁ¡PÈFHàyìjiÃ085†¡uýçu()Š ƒ<Ï˲lÏs~ÿžÜ¡Pˆçy‡CÖu#ª(ȶ½^/vœÅ««ªÊqœmY6Bxa<œÐÅ ý$|á¨â0÷a5´,KE]×ñEQhš’åŸü9ŽÃ˜v÷Ž* MÓ’$a³2èpî} àg^¥+æT®¨j̽oÛ6ÇqÏ+Š"Ëòæ-[[ÚZ‡¬(*®•Àó8÷Ø‚_–e)–K'V€}òÂéï³ÿÔ @AF)ŠR•¦iš¦ñ#3â‰lûtøD\°SQ,¾‡]w@4x€Ò4 {”âbàÓcéàƒcÃOA,Êx¯¦ýâ­Î¶m·Ëe#„[OQ~‘;Þ¥ª„P–$€ªª±L£ŠBS”¶7Rç¦;Ò—:@8‡9×9,0EQ„~îÎÄ”´sÔߘˆì/û„Ììü%"¸3!k­Üt»œ7\s5˲1á³ö ·¹OaöÙþ›ˆ}¢½á6) v®KçÕÏ÷O‡êÔPûWÿPëNQ”[i½SüäVgŸ‚ì°Ö/Sëœ{ç]ûgJí•ûfD Ž6ް÷B@¼\û!ƒû•ééÝ2)Zýå2/`ñˆ~„GLúÏê"¿ „Ð0L˜Ô-бâ!,Ë$ÏðOâˆI?˲‘HXQ¡C–AŒ ~ð–dìvIÓt(Òt¦(§ÃÉr±\„ G@ú±E¾´¬Ô²,A)›šNgz·î17 u2Ðïïn âö›™l˜aÿÃðàmUU%ÍÐ<Ï[–ÕÐØŸ˜˜h˜¿Pÿΰ¿³‰_;Œ½ð¿pd¤¿¨¸Ðãñä÷Äê¦ëúÖm[ªª*³²²ck¬Â¢,Û– 4MÓ0 Bk,CÓ¼ X–¥ëúoÆÍ—DÑ0ÍØPðÁd{àïÌÌÌî–Ö¦iÛF‘Hxë¶-¶m%'§t.˲øÙ@Ó´®i¿î½¾O¦EI’*;ÞáUU‹Í· „?¿Tú±\Ö××AŠêÕ³÷¦âÚ¯—WÊsñqƒ X¶b…/.ÎépbïFžç«wï~öÅ—$QŠF£Ç;ýÔS ÃàXÆ0Mš¢¡Ðô—_aæüsÎNLLÜ»8-„@Š˜¦‰cÉÑ4=ë§9ÙYYùy=°ã|ì€]æñÛBˆaØòŠò8_\F÷Œh4‚‹-ŠBŸÞ}6mÞäõú°S¼mÛ‡cÅÊUïü‰×ãæ9þ’‹.ÈÊÈÐtã¸ØÐ„‚;ä°,cšVlKGGÇŠU«§;™eYìOÁ³LÓüòëoÇŒåóy±/&ö·Á¹“ç@øù«M E565evïVÛØöÌWÛ} ñA‹{ú³M–eÇÇÇ755a-ÆsÇ:üþp8ü7^çmÿ3j”®ë¶m×76š¦)Ëò×ßÌljjšzÂñDz¬p8Œ'.aÏôh4*Šb$ini±,‹fh?7·´àiJ<Ï·¶µƒ¡˜9ȲÌ`(––†mÛBÈFÈV”¨,K’$¶··añEq,[[WÇqì-7ݘ•™ñê´7)Šâ8®©¹ïİH4j†eY –mE¥¹µ•ã8 ES8rss3žLÓtsK‹ªªBš¡MÓ„{MI¦iò<ßÞÞ ‡yž?Ò— @ø{ó×öú‚ªš*ñìöêŠXž‹cjÚ[ažc ½3]-ËÞ¾c§ªªãÆŽ™õÓœù z<Û¶oºþÚµëׇ#‘õ6"}ðÉ'†aäde_zñ…=ö¸¢ªC JKKýö»ï%IºúŠË«ªªEAüð“OB-­m£Gޏîª+§Mgû޶ââ|÷Üq»¦ë!]Óö™x…£è†áÏ‹±0 ãõxR’“âãã5U£(êý>®¬®¦iúú«¯ª¬ª~ëÝwÓRSÓRS7oÙêõz‚¡P·´´²òò3O;mÐÀ%%eyyŸ}ù•eÙ}zõœzÂñ¯N{3‰&%%^tþyUÕ»ÛÚÚÛÛÛ¸÷žéï¾§jZnNöÜy h†>yꉃÔþVÐøK{ý@ÀóípVŠÓË©UuþŠê– Àëàƒáˆ(ж½×&Ž„0 —–•—„B¡`0˜••ùâ3Ouø;À„ñcGyÕå—M›>}äðáO=öhiEù¼…‹TU½àœs¦;ù󯾾ù†ëïûï]ÙYY•ÕÕÁP0 ]xÞy7]wíÚõë×oܸ~ãÆ§{tê S::ü±ÉY4M«ª Ð Ý4MÓ4LÓ´mKÕ4Žãc3×B,Ç®]¿þžZ¾rÕ­7ßXX\üý³GQYYõÅ×ßP4ÅÐÌýÿ½«[Zš ðO?þX8™8~Ü•—]:á"]×ëê+«ªv{̤ã;¶¹¥eͺuô?óôÓhš..)éÓ»Wù®]¥¥¥Ûw¦¥¦¾ÿÑÇ={PõæôwY–!Ñ`Âaó×óB`YVz·ôí…;¦Lžü§õþim¥GŸ6n`$©­©9b´aè?G0Í99wßy;þ9wÁ‚„øx†eã|>ÛF82eÛ‘h4''Ûår%ÄÇ·µµ9δÔTÃ0lÛÎÎÊÂ&xŽchZ–e—Ó©šÇínjnÁ WyÜ–eÑÞŽ|||Â΢cÇŒ‹F˲ €.—cwmu$IJLн @ Ý7fÌýÿ½KÕ4§Ã1wÁBŽãBáð1“&0 µ­-11Áåvsçr¹8–MLH!$ŠEQÈFÆËÌÈøxÆgËW®¼çÎ;^~îÙ/¿ùvùÊUwÝ~˲ÝRÓ† ôê´7%IÊÏë‰Du]ïY?zäPáH_<áïÊ_Ýë7M311)1.qöœ¹c\{JŸ‹ŽëÙÚÒ¸xéÒü¼äŒ )jóÖm÷=ôðmwÞ5áBÛ²C¡0  Y–¥iz8á8îøc}sú;?ö„ßï?aÊqMÍÍ¡p(3##3#ã®{ïmÚ›Õ»w†¡iz(6 Ã2­¦æ–‘Ç[¦y÷}÷Ïüá‡XdÃ0r²r Ý\¸hA$FYÈÚQ¸mãÆ½{ö‰£‚š®«ªJ3ŒaÁPh@¿¾™--­E9²nèÁP ëz(FCAÝ0tÈD"–e醾fݺ5ëÖ9ŽööŽòŠŠÙs纜ÎÖ¶VÃ0¢Ñ¨®ëÇLœ0{μÞ={ö,ÈØ¿_ss3@@’$¢ûááÐ"wþ!à kÕÕÕ•»+ÛÛÛhšIˆ‹ÏÍ鑘˜ˆ‹£(*ª(;vjšjFVf¦(Š–euOO/)-MNJ G"–euKK£(ª¨¤¤¹¹y@¿þ.—³¨¸$½[šC–5]_½v¢(#G ïèèpȲ?HKMEí®©éYP ªêö;7mÙRS[ûÔcF"ÞBXRZRS[øy^HJL*Èïív»öñìljnŽD¢Y™x¡+–eý~ÿêµë C ¢¦µµ-¯GnKk«ßïÏÍÉ)-+KJJ477§¥¦ÖÖÕ»\Î 7AÇŽEÓôªµkáððaCS’“‹KKÓ»u¡¤´¬[ZªËåRUuõÚuáp¸w¯^Y™dáÿ$r'á¨"¹óH,{˲ð ^ŽåûO—¥(JE¬Åª¦a÷GMÓpÜPš¦ñO€(Š,ËâÞ4Þ‹c5˲LQ0‰24mÙ6CÓš®Cyž‹D¢åqqqï}øQ|\ÜÿÝx}G‡Ÿ¦iœ5ÇqØ¡Çñ>÷™Ï…}rpK°×^„£ZF£QË0ŠªÆ‹…;åXVÓužã,Ûáã’% RPUTM7DQÀEQÓ´NÕ¡TU%c¼ˆôŽ*3hó„?l°Ôš ’cÛ6¶™àà ±s£Ñh,Â~,:1Øë‰ã*cGxÚR”aš]×)вm;‰Ò4]V^ñÙ—_ege{Ö™¡P8¦û¬­x žJ¶ÄMÃ0tà:…«4MÓÄ6 ; á|q±QÓÄï4±G.y—¶S-ø]äÕ9ô™ÃЙ#Ã'ÖSîüsÌ`ÿ·t~H,3~Å9ëôÓÎ=û,€P$ÝÇa¦sñV¶ýxQîœÝ>Šá|ÀZ°:ð¿Ð¥—ÌÆŠíûGº,ð×Ñ¥¥Ÿ(>@蚦öY6²÷›RdÙð$£?·ôåÙ%7NÉ]ÑgeG@è²Z¯Ÿ‚PÑÍEÛï9£ORœ´p{#ÏR·}¸)Ñ-œ4$ÍFˆ¥àk³ŠÝú`ɮݭ‘4Ÿxú°ôÅ;š>^^5}mmkdbŸ¤‡¾ÜÞäWïýl›ÀÒû$yÜC_îh i)ñÖ÷6FTó®O6'º…“‡¤Ù6@ (Ÿ¸pàãôÿdEõ¤‡ò,ýÁM£®˜”sÇ'›¯|c ÇP¤ëO ¿ŸC~!‘£ËBkËÚžþ®pYaÓú²Ö-U~]5ï;§ï”)¿ÿùã³»©´µ#¤—6"³¹²CSÍûÎé{lÿ¯ƒ³lô6Ô­Õ~ôÓã%ÁîÖÈŽš€ÀÐ)>‘È>@ ‡bðA€gé—Tß7ù?gö®nŽÜõÁ¦ŽF±Ôë?•&{„ÖÖ(ÇPgè~îÓKï>»/ÇÐ÷½·ñ±+†´t(Å4¢†?¬#T3ãå¨^û©dD^|zœ”™âLñ çŽÊ°ÈJ£zã§Ò$ÐÞ…B Ózð‹mŠnß}Fïñ½Kꃷ}¸9;Ñ1íÚa©®@Ô ³\ á÷C_qÅÉÉɱå^†iïhçXÎépZö>kÀBÁª²ÖsFg ÏËMvvD Ÿƒ?mXúKvUµDzfxFæ'¤ÅI-aýÜÑ™¹É¹[D™Ø'IÙüTwzœ¸«-z\ÿ”™ÞÏWî^_ÞÖ?Ó{ü€”Ûno²m4¡wR~ªkÆÊªªæHAwÏø^‰,M™6šwùÄœ4ŸˆšÇõK9L¦Ì3!Õ¤("ü„£š¦›[šÝn7Çrd‡¦é¦¦¦C‹Ü‰pK¬¢[ªaA\§€çhËF E¢:„À#saÅÔ-ÛÁ3†eK£™EAôuÓvIlH1x†æÊ´‘nXÏê– «†È1CY1 *BBÀP”fZ B BŠšaS$ª áè†Dî$UüväNPì3¶ BØÑ „4ÈžÐÁQÝ"„h "Z*EA  b@¢š¹7  hi4£šÑwÙ[õ=¡;ï Blè¶ÀAÕ,Y6  >¢þ„£„ééŽB ý8¢MÓ1+Pg]rbÁ¸Ÿ£~픃E üAÑ4~Ù‰"Ž8ûJ?¶ùTí®jik±-›t¨ „ÿ  „Šª°,Kºÿ„£‡_H?^~$595)! !DtŸ@ø@¯ùC¤Ÿpôp`ƒ^åêH—@ø‡@DŸp´qða^r±Â?2¢J ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]"ýÐå ÒO ]æ×wÛ¶@)ê7ž!á¡–!d#Põ›)ÄŠ ¤ <Œ;Õ²¬ß“)@ ü“ø é—$I€iš¡pøWޤ ¤YÖ0ŒCÊ!Ä0Œ,IMA£Ñ¨ªi¿.Ä¢(Š¢²,;š¦y°ã÷_4Õt¨?@è:TúBÇ-^ºìó¯¾VeÈ A—_r˲¶mCB„öÞ¾3„PÕ4ss|\MÓ¸+áƒñahïO|ŠÀq­mm¯M{sûÎ<Ç_xþyÇÑt¡iÛ¶ñaÏâ8nåªÕ_};!;33óŒSOIIN¶,káFÑ4MS€Ð²,\$\xUÓüMM‰‰‰š¦Ýô¯ÛÎ>óôáC‡F"†aöÏ”<Â?Ûp,Ë’Dqã¦Í>úXVF÷ÁD¢š¦q'À0 @àyl-q8Ûwìü¿ÿÇïP%EQ,Ãp‡bY–a†aDQd†çyœÇ0­mm7ýë¶ ›68Ðá%*‚(ðQš†rGÓ4Çq‚ ÔÖÕ=ðècñqqùyùeåå­mmYf†¡iš¦cV)!˲~¿wmmõîEQ8ŽÃºïñ¸·ïÜyóm·wtøY–Íë‘ët8(ŠEqÿLAÀáäHßéÂ/8@¯Ÿ¢( R,Ëjº¦(JZZÚÉ'žœœÔÖÖ~ÝÍÿwÊÔ©_xÁO? …†üÙç_êº~ÍUWΚ=»±©ùº›ÿïê+.ONNzí7Ç-7Ý@QôÏö¸C–§;999ù»f9ŽsÏ>sæ÷³š››o¸õÖ3O=­¾¡!‰ƒÁÇžz¦¬¼¼s¦þŽÞ½zýçÖ[X–%·.áBhšæ‘.ð3¿~„˲͵uµ¢ Ž6ôõ—^|çƒf|ñŘ‘#ï¸í_úõûjæÌSO>iîüÿwÓ ³çÌ CgŸyzïž‘H¤°¸äÎÿü;ÎçûÏï.þí÷Þ…ÃMÍÍ¡`(ÔÚÚ¦éº,KO=öˆ×ëmkk‹Lœ0gþ‚g|vòÔwUVÞöÿ—–šúÉçŸMš0~ú{446ì›éçßÿð#ƒ ìžžªë±ü˶zæõd†ô!G ûöúiŠ…BI IéÝÒ[ÛÚâã?˜þö¼ù ®»ùÿ&M˜pñ,_¹òÅW_KII5|xf÷îkׯŸ3ož,IÝÓÓ)Š2hP}CC86 37'Çét†#¯×;zäȲò]4COž4é½?†ÂXIèÿÄ3Ï._¹rØ!~¿?766å÷è1 ÿü¹»kj$IÌÏË›8n\jJJ8)ÈËcYvôˆÁPèãŸuøýšªMž4I–¤_|Á2ŒeÙ Ãp,ËóÐír÷îÕ˶í·ÞyWQÕ¬ÌÌ–Ö–Äøš¦ôïÇqœ$JEÕÕ×äåí›éøqIII^½Ãáðo:8ûƒâ8nGáÝÐÉë#áèa_éGQÅ0ŒÓᘷ`Á½=çóY–5yҤ쬬ää¤Q#FLïý»nû·Ãáxçý›[škëêýÀðaC†9íìs/¹èÂIÆ—”vKKKKM¡µµ5 ¶¶¶P0ØÞÞn:MÓ~¿ʱ“·ïØyó¿nKLHhmk»éúk/»ø¢{üÜ‹.nmk{äþû_6-Ñï…Ãííí¦iF¢ÑöŽŽP8ŽDêr³³GqÃ-·&Æ'øÁœì,¯Ç}Õõ7D¢JNV¦ª©í튪X¦µkW%òYjmkOJJ¤iúÜ‹/9ý”StC×uý‚óν÷‡˜©mÛDZ,K¤Ÿpà7i–etA„_—/_Þ¿]×ñx&Ïóee²$§¦¤¶µµ•–•765y<î!ƒ‹‚ÀqÜú nþ÷>ûðýîééE%¥UÕÕÉII}z÷bfWeeÅ®Êü=â—._ÑÖÞÞ¿oßÌŒî[·o¯×ëñX–Ås\]}ÃÜóE¥(¸«ª*%9YÓ´EE‰ sæÍWT…¡™GŸxrWe•ÇãNMMÝUYùÓ¼y,˦¦¤TUWoß±síúõMoÜ´¹´¬,3£;Ø«ûÁ`pþÂ…55µÉÉI<Ï/]¶|óÖm™Á`ðáÇŸ¨ØU™’”¼eÛ¶^yeÙø8Ÿe[>Ÿ·¾¡aÛŽ6nJLˆw¹\Á`pμùUÕ»5MKNJ*,*Z´t)a||À´¬^yM×SN:Q7Œ’²²òŠŠÌîÝwmܼÙëñȲ¼}ÇŽ›·”WTØ6š·pMщ ‰XzEY¸xéú ].§(Š[·mÛ²m{QIIZZª,I­míËV,F•ôô´÷?údÆ_:΄ø¸~œ‰FKËÊ}^Ïçkmk›õÓO‘p$3#£©¹¹´¬|ÇÎ,˺].Ë²ŠŠ‹;çNA˜––ZZ^1oþ‚Ý5µ©))‡£°¸xÞÂ…EG"‘y 麾»¦&+3#¹\îP(´£°pÕê5’$ÅÇÅiš6gÞüݵ5ÝÓÓà¨@0Œyø`ux~ýÆM¶mäç­]¿~ÍÚuªªíª¬Z³v]z·n¶m—”íØ¹³±¹95%…e™ÖÖÖ¥ËWD¢‘ô´´ÊªªÒ²²Ò²²‹ùõ·øQ‡Ã®ahŠGÂEI’ô;Ç–išnniv»ÝË‘ÇáˆCÓtSSÓaH¿åšµ“&Œ¿û¾†Ù¸yËÒ+|>ïÇ3>›qüø¢’’æ––5ëÖ·´¶RõÚ´7eYAÅÙsçäçýí̤ÄÄ¢’’†††¥+VlÞº•‚ÔWß~{”ã^ëí`0TV^Q[_?dÐ ýH,r !ôün—;&ýøÕsýÆ,Ë"=ñìs=rs¦½ýÇsÅ%%¥åy¹9wÜs¯Óá˜=wž¡ë‰ ‰<ù$©¹óÈ’´iëÖOf|îr:këêZš[Ÿïâ ΟrìäòŠ –a°$3#ÃßáÏÏÏã8vþÂE–i)ªºtÅÊìÌŒýûuúé'ü˜‘#s²²þûŸÛrs²@4MÅù|—]|ÑuW]‰D–,[n#ôß;n?õ¤“DQŒ‹óy=nUQú÷ë 0 #))©ÿ¾#G ;天 Ã\pÎ9—]rñ¢%K®¹òò{îº3))qöÜyéÝÒ®¼ì2Üb·Üt“$IMMÇ麞””Ø»gÃ0mmíuõõ=rro¾þº3O;­¡±é§yó³23þ{ûí—_vÉüE‹GÞ·w¯ÿüëV§ÃÁ²ìÅœíUWjš¶jÍšÒ²2„PCCãÆM›yžëÓ«×ýwßUŸ¯ë:Àçõ]}Åå±ÜeYÞ][;|èÛÍqlYyù·ßÖ§ÝùŸÛN8~JT‰äå_}ÅåãÆŽ©¨¬äyŽ¢iQO?ùäÛÿ}+Çr[¶mÛ¸i3B¨Ãï_³nÝ‘½”-˲÷‚ãDø Ùýûô¹îê«3º§3aüÅœ_SS«jZrRÒuW_uÏ·¯\½fÆ_äfgßùŸ_qéÅßÏžmèÆÄñãn¹éÆŽ;.??ï_·Ü,˲a?'n[6²‰­Ÿðwç¥!`&ÀÐp8¤*ªmÙ8|„{Þ¸uM „‚éݺÙÈ.)++//×4Íëñ*Š¢¨J$F•ò]~?QáŽÿ+7'ûö»ïmhlÍ0’$ºÝ.›Døô‹/.YZ—òÔA˜ñŗȶO=餾}z/Y¶ B(±ÇLüàãOX–5b„mÛ•UU|ò)MQcGbYvÈàA/½özB|\=ÖmØðñŒÏhŠ;j”$IÇs̛ӧû¼^¼Ò¶zgdtw¹\¶eQåóú°¯ŽËé´l›¦é`08mú;š¦÷ëÛ7;+ë¼³ÏþèÓM¹ÙÙ}ûô>þ¸cß~ç]—ËuÖ§ìßï…W^½çÎ;Aðz½ Ã@A8 ÿ¨#î¾ÿAÓ4“’7oÙúÍÌïiš?v MÑ0m»œN˶>Wàyš¦¯ºüÒg|¶rÕš>½z;iÒªÕk8–ÝÛbÐëõ²,ƒ°L33#ƒçù9óæû¼^‡Cöy¼BY’X†=nò1;‹ ÿ{ÿ‚ \uùeq>Ÿ×ëyþå—o»åÿâã9–ÅiöïÛwâ¸q3¿Ÿåå³Ï<]–eÛ baòˆóù†þ9w—ã¸Þ½zmݶã¸ÄÄÄsÏ:ó…—_ý×wìää¤$¯×ƒp:²$LÓt»]¢(R4åt:ÒRSÎ9óŒ¹ónÞ²uøÐ!¹ÙÙše)‹¿eY1/<ÒëpÊR,Ëú¼^dÛ>¯—cY„€Çí¦iª¡¡á±'ŸG"œ{΀~}ëzìqAn¼îÚE‹—°,U”Þ½z.^ºôÕioÞpí5NÇÏþ{™H¼û k´9%)E7ÁzkÛ¶,Ë÷?ôHß¾}&Mïv¹ Ãày^Q¼KÓ´ØÁ,ÃDU`@C¡¢()ÉɦeI’t÷}÷Oœ0á¸c&…#‘H$¢(JJJ öõÔtÙ6ÏóEµ´´`W–_«!„Š¢A¼B ÒœN'˲,躎l›ã8Š‚QEe怵v8d©_|±qÓ–gŸx¬ªz7¤ 6£0_„Ïq¦e)ªêr:ÅÙ7»ßÐ45..nŸÈ0E±, †$IŠù}ªªÊqÜ>Õä8®µµ !Ûétþž?BÈ0tCc“Óá» µ¶¶:œNî·–A<pí:{@þÅT×T''&w^PíÇüPMÓdY?$Q,«¨˜6ý›¯».!!žç8Ý0DQŒD"‚ `“>…¦i†apØØ¼0ìäÖÞÑ.I’×ãý=«8 Í„£ŠßÚ|PÃ!‡,§¦$·µµÓ4­¨*¾…bÁœ1ºa`ÁXOÍív{<Üë¶mMÍ-#† * „ïÂAó-ËbhÐ4ö׎C6²~õv–N§Ó0 |Ã0‰‰‰X tÃÀ Ú¶mYHàùýoN,¸Ÿùu ܸiÓ©'ŸdÙvBB<a,@ôþ@5]‡Š‚‹}Ð#5Íá].çþså°ñZE\`œÖ©}ª©ªªÇãÆ§ü΋@×ä¤$lÍÀ-œ˜˜h[–ý[£‘EQ%Ir8¸`à…t¨ìã׈òÄMSpÝÐ Ó ‡#øÍ5ª(E…B!ìdöÆ*Ç)†›Ó»PáÜI,þ„¿-˜ôCUM»ìâ‹â|¾PhÏJ¶T§I@û¼rÅtͲmA®¼ìRžçcr“¼Îsô¦ù»4÷æb“›°M V’ؼ©0!Š‚9ÙÙ»v]så•}{÷ŠD"Bû·b6ÄæRýfßg}ÀÜ÷™«Ñ<Ô(fÂØB4{›ô÷ÎÓ¦¨ƒ–ù/&Ãç7Ÿ@š¦Çû|×]ueÌF„[ì`µÞ¿vxHùoâ‚@øþHé7M³ß¾¦iÞ²Vø]׳23ssr:÷”ÿ÷;íL!0°¿ƪš¦(Ê?éÎÿ»×Ëýï”cÓ4AèÕ³Û!#/„Jð á¯ä4ø@ñ¢]ÿ‹šà~(^]ëH7Î/ˆD£xõ®£­`]!˰Ñh”ã¸ß¯þºnÐuxæ]×mËÆs¤I$Âß—ÿoï¾ã¤ªî€Ÿsûôº–…]ÚR–ŠJ£Ø¢K4OM|æ½g’—Þ56@ЧÑX" ±`¡7ée m °»lï;[§Ü~Þ‡†ÝÅ‘–ý}ÿØÏì”ÛæÞß½sîïœß×S[Wg·Ù½^w(¦Y}Š¢ÐBW,Ër,«¨*Ïóˆ¹kt‚FˆÖ#¤c¨Ñ¡ßhÀ­««³Ùl>¯7——W HíÏñüÊ|8lè1YYš¦±,«(²iŒ1-B©ëº®ëÇÑ¡öé<Ï·´¶º‘’’L‡nE‘[À„çyºFÑ'yž{óíwŠŽOHˆ¿qö¬/Ö¬{ò‰Çè”Y–‘eåÜ¿¾,öªß0 ·ËõÊëݼukbB¢aOüǣÆ é †X–áyž~§t¬ºèŒ(Š´:= ‚ÐÞÞÞÒÚ:0-M–åh ÿé«~8+ƒ«Üù\õ²lg0èt9Ÿýãï !ºaTUU¹Ýn›ÕZWß`±H ÃtƒŠ¢ôï—Bâ8®®¾^Ó´Ô~ýdEioíT%‘Ÿ{iñ o2i"†ŒçyY–‹Žóûl6›ªª.—Ë4@ àñxTU-:vÂïóú|¾%Ë–:ô¶[oqØí¡P(¿ 0m@ªÛåjïì ƒ@ --­¡¼cœ>0MÕ4Œ1Ë0„‚Â"I’’“EQ,¯¨ˆD"CÖ4mñ²åC‡ ùÖÝß,:~|éòWŸ|ü±!ƒ3è Í­­­@K0œ‘N¯ ‹DQp»\^¯·¥¥¥¦¶69)ÉétÒS׊V¶wtþÇ÷²Ùl¢(VTVŠ¢˜” ¨*BˆÁ¸©©¹¶®.>..99IQ‹Å’“›·qóæG~ˆaC7ê虩¬¬<"G†dd˜Æ øç¢%´ècÌ07Ýxã÷ü^[[{$©ª®IHˆWUµ¦¶Öëñtv;:;¬K\\“‡¹ôy½­mm²¢BöÈÞº}û=ù#¯×+ðüéáÛˆ Ã5ƒçQ ‘Âs\ X·ac89Ó/%eÓÖm›·nóû}¿ûÓŸoœ=ûµ7Þܰió¾ýò gÜpÇŸ|ºòósrjëê“’üôOJO–9r¤ädYyEE\œÐÀˆæ––gž{¾²²ª±©QÅç—,ÓÜÅ¥Ë_{}ÌèQÏ<ÿbEeeSs˲­^]]]c‘¤~)É‹—-¯ª©Ù¹{Ïä‰?þô³7ßz»®®n凵´¶~´úS·Û=tH†ªj„ç/9ZPpòäÉQ#Gfçæ}ôÉêã'Š--¢ ¬ø`Uum­Åb)-=¹{ïÞºúºÌá÷nß.IÒ«}#¿°pÇîÝå•Óo¸þÅ%/ï;°÷ž}‡MNJzî¥%MÖ–‘#F0 Ó¼óÞŠŠÊŠp8þøË;ž|ì±?ýî·9¹y¹ÆùýOýðñ_þïÏÒRSÿû?Ÿœ=cF$a9NU”ÚººþýRæÌœ9~Ü8žã=zèð‘Ç‹¢X]SÚ¯ßì™3§Lœ8~ì¸oÝýÍïÜ·hÝÆMÇO:tï¾ûdó28#˜¦$J²,[­„˲·[’$É"EÂcAàyžgXÆ0 Q”h”Y×u“z_4))é¥çþ¢¨êO~ñ«`08gÖÌ?Y}´°àÚ)“}>ïâçþ¢¨êOù«Ö¶6C×iiEQv»Ãáxò‰ÇƉDxžWUÕít)ªÊqœÀó!“Žãþüûß2äõë‚Â"QlVëˆÌÌŸü×St”vÚà«ë†‘ Ã0 aYaÄq$iþMs ‹Šò’$ñšÉ“£7úUŦ¡B„cÙÖ¶¶wW¼/ ‚Åbu»]7ÏŸ·nÃFžçãü~Œñ„ñãV®úc™¹sæøãü¿üÍï~ú?ÿŲ¬i˜º¡Ó4¾ŽŽŽ)“&mØ´ù±ý§¦é‡}÷¾}Ûwî2 Ãf³c†¡÷±ÇŽÉzañÒ—,ýî}‹²órÿçgÿ«(ê-7/HJH ÷œUU««ohmms»Ü]Ý‚°aÐÅVâü¾Æ¦¦¿½óî-7/زmÇr´¬š*6ÓKsŒÑ{+Wæ:¤ëú=wÝùÖ»ï=õÃ'öî;°dÙò;.¬¬ªzî¥Åeåsç̾ẩÏ<÷ÂSOÿ´½£ýчܳo¿¦h‘H$#}P8ùÃ3Ï>üÀ÷œG4©,:/hñWµó+ÐHÓ:ëêëeE1 Ãçõ‚\.§Óé,=y2%%ù™ç^ˆóù'Oš8dð`I†©¨¬Ô4Ž¿ßÖÖæõzY–Õ4­¢²Òï÷»].šhQ\Zì Ž1Âf³Úm¶ÿùÙÏÇ{Ï]w555•–•Ñ—œN‡a••’$õKIikk;vü„ÕjÍH$Ë !Äá°77|>o8Ö ÃãvÓµ¬¢¢¾¾aèÁ ññ¡“åõ ý’““““B••IJNNîè設«ë߯Mþ‰È²Ëé$„´µ·ÇÇÅqWS[»õËíÇŽÿÕÿþ,7ï Ë2£Gâ8Žf€p[]S«ëú€þý B'ËÊ$IJíߟ¦ñ<ßÚÖVTt,9)ÉãõجVº1Û;:^–åŽÎÎp8üÒËËîºýö”ääÔþýèECeuµÏëõz<---˜a,’Äq\GGg{G{B||tÐVBˆÀ ÖhW©hÆó®ÍKS߆ÁišŽ2 C×uA,é±=uóüy·Ü¼ Ð÷K¢ˆ‰È ÃpM§“DQÕ4z÷ŒÖjg0¦+*+ÿøì_žùýI}IVz¤I¢h˜¦¢¨ÇJ’tªÁ„aè’D³÷0Æš®ã®e`9NUUÚX$Š"Ïsš¦©ªF_5LSUUŽeQe…fþ± £Bˆã8UU³srEIüdõg#GŽxè»÷˲̰L$"G¯7éÖÃÓ"34y)ZÁ‘&þK¢¨ëºÞ•rŽ1¦Û„.6Ïó´ êÔªšÚUhœMEUE¼?¾Û>4+cD¢» ÝÃv{AQÑ’e¯,yþ9–eBá0-À ‰¢¦ëªªÒvÂhÂ.MŽýŠ^hik±Ùl·G7ôÚ· B?¸¢\xm^Z¶Û“ ÃÐCëÆÙ³’“;::PW$YQPWg™h>;!$‰Dû,BÂá0=Àxžïì Þ4g-ÕKË¿ÐLjúöˆ,#„† …pW0:ú‘è¿tñ"²;EQdYÁÅNc¬†ŽDkF³žh/­ˆ,ïÏξfÊä›nœÓÖÞnš&ý|ìŦҵ²¡h­×諺®wžY 1ºM¢£Ó‰]BðÕhs|·gèÆD1MÓì ]Nçü›æCAz}@k4C!ÔUNu};Š¢(=:å¦aš&ôæW» È¡×xD£ÿ7æÏS5-¶Sì›ÏöÅ”g‘eyø°¡£GŒhìV¹%vʸ·'¿bâ1ÿ"t–Ïöœ óæÞ¸ð7kšFÃD¯•[¾b{.FÏy±j[Î !„˜äT[|¯íïäÔ_Œ°¦i‡cÁMs;ƒÁSå|c?Bz<ˆyLÇë7MÈëÿ¾æÁà¿^ Ñ4ÍH$r¥UÅ ƒ„0P ñJB›k4]ã9þ#2!¤£³ó‚Sf !¦aÒÛïpí®^WbƯq:_ïª]qËŠóÇ544\²ÙBœN§Í­öàêƒ6ƒ«!Äfµ¥¥¥ºqi.Á1ÆËAÜW»³†~hÐWÃ0†áyþÒÌŽ6÷Ÿçg.ýVàŸè=ôÓ&TháW¾^‡ì¾s<÷3pS\qzýª¦ÊЬue". ìÓ0 ÿàŠr–Ò½üàÀq®L½‡~A,’…c9¸Tà_aSD–eáæ¸¢ôú£CÔBƒÿŠS·…!ìƒ+ÌYoäÂõ>_8’À•òúÁÕ$¶ÝükÿIzQ'ÀB?¸šððÀ‰‰‰Ñ±é9ŽkimxÁaw¦Ñí˜a&ïÏÎ),:V__'ð<ýiL2Gd¹¤ô¤ÇãFÑ’¦‚ ÔÔÖ677»\.Úçu• ?~â„Õjvħ/ÑÇÇŽŸp¹œuõõn—‹–eÍ?xø°Ãîhmkkïèp»\]Ë€#„LÓ4º~BxŽ+)-U…ŽºE¥Ë]Ó4yž¯­«kiiñxN`¢ï´HAHÓt–e¢ýø» ÃŒ>ŽN“Ú¥/B¢Ó9õ|×tb+¾Ò±1𮵢(Å%¥.—cl˜&A#Äq\s °s÷n–eG´JAtÖ,˶´¶ÖÖÖ¹].QBšÞ}î±k==Ðo¡Û’D—“.3}À0LѱãÏÓ"'±U évˆù€eYI£¥uν*/:V7|ØpŽåX–µÛíÉIÉ¥'KÂN§“–j¡ß`EEERB"Ã2å•MÍÍ>Ÿ—ÖUïú)pƺ³, …Nž,8a¢ËíÍ.jl j™DQ>!6î‡B¡C‡Òº]†a;n³ÙxžîϽžcX–mljt¹\/@Ž?¸ìX–mhh8#Ð4MQ+«ª~ó‡?ä<øþª,yy9-ŒåõxÜn—(ŠõõõK–/×uÝjµú½^—Ëår¹Ö­ßðźõ^¯×f³Ñ#Äív{½A4M{éååMÍÍ<ªþ¸Çíöy½N§SÓ´–, ‡#ë6l\»~ƒÍjÕ4Íétdçæþíw‹ŽË=˜·fýúu6Z,žç}>ŸËé ‹ê°Ûãü>:;Ó4m6Û›o¿s$¿ÀëõŠ¢hš¦Óáðù|n·›¾ßív{.Î4ÍØí] §Óá÷ùDQ$„¸\.ÇãõzEáT´"„Øm6ÇãñxX†q»Ý^¯—ç8„ÐKK_nko÷ù|<ÇÑ3¨Ïëõx<ô A·˜Ýn—$©±±q͆ñññçþãƒÆýÖÖVÃ0¤…‚š¦èº‰„MÓ4hPm}Mô2‚ÁXÓ´ßþñÏ'ËË!¿ýãŸêêël6›×ëu9=÷ ºy«ª+SR’Axvž÷¶—½üyÑÛk%&Æ[,Öú†:žçé^$ B}C÷|èâr:#‘È_^|©©©Yày§ãô¦»ÜÇ5çäü|0B†iŽ=úw¿úe ¸ÿ¡‡[[[EQ|ã­·m6Û]·ßÆq¼E²H’”“û厇ãþû¹=î]k×?óÜó™Ã‡Ïœ>- ¾ýîß;:;o½yÛí¶Z- ÂƦi¾³âýÊÊÊ1Y£¯»öZ›ÍŠ1EDcJ ÐòößWˆ‚à÷úR’SêiÁÈ£ùù7o4pàÜ9³MÓÜ´eë‘‚‚ cÇN™þxqñò×^ONL¼}á™ӧÍ/Ø»ÿ~ýfNŸF#Çq¹ywíÝ;lðàŒŒôâ’Ò¹sfµ¶µoÞöåŒi7ä<´s÷î¡C† 2xùk¯'%&Þ±páÌé7ìÙ»ïþý'ŒŸ~à 9¹y…ÇŠ–‘#2«kjE¹ëöÛ­V =­677¿ý÷÷êëLÓ´ÛlÅ%%kÖo˜6à¶[nYñÁÊü‚ÂÌáÃ%QZöêÿÓ¦¥§Ú¼uÛ³f–ž<Ù Z­·ÛuòdÙ+¯½žœ”t×í·]{Í”›·-(œ0nì5“'©šF/‡?_³®º¦æú©×ÎHÿô‹/ÚZÛ›šÌ›7h`šªª‚ lßµ«®¾tãœÙ­þ´­£ý– R’’X–}ëÝ¿÷KI¹éÆ9é–WTnݾÝj±Ü8{–Çí>ÒµÅnœ5óïï°kï¾æææù7Íu9ç8˲Á`§( £ØÆwE‘v»"ËÑj—YÎ>|Ñ=wÿßo&&$Œ7vþM7åæåõºo\3ym%kïèš‘v¸¸.¯<4wêàŽ¶>¯lÁ5in·3hKÀFºaS&OÚ´eËø1c22Ò- ˱ãÏ×®«©­½~êµC–ÏÒ° ÀåüZ]»ON¾°xñó‹—Œ9Êëõ>ûÂK’$U×Ô¼þæß$IÔ ¢éÚÈ™•UU}ëmŒ‡Ã>~ìØ÷>Xyèð‘÷Wþ£²ªZÅç/¡¿”ik)FÈ0L‹$9òÝää剂`˜!„6qЖ\—Óç/¯¬\¿qÇq㦦¦—^^60-m˶/·lÛ–“—·ôÕW3‡ £%ô‡½¦iÉI‰ééK_yµ¢²J„1YY۾ܾqËÖ|²úÐá#Æ ¡#Öµ¶µ½¸ôåöŽN·Ë¥ëº(Š.§Ëérù}¾‚¢¢—^^æ÷y·nûò½VŠ¢Èó|YYùoÿø§”äd‹Õ‚1~wÅûmmíGóó·íØÑÐØøëßÿ!%%Åb‘†q»Ü.§3Îï?tøèÛ/søð¿½óî±ãÇsòòvîÞ30-í™ç_ôy½…EÇ>Z½Ún³™¦IˆùâÒeº®1cÔH×tÀ€/·ïøì‹5)))V«Õãvë†áózû÷ë·üµ×óó >üäÌ0EE_¬Y'Š’¦i¼À»\.—Ë÷åöË_{=sø0„ˆIˆi‹$½õîßwìÚíñ¸_X¼ôxqÉŠVEd™ã¸¥Ë_á8Ö4‰( ¯þlßìÄÄ„¿¾ù·êšI”è7hÆÁƒ-ËâeËkëêžyáEDHéÉ“¯þõ¢ãÇ_zy™ÏçݲmÛ{+WÅ'$Ð_6ÐÜoè½[Cç¨ú)1UyY–mmm½ã¶…¦a9zô±G¾_^^¾xÙ+½îæ©€ŽBšn°Ø° ¸5¨#šCBÄ4 ㌠iùÆ~ÉÉ÷ß·h髯ÒZ’(¾õîßwìÚåõxžiɉÒÒèï$®dçybDq8ì¢(íٷÛÒÒr¼øDss ´´¶†Ás<Çr~Ÿ¯ººFÓ´@  ÈòÈÌÌÙ³fλqÎ'Ÿ}VXTÔÑÙQS[ÛÑŒÈ2Ïq¢(Ð6bAà%I*¯¨@ˆÔ74ð¼ ÆXžã4Móx<ééGŽ1wölI !‡ãDqI}}CuMM(ª®©Í5jüر9¹¹6›.5AˆeÙ ãÇݾðÖ´©{öîKNJ*=y’eÙãÇO<|øñG½û®;‡Æ üÚõjëêþû?Dï÷8pPÚ€YÓ§Ož4qÓæ-cÇd-º÷Þ‡üÞÎÝ»#‘ˆiš‰‰ sçÌ>rô¨ªª™Ã†>lÇî݇Ž5}ú€ÔÔgÏ:rô¨¦iC‡ N:sÆŒI'ìÏÎîèì,¯¨ˆDäæ@Àf³]3yò o¥ï¿~êµÍÍÍô×Ìɲò¶¶¶'Ÿx|æôéq~~AaCCcuMMg0ØÔÜ<"sxBBü­7/40MV䆯FUU[ÚZãüq<Ç9§ÓIïôï×o`Ú€Ù3gŽ7nÈÁÆ;µ}á8¶½£#'7øÎ¢EC‡ÙöåöAÓ¾1Þí oÕ ]–†Á¦Iû·Þ:wöì‚¢¢öŽŽÚÚÚÎÎ`(v8ì×Oúƒï?Ì`æïû½Þ<òý?ù£Êªª¿¿ÿÁä‰î»÷Þ¿÷ÝìÜÜaCg¤ºç›wÙÏ¹Ô ½Áëv{::;TMå8^Ó4MSuM·X¬õõV«•ã¸ØÊéÇ“56kŒÃá8’ŸßÐð•û1½OiyåÈô¤™™¶ÇKk++ï¸&Áã´ÖÔÖÅùâbóGY†íèìœ7wnjÿþ¯þõ —ÓÙÖÞž“›÷ÈC~{Ñ·†ò压nü‚+ßù…~ŒEU­Vëc>rÏw¾ôò2«Íæóz3Ò=ô½ï>pÿwLÓlJËÊž{q±ÕfÍ5*ë†Q^QY[W·kÏž1£Gû|¾ä¤¤»ï¼ó©>nµXÚ;:N—¨ªj‘¤ü‚Â×ß|sÆ´¬V›aÁPðDq‰¦i¥'O6,Ëš†ì vvt´µ·E"2Æøø‰,˺ݮ1£G?ùÄc nº) }gÑ·|>ßžy–˜&FˆÁ8—–•Ÿ(.®¨¨ôz<xæÙQ#G$''a{ÝîÏ׬)..niiéèèœ7÷FÛ½xÙrŽãBº¦¦™“ÛÐÐ023óh~~Aaáú›Ò ²H!DV”ù7ͽvÊ”?ýå¹êšš›çÏ[ùáG¥¥''MœÐÒÚº`ÞMô¥ÚÚ:–e³³sû¥$;öë§^ûôŸš0n\KKKgggg0 …ènt]‹×u}Ýú Å%%M‰ ‡clVÖ“=öù󚛺a|¾fí¦-[çÌže†À ¥eeÅ%¥Á`㸪êêÆÆ&DPvNnEE˰‹î¹›n“ÚŽ”””¸nÃÆ£ùùÅ%%#2‡-Á`gg§"+]_=…ímm&1ãüþ®oð I’š-¥'Onß¹³½½ý†ë¦ÖÖ×íܽû‹5ëìvû S§æ:\PP¸aã¦H¢XQY•“«œO«ˆa.—ËétíÛ¿aât:].Ýá¨o¬+((H˜qÆU6Æ¡p8‡B ññNºÅzÙ7Ã0š¦ LTWW{¼äĽsFýîþ¬ßoÜ cíÏÉF%&&žÎ ÃØ0ˆ,‡ÃáÇ}äÈ‘£Ù¹¹^7))qí†ùùÅ%%#†gª0Þ-¸œ_†M‡hmk1|ø¨‘#òò%'%M?ný†MGò lV똬ÑGòó«««¯Ÿ:u_vvggpäˆÌ¤¤ÄòŠŠ»w§öïß½÷¤ °wßþìÜM×ÇÛØÔ´÷Àk&MâÁfµ65ò²ÛìS¯½†eÙÝ{÷N¿þº»wÇùýéƒBêêêý~¿ÏçÓ4mòÄ _¬]7zäÈáÆ~¾v݉ââiÚÚÛÿúæ[ÁPð–› tðà)“'oß¹S×õ¹sfoÞºU’$„Ñ_ßz;<½}†É6<ïСÝ{÷Í™5sÚ ×—”Ž;†eÙæ@ËÄ ãéW_YU5(-­ÿþRS÷îß 'Ç0Œ™Ã+«ªNçæåÝyûm³gL·Z-ë6llmo»ÿ¾E“&LˆD"kÖ¯·ÛlßYô­äääêššÃGŽŒ;ŽÞo?—(IÏ‚I‰IÍÍÍ…E… Mõ'ËOVWW•–žÌ56ÎMîD!B8Žkhh°Ym™Ã†yÜnQ6lÚ|üDÏ}#ƒÞ$`Y61!)?ÿhM]mG{Ks ¹èØqà 'LŠèÔ-‡`gG瘬ÑN§3%99h™>í†ñcÆæäæîÙ·öÌ™3§ß Ë2M3‹=j Ã\9h†Þ¹sgVVM'„ˆ¢X\Zl³Ú’’T­{ª8ý5-B$AÙl¶p8,ð»Ý¢ïDE_í¹š=ב>ŽnÔ£ó*]ønß`ìfŒÎ7º‰zý÷Â:ÁFƒ/ÆØ0LE‘{ýÞ{î¥_½oÄÇ#D4Mëµ÷_ìdi~˲Ý6]¯G„~p…ˆ†þ³ÚL̳]—ÅF«SÐé}Ï©C®+@ >öý±ó2I÷c•žZºæuz1¢/õ|ììЙ£>D;%ñd×Ù«Û:ž1¯¡óô2›&Ã0Š¢$$Ä?ùøã¡h[A4÷:nq¹Û†í¶¾=àô¹!BÌ^Ãqì‰ùlÛ§Û—Òû’œyª‹}óW/aÏ/¸ÝCÓ´èÅ8fpt¯øê½ô«÷(EQèOèî+&‹bN«=¿ÍØU&&ÁúÁ•欥Z$IbnX‚Rû÷gFSµKV(\É!´T pEé%ôcŒË*ÊÚÚÛŒ˜ŒipîÎÖ ú&†aÚÚÚôp¹€ÓÎýcMÓ’“'"Pb€¯!Äïõ ‚ ýàÊÑýªŸdè÷ù/÷‚ð¡Á¥—Bˆ¦i—{Áø7‚¡â)¸²ô~›šªàßÔ€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>B?ô9ú ÏÐ}§ëz0ÔT c|¹ÀEDQuU×uŽã8»Õ®r*„~ø÷Fã8hð€>B?ô9ú ÏÐ}„~ès ô@Ÿ¡úýÐç@è€>‡»Ü W(BÈ%›OábÏ‘BAú WcŽåÐ¥àÆ0 „Ç]ܘLáA耞0ƺ®W7V«ª‚.~øgY61!!TßPOÏ !$>.žaýÐƸ¶¾Öj±ôOI1Mó"‚† †‚ÕµÕˆ „ø8‡Ýq‘æˆ6 £¡©±µ­B?tgš¦®iý22.Á¼!ÉŽ¤šÚ:„HJR²¬(ieBÇq¦iäBè€Þ`lšæ%˜!Ä0MŒBØ0MÓ4/^è7M“ ‚0$w@o.y“K9C ¡zÓ#G/Æ1Æ_qaÞó%rY›ôª¿Ût†acL32/@oóÅ2|à,ÎĦiBX–E]‰˜ ÃÐÀõô_Ã0NÅë®°ýTlò~3ÆøŒ0m†¦i„A9Ž¥­O„èDz>ˆN”΂a–eu]ïy6‚«~èE4ZB^¨©«-(*äXŽã¸Òò²’“¥¢ ²,+ðB4Êó`0eBÃ0lj¢¨éZKk‹(Š=Ö B?ôÇ>$¦͹4Mƒ¢¨J[[[]C¢ª,ËbŒ›š›ËÊË‘f˜¶¶¶²Šò@K€ r¼øxAQQS €1Öt½¢ª²µ­•Fð¯ úÀi3n˜á÷û‹KKA‡Ãe•¡pˆa˜Ö¶6ú3¢½£C×õˆ,—UT„B!Žã‘pk[kcScYyÅáü£´¯FÑÖ*mýp6g¶’cŒ¢m8ñ<_QUy8ÿHm}]vnŽªª•ÕUE'Ž…ÂaUUY†ihj ƒEÇUTV(Š ›š Ã8ZßÑÙy¢¤¤±©‰eÙ¯¸€1ÓÖÞ^W_ ]NW0Ì/*…Bù……Y.9YZ][ƒ1>œ$Ð(Na0f–Á Ã0ˆ Ó0ý~ÿ5“®õx<Å¥%õ £2Gdí°Û ÃHIJ¶Ùl¦IdEIJLNNHÊ•ÕÒÚh < …êêè=€èìº5Èc„Âáð¡£GTM9|DeUe(ây¾¥µ¥µµe`ê€¦ææº†z§Ý!+J[{›Àó-­­Í-Žãã&ŽŸ”–šæq{&Œ'Bì9ÃU?ô*6BDAlïh…C²"Z’$!ŒÌ D ]çycD/ù ÓP5-÷ÐA–eí6›iš¦¡ËЬ©2Ƙç8‡Í>*sDzÚ MÓNg õXÃ4¤¦^ÍTUUÚ:ÚyçyÁírM;Îãñz<Ó4 ‹ŠR’S†Áír36!.^Õ4Œ±iê†i¨ªŽDÎøm‚ۼл®`Œ1Ö4-!>!ÞŸs0on¶Åbé—’bFMmÍî}»UM8(-u@IiiÞ¡ƒº® >¾#Øy8ÿ¨ßçK¨¬®ª©«•™ÁÌé Œcî,#„â8VS5›Í6 u@AQARB’Íf+¯¨¨ohÐ5M¯ÇCñy½‰ñ 6k×KºÎ±,˲†ax݆a9t:ɇ „0Âïܹ3++KUÕ‹Ô ®F•Õ•ƒÓÓ£ÿÒ,{EQhúÀóù……Ц¤§ ’$‰¦ß(ªªiš(t¼„`(h‘,,˲ «éšiš‚ `ŒC¡AHEz§—"Šâ‘ü|„Èè‘£”®h·^š½£jÇqá`8Ȳ¬(ˆ±™4Å(± KóyB ÆcÓ45]xž¾™c¹Ž`çŽ;!¯zÑíb˜¢ë:Ïóˆæø#¤éËr^‡¶¨Bž>Æ»n“˜„“˜4›“¾d³ÙèDºÍŽ3fÉ2,íÉeÂó<jßawÄ~6¶£@ìKÑì~Œ±$ˆ&‰ÎëÔe?„~èU÷†Ó½´0Öu=%9!¤(jl—®ØVuÃ<=ürìó½ tª“ש§ž‹I1Š~ü+†:ÛK1qÿô!ô@w4Dâ³àf†ÇíF]={ÿ¥yn´A±}€/ÒJ1 Fú 'c†a"‘ˆÃá0M³×¡4’òÿZ]-‚ÆXVŒ0f¬(4ók¿õzêd†P8B?ô"ÎWßÐÐØÔt±gD+‚ÅùãFåÇ]¬ Œ ]·Ùì^B?tG‘$)%¹ß¥²?:¨ƒÍj»¨s$„X,–ÚšZýЋS©2—$ë=6Ü_Ô9B à „@耳ºx7]/ï¡7/ô9ú Ï9kƒO´ëâŽÖ‘ùz§líÑsâÑŽvç²^Ñò7ðï䬡ßn·³,£ªš¢(_ñyIÏ7|Ó1+DQ4 #"ËfWúžqÖ4Íó¸E’xŽCÓì6d!„ã8‹$)ªªªÚWGu:dÇ¥¹¿—R/¡Ÿ–Þµ{OKkëàŒôÔþýMB¢#EÇ¢ïä8N„`0HsQéó±å+éíjzzˆ7! BYyyAaQ\œøÐ¡¢(Z­VY–éô£gÆf³ƒAZ“ž àõ ¢ó¢†!±,SRZÚÔÜlš¦(ˆÃ†‰C KÛÞѱï@vZjj||œ¦i´ê±iB¢!&!,說išÕj]Óy/ºFpuaxàÄÄÄØzÁ¢(¾ò¯ïÝ ;6yâD—Ói†a6›Fr·Ë%Y,ÇÕ74ÈÉ7vŒ,Ë Ã¸ÝnIUeÆépX­VçA°;ìtð#BˆÕjÍÉË[²üŽã÷gg÷ï×/#}Ðkצöïïr¹LÓt»ÝI«ªºiË֬ѣ0F¢ b†1MÓápèºÎqœÛå’$IQ›Õ*Š¢¢(#‹Åò“_üòà¡Ã––êÚÚ1Y£ãü~I’,’dBùósÏ755Åù} p:Ï+Šb±H6«Íf³išf±Xœv»Íf=xèðŽÝ{®™2Ù"IV›ã8:¾©Ëé´Úl¢(ÒÕ¹Üß œ–ez–ƆaìÝàчš7÷Æ`0¨(ÊúG·ÿ@¶ÏçóÇ­þì}Y–çÝ4wÕ‡mÛ±3Ü8{!äýUÿ°Y­ æÝ ‡·~¹½¾¾Þëõx<ž#GógÏœ‘1hPD–%I:xøˆÃnÿÙÓÿ­(Š®ë»öìYúÊ«¹ó¶…V«õo+ºõæû³s–½úUÕÕ7ÏŸWS[çKNJÜ´yËÄ ãÛ;:¶lûÒfµ~cÁüÝûöišvÃu×…B!bš»ýÛ‹¾uí”)Š¢455¾vm ¥U–åoÞqÇÆÍ›>z÷]w¤J/+/ßµgoÿ””éÓ®Ï/,ªªªjïè¸qÖ¬¼C‡rró&M˜àõzÒ,(,,.)­©­’‘qÝÔkMÓüèÓO[ZZý>ß”IN'´®:Ý›ÑM“°,{ÿ}‹Þ|ëíÿúÉO ‹Ün×–m_nÚ²•ç¸×Þü›¢(Ï/^|$?ßçóµ·· ‚  ‹—-×Tíxqñ;ï­ˆ„#‹—-s¹œ­þlÓ–m’$½°x©ªéÇ;;Ì» !tÿƒýããBaI”èƒA—ˇ_X²TÓu«Õj† «>ü¨¨¨ˆ òÆÛïÔÖÕÿúwè ×u½¬¬üDq‰Àó„Ì`UUŸ{qñ<ºxÙò`(øâ’—yŽ;|äÈ»+Vx½žç$Q:~âijϿHùøÓO?_³nÿoÿ}…(ˆ[¶}ùþÊU>¯—a˜â’Ò/wìܹ{Ï?>þ8)1qÙÿ½VS[ûÑêO÷îÛïõx^{ãÍú†:’êåþàütý ƒeY¾}á­¯,]üP[{;mÖçxþžoÞù󧟾ûÎ;4Mœ‘þíEߺyþ¼Æ¦¦Q#G&''}÷;÷å:䑇|ä¡·lÛ¦ëÆœY3¿uÏݹÞyÛm~ï»7\Ã`›Í*ðü´ë®»ç›we¤:q¢8'7÷ñª««Ÿ5sÆŠU«^zùå{¿ùMEQ³F9"óéŸÿ4jäÈêšš¢¢c’(¹]®Áéé æÎµÛí‘H$ ‡C¡p$G:::4UC™¦)Šâá#Gkjk'Mœ0(m@Cc£nè‘pä@vvbBüo½­úÌéÓò 5MkkkÛ·ÿÀ”I“t]¯¬¬¬KÔØØ$+ʳfeþ“ŸÿÂãrû|ÞööŽqcÇDd!,˲a ƒ ]WT% wvtC!Ã0#‘Hgg°­­m@jê§_|QVV¾}ç®Ôþý1Æí¡8¿מ=#2‡‹¢hF$"+ª ‡!¡pØbµÚíöu6Š¢ØÞÞþµ§¥À¥Ñý6/­BùñêÏ6nÚ¼ïÀónš5cÏó­­-[¾Üþ?O=‰1^ù7nÞœœ”4wÎìôA‹KKääÌœ>-9)iãæÍù……‡=%9¹¢¢òú릖WTÄùýiRO””L™<‰ç8–eóZùáG;vî²X¤<ò}»ÍÎqÜšuëS’“Ó ÌÉË««¯÷ÇÍž9CQÕ ›65¢¿þ«?ÿâØ‰n·klVÖŠ•«dçf¶ð–›×nØXQYyÝÔk#á0Ïóù……99y{8^\?œŸÿ‹Ÿ> †xŽ …ÃV«•a]×鲦i¢(º¡j*Ïó´ ¥¢(´5œ¾MUUÚ@EŒ‘¢¨V«•ÞéE‘¦ôð<‰DX†±X,Ñ¡«UU¥SCÑ „‘ˆÓáÐueYŒq´ ¥(ŠÑÔOÓ4yžW…eY–e4MNÇb±èšÆñœª¨˜aèÜ9Ž£«ÌqÍû¤I¥ªªJ’¨iðN§³¦¦æ©§ò›_ü<%9Ê®´°ðáÇ{oð à ƒ ]£qMQ”[¶Ü±p!B˜¢éº$Iº®#„0Æáp˜fÜG"šüN«¿G"2Ã`UUéÛ"‘m!¡¤‚Á ýlô¦B¡p˜a˜HDÆÅFöP(D§c‘$ú$M´Æ_Y–£+‚1ŽÈ2ƒ±®ëº~Æb„B!Œ±¢i!Ô5]×iæ(=]ÅN'ŽX,–œÜ¼»v546e•œ”qp5ê=ôÓ ^aÌœŠéß¹oÑŒŒp8-! yÑ&ïèúÒ©‰ôx[¯OFŸéöH¯‰.C·àÛí_÷¾§ÎCg®xlãnÓaYV×õÓèš‘™™ÐÔ¸JýóA›éàãÆŒ¡Í5—{/'Ó4Ý.×Ôk¯!„„Ãá˽8p8Ô£Š|¯¢­:—{/3MÓ¢MX°5W—h´ç†]ªb4.z›—a.äååÁhÐ0 þ¢ây‚ï><%tEXtdate:create2013-09-27T11:07:37-04:00ÑiM%tEXtdate:modify2013-09-27T11:07:37-04:00uŒÑñtEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/system.txt000066400000000000000000000001211330160122500230470ustar00rootroot00000000000000This screen allows you to view modify the way SELinux is running on your system. selinux-python-2.8/sepolicy/sepolicy/help/system_boot_mode.png000066400000000000000000001467021330160122500250630ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìuxUGúÇgæøõâ!‚»CRhK©»{·ÝÚn·»ýÕÝݨPw¡¥Fqw¢$!.7ÉÕã3¿?Üݶ…6óyòä¹÷ØÌ9÷œï¼gæ}ßMMMI’°‰ …Bùë! ƒ~¿?66–mii‰‹‹ËË˃ª>…B¡ü•Á—––V„üü|Œ±išÇºV …Bùa¦gÏžk×®e1ÆÓ4BǺV …Bù1 ƒã8AXBˆµ(úB¡P(a0Æ{¤Ÿê>…B¡üå‰J=ýN‡y)] á~6Gt‰u7výü?´Ï*À¡×þhÿ{Å(”cÈ/ÒO;|(–æ2  „X‡% Æ!d­Xk­á¨#%:v…1Æï'Ó!‚±%ÞøWÜùÑšXucG[1 åwº9­;ߺçeBØèǺڔ¿2–9bX6‘1!ÏLÓÔt¡=k9–È2Çq BÃ0 Óä9î@£ûëB@B¨ë½N‰È A(<˲º®[]›Ö²¬p‹1Æ„XÇ?ð-!Z „PÓt›’(Z“ªé˜`ç1!`o+eDÛ‰.«Àaßö[E¡)ÖóŲ,BHUU€ cÃ0ö{·ŽÞê,Ù ½í(¿–.ë†ñá׳f/^¦ªj¿ÂüÇïºcÑŠÕϾùŽ$I¡p¤WÏœ'þïŸû¿ÿuÃÕûB­Û8kî‚gîý· ðÄ0š¦žW5a„ ¢jš(˜]ׄMûçÃO¶´ù9Ù×_rAF!˲†®‡"‘{ž~ño—^°½´¼¢z÷}·ÿ]–eI Ù#÷šªA0MSUU»ÝþáÌï¾þiÎÿùçÀ¾½›[î|ôé‚ÜìÿÜt-ǰ Ã`ÓÔtã8BŒ¡ë†ir]àyAD1 Ó4MA!ªª2 #<¢jšÕ–Q(GƘeÙÝõ þ`p@¯BÁ†¢í1wFjŠn]µ}é´Ã‡ò{bbl·Ù–®^ûų¹óöI‰»vׂápŒ×óÚ£¨š†Ô5]VÓ4!€š¦eg¤sêÃ0[Z!EIKI&„T×Ö¥¥$wtúUM3 “ãØô©•Õ5¡ÔÄLÀ×ÑyÇ WìÝë®'žýì»ï»ýï5uõþ@ '#eYQ"Š:l`ÿÌ´›€â² !–e1Æi)ÉÂòªj—Ãáq9º®w‚_Ïž;°oïïæ.¨ª­ËËÉÖ76µ¶·Çy½©I‰õMÍãPDNŒ‹õ¸]õM­íq^OJR"‚°¶¾1¢(ËzÝn˹³¼Bàùìô´–6_ÑÎ]7âb¼ý{€}†!(”_Ƙe˜†æ–7>úì†K/„¾úþÇ7^vQvFšªi]÷£¶þ/Vÿ±®<å/Ži)‰ ™i=~˜·p̰!ㆰ,†Þûrf$"î×gÜð!BBˆa ÔVV}7oaŸüÜÇ^yC„¿¿oAÞ”qcž|ý­7ŸxxÎÒåe•Õ'ŒöÉ·ßßpé…¯¾ÿñõ—\‘š¢j&DäùE+×lÛY†¦4aéêuïù Çs1n×MW\̲,Dz+×m¬¨Ù=rPÿçß~¯¢z·×íNILذuûcÿ¾Ý&‰÷=óÒ¿o¼&.ƈÈʨ!#ŠòÆGŸWTž8f¤iš B³æ.¨mljïè¼â¼³–¬^W]WÏq,ƒ˜Çþ}û÷óÕÔ7ø::¯¹ð\EQf|öu|lLmcÓ?¯»²¾©eéšuÁ3&Ÿ˜Ÿ“õâ;f¥õè‘”XØ3§kï…ò+FdyÄÀþ¡HdúGŸ®:ÿœÑCE"òδ¯ŸòGPT53­ÇËß»xÕÚÅ«×Κ»àñÿü“cÏqo²,c݈<DZ,ˆŽŒ/>ó´¸½Õ¯0ßëvóþ`Ðíât]OŽ=tðÍ÷>|×M×C7m#„Œ2hGYÅ¢UkVoÜ!;lÈEgžvýîÛY^9aÔðu[¶-_·aÎ’å`è’³O?uâ w<üdumý‚«õíÝÜêûò‡Ÿïúûõñ11wßò·ÔÄ„p$B‡Ž)GÆ!d“DÃ4’( „0&û…꤯ÿXלòW†"|yUõ޲ŠQƒòûôômí턇ÝváéSUMCjš¨©o°Ûl ‚²¢@0&˜!ϱËr Ûá÷WTïnnm#l‚!»Mjmo×TÕêúÈŠråygõÊëiFDQ$IllimhjŽÈ²ÇåŒÈJSKk$"›Û$É0ŒêÚ:·ßéu»Î>yò‡3g9l¶ÉãFw}4‚¡È¨Á_~ø¾!ýz2ëŽãꛞ{ó݉cF¦%'i†nb‚ D¸ÎêÚú+W4 GrÆXà¹æÖÖúÆ&UÓ–á8.‘{ççŽ1DÕ4Ó45MÕu>†”£bÅ•6NÿðÓ«Î?0ý£Ï # Œ( : ¯‡å²v¬+Où+Cú::¿üñç÷¿üV…+Î;+/'»º¶Þ^×ýáH¤07û¡Þâv¹>øz„Ð&‰“Ft9œ„`I!„„PfZê¨!ƒ^˜ñ¾ÃnËJK›³dyyUÍKÞóÌ›ïôHJ|”ÿ BˆÀó,ˆ#€Í&†©iÚþñŒ„ð<¿iÓ&êáCùã0LBè”$ŒqD–-ÿ÷.o£c À/’ á'B1ÆŠ¢0 cu‹ þ×B¨ëzjJ* Í×~¶¢jAHNLÔÖÕ*ª!$à›ÿ·'.&îØÖB9æ°9¹91žÃ4à ”?Çr­m­å•å bZÚZ ÀoMa& #„dY> I’zöNŒO4öMfK¡t+X„Ãîp8]üŒ)5X–UT%TB á“<Œq›¯ ˆ1–$éX_`å‚öûýÖ»…òÀšöî@¬ì ‡êÑaæ^¨ô—ÄÈÁ@Äü‘ïvˆA"Ëü ‡Bhù5ëŠP(¿ B¿ß1>ÈcMˆ Š’(Tý÷<´«ç¯õûZÂà÷s@¬©©ƒŽ‡{ì—™~#‡# åh°²ñìØ±½½Óg·Ù÷:Ñý’ …úôéçõxìÞ<¸- òBQé¯Ä~6ï~ ÿ%Z)ÒºZý]³â†ƒnö+÷=Le0ÆÇC#D¡üXSYøÚ}LJˆèºaÉ5„hšfB|† ë;ÚÛããìÏgzD‡ÃÁq, ‰>©§5Kõ±¾ÝýñPúÜÓá÷xàð<Ïó@U5]×#‰VÖå#ÕL«·BhÙþ@Lˆ(ð]×!<´ñMÇsBMÕºÚ1ÇA5M;:õÞcõSå§ü%°¦b×4µÕ׬Ê*bD0°É0B<èK.{à±8Ž[º|yÑÖmqqq'Œãõ†Á0Œe!"„LŒ­ä…BQUUµ–[ï ®ŸÉÞ7ÚBüNX?@Ó4ëÊ[ñ`{­~!<Ç×ÔìÞ¶­˜ø¾½{%&&†À#ˆº&wâxÖ4±išˆAïY´>øËí… Šj+˜°çþDâøŠÊ*Az¤¦X–H´ˆ U4!„øúºÝ023Òu]Ga‚Y–­oh4 #33]×t°÷e%j`ŒcUìIº ÷©„›Ô™ò—B†8D†aLUC ÃI6%ä9Ú¼ÚGú1ÆN§óç¹sgÎúîŒÓNÛYZÚÖæËHOÓ5=‰‚Às\8q9 ÃêºnšæGŸ|vÚÔS’;ý~§ÓÉ ¤iZD–bŒñžrD"‘ã*¤ó/Ã0¾öva\ll$±Ùlm>Àãvï3¼CaˆöØû»kkg}?ûÄ ãZÚÚ:üþ¬ìLBˆ,Ë!QeYxžaYÓ4-Yº"55¥wa¯½Ýî°3 2M¬(Š ñÇ™&¶RBUUº Dg a†bš¦Ín_·ac||\Ïž9¡PÈ*‹eÃ0­¢%I2MÓn³ýŸûÙ—_¾ùÚ«½ v””Üð÷›¯¼ì²Ë.¾0 í÷²Å0 ÄÐ2ùUES%??ï¤'jš¶cçÎòŠÊ“NœØÙÙ¹lùªq£Gm)Ú¶mGqFZZvv朹 \.gËØ1£GX½f]IiY~^î˜Ñ£6o)*-+ÈrZjªßË‘SOžìr:­VBhEóZV?È.Ùl¢ˆeX–aW­^[]]“••9jø°P8>6ÆëÍÏëÙ«WAUu¦ëå·!F’¤ž¹Ùùy=ÓÓÒ³²2zææèºÁî•yKú!‚ˆE Ë –aXÄ F”$—ÛiwØKË+ÆŽyÒ¤‰cFX·acCcã©'Oî×§wJJ2/ð[жFdù´S§ï,éÝ«pèA=R’!„%eecÇŒš|ÒÄÆVTV>tóÖ­ §O;uõºõm>ßÈà B…y½{¦¦$ËŠÂrbuúÔiò×BCQôÄDs̈ÍSNœvå5Y»qCϬ˜©§ø‚A–aÕ·¹ôBDQ\º|Å“Ï>»¥h«iš^¯pâ„ñÏ¿ôŠÇíÎHO¯oh5bxFzúëo¾eš˜üíw?444ä;Ž“Nœxí•W&%&¶µùÁ`(êèìTUÅïè:›ÿ]€*Šj“ÄÇ~ðÅgŸzüám’¨¨êA¯6˰ à „$Qª«kxñ•×V®^ÝÙÙ™O05bøâ%ËZ[ÛúöîÝÜÔœ’”4|èo¿û±³3`“¤ÕkÖnß¶#7'Çn³ ìßÿœ³N/ÈËóûý¡PX×t¿ß¯kF8Q5•c91Ö‚ÈêfaÃ"†c9UUwî,Y³vý¦ÍEy=s—._ùÓÏs—¯\5~옄„øof}_´u[k›/ Ÿ8a|JròK¯NïÝ«pÓ–¢¥ËV”•W˜†Ñ¿oß%K—ÿôóÜÕk×õ*È2pàÚu/¹ðüŸçÎ×T½gN®ßB†n‚A@Çîi¨ÕOù‹" «\ X[RÒRZꈉÁ,bch3gŸsvzZºM²Y³ÁƦ¦-E[KKËòzæ^uùeš¦¥$'óÝ÷§zr¿¾}ÊÊ+¾ùî;EQ.¾ð‚¬ÌŒ„ø„¢m[âã'MœX[W¿lÅŠp8Ò« _Óõœ¬L·Û éÓ»w(ÎHKKJJ¤ó¿ÿX“Œ ‚0pÀBˆ¦ëvñGäHsk³×ëµ¼bX†‰Èò®ªêÚÚ:§ÓyÑ…ç!ããã×mØ˜Ö£Ç cÇ´µ·/[¾¢®¡qêÉSrs²SR’ëê†=r„pÕÚuííéiÏÇÆÆ&%%š¦Ù3'Bèõz{¤¦X^7 ˨ª !´Ùl@„BŒií¾öŽÖÖ¶“'Ÿ$‰â¶íÅÆ5bxVfÆîÚºÒòŠ”¤D·ÇíõxNž2©´¬b`ÿ~ ñqk×oôx<yy£GŽ „ï,6tÈÈí±â¾}{ged0 3h@ÿä¤DEQR’“TUËHOs»Ý˜ìñÿaÖëõÒDå”?5„–åv×TõÈÉ•·mcf¼_Ы÷NCsI¶‚Ýõ~Øëª«››› „±±q]ýý†inn†}òÑèQ£c½±º¡[N6I%ÉJlX–mnnyæ…î¿ûÿìv;Çq‚ ŒMŒÃá°$Iv»= išær¹,—òP(d·ÙTMÃÛl¶@ `åR…>l¿Ö„kFáYÞŸm¾¶m;¶egfG'›åyÞétblý?ÆAô⫯ŸsæéY™™c‡ÃaýСPˆã8—Ë¥(J(r9]ËbB‚Á  ð@Y–Ý.W aP0²ùÄ´w¶b¼1&6­E‡Ýa“$L0  Óï—$IUUƒ¡ ˲N‡‘e„‚0,Gb¼Þ@ (ŠËr–Q8v9<Ï«ª …n·K×p8ìõz4M…CN‡ƒ‡Ýn—¢¨š¦Ymž¦i ËdgfS+„ò§ÆÊ‹µ|ŲAƒAŽ)ä11&Æ~õ•¤µµý‰§“.¿<û”Sׯ_ËñBÏÜžQíµü¢¢¢ý½ „áH$G—8Îå+W¦õ葘à0Ʋ,[["„dY‡ÃVÿiGG‡µ Ã0þ@À2<;;;† ƒºöÿÎìÉÓp¸-öxÚXßLÓlooîë´;6± “›­!Äï÷[«8–Ãû|>„ÏòápØ:Ã0Öd³Ö/Î0Œªjžã£ ˆ$,ËBX†µî«\–e#‘ˆååɱÀ*!´wB ¶££!‰È„D¬úð,G,ÿ%kú@ !äyÞï@^eÀó¼µÇrVV “1i4/å/BHÓôH$l†]{?úh}EEkU5‡PÖóÏ{“’LÃÐ CÓôƒîÎôˆ]¿†C¡ñãÆŠ¢ ‡­U]õ!ݾëòègëCEÿ8Àòë?è¨Ä0Ìœ¬ì›nÈVÐï¾1KšÁ~™÷~Ü“ª¡ËB‹X!E, {Œ´oû´ï·½4õÛ~\t†ß{ãí-%ºìm1¡nf”¿› ñ‰Ë–-E‚9A`Ù]Wgè:Dˆã¸Þ½úêúAÔÿ¿û8cBbcc­Î„c}¦”ÿ†a&Í×Oq:óÐa G!±{zŸ‹9Æù ,«ŸalÐ;™òWBXXØ+//ßúJÄJÖ­¸Å=¶ÎÁ†µX€àðÁVÀ=íýC°,eAØ“ç [¸ß¢@bEQY]L bX‘=T¹Ô5 !]×ÄÐ`^Ê_¡•ÇåPʯŸÅ,¼C‰;ý?;AÓ4cbbt]…CÌ !4 #!.âk÷?±Ü‰ ‰Ö˜ó±®…òptk“lµuµõõÔú ƒŠÈ‘´Ô´ä¤ä?Lú Ãð<pئië<Ç[¯ÀǺ"ʱ„MINéÛ·¯zˆ Ê_ë­Î4M»Íþ‡"âyþ8¹Á0ÆT÷)6šfë8y2)¿Ö‹á9 sô¦ŠNþsÌ¡÷9…~‡å/ƱÒ>ª¹Êñu·§P(”n•~ …BévPé§P(”n•~ …BévPé§P(”n•~ …BévPé§P(”n•~ …BévPé§P(”n•~ …Bévü—D˜‚1±¦7úfÚ"„˜¦iÍï°&>Ô}N;õkÆ%„PtÆ/K£B†aèºÎqœ5U¯µüPíu›ÍV´uë×ß~wÑùçäçcŒ?ýüË–ÖÖË/¹X„¨¾[³,ÓÜÒòã쟧žrrRb‚¦ép/ÇúR(ÊŸŒƒH¿Õ¯"IÒöââÿ»ïþü¼ž Ãl.ÚzÆ´Óì6›nš¦I’dmɱ,€ã¸ÕkÖ¾ðÊ«¯¾ð¼Ûm7 C€¢(c§Ã!$BB&Ʋ,cL¯¬ª~eúôŽŽö7_{uë¶m?ñdJròyçœít:m’!ćÞç].W}CãÌog6´gnŽªjBEQ¬>" å8‡Ú(”㊃H?Ã0,ËÙmöÖÖÖÆ¦¦Ûo¹ù”É'±,ÛÞÑù÷üóô©§N›:õÍï´ù|cFüì‹/Ãùê+.ÿî‡ÊÊËo¸ù–+/»4;+ë•×§»\Λoü›¢¨oÎxc¬za~þ†›rssnºþ:„ÁB0°ÿêÝ».Z¼xÙ²”¤¤”ädŽåš››_{ó­úú†I'N¸ìâ‹6lÚüÁGŸƒA^œNçÜù >þì‹Âü¼«¯¼Âåt'‰à)”àëú±®…ò ûH¿ÕŸîk÷Õ7Ö ¼0jĈÇzðÝ?|õ7ÏœvÚ5W^ëõ~üÙ'OžüÕÌo®¸ì’÷?ü¸®¾þŒi§¥¦$0`sÑÖóÎ9;9)éÞÊÉΪoh¼ï¡‡ÿïÎ;—,[ö[nž¿hÑO?Ϲ쒋Þxûýúžtâ‰EQ’“’N?íÔÛïüwß>½/¿ô’gÿŒ ~ê¹0Áçž}æ+Óßä8þÇÙ³ òó ðͬïvï|ãíN7wÁBEU¯¾ò²úúúÃOLL¡C Âܬ\«¿ôXW‡Bà@«Ÿe؎Χݙ’’¢ªê¸1£Ï;çì~üéö;ÿÝ¿_ß뮾ê¦Ûÿ1ãÝ÷<Ϥ  ó –¯\¹eëÖž99={æJ¢xîYgV×Ô4·´ôÌÍÍHOx!'ÄÇŸ{öYÁP¨¤¬ìòK.™7a›¯AˆÂ2¬ªªgŸ~ÆšuëO™aæ·ß>úäÓéé²,4()113#cЀÏ¿òêßo¸Þår½øêkE[·õÊ/˜6õTEU/¼ìŠsÎq±±V/*¡PŽKDÍ­Ín·›çxB­~ʱ†a˜ææf¸|ùòþýûkš!$„‚P^Yn·Ù““!»@…Bš¦¹ÝîGžx²ªºúW^VUÕn³ ¢¨ëz8ÆÛ$I’¤p$bèºÃá º®¨ªÓჂ 0  …œN§®iŠªA! !<Ï‹¢ …,¿ ŽãÂá°¢ª,Ë:&$³ #I@UUEQ¨ïå¸Åº«·oOOK·ÛìGøB¡üæX7dQQÑ!ýú!„š¦µwtD¿r×ÞÞ¾³¤ôÂóÎå9NQ”P8 …V8n8 †ÃVЯµ#„!ÔÞÑÁ0L$!0 òûý!!@UUY–­ð]«DEQ¬£ùƒAË!dšf´&ÖWYQ¢Ç?Ö“B¡Pþd:š—ì/¬„„Ð+Ï?+ B(>PsQ—E]“1XŸ£+»®‚êk×¼ûmìB¡P(ÿö×oJá8Žã¸èK+íi¡P(”?#GÖ[B±R8‚ÀqÜA¥ÿ¿¶ÖØ×á—ŒB‡ü˜&èÜ‹1þ½GÕþ€Æïw:‹£ët&„0 s˜N¶Ê#J¶A»Â)”?†#°úÁÞ˜/@uM 1^¯õTcŒ„BBˆaš,À½*• k@ÏóBUU£Ù~¬VÄZÕŽèZB„"D$ †Ãû,„Ðú` ^¯ ‡Æ›(¦©Fô°Ñ]¬¬]ÓKt=G²7Qt—ý {E c̲ì~«¢Ç±Ž=TôÃþÇýRà—úBDQ4MS×õÃ]œ}ËÝsMØSbôd»¬’$IÓ4«!ßÿâÙïô-xŽëðû9Ž“DÑ0M¸ïɺþ”Ö*Ã0ÀÞà—+ Ú{XLÜÛˆÚ$):Šc]áý~šÃ\I …òë9«ß²øÂáð“Ï<÷Ò«¯?òÄ“K–-cìp8l’Äq\}CãOólyE¥ÓáEQE„ÓéDQ„®?®‰±Óáxùõékׯ‹‹‹Šµ$Šv›í—ÃfEѪÿöâ’$YÕ¶ÛíÖ·VY×À²¬e=‚àpØyžÃÔc’B9Bî×Ïs¼Óá4±¹Ÿ9é°ÛW­]7wþ‚g¼5nìX¯×#Š"„pýÆmmmi©©­mmËW®š4q‚(ŠÛv쨬ªJJL´º¶mßQQQév»ßyïƒå+WeefØl6+ùþëo¾µbÕêÜìl]׿úæ[ÛÕØØ”/ ‚Ï×¾~íZë²ÙœÓ¦A¿æç0ÞÚÚj t:}ºáJëa8JE…}þ|é³Ï¸~€Û¶ÙôÞÇŸ´¶úRzöä’’jM•ºMŠIJòµ·ï®ªÚ¹}»M’JÊË““’¢ªÝÔÜ\V^ÞØØÄ²ìÚõDQ°‰º††ŠÊ]^Ç ÍEE›6oÙ¶cÇÉ“O"„¬\½Ú4Ìøø8Ã0† ‚m>_¬×}í^¯§££C–åù‹ùýþp$ÂóœÛå"„¬ß¸±ÍçKINVTµ±±±¢rW]}CRb¢õ‰D{ê™ú††Üœìººú‹;œNŸ¯=1!žçùêšš-[·ÆÆÆJ¢h5·Ï746nÚ¼Eøˆ,G"—Ó‘åæææØ˜˜=«D©Óïà‘Ç–ñz=ž]ÕÕEÛ¶ÅÆÄØl¶¦ææªêêŠÊ]6›´qóEQâãã Ã~WUõK¯½6ùÄ{÷*LJHG"uuu@Àép¬Û°±½½=&&æ·gD\€$IsæÍokk'€¸].I’X†-¯¬lhlŒ‹³^˜vìÜé÷û{¤¦®Y»îÙ_LŒOð¸Ý’$mݶ{w­ÇãfYÖòþjjnv:Á`°ÓïgYÖª*ÐãvÏy¼†iim¡~ý”ã˯ÿ¤`ÙbëÖ¯_¹zMllL~Ï\„Ð;ïPZZ¶uûvEQ’““W¬^sÆiSgÏ™;Ñ¢ÆÆ¦¥¥cG~çýæÌ› l¢¸tÙòúúz@Hß^½xŽkooÿjæ7MMM¼ܜYßϲ̢ÅKäH$+3ãùçŸoÕЇ ÿî;´~=<¸dñ’{šš}_ÜxÁ…ðŸÿxDÕNüþ»¢'}¢ª=Ï·~ÃÆ]ÕÕ3g}ùâ«™ùyyII‰1›·lY²l¹Ý`A~~þko¼¹©¨È0ŒY?ü¸»¶®£³ÓírÍ™7¿®¡BЯO€$Š /©«¯ïè蜻`ÁÄñã?ûò«Ùsæïܹ£¸xØÐ!Ï¿üʦÍE+W¯‰D"MÍͫ׮ …ý{~ñõÌ•«×„B!·Û•œ”„Ú][ûÄ3ÏqÚÔ‹Ï™7?66öÁG…B_ûmVfFjjª®ëǧúSé§WXÒ>B]×ããâž{êÉú¿ýî{/¿6½¹¹eþÂE'‘¿ÿi6„eP$ùaöl–e9Ž›»`áŽâ7nzìá‡î¸çîñ'¨“&Ý~Û­ÀéT8.=+kôI“FN:ñæ¿ß¤ò‚=)ù?÷Ýwþå—××/X»nscÓØ¸˜K,`>ÿ§§+7ߌü~Ãp0¦_ß¡^–Ù¼rå–Õ«ãFÿþ÷ôóÎüúÊܼù檜œ©©húôQ«VÝ œ°i¸ãŽkŸ}æíâ÷¸œ©ºvý­·N<í´µ%%¼ÝŽl·C—ëæÝqòÙgÛ~ð•çJ¿^°ðÜ+.{êÉljÓñê§ŸmÞUuߣþí¶[©)ÊË—lÞ—•UÎ]¿Áæv‡x¾ïˆ®¬Ì™ËV4hº--퇕«*ý gåà´ /|èá b6¬[¿tÑ¢X§K G~üq6!$1!þ®Ýqþ¹goÛ¾eYY–öï7dà€‹/8ÿì3Ï yyÿù×cGÚQ¼sÞ‚Á`Ðëõ,Z¼¤f÷n㈮#Ó4%=)qøÀㆠúÚ+KKwnÝ6aÔ( ëXQÓ“’F xˆá½rrî¼ùï'Œ;ó«¯ä` ÞãYºpqMå.Ï_pÆ7]}áÿÝù¯ÜŒôÒ;l§ƒ# ÊË̸ñª+ óóÃá°$‰7]Ý•—]¦ª*‚`Ôˆû÷3räÄñ'Ü~Ë-ÑÛ†rú´©pÆi§}þÕ׈öøS(G‘ ó2 ÓÙÙ/½è¢¤ÄÄç_~åŒi§‰¢Û¯OŸ˜¯¢(ºnÄÄÆÄ Ÿ½´t” d”—ÿ‚¬’øÊ+c*+9]¿·©Ù|ÿ½±Añ‚y½u#}ͪ›ª«õk®éÈÍu3»] µê‘:nè´ØEUËÉš†1æC4 š¦©ªr(ÔÑÑi]ˆ5øÉ"LÓëtôÊË{äûRSSu–5ìöÜqãþ•—÷þGóÂK_¼üâàÓ¦Þÿî{.—³`ÜXŒÐÏ=óÞ‡}ÿÚëÓŸ®Ý&•Eä,`j*²Ùãúõ»ãé'“ôo›5+ìñ„\n5.N†0âõª±±DIb¢¢i­¢Øi³i!Ë E¹ïÎmظéž{ï}æñÇ iv¶µ©¡Ð 0 ¬ir( ˆDdI’ÁPÈ ¦ét:5] …B@Ði†‚~¿BxõהWT<õÜ §Ÿ6õÒ /!Y–Õ5Ý4 ÏóÖeAªûÊ‘pÒ1¡¬¢â™ç_ŒÃ¦yýÕWçdgO9iÒÚõâbc ì?røð@0øÎûœî9ßÿC8LKI¾ðª+'Lšä;ã̾µ»1Æ—X‡{îÙ˜½GŽ.ÉàiÀ7_O`@ˆe¿*(,¼þúô˜—ÖÔ|ñõL–e³³²!£FŒxýÍ·ózæöêÝ{݆ _Ïü†cÙœ˜¡£sì ï|ò©–6ê¶[xê™Ì›o·Ûn¸æšyñ ¦MWzÜÊ /:¿üò àé§¼ž|ùE:S¯¾òà³OÞ™¸1z9Þ{p?àÃ&¾úb¿Ë• ¡åÑÙã{ÚÔØðè£à‰'î¥_[]“\µ+=!¾¥_¿àäɬiBÝ@òÄS·Üô·¥+V´µ¶y½Þ¤ÄDcÃ0R’“âãï¼ûž@0”—›Ãsü–¢­>òhMmÝM7\‡±ÙÕ¯‰B¡žCæðINLÖtíÀg c †::;âââbcbTUå8®¶¶. '%&zÜî¶¶6YQ2ÓÓ›ÚÛ[‘„Ä„˜pØùúëì“O‡CŸ8‘H0MˆÕë »ÌæH¢n‚„a˜YYçè‘+!Œq}Cc8ê™›Ë0ŒÃá¸ëžûFŒvÖ´iMÍÖ*žç!mmm Bq±±š¦UUWK¢˜˜˜¨†i³Iv»ÞØh߸‘ûá@†±êóKº8eZÓÃ½Ž‰°Ë*kÓã1ÓÒ`FIO7SS ÓÜcŠZG`&á_ŸÎÔ×1>[Všš¢W• „9VQ5»Ý.÷ë''k’zžo<˜IO·±¬ªiv»]QUXWSV(+k^¾"¦®6±©‰©«T?²Ãqº®3#Gê×]×ÒÒÚÚÖjeQ%tvv†ãõZM‰È9ÙþÜܬ”hšmMM†i&¥¤è†Á²lcS“À ±±1ÖŸ¾öö˜o8©«¯OJLLJL´nN„ªª»ªªãbc–­XñÓÏs®¼ü²Ä„„ؘk›cöšÃ‡r\ÍásÄÒoåT`Æ0 ]7‚Ö±„tÃ0 ƒã8€Â0Òömöûî#á©®F Øã‘}TþûßìÅÉ2k†i’½°fV…çùòŠŠgžñ¹§ž$ cÌó¼¥–¿<Ïq„Ë)^àyLˆ¦i!ˆ±išP0ÏAø» €10 `šð sF"6@ ¡iiÁ¡”$¶²Rzå Bž'‘jl†±Ï¾……86–hš•¿±,jh55{Öò`ž{Îýüó81ÑÌË3³³õñãá)§˜ Ëš¢†‰F{©ª !´Dì/M‘e™‰D óóg§ßoǺO¡·±Õÿ«0 ’ ¾úªý–[ä;ï”ï½ Š~Ó´kVÌDZ²ü§JÝl t퟉V!"Š@­V€|>è÷ƒ®¹ù„[¼íÞª«¡ªÌìlõÚkµ3Î0³³a8|D/^–åbåô>ÎwjõSŽ+޾ÃçW1q8¸U«\§œ‚½^ÿÊ•8#†ÃÀ0ºš¥ÑÌ Všš£+k¿t¿á²ÂÍ¢nüqƒ1ˆ !€çËd]Vn  ¢/ftå÷ªªÕÞü×ã q8€a ÖVØÑÁTU ï¾ËÍ™U•¸\ò]wÉ·ßC¡#2 ~§ßý7‡J?å¸"*ý¿Ï“ƒ õN0úôAÍÍî ì7Ý„êêÇE-S+X_–eY‘!„,Ë]´ËŸã8Ã0dYÖ4!ô‡N¨`Ù=0š¶ÿŸaìÙŒaBÇ[Óš¸ÆŠ’G˜:íh°j­í¡þ ¶·Ã@€883S›4)øùçeËäþ†Bâ믣¶6ÀóG4LM§j PþŽ,š÷€‚ÚÚ¸E‹ÌÂBcìX †a¦¾¡®±±ÁƒÁ¶¶áASG˜¦iC‚ƒY¯ÖÚ_#¿ÞþµÔr÷îšV_‹åfî󵉢$Šbtt¿ê]1|Ø7‰_ÖZ,þEB†illhlj†ƒ€¿Í×!r:Ñß´Km1Þ79Ýᯉiš]ÉæÕ‡‚ 9dŸ;„{²«š&À0Ðï'‰‰ú´i¨®Ž[º''ãÇÃHüÕœFóRŽ+¬hÞ#æýµ@TU¹ôÒÈõ×Û^|ÑþU%@„X„**+LŒû÷ë/I6€¿³cÛŽíº®''§D=:¬~|ËGA¨(J8é*=BÇ!´&tXçSÐÆšðÓŸ­.&&¦±©1š$™çùæææ•kÖ 2xԈᩩ),Ë:N˹ÛívÏ™·`ÃÆÍC âyÞn³I’d¥_¶²C[v¨•R˜ç¸º†ú`0èr9A@I’„ ±ÙlÖfVšI!6Íöv_fF†,‡u]ÃØÄØ‡ƒ1¯ ¾vŸ5&ae..)ÝQ\<|èЦ¦¦Wßx“eIY–‘$‰ak*yQAp8»Í&<Ã0’$©šZ³{7BÈf“X–xBh³ÙX–µ2WïÞ1±Ûì¦i ‚ ð¼ÀóÇ <Ïó¼Õmà ¦©¹1-- cCÓŒMŒME‰ð<ÛÔõbr\sKËÒåË òó33Òf¼÷þ7³¾ÃﮫAE+óum„œNg8ž=gŽ"+VýwUW-[±’ek–žh5l6Ïóuõõ /±šÏÃÝ„ÄD€ðÅ⫯ŠÓ§KÏ>Ë®[ qqð×{ýR(”ÿßÓê·€š¦ò÷¿³›7ú:ÔØØû¹çá¶-ëO»TF¹1^§Ë.®ßZÕÒæ·IRk›/*VÖû„øøÔäÝг³²æÌ›¿bÕ*MÓ.¹è‚gÏVTµ´¼¼GjêÏ>çóµ6ôÔ“§<ó‹ùyúöûè³Ï×]}•a²"?õìó~KkëÔ“O>ëôißÿøÓ‚ÅK8ŽMOK»öª+u]7 VU…çy˩܂BaR%êÊHaY¦oŸ>'O™,Âô·ßfXæÇÙsV¬Z•ÝÕW•UT|3ë;žç³23ÊË+UMu8N‡£¬¼üŠK/ÍÌ̈Èr{GÇ{~¼»¶vÈ §Ÿ6õ£O>ÝYZ–žÖãâ Î,\¼XÓµ¯¿~æ·³‚Á`ŸÞ½?ýâ I’.:ïÜŒôtES„‘HDà]×£]CÖÏó¾`{W-†äæäœ1mª ˆ¹99/¾úZ\l, ¤rWÕWß|ÓÑÙ9mê©=sr_xåUUtÒÄ ¡Pø©çžGÞrÓ.§KEAÖ®XùãìŸA¸àÜsòóò¾™õÝŠU«ÚÛ;âãã~l+·ÝÆÍŸLS;ýtù_ÿ‚á°å#d@¿ÿ ¾L åwà÷Uƒ¨*NHðÏ™ÓYZúñÇàˆxÞ¢¡·^=qãìF$UëlrN¼Ým“åˆå©íô`fwmÝ»~øÚ›oíªªjhl4MóîÿkËÖ¢––ÖÇõëÓû¬Ó§½üúë.§óo×]óóÜy+V¯.+/þ䤉w–”~ñõLMÓvUU]qé%’(545ÞùÛ·nß^X?å¤I_~=S–å-[·®[¿aî‚ùg>mÔˆáUÕÕþÅØÑ£&O:²båªøø¸å+W555­\½šã¸×ßz«oïÞ¡—^›Î Ø›BÕ4Œ±UIk>/Œ±¢ª Â}ÍhMÓ`[[[Fzº Û‹‹Ë+*ž7¯¸¤ôÒ‹.ÊÌȰ٤sÏ>kò¤IßÿøSYyE\\ìm¿įQoÎxWÓ4ˆ ßxýÍ·úôî !|sÆ;5»wûý·Üø·³Ï<Ã0Ìÿ2‚‰ ‡õ!CÂo¼@ úرú„ ú¤Iú‰'¯¾³ˆB¡üvü!F„À4­@Vl¨iš†nL9i˲&6­¾˜˜˜ÜÜMÓ¼^ÏÎ’R¯ÇSXPÐÖæÛ´y³Õ¥Î²¬Ûí©ØU1dÐÐ@Àou‚ÛíŽN‡?(Ìï­z´[Ü0!ƒßrãß„é=zÌž;c\YU•‘‘ž“mFnNNA~~yEEjJjZZZVFFJr2!`õÚu!–eOœ0Þn·}ýí¬¾}z]vñEÝwÏìŸç–”–^yÙ¥‚(æç÷*(x÷ƒB½ >ÿêëæ–Q `Åa`Œ““**ËSSR¬ýAMÓ¬«¯íßg€¦k"Bö¼ïv»yž_¶|9 $­Gjk[ÛÕW\îõxf¼ÿþ´SOÍë™;wނد$‰9âr¹ÒÒzÄÇÇÍ¿ Íçs»\¡P( 555 >.6&fİ¡…ùy¡PتmD–Û;Ú16}ííYŽÈ‘@ hšf(*.)a&=­Ç¢%˪kvûÚÛû÷ë»hé2¿? uݘ<éÄ·Þy77'§Oï^éii’$ ½{•WTÖÖÕ&%&¥$'[ê1ÖÞÖ¾³¤¸hë–²²Ò–––©……½º&³$„p,+ ‚ª( ‚g>mÌÈ‘š¢¤gg3±1+·oÏ(,<ÿŠË{öï§²\ÏwÂÉ' ”œ“ÓÇ%$\|ÎÙIq±ŠqÚígM›¶sgIm]mB\\A^Ïüž¹ÅÅ;½ÏØ‘#S’“ö4ÛÖŸiI"'NŸ.~ø!?w®ôÔSì¶mP–µ³ÏŽÜ{/‰‹;‚„NZ¨_?å¸Âòëÿ}9ü –õkZHÍ–øútç-·A0† 3ûõ3 Ò'MÂ. €Óå´’Èrc!ŒDd§Ó¡(Š5e«,ËB‡ÃÁ±l(¶Ò:ÊŠb˲‡ ‡9Ž3 ƒã8+‰›Íf ~¿?­GW¦¿ …î½ë?íVÔ.Ã0,Ãvtvhš† t{<Çí—غV,ÃD£ Æ‚ Ø$ `…!¼À‡BaË3';+»œ ²,K’d˜¦(IYQLŒDÓtY–GD–16]NW$Ñtã8‡Ýn¥¨‹È2Œf„†Pày G"B§Ói·ÙËÓ’`ŒŒ 8Ýn@6͈ª 6›ÐÚ 7mâÃa€‰`Ó´;ì"@ˆ¢(‚(B–éi=Ò̘Ã覩š¦‹ç*ÆaEyÞÆ²ã°¦–ý%U5Ë¢ª*Ûý÷ MûyôQõŠ+ˆÃA†Byݧ‰(Ç¿sŸ_W†a¸¦&,IZF†ýÖ[¹Ÿf**ÃÓ ½ù¦zõÕ°½ÝØ›%?êÿŽ21F]<Ð&Æ`oÖ+Õ:ëIC{SKFý÷1! B_|=só–-111×]ue\\\ש½­~ë«a¿²ZÆ,+2±ìž~j1ƘaÏ#A°òY2b æÞþ5 ›&$„è:0MDÄØ›¢`ÏY`b¼ÏéѾ9 !„0,»çR˜&6MhåËCˆXY©~?noG~?Ð4ÄqlC7s&;>ÛÐpø_Ê„ääà¸8Œ±1b„qÆ†Ó L!„„`Œ!!€eY–^yUW†„†Auuh÷n³ÿȃ›H’1p ¨*è.üTú)ÇGŸ´ù·*2 Viòd"IÜÉ'I2FŒ`**Ìž=•ÛnÓÎ>ÛÊMÆF“DÁØ ØEþ˜®Ÿ÷ Š5µ@ôs×ÿ !ã‹Î=ç¼3ÏDÑ4MCÓº¶r3šã¾KƒD‘ÄÄ€½)£!!DÓ ª]„ ØÝ»ÙíÛ™;÷¤Û<Ô >BØã!±±86–ÄÆâ¸8 Î=Û›&Àk}ïh}˜`?g6MÜå+0M€ììd‹‹™âb¦¬Œ©¨`JKQccô¤!$6V¹æ3?T’¡·f »jSQ Ö­/¿ü«~bËÌç8åÆåÿû?œ’0¦ ­ˆ_»ƒîS(Ç-ÇÎZӀͦq†øê«LYÀÒœ–fææò³g›99Æ!–wÐ>;B0†ª 4í(‹fb·MB„2Æ€e¡$ýÒYqP¬ÒRöë¯÷È„P–™mÛØ ˜;¦¡¢ålY,K8î·¼ÂB]Ñž7ÓÓõÉ“‰Û L“x<ÚäÉÆèÑ8.ŽˆâAO›1V‚Aè÷ÓšÆ-YÂ-Yuì?`Ÿß…Â0ÚÅC†E±ÆöqB4 èóíI=ôWÌÒC¡üé8FÒq¹ ¢h'Äû-ª¯âädØÙÉÍŸÏ-X!¢¨§^u•™Ÿÿ˼W–¾pNKɉG\.!B³ÅÅ{æ!„!„°,òûÅ—^Ú/½è~ûŽcªª¬Úv݆ˆ"‰,K Ä))æ AÆ!81ñðmôûQSjn†Íͨ¥55!ŸoOæÿ}0КÑÅé4úô1†5{÷Ɖ‰$6ÇÇA°â&€¦AU…¡ôûÚæí ¯eYâñX­^u•zà ÿ¥hEš\®=‰D¬ƒü¯gD¡P~;Žæ$]²?4™<¬í †ðÑGâ;ï°«VÌ^½Ô+¯TÏ;UU±+VQ„á0?s&?o?þAt!}äHsР#ö±ä»¶–ÿöÛ£ BH½è"cØ0¨(Ìq$-ÍÌËÃYYÄJ;ÍRùkÒ…F'l±Â ù‡VºÚ†uZ&üÞséZÛñ÷ÕÊòþ?Ç?Á~úÔ̧PŽ?Žf‚F+ÏŒ5—Þ~žãpïܪ‡Ú DtÝyê©ü† BcÔ(åÚkÕSNÁ±±L$b&$ L€i*7ßÌ­\ÉûížlŽQ‰dØÒ­ZÅ­\y4g ! ÄÌÊ2† ÛÓqa-Ôu£õŠ+þ‹ÑMIHÀN'À †eçî™jª‹”K¢PºÌ‹{`eˆÕ52aXΑ¿Õèz´2 K3°·Y"‡I³|àE³8 ƒ>š/B¡ü‰82é·r@•«VK’”›“ãpØ1ÆÖÃϲ¬¦ëÍ--ñqñ‚h*Í®Î6žçÙŒ 9&F¿ývcÔ(S’DMƒá°¬iPUýõõ»"A›2E™6 €¢3ƒ[ÕáŽL{;Dhó•/¡®sTI’h膦ë,Ø{—#†!šfdg›½zÁ½^ÖÈÚÁ4a$bFƒ¶ºL%FÀB BHÓ`S@7ŒÖÎÎøøxÀ0¦µåÞLú–ÿÒΊ @fFFtJ)Ëß:,ƒ‰± ŠBYQ v»ÝrìéºeWžè•d‡>wBÜ[ÜžSè2íÕÌð< …Ø.]1]¥ö+ýÀUÖ1E±ì€ƒDgS¡PŽOŽ@ú£¹Ÿ~î…˜og§ÒÄñ§N™¢¨ª×ëµÒÈT×Ô¼üÚô§{„ã8·ËÅ0Œ•È!äv¹€­ÅÅê½÷Ð?¬( r2ÌÎò EUGŽ^ZZúâk¯?õè#»=€Màm’$ËŠ,Ë–ŒE»]1B%D#D€0¬ë!‰e#†Á3ŒB…᪛Râbó22Z4Íβ6„dB"º.²œ‹`¤Èš¦s,K…B„Ë"vÚl,ÃB ÃAQYVN»ç¸P8¬Â‚×ë­«¯{âÅ—º÷ÞøøXQ”t]·ÒÙ›¦éõz¿ýîû¹óçŸ0vLJrr||< $ œòº¦…Âa§Ó¹³¤DQ8÷`Ð0 I’l’Ù;÷ØûÊåp8Æ¡pØ&Ö+…õÁf³± c˜¦•ªSQUÃ0œN‡®éÁPˆçyQ„tÃ0 £¥­­¼¼bòI“:::¢qF.§“ã¸H$¬(ªUº,˲¢ „¬UápXÓ4»Ý.ð¼iš»ªª¿ÿé§Ë.¾Øa·I6I×õP(,Š"Ïó Ãhš‘#üÅ=÷)”?#G&ý¢ ”WT4·´¼úâó,Ëú|>Ý0TUýøÓÏl6é”)Sb,wxá÷?̓“Nœèu»Ã‘È×ßÎ G"£GŽx÷½Ú}>ÿ% 0€„ ,¿ýÞ{~$IIInjjþèÓÏžŸ<éĸ¸¸ÅÅë6l2h`ï^½¬x(N+vU­Y³&';+­G†ÆÆ¡ƒ…ÂáÍÅ;è_U_¿zÍÚœìì¬ÌÌW"==휳ΡH$²ìÆÍ[>ÿêëú††×ßzÛép¼õλ;KJ¬Lñ5»wßûÐÃÂŽ@0¬(¯¾õvDÓv”–}õÝ÷Í>ß=?‚ê‚r°lXQTÝ(¯ªzã½÷nÏ﾿»¾~ɪÕ_Ìœi˜æÝ< …æ.X0ëûìƘ`üÜK/765­\³æ•éÓ9ž{æ…ýÀ·ßÿðÙ—_µ¶¶>öÔÓMMMÓßšQRZæ°Û Ó ƒÏ¿ü DzßýøÓ‚E‹ív!Ä0LÄ0š¦Ë²òêô7—¯\¹³´ôÙ_jhl|ú¹çwC!ˆÐ;„0‰<óü ²¢(ŠòÆ[3ÚÛ;š[ZÞz÷ÝööŽ'žy¶¤¬|wmí“Ï>WRVVßÐðÂ+¯²,;ëûW¬\]U³ûÙ^dYö“Ï>_´d Çqã6_›•…Ân·üÙçŸ}õµ$Š~¿¿r×®7Þžát8Þ˜1c÷îÚ¯¿ùöÓ/¿”D1 ®Z³æÙ^²IR›Ï×ÞÞþÃO?WTîzò™gÛ|¾>ùtÞ‚+V­z÷ƒyžá•WwUUY[ëûœB¡ìÑI¿išv»ý©Ç½ýæ¿oßQüÄ3ÏÖÕÕm)Ú*˲Ï×¾½x'&„çùH$²rõEQÚÛÛwUUoÛ¾cw]݃÷Þsåe—:´¿¾£FŒ¸ä !„š®''% ÿðƒ©§œüÆ;ïºγN?]Õ´¯¿ný† w?ðà}€1.)-8þ„¯×år6tÐÀ½{Îxï}€?0 #Ddù—,üÈŠш¦i²,kš&‰’×ãY¿qSb|BÍîÝãÆŽ]¸xñÆÍ›%Iììô»Ýn‡ÃÞ·wï‘Ç{<îP(Ä2Œ®ëáH¤££C†Aë6lLLHe91!aÕšµápØ&5Œ#8wžçãbc›š›KËÊìv›À‹@°Íצiz  €Dd% E"²¢ª@@ày§ÃѧO¯aC‡¤§§mظÑPUÕÄX×õ¦ææŠŠ §ÓÅóœ¢(yy¹wþãög^x±¶¶nÔÈáN‡cø°¡C‡ JJJbæ?ÿºãù—^ÞYRòÈ÷ßqÛ-_};ëÞ‡¾çßÿŽD"=RSW¬\ÙØØ¸~ã¦ä¤$k¶d@ˆ®ë€&+£PŽKŽ,s'Çq•»Þ|çÝEK–ÔÖÕÝtÃõùùy¢(.\¼¤¤´T’Äýú-[¾¼¦¶öüsÎ^ºlùÖíÛeY=j¤$‰Ÿ~ùå¦Í[2ÒÓ òó-]ZW_?tð Æ866fÙòõ }z––—Ÿ0nlGGGk[ÛE矻«ªzåêÕµuuy={z½zµ¶ùDQìUX°isÑØ1£›[Z0ÆC TU²mûŽ‘Ã‡ùÁˆ,:dæMC>tȼ -Y:p@ÿK/¾A̧_|Q^Q)ðÂùçžcÆÂÅK*wíJIN¢ë:ÇqÛ‹wd¤¥÷íÛÇãrÿ0{öú Ï:ýô^ùÅ%%cF²òÄB~å¹{½^EQRSR~ÿg_~UVV>dð À3¿©­«‰8 ÿ®]UcÇŒVTeWUÕð¡CÒz¤Ê²²x鲊ÊÊŒ´tÄ Ÿ¯ý„±cŠKJl’mÜØ1›¶­ß¸qèàA‚ °,ûóÜù_}ó-˰ÆŸ0~ì˜]{®X]ï^…«×®ýü«¯†9íÔSZÛÚÞzçÝP8<~ìØì¬¬â’’Ë/¾¨Í×6óÛYŠ¢þý†ëž8`ÀÆM›{ææöHIÑöÎß=¡™;)ÇG“¹Óò0A…B!‡Ãae‘EQQEQ$I²|û,'Ã0B¡Íf³f²È²¦i¢(2 ƒ Ô­ù{ó CuÝØãÛnQ'Bç;ý~–e­if!UUE‰Õ4M’¤»ï{`ÊäIãÇDd]×­Uº®[òjùñ=N4Í˲Ѳ¢ û-´¾r,kuO‰¢(˲õß4M›Í¦ëº(ŠÁ`cl¹9Fƒ1¶f-·Àq§ªªuÀ£;w€(Š@Àó<ÏóÖô¿†aX»Gcm 1!¢ X®–º®³,keMû%!A°Ûíº® ßÙ¹§t@0Áá°kš‘e‚±×ëÕ4akö`EQxžÇ¦‰ †a 'tóŽ~š¾r\q”éÛ,54MS’$MÓÀž462à »ýžçUUµr)[îÞYfÆf³YÝÊ KŒ+ÜÛ Xm5KWÔ©\V«ñˆjƘçyQdY¶Ûí›·µúÚ†,ËŠuV¢ X¥ë{MÓ4eÓŒ'ZýÊ²Ž¿ßB뫦ëa$AɲÂ0Œå¿h¾ò<ö†ïv=Žu VP‚埪w1ôÜ‘HD€Rçp8¬¶6ZÕèq¬£³ZAK”­µªºÏ[ÆØíraB¬«'Ëû”n­RBh·Ù–Ë©UVD–„,7$«]¯?…B9Þ8Ê!8KЭÏ!B@t@Ð%—CÔÆ±Þ•Ø ë’®²öF6í·=!ÄÜÓWn¸]Λ®¿Î !¶DÇÜ[ú~‡úe‚­}—ÿ× Dÿ“½9¢‚]Ï¥ëìçu¹Pžþ‘ž»•'9ºY4xê §³_ŵYsߣu-½ëª E{åþ Q(”ãcì}A]ÔeW¦¥õÈDÌž™I~‡êQý¢P(=Ž™ô[1¿Ì.Òå5â×!ÔuCƯÍEsäÕ#˜¦AÛ …òWâ˜I?ÇqápH–e¡ÃnE):øyDÀßZ’-·K†a‚Á ª© BN‡“ãyÚsM¡Pþ2é·zäËÊËLÓ% AØÜÜät:Óz¤ï—”@ºtÐèndã¿F‘ÿ{þä½›Yƒ·ÕÕU Ë‚`šfcSc|\BB|‚nì£þ]`e5º‚1>Lv³Ã¯¥P(”ÿ…c#ý;KŠ=OA~¡¥nš¦mÝR]]•••5®-–ìvlšBÃ0¬\ÐÑ”Æ,âhš¦¦i‡w—&„Ø$I7ŒèPð¡dÚòÀÙY²#33»Gj†a0&áp¨hëŒÍ¤¤ä®Õã8Îj†ÑTõðÞëûŠ²Ù¤HD>Ôö‡]QÔh¼…B¡ü†ü¡ÒoÉeCC=D¨WaïM%u3—WÙEö²Éƒ X¶bELl¬Óá´¼A¨Ù½ûÙ_²I¶H$2á„qgqº®ë<Çê†Á äg¼ü Dz^BB‚åDoÙÞÖ´½†aX¹ä†ùñç9ÙYYùy=-Çùh`¹Ì[o„–å**+bcb3Ò3"‘°UmIûôî³ió&¯7ÆrŠÇ;Ž+W½ÿñ'^[à…Ë/½8+#CÕ4žç£CVgË!‡ãXÃ0£K:::V¬Z=å¤IÇY®ñÖ.V4€a_Íüv̨Q11^ËÓò·±J§í…Bùù£»BMÍÍ™é=êš|Ï|½-&>.`òO¾É4q\\\ss³¥ÅVìXGgg(ºõï7þ玎5JÓ4ŒqCS“av»}æ7³š››§žr²Çã1M3 YK–gz$‘$)·´¶š¦É°Œ5·c(jimµÂ”Ahóù`´;È4@Пšš‰„06 Á„`YŽØí6›Mjo÷YâkeE®«¯çyî¶›ÿž•™ñêo"„xžoni±’wZ X8ÑuÝ4ÍÆÆ&›YnikãyˆÄó.–­mloó‡žõû–1öFºš&Þ¶}‡¢(ãÆŽùñç9ó,ôx<ã›o¼aíúõ¡pxý†“>ùD×õœ¬ì+.»ä¡Ç—eè A©©)ß~÷½Íf»îꫪ«k$Qúð“O !­m¾Ñ#GüíÚkÞ˜ñζíÛ1&±±1÷üûNUÓ!šªîx…1Ƙ4]ƒpOci5N^'9)1..NUT„Ðû}\USÃ0Ì×][U]óֻ簾¤¤¦¤lÞRäõzÁ`ÔÔòŠŠsν §žrò«o¼ G.½èÂêšÝ>_{{{û÷Þ3ãÝ÷UÍÍÉž;oÃ2Ó¦ž:xà@õ÷ñg¥P(Ý?Ôê‡@DAh÷‡²’^^©®ï¬¬ií¼! K’„ñÞ>qB „¡p¨¬¼bgIi0 YY™/>óTGg‡ßïÂØÑ£F^{Õ•o̘1røð§{´¬²bÞÂEŠ¢\|þùSNšôÅ×3o¹éÆûþï®ì¬¬ªšš@0 /¹ð›ÿvÃÚõë×oܸ~ãÆ§{tê)S:::£ÁY Ã(ŠÐtÍ0 ÃÐ ÃÀØTT•ç…hä!„ã¹µë×ßóÀCËW®ºý–¿—”|ÿÓìQ#FTUU9óÄ –aïÿ¿»z¤¦Š¢ðôã…Bá 'Œ»æÊ+æ/\¤iZ}cCUuõöââ“Nœxòä“ZZ[׬[7p@ÿsÎ:“a˜’ÒÒ>½{UìÚUVV¶mGqjJÊû}\XX€zsÆ»ÇÒl0 å¨ùc‡y!0M3­GÚ¶âíS&MºõÌÞ?¯­²Å2gŽŽ„ëjkGŽ­ëÚ/™ £gNÎÝÿ¹Óú:wÁ‚ø¸8–ãbcb0&Vfãp$’““ír¹âãâ|>ŸÓéLMIÑucœ•ee˜xže»Ýîr:U]õ¸ÝÍ-­ǹÝnÛÃqÙkÈÇÅÅïØ¹}ì˜q‘°lš&Ðår쮫 ‡Ã‰ ‰Ñ·¡®éãÆŒ¹ÿÿîRTÕépÌ]°çù`(tâÄ ƒ hóùâ]n7Ïó.—‹ç¸„øxI !’$"„&ãÇËÌÈøø³Ï—¯\yÏþýòsÏ~õÍ·ËW®ºëÎ;8Žë‘’:dРWßxÓf³åçõ ‡#š¦ä9ÂJ¨p¬o …ògå¶ú ÃHHHLˆM˜=g®Èê7œÞçÒÉ…m­M‹—.ÍÏ+°’üX„6m½ï¡‡ïøÏ]ó.Ä&C€`0hš¦ªj¡p˜çù“O:éÍï<üاL™ÜÜÒ 332232îº÷þ×Þx³f÷n]×UU †Bº®›†ÙÜÒ:røpÓ0î¾ïþY?üÍL ëzNV®® -GB“˜Û‹·nܸ±waŸhg"¨jš¢( Ëêºôë›™‘ÑÚÚ†r8ìš®‚A€¦iÁ`ˆ4]×t=›¦©éÚšuëÖ¬[çt:ÚÛ;**+gÏër:Û|mº®G"MÓNœ0~öœy½ òöï×ÒÒ°ÙlT÷)Êÿ‘eîüM°’¬ÕÔÔTí®jo÷1 —›Ó3!!Áª†µB("ËÛw«ª¢ëzVf¦$I¦i¦§¥•–•%%&†ÂaÓ4{¤¦"„v––¶´´ è×ßårî,)Më‘ê°ÛUM[½v,Ë#G ïèèpØí~jJ !dwmmaA¢(Û¶ïØ´eKm]ÝS=jͬk%Î,-+­­«ñû;ALLH,Èïív»öóìlni ‡#Y™ÖDWÇuvv®^»B0dÐ †eÛÚ|y=s[ÛÚ:;;ssrÊÊË---©))uõ .—sÃÆM±£G1 ³jíÚP04|ØÐ䤤’²²´=$Q,-+âr¹EY½v](êÝ«WVføðOÍÜI9®ˆfî<Ò-Þ4M+‚—çxÁá²!›$YZ¬¨ªåþ¨ªª•7”aë+@’$kÒðhVQ+W³ÝnG†Ã–aLŒY†Q5 B(|8©¨¬Œ}ïÃâbcoýû ÃXEó9ûÍ™neµŒD"ŽeeE‰nMwÊsœªiÏ›K¢H¬í ±ÛlAEVTM—$Ѫ€$Iªªv9¤( ãý³@¥Ÿr\q”I›+ „VccI­qˆ$9c«ÏÄJ®Ý7‰D3ìG³ƒ½~V^eËÞJmÒ  iBcG†)¯¨üü«¯³³².8÷œ`0Õ}€¥­Ö+”ìÀŒ›º®kºŽº¤«4 £Óïn¬ëºå,d•kU1 ë&ÚtY5÷[µírë]dŸÓ9òÈa …BéÊ1Ëáµ”»~=ƒ&38pa×%]‰Ce`¶^qÎ=ëÌ Î;ŽDös˜éZ½CÕí@ÞO”»·_ÅÀÁr8ô,z: …ò¿Ð­§Ì¶ßêß?Öu¡P(”?Žn-ýTñ)J÷ä(µÏÄRdâß8Èè7? …B¡PÀÑI?Àcç%ž‰Š?Aè¶q¿U_ôÄûvÆcËJ¡P(GËÑH?ƒàìM ¥õAŽ…ÄeB²>k“¢aK”1!&&&&†I LÑÏ–-O0Lb˜{ÝÀ¿|Žp^Q“f`À!°ƒ ]`1!´ P(”£àȤŸÀ"ØÒÎ~rÉ3³vØÖ41Ï¢8¯¤›øÉÏ·@¼Á0±M`]6ÎmãóåÖlp Šh檲6×Î3¶”u>‡È9EŽª?…B¡)G6Ì‹ qHüŒE•'I EôâZ~Š«¤>0ãÓ¢úvŠì²âÃ$—ž5wsƒ/¨©†9·¨±g’óÖSó¿XYSÞ¬n Ÿ20åœi»š‚.¬ )Æ“{¦ÄH÷~^äè×LÌéæÞY˜ñiQC‡€c‘‰‰À¡6Ô=þÍŽk&fŸ=qÉÀÇ/îÿÉŠš‰-8惛G]=1çߟl¾fúžEÔô§P(”_ÏH?&Dâ™òÆàÚrßÓß/+n^_Þ¶¥ºSSŒûÎï;e@²À¢Ñ… iIÎ7ç–dý’q™AÅX_Ñhê”Ú—ËJµ­.k“#úÃõ¿è„l‡Èm*këje‡Än®êPã¾óûžÔ?ÙëàMŒ­‘Þ¿RTÓ©8-Î!ØÝÞ^ëY&9F¢²O¡P(GÄ‘tø pÌÇKªNî›ô¯sz×´„ïú`SGPEzýç²$ØÖáYtîˆô ž^z÷y}y–¹ï½]=¤µCˆÑ;Cª_Öƒ%3ÎÁ䵟KGäÅ¥ÅÚ2“É^ñ‚Q&YñöˆI¦ÿ\–èÛÛ#@¡n˜~¹UÖðÝg÷>¡WBiCàŽ7g'8Þ¸aXAŠËÑi”+…B¡üz˜«¯¾:))):Ý+˲íí<Ç;Nï7,¬*o;tÆðÜØÜ$gGDqgKû`É®êÖpa†gd~|j¬­5¤]0:37É¡0wK£$²ú$J—ŸâN‹•vù"“û'Ìô~±r÷ú _ÿLïÉ’lkZ¸­c2¾wb~Šë³•ÕÕ-á‚tÏ ½8˜ ͽjBNjŒäÉý’/“iØ b D…ŸrüÂ0LKk‹Ûíæ9žN°C9æ0 ÓÜÜ|d™; n'k¦¢›—×t ðŒ‰ ‹?¢A$š‰«›ØÆ³ªa"ukvÙ¸ ¬ ,óÈÀDÓMCà4CBŠ.ñ,Ï"“Á€¬ ,Bªa„B„€ªcD³ÚPŽohæNÊqÅÏÜI‰þ.‚v„U!ƒ ÀÞ“:8¢@Bƒ ! Õ¯ „Y‡DTco"3€ hª ‚Õ«h™ìmÚžÔÇ]WY„` 4lB¬¤j&&&Z›@ÕŸr¼B¡–>å8ä Òoe4c&Ú Ô•ƒf—ÜhòヮçÑáv9Ô^ÊŸ Ã0d_#ŠB9æì/ýVŸOõîêV_+615¨)”ÿ  „²"sGÍÊñÃ>ÒoM?’’”’ŸH¡ºO¡ü`ÍùC¥Ÿrüpðk–«c]7 å/}ÊñÆ¡‡yéÍJ¡P(Qèˆ*…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;¨ôS(J·ƒJ?…B¡t;ØÃ¯ÆBB„þK;Ai !˜@!ô_­€Ax%v­ªiš¿¦P …Bù+ñ_¤ßf³‰¢0 # fK!Ãqº®Qñ„–eí6b0‰(ªzx!–$I’$ˆiâH$bÆ¡¶ßÓB°ßѪBccb"‘ˆªiTý)J÷áÒOáy~ñÒe_|=S–å!ƒ]uù¥ÇaŒ!„„!Þk;CUíli‰‹eÆ2¥ €kck3²÷«µ &Däù6Ÿïµ7Þܶc‡À —\táð¡CTMcclmÖu/žçW®Zýõ·³Á™™™gŸqzrR’iš 7!„a!¡išV•¬Ê+ªÚÙÜœ ªêÍÿ¸ã¼sÎ>th8fYöÀBi“@¡Pþz¼Ç4M›$mÜ´ùÁGËÊH‡Ýβ,Ë0 ÃD{¥ „Çuvv«Ù]+Ë2Ïó–î{<îm;vÜrÇÇåõÌu:!I’,TE« PþGŽõ“N¡ìÃA¬~„‚ˆã8USeYNMMvê)II‰>_ûßn¹õô©S/»äâ'ž~& 2øó/¾Ò4íúk¯ùqöì¦æ–¿ÝrëuW_•””øÚô7Çm7ß„óÄ3Ï2 £(J~Ïž[¶mÍÌÈø¿;ïQ’¤o?øP×õO?x×år«ªjzCCÃK¯½^ZV^Ÿ÷¯Ü>ý­·wï®mïèèÓ»×·ÝúØSO··wT쪄U»ü Ýn_°xñ«o¼i·Ùl’íäÉ'ý0{ö³O<þÃìŸ+*+Çýàc;ìö)'MJJJúî‡Çç3ëû[ZZnºýösÎ8³¡±1ŽÇžz¦¼¢¢k¡½{õú×í·qG]Êÿ„Ð0Œc] åö‘~BÇqM-Muõu’(6ôõ—^|çƒ>ûòË1#GþûŽ è×ïëY³Î˜vÚÜù n½ù¦ÙsæúÁóÎ9«waA8..)ýÏ¿þó¯ÿ»gðÀuõõ÷?üè£Ü¿³¤äÑïÿ6mÙòÏÛnyäñ'W®Z=mêTÃ0š›[rr²].wcc#Çq‡ãÍwÞmjn~üá}òéï¾ßÒÒêt9/»ä¢ÿ»ïS§L9ÿœ³‹¶n»æÊ+B¡ÐK¯¾^Y¹ë½>šzò”¸Ø¸·ß{? 5·´BÁ`[›OÕ4»ÝöÔcx½^ŸÏž0~Îüöù´©§îªªºãÖ[SSR>ùâó‰ãO˜ñÞMûzñE÷?üÈàAÓÓR4M§=?”£ÆÄfa^!˲Ԇ 'ìoõ3ˆ ƒ‰ñ‰i=ÒÚ|¾ø¸¸f¼=oþ‚¿ÝrëÄñã/»øâå+W¾øêkÉÉI£†ÏLO_»~ýœyóì6[zZBhÈ A ¡PH×Üœ§Ó ‡½^ïè‘#Ë+v1,3iâÄ÷>ü8 YJ:p@ÿ'žyvùʕÆ éìì …BMMÍù={èß?¿gîîÚZ›MÊÏË›0n\Jrr(.ÈËã8nôˆ`ðãÏ>ïèìTuÒĉv›í³/¿äXÖ41˲<Ç t»Ü½{õ¿õλ²¢def¶¶µ&ÄÅ3 3 ?žçm’ !TßP_—·¡'ŒKLLô*è …þ«ƒ…r „žç·o×t¾>RŽö—~BˆeY§Ã1oÁ‚{z$6&Æ4ÍI'fge%%%Ž1bÆ{ïßuÇ?Ç;ïØÒÚRWßÐé÷6”eÙ3Ï»àòK/™8þ„’Ò²©©©))¢(¶µµ‚A¿ßïóù‚@{{»®k ÃtvvN9iÒ¶í;nùÇ ññm>ßÍ7Þpåe—>øØã\zY›Ï÷Èý÷¿úÆ ÁP¨½½Ý0Œp$ÒÞÑ …BápCccnvöè‘#nºíö„¸øN ';Ëëq_{ãMሜ“•©¨J{G»¬È¦aîÚUÅrœÃnkóµ'&&0 sÁe—Ÿuúéš®išvñ…ÜûÀC-cÌó<ÇqTú)Gõ&Íqܱ®…²pùòåýû÷×4ÍÏ¡¼²Ün³§$§ø|¾²òЦæfÇ=dð`Iyž_¿aÃ-ÿü×羟ž–¶³´¬º¦&)1±Oï^,ËªÜU•ß³g||ÜÒå+|ííýûöÍÌH/Ú¶mðÀõ ¡P¸Oï^[¶n‹O둪ë:Ã0 ÃlݶmWUµÝa/ÌÏÏHO«¨ÜU^Q‘Ÿ—Ÿ•¹aã&·Û•ž–¶ió–¬Ì Q7o)1|˜a[·mÏÏË‹‰ñVTVnظéãÏ>ŸþòK¢$mÝæõxl6›Û嬭¯ЯÏó kׯ÷x‰Xg+Š"!c‡AAÕT†a5MÓ4íà…Úlª¦YÇú'£øÃúQ €àn*ý”㊨ôÒ¯Bhšf0$„Xq³Çù|¾ˆ9÷¬3­ö@–åH$b¹TBE‘eÙêéôûÁÞ` À0Œ¬ª€„P(‚{£p­ÿáp˜ìæEYÇ!„Bá°µq0¸g¯N¿ßò ‚,Ëäç¯]¿aäða§M=• kšº7( B¨išU7MÓE±–G‹@¢X•"øG÷ÅQ§üÙ9t4/€®ÜV¯÷sO>! G"ö}w]Â0Ì~Ÿ„`¯òfÇý¾F?G?Dl5SOžræé§™†‘eÃ0ö;TTµ!„]«Ý,ºÁá ¥Ÿ@5]kim9Ò0òÿ¥D¯×ëvºé€-åO {D[[±äxŠq …Ã$ Ô<ïž´¶µ¦$§8Î?̯ª©âÎn§½7”?1GcÕW ‹b¢)غ'c]×=niš@q„QEQ”«·þ”?+GfõS(Ç!†aXY:~ï‚!†i|½õR(GÇÑHÿqÕás\Aöf¦ûÊûýÊú³üÊ@ŒqTúɾ)Û³° ú݉(”ß‹#–~!˲ÿcBëA=Šgò¨wü5ÄG³¿Å»¼¼Ã0Œ¦i¿_W€• ̪§5Ðý{”ey=uíˆàø<Ëg7zW`ŒY†ZÑGw}º^çý äÈü;)”ã#“~+ UGg§ÛåêúDY¶•ÕûiIꢧ`ïlTJì6›¬(Q©]žÞ=¡{µxÏ*„!’$†¡iš¥zÖ.Ñr»VµëCÛuK°w²†a¬À…èív[8±¼Z!D–ÖY•±j…-[²ËpwtŒÁÒýÖ¶¶`0˜œ”dekÙ»@hŸÓïzÅ¢KºÐÚ2z !÷ø)ñ<G† ‡ÃV˜1üe³ý/Ü÷‡8ð÷Š^v«\«¦ijš&Ø{²`o‹¸ßÇÜ ‚®V¿Ua Hq8ìûÙ(Ñ ë×èµúå&„ã8AÂápWǰ=ÒoÝÊŸ™#xh­ç¡¹¥õGSUÕétº\.—Ó)IRŒ×+I’Õåt8¼n·%ͧÓáv¹,±°Ûí.—Ëív¯\³†ât:öh!<ÏÇÄÄØívŽãì6›¥Mv»`­²I’Ãn/Úº­­Ík𦠱11’(bŒžw:·[’$—Ëår¹ºV›eY¯×ër¹,Ár:^¯`·Û‹¶mkmk‹Ã¯XµÚa·;ί¾ùvgIILLŒÓáðz=,ËbB†ñz<·Ëf“!6›-&&&&f·ÙÊ+*êéEK–ªªêv»N§µ™uBˆÝnwïsÅÄhs…r»]1^/Ïó‡Ãáv¹<.—%»,Ëz½I’8Ž ë7lŠ‹cæ™^jo‹³š1–ec¼^Ëó„ã8»Ýîv»­¼Ù»Í¶oéÆX„˜¯koA6Iòz<±±±Û¶ï˜þöŒ¸¸8›Íf³Ù/]¶xéR¯ÇãpØc¼^ç­Àãv»œÎc}ƒ®¹‘ ðÛl3gÍúà“OÜn·(Š.—K’D»ÍfÝ„IN§ÝfÛ¦É0ŒÛå’$É0MŽã$IŠõkׯ{[eë‡þe’8 åÏ sõÕW'u™í„eÙöŽvžãœƒ-­L±IDAT§‰÷Ÿ…eÙN¿ÕêÕ'N_^Y¹aãÆŠÊ]“y  „’«ª«KËÊ·ÇÅÆ8ìvLÈÚõJËËS’“ ÃØ¾£¸¼²rGqñoÏð1^¯×ã1MSàùú†Æ¹ æË²‚ÜU]œ”¤ªêŽ;â㛚šæÌ›/+2˰>ñ䮪jÇ’’²«ªêçyó8ŽKIN®®©Ù¶}ÇÚõëÃlÜ´¹¬¼<3#ìÕý@ 0áÂÚÚº¤¤DA–.[¾¹hkfFF xøñ'*wU%'&mÙºõ…W^ã8..6ÆÄfLŒ·¡±qëöí6nJˆs¹\@`μùÕ5»UUMJL,Þ¹sÑÒ¥¸¸X€aš/¼òš¦é§Ÿvª¦ë¥åå••™ééÛ‹wnܼÙëñØíömÛ·oܼ¥¢²c2oá1 ñ –ôȲ¼pñÒõ6º\NI’жnݲuÛÎÒÒÔÔ»ÍÖæk_¶by$"§¥¥¾ÿÑ'Ÿ}ù•Ó錋ýá§ÙáH¤¬¼"Æë‰‰‰ióù~üùçp(œ™‘ÑÜÒRV^±}ÇŽãÜ.—iš;KJº–Ž LMM)«¨œ7ÁîÚº”äd‡ÃQ\R2oáB„˜p8”e¹z÷îµë7L8aÜ#OöxbB¢¥KƒÁ`Vfæý? X°`Ƹ±¹¹b×.ÛÕ»°pîü¼À·ùÚ–­X1nÌè'ž~Öåt.^ºÔãñ´µù{úiRS’“5M»óî{xžß°i³Uú'Ÿ}1á„v––¶´¶®Y·¾µ­ !ôÚoÚívI%Iš=wnA~þÌog%&$ì,-mll\ºbÅæ¢"Ñ×ß~{ʔɯ¿õv ,¯¨¬kh2hv,&¹„vú;Ý.wTú­WÏõ7rG0yâÙçzææ¼ñö;¼À—”––UTæåæüûž{Çì¹ótMKˆOxäÉ'Dsç/°Ûl›ŠŠ>ùì —ÓYW_ßÚÒêq{zææ‚5ü-égc“¨ôSþ”XÒ4½´B‚qLŒ÷ºÿoï>㣪Ò€ŸsûÜé%’„¡W•ÞQ±tm¨ì«®®îê®ëºUwum ¸®m­¨Ø°Ñ{/!@H’Þ3)So?ï‡ÃTÊæü?ä7™rÛÜûÜ;çžóeÊ?Ÿú›YßûpIIiéãþöé¿ýµ±¹9'7·ß¾Þwß#¿z 11áþ Æ_r‰$˳ٜ”˜àóµ÷ÎH6dHÏI»öäìÏË»dܘؘ˜„øxŸÏ×;#cøÐ!33¯½jîœY3×oÜTßРëFéÑ£E‡[Ìæñ—^úàý÷»\®[o¾iúÔ)%¥¥,ÃàfÔ””¶Ö¶¾}ûp»fÝz]ÓÃ’´ië¶´Ô”ÁÙƒ®½êªY3f\2fLz¯^¿ÿÍ#éi š¦Ü.×í·Þ²`þ]Á`pãæ-B¿ô·WΙc2™Ün—Óa—ÂáìAYUUãââ²³³ÆŒyŜ٠ÃÜtýõ·ÿâÖõ7Þs×øÝcqq±ËW­îÙ#é®ÛoÇ[ìÁûïE±¾¡ã8EQââbôïÇ0Œ×ÛRS[Û;=ã_.¸fîܺú†«×ôJMùýo{Çí¿X³~ÃØÑ£²dþæ×Y-–eo½ù¦{çß%Ëòö;#„êêê÷æîãyn`fæ“ÿ®_߾Т\N×ÝwÞ™»Ùl®¬®5b¸Ãnç8¶¸¤ä˯¿¾öê¹ýæ‘™3¦‡Â¡~}úÞ}ç—]zIiYÏsM›L¦«.¿ü·?ıÜþ¼¼½¹ûB­mm;wï>¿»²®ëÆq¸'¿‘=pà‚»ïNIî9yÂø[o¾©ªªZ’åø¸¸wÏÿã¿Ý¶cçGK—f¤¥=ö›‡ï¼íÖ¯—/WuâøË¼ÿ¾™Ó¦õíÛç×>`6›UU=1qC7AÚú‰‹Ý‡~„€ªjUQ¿– ÝÀéÛ <ö‹[‘åv¿¯g2—””Ȳìt8ÃápX C¡P(\r´´µ­ ßQ4 £ÿ:#=í·?QW_?kúô?ý¬èðáÑ#F €}äáŒô´G¢¶®NÓ´²òrUQ,f³Íf2xÐ_þøÄ˜Q#Û}>Y–}>„Àï÷K² ß{Ôt}þwÌ™5ã/O=w0ßãqÇÅÅ]1{Ö_ÿø¤¨`0TQQ UMkko/.) …š¦iš®ªj0 †B»½¾¾¾®®Î„BᤤÄ?>þûP8üø“Æ·%t]…ÂÁ` jš$áv–CGŽ´¶¶665ÅÅÆ„ÃR 8y‹Adf³yåê5}úéÈÃ9ŽÓ4MQ É Æã©­«kok;|øˆÃnGjllªªªV5MÓ5 &“Éb1÷íÓû‘‡¼áÚkÚÛÛuÝÀI÷ „EUüþ¨¹DAêÿzÎ ÈÌÔuÝb¶>Rìóùü~?@@–edøZ^U5]Ó5U ‡Ã8­Ïñ¢hJMI¾ã·>tÿ}²,ŸÇ›½‘VøH[¼®jš¦áô@@7t àóû!‘4]—$©¼²‚㸞=zTU×Ô××çy\.@8V%766•””àþZ‘)ã>q±;³>!†¡Ýn¡Ëå¢FMv» BàÄM¢,YºtÝÆMýúô½|ö,A>Zú)2Œ+çÌÉ8`ãæÍBA¦Nžøî²,;vôhÃ0ÊÊËßýp MQ—Ž˲ìðaC.~5ÆãîÝ»÷>ú˜¦¨KÇŽEqêäÉÿyóM—Ó‰+máVï””d›Ífè:EQ.§ ÷Õ±Y­ºaÐ4íóù^{ó-YVee¥õêuãu×½¿ä£ú†úŒ´´¬fL›úÆ[oÛl¶k¯¾jHö _~å=#‚ÓédB(¦!ƒ³ÇŽýø“Ö4-..vßþ_,ûš¦©ñ—^BS´ Td6«U7t€Ëáxž¦éùwÜöÁGoÛ¾s`fæÔI“¶ïØÉ±ìñ-N'Ë2]ÓRSRxž_¹zËé´XÌ.‡BhE–a§M™\PTøû'ÿ$Âü;nw»\N§ã…E‹yðW1DzxšÙYY/»lÙ×ßZÌæë®¹Êl6;ìvI“€ÛåbúÄÜNŽãdfÈËã8.66ö†k¯yqÑ+¿~ô±S§ÄÇÅ9€Õb1‹"@Ó4»Ýf2™(š²Z-I‰ ×_sõª5ëöí?0jÄðŒ´4Y×ÏW‹¿®ë‘^:øN¯Åj†bYÖåt"Ãp9Ë"v;MSuuuOýóÙ@0xó ×”USW÷—§žá¾÷®ß°‘eÙP8< ³ÿ†M›^yí?ÿwï=VˉþÇ™Hz÷µS&mNˆKPÔ3h½5 Ãl6?ù—¿ee œ4a¼ÝfSU•çùp8Œ_’e9òf–aB’„0 „~¿?'ÄÇkº.Šâã|râ„ Ó&O ƒÁ`0'$$ྞ²¢ Ãàyž¢¨¦¦&Ü•åûÖÂp8ÜÞîÃZp’Îööv«Õʲ,Ë0’¢ Ãà8Ž¢`(,± ÓåZ[,f©–.Ý›»ÿ¹s:—ãg—‹O!—ËeLBKAœ5’¯Ÿ¸ˆáÎ<<χ¥0„?o‡Kà±Ùqüù^o‚ø±Hè'.bÂúÆz‹Ùâr¹~ö»¯èX–ІÆ·Ó-ð‚È…?q±"¡Ÿ¸ˆ†!KrßÞ}ÏYFŽãü0EQWÏÛ(6‚ø‘Hè'.n US5õ‡GWýóBˆ¦hdî=ÄE„~ââ!D:7}íB8WA\ìÎ2ôGš?‹Qgu þäÅo£'hˆ¢àñ'Ïx&g·lx¼é'~öP£yî':Û]tU8:‡Ïù^m‚øQΦ6/îzy|R9lÀÉ0: FBçq"ÜΧ)S: Ñä8'6è0 t:Â;´Þ‰§Àqœ¡ëª¦Ñ4-œ¬(!ç5]ñÛåBv˜;Îõ‘ÐùLÐá#àxâp8©¥6€´#Ÿx¢Â"†¢i ï'€ïÏ/Ôᫌ$l išeYœ"zõ±Öò͹3ýB&A()-}ò¯ñx‚¡Ð”IçÝxC(2 ƒçùÈ‘FQP–e+ã8稡 dX†¢haYyybBÏó‘ä*4Mó§jšaUUƒ²,«iMS<Ïãgjëê,f‹ËåC¸WŸ,˸ÐMÓ Mˊ²,@H:ž]Àõq5œú ܺº:³Ùìv¹‚¡PyyEJrO†e?ùô³~}û ÎÎVU•¦iY– AqJMÓ4Mc§ÚÇ)X–mimÕ5=))§næy!]À„eY¼F‘'Y–yûÝ÷ŠŽ‹‹6eò·ß­xèûð”iš’$ùô¿î,úª_×u‡Ýþï7Þ\»~}|\¼®ëüß‚~}úøAš¦X–Åß)ÎU¹‚áyBÇçoŽãÚÛÛ[Z[{¥¦J’éÂ⪟œ•‰‹Ü™\õ#DÓ´?°ÙmÏ>ýw„¦ëUUU‡Ã,Šuõ &“@Q”?e¹g$„Ã0uõõªª&÷è!Ér{«_–åpXz×̽rôÈ8 ˲’$:ãq›ÍfEQìv»aè^¯×ét*ŠRtèˆÇír»Ý‹¿Ú¯oß«®¼Âj±ƒÁü‚ÂÔ”d‡ÝÞî÷¯×›ššÚP^!L¨*„¦(„PAa‘ ‰ ñ<Ï—WT„Ãá>½{«ªºpñ«}ûô¹ù†ë‹~ùÕ׺ÿ¾>½3pÒæÖÖV¯·% öÎHÇWŽ…E<Ï9ìv—ËÕÒÒRS[›˜`³Ùð©kÉÇŸ´ûüÿwÏ|³ÙÌó|Ee%Ïó qq²¢(›šškëêbcbdY6™L9{sW¯]»àîùEéš^ߨ€ÏLeeåa)Ü'#Ã@$gÀ‹”ÐÂ!E566Θ6íž»îhkk‡ÃUÕ5qq±Š¢ÔÔÖºœN¿?àóûD“)&&çäÁE.Ý.Wk[›$Ë¡]»÷¬ß´é7=èr¹8–=‘¾ $]3ñ?à 4"„X†ñz½+V­…»÷äôHJZ³~ÃÚõ<÷ßþñÏiS¦¼þÖ۫֬ݹkw~aáÄË.ûì˯>ùì³=99µuõ ñ<ö»Ò£åyyy%GËÊ+*bb>îŸÏ½°?ïÀª5kSSS7oÝúï7Þ¬®©9XPP^^ÑìõÈì/šL‘¤@#q±;«"(Š2‹¢ÅbQuþ·ËŠüðc¿¿Á‚IIÍ^ï¤ ã_~é…ºú†¥_|±qËæ‡î»ïûkÎÞܽûöÅx<ÿêþ'ÿðxjròoýД‰Ãá0Í0Š,×ÖÕõì‘4uÒ¤aC‡² ›wðàþyú÷çy¾º¦:¹G)“&1bØ¡7ßpý/n™·bõšÃGŠû÷í»cçî»÷°,;j䈿<ùǰ$Ý¿àÞ©“&îܽ›çxaµµu¢(^uåfQühéR\Uü­wÞë‘1zÔÈy7Þxó 7L™4±_ß>yòýûöõz½Š¢Ðu÷w<ü«_•””nÛ¾£¢²rásÿºzî¿?ÐØÔ4p@æÔI“p;Rr“'ŽŸ8~üc¿y$'7· ¨ðýËCÜ÷ù²¯q†™ËgͺdìÀ¶;–EMš0>##ý‘A’$†f$Iúì‹e&“Éåt.Yú©?8©ð/ œT¢+‚çy»ÝŽ¥=ü«žyþÅ’Ò£üߟÏGÓô¯¸ÿÞùw}óÝwK?û‚¢à ÏþóòY³Þ_òQ0:$ûé¿þåš¹sÈüó°Z,ªªF u醎"mýÄÅîÌB?@Ó´IIwÝqû} î푎 CàI’DÑ iÚép‚ ˜„p(LAÈq,˲MéºÎó‚’,išf „ï‹&$$¼ôÜ¿dEùÝÿ¦NžôÙ—ËŒ=Êív-|î_²¢üþÉ?µ¶µéš†K£È²lµX¬VëCÜ7lÈàp8̲¬¢(›]V†a8–E1 óÏ¿ÿµ_Ÿ>øÓŸ ‹xŽ3‹â€ÌÌßýæaœ¥7øjš.…%]× „hš0 @ÀEQ’eE‘@ËI’4rø°gŸþûÞ}ûž~ö_8 dYÁåhtM§)šå8Že!†aÐ_X´¨ÙÛƒ '‘Ñ4 †$ˤ†¡ãñ‹y@fæïy—9ß;É…®cÔGH7Œq£GßróM×]}5!Ã0†¡È€5Y-»Í¦†ª©E!Ük ]—e9K’]ø7R¦ñ|¯1AüXg\ ‘娂‚Âùm0œ9}š·¥ôÔŸŸüû?Ÿ}}ñË Ã|òùç[¶mchzÞM7R4ýì‹/± ›•5$;{õšuº®[,–™™Ï½¸pÁÝw>!t¤¸ø«o¾eYW³ºì’q¯¿ývŸŒŒì¬¬œÜܯ¿[α¬Õb6ôÃ?aÖŒé…EE¹ûö ?fÔ¨È>YQ º¡kºbhºµ­íý%ñg2‰‡}ά™+V­fY6Æã6ô“¥Ÿ145}êTOŒçÉ¿üí÷þ†¦iC74]ÃÝø|>ßè‘#W­Y{߃¿VUÍjµlÛ¹sÓ–­º®›ÍHQø>öÁÙ/,|ùÅE/ß~˼=¹{}ü²¬\1gvB\¾ç¬(j]}Ckk›Ãî8>,ê:^l9Æãnljúï{ï_1göº šÁeÅH ùAÑá_šC>üä“Üýû5M»ñºkßyÿÇõÀŽ»-~õš¹s+«ªž{iaYyÅô©S.»dÜ3Ͻððc¿o÷µ/˜×ö»TY ‡Ãéi¡Pø©gž½ûÎ;lVk¤SYd^¤ÅŸ¸¨YFÜ­³®¾^’eC×Ý.BÀn·Ùl¶Ò£G“’Ÿyî…·gÔÈ}z÷ž¢¨ŠÊJUUqþý¶¶6—ËEÓ´ªª••Ça·ãŽÅ¥¥`à€f³h1›}ü‰aÆÜxÝuMMM¥eeø%›ÍªëzEe¥ =’’ÚÚÚ>"ŠbFzš$É!«ÕÒÜìu»]¡PHÓu§ÃÔ²ŠŠúú†¾}zÇÅÆBŽ–WÔ74ôHLLLLTTVš!11ÑçóÕÖÕõìÑwþ K’ÝfCµµ·ÇÆÄ0 SS[»~ã¦C‡ÿéïÍÝGÓÔ ¬,†ap†¡«kj5MKéÙp´¬L„äž=q·"–e[ÛÚŠŠ%&$8]N³(âÙîó9ŽÖÖV·Û][W …df–”–Ö74öHJLˆ?ß{È…®sFa0jkkÓt¦(»Í¦éz\l¬$I>¿? ½ôÊâ뮾:)11¹g|ÑPY]ív¹\NgKK ¤(“ 0 ãóùÛ}íq±±‘¤­!Žå¼­^R ‘¸HE 4žqm^Üõ¢(ªj]×5Mã8Îdî{ðá9³f^1g¶×ëÅïxR0–(Šb&ÒNàyEUñÝ3\«‚t¬¨¬|úÙ=ó÷¿Ù¬V!ü’$ËøHx^7 YV†áXƒ Eá%‰ôÞƒªš/Í0Š¢àÆ"žçY–QUUQTüªnŠ¢04Íñœ$ɸçMQš®†QeOÎ^^à¿\öõÀæß~›$IM…ÃRäzo=!.2ƒ;/E*8âŽÿÏkš¦ïr!ÄÛ/6˲¸ êØ*ªr¼Ð q*U±žØ9|p¯|Bï6x·Z,EE‹ÿ{ÑóÏÑ4 …pçUMS·F:ìâîÂÑ_1Çr-m-f³Ùépjºöƒc»Hè'.(g_›×€íð$EQøÐš6erbB¼ÏçÇG$I² Ž–‰ôgG…ÂáȘ%„P(Â˲~`ÆÔ©¸T/.ÿ‚{Rã·‡% @QP×õ@0ÃsÁ‰ü‹/,IÑSeY’dAô!„š®k¡p¤fa¤×¥–¤]{öŒ=jÆ´©míí†aàÏG_lÊÇW©õyUÓ4ÿÉÕ#Û$ò72è%$¾nŽïð Þ˜ j aþ@Àn³Íš1= àë\£1 ‚ãå”ÁñoG–e¹Ó <ÝÐ Ã £y‰‹ÝÙ$rè2áèù¬™ŠªFcŠ~󩃨ò,’$õï×wPÖÀHÆ•[¢§ »zò{&õ/§ølç‰à1sú´¹—ÏQU‡‰.+·|Ï v^ŒÎó:iÕHl9=!d cmñ]¶¿£c!€ªªZ­ÖÙ3¦ûcå|£?‚:=ˆzŒóõé×Oü/ø‰ 4ú_ Ñ0Œp8|¡UÅ >„(R ñB‚›kTMeö4#2BÈç÷Ÿu—Y„¡øö;¹ö'.^bÆŸp:?íª]pËDã‰ihh8g³CÙl6³™´Ú7’´™¸ˆ!„Ì¢955U×ôss !dh†Ä}âbwÊÐO4‰‹‚®ëE±,{nf‡›ûÏð3ç~«Äè:ôã&TÒÂA\øºLÙ}æxï§ÈMâ‚ÓuèWTE’%õxOD‚ ÎNö©ë: ÿÄå >¨cù ‚ Î9Žˆ SסŸã8“`bh†\ªÄa ƒçxš¦ÉÍ3â‚Òu褨% >ñc»-LÂ>q9å\r½O? r$Ò¯Ÿ¸˜D·›ÿä?I։ą„~âb²,Ζ+NÚäÓ«+S…£?NÞG<‰ÿagúuÃÀSä#3 £Ã€€ÈáÔåÔ:¿¿ÃK?ŽÇÔt™!îTða|:ÙÕOs‚ç^— !d DzÕp“ŸuˆÆ÷|ƒ?!ë«kªA¿¡,˺Ý—ÓÕ¡ rôú:ì§8Ÿv hhld™¢ h2ÅÇ%p¯ëO-Ñ+{nVœ ~gú)вX,uÝ…B®Œ(ŠÂef#ÏàôÐ8q—¡(ŠŠ"êò%Y–ñ@Íè„Ïf³È0l(Â^t¢Ð.!„L&“®ëß?RáT‹zš§ôc¦!Ä[#ºQç”M&I’ä®6~MÓ²,ÿTkÑ™(ŠŠ¢è†ñƒ“>ëóNy}¤ø°ÃáìчeØ@0P^^æ÷ùR’SUMìÇ1  …‚p¢|Â÷,˲ uuµi½ÒãcBe•Õ‡¥§g˜ÍfÝ8Ñ%Ÿ¢(³Y C B³(ʧØu âGßyçñññ‘Üô ô´¶p,gµXuCïpÌP …víÉ),:T__ñ,þiŒ2‡%©¤ô¨Óéà’¦ÇÕÔÖ677Ûív<æ/…'~øÈQ#ññKøñ¡ÃGìv[]}½ÏçsØí8pÐ4w0ßV‹µµ­­ÝçsØíÇ—P†¡ÿe€b¦¤´T‘eœu 'ÅËYÃ0X–­­«kiiq:`Âï4 @U5š¦"ãø;œt݈<ŽLÚÅ/!„"Ó9öüñéDW|Å¢c4^kY–‹KJív„P7 €a˜f¯w˶m4MÛ¬ÖH•‚Ȭišnim­­­sØí<ÏT­ãÜ£×"rzÀßB‡%‰,'^fü€¢¨¢C‡9–ÅEN¢«âíù€¦iç#¥uN¾*/:TÓ¿_†fhš¶X,‰ ‰¥GK€6› —jÁß`EEEB\·˜Ív»¦i]×í6ÛúM›ªª«cccTUxÞãvÛ¬Öè#XÅÛjµr‡k:RÚíöÈK‹%z:š¦™E1ÆíƧ"“Éär:N§Õbq:N‡#’RŸê<®ë ¿M&“Çå²Y-¸”Ø‹‹^.:t8¸\.·Û%Š&x|Ö,Ë:ν¹ûÞzç]—˵nÃÆªªêؘÃ0¢·Od-l6«Çíæy!d·ÛN§Ëåâ¹cÑ !d1›N§Óé¤)Êáp¸\.–a/½üJ[{»ÛífŸAÝ.—ÓéÄg¼Å,‹ ß­Z{ú?>pÜommÕu=%9% ¨ª¬iJ82 =--­¶¾&rAA¨ªê_ŸþçÑò2„Ð_ŸþG]}Ùlv¹\v›­ó¾7oUueRR"ÇqÏ.ÙùᦲW¾)zwùþøøX“I¬o¨cYïE<ÇÕ74Üz×üO¿øÒn³…Ãá½øRSS3Dz6ë‰Mw¾k‚8-gÖàÐ cð AûÓ“^¯÷¶ùw·¶¶ò<ÿÖ;ïšÍæë®¾ŠaX“`aOÎÞ›7[­ÖÛn™çp:¶._ùÌsÏgöï?iÂø@0ðîûøüþ+çÌv8¢h¢( ! 4 ã½%UVVÎtÉØ±f³!äy €cŠ×ÛòîKxŽó¸ÜI‰Iõ ¸`äÁüüÕk×¥õê5}êÃ0Ö¬[ŸWP0|ÈÑ£FJ’d d6›—¯\u´¬lܘ1Ç ùfùŠƒùùÉÉÉWÌžEAøÑÒ¥eå×^5×,Šº®‡Âá>Y:uÊ䏨ØÃÅů¾þFb|üÕsçNš0þ`~ÁŽ]»zöè1iÂx†Ù›»oëŽýz÷ÎÈH/.)>urk[ûÚ 'Ž¿,wßþ-Û¶õíÓ§oŸÞ¯¾þFB|ü5sçNšpÙö»vìÚ5bø° —]–³7·ðP‘×Û2p@fuM­,Ë×]}µ(šðiµ¹¹ùÝ>¬¯o0 Ãb6—”|·rU¯Ô”«®¸bÉÇŸäföï/ðÂâ×þãõz'ŽŸžž¶vý†i“'•=êDÑäpØ-û÷ëo$&$\wõUcÇŒ^½vÝÁ‚ÂáC‡Œ5RQU|9üÍw+ªkj.7¶wFúWß~ÛÖÚÖØÔ4{æÌ´^©Š¢p·iëÖºúz€À´©S>_öU›¯ýŠÙ³“hš~çýz$%͘65½W¯òŠÊõ›6‰&Ó´)“GÞñ-6mò¤>úxëŽÍÍͳfL·Ûl§™¦é@ÀÏó„ ºñ]–%«Å"KR¤ÚeX’2û÷Ÿwã ÿyëíø¸¸aC‡Ìš1conn—ûƘQ#q+Y»Ï×7#õ@q]nypú¸Þ¾ º2·lö˜T‡Ãæõ¶¥¦Ð‘€®ëúèQ#׬[7lðàŒŒt“ÉD34€ð›å+jjk/7¶oïÞÒ)6 â‚rf­®ÇO޾°páó  ˜år¹ž}á%AªkjÞxû¿‚Àkº†R5uà€Ìʪª7ßyBÊjµ 2äÃ?Ù ï£O>­¬ªæyþù…‹ð/eÜZ ÐuÃ$Y¾¿äãœÜ\žãtCGá&Ü’k·Ùbb<å••+W¯aBØÔÔôÒ+‹{¥¦®Û°q݆ 9¹¹/¿öZf¿~¸±ÿ°WU51!>#=ýå¿VQYÅqÜàìì 7­^·þÓ/—í?ׯOœ±®µ­íÅ—_i÷ùv»¦i<ÏÛmv›Ýîq» ŠŠ^ze±ÇíZ¿aã‡Âó<˲eeå}úI‰‰&Ñ!|ÉGmmíóó7lÞÜÐØøç¿?•””d2 E9ì»Íãñì?pðÝ>Ììßÿ¿ï½èðáœÜÜ-Û¶÷JM}æùÝ.Waѡϗ-³˜Í†a d¼øòbMÓ è!hÄkš’²qÓæ¯¿ý.))IE§Ã¡éºÛåê٣ǫ¯¿‘Ÿ_ðÙ—_BŠ*(*úö»ÒÜìõz½-­­º®³ ËÐŒÇí®®®QUÕëõÊ’403sÊäI3§Mýòë¯ ‹Š|~_Mm­ÏKË0<Ïá6bŽcA(¯¨Õ74°,Çs„ç9–aTUu:éé½0}ÊAàBV«õHqI}}CuMM0¬®©ÍÎÊ6dHÎÞ½f³/5€¦éáÆ^=÷ÊÔ”äí;v&&$”=JÓôáÃGö8pÿ‚7\wmÿ~ýXŽ]¾rUm]Ýoý ¾ß›Ö«WZjÊä F±fíº!ƒ³çÝtÓÝwݱeÛ¶p8lF||Üô©SòT%³_¿ýûmÞ¶mÞÁÉ&¤$'O›29ïàAUUûöéš’½‡zlû Ä0t»Ï—³7÷ÞùwþbÞ¼¾}ûlظ)­Wêå³f^=÷JM×$I¦(hÈjµ\så•Ó§L)(,j÷ùjkkýþ@0²Z-—Ž÷Ë{î¦ õÞ’<.×/ï½ç‘‡¬¬ªúà£G~ËM7ÝuÇí{öîí×§wFzÚ×_g9íR'ø¯Ãáôù}Šª0 «ªªª*šª™Lb}c½(Š ÃDWNgfÈàì!Ùƒ­Vk^~~CÃ÷îÈp9¥å•Ó&eš.­­¬¼fLœÓ&ÖÔÖŸc¢ûÒíóûgNŸžÜ³çko¾e·ÙÚÚÛsöæÞ;ÿ®[çÝÜ·oŸ›7›L&rã—¸ðY臒EÅûÜ{ãµ×¾ôÊbÑlv»\éióï¸ýÎÛ~aF³·¹´¬ì¹Šf1;++ iº^^QY[W·uûöÁƒ¹ÝîÄ„„®½öá_Ý/šLí>ß‘âEQL‚_PøÆÛoO™(šu]GŠKTU-=z´Ùë¥iÚÐõ€?à÷ùÚÚÛÂa BxøÈš¦ûàAƒzà¾Ù3f‚Á_Ì»Ùív?õ̳È0 „¡P¨´¬üHqqEE¥Ëé|ê™g³HLL€t9ß|÷]qqqKK‹ÏçŸ9}šÓáX¸øU†ašªê†±'goCCÃÀÌ̃ùù……+W¯IOK3 BH’åY3¦=úÿz®º¦fά™Ÿ|öyiéÑ‘#†·´¶Îž9¿T[[GÓôž=9=’­VË¥ãÆ>öÈÃÇmiiñûýþ@  â8Ühš«iÚŠ•«ŠKJ›âãâ¬Vëìì‡î»ïòY3››½>¿_Óõo¾[¾fÝú©S&ëºÎ±\CcciYYqIi `¦ªºº±± °'goEEMÑón¼o!ÜŽ”¿bÕêƒùùÅ%%2û{½-þ@Àï÷Ë’|ü«‡ÁP¨µ­Í@FŒÇsü|@„foKéÑ£›¶lioo¿ì’qµõu[¶mûö»‹å²qãr÷(((\µzM¯”ç+*«öäì•ϤUD×u»Ýn³ÙwîÚ ²Ùlv»ÓbµÖ7Ö¤÷Ê8é*B@( …‚€¸ØXÞb]숢(UU{¥¦ÕÕÕ.9rÓÔ¬¿Ý–ý÷;†^6$mW΀@||ü‰^aꆖ¤P(tÿ‚{óòîÙ»×åt%$Ä/_µ:?¿ ¸¤d@ÿL…ä»%.gÖÃw‡hmkпÖÀ¹¹ûF ºrÕš¼ü³(Δ—Ÿ_]]}é¸q;÷ìñûd&$Ä—WTlÙ¶-¹gÏ[nº15%eÇÎ]{ö樚6lèÆ¦¦»w9’å8³(65{s÷ï·˜-ãÆŽ¡izÛŽ.½dó¶m1OzZB¨®®Þãñ¸ÝnUUGþíòƒì߯ï7ËW).ÒÖÞþæÛï‚+æÌîÓ»·¦i4ÃÔÕÕ••—oÙºý²KÆ]>gV{»owN„pèàÁÓ§L^³~ý–mÛY–u:7]Ýw+V¦õêåv¹t]‹‹Ý¼m›®ësfÍ KÒw+VšEó·ÝÊ0 MÓõo¿ónYyù”I“†dg'ÄÇ·|ErrÏ«®¸¢ôèÑwÞ{¿¬¼|òĉ#‡ñ¸7oݪúœ™3›šš×®ßXU]Ù¿(¶Y­½3ÒËËËGŽî÷ûyŽÏ0 ÛlÖø¸¸e_S^Y{ÅœÙ&“iåê5GJŠ{öèér9G êt8JJK>3iüxŠ¢¾üêkM×úöî=zÔ¨M[¶hš6}ꔵë× ‚ xówÛ‡¢¨Ì~ýs÷ïß¶cçÔÉ“Æ_viqIé°!ƒišnö¶Œ> õ•UUi©©={öLINÞ±k×îœ]×dö¯¬ª:R\¼77÷Ú«¯š2q‚(šV¬ZÝÚÞvÛ-óF‡¿[¹Òb6ÿbÞ͉‰‰Õ55òò† Šï·ŸN”ÄgÁ„ø„æææÂ¢Â†¦ú£åG«««JKfg ‰ñÄD:wB Ã444˜Esf¿~N‡ƒç¹UkÖ>ÒyßÈÀ7 hšŽKÈÏ?XSWëkoiö6:¬ëhÄð‘‘ã»åðûüƒ³Ùl¶¤ÄD¯·eÂøË† ’³wïö»¦Lš4iÂe’$ánfÑG éáC\8p¸eË–ììlÜ5!Äó|qi±Y4'Ä%(jÇ®âø×4Çqáp`6›C¡Dz¢TU¥(JÓ4Žãt]gZ’džçqOA–eeYx> á)È’D3 ¾ˆ‡eâ[¦4M+Šb6›Y†ÝÝßxÞ8Þ7÷bÔ4ç9]7 ÃBÈ08žÇ ²¸_?@×4†e%Iâ8N’$³(jÇ»u*² ¤) @¨išÉd …B¸DzÏ+Š¢ª*žaX’p\À£@UE1™LaIâXöñ?ýùê¹WŽ>\Qš¦UE1‰b8f†?>³(ÊŠBQPÓtüóBQÑd ‡Ã ËR…{£#„A†Á±l0 Ãá[#¡p˜e€¡ë&Q”Âa–e%Y6™L†a¨ªÊ²¬¦i„x-BF§íÃ0 Þ°¡°$™L&Y–€<ÏãïoCMÓEáyŽeXY–ñ7(Š¢¦©@HQ¡PHEü•EÖßb†aˆ¢ˆ C:y€Âé@ñœÐÜÜTU]©*ªÕfKKMc9¶óX ¼GzôŸØb]í j(oUUU³·‰¢è„ø„øøxEQNµó#„xŽãyÞà«‘M×q±â8.¿0?¹g²Y$}‰ó ï8³Ð:Ž–<6Ú„»?ã‰à·Q…ü$þ{ìýÇ{ãEÞ]k w 쯋y©óû£gNÎú”tÒ“ÇÏ^Öñ¤yu '–Ù0(Š’e9..ö¡ûïDÚ "á¸ËétˆË6l‡õí¼'ε dtŽ£O̧Ú>¾”®—ääS]ô›¿ ;ÿ{ÖíªªF.Æ!#{Å÷ï¥ß¿oDȲŒ DÎpß3YuZíümF¯22IÖO\hNYªEŠ¢È «3ƒ@rÏžE©ŠzÎ …2„.ÕB‚?qAé"ôCË*ÊÚÚÛô¨ÓÄé;U+Ñ=QÕÖÖ–Ò#å|/AœpR自ªšŸh³Ú"%&â'€ò¸<Ç‘†~âÂÑñª'2ô¸=ç{ÁâBˆü†&.(]4ø „TU=ß FÿC ©xJ\Xº¾ÍKšª ‚ þ‡‘CAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ ýAÝ£iZ PBx¾† ‚ø!„MÑ4aÆ"ZF!¡Ÿ âBˆã8†aHƒAD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·Ãœï ‚¸@!„ÎÙ¼p>…Ÿ{Ž! ¡Ÿ ¢KB†fÀ¹Jp£ë:€a~Þ˜Œb(ÐOÑ„PÓ´êÆjE‘ÁÏþišŽ‹Ô7ÔãsÀÏ!KQ ýAAkëkE“©gR’a?cðG€¢¨@0P][ ˆ‹±Z¬?Ó!€º®745¶¶µ’ÐOÑ‘ašªöÈÈ8óB%Zjjë@I ‰’,ÿLy”B ÆQ_HB?ADW 4 ãÌ!¤„¨†a?_è7  éÜIÑ•s^Àä\Î’ÐOÑ•N¡8r1!üž óÎ/¡Ó赉¯ú;L‡¢(Š¢ „¸GæYèj¾’>A§pR 6 !DÓ48Þ“¢(X#±ÿ«ëú±x}<ìF>Ýy¿ÓBxR˜Öu]UU„Çñ CãÖ'„Pd"D&ŠgAQMÓš¦u>‘«~‚ ˆ.D¢%Bˆc¹šºÚ‚¢B†f†)-/+9ZÊsŸ¦iaI*«¨ƒ Ã„Â¡Ö¶ÖÆ¦Æ²òŠùñX"­U€´õAœÊÉ­ä‚H,ËVTUÈÏ«­¯Û³7GQ”Êꪢ#‡‚¡¢(4E545¢Ã‡**+dYMMº®,È÷ùýGJJ›šhšþž{Rmííuõµ@Àn³ü¢‚`0˜_X–¤’£¥Õµ5ÂùyÞoá¡¢@(˜_T ËruuõÞýûjëêÚÚ[E©«¯×uýĉ  ýA]:©}!DAHS4)Š¢†nx<ž1#Ç:ÎâÒ’ú††¬ÌÙYƒ¬‹®ëI ‰f³Ù0$Ë ñ‰‰q ÙYÙ-­-Þ/DzÁ`°®¡ßˆÌ®Cƒ<  í?˜§¨êÀþ*«*ƒÁ ˲-­-­­-½’Sšš›ëêm«$Ëmím˶´¶6·x†‰1ldjrªÓá>d(ÇqÑçH®ú ‚ º‡B<Ç·ûÚƒ¡ $KÞ¯  R ]ÓX–…àK~ÝÐUÝ»MÓ³Ù0 C×$YR BÈ2ŒÕlÉÊžš¦ªê‰^C@7Œ”ääKÇŒS¹Í×Îr,Ër»}ø¡N§Ëét†QXT””˜DQÇq»}Øà!q1±ŠªB CÓ ]QäP8|Òo ¹ÍKѵãÁB¨ªj\l\¬'6g_{L&S¤$]×kjk¶íÜ&+Jz¯´Ôä”’ÒÒÜýû4MãXV4™š››%Y¢i:66ÖðÈ?èq{bcâ*««jêj%Y¢ u"(è;ˆVÕl6§$§$Ä%˜ÍæòŠŠú†MUyŽs9 ·Ëg¿¤i MÓ4­ëºËá¤(z_Þþ|à–-[²³³Eù™ÆA\Œ*«+{§§GþŽìeYÆÝo8–Í/,”U9=5MÜýFVUUyŽÃùÁ€I0Ñ4MS´ª©†ap! ƒçñ^„Ïóyùù A³äã‰ð°^Ü{GQU†a €P€¦ižã£{vâ.FÁP¦hÜŸ@A!4 CÕ4Žeñ›šñü›·l!ýú ‚ ºÐáb!¤i˲÷ñ@ÕTšf\N'nQAq,Ës~ !tØ2B2poNü’ÙlÆé0;„Nš%MÑx$—˲8Õ¾Õbþlô@è—"½û!„Ç(2¯c—ý$ôAt©cCȉQZjš–”˜e%zHWt«ºnœH¿ý|©Ž ò:öàØsQ]Œ"ÿž´B§z)*" ýAá OÁM×u§ÃŽìýQó:Ñh¢ÇÿL+EQÐOÑ!EQápØjµ†ÑåPIÙWW !”d) É2îˆù“ßz=v2  sGB?ADbÜ1õ MM?÷ŒpE°O,€ ¼¢‚a˜ŸëÂB]ÓÌf‹Ëé"¡Ÿ ¢#„ I‰=ÎMÊþHR³hþYçˆ2™Lµ5µ$ôAtáXW™sÒë=:Üÿ¬sD麎"¡Ÿ â”~¾›®çwŽd4/AD·CB?AD·sÊŸH;×ÏW 8RGæ§²PdXDç‰GÚÎzEÊßAü/9eè·X,4M)Š*Ëò÷|GÒ3 ß8gÏ󆮇%É8^„¾sœ5 ãL'n–a„È0:¤¬C1 cYQEýþ¨ŽSvœ›ûûAçR¡—Þºm{KkkïŒôäž= „"™€"y…ð;†á8.ྨøùèò•øv5>=DÒMðWV^^PXãéß·/Ïó¢(J’„§™8EQf³9à˜øÜ ë:®o™~@QB€¦©’ÒÒ¦æfÃ0xŽï×·O¤^ÚvŸoçî=©Éɱ±1ªªâªÇ†ŠLÑ¥(Šªª¢(F/ˆ¼Y#‚ ˆ‹ }çwÆÇÇG× æyþßÿycǮݡP¨ðСQ#FØm6]×u]7›Í8’;ìvÁdb¦¾¡awÎÞ¡CK’DQ”Ãáx^VŠ¢lV«(ŠËrg±Zpò#„(Š9¹¹‹^ý7ð»öìéÙ£GFzÚ·Ë—'÷ìi·Û Ãp8&A€*вfÝúìAYžã!E†aµZ5McÆa· ‚ ˲Yyž—eB`2™~÷Ç'÷í?àmi©®­œ=(ÆãÁ$B¡>÷|SSSŒÇ’’b³Z–•eÙdÌ¢Ùl6«ªj2™l‹Ù,îÛ`ó¶ícF2 ‚h63 ƒó›Úm6Ñlæy¯Îùþ ‚ ÎMÓ KC]×wìÚ½àîù3§O ²,¯\½zPVVlLÌ®Ý{ÜnWŒ'fÙ×I’4sÆô¥Ÿ}¾aó¯×;mÊd„ÐGK?5‹âì™3‚¡Ðú›êëë].§ÓéÌ;˜?eÒÄŒ´´°$ ‚°ï@žÕbyü±ßʲ¬iÚÖíÛ_þ÷kûä]{Õ\QÿûÞû€+çÌÞµ'gñkÿ©ª®ž3kfMmmŒ'&1!~ÍÚu#†k÷ùÖmØhÅËgÏÚ¶s§ªª—]rI0D†aµXnwóØÑ£eYnjjþfùroK«$I×_sÍêµk÷8xÃuפ§¥—•—oݾ£gRÒ„ñ—æUUUµû|Ó&OÎÝ¿?goîÈáÃ].gz¯^……Å%¥5µµ}22.7Ö0ŒÏ¿úª¥¥Õãv9Âf³‘!‚ .:›Ñ Ñ4}Û-óÞ~çÝßüî÷…E‡}݆kÖ­gæõ·ÿ+Ëòó æåç»ÝîöövŽãxŽÃáoáâWUE=\\üÞ‡K¡ðÂÅ‹ívÛç˾^³nƒ /,|YQ5†a~ÿì™3·Ý5ÿÓ/¾^À ìv{(zaÑ˪¦‰¢¨ë:ÇqK?û¼¨¨ôÖ»ïÕÖÕÿùoOùŽc5M+++?R\±,BRPQ”ç^\xç½ .~5 ¼¸è–aä彿d‰ËådYFà…ÃGŽ<ûü‹¡/¾úê›ïVìÚ½ûÝ–ð¿nÃÆ>Yêv¹(Š*.)ݸyË–mÛ?ýâ‹„øøÅÿy½¦¶öóe_íØ¹Ëåt¾þÖÛõ 8“êùþ ‚ ÎLÇÐOQP’¤«ç^ùï—:ô¯Oÿã@ÞÁ®½6/?çî=·kÈàìáC‡Ê²ÒÖÞ–’œŸOUT€a<ÏÈ;XS[;rÄð´Ô”†ÆFMסðî={âãbßzç]M×&MŸ_X¨ªj[[ÛÎ]»G©iZeee]zZcc“$ËÓ&OÎìßÿwOüÑiw¸Ý®övßÐ!ƒÃ’”$I×uŠ‚º¦ÉІü>_ Ôu#ûý¶¶¶”ä䯾ý¶¬¬|Ó–­É={BÛ}>@ŒÇ³uûö™ýyž×u=–dE †B¡`(dE‹Å²bÕjžçÛÛÛòn©AçFÇÛ¼¸ å˾^½fíÎÝ»gÏœ1yâD–e[[[ÖmÜôèÃA?ùô³Õk×&&$LŸ:%=­WqiéIÆ'&$¬^»6¿°Ðjµ$%&VTT^zɸòŠŠ'5%ùHIÉèQ#Y†¡i:wÿþO>û|ó–­&“ðË{ﱘ- Ã|·beRbbzZ¯œÜܺúúXOÌ”IeEYµfí ¬={ô\öÍ·‡Žq8ìC²³—|²t÷ž½™ýúͽbÎòU«+*+/76 ±,›_X˜““»c÷îÃÅÅ}{gx[ZÆŒåõz5UËì߯¢²bİa½32ÚÛÛ—}ý-„ð—÷Ü]ßÐ ŠâÀÌÌÔää]{ö|·r˰[–eÛ-šLYYdöëwɸ±Ë¾ú&'7·¶®nòÄ n—+²é‚ .|ø6o×µyEÑ$…%ЦY– ƒ6›í«¯¿9ŸÿÇß?Y† †B¢(R¥i¾@VU•çy]ÓUaYW¡”e·†ã·)Š‚Çð<!eEE|§—çyÜ¥‡eÙp8LS”ÉdФ®VO €?…Ã6«UÓ4š¦!„‘‚–<ÏGº~†Á²¬,Ë4MÓ4¥ªZd:&“ISU†eY…çÎ0 ^e†ap¿OÜ©TQAàUU¥(Úf³ÕÔÔ<üØïþòÇ'’IYc‚ .¸°ðºnð BuMÅqM–åÕëÖ]3w.!¤jš š¦ „¡P÷¸‡Ã¸ó;®þKEÁo ‡Ã¸…O?ø³‘gp˜C!Š¢Âa BÙƒÁ žŽI𓸣}$þJ’YaX’(5MÓ´“# BeU…€ãSÐ4 ÷ŧ«èé„Ba“É”³7wóÖ­ MÙYY‰ $îq1ê:ôã ^@H‹é¿¸e^ŸŒŒP()! y‘&ïÈüÒ±‰tz[—OFžéðžH—‰,C‡àÛá_ v½ÇÎC'¯xtãÓ¡iZÓ´^½Rñ𙙤©‡ ˆ‹Ô'mÆÉ†Œ›kÎ÷ŸO†a8ìöqcÇ „B¡Ðù^‚ ˆ³Ä€NUä»iÕ9ß |ž©ªiÂ"[ƒ ˆ‹K$Ú3EqÎU1‚ â|Á·y)Šb¼^onn.ÉF@ÑPåõzÿê¤ßÛœ%tEXtdate:create2013-09-27T12:31:21-04:00‚&a%tEXtdate:modify2013-09-27T12:31:21-04:00óÀžÝtEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/system_boot_mode.txt000066400000000000000000000007151330160122500251070ustar00rootroot00000000000000SELinux Systems can boot in three different modes. * Enforcing mode (Default) - SELinux security policy is enforced. * Permissive - SELinux prints warnings instead of enforcing. * Disabled - No SELinux policy is loaded, SELinux does not run. You can use this screen to change the enforcing mode. Note if you disable SELinux, you will need to to reboot, to turn it off. Also the next time you turn SELinux on, a full system relabel will be performed. selinux-python-2.8/sepolicy/sepolicy/help/system_current_mode.png000066400000000000000000001466411330160122500256040ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìu˜EúÇ«ª}|Ö%ëw÷ ¸»ÞáÜÁƒãàÃõp\‚‚âJ<Y߬ûÎîŽõ´×ïJ†É l}ž„Tõ) åÏŒeYeee@€¡  À²,Ó4v­( …òÂ0L^^ÞúõëY˲¦i"„Žv­( …òbÇq‚ °c²)úB¡P(b,ËÚ#ýT÷) åOOTêÙèßtš—ò;Ðs!ÜoÌÝBîÆžŸÿÇ‚öÙ8ôÞŸ>Ûÿ^1 å(ò£ôSƒåwƒh.Ã0Œ1p…`,ËB‘]²—LG.ѹ+˲,ËÚO¦Bزˆx[¿àÎÖ„ÔAiÅ(”ßrs’;ŸÜó‡`ŒÙèŽvµ)fÈp!ݬ,G,Œž˜¦©éB{ör,+G"Ç1 Ã0L“ç¸Ý?޾!#„zÞëc9¢„‚À³,«ë:1m’"…ãX˲,ŒÉù|Kˆ–!Ô4Ý´LIIç¤jº…-ç-ŒÁÞ^ŠœDû‰»ÀO¾7ì·‹B9\ÈóŲ,BHUU€ –e†±ß»uôVgñ^èmGùí º¬Æ;ŸÎ_°l¥ªªƒú<|Ç­KW¯{ò•×%I …å~y9üëÿ®ý×}ÿ¸æÊ¡úB—nØ<áâ'þ}» ðØÂˆa4M<¯jÃ0A ÆXÕ4Q,Œu]gR4íÿî´­Ã(Ìɾú¢ó2ú¤@Y–5t=$Ëw=þ̵Ÿ·³¬¢²¦îî›oˆD"’$b¼Gî5UÅ‚`š¦ªªv»ýy_|úÍwüóÿ†ìßÜÚvÛƒæfÿóú¿p Ë0Œešš®s!@ˆ1tÝ0MŽã¢»<Ï!ˆ0À†aš¦)ÆXUU†aŒUM#}…rXX–Ųl]c“?Ò¯/€`SÑÎ;#5E7ŒžÚ¾¿ôjð¡ü–˜–e·ÙV¬[ÿÑW ¸íæ>I‰»ëêÁp8ÆëyñÁ{UMCêšQÓ4!€š¦eg¤uÒLÃ0šÛÚƲ¢¤¥$cŒkêÒR’»ºýª¦†ÉqlzŸÔªšZ„Pjb‚…1À×Õ}ë5WíßïŽGžœûÅ×wß|CmC£?ÈÉHg&¢(²¢Ž:83­e™€âòJ!–e-ËJKI†VT׸Ë Ðu½;ütÁ¡û±pqu}C~N°±¹¥½³3ÎëMMJlliÅ–’#‰q±·«±¹¥½³+ÎëIIJDÖ76ˊ±¬×íö¸œ%•Ïg§§µuøŠJJu݈‹ñîWö™† P~–e± ÓÔÚ6ûݹ×\|>„ð…·Þ»î’ ²3ÒTMëé¸ëÿ8ê?Ú•§üÉ1 #%1!3­ÏW‹–L5bÒè–eÁЛÏ“åÈðA& ĦÁ0LYUõ‹– (È}èùÙ¢ tùý ógNšðèK¯¾òÈýß­XU^U3yì¨÷?ÿòš‹Ïá­÷®¾è¼ŒÔUÓ,ŒEž_ºæ‡%e`è”ã§®X·á­?ãx.Æíºþ² Y–åXv͕͆µuc‡ þïkoVÖÔyÝî”Ä„MÛw>tûÍ6I¼û‰go¿îª¸@Ž(ãF •eö»s‹+«Ž›0Ö4M¡ù ×7·tvu_vÎË×m¨ihä8–AÌC·ßüå÷Kk›|]ÝW¶¢(sæ~SßÜò½¼±¥mÅ‚§Í8® 'ë™×ßÉJëÓ')±o^NOë…ò ʑȘ¡ƒC²üò»sWœ{ÖøÃd9r 3Úú)¿EU3ÓúþêÛ;n¸:>&æÎ›®MMLË2:¦–…B6I4L` ‰BȲð~¡º±õíšSþÌ`Œ¯¨®ÙU^9nøPžcyNGg'ÆØa·ê,UÓ„š¦Cj›ì6ƒ`DQÀ–…-Œ„<Çr,Ë1l—ß_YS×ÚÞ±…-3 ÙmR{g§¦ªÄôˆ(ÊåçœÑ/?Ï4 YQ$Ilnkoji•#Ë)G”–¶vYŽ˜–e“$Ã0jêÜ~§×í:ó„ïÌ›ï°ÙfLßóцäqÇ>wÿÝ#õþWÇ54·<õÊÓ&ŒMKNÒ Ý´0‚Aàv:kê¯Y7fØ>ÉI–e <×ÚÞÞØÜ¢jÃ2Ç…åHÿ‚ÜIcF¨šf𦦩º®ÓÇrdXÛDqͦÍ/¿óÁçž xùݹ‚±Ã†ÊŠ‚°õïñð!.kG»ò”?3c ¯«û㯿}ëãÏEQ¸ìœ3òs²kêýàÕwÜ–å¾¹Ùÿù¿›Ü.×۟·Ú$qúø±.‡cKEÆ!”™–:nݧç¼å°Û²ÒÒ¾[¾ª¢ºöÙûîzâ•×û$%ž0u¢¦éc‡Í†TE‘Åa³]uÞÙo~òÙº-Û÷+<뤙 Í­_~¿,!.Väù} fNžøü[ï±,{ÞÉ'L7ú㯿mëð2HQURAà ÓŒ<€çX–a9Žs99™é•ÕµUÉò¦)ªÂ°ŒeZ,ÃÄÄxr2Ò+kj#Šš›™>sò„ÞzGiEGgWFjÊ3§»|•¯«{øÀþ…ÙY¢(@-LCÊ‘cF|Lìõ—^4zè  Ïq1išûÍâþè9½jÕª#FèºN=|(¿)c–a„AY–AUÓ, cð£O ñ²ßçVÜã½¹ç c„ÏqŠª² cY–¦ëÏó§êº¦i<ǑhÑÄ×MÕt»MÔ4¸AAåHcÀ è°Ùî{ú—ÓùW_)yz –eÁ=[0ϲÆþ€Ãncö¾W“K F§NÀa³± £ëºÍ&Õ66Ý÷ßço½úŠáƒ¶ut„åˆ×íbÆÂчò¿1xžeÙ°,l6É0LMÓögĘçù-[¶PÊï‡ašB§$Y–%G"Äÿ½ÇÛ(¶,Ì À’ áÇ`Œ-ËR…abxc,+ ‹Èóæ^[9Ó#4  ( ‚e,Gˆÿ<9@`a,Ë2Ã0[ÏmÝU¼iûÎÇî¼MUTx€>„`Lª­‚0Îã6{¼7“J†!ˆõ¸ Ã~Þ‚…?lÝ!9x`aNv pØln‡Ã0 rÉ–EŸ>ÊÿŠ¢ªXQˆ?O(,ÃÌï“ÈÚú)¿ãèLæAo<Ó<È­hî=,ºw¿ãsß Ò“[²c|À¦ib Äýå‚s2S“UMÛ{,8Ôóca¬01K*‰1°,Q”™S&ôÍϵIb^fº®€D«ýä%S(GÀ©PÐĹ“|(½¦ëY™ òCáð¯õDX–å°Ù†õ/4MKQT@£v)G}<|è4/…EÕ´ˆ¢2 ú Ã0‚ºöf¢å(ò£‡5øP(=!ñ¿î9÷K×C¡~õ3 CRÒ—Ð?=GE}ŽAÉ£·:¥×²ôóÑØ7™-…Ò«`B»Ãápôð3¦üÙ`YVQ•PE1H„ßMò,Ëêðu@-Ë’$éh7 ¹ ý~?y¡Pþeï„d9”E‡˜{¡ƒ ?%d"Dz, 0ƒ˜ßóÝ1A`™ßq‚áÐ@‰_ÃÑ®…òë!ôûý–e䱯XEI”ªþ{HjêùsC~_"|þ~?7˜,M…t,Üc?®ô{ 9Q(GÉÆ³k×ÎÎnŸÝfßëD÷cZ@(0`×ã=мyð±X4È !D‡H&öóî·úoQ"I‘ÖsÔß3+ÎOpÐÃ~áw¢2–e …ò?B–²ðuúF ÖuƒÈ5„hšfB|¦M»:;ãã´ç³=£Ãáà8`–åŸNêIV©>ÚÐÛÙO¥À=¸Ç‡çyžçªªéºþ’H².®fk#„Œý!€Æ¢À[ÖuÂC¾1àxB¨©ZÏq ÇqBMÓŽL½÷Œú©òSþ¥Ø5Mm÷µª1"–É0B<èK.{à¹8Ž[±jUÑöqqq“'Nˆñz Ã`†ŒB¦e‘ä…BQUU%ÛÉ»„°çg¼÷ „ö¿ä'hšFZžjăîõC€1æ9¾¶¶nÇŽb^àöï—˜˜`bÀÀ‚¨gr'ŽgMÓ2M1[{¶CÉg¼½DQm…böÜ?K_YU-BŸÔ2‰–$EcŒyolhÒ #3#]×u„…-–e›š ÃÈÌL×5ì}Y‰Ž?,ËB ©6Ø“tîS%¡eR?fÊŸˆ1fFàV†1U 1 'Ù”PçxxèáÕ>ÒoY–ÓéüváÂyó¿8íä“KÊÊ::|éiº¦‡eYžã²ìr:†ÕuÝ4Íwߟ{ò¬“»ý~§ÓÉ ¤iš‰8Ä0–eíI €,ËÇTH矆a|¸ØXY–m6[‡Ïð¸ÝûLï`d¢=ãýºúúù_.8nê¤¶ŽŽ.¿?+;c‰DB¢(F"ç–5M“aÐò«SSSú÷-ôuvÚv†A¦i)Š"H<Çq¦i‘”BUU£.ÑH†Á›¦i³Û7lÚ——— …HY,ˆIŠ–$É4M»ÍöíÂïÃ!yÀ€~¦iD"ŠÄK‡}Õšumííýú<Ï󜡪¦I’(Ë{¾ …X–å8Î4Mžç-ÓÄ(ŠBÚBh²æ±^@¡ü*@,ÓŠKí#×ÕÕ–”é±q@×â"JöÄ)6‡Í²ÌCùÿì#ýc–eZÛÚ9–›uÂ̳Ï<ÃÐõÅK–…Âá3N=eÛöí%¥e'0ó£Oçí*.™2i"‚èí÷Þß¶½è¼sÎ9|ø;ï½_]S;}ÚÔñãÆ~6ÿ‹êšš°,÷ïÛ·¬¼Üãñ\|Áù,Y4•òëaY–Ýn{ÿÃ…s?þø•_è_X¸«´ôšn¼ü’K.¹ðü`0´ßËÃ0Ђdȯ*šª(ùÇ7MÓ´]%%•UÇ7­»»{媵“ÆÛV´cǮ⌴´ììÌï.v¹œm'Œ7fÝJËÊ òs'Œ·u[QYy…‰¤¥¦úýpD>é„.§“ô:BÍKFý@"»d³‰6"–aY†]»n}MMmVVæ¸Ñ£BáðüE_··w̘>Ía³ó †¾^ð݉3ß´}KiyEccÓ€þý8†[¹jmmm}^^N¿¾…K—.œ>mª?øfÁÂÓO9¹©¹¹ªº:6&¦¼¢2 &'%N< ˆ†²è˜ð5¢P~°…YQ TU•Ï~­ÿ”)fj 4>5%%%5yè!…ùùŸÌû¬hÇŽ±£G=ó mím«Ö¬å¡_aá›ï¾{êɳ6nÞ¼fÝv»Ý¤aÿ*ÂHD9ý”Sú¤¤Þø÷[¾_ºìÆ¿ßÒ'%õ¤™3"ö\þ Ã0,˲,«ëz¿¾…Ó¦N~iökO<ýluMmrRÒ†[àîšÚ––ÖP8üÁGŸ64?//>.>55¥ ?èÁ»ŠKÖ¬ûaÒÄ K–¯¬Ú½»¡±©«Û?mÊä  6`°rÕ§Ó !"eC?ÇrDèY–À!Dv›mõÚu;w•LÿÒï÷oÞºMÓôææ–¦æ–Sg´qÓÖºú»ÝÆ †eÙC ‚(”?(ÂÚò²þcÇ‚>Ú¶liÙksúJ6èt¶4Ôò‚p¨Ñ6Úï–e¹Ý®ßñÏW_|>,‡|ô±qcÆÄÇÇ/\¼¸©¹eÚ”ÉÆ 9픓|»°¥µ-++#Ö3mÊä”””¢;"ŠRRV§ªš×ë5|ø¨#²3³†–Ÿ› „õÿª@MÓt»Ïý÷©Œôô‹/¿2#=ý¹ÿ>år:÷ Ô c^†aˆ"3 òÌyçœõèƒ÷÷-(|åõ7ãâbè·e[QUUõÈÃ233Î?÷ìM›¶Tñz òóúõ+¬®©Õt½¢²Òãö ÄH’”—›]Ÿ—ž–ž••‘—›£ë»Wæ‰ôC‹–A,ðˆAŒ(I.·Óî°—UTN?öøéÓ&Œ³aÓæ¦ææ“N˜1h@ÿ””d^à·m—#‘“OšY\RÚ¿_ß‘#†õII†––—Oœ0nÆñÓÆŒYYU=fôÈ­Û·757ŸzÊIë6lìðùÆŽê[˜ß¿ßԔ䈢°‡D.Ÿ:­Qþ<@h(Šž˜hN³uæq§\~UÖµ×mÊËŠ™u¢/dæP¶Í}¤c,ŠâŠU«}òÉmEÛMÓôz½€ã¦Nùï³Ï{ÜîŒôôƦ¦qcFg¤§¿ôÊ«¦ial}þÅWMMM} œÇñÇMûËå—'%&vtøÁ`(êêîVUÅïè:›ÿM€*Šj“ćï¿ï™'{øþûl’¨¨êA[›eX†aB’(544=óü‹kÖ­ëîîNˆ‹Ç7fô²å+ÛÛ;öïßÚÒš’”4zäˆÏ¿øº»;`“¤u?¬ß¹cWnNŽÝf:xðYgœZ˜Ÿï÷ûC¡°®é~¿_׌°,«šÊ±ƒòADÌ, bXÄp,§ªjIIéë7nÙZ”Ÿ—»bÕšo¾]¸jÍÚ)'$$Ä6ÿË¢í;Ú;|¡`ø¸©SR’“Ÿ}áåþýúnÙV´båêòŠJÓ0¸|Ūo¾]¸ný†~…#†]¿aSSSóEçŸûíÂï5UÏËÉõûÁ@ÈÐ@00àØ=ýõSþd@Yauƒ ëKKÛÊÊ11VW‹˜Ÿh3gžufzZºM²ã,B°¹¥e[Ñö²²òü¼Ü+.½DÓ´”ääϾøòä“N4p@yEåg_|¡(ʅ矗•™‘ŸP´c{B|üôiÓêW®^Ëý 4]ÏÉÊt»Ýãýû‡Âጴ´¤¤DºþûoYd\„¡C†`Œ5]?ÐÄ/GäÖöV¯×K¼bX†‘#‘ÝÕ5õõ N§ó‚óÏAÆÇÇoØ´9­OŸÉ'ttv®\µº¡©yÖ 3ss²SR’›†?v „píú ]éiÏÇÆÆ&%%𦙗“ !ôz½}RSˆ× Ã2ªªBm6!„cFgW—¯³«½½ã„ÇK¢¸cgñ¨‘#Æ•™QWßPVQ™’”èö¸½Ï 3§—•W<(!>nýÆÍ§0?üØ1ãâ’ÒQ#GŒ3šÌØ?+#ƒa˜aC''%*Šš’œ¤ªZFzšÛí¶ðÿ–a½^/MTNùCƒ1fY®®¶ºONndÇfÎ[…ýú—šK²Ö5V¾óN¿+®lmmÆÆÆõô÷c¦µµ¾ûþ»ãÇõÆê†Nœ4l’$JIlX–mmm{âé§ï¹ó_v»ã8A°e™–‡%I²Ûí¡PHÓ4—ËE\ÊC¡ÝfS5Ͳ,›ÍHŽ EQèÃöÛA\;0 xvø:vìÚ‘™]l–çy§ÓiY&Ðð[–… zæ…—Î:ýÔ¬ÌL˲ù¡C¡Çq.—KQ”P8ärº8–µ0ƒ‚À#‘ˆÛå ƒ‚ 0 †BÄ‘ŸALgw'À ÆcZ&±(:ì›$YØtûý’$ ‚ ªj0dYÖépBäH!„ Gä¯7Š¢À²ñ Ëa—ÓÉ󼪪¡Pàv»t݇Ã^¯GÓôP8ät80ápØív)Šªiéó4McX&;3›ŽB(hH^¬U«W6 rLʼn11ö+/Çíí<žté¥Ù'ž´qãzŽòró¢ÚKü¢¢¢ý½ „aY…ÃÑ-N§sÕš5i}ú$&$ø˲"‘9!‰DÂá0±Ÿvuu‘¯0 ãÈÀ³»»›a˜@0©kÿoÌž< ?uÄOò—išÑï:펭EE,Ãäfgë†1öûýdÇr–eù|>„Ïòáp˜œ„a²Ø,ùņQU Ìs|ô†˜eYhB˰äž!å²,+Ë2ñòäX@ Eí]P‚íêêFÉrc™Ô‡gùpX&þKdù@ !äyÞï@^ˆDÏóä0ŽåHV “1i4/åOBHÓtY†aÅþ>ØXYÙ^]Ã!”õßÿz“’LÃÐ CÓôƒ~=è{þ…¦Lš(Šb(&»zê B(z|ÏíÑÏäCEÿ€øõtÖlfNVöõ×äô»ïˆ˜ ‘f°_¦À½÷¤jè±cÌ"Bd ðžcíÛ?íû׉Þšúm¿N.z Ãï½ñö–Ýööަnf”?–e&Ä'®\¹A„±Å ƒp]Cƒ¡ë!Žãú÷¨ëQÿŸ÷q¶0Ž%Æ„£}¥”ÿ†a°…š¯ìt:æ¡Ã@ Œ1b÷XŸ‹>Êù È¨ŸaË w2åÏ„°oß~ùùäOŒ1À$Y#$q‹{Æ:›Öb‚Ÿn$÷Ô0ú@FÊ‚°'!ÏAŽÂp¿F˜DQƒVdUîïÕ!¤ë:ƒÌKùs!$y\Å¡üúY˲ÄïPâNEÿDÐ4͘˜]×CáÐïóƒB ÃHˆKÀû:}ÇN,wbB"™s>Ú¡P~Žì±bm’­¾¡¾±¹‘ŽƒþÄ „䈜–š–œ”ü»I?À€ažç»Ã4Ícaz•çxò |´+B¡Mؔ䔪‡ˆ¢üi ou¦iÚmöß­ÐèÏóÇÈ fYÕ} …¦Ù:FžLÊoy1ü=aŽÞTÑÅŽ:ô>§PÀ/ñð¡üÉ8ZÚG5—B9v îö …Òë ÒO¡P(½*ý …Òë ÒO¡P(½*ý …Òë ÒO¡P(½*ý …Òë ÒO¡P(½*ý …Òë ÒO¡P(½ŽŸIä`aŒ- “å~ƒ•¶0Ʀi’õdAàC­r¨µg) …rXü”ôcŒ%A°ÛíB]ׂÁÐOLÀVNDŒ± ‡# jšp»] bÁ੾0Æ,ËÚíöp8Üsuy …B¡.‡”~¢ËE;v~ùÍ7Š¢ 0àä“N$+.!„¢+~F†¡ë:Çqd©^²ýPý9ƒÍf+Ú¾ýÓÏ¿¸àܳ ,ËúàÃÛÚÛ/½èBA¢úNfY¦µ­íëßÎ:ñ„¤ÄMÓá^ŽvR(ÊŒƒH?±«H’´³¸ø_wßSŸÇ0ÌÖ¢í§r²ÝfÓ CÓ4I’È‘Ëb8Ž[÷Ãú§Ÿá…§ÿëvÛ Ã (ŠeYN‡Bˆ#„LËŠD"–…¯ª®yþå—»º:_yñ…í;vÜÿÈ£)ÉÉçœu¦Óé´I„ÐÂV8,ó<ïr¹›šç}>̨‘y¹9ªªAE!6" 凎Q(Ç‘~†aX–³ÛìíííÍ--7ßtã‰3ŽgY¶³«û†[þïÔY'2kÖ+s^ïðù&Œ;÷£ÃräÊË.ý⫯Ê+*®¹ñ¦Ë/¹8;+ëù—^v¹œ7^w­¢¨¯Ìyݲ,ÝÐûlÚ¼%77çú«ÿŠÂ† <¸¦®nÉÒeËV®LIJJINæX®µµõÅW^mllš~ÜÔK.¼`Ó–­o¿û~0äÁét.ü~ñ{s?ê[åå—¹œÎc$<…òèº~´«@¡üÈ>ÒOìé¾N_cs£À ãÆŒyè?÷½ñÎ;/Ì~åôSN¾êòËb½Þ÷æ~tÂŒŸÌûì²K.zë÷O;åäÔ”äaC†l-Ú~ÎYg&'%ýû¾ÿädg565ßýŸûÿuÛmËW®¼å¦¿_ºô›o¿»ä¢ f¿öúA?î8€¢(ÉII§ž|ÒÍ·Ý>p@ÿK/¾èëßZØzì©§-l}æéÏ¿ü Çñ_/XPXP0lèÏæ±«¸döks¦Nž´pñEU¯¼ü’ÆÆÆŸ^˜˜B9Š`€!„¹Y¹Ä^z´«C¡pਟeØ®î.§Ý™’’¢ªê¤ ãÏ9ë̯¾þææÛnãôšÚÚÖ¶¶¼ÜÜŒô4ÂápB|üÙgž …JËË/½è¢Eß/éðu2a€Y†UUõÌSOûaÃÆgÌD †jjk¯»ú/§Ÿzê‚ï}·è{EQ.½èB›Í¶dÙòŠÊJÃ0 Ó4`€ÇívÚéR/UʱƘã¸ÒòRUSí6;•~Ê1ÂþÒFÙl¶„ø„yŸþà£g¤§G"‘áÆ%%&ffd 2ä¿Ï¿pÃ5W»\®g^x±»»»hûŽ~…§Ì:IQÕó/¹ì¬ÓO1lXcccvVVvv&Ïq-­­]]]¾Îζ¶¶@ Ðáóiš „)ªÒáóq÷ÄÃ9Î?ý´£Ãã1ý¸g¿ºà»… >xÿëo½sÛwe¤¥Õ××_zÑ…[‹ŠZ[ÛÜnwVf¦ËédY–J?åØÄ–À dnŒB9v`®¼òʤ¤$Ó4É4˲]ËI¢$ bŸÔT·Ë5tÈ૯º21!,IÒ·‹¾ÿÇßÿ˲,Bè”Y'rò¬X¯· ?ßá°8ðÄŽWTÕ0̾…Y™ÉÉI} Ü.WA~^Fzº×ãîWØ×ëñ˜†Á B^nNNv¶a†i<Ÿ•™™5jĈ„„x»ÝvÕå—õ-,>l¨(ÉÉÉãÇ=rÄèQ#»ºý<Ï8 .6–XQ1…rL‚ jmou»Ý<Çc:ê§m†imm…«V­_gbB<Ïó5µµÛ¶o•D‘4ŽÀóMÍÍ[¶n^ŽDdYv9r$ÒÚÚ³g—(uûý÷>ðò±1^¯Ç³»¦¦hǎؘ›ÍÖÒÚZ]SSYµÛf“6oݦ(J||¼a‚Àï®®yöÅgw\ÿ~}“²ÜÐМdžM›;;;cbbf¿6'úã$IúnÑ÷`·Ë%I˰UUMÍÍñqq,ËbŒw•”øýþ>©©?¬ßðä3Ï$Æ'xÜnI’Š¶ï¨««÷xÜ,ËﯖÖV§Ó »ý~–eIU€·ûXÎãÍ0L[{õë§#¿þÃ~‹mظqͺbcc òrB¯¿õvYYùö;EINN^½î‡ÓNžµà»…ß/]ÚÜÜRRV6qüø×ßzë»E‹ƒ¡ $Ù–¯ZÙÐØ!Ø¿?Ïó]]Ÿ|öYsK b`^^îç_|Éñü’eËeYÎÊÊ|âégTU[²lYa~žËåBµ´¶>ðÈ£r$ÒíïEñɧŸ™u ¥e寽ñæàîøQ9ñû»yŽûzÁ·¾N¯Çã}æ…E[´dÉÈáþøúëw?˜«D”·Þ}cüÅ×_K¢Ô¿__UÓ±eÝúÏ;|¾ÎUkÖ®Z»6 ~6ÿËÇM[ûÃú×ß|»¾¡aéò•Æ}û½÷—¯\–Ãmmí3¦OéÕ×|¾ÎUkÖx=î´>©1Õµµ?õßÓO9õ½¹þ÷¹çÿzåO¿ðbgg§¢ª;w‡B¡/¿þæÄ™3Þyÿƒ’Ò²í;vjšêõzoºåVð7ß~§¨êˆáÃ0Æ»«kæõugW§×ãñx<ó¿þÚép|<ï³´´>²yí·d9²fݺáC‡0 #Šâæ-[žyáEÓ´t]oko÷ƒ¹gqú¼Ïç¯]÷ClLÌ£O>eY–¢*ÁPxÑâ%þ€?;3««»ûÍwÞ ‡Ã«Ö¬8~ü#O>µqÓæÝ55óæ 0þè“yùùII‰1[·m[¾r•ÝîX´xqAAÁ‹³_ÙRTdÆü¯¾®«oèêîv»\ß-ú¾¡© B0hÀ€$ŠK–-ohlìêê^¸xñ´)Sæ~üɂì*.5rÄŸ{~ËÖ¢5ë~e¹¥µuÝú ¡p¸¿¾}:oͺB¡ÛíJNJBÕÕ×?òÄS§66ö¾…BŸ~þyVfFjjª®ëǦúSé§Sé? ƒ„P×õø¸¸§{tèÁ¯½ñæs/¾ÜÚÚöý’¥G–#_~³BÈ2H–å¯,`Y–㸅‹—ì*.Ù¼eÛ÷Þ}ëÍŸ:iâø1cŽ›2åæ›n‚ªªšÞ§Ï”‰§Nžtãu׆{Ç­ÿwÑùçUíÞ½lùÊꚚĄø­Û¶oÚ²Õn³Y– Ô Ýn·;väða·{˶mÛŠ¶6Ôétªšê´ÛÇ3zÔÈ¡C_pÞ9çŸ{ÎÂï×ÔÖ&&$lÝV´yë6I”&ŽÿïÝÁ²ìµýË Ç¿­h;Ïó`¯ü¦®?eÖI^÷þ{îF–WT|½`ÁÅœÿøÃÙlÒ˯Í)¯¨¸ÿž_õ_â·lÛ¶q󿄸„ú†Æï—.³Ùìápx`ÿþ±11K–/ïêêv9ËW­jjnž2y’‰œyúiÿ¹çná¦Í[–¯\éq»e9òÕ‚oƉ wüãÖsÏ>kÇÎ],ËF"‘¡ƒ:äÂóÎ=óôÓÁ@a~þ?ÿqëÄñãv—,Z¼8 z½ž¥ËVÔÖÕí17A¨ªZJrÒÈÃ'ÊÊËwO<ÙÂXÓ´”ääQ#GNž8¾oAþ-7Ý4yÒÄyóç‡Ãa¯×»tùŠÚº:›${ÖY×]ýW†aþuûmÙYY%¥¥6›¤(ÊØÑ£sr²¯ýëU} ÃrX’¤ë¯¾úòK.QUA0n̘¡ƒO;vÚ”É7ßtSô¶ÁŸzʬî»GÅ·Þ}oó–-ÿ¼õ–Ç~°®¾~öks:;»}ðþ;n»õ›ï¾:xЀ~ýî»ë΂üpß½§|ò‡Ÿ|ŠèÊ ÊápxÓ¼ Ãtww·´¶^|Á—]|ÑÊ5kTME1.6ö¬ÓOûû ×+Š¢ë€ALlLÌ„qcï½ë_<Ï©ª …,Ë4LSQU¿? ( Æ€däWTÕX¦‰1†ÂaÝ08žÇØr9]éiiwýó¶Q#GȲlYVlLÌc=èp8þqÇ]3Ÿþñ¼Ïv•5Òn·?þЃv‡ã¶;ïjkk×u½»«!p9]éi}îúçm£GŽ…BY–%I’eÙ˜åX2#C2%¢˜¦És\$"sÇ0 òÁPÐ2Mìiº?#]7 „6É–˜˜pÝ_ÿrög„B!†6qüøW_Ãn·]rÑ…O=ó\B\|fFFDQtÃ…B<Ïc€yž‹#MGæN#ŠbY&™“€š¦)G”®n?i öL³ ðz=ý ¸÷îÔ”]×UUпßcÞ¿»ºúÎ{îõ¸Ý£FŒxþåÙ¦aäçdg?þЃUÕÕ÷Þÿ ¡²éêê2MAäñxú>pÏÝ$gŸaªªJ¢‰DƒƒÈº;š¦‘Èm]×IØÀ0Œ»ÿuǘѣïºï¾mÛ·»»ºÉ X–‘#YŽH’„1†BÁ`Ð0M§Ó©éZ( ‚d¦! úýþ`0tÍ_®ºô¢ ŸyáÅ/¿Yà°ÛMÓD‚A–euM7M@Àóüž›!@uŸB9CúÉiyeå­ÿü×¥Wýå­wÞ½úÊ+s²³g?}ýÆM«Ö¬­ohHINƒ¯¿õö¹gŸYYµ{ùÊU%%¥™“&NøÏƒ?øèã¥eeÇ+.)yîÅ—AE=jdIié³/¾Ä0 1ì² £kúôiÓâ¿_²tÓ–­š¦8Ž«®©yæùªkj²³²0ÆãÆŒ©®®Aõïß¿¸´ô™_ª®©ÉÊÈä9~¸q_|ýõ~tÊI'ÅÅÅ}¿déæ-[UMcY1BH*À Ä ˆ¼À²,D!„„‚Š¢xñùçõÍ‚¿ÿã6—ËuõUWŽ1â?>üÊœ×eY>tÈðaC—-_±ný†@ @¦%UU9b¸?ÈËÍ7f´Ïç:d€aÈIJ,«OjêI3g®ß¸qÕšµdj„1#„fÏïbZÖ¤ ãçùÕgó¿°I61B†a0gž~Z$¢,^¶lç®bŒ÷Ìúþ°~㋯¼s²²MÓ¢ Ž1¼¤¬Œü¸laQ—,[~Ãßo¶ÙlÞ´©“Ÿyö½÷?8bذ+/½$?7÷îÿÜ?ûµ×Î:ý´¤¦¤>ðÈc5µµïÎûõ‚o½^oRb¢iY†a¤$''ÄÇßvç]ß}¿Xžã·m¿ï-YzáùçY–Im)Ê/ç9|’“5];ð%Ú²¬`0ÔÕÝ£ª*Çqõõ !9œ”˜èq»;::"%33£¥¥µ½£#!>ÎãñðW×ЉDRSSí6©³³Û0ô˜/Ñ,Žãºº» Ãð¸Ýr$b·Ù ÃÐ4Íår©ªZS[+ŠbRb"™´,«±©9ååæ2 ãp8î¸ëî1cFqÊ)]ÝÝÍ-­dÏóàŽò±11Š¢ó$'%†A®4,Ë6IÒuøºí o†a˜¦)IR8æyÞn·www‚Á”ädâÀS__oš–×ë±ÛíÂêšZŒ­äädq¯Ÿ€4Bˆ|`FŽDX†á8N–eQEQ¨«k…ÃÉÉI6I"×®ëºa˜6Ûžú0 ÓÞÑÁsœd³©Šb·ÛUÅ–år¹ü~}C£Ç㎋#&MÓêêy¹9clá[n¿ý¦ë¯ï×·Ðï÷746‘]Œq{{»Ín÷ºÝ]~CC£ÇãNˆDŽcBŠ¢Øív’fƒçùh㈢¤j*Ç²š®‹‚€jkooïèÈÊÈp¹\ãn¿ßÐ÷ü¸d%µ@0‡³23!„,˶wt†‘œ”¤ë:˲Í--/ÄÆÆ5>}11ÞpXnhlLJLLJL$7'iÆÝÕ5q±±‰‰ +W¯þæÛï.¿ô’Ä„„ؘrÌÑ~šÍáC9¦ˆæð9lé'9†1 C× „ 9ƒn†a±S•ç9–e‰[793™-0M“ãX`ÏŽe„Ä=†Ì9“õ~BÏ[뺎÷®÷»·…çùŠÊÊ'þûÌS="I’eY<Ï ³<ÇaŒu]ÿñ<šX–EÊB{ÿ$•‰V€¬*Ì0ŒeY¦iíÖ4­§/©iš{\kHz‘h[E=A„LËÚg ÃX¦iím:M×£õÙoAcÒ¼ÄÉä/"6L“ežçMÓŒ®…"«ÖD"—Óùõ·ß-^²ô©Ç ‡e2õPU•ø’rgš¦aÄ]’œ‡ÔìÍ•­pÏÆ!É» é¹Y†ÑtÝ0 Dzþøã"„È›)@‚5M#~E×u!‚ã8]׆áXV7Œž“·Ä¡SÓ4§Ã1ï‹/–-_ùòsÏtûý†i¢cR÷•~Ê1ÆÏ§oû‰oêºN´!ö¦]{ã6£»Èaä¹%3º=Ž1@PبR@‰—ÆØ0Mò!š©-Zr*¢F†aœ}æé‡ƒô^=KDg{žï}üHYû=Ñ "’~ˆ|†{ÏE+PÜõ›2ö~°ö-ºgÓXtôüÑ!mÏ #MÓŒD"=˵,KQ”hv»íì3ϰ,L¾¥ìmž³'ÞÞóX¿ qÈÆ¨?¥¶WÅÉŸÑŸ2Z%Ò;FË%wHô€ž-@~\r?ìwÙ‰D0Ʋ,÷-(p:œÝ~¿y ë>…rÌrØÒ–½ ç–ž‚þ³ÇüÄ·àÏ PU5?/¯¿¾‘ˆícŽ ÐŸØøK.çgOõK®:-Ä/¬Ã>aDQÆCL.?Ý8¿ÿä“NäX–çùÒ²òšÚÚfO2'A2—–í*.=rdKKË ³_aFE–e$I"aÉ$­± ‡`·ÙgF’$USkëêB6›Ä²¬ÀóB›ÍƲ,É`\SWgYØn³›¦)‚ÀóÏs'ðóŒÓ§ùõ7å•qq±¿áú ãÆ½2ç MÓ ‚~à¥W^п?„ð•9¯×ÖÕ}þåW7]wí™§Ÿf&ðS(~o— ˲’“’v––d§Å_1=]ëntáÎkNîË X[W—ÒcšA¨ëú€~}Ÿ}êÉ7^™=bøpÃ4 òóSSSSSS0Æ.—3..Îår5·´Ì<~z¿¾}óórKJË’GÉr¬¡3ŸÞ¯°ÐívÛNLLLnnNNN¶×ë))-óz<} ³33ív;1©³,ëv{*wW:.€a¦iÙíŽn·?ˆOˆú A Ó1|øM×]{ßÝwÍ8ݻ-˪ª®ÎÈHÏÉÎ6 #7'§° Àãq§¦¤¦¥¥eed¤$'gefq<‡bYö¸©Sn¸æêO?Ÿ¿xÙ²ü¼ÜÿÜ}׺ÖñÕר²Qè[PЯ°ð·ßAõ+,loïhmkaØÐ!$ײ¬¤Ä¤Êª A†5 Ó4LAMÓlh¬OMIÑt ÂbAàÝnw\\\yEÀ8­Oªi™W^véÌéÇÍyë­Ò²ò®îî…‹×ÖÖJ’(Gd—Ë•–ÖgÆô㺺º:|>²N0jiix~ô¨Q¥eå‰ ñ………ÉIIwÔbD(ÊáòûŽú!4 £OŸ42K–/ëŸ÷Ð_ÆÞuéh‡/[šœ”ìq{ö›'ÜY\üêœ7ž}á¥M›7«ªÖÙÙèêêÖu#–»º»9Ž9|øË¯Íyëw+wïž6ercSSggWŸÔT‡ÃþðãO|þå—MÍ-²Q¥«»+"GEini9|xssË˯¾¶rõj’|†$ÊËÍomiݸy=b‡Ó)ÙlM-«×®ÎÎÈ!jWEä‚033Óåt‚Á‚‚øø¸Ø˜˜1£Fö-È…¤¶r$ÒÙÕiY¦¯³SŽDäˆMÓ CÅ¥¥ ä§õYº|eMm¯³sð KW¬ôûÁ@P×Ó{õõ7rsrôï—ž–&IÒˆáÇD&„ CïÓ' `°bõrÃÔN»Ía†üKW,‰óÆ{½1û5fqIé[ï¾÷ÂìÙϽ4ûܳϖ$›¯³sûÎÉÉÉ,ì[¿~çÎâÒŠò„ÂaÓ´jkë¾üú›Gžx277'/'{åê5•»w÷-,EaÔˆ} ò‡ ØÖÖ>çÍ·–­XÑÝíÿ³ÆP(>o•®_˲ú¤¦uuu—•nÛ¹«´¼ª­­==-3?¯ gþEâ—" ¢®ëš¦ÆÅÅæfg¥§õ‰‹³Ù¤ì¬¬˜oFZŸ¸¸¸úC}œ{Nnv–(J¹9Ùv»}ÐÀõ >Ÿ//77)!!33#­OŸÌŒ Éf‹ñÐèÁ55uí¦i?mš®Ä„’’œZ___ZV²mûÖªÝUÝÝ} ú§¥¥E«!s—š’gš&ÆØãvçåæl-ÚÞÕÕ•ž–ž—””˜–šŠJMIMMI±Ûì9YY.—+1!!#=->>>.6fý† BW]~¹ÓáX¿is{GÇe]˜““ípØ32Ò“332Æãt8ôïWQYUßPŸ”˜”’œLÔŸ4fgGgIiqÑömååemmm}R3úöíw`cJ‚¨jà3N;u¸qš¦e¦§³,»vݺŒŒŒóÎ9;?/WÓ´ººú)“&õ-,HINnmk‹‹½ð¼s“Uu:gœzJqiY}cCB||aA~A~^qI©×ë8n\JJ2¸G t•.Ê1Y¥ë°3wþZ‚ eY†:NQ{z 2Ê0N—ŠDd’†L–#N§CQ’Ù?‰@Dz¡p˜¤uŒ( IHép8 ¡p˜ã8Ó08Ž#IÜl6[ ðûýi}ú<ÿòìP(ôï;þÙÙÕE¢v†a¶«»KÓ4¡Ûãá8n¿´À¤­X†‰F-6›0Ë2YÉ= —˜p8ìp8ˆ½(E‘$Ñ0 Q”0ÆJ$bZ–ÃahšQ‡Ý.G"–e‘Åu5Mã8Ž\Ž¢ªäªlL^ðü$JÀétÚlvUUÞ˜Œ#‘H8cY cA°e…eÙ²,»ÝŽ–QI’‚ƒ@0p:ºn¨ªêr: eQm6 [X7 Y–ö]}ÌA3wRŽ)Žá5oùǪ-…B9Šôjé=r-P(JïáHŒ³Ä¼KòÂtïÿR¡?– ÄO×v¿õ¶þd×þÇ­3…B9lé'óŸN§Óáp°ìþ/ Bžçö ûMvý8UY?öWáPÓ¯„P8ôÅ’£çéé”B\zê×Þƒøîï¿úUÏ¥» Ãhmm‹‹‹&ÝŒV’¸Ü””•232¢N>=¯ˆ¬Õ~¸×­|4ƒéA¯c ‚D+ÖóªÉÜ,Ïó¡P¨gÿÝÓQj¿ÒÜEΩ( ÉzЂ¨Ï…rlrOf4÷ïý?ºrÍš>·~ã’rÒëõºÝnžç›šš{ò¿¦i@Ý.WŒ×K<åB^Çãq{=îŠÊª»JˆF8öÊÝ»wì,Ž÷ù|?ýŒ( ä‹$7r\l¬$IÑñ;ÆXÅØØX‡ÃA\݉B9€(Šq±±v»ÝéplÜ´¹µµ->>Þ0Mr›$Y–%‚ÇãŽñzm6›Çí&Iÿ£—ép8¼Çí²Ûl±116›·Ãሉá8Žèl\\œa<ùd(E!&&†Ô`š¦Ûíþ~ÉÒ—_}­¸¤DÓ4Çãõxˆn:¯×k·Ù Ót8‡{í,ËÆÄij9ìv²‚ ù@jîp8ìv{Œ×+‰"˲±±1N‡Ã²,ŽãÜnwŒ×ëp8DAèêî^½fmBBBÏkw9±±±‚ÀGK·Ii^²‹dë´Ûí±11.§Óçë|ÿÃ4Mx>&ÆKÆ$¯jLLŒÝnÇ€šƒ(”c‘ÃõcŒEA¨¨¬lmk{á™ÿ²,ëóùtÃPUõ½æÚlÒ‰3g"Äwxá—ß,ƒÓ›æu»Ã²üéçóò<~ì˜7Þ~§³«³Ûß=lÈŽã‚ÁÐko¼Ùí÷˲œ’’ÜÒÒúîsžŸ1ý¸¸¸¸]ÅÅ6m1lhÿ~ýTUpWµ{÷ë7ääd§õéÓÔÜtè®ââ ›6 :tÈàÁ¥eeÕ55ííú÷««o0MsæñÓ„0Æë~XߨÔ!ÌÉÎÞ²uëàA ˆ-kÝë››GÞ'5µ««ë›ï¾«ohÔ5]’Ä––ÖEK–fgeŽ=ZÓ4žçëêê>øð£ÜÜœ¾……’$-øn¡¢(“&ŒnÚ²µ»»;5%yЀ@àp¯Ý×Ù9oþ¢ Lš0~kQQA^žeYÛŠ¶çæælÚ²Åï÷{=^†aZZ[³³²âbc>øèã¬ÌŒIÆ766UTínimq»Ü3¦÷Ñ'Ÿ®\½¦Ûï7f´Ýn'½Ë’¥ËššÆŒ™Ÿ—·cçÎ ›6:tà€~Š¢’]cGÊÎÊÚ¸yó®â’aC§¦¦fefH’ØØÜ²qÓ¦ÔÔ”1£F••W446446ååæŒ6l¿¥Í(ʱÀaŒú!„r$2tðàüÜÜ+®¾æ­wß%fç^z¹³«kÛöï}0WÃ0$Izÿ÷n+êìê~þ¥—–}é•W·lÛfY–?°,Ë0L_g'Ø›£M7 Ã0;:} B²,³,»yë¶?ù´±©é¥W_s:¯¾þFIi) ‹­­«û÷}÷[wuu‡Ãá^ž-G"»ŠK>ùìóÖ¶¶»î½cÜÕÝ !„ápXUÔŠÊÊÙs^w8œ³_{½®®nùªÕ}ò©ašwÞûŸP(´pñâù_~ew8,Ë–õÔ³Ï5·´¬ùá‡ç_~™ã¹'ž~Æ|þåWs?þ¤½½ý¡ÇoiiyùÕ9¥eå»Ý0Í@0øßçžçXö‹¯¿Y¼t™ÝnƉFÓôHDyáåWV­YSRVöä3Ï657?þÔwC!ˆÐa];„P–å'þûtsssDQE™ýêœÎήֶ¶Wßx£³³ë‘'ž,-¯¨«¯ôɧJËË›šž~þ–eçùõê5ëªkëž|ú–eߟûáÒåËÉëK‡¯ƒ„/Øíö÷æ~8÷“O%QôûýU»wÏ~mŽÓá˜=gN]]ý§Ÿ}þÁÇK¢ ×þðÓO?k“¤Ÿ¯³³ó«o¾­¬ÚýèOvø|ï¾ÿÁ¢Å‹W¯]ûÆÛïð<ÿôó/ì®®E‘Æ1Q(LJ'ý¦iÚíöÇ~ðæoع«ø‘'žlhhØV´=‰ø|;‹K,Œyž—eyͺEéììÜ]]³c箺††ûþ}×å—\ëøiÓjëëI¸Æ8>>.Ç5·´”•W 6tüØ1s?úD—Ó™“=óøé‡C×õn¿? ¹œÎÔ””©S&AÝnW$Ù´yKNN¶Çí6 £º¦¶©©™eY„ ašš¦×ÔÖvttX+²ìD§:]îìl[zúiÓMš–šâ8èr!Ž»æÆ6¬Y{ç¿îúð·fÍ8þ•7ßr:gœzŠªi×ýõ/7o¾óž{?z÷mË´JK˦Mžãõ¸œÎÑ£F :¸ß¾sÞzà U tvÊÐu`è@×e)`À﫚Ê02 ÇIqqžÔÔ ¥e YY5¾ÎÉ',Y¶|SY™$I]†áJM¶'&5jÌ´i^'ˆ1r¹tžAØ©é|L r97”–&Æ'DJÈÊ ìØÀbYèt «ñ|u]}{gÖ4Eüþp8daËãq»]®1£F1<9))–yž‹mim-+/·Ûm/Á_‡¦é@,G”P($ËEU€ÀóN‡cÀ€~£FŽHOOÛ´y3 ^SUÕ´,]×[Z[+++NÏsŠ¢äççÞvËÍO<ýL}}ø±£ÇèQ#GŽ–””Ä0Ì?ÿqëŸ}®¤´ô{ï¹õï7}òùüÿçþ»n¿]–å>©©«×¬innÞ¸yKrRY-`¬ë:5õS(Ç&‡—¹“ã¸ÊªÝ¯¼þÆÒåË뮿æê‚‚|Q—,[^ZV&IâAƒV®ZU[_îYg®X¹jûΑHdü¸q’(~ðñÇ[¶nËHO+,(XºbECcãÈáÖeÅÆÆ¬\µº±±i@^nYkëøÄÄìß5xÁ‚aÖ÷]º´ßŠå Ÿ|ìXð-_QΫj}UÕ+/½\ >nÚ¨©SS²²>üèãÔ””óÎ>»¸¬ì•×߬kl2dð„ñã.×Wß}kÆ)³fU×Ô®Y÷C]Cã€þýÛ}>Qûõë·¥²r‰'¶FËn6dˆj·c‡c{}ýØqcƒ JÕî±}R·,\8"­Ï˜ŒÌïçÎ]þɧÃSR.9~:ëó}üÒËU?¬»ýçOžd57¯øt^õ† ) Jx³¹YèîÞµby¦$LLŒQµoÞ~{ó·ß9nlÿØØÒ•+'æåñ]]°½´·Ç[Öª?iêèè;sFYEåäñ㻺ºÛÛÚ.8û¬ÝµµkÖ­«ohÈÏËóz½Š¢¤¦¤üþ¹R^^1bø0ÀGó>«o¨‰:dðîÝÕ'ŒWTewuõè‘#Òú¤F"ʲ++«ª2ÒÒƒ|¾ÎÉ'—–Ú$Û¤‰¶l+Ú¸yóÈáÃA`YöÛ…ßòÙç,ÃN2yÊÄ »«kÖ¬[WWßп_ßuë׸ɧ Ü|Ò‰í¯¾þF(ž2qbvVVqié¥^Ðáë˜÷ù|EQo¸æê¦æf燲yËÖ¼ÜÜ>))ÚÞ5z'4s'å˜âH2w„P(r8BUUEQTEÙ“èaŒ5M³Ûí†a„B!›ÃA|r"á°¦i¢(2 ƒ ÔIŠ|€e± Ð_Y)}6³};@ÂFlØíá##Fhª*ôïß¶¢ñg9yÜ89Ñu]Q”ØØX]×Y†Á†‰ây¾»»›eYŽã„BSQ¤ ÀªUŒa@„¢³‘,ÇY--ÌŽLYPÕŸhÁžé‰É}$ò!ÀØDQ ƒÆ¢ WK]×Y–%gcYFÓ~\‡!A°Ûíº® ßÝí'-ƒ‚ 8vMÓåH[–×ë%޳dõ`EQxž·LÓ˜,Ì@¦z¹¡Ÿ¦o£Sü¯™;IjI°7qà QÏ\l–eAË‚qqÂSO‰/¾ØýÍ7 #©ªµ7þL „ívŒ@ˆiiaŠ‹¥ý‹ÛºU¹âŠð=÷ ðˆÛ>„¨­-*bŠŠPc#[^ŽÊÊÉ: @BÑfƒä´ˆ,à —õýÇ#†=Ãk- *Ê¡Èòz;}qRR4ågôºˆ}47gtcô°h÷ü Øë}¿OêŒ1Ë¢æfnÍš=—#€eµY³”nÐGf8¶,€1€è:V†ãö cL|g‰Oý>Ný’™½sÑí…AÈêq6rròÝž»¢)B£g#™PŒ–Ø· Þ •~Ê1Åÿš¹³gZ`„Æc«çÙ!„À²L™]»PM ãó99–,†!É%± › ¨*»a·v-»z5[T„šš€e©—^~öY€&âÀHL4† 0FÍͨºƒB¸zµôÕW »ÛBî­Ü; ÇàGk³¹ß¨BmìXíôÓ±Û , ôc IVR’•œŒÝîßüw€uu±72»wsK—2[·ÂPHøøcþ‹/Ì!C̼yV(/Ûl┩Bl¬ BU…‘ÈÁGâûžù׸ƒ„¤@ƒAUS„œ'Çóúoç¦á>ýœeÁ®.ÀóVjª™ž®Ï˜Â1--Î3Î`·lq\{íž—€ØX³°ˆ¢1fŒ>a‚1|8`Yªþ ågùmÃm”›ov\q@zòI+)‰_¼˜Ù¹`%$l¿û®ÈС6Ä@„»+-Íié&=E€{LènÈýÙšD']ö0†a4M«©©fXFÓ4›[šããâtcõùV£'Ñéßý0ŒeÈ0Èl,ÀbŒ9.°p!»q#»y3†©­çÌAkÖ¹eË$ËR®½6üÌ3Ðïÿù¾“B¡ôn~3é‡F"Ú¬YƨQì† Â'ŸÓćvòÉæ)§õIqåäÎÌ„ Ð’“‹¶ÕÔÖdeeG×D…%»Ý2M¡a:™À{deAMÓÔ4ígóæÛ$I7 ròŸ°Þ÷Ç’Ò]™™Ù}Rû0 cY8mßfYfRRrÏêqGú†a4Uýiïõý EÙl’,Gu¼ÃaWÕ4Mí0º®§O›†!„йå!jog7lŸ}Vœ=[Ÿº0:„Aha à8Ö0Ìè–®®®Õk×Í<~:ÇqÄ5ž|…eY’Vá“yŸO7.&ÆK\õ!„&ÆË‚HÄȪ¾8!`ÆÇë£G›¹¹®“Ov\y%jmUþúWhY@–B´ P(ò[êB@QÌ~ý0Ö¦L1²²˜P¨µ¬,3%©¡Å÷ħ;bâã&ÿø‡[LÓŠ‹‹kmm%ZLbǺº»C¡Ðßn¸îŸ·þß„qã4M³,«©¥Å0 »Ý>ï³ù­­­³N<Áãñ˜¦ …Hà’…±ªª²,K’‡ÛÚÛMÓdX†äß…Bmíí$LI„Ÿ/FÍA¦i‚þÔÔTYY–‰±…±‰Èv»Íf“:;}Dú1Æ<Ç546ò<÷÷oÈÊÌxaö+$p¬µ­$ï$XX–u]7M³¹¹Å´L9iëèàyˆDr ·µµéºNú€¶övEQ„ ˆ÷š’ á³³+ Ë‚Ý8 4 hPUÔÖ¦Ožš3H’ýæ›_Œp\`YÀ4 "¥P(=øm§y¡a˜yy¶¨Ê2ˆD Ã¡†MäwÔv!Nä>.–­oîìð‡žõûÑÀ(Œ1Dz¦iíØ¹KQ”I'|ýíwß/^âñx,˺ñºkÖoÜ ‡7nÚŒ-üöûï뺞“•}Ù%ý硇#Š2rذÔԔϿøÒf³ýõÊ+jjj%Qzçý0Æí¾ñcÇ\û—«fÏy}ÇΖ…cccîºý6UÓ0ÆšªF_ ÈuÅ(š®Aøãb,,Ëz=žä¤Ä¸¸8UQBo½û^um-Ã0×ýõ/Õ5µ¯¾ñFjJJjJÊÖmE^¯' öIM­¨¬<ëôÓ‡ RVVQ˜Ÿÿá'Ÿš¦5 _ßY'žðÂìWä°œ˜˜pñç×ÔÖù|÷þû®9o¼©¨jnNöÂE‹–9eÖIÇUUFÝ:‚²¬^|±1hý–[øÏ?g‹Šä{î1FŒ033(ÂHhÚѾÙ(ʱÂol ÀE "U €(ðþPV²ÓË+5ÝUµíyñÀë¡°$I–µ×&Ž1„0•WT–”–ƒÁ@ ••ùÌuuwùýþ)“'Ž7ö/W\>{Μ±£G?öЃåU•‹–,UåÂsÏyüô>wÓõ×Ýý¯;²³²ªkkÁ@0¼èüóo¼öšõ7nܼyãæÍ=ôà¬gvuuï MBˆaEQš®†aºa–e*ªÊóB4r cÌñÜúïº÷?«Ö¬½ù¦ŠKK¿üfÁ¸1cª«k>ž÷b˰÷üëŽ>©©¢(<þðC¡PxêäIW]~Ù÷K–jšÖØÜT]S³³¸øøã¦0ãø¶öö6l:dðYgœÎ0LiYÙ€þý*wï.//ß±«85%å­wßëÛ·!ôÊœ78ŽÝz!ØÕeöíœ??rûí¨¶Öqùåî Ü'Úÿö7TW·gøO¡P(¿µ‡{§e5 Ê2`Ó4Óú¤í(Þ9súô¿ÞÿÛõÕ¶XæôICÃr¸¡¾~ì˜ñº®EgbuÃÈËɹ󟷑?.^Çr\lLŒea„Ïq¦e…e9''ÛårÅÇÅù|>§Ó™š’¢ëºeYÙYYv»¬É2ŒÝnw9ª®zÜîÖ¶v²p•Çíá8ïÈÇÅÅï*Ù9qÂ$91Mèr9êjÃápbBbômB¨kú¤ îù׊ª:Ž…‹—ð< …Ž›6uØ!>_BB¼ËíæyÞårñ—/‰"ÆX’D„¶ð”I“232Þ›ûáª5kîúçíÏ=õä'Ÿ}¾jÍÚ;n»•ã¸>)©#† {aö+6›­ ?/–5Më[X0~ìEQ2¥Ì²¤‘åÔ'Oæ?ÿœ[»–-*b·nÞ~Û¿q£Ù·/ìè Ö …ò[ª„{¼zfÎdÊʸe˰Ói¨jBBbBl‚ïЬ~Í©.žÑ·£½eÙŠù…6›-š<À ´µhûÝÿ¹ÿÖÞñý’%–iƒ!@04MSUµP8Ìóü ÇÿÊœ×ïè‘îîîgÎhmk †‚™™wüûžg¿R[W§ëºªjÁPH×uÓ0[ÛÚÇŽmÆwß3ÿ«¯¢™ t]ÏÉÊÕ5cÉÒÅa9„!6±¹³xûæÍ›û÷Ð3KDPÕ4EQ–Õu= 403#£½½!äpØ5] ƒMÓ‚Á8 hº®éz86MSÓµ6løaçÓÑÙÙUYUµ`áB—ÓÙáëÐu]–eMÓŽ›:eÁw‹ú÷íÛ·°`èàAmmm›ÍvHW"„€eÁîný¸ãÂ/¼à_µ*ôÚkVŸ>0–x€[¶ ÐUÔ) G˜¾í—b8!A|é%û 7„Ÿ~:róͨ¥³,/µµµÕuÕ>†aãcãrsòH5ÈWBr$²sW±ª*º®gefJ’dšfzZZYyyRbb(6M³Oj*B¨¤¬¬­­mÈ Á.—³¤´,­OªÃnW5mÝú ‘Hdì˜Ñ]]]»½ÛïOMIÁ×Õ×÷-,TeÇÎ][¶m«ohxì¡Ãá0ÉM!,+/«o¨õû»ALLH,,èïv»öóìlmk ‡å¬Ì ²ÐÇqÝÝÝëÖo€Œ6ŒaÙŽ_~^n{GGwwwnNNyEEbb" ­­-5%¥¡±ÉårnÚ¼B8qü8†aÖ®_ †F™œ”TZ^žÖ§$Šeå}RS\.—¢(ëÖo…BýûõËÊÌø™…M“øÀZqqâ»ïÚÿïÿ`G‡•˜èß²ÛíÀ0¨ãÿïMßF9¦ø_3wþRˆô?÷œýï·22B¯¾ªO C!l¼$™†Ar ó 80\!d“$¢ÅŠª÷GUU%I"é‚ÉŸI’8Ž#£i²×4M„ÝnG†Ã2Ë0¦e± £j„PøpX®¬ªŠ}ówãbcÿvÃu]]ÝÌÞA1ÏóÄ¡ˆ|Æï'µDëÉÄ@´?`YÖn³dYÆp,Q”èa¤bžãTMxÞ´,I19c»ÍT"Šªé’$’ H’¤ªjËAŠ¢ü8Çû ~ Š qO˜ÀÔÔtÕÔ`‡ƒJÿï•~Ê1Åÿš¹ó—‚ …Œ‰µY³ø… ]'œ žw^øùç!ÏkÁ Dˆ`¨ F`ƒ¶,‹ØLHr²‘,QKV‹{teY{ý eY&½…eY$µ=DH7 €¦i$år8,3 SQYõá'ŸfgewöYÁ`ˆéa !ÚJ¶P²ý¤–X‡4]G=ÒU†Ñí÷GÖu8 ‘rIµ²awšh×Ejî'µíqò.²ÏåVä0ËEÁ^/$ªø …ð›K?PU377øÕWâOØ\øðC‰„Þ|''Œ-2ejYP–®ïó]Œe¡è()êBòÅð~pàçžÙ3p4‰ÿÙgœ~Þ9gŒÃ²¼ŸÃLt þá@ÞO”{·_Å¢îâ{àçƒ^Î/ã=f„0Ïc–®‘K¡PöðÛË„@U¡¢(7߬{®ã’Kø/¾pž{®1|8TŒ´,+!AŸ1ÃÌÉÙgY.ŽÃ‚8n•Çè:TU iûä);¢”ÅDñ£ksì—Xô°Â², Hމ–ñõיݻ1‰ð¢P(½žße$H†·ÝÝVBBè½÷_Ì-^Ì-Y²–Ýs–¤ÿ„Ð,,Ô§O7ûöÝGÐÆJJ232¬ÔTÀq{6š&0MHB[Çu=:œþM2Ý[ «kq£ Ž^#„{²2ü’^ cÌ0ly9ûå— –ž}–))(W]…]. ëÔìC¡ôrŽPúM Cо bZ˜A‡Ö–…á°zÿ}¶¨Ã:Æ€a˜âbáãQC`˜=ZiYLQ³qãAOg%'[éé˜ã Ƙe‘#õ™3ͼ<+) Âá^ËÁÍMÿ3X’€(â#u¦„¦‰‘Ï·§5jk™’¦¸Õ×ÿlwB’1»w£º:@ÈJO×Î8C¾ÿ~:ê§P(àȤà±óša*šµ'ðB‡ «ÆOéÃÀH»ÝÚ‰'öܬO›¦\{-è‘ë:_QnßµCihÂŒ-Œ!BHQ˜]»˜Í[˜õ룽·r¥ôä“Vjª>uª•pX ë¡eY‰‰ÚñÇ[û™›þG0fwîdׯgjj{Ø1@ƒü¢E¨¶–¤æ?²Z¨çžkjöé£~:`¨(4›?…BG&ý ‚ ¶4¥ÅÚr“º¹'g}@1Ö”µËŠáØ=É)‰^a ,‚¦…1B¤éŒÖea`Zd½o!41À’ÏÆÂά¼åöŒ‘—Äs$"äÅB³á¨)ሎb~vùrnÅ výzá½÷ŽL(mwßm¶_-Ç„c(ËGÞ—•Xµ“O ÆJI1 ÍÂB3-í—†ãbŒ-— ê: ö„USݧP(‡+ýŽ!íÌG—Ÿ;>ãÝ›ÇwU‘g\N¡ª1ðè‡Û?ú×d¯Cô‡Ä1Bxޱ,ì—5—ãYÐ +Ñy–‰•8p0b–gã!!ÅP4“ç—Cð7t?ùòÊ7nŸè–­¨104+ÆmãB:n7PC€“Ÿ)‰Æ AÊM7¡Ý»™ššÃð_$BSR"|ü1ª¯ÿ5#]!4Ö§N5†Ç<ÿã"¿¼¡YÖÌζrrö½eæ +ª¢ÖÖC.AL¡Pz+‡'ýƉŸ³´ê„©!Y/®÷¤¸Js>(jìŒ@‘]YÜf˜øâÉY ·6ù‚šj˜ ‹šó’œ;©à£5µÍÁšöð‰CSΓ¶»%xß’ªb\7#/%Fú÷‡E~Y¿jZNÿ4wIC`ÎEM]™e9Q0†—„¯ŠZþªüªiÙgŽNãÂÚË_î|ÞÄ7œ7¾0>ÜÕÀ))zvöœ~Üq=ÍM¿dÙÅ#îN0†Š;:ö9ááÛ!üq2œB¡PörxÒ ŒhÆÒ-w9à¥UKv´ ÊðÜúΖÉý†fǼ±´ŠCðÙ/ŠÏ›þöò݃2¼Ã²½gŒJ{~AYŒSØRÒÆŠìÔ‰ÿùdÇ„Âø¸½ Å527ÖëàÿóÉNÓ²Òcí7¿¹yþí“îx븂øá91Ï/(ÇÄô á# Ý^Ûuÿ§;_ø®bÞ?&¾ý·ñKv´ÜþAQaŠköÕ£TÝ„ª å›á7rîü‰eß êŒO¡P~CY,Œm<[ÞX_á{ü‹ââúnYÑ·ÕtkŠq÷¹}òû+«Ç÷Møh]Ý+ +ý¢I™*}+;-ÝÁÁŸ8$åÔ‘}殪YWÞ‘õû/ÌrLGWdKyGz¢CÑL‡Än­îR÷žð½•5¦eAm~¥¨¶[7¬´8„ ®#¼³Þ/²LrŒ„tì4¨…B¡“ΠcÞ[^}ÂÀ¤œÕ¿¶-|ÇÛ[º‚*âÐKß–'yÄŽ™gÑÙcÒÏ{|Åç äYæî77?tåˆö®H8bè²ÞRý=P2ãì²…_ü¶lL~\Z¬-3Ù™ìÏ—abo—Müò·å‰±³S†BuüïãíͺóÌþ“û%”5n}gkv‚cö5£ S\~Y§K¡P(¿æÊ+¯LJJ"«ÚX–íìêä9Þépš–¹oæ X[ÑqîøŒÑ¹±¹IÎ.Yq§J{{ùîšöpß ÏØ‚øÔX[{H;o|fn’CÁ`á¶fId§H”$® Å+íöÉ3'Íô~´¦nc¥op¦÷„!É‹w´,ÙÑjYxJÿÄ‚×Ü555máÂtÏä~ ƒ ̽bjNjŒä— ˆÀŒAÉLÈ´ lP1Ð18Þ§PöÂ0L[{›Ûíæ9Ó•2)G†aZ[[/s'ÆÀmã"š©è&„Àeã5Ý„åä ÒO2š1 µõä Ù%÷#êÐxÐý<ú©¯€ßÌ݆BùýÁ3 ƒ÷DQ(Gý¥ŸØ|jêjÚ}í–iÑ5…ò?„0¢D8Ž£ÃʱÃ>ÒO–IIJIŒOÄSݧP~0 kþPé§;ÜàCV¹:Úu£Pþ$Pѧkzš—Þ¬ …ò'…ΨR(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒýéÝ–eaŒB„~¦ŸÀC·c c€1!ô³gˆV @ˆ <‚{VÕ4Í_R(…B¡ü™øé·Ùl¢(B ÆB?q$‚á8]׫xŒ1˲v› 1(˲¢ª?-Ä’$I’6MK–eÃ0uüž€ýˆVB#˲ªiTý)JïáÒ1æy~ÙŠ•}:/‰Œ6ìŠK/æ8β,!ÆAhí;CUínk‹‹e† ¥1cr09 ïý“|ÅÂXäùŸïÅÙ¯ìØµKà…‹.8ôȪ¦± cY9¬ç·xž_³vݧŸÏÇØÊÌÌ<ó´S““’LÓøP\llA~AEee‡Ïç°ÛY–e†a˜¨U BÈq\www]CCm]}$áyžè¾ÇãÞ±k×M·ÞÖÕÕÍq\~^®Óá@I’t`¡¢(’€Bù9ÚO:…²õ#„DÇ©š‰DRSSO9éĤ¤DŸ¯óÚ›þvê¬Y—\tá#?GŽþáGŸhšvõ_®úzÁ‚–Ö¶koúÛ_¯¼"))ñÅ—_q8¿ñz„˜Gžx’aEQ òò¶íØž™‘ñ¯ÛnQ’¤Ïß~G×õÞ~Ãår«ªjzSSÓ³/¾TV^QXÿ[n~ùÕ×êêê;»ºôïwëßÿöÐcwvvUջý Ýn_¼lÙ ³_±Ûl6ÉvÂŒã¿Z°àÉGþjÁ·•UU“ƿvûÌã§'%%}ñÕ×N‡ã¼sΚÿå×mmm×ß|óY§ÞÔÜË@à¡Çž¨¨¬ìYhWwWÿ~ýþqóß9Ž£.åBhÆÑ®…ò#ûH?Ƙ㸖¶–†ÆI”ÆŒùҳϼþöÛs?þxÂØ±·ßzËAƒ>?ÿ´SN^øýâ¿Ýxý‚ïúÁsÎ:£ßÂp8\\ZöÏü_lLÌ?þu×ð¡Cï¹ÿÁï½§¤´ôÁûîùâ«o¶lÛö¿é‡]³vÝ)³f†ÑÚÚ–““ír¹›››9Žs8¯¼þFKkëÃ÷ß÷à£Ïyã­¶¶v§ËyÉEüëî{Oš9óܳÎ,Ú¾ãªË/ …BϾðRUÕî7ß}wÖ 3ãbã^{ó­`(ÔÚÖ†1ƒ>UÓìvÛc=àõz}>_xê”ï¾_üÞÜO™uÒîêê[ÿö·Ô””÷?úpÚ”ÉsÞ|»¹¥yÿB/¼àžû>lhzZЦéÔòC9bLËì›ß—eY:† #ì?êg ãÓú¤uø|ñqqoÏymÑ÷‹¯½éoÓ¦L¹ä W­YóÌ /&''=:3=}ýÆß-Zd·ÙÒÓÒB#† kjn…Bºnäæä8ÎP8ìõzÇ[Q¹›a™éÓ¦½ùÎ{`ˆ(éÐ!ƒyâÉUkÖŒ1¢»»; µ´´äå <¸ /·®¾Þf“ òó§Nš”’œ ‡ óó9Ž?fL |oî‡]Ýݪ¢NŸ6Ín³ÍýøcŽeMÓbY–ç8Aà!€n—»¿~–e½úúEÉÊÌlïhOˆ‹gfÈàA<ÏÛ$B¨±©±0?ÿB'OJLLô+ì …~ÖÁ‰B9Œ1Ïó;‹wjºF_)ÇûK?!IJ¬ÓáX´xñ¿ÿó@lLŒišÓ§MËÎÊJJJ7fÌœ7ߺãÖÿs8¯¿õN[{[CcS·ß?zÔH–eO?ç¼K/¾hڔɥeå}RSSSRDQìèèƒ~¿ßçóÎÎN]׆éîîžyüô;wÝtË­ ññ>ß×]sù%ß÷ÐÃç]|I‡Ï÷À=÷¼0{vBww0êìì4 #,Ë]]ÁP(757çfg;æú¿ßœßíädgy=î¿\w}XŽäde*ªÒÙÕQ"¦aîÞ]ÍrœÃnëðu&&&0 sÞ%—žq꩚®išváùçýûÞÿ´P˲xžç8ŽJ?å oÒÇíŠP(ûW­Z5xð`MÓÈ|¦ Uv›=%9Åçó•WT¶´¶z<îÇK¢ÈóüÆM›nú¿|øÎ[éii%eå5µµI‰‰ú÷cYvwuuÕîꂼ¼øø¸«Vû:;˜™‘^´cÇð¡C›šB¡ð€þý¶mߟÖ'U×u†a†Ù¾cÇîê»ÃÞ·  #=­²jwEeeA~AvVæ¦Í[ÜnWzZÚ–­Û²23DQܺ­hÌèQ†alß±³ ??&Æ[YUµió–÷æ~øòsÏŠ’X´}‡×ã±Ùln—³¾±qÈ A<Ï755¯ß¸Ñãñ¸]®!ƒÕÔÖí®®ÎÌÈèöw÷IIIKK++/¯¬ªÚ¿ÐmÛÒû¤%$Äÿ„ )…òDGýéiév›¸Q(G rCRú““,Ë’$ !„1‡Ã†a¸\®ÜqgD‰<÷Ô“‘HDEAàu݈D"仢(D"Ša»B¨éº¦i6I Ë2Ïqˆa"‘ˆÍfÓu=Z"Àf³±, 0VTUUUQEQT"EUv»ašš¦Ùí6UQ-Œí6[0‚Úl’¦jϽô2Ïó»ŠK$I|ìÁ„’$š¦i™–ašχe™\­(Šc˲Âá° ¢ ¨šÊ0¬¦iš¦¼P›MÕ4p´2Ê!ÁƒßÍŽ‡q3Pé§SD¥ÿ~ýBÓ4ƒÁ ƘÄÍrçóùäˆ|ö§“þ ‰È²L\*!„Š¢D"béöûÁÞ` À0LDUÆ¡P(÷Fá’ÿÃá0ÞÍ‹"ç!„Bá098Üó­n¿Ÿø†A–e ÖoÜ4vô¨“g„Ð5MÝ!Ô4ÔMÓ4EQÈöh!ŒRɃÚ£ª”c!‚¿·-Ž*8åΡ£y1ô4p«÷S>! Ëò¶ïž[†Ùï3‚ìUÞŸøâ~F?G?DÏL:€Y'Ì<ýÔ“MÔ#Ã0ö;UTµ!„=«=,zÀOJ96jºÖÖÞv¸aäÿK‰^¯×ítÓ [Êö°Ž&±øXŠq …Ã8 txÞ;iïhOINq:œ¿ÛH¼º¶šc8»Zo(`ŽdT{L),BˆAˆ¦`ëX–¥ëºÇí1Mów(c, ¢(Š…X éÀŸòGåðFýÊ1ˆa$KÇo]ÆØ0 lCo½Ê‘q$ÒL|Ž)ðÞÌt¿[q¿]Y”_hYVTúñ¾)Ý« ýŽîDÊoÅaK?„eÙÿ1! yPà™<â/þ’Z–Íþvïò$x‡aMÓ~;SÉFêI&º‹²ˆ×SO[6Ç®àŸÝè]aYË0BqdíÓ³÷+àÃóï¤PŽAOúIª®în·ËÕó‰"c+bý$R„zè)Ø;•»ÍQ”¨Ô‚OнZ¼gBcI’ ÃÐ4¨ùJ´ÜžUíùÐö<ì]ì…a¸=¡Ýn ‡eâÕ !"ZG*Cje‘±déîèÑýöŽŽ`0˜œ”D²µì= ´Ïå÷l±è–ž'$GF›clYÂ=~J<Ï…Ã2Ã0áp˜„ÃÛ¿Aà¾?Ä¿W´ÙI¹¤¦ijš&Ø{±`o¸_ƒÀ£îAÏQ?©°?Ä;öýÆ(Ñ çŸÑ¶úñƘã8AÂápOǰ=ÒOn åÌa<´äyhmk¿÷‡TUu:.—ËåtJ’ãõJ’D¢ºœ‡×í&Ò p:n—‹ˆ…Ýnw¹\n·{Í?`ŒNÇØçù˜˜»ÝÎqœÝf#Úd·Ûd—M’v{Ñö¾¸ØXÓ4Aˆ‰‘DѲ,çN§Çí–$Éår¹\®žÕfYÖëõº\."XN§Óëõìv{ÑŽíññq–e­^»Îa·;ÎO>û¼¤´4&&Æépx½–e-Œ†ñz<·Ëf“0Æ6›-&&&&f·Ù**+~ìñ¥ËW¨ªêv»N'9Œœcl·ÛÝû´˜í®Bn·+Æëåyàp8Ü.—Çå"²Ë²¬×ë‘$‰ã¸@ °qÓ–ø¸8†ažxúÙÎή¸¸8Ò±,ãõÏŽãìv»Ûí&y³v›mßÒ%˲DAˆ‰ñºöd“$¯Ç»cç®—_›g³Ùl6Û²+—­Xáõx{Œ×+ð<é']I»F` ‡B6›íÎ-3 ÓÖÞæv»yާÝå¨Ã0LkkëH÷šÖO›2ùλïeYvóÖm+V¯Ž‰ñ¾7÷ÃéÓ¦¾ôêkE;v´·w,\¼dêäI¯½ñÖæ­[[ZZ~ذ!##ýÎ{ï…tuw×ÖÖA32ÒS““Bõwÿçø¸x]×m6ÛO?{âŒãw—¼?÷£úßuï}ñññº®Û$Û’åËuÃÈÌÈ@>ÿÒˉ ó¿üzèÁß-ú~þW_y=ž—_y-%9yÑ÷‹MÓ6tˆ¦iº®ßyϽ†aäåæ~õÍ‚-Û¶E"‘M[¶dff~·è{Ó4ÓÒú´µ·o+Ún³IôÿèÓÏ$Q|ãíw"‘HM]Ýú›¦NžôÀ#†±³¸x˶mn—û©gŸÏHO—åHnN@UÕE‹—„e9';û“Ï>ûaÆ„¸ø]%¥_/øV×µ/¿Y0xÐÀÿ<ôË0¤Åbc¼|øñØ1£B¨£Ã·~ã&9"ùÍ7é}Òî{èáÄ„„¥+VƒÁ¬ÌÌ{î@°xñR˲š[[+wïö¸]ýûö]øýb^à;|+W¯ž4aü#?ér:—­Xáñx::|=þ¸À ©)ÉI‰‰š¦Ývç]<ÏoÚ²•”þþܦNž\RVÖÖÞþÆí¡g¿b·Û%Q”$iÁÂ……ó>ŸŸ˜PRVÖÜܼbõê­EE¢O?ÿüÄ™3^zõµ@ XQYÕÐÔ4bØ0íh,r !ìöw»]î¨ô“WÏ›7s‡-üÈ“OååæÌ~íu^àKËÊÊ+«òssn¿ëßN‡cÁÂEº¦%Ä'<ð裢…ß/¶Ûl[ŠŠÞŸû‘Ëélhllok÷¸=y¹9‚ DþDúÄØ$*ý”?$DúÄJ‹ Ä–ãýë•WžtâÌ>©)7ßt£Ýfkimaæôé>ô€Ýf{çý*«ªî¼ý¶‡¸¿­£cÓ–-} þ~à ·þí¦””䯽vò„ Šªìv{jJr àÏËÍ>thZŸÔõ7mÛ¾}Âø± ññÉII@ /7wİ¡úõ;ûŒÓO>éÄ¥ËW´´¶š¦Uµ{wIi™ÃnŸý£O>-:thÌÈ‘ ßþê‘ÌŒôß>öxm]®ëeå嚪ڬV‡Ã1tÈà??ñøE£GµŠ¢A0”»÷¨ÆÝwÞqÙ¬~êïûäû|Þ„„„+fÏúËCŠ ‡#áPXÓõ¶ööâ’ÒHDÒu]× MÓ‘H8AÈt9õõõuuuÁP(‘RR’Ÿxì÷IzìÉ?áÛ†aD"R8hº.Ë8‡íàáí­­MM ñq’$‡Â¡·D¦iµZ—¯\õá'ŸŒ9‚ã8]×UM †B²"â|¾Úººö¶¶C‡»œNd¢ÆÆ¦ªªjM×uC†B¡P!`±Xl6k¿¾}~õðC7\{M{{»a˜8é„ jj03w€(Hýã_ÏC¡YY†aج¶C‡‹@0(Š‚L_Ëkšn膮é’$á´N<Ç‹¢%­Wê?»õáîWåÞì¶ÂGÛâ M×u§÷…B†iC¡@0)ˆL¤†,Ëå•ÇõìÑ£ªº¦¾¾>¿°Èçñ@$IÒT5"IM%%%¸¿Vtʸ‡A\èN¯‡Bˆah¯×CAèñxh†E‹Ó逸q“(‹/^³~Cÿ¾ý.Ÿ=K„‚LóÊË.Ë4pýÆBA¦NžøÎû°,;vÌÓ4ËÊËßù`MQ—Œ˲ìˆáÃæ/|%ÎçíÓ§ÏÎÝ»ßÿð#š¢.;VÅ©“'ÿç7¬o¨ÏLOÏ4pÆ´©¯¿ù–Ãá¸ö꫆æ ~ᥗÿðèoãââAp»Ý Ã@Á2tHÎØ1c{òOº®'$ÄïÙ»ïó%_Ñ45þ’‹iŠÖ€†LÓa·¦ð¸ÜÏÓ4}÷·½ÿáG[¶n”•5uÒ¤­Û¶s,{l‹A·ÛͲ ÀÐõ´^½xž_¾r•Çí¶Ù¬—BhE–a§M™\PTøû'ÿ(ÂÝwÜîõxÜn×ó üê¡_Äù|ËâiædgO¼ôÒ%_}c³Z¯»æ*«Õêr:A4M^‡aèãsw¹9Ž˜•µoÿ~Žãâãão¸öš¼üËß>:cê”Ä„·Û…°ÛlVQèºît:, ESv»-%9éúk®^±jÍž½ûF‘™ž®ƹjñ7 #ÚKßéµÙ­R,ËzÜndš·›cY„€Ëé¤iª®®î©> ‡o¾áú!ƒ³kêêþüÔßA¸Þ}k×­gY6"I³¬Û°áåWÿó÷Ýk·ïp4‘ €¤w?qA;iÒæ¤„$U;Ö[Ó4­Vë“þkvö IÆ;MÓxž—$ ¿¤(JôÍ,ÃDd'`@ƒÁ $II‰‰ºaˆ¢øØONœ0aÚäI¡p8K’”””„ûz*ªŠL“çyŠ¢šššpW–ïZC%Ijoà -8Ig{{»ÝngY–eYU‘irGQ0"É,Ãt¹Ö6›BêÃÅ‹sóö>û§Ê+*!q3z—óEñ§†$Ë»ý;:ûãÍÞÖÖ®(²×ë톢(–e (ŠÑ~Ÿ²,s×a59Žknö#dÚíöSùâ „ C×Õ7Øm6Ap7¡ææf›ÝÎ}_i€Àóíííxíb{@žeU‰ñ‰±ð½ýh?T]×Y–ŧÑb).-}õ7œ7/.ÎÇsœªi‹% ‚€›tðGhšfgŽ ÃÜZZ[DQt»Ü§RÅ$m&Î+ߟ´ù PBA›Õšœ”è÷·Ð4-É2>„¢Éœ1UÓpÁ蕚Óét¹\8¹ÿ¾ýû›ÆŒ‘$!~ 'Í7 ƒ¡i@Ó¸¿¶ÏçE&2¾ópÂ=,ív»¦iøS ÃÄÇÇãX jž iš†žï|pâ€ûñ'Ÿµ¹yyW^~™ašqq> Âh‚èÎ „ŠªB-‚Í}Òw*ŠÍfu8ìÇÊáÆk‹Å‚OÇ©«)˲ËåÄ9Å@UµÄ„Üš·p||¼iæ÷Ý„H’,Š¢Ífà ö#îH§«C¿~@4‘'ÞÑ®jª¦ë¡PÿrHEQÁ`w²Çr•ã)hšÓÝQOèÜIZü‰ Öú!„²¢Ü~ë-^'gÞÝwEÛˆð;ÙZw^;|Kù‚HqAßáÇ ýº®çdgëº~fe­ðGTUí––™‘{¥üô8„ÀМÁcF”E’¤ÿ¥#ÿB_îO1ëº.BÖ€þ¸ò æ…Bà'IžAgÓÙà!ÄE»~H4Áס¸ºÖ¹Þ8'G"¸z×ù¶`Ý„eØH$ÂqÜ©GUÕhŠ:³æUUMÃÄc¤I&âÂõ#'mþQÂâùYt…DüóSB|B³¿9"EŽî3§r9~f¹èðäòx<Ár>´tÄ#ùú‰ îÌÃó¼$Kþ´.!€GgÇñçz½ â‡"¡Ÿ¸€AëëmV›ÇãùÉï¾¢£YB¼n¯À &"þÄ…Š„~âfš¦"+ýúô;k9Ž †‚áHXEC;g£Øâ"¡Ÿ¸°!€4]Óµï]õ#Ì !š¢‘Iº÷<ú‰ „™èìôµGá\q¡;ÃÐ;hþ >n"DÑú£¿ i"Š‚Çž<활ٲáñn¤Ÿø™C]Œæ¸ŸèLwQÐUuâØ>çzµ â9“Ú¼¸ë}ôñ å°'FÀØ€=žÇ‰p;ŸB:¤Lé0D“ã8œØ Ã(\Ðéï|Ðvx'žÇq¦ahºNÓ´ pŠª„ž× #vÄo— Ùaî8×[tDBç3A‡€c‰w$IŠÖÒŠM@Ú‘O <^aCÑ4…÷ÀwçêðUF6Ð4Ͳ,Î;ˆúhkùfˆ Üi„~!‹ ””–>ù—¿Åù|áHdʤ‰so¼!‰˜¦Éó|ôH£(¨(G³•q‡sÔP2,CQ4„°¬¼<9)‰çùhrš¦yŽÓtÝ4MŠ‚š¦CY–Õu¦)žçñ3µuu6«Íãq…ÃÜ«OQ\芦i†¦UeY $Ë®ƒ€àz„8‡Ný†n]]Õjõz<áH¤¼¼¢WjO†e?þäÓþýúÉÉÑ4¦iE‘MAqJ]×u]g§ÚÇ)X–mim5t#%%§næy![À„eY¼FÑ'Y–yëw‹JHˆŸ6eò7ß.{øÁûñ”iš’eåÔ¿î,öªß0 —Óùï×ßX½vmbB¢aþß¼þ}ûCaš¦X–Åß)ÎU½‚áyBÇçoŽãÚÛÛ[Z[{§¥É²íÂüªŸœ•‰ Üé\õ#DÓt0r8Ïüýo!Ý0ªªª\.—Uëê,¢¨`(¤(JÏ)†aêêë5MKíÑCV”öÖ ¢(’$?ûâükæ\9fÔHœ†ŒeYY–‹Šóy­V«ªªN§Ó4 ¿ßïv»UU-:xØçõx½Þ _é߯ßUW^a·ÙÂáp~AaZ¯T—ÓÙ †B!¿ßŸ––ÖP^!Ìè¦j„¦(„PAa‘ ÉI‰<Ï—WTH’Ô·OMÓæ/|¥_ß¾7ßp}Ñ¡C/½òêÃÜß·O&NÚÜÚÚê÷·„Âá>™øÊ± °ˆç9—ÓéñxZZZjjk““’>u-úèãö@ðÿî½Ûjµò<_QYÉó|RB‚¢ª ¦¦æÚººø¸¸ää$EQ,Ëîܼ•«WÏ»çnŠ¢ ݨolÀg¦²²rI–úffšˆä ø~ÑZø1¤¨ÆÆÆÓ¦Ý{×mmí’$UU×$$Ä«ªZS[ëq»ƒÁP -–¸¸8œ“¹ôz<­mm²¢ „vìܵvÆ_?üÇãáXöxú6d’tÍÄÿ€Ó(ЈbÆï÷/[±2‘vîÚÝ#%eÕÚu«×®óù¼ýÇ?§M™òÚ›o­XµzûŽù……/½ôÓ/¾üøÓOwíÞ][WŸ””ø«GWz¤|ÿþý%GÊÊ+*ââ|é½{„š[Zž~ö¹ÊʪƦFžçŸ[ðÒ¬Ó—¾òÚëCg?ýÜ ••MÍM4M¶dIuuEz¤$Ï_øJUMͦ-[Gùù—_½õö;uuuúYKkëgK¾t¹\ýúfªª†znþ‚GŽÉ4hWnÞg_,9t¸ØßÒÂsÜ¢W×ÖZ,–ÒÒ#[¶m««¯Ë0`í† ‚ ¼úÆ›ù……·l)¯¨œpé%/,xyûÎ[¶nßwà@rRÒ³/.hllò·¶ 8¢¨f¿ÿÝUTVD"‘ƽöæ׬[·aÓfM×fe)ŠÂqÜ¢È/XºbEœÏ×+µ'„ðë¥Kó UUÛ¹{÷ Yž5cú†M›¾øòëÃ%%5µµCgëç.þùBØÞÞît8që\´6ïö;ÔÕÖ:œ–Öëû[œÏ·bÕêýò333}üñªêšÏ–|évºþùìó{÷ï[±juZZÚÆÍ›ÿýúÕ55 ÊË+šýþYD‹%Z’h$.tgT B„EQVQ´ÙlªªÝ}Ç튪<òèï˜7¯GJJ³ß?iÂø—^|¾®¾añ矯ߴñáûïÿÇ_ÿ²;7/wÏž8Ÿï‘_<ðäKKMýÍ/ž2q¢$I4èŠR[W׳GÊÔI“†Æ2ìþöîÛ?pÀžç«kªS{ô˜2iÒ˜‘#‡vó ×ÿì–¹ËV®:t¸x@¿~Û¶ïܾs˲£Güó“OH²üÀ¼û¦Nš¸}çNžã@¦iÖÖÖ‰¢xÕ•WXEñÃÅ‹qUñ7ß~·Ofæ˜Ñ£æÞxãÍ7Ü0eÒÄþýúþùÉ'ôëç÷ûUU¥)êž;ïxä¿())ݲu[Eeåügÿuõœ+Á`¨±©iÐÀ¬©“&áv¤Ô=&O?qüøGý«ÝyyE…ÿøËŸ~ðþÏ–|ÙÐØˆ3Ì\>kÖÅc/lÙ¾aY„Ф ã333~õЃ‚ ȲÌÐŒ,ËŸ~¾Äb±xÜîE‹? †Bç0þJtEñ<ït:ñ¯´G~ñàÓϽPRzäÁÿ›hšþåƒÜw÷]_ûíâO?§(øü3ÿ¼|Ö¬÷}ŽD† Íùû_þ|Íœ9ƒfýéñ?Øm6MÓ¢…º Ó@‘¶~âBwz¡ ëz””»î¸ýþy÷õÉÌ@¦)ð‚,Ë¢hÐ4ív¹A,‚‘(9ŽeY–¢)Ã0x^ÀAPVd]×M„ð}Ѥ¤¤Ÿý—¢ª¿{â¡PhêäIŸ~±ä@aÁØ1£½^Ïügÿ¥¨êïŸück[›¡ë¸4Š¢(v›Ín·?üàýÇ‘$‰eYUU]§¢ª Ãp,‹0bæŸûKÿ¾}ÿðÇ?ñgÅYY¿ûõ#8K;nðÕuC–dÃ0L„hš0 @ÀEQVUU@Ëɲ>™&N"£ë:2MYQ(H!LÓÀ âm6ëÀ¬¬ßýê\rä\ï$绎Q!Ã4ÇsËÍ7]wõÕ„ ئa"B\Ôb·Ùœ‡ašš®Q…Lp¯^0 CQI’dYŽ-ü-Óx®×˜ ~¨Ó.ÐÈrlAAáC¿úM8ž9}š¿¥ôÔŸžüÛ?ŸymáK Ã|üÙg›¶lahzîM7R4ýÌ /² ›“=4'gåª5†aØl¶AYYϾ0Þ=w1!t¸¸øË¯¿aYW³ºôâq¯½õVßÌÌœììÝyy_}»”cY»Í1|Ø}$¬Ó ‹Šòöìþ¢Ñ££7úU…¦¡ˆ¡éÖ¶¶÷}ÈsœÅ"º\ÎËfÍ\¶b%˲q>„pÄða/þ”¡©éS§úâ|Oþù¯¿ÿí¯iš6 S7tÜ/Œ5jŪÕ÷?ôKMÓívÛ–íÛ7lÚl†Õjƒ…ïc’óüü—^XðÒí·ÌÝ•—ûÛÇþ (ê—ÍNJHÀ÷œUU««ohmms9]džAÃÀ‹­Äù¼MMÿ}÷½+.›½fÝ:†fpY1h¾Wl8Æ—æ‚>þ8oï^]×o¼îÚ·ßûà‘_<¸mûÎ _¹fΜʪªg_œ_V^1}ê”K/÷ô³Ï?òèïÛíóî¾këöš¢I’”™‘‰HO=ýÌ=wÞá°Û£Ê¢ó"-þÄíô 4ânuõõ²¢˜†áõxN§Ãáp”9’’’üô³ÏÇy}£GìÛ§ ðEUTVjš†óï·µµy<š¦5M«¨¬ôù|.§w´(.- Cƒ´ZE›ÕúÛÇ>|è×]×ÔÔTZV†_r8ì†aTTV ‚Ð#%¥­­íà¡Ã¢(ff¤Ë²‚²ÛmÍÍ~¯×‰DtÃp»\ø@-«¨¨¯oè×·OB|<àHyE}CCääää$@Ee¥E’““@m]]Ï=pçI–B¨­½=>.Ža˜šÚÚµë7k¦ªi±ã˜bß|²Ç ¦<‹,Ëú÷œ=(Z ±Cå–Ø)îžüމÇü ÀI>Ûy"8@Ìœ>mÎå—iš†ÃD—•[¾c;/Fçy°j$¶œ„2ÑѶø.ÛßÑÑ¿@MÓìvûìÓƒ¡ÐÑr¾±AÄ<ÆùúM“ôë'þüȃ¡Ð/Ðhš¦$Iç[U¬P(@ˆ"Ï'¸¹FÓ5–aO1"#„Áàw™E™†‰o¿“kâÂu>hü§óã®Úy·Lq¾¸†††³6;„Ãá°ZI«=qa#I›‰ BÈ*ZÓÒÒ Ý8;—àB†fHÜ'.t' ý¤A“¸ †AQ˲ggv¸¹ÿ4?sö· A|®C?nB%-Äù¯Ë”Ýgaާñ~ŠÜ Î;]‡~USeEÖŽõD$âÌàdŸ†aðOœWNÒàƒ:–¿ â ãˆ8?uú9޳†fÈ¥ Aü&2yާišÜ<#Î+]‡þhŠZÒàC?ÄÑÛÂ$ì癓ÞÈ%×ûñã Gqþ!ýú‰ Il»ùþ“ô'8AœWHè'.$,Ëâlù8±Ò©¤M>¸º2EQ8úãä}¤Á“øv&¡ß0M2Ó4; ˆN]N­óû;¼ÔùãxLM—âNƧ’]ý'xöu¹¡B&BÔÉW ÷0ùI‡h|Ç7ø#±¾º¦:š†É²¬×ëó¸=º Ç®¯i¢SÉ~Šói‡B¡†ÆYQ( ŠKbBÇñ†ÑñÔ»²ggÅ â§pÚ¡Ÿ¢(›ÍFQÐ0ÌH$Òáʈ¢(\f6ú NwyŠ¢¨ªŠi¢._RÔŒMølµŠ ÃF"|àÅ& íBÈb±†ñÝ#N¶¨§xÚø^?d:B¼5b%pNyÑb‘eYéj#à7Ð4­(ʵ‰¢¨ªªašß;é3>á”ׇ‹¹\î>™}Y† …CååeÁ@ Wjš¦kÑ}ƒã8†a"‘@Ž—OøŽEbY¶¡±¡®®6½wzrbB¨¬²úàÁ¢ŒŒL«Õj˜Ç»äSeµŠáp@AhEå$».Aœçè;ï¼3111š›ža˜–ÖŽåì6»aŽŠ¢"‘ÈŽ]» ‹Ö××ÇÅÅq,‹ãŸÌ’,—”q»]\Ҕ㸚ÚÚææf§Ó‰Ç܃c¥0ðÄ>,Šbt >~ ?>xè°Ó騫¯.§š¦÷Èß³oŸÝfomkk\Nç±e¦iÇ~ „X†))-UgÝÂÉAñ2G—Ç4M–ekëêZZZÜð;-‚€Ð4¦©è8þçÃ0££ÓÄ…vñK¡ètŽ>l:±_ñƒØ×ZQ”â’R§Ó!4L`¦Ùïß´e MÓ»=Z¥ :kš¦[Z[kkë\N'ÏóMï8÷صˆžð·ÐaI¢Ë‰—? (ªèà!Žeq‘“Ø*†x;Äf> iZàùhiS„¯Ê‹ÆÅÅ è?€¡š¦m6[rRré‘ ÃáÀ¥Zð7XQQ‘”HÑTyEeSs³×ëÁuÕý8aÝiš‡ÃGŽ”Ž1Òéòì*jl iY™½xž?\|0>>!6î‡Ãá½ûàº]†aþÄ9GÓtCCÃi¦iò<_YUõç§žÊݳçÃÅŸ,xù\Ëãv»\Nžçëëë¼òŠ®ë¢(ú<§Óét:—-_ñͲåÇjµâ#Äåry¯×a·ÇÁ¢(Æù¼v»ã8\Ó‘‚ÐétF_²Ùl±ÓÑuÝ*Šq^/>Y,Ûív»í6›Ûår»\Ñ”ÂøTçóù Ø¿ð•P8l±X|ÃnÃ¥Ä^XðRÑÁC¡PÈãñx½Q´Àc³fYÖívçæíyóíw<Ïšu뫪ªããâLÓŒÝ>ѵp8ì>¯—çy„Óét»Ý‡çŽF+„Íju»Ýn·›¦(—ËåñxX†¼øÒËmíí^¯—e|õz® ├^ƒÀ0Í!ƒÿõOúýþÛî¾§µµ•çù7ß~Çjµ^wõU ÃZ‹ »vç®ß¸Ñn·ßvË\—Ûµyéò§Ÿ}.kÀ€IƇ¡wÞ{? ^yÙl—Ë%ŠŠ¢BÓ4ß]ôaeeåœÁkµŠBžç8¦øý-_ˆç8ŸÇ›’œRßЈ FÈÏ_¹zMzïÞÓ§N1MsÕšµû F :fô(Y–M„¬VëÒå+Ž”•»è¢Ç~½tÙüüÔÔÔ+fÏ¢ üpñâ²òŠk¯šcEÃ0"’ôáÇ‹§N™œ¨¸ø•×^ONL¼zΜIÆÈ/ضcGÏ=&M#Ã0¹y{6oÛÖ¿OŸÌÌŒâ’ÒéS'·¶µ¯^·~âøKóöìÝ´eK¿¾}ûõíóÊk¯'%&^3gΤ —nݶcÛŽ#G Ÿp饻só ùý-ƒfU×Ô*ŠrÝÕW‹¢ŸV›››ßyÿƒúúÓ4mVkqIÉ·ËWôNëuÕW,úèãü‚¬^Xøêü~ÿÄñã32ÒW¯]7mò¤Ò#G‚¡(Z\.ç‘#eÿ~íõ䤤뮾jìEcV®^s  pİ¡¥j¾þúÛeÕ55—ŒÛ'3ãËo¾ikmkljš=sfzï4UU9ŽÛ°ys]}=@`ÚÔ)Ÿ-ù²-Ð~ÅìÙ)II4M¿ýÞû=RRfL›šÑ»wyEåÚ D‹eÚ”Én—kÿ±-6mò¤÷?ühó¶íÍÍͳfLw:§˜¦éP(Èó„ ¶ñ]Qd»Í¦Èr´Ú¥$ËY̽ñ†ÿ¼ùVbBÂðaCg͘‘›—×å¾qÑèQ¸•¬=è—™¶¯¸.¯<<}\Ÿ@X[žW6û¢4—Ëá÷·¥õ¢£Ý0Œ1£G­Z³fø!™™‹…fhá×K—ÕÔÖ^2nl¿>}ä“4lÄyåôZ]5žy~þüçæ/<(Ûãñ<óü‹‚ T×Ô¼þÖ× !¤éÚ Y•UUo¼ý„”Ýn>tè}¼wßþ?þ¤²ªšçùçæ/À¿”qk)À0L‹ dôÞ¢vçåñg˜B7qà–\§Ãç+¯¬\¾rÃ0¦¦¦_^Ø;-mͺõkÖ­Û—÷Ò«¯fõïKð{MÓ’“332^ú÷«•UÇ ÉÉY·~ÃÊ5k?ùbÉÞ}ûû÷í‹3Öµ¶µ½ðÒËí ËéÔuçy§Ãép:}^oAQÑ‹//ôy=k×­ÿà£yžgY¶¬¬ü/ÿGJr²E´@ß[ôa[[ûüüu7646þéoO¥¤¤X,EQ.§ËépÄù|{÷xçý² øï»ï},Ëü…¯ÔÖÕ=ýü ¡Ò#G^}ãÍ¢C‡^|y¡×ëY³nÝ/ŽOHÀ¿lΠ¹ßÐ |·ÏQ7ô£bªòÒ4ÝÚÚzÍUsLÃÜàÀý÷Ý[^^>á¿»Ü7Ì£4Ý ¡!r°5¤‡$Í.d†qB"h\¾±Gròm·Ì}éÕWñ -çß~ïý›7{Üîç^\p¸´4ú;‰ Îg§yB€²ÛmtèîÜ\«Õ†—@ÓôˆáîžseZ¯Ô­Û¶''%•9BÓô¡C‡÷ìÛ÷À¼y7\wí€þýYŽ]º|Em]Ýo~ù¾ß›Þ»wzZ¯É&Œ5rÕê5C‡ä̽é¦{îºcÓ–-’$™¦™˜˜0}ê”ý¨ªšÕ¿ÿÀý7nÙ²wÿÉ&ôJM6eòþ4Më×·OZ¯ÔI'Ž9bÇ®]`°¼¢B’äf¿ßjµ^4zô5s®Äï¿dÜØææfükæHYy[[ÛÃ>0i„8Ÿ/¿ °¡¡±º¦& 557Ìåe³Ó{§ÉŠÜÐØ¨ªjK[kœ/Že‡Ýîp8𽂞=zôNë5eÒ¤áÆõíÛgÄðaG·B C·»sóî»ûΟÍÛ¯_ßuë7¤÷N»|ÖÌ«ç\©º,+MÙí¶k®¼rú”)…Eí@mmm0 G"v»í’qã~~ï=¤Þ]ô¡Ïãùù}÷þêá‡*«ªÞÿð£Ñ#GÜrÓMwÝqû®ÜÜþ}ûdf¤ßxýu¶S.u‚oðº\î@0 j*ðš¦išªkºÅ"Ö7Ö‹¢È0Llåt†a†Éš3Än·ïÏÏohøÎ}™·»´¼rPFÒ¤,ëáC¥µ••×\”àvˆ5µuqÞ¸Øþ£4E‚Á™Ó§§öìùêo:޶ööݹy÷Ý}×­soîׯïú- ¹ñKœÿN/ôCH)ª*Šâýóî»ñÚk_|y¡hµz=žÌŒô»ï¸ýÎÛ~fšf³¿¹´¬ìÙæ‹V1';;‰è†Q^QY[W·yëÖ!ƒ{½Þ䤤®½ö‘_< Z,íÀáâUU-‚_Pøú[oM©(Z Ã…C‡‹K4M+=r¤Ùï§iÚ4ŒP0 ÚÚÛ$I†:|˜¦i—Ë9dðà‡¼öŒ¡pøgsoöz½O=ý 2Ma$)-+?\\\QQéq»Ÿzú™ìA“““ =.××ß~[\\ÜÒÒgNŸæv¹æ/|…a€®i†iîÚÛÐÐ0(+ë@~~Aaáò•«2ÒÓ-‚€’eÖŒécÇŒùÇ¿ž­®©¹lÖÌ?ý¬´ôȨ‘#ZZ[gÏœ_ª­­£iz×®Ý=R’ívÛ%ãÆ>ú«GF ÖÒÒ ƒ¡P8Æp¸Ñu=>.^×õeËW—”466%&$Øíö¡99ßÿå³f67ûÁ n_»tÕšµS§L6 ƒc¹†ÆÆÒ²²â’ÒP(Ä0LUuucc@`×îÜŠŠ š¢çÞxÞ>&B¸)))qÙŠ•òó‹KJf ðû[‚¡P0TdåØWÑHk[›‰Ì8ŸïØ7ø  Íþ–Ò#G6lÚÔÞÞ~éÅãjëë6mÙòÍ·Ël6Û¥ãÆåíÝWPP¸båªÞ½z <_QYµkw®r:­"†a8N‡Ã¹}Ç6‘Ãáp:Ý6»½¾±®   £wæ WÙ"‘H$$ÄÇ;ðëbß@EišÖ;-½®®öPÉᛦfÿõ¶œ¿Ý1ìÒ¡é;vï$&&ï¡a’,G"‘æÝ·ÿ]¹¹·'))q銕ùùÅ%%d©$ß-q!8½>¸;Dk[ëÀ² ÌËÛ›œ”4rø°å+VíÏ/°ŠâœÁûóó«««/7nû®]Á`hÐÀ¬¤¤ÄòŠŠM[¶¤öìyËM7¦õêµmûŽ]¹»5]>lhcSÓ¶;/5Šå8«(65ûóöîµYmãÆ^DÓô–mÛ&\rñÆ-[â|¾Œôt„P]]½Ïçóz½š¦9⛥Ë4 ¿¯—.;\\Ü;­W[{ûo½ ‡®¸lvß>}t]§¦®®®¬¼|Óæ­—^<îòËfµ·vîÞ !6dÈô)“W­]»iË–ä¤d–eÝn×M×_÷í²åé½{{=Ã0â7nÙbÆe³fJ²üí²åVÑzçm·2 CÓt}cã[o¿SV^>eÒ¤¡99I‰‰ß.]–šÚóª+®(=räíwß++/ŸcFÞ°i“®ëÓ§NY½v­ ‚7Þ~':¾}(ŠÊê? oïÞ-Û¶OÄù÷ð›6mÊÉÉÁ]ãB<Ï—[EkRB’ªuì*ŽMs'IÀjµF"Že!EišFQ”®ëdžÁ0´,+<Ïãž‚,Ë*Š"ð|8ÁSPd™f|ÿËÄ·LišVUÕjµªŠ)*¶»!¾1 ð¼y¬oîŨë:Ïs†aš¦ "„ir<dq¿~€¡ë ËʲÌqœ,ËVQÔuëT@HS€P×u‹Å‰Dp'Že9žWUUÓ4< BI–q\À£@5UµX,’,s,ûØÿtõœ+G¡ª*MÓšªZDQ’$†aøcӱТ¢ªuÝÀ?/TU-I’–¥( ÷FG ‚0M“cÙp$‚(˜¦ ·F"’Ä2 À4 ‹(ʒIJ¬¬(‹Å4MMÓX–Õu‚¯@Èì´}†Á $ɲÅbQÈó<þ®ñ6Ôu]UUžçX†Uƒ¢(꺄‰DDQÄ_YtMѱ-fš¦(ŠÈ4å(œ Ï ÍÍMUÕ•šªÙŽô´t–c;ÕÀ»q´Gÿñ-ÖÕ¾b†òVUU5û›(ŠNJLJLLTUõd;?Bˆç8žçƒ¡î±Ýt!Žãò óS{¦ZERÑ—8Çð¹oß¾Ó ý ãhÉ££m@¸û3ž~EQøxÀOâ¿G߬7^ôý±µ–p§ÀγÆÏ˜ÁcKÛù½ËExîØN;¯tùñØÏÆöpºÑNÜÑeÖuÝn·ïÚûö{ï=÷ô?cgz|CÅL§óˆ}Ûñ%Yߨeîð‘Øí}' újçÕ켎øqtû€NƒWñÂwøc7ct¾ÑMÔå¿g66|!„†a*ŠÜå÷Þy/ýî}#ö`¤iZ—£ÿb'‹ûwÑ4ÝaÓuy¤‘ÐOœ'¢¡ÿäI›‘y²ë²Øhuô8‚£ï9zÈ  S }ì¼LÔñXŧ–có:¾Ñ—:¿?vvàĬÑAI'CáR-$øç•.B?„°¬¢¬­½Íˆé1Mœº“µBÝEQmmm½zô:× BÇú!„š¦%'&;ì€H‰ ‚ø „|Çq¤¡Ÿ8t¼êlj }^ß¹^0‚øß"¿¡‰óJ >!MÓÎõ‚ÄÿH*žç—®oó’¦j‚ ˆÿa¤ÆAD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·CB?AD·Ã躊„4Uƒžë…!‚ ~B!UWu]g†±‰6•QIè'‚øß†â8ŽaÒàCÑíÐOÑíÐOÑíÐOÑíÐOÑíÐOÑíÐOÑíÐOÑíÐOÑí0çz‚ ÎS¡³6/œOá§ž#BHè'‚è„¡p¶Ü†`˜Ÿ6&#„Š$ôAt!Ôu½º±ZUðÓ‡š¦õ õøðAÅÇÅSEB?ADGÂÚúZÑbé™’bšæOü (*U×Vâãì6ûO4G a M­m­$ôAtdš¦®i=23ϼBÉö¤šÚ:PJR²¬(?Qe„Ã0¦iä’ÐOÑMÓ< óA¦ !¦išæOúMÓDH:wAtå¬09›3„$ôAt¥S(Ž^ŒC¿ã¼óKèzmâ«þÓ¡(Š¢(!î‘yºš/„¤‡AÄIœˆMÓDÑ4 ŽuĤ( Öh¬Çÿ†q4^ »ÑOÅvÞït†€ž¦ ÃÐ4 !Äq<Ãиõ !HçщâYPEÓ´®ëÏF䪟 ¢ Ñh‰âX®¦®¶ ¨¡†aJËËJŽ”òOÓ4ÇrÑ(ϲ,Çq{÷ï ÇáRˆ Í„#‘`((ð<Óøù®fwüÂqÜ¡âÛ·oÝ_p`Ç®mímøtÂsEQ†ap@Ç(yŽ£) !DQÃ0<ÏkºÖÒÚÂó|§u#¡Ÿ ¢k0ö!2ÍhŸKÓ4BŠª´µµÕ5Ô)ªJÓ4„°©¹¹¬¼,"I¢ÚÚÚÊ*Êý-~СâCEEM~?„PÓõŠªÊÖ¶VÁ¿ƒnè½{¥M¼t¢Ïç+.-á8.‰”UV„#aŠ¢ZÛÚðψö@@×uI–Ë**Âá0Ã0)ÒÚÖÚØÔXV^±/ÿ+A´µ ¶~‚ ˆ“9±•BmÃA€eÙŠªÊ}ùûkëëvåîVUµ²ºªèðÁp$¢ª*MQ M¡P¨èÐÁŠÊ EQBáPcS“a òÁàᒒƦ&š¦¿ã„T[{{]}m(r:œ¡P(¿¨ çJ²\r¤´º¶B¸/¿¿Å_x°( ç(ŠR]]»wOm]][{«ªªuõõ†a?‘!"¡Ÿ ¢K'´#„(iЦ EQ@À4LŸÏwѨ±n·»¸´¤¾¡!;k`Nö`»ÍfFJR²Õj5M$+JRbrrBRNvNKk‹¿Åϱl8®k¨Ã÷¢³ëÐ ˆD"{ìW5mЀ•U•áp˜eÙ–Ö–ÖÖ–Þ©½šš›ëê6»¬(mím˶´¶6·ø†IŒO9|TZjšÛå1tÇq±çH®ú ‚ º‡B<Ç·ÚѰ¬Èþ¿  R C×Y–…àK~Ã4TMËÝ»‡¦i›Õjš¦iè²"kª !dÆnµeg ÌHK×4íx¯¡N `˜f¯ÔÔK.§ªJ[ åX–å\N爡ÃÜnÛí6M³°¨(%9…¢(Žã\Nçð!CââUMƒš¦n˜†ª*I:á·€Üæ%‚èÚ±` !Ô4-!>!Þ¿{OÞŽÜ]‹¥GJŠa5µ5[¶oQT5£wzZj¯’ÒÒ¼½{t]çXV´Xš››eE¦i:>>> îË?àóúâã*««jêjeE¦ u<(Ø;ˆÖTÍjµöJíUPT”dµZË+*êtMã9Îãv#€¼Ob|‚U<ö’®34MÓ´a—›¢è=û÷ïäƒ@7mÚ”““£ªêO4~Œ âBTY]Ù'##ú/îe¯( î~ñl~a¡¢)ié‚ àî7ŠªjšÆsΗ ‡,‚…¦iš¢5]3M“ã8a8F<ïô"„xžßŸŸ<([9–ÈëŽwTMcŠ„hšæ9>¶g'îbŽ„iŠÆýy„BÓ45]çX¿™¡™@(¸qÓ&Ò¯Ÿ ¢ .†Bº®³, p4]£iÆãvã„Dz<ÇáÇB—Ãe"!d"÷æÄ/Y­V<‘³Cè„YÒGr™±,‹SíÛmöØÏƈ})Ú»B(p¼‰¢ó:zÙOB?AD—:6„¥¡®ë)É)EQc‡tŶªæñô˱Ïw‘èè ¯£Ž>ÓÅ(úñïH+t²—bâþñ)’ÐOÑ‘ðäÜ Ãp»\àØÈÞ4¯ã6 v ðO´R ýAQR%I’Ýn7M³Ë¡8’²?¬®B(+ R@VÜóG¿õzôd@$"qGB?ADâ¼qõ MM?õŒpE°8_<€ ¼¢‚a˜ŸêÂBC×­V›Çí!¡Ÿ ¢#„ )É=ÎNÊþhR«hýI爲X,µ5µ$ôAtáhW™³Òë=6Üÿ¤sD†"¡Ÿ â¤~º›®çvŽd4/AD·CB?AD·sÒŸh;×OW 8ZGæÇ²‰PtXDç‰GÚÊzEËßAü/9iè·Ùl4M©ª¦(Êw|GÒÓ ß8gÏó¦aH²l+Bß9Κ¦yº·Ë0BdšRÖ!„†±‚¢ªªª}wTÇ);ÎÎý}‚ ˆ³©‹ÐKoÞ²µ¥µµOfFjÏž&BÑL@ѼBø Ãp …p_Tü|lùJ|»Ÿ¢é&xŽ++//(,Š‹ó è×çyQeYÆÓNœ¢(«Õ …p L|n0 ×7ˆÎ ? ( !@ÓTIiiSs³iš<Ç÷ï×7Z /m{ °}ç®´ÔÔøø8MÓpÕcÓDE'‚L„hŠRUUÓ4Qc—Ä Þ‹®AÄ……¾óÎ;cëó<ÿïÿ¼¾mÇÎH$Rxðàè‘#‡a†aX­VÉ]N§`±0 Sßаswî°¡CdY¦(Êår <¯¨*EQ»]EŽe9޳Ùm8ùBHÅÝyy ^ù7ð;víêÙ£GfFú7K—¦öìét:MÓt¹\A€ªªºjÍÚœÁÙžã!E™¦i·Ûu]gÆåt ‚ (ŠUyžWB`±X~÷Ä“{öîó·´T×ÖÉçó ‚`!„Ð?Ÿ}®©©)ÎçíÕ«—ÃngXVQ‹E°ŠV«ÕªišÅbqØlV«¸gï¾[¶^4f´ED«•aœßÔépˆV+ÏóxuÎõ7Hqhšnhhè\†±mÇÎy÷Ü=sú´P(¤(Êò•+ggÇÇÅíØ¹ËëõÄùâ–|õ¡,Ë3gL_üégë6nòûýÓ¦LF}¸ø«(Ξ9#‰¬]¿¡¾¾Þãq»Ýîýò§Lš˜™ž.ɲ {öí·Ûl=úEQt]ß¼uëKÿ~uϾý×^5GÅÿ¾ûàÊËfïØµ{á«ÿ©ª®¾lÖÌšÚÚ8_\rRâªÕkFŽÞ¬Y·Þ*Š—ÏžµeûvMÓ.½øâp8ŒLÓn³Ý:÷æ±cÆ(ŠÒÔÔüõÒ¥þ–VY–¯¿æš•«WïÝwà†ë®ÉHÏ(+/ß¼u[Ï”” ã/É/,ªªªj¦Mžœ·wïîܼQ#Fx<îŒÞ½ ‹KJkjkûff^tHfFÆ·ßÖÚÖv ¿ =ðû[**«Ld¦÷î=÷¦›†:8{àm·ÌÕ = 3 £jZ””—^xþÿî»wýÆÍϽ¸àâ±õè‘ò³¹s‡ääxÜ€,ËÍÍþAYz¥¦þüÞ{R{öÁj³q,ëv»D‹eÂøKjjjXŽCÝvë-óî¹»­½7ë3,{ãõ×>þè£7\{¦é}23n{óe³f665e”œœtûÏnÉ/,ì߯ï}wßußÝw­Y·Nש“'Ý|ã ¹{ö\{ÕUwÝqû¥—\LQÐj9–ñÅ7^]fFúáÃÅ»ssøù¼¯¿®oŸ>$èq꺇Ïç_~ï‹’3xñgŸÕÕÕOž4qÑâÅ/¾üòM×_¯(jÎàìA³}ü €@ö AÕ55EE^p9}22fOŸn³Ù$I ‡#‘p8"E")hª0M“çù}ûÔÔÖŽ9"=­WCc£nèRDÚ¹kWbBü›o¿£ú¤ ãó 5MkkkÛ¾cç˜Q£t]¯¬¬¬ËHoll’eÚäÉYüîñ'ÜN—×ëio :D’e ,ˆaP4t]Q•P8 Bá°a˜’$ƒ¡¶¶¶^©©_~óMYYù†M›S{ö„¶€8ŸoóÖ­³ðgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìuxÅúÇgfýø‰KÓ¸4©»…ÅÝÝ/ü.÷r‘‹»»»»(…Rw—T"MÒ${Ž­ïÎïi©å-d>Ož<ç¬ÌÌÎÙýÎìÌû¾+++›››’$Ù–  P(Êßa( ±±±lkkk\\\^^„Tõ) åïŒmÛåååÁ`!??ß¶m˲u©( …òÂ0LnnîêÕ«YÛ¶–e!„u©( …òbš&Çq‚ °c²)úB¡P(clÛÞ%ýT÷) åoOTêÙèw:ÍKùèÙÉ€îÕçˆn!wcÏÏÿcF{ìxïϧö¿ŒB9„ü$ýtÀ‡ò§A4—aƘt8ˆ€B0¶m#„È.ÙK¦£–èÜ•mÛ¶mï%Ó!lÛD¼í_qçGKBÊÆ ~kÁ(”?rs’;ŸÜóê`ŒÙè ‡ºØ”¿3¤;bXV–cç–e醉Ю½ËÊŠÂqƒÀ4MÓ²xŽÛ·ÓýSïB€1B¨ç½Ž1–€ žeYÃ0ÈÐ&9@QTŽcmÛ¶1&éïû–ÍB¨ë†e[’(’ÆIÓ ÛÏۃݭIDÛ‰»ÀϾ7쵋B9XÈóŲ,BHÓ4€ ¶m›¦¹×»uôVgñnèmGùã ºl˜æ»ŸÏœ½p‰¦iûå?xË –­|ü•7$I GäÂÜì‡þûï«þ{÷®¼dHÿ~ÀkÖÏœ3ï±ÛoÛ1Œ®ëç5]g!Äkº. ‚±a Bª®ÿûÞ‡[Û;ÙYWœ{fzŸ!˲¦a„eù¶GŸ¾ê¼3·–WTÖì¼ãú(Š"I"Æ»ä^×4 € –eišæt:ßýâëÏ¿ûá¡›ÿ=d@QSKë÷?Z“uó5—q Ë0ŒmYºap!@ˆ1 ô,Žã¢»<Ï!ˆ0À¦iY–%ÆXÓ4†aŒ5]'m…rPضͲìΆÆ@(4¸°€`]ñÖŸ7=5Å0ÍžÚ¾·ô:àCù#±lÛép,^¹ú“ogßwãõ}’w쬄"‘¿ï…ûïÒt!h膢ª–eAu]ÏJO;õØé¦i6µ¶ŒeUMKIÆ×ÔÕ§¥$wu4]7M‹ãؾ}R«jjB©‰ 6Æ€Ž®î®¼dHQá-=þÑ׳î¸þµõ `0;½/Ë0ŠªÊª6rÈ Œ´>¶mJ¶W2±,kÛvZJ2„°¢ºÆãrùpÓõI¼ã±gnºúÒ¸@VԱÇȪúò{•TV1~ŒeY B3çÌ«kjîìê¾ðô“­\SSßÀq,ƒ˜nºþ›¹ j;ºº/=ë4UU_ÿèóøØ˜º¦æ_~QCsëâUk‚'uD~væÓo¼›™Ö§ORb¿Ü잣[ʯB(+Êè!ƒÂ²üÒ{.>ãÔqÇʲ²¯1ŽõSþ ª¦e¤õyöÞÛ®X½påê™sæ=xó¿9–ðgòË2äFä9Že9@tÛö9'ãø…WöË÷{½<Ï9˶§OžPßÜ|óƒ_é…SÆŽ…ÃË’9EU ÓºæÂsöËÿ×Ýž6cúŒiSþïÎûgÍ[äv:$AX½qsYUõ³÷Üîóº!„×ßýàºâ­n—391~Ø€þPÈëá ÃHŽ7bص·ß{Ë5W@×oÁ>tÛöÊ+V­\¿ B0aäð³O:ï(­¨š2vÔšM[–®Y÷â¥ÁPøÜSN8vê¤î}¸¦®aÞ²Cµ´u|úí÷·üãŠø˜˜[¯»*51!"Ëtê˜òÛ°mŒrH¢iYIB¶÷rÕÝÏXÿ¡.9åï ÆXøŠêšmÛ+ÇÂsì£/½ÞÞÙ‰1v9g0CÓu¡®€Ú†F§ÃÁ ¨¨ض±1‚çXŽe9†í *kv¶´µclcÛ †ÂN‡ÔÖÙ©kú(ªzÑé'æåZ¦)«ª$‰M­mÍ-²¢ø‚Œ:DVU´ÏXÿ. b²v¨ Où;ƒ1†vtu:ëû·?ýJ… O?9/;«¦®! ]qËYî—“uÏ¿¯óz<ï|>BèÄiãÆx\nŒmI!„PFZêØáCŸzým—Ó‘™–öâ¥ÕµÏÜ}Ûc¯¼Ñ')ñè)tÝ»Ž`(¬©ª¬ª.‡ãÒ3O{ë³/WnØ4¨°àÔc§×7µ|3waB\¬ÈóúåOŸ4á¹·ßgYöÌ㎞2vÔ§³¾omï9x ªi¤ü‚À›– 1¨?ϱ,Ãrçq»²3úVV×*ššéOS5•aÛ²Y†‰‰ñe§÷­¬©UT-'£ïôIãŸûƒ-eí]é©)'OŸöý¢¥]ÝÃdeŠ¢´1} )¿Ó4ãcb¯¹àÜQCByŽ‹ñù,ËÚk÷'Ëé¥K—>Ü0 jáCùCÁ³  ɲ$’ hºnÛƒŸlZˆ•ý·â.ëÍ]ÇØ#„xŽS5eÛ¶uÃxžç8Í0t]ç9ŽœG^¢Y[7M7œQ× bn! Q”cÀ èr8î~êyÛýï+. CÄÌ”<=Û¶á®-˜gYãÎ@Ðåt0»ß«É%A§Î@Ðåp° c†Ã!Õ64Þýäs7\qñ°ZÛÛ#²â÷zX†±1@ôá£üo`ŒžgY6"ˇC2MK×õ½ý1æy~Æ Ô‡òçaZ„Ð-I¶mËŠBìß{¼bÛÆ ‚ü$Ùîq ƘAжmUU†!ÃâÏcŒeUeyÞÚ=VÎôp ¨ªŠ d$Ë ±Ÿ'lŒeYfc[à¹ÛJÖmÞúÈ­7jª÷1À‡ŒI±uÓDÆù¼V÷fRHÓ4!±>¯iš¢À1{Ϊ› D# (ÈÎ ƒ.‡Ãër™–I.Ù¶éÓGù_Q5 «*±ç Gd¸?‡ù=9б~ÊŸÆ8:“¹ßϲös+Z»‹îÝ+Æ8ÀÚs‚tß ä6Æ€lÄïs€eYÓ´ B—}zFj²¦ë»z~lŒõ}&fI!1¶mU>y|¿¼‡$æfô5 oµŸ½d å7ðS(Àþ:ôû1î¤>”^„@7ŒüÌŒùyáHä÷z"lÛv9C‹ ,ËVU P¯]Ê¡c :ÍK¡DÑt]Q5†A¿ãCašfÈ0ÀîÈBôq£B~²ð¡>JOˆ?Áï›æ^áz(”CÂO½~†aHHBúú·ç¨Ïa(yôV§ôZö~žçéXÿß¡eZ`–eÿ¼\10-À²ìarƒÑe¨)½™Ÿ¦yÛ;Ú7mÞDÝÇÿÞ@ ÃHMI´w´ƒ?^„‰W­ ɉɀºú:US!„âî¿Ïë‹‹‰;´e P9lWwWvNvŒ/Æ´Lø'HåO̱\[{[EUƒ˜ÖöV ðŸð[c€†‰È„PcS£¢(‡CÇ_’¤¢~E‰ñ‰æžÁl)”^‹r9].—«‡1åï˲ª¦†+ˆA‚ üi’gÛv{G;жmI’u5 :w åoYön_Htè°k7´ô·„L䨶fóg¾Û!!ˆ,ó'N0!±k8Ô¡P~ „@À¶íý<Ö ¢(‰Ò~Õ×I‡zþÞß—€ÞÏ&KS!÷ØO+ýFGÊoDãÙ¶mkgw‡ÓáÜmD÷SX@8îß ßçßwxsÿ}±¨“Bˆv‘þNìÕçÝkô?"G"­g¯¿gTœŸa¿‡ýÊs¦0¶m…ò?B–²èèì5jDØ0L"×B eY ñ ëÖ­íêìŒKØw<ŸÝoŠ.—‹ãX€AD–>¨'Y¥úPWBog/A<>Bw øÀ]8<Ïó<Ð4Ý0ŒŸ‘Duù`5“Œ6BIßhc, ¼mcÃ0 øÓí… Šj+[°ëþXâøÊªjAú¤¦žH4ˆ ÉcÌ |C}£ašé} Ã@ÙØfY¶¡±É4ÍŒŒ¾†n€Ý/+Ñþ‡mÛˆ!Å»‚nÂ=Š!´-jÇLùÛ1Æ ÃœÀ "Ã0–¦#†á$‡ñܽÚCúmÛv»ÝßÏ™óÅ̯O<î¸ÒòòööŽô¾i†nDdYžã"²ìq»†5 ò¬÷>øè¸Ç$'&vn·›AH×uYQÜ.bÛ¶w@–åÃÊ¥óoÃ0¸ØXY–G{GÀçõî1½ƒaˆvõ÷wÖÕÍüföS&¶¶·w™YcEQB¢(*Š"ð<ò–e1 Z´xYjjJQ¿‚ŽÎN§ËÉ0ȲlUU‰ç8βl2B¨iZÔd º Ã0`˲Nçšuëãããrs³Ãá0É‹eÓ´HÖ’$Y–åt8¾Ÿ37–û÷/´,SQT‰—\.çÒå+[ÛÚ óMžçyÎ4LM×%I”å]ç†Ãa–e9޳,‹çyÛ²0ªª’:€Z¬u8¸P(¿ Û²ãRûÈ;wÖ––±qÀÐã5kÂd‡ËaÛÖìö~Œ1Ë2-­mËÍ8zúi§œlƼù ÑÈÉ'¿ióæÒ²òcžþÉç_l+)úôÓW^x¾¨ `[YÙ•ÿ¸ö¢óÏ?ÿœ³B¡ð^/[ Ã@’.¿¦êšªæççyÄT]×·•–VTVyÄÔîîî%KWL7vSñ–-ÛJÒÓÒ²²2~˜3Ïãq·N?nìè•«Ö”•oÏÏË?nìÆMÅåÛ+dEIKM ‚E>öè£lúô‹õ6Nºí€hѰ‡. „‚ÁÐ 3fdee^pÙ÷?ôHgW—Çëùô‹/,Ëš·`a0Z»~ý»ïxÔ´#âãSSRRR“‡ \—÷Ù_oÙ2fÔȧŸ¾µ­uéò¼ ¼õÞ{'7cíúõËW®r:uþ]*ŠzÒñÇ÷II½öŸÿš»`áµÿüWŸ”Ôc§¥(*ì¹ü†aX–eYÖ0ŒÂ~S§Lzñå×{ê™êšÚ䤤5k7ƒ¡5µÍÍ-áHäÃO>6tH^nn|\|jjJ~^ÞÁƒ¶•”._¹jâ„ñó-©Ú±£¾¡±«;0uò¤Ùs~:t0À`ÉÒån·BDò"ýË¡gYC†9Že+VnÝV:eÒÄ 7¯ßX<áŒÁ1G•˜À0LsKëg_ÌÌËÍmni]¾rõÉ'ŸÍ²ìò•«ÉYëÖo,++¯kh¬®©­«køâ«oÀú›tÝhjjnlj>aƱk×mÜYWït:İ,{ N…òBX»½¼hÌðÉ'›.(íõ~’ºÝÍõµ¼ ¨·öJ¶m¯×sû-7¿úÂs9rÿÃŒ=:>>~μyMÍS'O:xð‰Ç7ûû9Í-­™™é±þ˜©“'¥¤¤oÙ¢¨jiyy\\œ¦é~¿oä°a#‡ÏÊÈ6th^NN(b´×ÿ»!´,Ëëu?ûäé}ûžwÑ%é}û>ûä·{/G Òçe†(2Ã0,Ëœyú©ßo¿ü‚WÞx+..v@ÿ ›Š«ªªG š‘‘~Ö§­[·¡rGU||lŒßŸŸ—[XXP]S«FEe¥ÏëCˆ‘$)7'+?/·oZßÌÌôÜœlÃ0ÙÝ2O¤"ˆXİ b†E bDIòxÝN—³¼¢r¸1GN›:~ìè5ëÖ765{ôQû¥¤$ó¿©x³¬(Ç;½¤´¬¨°ßˆáCû¤$C˶oŸ0~ìQGN=rDeUõèQ#6nÞÜØÔtÂñÇ®\³¶½£cÌè‘¡~yEEýRS’Ue91ˆ\>5Z£ü}€ÐTU#1Ñ?zãô#Ž¿èÒÌ«®^—›3㘎Pˆe˜mî!ýcQ/]öðão*ÞlY–ßï1eò“Ï<çózÓûömhl;zTzß¾/¾òªeÙÛ_}ýmccc¿‚|·ËuäS/»è¢¤ÄÄööŽ`(Ž„»º»5M ‚†Aýæÿ „ªª9$ñÁ{ï~úñG¼÷n‡$ªš¶ßÚf–a„$JõõO?÷Âò•+»»»ââ±Ç޵pÑ’¶¶öEE-Í-)II£F ÿêëYÝÝA‡$­\µzë–m9ÙÙN‡cÈ A§ž|BA^^ ‡#†nC7#²¬éÇr bÈ‚ˆ ³0ˆañœ¦i¥¥e«V¯Ý°±8/7gñÒåß}?géò“'ŒOHˆÿræ7Å›·´µw„C‘#¦LNIN~æù—Š ûmØT¼xɲí•–i0`Ñâ¥ß}?gåê5…ùÇ Y½f]ccÓ¹gñýœ¹ºfäfçÁP0lf0pì®öˆöú)3 ƒ€¬²†ÉCuee­å官»«‹EÌÏt´™SN=¥oZ_‡ä ƒ³Á¦ææMÅ›ËË·çåæ\|Áùº®§$'ùõ7Ç{ôÀý·WT~ùõתªžsÖ™™é ñ Å[6'ÄÇO›:µ®¾aɲe‘ˆ\X¯Fvf†×ë÷/* G"éiiII‰tý÷?²È¸ CÆ놱↓È-m-~¿ŸXŰ #+ʎꚺºz·Û}öY§#ããã׬[ŸÖ§Ï¤ ãÛ;;—,]Vߨ4ãèé9ÙY))Éõ ÃŒ3B¸bõšÎήô¾iÏÇÆÆ&%%Z–•›!ôûý}RSˆÕ Ã2š¦A!„c™fgWWGgW[[ûÑG)‰â–­%#G ;zTfFúκúòŠÊ”¤D¯Ïë÷ùŽž>­|{åAâãV¯]ïóù òòÆ1.)-9bø˜Ñ£È\ñ€E™éé à <(9)QUµ„„„”ä$MÓÓû¦y½^ï²ÿaÖï÷Ó@唿4c–åvÖV÷ÉÎQ¶la^» °¨ÔÔ=’£`gCå»ï^|IKK3„066®§½Ã0---ð½Þ7v\¬?Ö0 b¤á$Q’H`Û`0ȲlKKëcO=uç­ÿu:Ç ‚€mÛ²íH$"I’Óé ‡Ãº®{<bR‡‡¦ë¶m;Ž`0Hb©ªJ¶?²àÚ¾^xÄú³½£}˶-YYÑÅfyžw»Ý¶mÁ€mÛ¢§ŸñÔ“NÈÌȰmÛår‘:sçñxTU G·‡cYãP($<PQ¯Ç …A` ‡‰!?ƒ˜ÎîN€AŒ?Ʋ-2¢èrº’dc`ÐH’$‚¦i¡pˆeY·Ë !„ Œ(rŒß †DQ`YŽXEäˆÇíæy^Ó´p8ðz=†aF"¿ß§ëF8v»\ƒH$âõzTUÓu´yº®3,“•‘E{!”¿4$.ÖÒeK† 9¦â¾Ęç%ᶶ·Mºà‚¬cŽ]»v5Ç ¹9¹Qí%~qqñÞÖˆ,‡#‘è·Û½tùò´>}Á mÛŠ¢#BŠ¢D"2~ÚÕÕENa& ’Žgww7Ã0ÁPRÓþ?˜]q~îˆ]–6ä›eYÑsÝNׯâb–ar²² ÓIJ‹c9Û¶;::B<ËG"’Ã0d±Yò‹3 £i:˜çøè" 1˲Ђ–aÉ=CòeYV–ebåɱ€dŠÚ½ ÛÕÕ’ec™”‡gùHD&öKdù`0!äy>B^PÀó<9Œc9UÂb,êÍKù€ÒuC–#¦i:E±èþû*+Ûªk8„2Ÿ|ÒŸ”d™¦ašºnì÷tv¿)öü ‡'Oœ Šb8!»zê B(z|ÏíÑÏäCEÿ0€ØõïwÖlšVvfÖ5Wæâô»g˜ ‘f°W¤ÀÝw…jè±cÌ"Bd ð.cíÙ>íùmß@oû ý¶W#=†áwßx»s‰n»[GS33ÊßÛ¶â—,YŒ ÂØæA xg}½i!ŽãŠ Æ~Ôÿ—mœmŒcccÉ`¡¾RÊÿ Ã0ØÆû×v»ÝëÀn Ʊ»FŸ‹>Äñ H¯ŸaÛ¤w2åï„°_¿Â¼¼|òc 0 Ö‰ß⮾Îþ¦µX€àç‰Ã=ý ƒ =e AØg?Ga¸ß#CL¼¨ÈƒVd”ïŸU!dƒêÌKù{!$q\ÄìúYÛ¶Äï@âNEÿ¯Dв¬˜˜Ã0‘ðŸóƒBMÓLˆKÀwtv>¾Ü‰ ‰dÎùP„Bùømëuõu M ´ô7!$+rZjZrRòŸ&ý†axž¸œ.˲‡éUžãÉ+ð¡.…r(aS’S  Àˆò·¼ÕY–åt8ÿ´L£SD<Ï&7˜mÛT÷)6fë0y2)äÅðÏ\„9zSEÿ9äÐûœB¿ÆÂ‡ò7ãPiÕ\ åðšÛS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:~!ƒ1¶mL–7úVÚÂ[–EÖw´NÈÖž¥P(ÊAñsÒ1–Áét C…Â?s0 wP11Æ‚ ¸\®P(¤ë:Àëõ0ˆ †Bû†ú³,ët:#‘HÏÕå) …r°Pú‰.oÙúÍwß©ª:°ÿãŽ=†¬¸„Š®øE4!dš¦aÇ‘¥zÉöµ$‡ÃQ¼yóç_}}ö§äçÛ¶ýáÇŸ¶¶µ]pî9‚ Dõ̲LKkë¬ÙßÏ8æè¤Ä]7ànuR(Ê_ŒýH?W‘$ikIÉï¸3?/—a˜Å›O<þ8§Ãa˜¦®ë’$‘#9–Åp·rÕê§ž{þù§žôz¦i ‚PUÕ¶m·Ë!ÄŒB–m+ŠbÛXøªêšç^z©««ó•žß¼e˽=œ’œ|ú©§¸Ýn‡$AmlG"2Ï󧡱鋯fŽ9"7'[Ót¡ªªdŒˆB9Ì¡}ÊaÅ~¤Ÿa–åœg[[[Ssóõ×]{ÌQG²,ÛÙÕýýû„Ç?cÆ+¯¿ÑÞÑ1~ì˜>ù4"+—\xÁ×ß~»½¢âÊk¯»èüó²23Ÿ{ñ%Ç}íÕW©ªöÊëoضm˜F¿üüuë7ääd_sÅå!lcÁAƒjv`áÂ%KR’’R’“9–kiiyá•W§1åüsÎ^·aã;ï} …xAp»ÝsæÎ{ÿ£Oúåç]rÑ…·û0 O¡ü †aê"P(?±‡ô“ñôŽÎކ¦ÆŽýÀ=w¿ùî»Ï¿üÊIÇwéEÆúýïôÉÑGõÙ_^xþ¹o¿û~}CÉÇ—š’픓ž{éŽãgÍž]Ÿ?tÈà/g~½­¤ôå×^Ÿ2iâœyóUM»ä¢ó~~ab 傆ædæñÒC] €}{ý,Ãvuw¹î””MÓ&Žwú©§|;ë»ëo¼iÐÀ—_rñ5×ÿëõ7ßòù|Ó¦Lé—_°tùòM›7çfgçææH¢xÚÉ'ÕÔÖ¶´¶ææä¤÷Mx!‰$ÄÇŸvÊÉ¡p¸lûö Î=÷ǹóÛ;:„0À,ÃjšvÊ '®Z³ö˜£Ž’D…kjk¯¾â²“N8aö?þðã\UU/8÷‡Ã1ᢊÊJÓ4MËØ¿¿Ïëu;Ýé}Ó¤Vª”ÃŒ1ÇqeÛË4]s:œTú)‡ {K?!äp8â¾øê«û~4½o_EQ† š”˜˜‘ž>tðà'Ÿ{þW^áñxž~þ…îîîâÍ[ ó ŽŸq¬ªigá©'8|èІ††¬Ì̬¬ žãš[Zººº::;[[[ƒÁ`{G‡®kB‘ª©íÇ=öàn—ûãÏ?ooñ5íˆ^~uösê¾ÿÞ7Þ~÷Æ[oKOK«««»àÜs6·´´z½ÞÌŒ ÛͲ,•~Êá‰mÈÜ…røÀ\rÉ%III–e‘i(–e;»:9–“DIÄ>©©^gÈàAW\zIbBX’¤ïœûŸþ366–eY„Ðñ3Ž=þ¸±~~^žËå4`À1G©jšiZý ò33Ò“““úåç{=žü¼Üô¾}ý>oaA?¿Ïg™&/¹9ÙÙYY¦iš–)ð|fFFVVæÈáÃâNÇ¥]د `ØÐ!¢ $'';zÔˆá£FŽèêð..¶³³ë‰gžeYÖãñ€Ý-Çãá8®§p°,ëq»‰É d‰´kÏ‹¢¸£º: z<˲£é¶Ç!In·›ã8§Ãát:{^¦Àó.—Óétrçñ¸IÖcç].Bˆ|õù|ªªÞ÷ÐÃáp˜ã8·Û- ©(AlŒY–xžÄšŽñûß|çÝ ›Šãâ⢎.—Ë)Icò.år:\»ËCtGuuwww\\Ü–mÛ^yãÍØ˜ÇîJ‚ xÜîž>¢dúž\)cÌ DÊÆó¼Çãæ9ŽçùÒ²2©É²ìžéð<ïtJ.—‹\”( Q!v:_ÌüúáÇø±Ç+*«Ü.—(Š¢("„Ün—$Š¢ ôüq-Ûv»\ϾøÒêµkãââHKƒ1–DÑépütc8¢(’òo-)•$‰Ûét’ '»HýŸ˜çù]Õåròø°¬(@7Ïq³fßÞÑé÷ùbbüO?ÿ‚ªê?Ο?bØÐ¯gÍzïÃTE}û½0Æ_Ïš%‰RQa?M7°mßpó-K—¯XºbE(úræ7G1uŪÕo¼õN]}ý‚EKÆóÎû,Z²4"GZ[ÛŽš6íÅW_ëèè\º|¹ßçM듊S][ûèOžtü ïôñ“Ï>wù%?õü ª¦mÝV‡¿™õÝ1Óz÷ƒKËÊ7oÙªëšßï¿î_7€¿ûþUÓ†Š1ÞQ]3óÛY]~ŸÏçóÍœ5Ëír}úÅ—ii}dYyíÍ·eYY¾rå°!ƒ†Eqý† O?ÿ‚eÙ†a´¶µ½÷áG§ž|Ò_Í\±rUlLÌÃ?aÛ¶ª©¡päÇyóÁ@VFfWw÷[ノD–._1aܸ‡bíºõ;jj¾˜ù Àø“ϾÈÏËKJJDˆÙ¸iÓ¢%KN×óæåçç¿ðò+Š‹MÓœùí¬uõ]ÝÝ^ç‡çÖ76BöïDqþÂEõ ]]ÝsæÍ›:yòGŸ~6û‡9%¥¥ÛJJFŽþä³ÏmØX¼|å*Y–›[ZV®^ŽDŠ û}òùËW® ‡Ã^¯'9) !´³®î¡Çž8ñ¸ó.üáǹ±±±wßÿ`8þü«¯23ÒSSS Ã8<ÕŸJ?å°‚HÿA ø@ È‹{⑇‡ ôÚ›o=ûÂK--­sç/ðù|²¬|óÝl!Ë Y–¿=›eYŽãæÌ›¿­¤tý†M÷ÝuÇ ×ÿsÊÄ ãF>bòä믻B¨iZß>}&O˜0eÒÄk¯¾Ú4͸¸Ø[nø÷¹gYµcÇÂEKªkjâ7nÚ¼nÃF§ÃaÛ6€Ð0 §Ó1n̘Æú¼Þ ›6m*ÞçÌ3N9é¤`(X—wón˜0nì¶’ÒçÍ …B~¿oÁÂŵ;wîn‚PÓô”ä¤ÇM7. –oß¾­¤dʤI6ƺ®§$'1bÒ„qýòóþuÝu“&NøbæÌH$â÷û,Z\»s§C’Î8õÔ«¯¸œa˜ÿÞtcVffiY™Ã!©ª:fÔ¨ì쬫.¿´_AADŽH’tÍW\tþùš¦!ÆŽ=dРñcÆL<éú뮋Þ6àŽŸqßÝwŠ¢øö{ï¯ß°áæþõȃ÷שׂ{ùµ×;;»¾ÿÞ[n¼á»~2h`ÿ»o»5?/WÓ4Ó4Fž“Mü !„¢ ŒY–xASµ´>©÷Ý}׉Ç÷ñgŸ#ºr…r0Ü4/Ã0ÝÝÝÍ--ç}ö…ç»dùrM×DQŒ‹=õ¤ÿùkTU5 À &6&füØ1wÝö_žç4M …öm™–¥jZ TUc@"ò«šmËÂшašÏcl{Üž¾ii·Ý|ãÈÃeY¶m;6&æ‘îw¹\ÿ¹åÖÎήéGNûô‹/·•–Œ9Âét>úÀýN—ëÆ[okmm3 £»«!ð¸=}ÓúÜvó£F ‡ÃY–%I’eÙÆ˜åXÒ#]2UQ-Ëâ9NQdŽã†aX6Ù–E|˜u݃²¢† !tHŽÄÄ„«/¿ì´“O‡ÃÄ m¸q¯¾ñ¦Óé8ÿÜsžxúÙ„¸øŒôtEU Ó ‡Ã<Ïc€yž‹#UGæNUµm‹ÌI@-Ë’µ«;@êƒ]“À,Ãü~_aAÁ}wÝ‘š’b†¦iý‹ ¹ÿÞÕÕ·Þy—Ïë9|øs/½l™VA~^vVÖ£Ü_U]}×½÷›†)ËJWW—eY"ŸÏWXPpßw˜}¦ijš&‰¢¢(ˆAˆAdÝ]׉ç¶aÄí`šæÿ½eô¨Q·Ý}÷¦Í›„Ý]ÝäÇlÛVd ËŠ$IƒP8 …LËr»Ýº¡‡Ãá`0DfBáP …ÂW^véçžóôó/|óÝl—ÓiYB( ±,kè†e™žçwÝĪûÊÁpÒO&H·WVÞpó/¸ô²·ß}ïŠK.ÉÎÊš~ä´Õk×-]¾¢®¾>%99 ½ñö;gœvJeÕŽEK––––e¤§Oœ0þžû¼ÿáGËÊË'ŒZúì /2 ‚ªª6jäˆÒ²²g^x‘a2°Ë2Œ¡Ó¦NMHˆŸ;Áº u]pW]SóôsÏW×ÔdefbŒÇŽ]]]ƒ****)+{ú…«kj2Ó3xŽ?vì׳f}øñ'Ç{l\\ÜÜù Öoبé:˲ˆABR!!@ä –e!‚!Ä „DPÅóÎ:ëÛïfÿó?7z<ž+.½däðá÷Üÿà+¯¿!Ëò°!ƒ‡ ²pÑ╫׃A2-©iÚˆáÃÁ`nNÎØÑ£:::† `2ñlÛzìôé«×®]º|™Z nÌ!†Ùõ»X¶=qü¸™ß|ûå̯’ƒA ‚a À)'¨(ê¼… ·n+Áx׬ïªÕk_xåÕ`(”™eYÖS&/]¾<';;!!aÙŠ/¼òj(JOïëp8FŒöì‹/._±âœ³ÎeyÞ‚…[·•>5DArùa±‚r,‡"ÿ1 Ÿ}é¥5ëÖ¥¥öqÄða¥ååäÇ`‹‚8á¢üóz‡ÃqîYgN2é¹—^¾ëÞû‡zÉççåäÜqϽ/¿öÚ©'8 ÿÔ”Ôûz¤¦¶ö½>š5û{¿ßŸ”˜hÙ¶iš)ÉÉ ññ7ÞzÛsç ‚Àsü¦âÍwßwÿóœsÖ™¶mѱ å×sÀ>ɉɺ¡ïûmÛv(îê‹‹‰Ñ4㸺ºú°IJLôy½íí튢fd¤77·´µ·'ÄÇù|>žãvÖ×+Š’ššêtHݦiÄÄø‰fq×ÕÝmš¦Ïë•Åép˜¦©ëºÇãÑ4­¦¶VŤÄD2+hÛvCcS$ÎÍÉaÆårÝrÛ£G<ùøã»º»›š[È.žçÀíí ËÆÆÄ¨ªJÒINJ2M“\iD–’d±u!ÚAÞLÓ´,K’¤H$Âó¼Óéìîî†B)ÉÉÄ€§®®Î²l¿ßçt:!„Õ5µÛÉÉÉân;©„ùÀ0Œ¬(,Ãp'˲(Š¢(ìÜYŽD’““’D®Ý0 Ó´Ž]åa¦­½ç8ÉáÐTÕétªš†mÛãñºúŸÏG†Dt]ßYWÈÍÉÆcÿ릛®»æšÂ~@ ¾¡‘ì`ŒÛÚÚN§ßëí êë|>oB|¼¢¨Ç"„TUu:$ÌÏóÑÊEIÓ5ŽeuÃ!ÔÚÖÖÖÞž™žîñx0ÆÝ€iìúqÉJjÁP(‰dfd@Y–mko7M39)É0 –e›š›^ˆ!k|vtvÆÄø#¹¾¡!)11)1‘Üœ¤wT×ÄÅÆ&&&,Y¶ì»ï¸è‚óbcbÈ1‡úiÚ4†å°"Ãç ¥ŸÄT`Æ4MÃ0‚$-!Ã4MÓ$b§ªÏs,˳n’2™-°,‹ãX`OŽe„Ä<†Ì9“õ~BÏÛ†w¯÷»; •çùŠÊÊÇž|ú‰G’$ɶmžç‰FYžã0Ɔaü”Ž®C„¶m“¼Ð0ÑU…†±mÛ²,¢Ýº®÷´%µ,k—iÀI+­«¨%(ƒeÛ{laÛ²ìÝU§F´<{-hLª—¹“øE¤À¦e± Ãó¼eYÑ BdÕEQ‰Èdê i±%å8β,Ó4‰¹$I‡”쎕-pÏÊ!É» i¹Y†Ñ Ã4MDzþôã"„È›É@œu]'vÅ0 !‚ã8Ã0†áXÖ0Íž“·Ä S×u·ËõÅ×_/\´ä¥gŸîLËB‡¥î*ý”ÃŒ_ßö3g†A´!v‡]»ý6£»Èaä¹%3º=Ž1AWبR@‰•ÆØ´,ò!©-Z’Q#Ó4O;å$—ËEZ¯ž¹¢3„=ÓÁ»?’×^Oc´D§ÈWÒ‘Ïpwà¹h᪪}œ{£vSæîöžY÷¬º}³Ž¦íÒö,0‚в,EQzækÛ¶ªªÑ,œNÇi§œlÛ˜œ¥î®ž•³+Þîtì_Q9dcÔžRß­âäkô§Œ‰´ŽÑ|É= g —Ü{Fö*Š‚1–e¹_~¾Ûåî¬ÃX÷)”Öƒ–~°¿è=·ôô_<æg΂¿t0@Ó´¼ÜÜ¢Â~Š¢FÛ˜ßéÏlü5—ó‹Iýšë ñ+˰Gå@¨¨êØÑ£ÉËÏWίÈq°?ôo¨ºè P¡néé¹99‘Häðç¡Ps~‹ôÿ.1‡è` ùz°‰·2Lñ»¸›EcγßÊÜë•âï¹4MÓhÈn å·qÈž⬯(Š¢*B–åðo²ÐøƒBösgš¦¢(º®‘ÑêÃÙ€$Z™¤ƒOæÃÁA†NûkA—j PþM¯Ÿa˜ú†º`0 BÙ–™Ÿo˜{8dbŒ­Ý#þÄX~¯tÈ ò¯‰Ý•Â_<B®©©V4!0À§¦ôq¹\{E ˆ@^ªlŒfúç÷îU™ `1``Ûv|\B\\Ü^Þ­c˲p·nþbX–­[òês µ%ÙªÅÊ_„?[ú‰AHee…eÛƒ’$ ÐݵeÛVÃ0’“S¢‚EÂ´Åøý¡ªªYÞk¬ÙçóAÉ‚Ž?Ÿ)±×ü•¾þ¥e¥>Ÿo`î A,Ëîèh+ß^ž‘žéóù¢ê1ÞétŒmÛ…ÃÑfà×€’L®î§Ã±ËNé+³ªc»¨°È!91ÀÁ` ¤´D×µ””Ô½*Óïw“5M#F«,ËF§…÷-¡Ûå G"Dôyž'ëeî{¤‚ D"‘ßé6¡P(,¶ô³,ÛÖÞŽ„'N˜Xߘ9»Ô-q§NÎ6dèÊÕ+½^ H@Ô¤µ­í™ç_ Æ9#‡?bÊd]׉µ%BÈ0Œ7Þ~[QÔ“N8Þçõ’7bqöì̲,»zÍÚÄÄÄ”ä$b0JR ³`÷È>Ƙãøêš<Ïö+Ò4UÓT`bbD°¤¤dÐÀÁQCI’¶nÛöíìï9–õù|'Ÿp¼×ë%Rèù¡gv¡P(¼zÍÚ¡C÷ŒLÙ³ÿjæqÇñ,ÏóeåÛkjk>êHb-†eY$¼è¶’ÒÇM~ …r˜ó§¾¡{öÆÆÆŒô¾Ý¡{ß]Ó®¢õµ‘G?Z-\LLLSsS4H2Ïó---ËW­1|ØØÑ£RSSX–u»ÝĸÛëõþðã¼uë7:”çy§Ã!I ¿L¢C“~( )Ìs\}cC(òxÜ‚ „$I²1v8ä0fBh[VggGFzº¢D C·m˶ÍH$ãó ¢ÐÑÙAæ$Häá’²òm%%£FŒhnn~þåWX†‘D‘eI’ˆ[2 k,‚Ëå8Aà†‘$IÓµÚ;B‡Ä²¬ÀóB‡ÃÁ²,‰`\³s§mc§ÃiY– Ï <ÏqœÀóÄcÀ ¦¹¥)--ͶM]WmÛ²mKUežçââb›{V&ǵ´¶.^º´ ??#=íõ·Þþræ×¶mאָAEá™Ô-ƒÛíŽÈ‘Ù?ü **)ÿŽšê%Ë–³ CVé‰Ãápð<_ßÐ0á¢è …B9ÌùS{ý` ,Ë^·ckM[Ð`Ç{Ý^׺ÍÕ-!‡$µµwD僴 ññ©É)†idefþðãÜe+V躑˜pîÙgΚ=[Õ´òŠŠ>©©=þDGGçè‘#Ž=zúcO=ÝÝÝ]Ÿ7xÀÀ÷>úpù%›¦©¨Ê#?Ù´¶µÍ8úè“O8þ›YßÍ[¸ˆãؾii—]|‘a¶5Måy>ê$EJ‚fRU•¸2€]C(Ì€þýž~” /½öÃ2³fÿ°lÅŠ„øøË/¹x{eå—3¿æy>3#½¢¢JÓ5—Ëåv¹¶WT\xÞyé²¢tvu½õîû;ëê†rÂq3ÞûàÃÒòí}Óúœsæ€ù ê†~õW|ñÕÌP(Ô¿¨èÃO>‘$éìÓOKïÛWÕ5¡,Ë/ôt%#3<Ïw„:{j1 ';ûÄãg‚˜“ýôó/ÄÅÆŒ«vTöå—]ÝÝÇÏ867;ç©çžÓ4mØÐ¡GNGyâI„àu×\íq{$QDaõ²å³f/™§šŸ—÷å̯—­XÑÙÙ÷÷œP¦PþŽü©½~v S„#j¢Op2zS»ÜÐLqc§È(ªÊq|ÏA†avÖÕ¿ùî»/¼òêŽêêÆ¦&˲n½é?›6·¶¶5r`ÿ¢“O8þÙ_ô¸ÝW]~é÷s~\¶råöŠŠaC†Œ=æ¥×_Ÿ>mÚU—_–š’²ný†ææ–’Ò²É&œ|üñßÌú®lûö/¾þúÚ«¯2xpIi)‰9ƒÐ.›HâæjY–e™ÄY7t–aÀîN-Ƙçø‹Ýpó-ï¼ÿÁ%^P]SûÎû9ujiYù'Ÿ¡ëúŽêê Ï;W¥Ææ¦ÿuýæ­[ûäO?rÚ§Ÿ¡(ʦ͛׬]7gÞÜ“O8~ìèQÕ55ïüÉ„qcšv„ñ²å+âãã–._ÑÜܼ|åJŽã^|õÕEE¡g^x‰€˜aM×Ézaĵ˜4ª¦1 ðÆñº®ƒ¡öööô¾}AØZRRQYõý?–”•ŸwöÙéé‡tÚ)'5mÚ7³¾Û^QûÏ\3~ìØW^S×uˆ` |ñ•WûA_yýÚ;¿úæÛ뮾ꔓN4M‹vø)”¿ ¶I†mÛÉII[ËJ³Òâ/žÖWïnðàÎ+ëÇ X»sgJi^¡aý û=óÄão¾òòðaÃLËÌÏËKMMMMMÁ{<8ÇÓÔÜ<ýÈi…ýúååæ”–•'%&Ž9‚åXÓ0§9­° Àëõ±˜˜˜œœììì,¿ßWZVî÷ùúded8N2¤Î²¬×ë«ÜQév{¦iZ–ítººÝ`0>>!jƒ!4-sø°a×]}ÕÝwÜvÔGTíØaÛvUuuzzßì¬,Ó4s²³ òó}>ojJjZZZfzzJrrfF&Çs!–e˜2ùW^ñùW3ç-\˜—›sÏ·­\µúëogaÛD¡_~~aAÁ›ï¼‹*,(hkkoimaèÁÄ×¶í¤Ä¤Êª A†5MË2-A-˪o¨KMIÑ Ÿ~bAà½^o\\ÜöŠ €qZŸT˶.¹ð‚éÓŽxýí·ËÊ·wuwÏùq^mm­$‰²"{<ž´´>GM;¢«««½£ƒ¬„ …››[ž5rdYùöÄ„ø‚‚‚ä¤$Ž;d>" å`ùs{ýš¦Ù§O™ù‹eÆ=pÙ˜Û.åá¼… ’“’}^ß^ó„[KJ^}ýÍgžqÝúõš¦wvvººº ÃŒDä®înŽãF öÒk¯¿ýî{•;vL<©¡±±³³«OjªËå|ðÑǾúæ›Æ¦fYVTUíêîRdEUÕ¦æ–Æ555¿ôêkK–-#ÁgH¡Üœ¼–æ–µëW#†q¹Ý’ÃÑØÜ°lŲ¬ôlA¢ã*!EV„·; äçÇÇÇÅÆÄŒ9¢_~^8!¥•¥³«Ó¶­ŽÎNYQdEC–e…Cá’²2†aú¦õY°hIMíÎŽÎÎA,X¼$†‚!Ã0švÄ«o¼™“Ý¿¨°oZš$IÇ 2h ™6M£OŸ4€Áâe‹LËp¹—3,XϽôr8¾ý–›;»ºˆ×.Ã0,Ãvuw麎 ôú|Çí˜ÔË0Qo²ÅáY&+¹‡Âab‰D\.1¢AQUIMÓE c¬*ŠeÛ.—` ëº¢ª.§SVÛ¶É⺺®sG.GÕ4rÕ?U&/‚â%àv»§¦©û¯LˆÆŠ¢DEŽemŒAÀ¶‘eÛ¶N'BÛ¶¢ª’$!ÁPàv» ÃÔ4Íãvâ Ë¢(:¶±aš²,ê»ú°ƒFî¤Vüö Í¿c H,_€eYQ“ö½Ž±lî¶‹'B–m£è˶Áî¨;$ª0¹»G¨ä¨WpÔõô“ϿظiSLLÌå_×ÓY—ŒûGãeî7†Ï¾®=s=ÜÈRl°§™Ï㣠»&3‚}/gß¿¾2ØÃ›7jLv;$GLj¢=wõ (Mä@¥¢*ý”Ìߴù÷‚(ÈOCçÓÈî/H Ðó”ž!¢±ÈÒ=Óþg œ}Æi§Ÿr²$Š–e{i JUüoߨ“=£JDÏ%˜Þ[`·Ü÷<~¿Ÿ÷{9û­L˲¢þšÊÜo„Ÿ•g¿EúùRQ(”Ö^m•aÛ˜aUÛO¨}Â_kÞò¯UZ …réÕÒzÄZ P(”ÞÃoœ%û$.ü~÷þ/úk™@ü|i÷ZoëovíÝ2S(”ƒ–~2ÿév»].ËîýÒ!äyþSØk²ë§©BÈú±¿ jœ~/ „Â/–Äù‘DñWÖÆï{í¿È¾¿ÂoƒôS(EnÀ‡˜‡ƒÁå+VJ’”“ír9£³µ,Ëê†ÑÒÚOLSÀnãÝB¢ @dY!-‡mÛÏCÉ"‹ÝN§‹T ³—=— "ô\ˆ*jc ÆÃ!š£Á>£éô4J!.=õkwƒAl÷÷^ýªçÒ]¦i¶´´ÆÅÅFƒnF ILnJËËééQ#ŸžWDÖj?Øk>Át¿×Ž1†A¢ëyÕdn–çùp8ܳýîi(µWîûî"iªªJâƒî7#jóC¡žÄ“ý{ïƒ/Y¾ü“Ï¿X½v 9é÷û½^/Ïó<þ¤e™B¯Çã÷Ky„ßçóù¼~Ÿ·¢²jë¶Ò„„¢.—³rÇŽ-[Kâãã;::}êiQȉ$6r\l¬$IÑþ;ÆXÅØØX—ËEL݉B¹].€(Šq±±N§Óír­]·¾¥¥5>>Þ´,’ŽC’lÛÁçóÆøý‡Ãçõ’ ÿÑËt¹\~ŸÏçõ8ŽØ˜‡ÃA„ÛårÅÆÄpGt6..δ̇<Žˆ¢CJ°,Ëëõοà¥W_+)-ÕuÝçóù}>¢›n—Ëï÷;Ó²\.×Á^;˲111$5—ÓIV°!HÉ].—ÓéŒñû%QdY666ÆírÙ¶Íqœ×ëñû].—(]ÝÝË–¯HHHèyí·;66VøhîI"ÕKv‘hN§36&Æãvwtt~ðñ'ºn<ã'ýW5&&Æétb@‡ƒ(”уèõcŒEA¨¨¬lim}þé'Y–íèè0LSÓ´÷?üÈ᎙>!†˜ÃC¿ùnv(švÄT¿×‘åÏ¿š‘åqcF¿ùλ]Ýs …_{ó­î@@–唔俿–÷>üHàù£¦·­¤dͺõÇ)*,Ô4 Àq\ÕŽ«V¯ÉÎÎJëÓ§±©iÄСáHdÃÆMCÚQ]½bÕꜬ¬ÌŒŒg^x1½oÚ©'Ÿ4lÈm%%kÖ­6dÈàAƒÊÊË«kjÚÚÚû·,kú‘Ó„06Æ+W­nhl„fgemظqÐÀ À¶½rÕꆦ¦‘ÇõIMíêêúî‡êê Ý$±¹¹åÇù ²23ÆŒ¥ë:Ïó;wîüðãOrr²ûH’4û‡9ªªN?@¸nÃÆîîîÔ”äýûƒÁƒ½öŽÎÎ/f~- ÂÄñã6ççæÚ¶½©xsNNöº €ßçg¦¹¥%+33.6æÃO>ÍÌHŸ8~\CCcEÕŽæ–f¯Ç{Ô´#>ùìó%Ë–wcGr:¤u™¿`a}cãè‘#òrs·lݺfÝúaC† è_¨ªÙ5fÔȬÌ̵ë×o+):xPjjjfFº$‰ MÍk×­KMM=rdùöŠú†úú†ÆÜœìáC‡îµ´…B98ˆ^?„PV”!ƒååä\|Å•o¿÷ÖxöÅ—:»º6mÞòþ‡I¢`š¦$I|üñÆMÅ]ÝϽøò/¾òê†M›lÛƒ¶m›¦ÕÑÙ vÇh3LÓ4­öÎ!Y–Y–]¿qÓÇŸ}ÞÐØøâ«¯¹]®Wßx³´¬Œ¸ÅÖîÜyûÝ÷ÚwuuG"‘ç_zYV”m%¥Ÿ}ùUKkëmwÝ1îêî …CÂH$¢©ZEeå˯¿ár¹_~í;w.Zºì“Ï>7-ëÖ»î ‡ÃsæÍ›ùÍ·N—˶mlÛO<ólSsóòU«ž{é%Žç{êé@0øÕ7ß~ôégmmm<òhssóK¯¾^V¾Ýåtš– …ž|ö9Že¿žõݼ NÆØ4-Ä0ºn(ŠúüK¯,]¾¼´¼üñ§Ÿiljzô‰'·•”„ÂaˆÐA];„P–åÇž|ª©©IQUUU_~õõÎή–ÖÖWß|³³³ë¡Ç/Û^±³®îáÇŸ(Û¾½¡±ñ©çžgYvæ7³–-_Y]»óñ§žfYöƒ>^°hy}iïh'î N§óý>þè³Ï%Q U;v¼üÚën—ëå×_ß¹³îó/¿úðÓO%Q …B+V­zü©g’ÔÞÑÑÙÙùíwßWVíxø±ÇÛ;:ÞûàÃçÍ[¶bÅ›ï¼ËóüSÏ=¿£ºZEêÇD¡nœô[–åt:yðþë¯ýÇÖm%=öx}}ý¦âÍŠ¢tttn-)µ1æy^–åå+W©ªÚÙÙ¹£ºfËÖm;ëëï¾ý¶‹Î?oÔˆƒ;zÔ¹g!Ô #9)iİ¡cF<ó´ÓLÓŠ¿ø‚óO>ñ„ÎήeËW´·wtõ ;jj7 ÃçóökhhLLLŸ×ëñŒ9räðaÉII‘ˆLfG¯ºü²5k×Þzç]¿ûÎŒcŽ~ù7=.÷É'œ éúÕW\¾vݺ[ïºû“÷Þ±m»¬¼|êäI1~¿Çã5rÄÐ!ƒ‹ û½þÖÛ€@0hšf0”å§(ü(ª †"²¬ëº¢(º®K¢ä÷ù֮ߟP»sçÄ æ/\¸~ãFI»»^¯×år(*3j”Ïç ‡Ã,Ƒ宮.Q­Y·>1!AQ”Ä„„«VG"2ÿašqí<ÏÇÅÆ6·´”oßît:^ CííºnƒA °¬¨ápX–UÓ‚Á Àón—«ÿ‘#†÷í›¶nýz⼦išeÛ†a4·´TVVºÝžçTUÍË˹ñ_×?öÔÓuuõcÇŒr»\£FŽ1|hRRÃ07ÿç†'Ÿy¶´¬ì¾»î¼áŸ×}öÕÌÛï¹÷¶›n’e¹Ojê²åË›ššÖ®ßœ”DVK†A‡ú)”Óƒ‹ÜÉq\eÕŽWÞxsÁ¢Euõõ×\yE~~ž(Šó.*+/—$qðÀK–.­­«;ãÔS/YºyëVEQÇ#I⇟~ºaã¦ô¾iùù /®oh1l(À¶íØØ˜%K—546õ/ìW^Q1iâ„®®®¶öö³Ï8mGuÍò•+ëêëórs}>/Bhg}ýK¯¾¶³®~È A#G òÙ_¥¦$Ÿyúi%ee¯¼þÆÎºúÁ7ÖívÍšý½išÇÏ8¶ººfùÊ•;ëêú¶µwˆ¢Xد`ÃÆâ ãǵ´¶Ú¶=|èMÓÀ[¶n3jd ’eôˆáë6l>dȨÜ7Á¢ÅC:Ä|øÉ'•U/œqÚ©–iÎ_¸¨jÇŽ”ää>©)†ap·µd[zZßúû<ÞogÏ^»nýÉ'œPX_RV6~ìX2û1þ•×î÷ûUUMMI }úÙöíÇ |òÅ—uõu±1±CÚ±£zÂøqª¦î¨®5bxZŸTEQ.^RYU•žÖ1¨££sÒ„ñ%eeÉ1qÂø ›Š×®_?bØPAX–ý~ÎÜϾüŠeØ)“'Mž0~Ç®«/*ì·rõê?ûœa˜ãŽ=¦­½ýÕ7Þ G"“'LÈÊÌ,)+»àœ³Û;Ú¿øj¦ªjÿ¸òŠÆ¦&ç‡ ¼~ÃÆÜœœ>))úî5z'4r'å°â·Dî$&¡p8ìr¹ „𦉢¨ªªº+Ð#Âëºît:MÓ ‡ÃÄBFE~RE†a„ ‘O^&X"h&1:$+§#Bç»–eÉ2³„¦iªªÆÆÆêº.IÒ­wÜ5ý¨i“'NeÅ0 ²Ë0 "¯$üÏqÑt¢aÎX–æ [¶×Fò•cY2<%Š¢¢(ä¿eY‡Ã0 QC¡mÛÄÌ1š‰«#Š" Çqœ¦i$ÁßvíQƒÁ €çyžç»»»Éò¿¦i’Ó£éƒC¡±(ÄÔÒ0 –eIj,ËèúOëP"„‚Á  N§Ó0 Aà»»wå…B‚ ¸\N]7dEÁ¶í÷û‰á,Y=XUUžçm˲1& 3é„^>ÐO÷Q+~cø6¢†–eI’¤ë:Ù¢( à §ó'žçIf—ËE̽eEaÆápaeÐ#à ÜÝ ¶‡¬Ò5*WT5j^IŽ·m›çyQEq:7·u´6LQTrU¢ Ü£ ~Y–¥XV4höÊ‹¤¿×FòU7 ‚P–e„¢¨ Ã0 CšLY–‰#[Ï>9‘\ Ø©( ßß|íY–EAÀ`Œ5M#¥¤äôh:äàhÁH+HD™ìÕ´=ÞêlÛöz<6ƤöeÜÉ.UÕ „N‡ ªj4SYQ„´ÝÑzVÝ¡¾Õ)Ê~øSp=Ã#„0ÿÔ‰*iϨ¿QÙWö ™ÙóC4DpO0ÆÖ®±rÓëq_sÅåÇE…ÏÚ'Üæ^…Ùkû/ úï·‰ìy-=W?ß7Ô£¢ö½üƒ½v„]i½Güäý^Î^;ÐaQ¬=Së™{Ï]ûfŠvËý~3¢P(‡‡Øúc Y®ý !ýÊ´´>ˆQ÷\æåw,Õ/ …ò÷ãIÿ¯Y]䆩ýÞ-ÆÀ²LÚP(”¿‡Lú9Ž‹DŠ¢]N§(JÑÉσþÞ’LÌ.† …Bš®1¹]nŽçéÈ5…BùÛp¤ŸŒÈo¯ØnY–(I––f·ÛÖ§oÔ̆€À=è÷57ŠqûÅL4Ͱïadò¶¦¦šaA,ËjjnŠKHˆO0Ì=Ô¿çì¯,FO¢Á×~Ã^ …Bù_84Ò_ZVâóù òûuÓu½x󦚚êÌ̬h皨°ätÚ– 4MÓ0 Æ€h,Ë0‚(Z–¥ëú/ÆÍwH’ašÑ©àÉ4±À)-Û–‘‘Õ'µÃ0¶#‘pñæM¶m%%%÷,Çq¤m`F×´Ÿ·^ß+S„Ã!ɲr ã].§ªjQ …BùùS¥ŸÈeccD¨°_ц²ú/–V;Eöü£ †¼dÙ²˜ØX·ËM¬A¨Ý¹óñ§ŸqHY–§Lšxò‰'†Ás¬aš BPèõgŸãXöì3NOHHؽ8-„@„¦i’Xr ÃÌúþ‡¬ÌÌü¼\b8mˆÉŸmÛ×^}åêµkÑÈÚuë±ßùàÃ0²3³.<ÿÜ{xPQÕC‡¦¦¦|õõ7‡ãòK.®©©•DéÝ>Ä·µwŒ3úªË.}ùõ7¶lÝjÛ866æ¶›nÔtc¬kÚ^ŽWd1J€nèþ´ ˲~Ÿ/9)1..NS5„ÐÛï½_][Ë0ÌÕ—_V]Sûê›o¦¦¤¤¦¤lÜTì÷û‚¡PŸÔÔŠÊÊSO:ièÁååyyö¹eÙý ûÍ8æèç_~EŽÈ‰‰ ç}VMíÎŽŽÎÎÎλn¿íõ7ßR5-';kÎó–9~ƱÆ Ñþ{V …ÒøS{ý@ °(pf²ÛÏ«5 ÝUµm¹ñÀï‚áˆ$I¶½{Lca8Þ^QYZV …‚Á`ffÆÓ=ÒÕÝ&Oš0nì˜Ë.¾èå×_3jÔ#Ü¿½ªòÇù TU=çŒ3¦9í“Ï¿¸îš«ïøï-Y™™ÕµµÁP0 {ÖY×^uåêµk×®_¿výúG¸Æ1Ó»ºº£ÎY èª 0Ð Ý4MÓ4LÓ´mKÕ4ž¢žkcŽçV¯]{Û]÷,]¾âúëþQRVöÍw³ÇŽ]]]óé_"± {ço铚*ŠÂ£>G¦LšxéEο@×õ†¦Æêšš­%%G1õ裎lmk[µfÍÁƒN=ù$†aÊÊËûVîØ±}ûö-ÛJRSRÞ~ïý~ý B¯¼þ&DZ4 …BùÍü¹Ó¼X–•Ö'mKÉÖéÓ¦ýßIE߯®vÄ2'M‘#õuucF3 ý§H¦™›}ëÍ7’¯sæÍ‹‹c9.6&ƶ1‰ÌcÙvD–³³³<O|\\GG‡ÛíNMI1 öí¬ÌLaBày–aœN§ÇíÖ Íçõ¶´¶‘…«|^ÇqxwG>..~[éÖ ã'ÊŲ, ÇãÚY_‰D£oBC7&ŽçoQ5ÍírÍ™7ŸçùP8|ÄÔ)CnïèHHˆ÷x½<Ï{<žãâã%QÄK’ˆÂ6žòÈW^ãÞêîî>fúQ-­­¡p(#==#=ý–Ûï|áåWjwî4 CÓôP8l†eZ-­mcF²LóÖ;îœùí·ÑȆadgæº9Á¼ˆÆ[ØÚZ²yýúõEýúG£AM×UUeXÖ0Œ`(4xà€Œôô¶¶v„ËåÔ = t]…Âà`(¨†n‘HIJ,ÝÐW­Y³jÍ·ÛÕÙÙUYU5{ÎÛÝÞÑn†,˺®1eòì~,êׯ_AþA[[[‡ƒê>…Bù_8¸È¿ $ÈZmmmõÎêÎΆaãcãr²sH1Èa!YQ¶n+Ñ4Õ0ŒÌŒ I’,Ëê›–V¾}{Rbb8±,«Oj*B¨´¼¼µµuðÀA»´¬<­OªËéÔt}åê5Š¢Œ=ª««Ëåtv©))ãuuý TUݲuÛ†M›êêëyàþH$BÂ[BË·—×Õ×Ý‚ &&$äy½ž½,;[Z[#93#,tÅq\ww÷ÊÕk ÇeX¶½½#/7§­½½»»;';{{EEbb" µµ55%¥¾¡Ñãq¯[¿B8aÜX†aV¬^…G‘œ”T¶}{ZŸ>’(–o¯è“šâñxTU]¹zM8.*,ÌÌH§ þ% ‘;)‡Ñȇ@ú£Ù[–E÷òç"69$€%Ø=^D¢ZʲŒàXVQÕèaÑp§<Çiº.ð¼eÛ’(br<ÆN‡"¨*ª¦’$’H’¤iZËAªªÒ9Þ¿ Tú)‡¿1hóï„46DjÍɱm›Œ™à ÑseYŽFØF'»í I\ebOBÛC„ ӄ躎²m;‘†©¨¬úø³Ï³23Ï<íÔP(Õ}ÑV²…¸’íqÓ0 Ý0Pp•¦ivу à ÆB$_Rl€lšä&Út‘’Hi{\€¼‹ìq9ï9L¡P(=9d1|¢=åž_÷e¿Á öÝØsKÏFâ@˜É+Îi'Ÿtæé§Œ#²¼—ÁLÏâ¨lû ð^¢Ü3»½ öÃy¿W±ßË¡P(”ÿ…^½d6Q|2¾¨ËB¡P(½Zú©âS(”ÞÉoÔ>ËÆö>.E–ý;;ýî R( ü6éÇøœ¼Ä3QñÇ ½î÷‹Þ7A{ÏÁx›ú²R(Êoå·H?ƒàì å !Ž…˜ˆ2ÆAŘ»¹YÕm"Ê6Æ–-›6m ˆ~&}yŒiaÓÚ¥è¦ýÓçh‚?7ë¦ !€¸`ÙÀ èXcÚP(Êoàà¤cÀ"ØÖOyxÑc3·9Ö²lžEq~ɰì‡?ÞŒö»Ó²ëqp^—àãÜ„Àãàâ½B¼Gð88cŽE ^1Á+ð,‚Ä»…¯ pȶq4ÁÇ>ÝVLŽA²n­ØÞ ð;yÁ¶ º¦²Ã%rn‘£êO¡P(ËÁMóÚ»$þõUGO ËFI] ?ÅSÖ|ýÃâ†NŠì’’VÓÂçMÊœ³±±#¤k¦5§¸)7ÉýÇæ²¼¶¢)TÓ9fHÊ©£Óv4‡îž_VÍ«ÊM‰‘nÿ¸8 —NÍ.Jó–Ö_ÿ°¸±K‘!àXdÙXàзëêürÛ¥S³NÕ—cЋs¶?;»üÓóÆÄG´ß²²#…B¡ôZ®× TtsÁ–æÛNéŸ똿¥YàÐ ïnHðŠÇ Oµ1æ|aV©¢[ï,Ú±³=’#<2máÖ–÷—ÖÌ][_ß™Ò?ñžÏ¶´t«·¼Yä˜)ýý.þžÏ¶¶‡´dŸtý[ë#ªy˼âñÃSm`0‡Îòà9ƒ>XV;õžùǼsíØK¦fßôÁÆK_Zųˆvý) å×sÒoc,ñLEShuEÇ£_—,)iY[Ѿ©¦[WÍ;Î0}p²À¢qýҒܯ̩*ƹ3Bª¹¶²ÐÜ­.þ¸á}Ο˜Ù7Ö±r{»"÷ž=èìIY.‘Û°½½+¤oo º$vcu—¦šwœ1àÈAÉ~oÙ6™ém ¨ÅµÝ†i§Å9 ;Û#[ë"Ë$ÇHTö) å 8˜ ŽyQõÑ’þsjQmkä–w6t…4Ä¡¿ßžäÛÛežE§î{棋o=}Ï2w¼µþK†·u)Å4d£;¬#T3✲_ø¾|t^\Z¬##ÙìÏ›naï”-üÒ÷Û}bg§ „¦u÷§›ݾõ”¢I… åÁÞݘ•àzùÊ‘)ž€lP/W …Bùõ0—\rIRRRt¹W–e;»:yŽw»Ü–½×°@°¢¢ýŒqé£rbs’Ü]²ãN™ö΢5m‘~é¾1ùñ©±Ž¶°~渌œ$—ŠÁœMM’ÈNéŸ(I\~Š7-VÚÑ!5(yH†ÿ“å;×Vv Êð=8yÞ–æù[ZlO.JÌOñ|´¼¦¦5RÐ×7©0ciã9±OÉN‘² 8j`òÙã3œRM„¨ðS_†imkõz½<ÇÓv(‡†aZZZ.r'ÆÀëàÝR BàqðºaAž±lÌ"uÏɇS·l—À–íàYÍ´‚†ië¦íqp!ÅX†g‘icݰ.Ó-V ‰gyY³c!`ÒL € D"4ÃF4ª åð†Fî¤VüräN pôt„°+¢AÈ®ÐÁ²n1Æ ‚ƒ¶€ŠD kæî@fAÐÒeÍŒhHºìíú®ÐÇ=w‘!¶ tÛ‚ j–- H€ª?åpcL{ú”ÃýH?‰hÆ0Lt¨'û.¹ÑàÇûÝÏ£Ÿ;å@gQ(E0Ä Ãà=;QÊ!goé'c>5;kÚ:Úl˦j å¡¢*ÇÑî?åðaé'ˤ$¥$Æ'bŒ©îS(¿5¨ôSö?àCV¹:Ôe£Pþ&Pѧnxš—Þ¬ …ò7…ΨR(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒJ?…B¡ô:¨ôS(J¯ƒ=Ô P~¶ ,ëwHB€@´ÇCéíPé§ö`Œ].,Š¿KbPQ ,ÛÞýÒ–€Ò ùé·mc €¢_zB0ƃ-ÆØÆ` @ýb Ñ"„¿!ÇžEµ,ë×dJ9d` Ÿ;—]¼HÒ®-ÓöW÷] c–5Ç7F‚MƒªºÇ+„»þÈg åïÈ/<9‡CE€iš¡pøgŽD2gÆAe1fYÖép AeYV5íç…X’$I’À–e˲lšæŽßÕB°×Ñ¢BccbdYÖtªÿa Ƙã¤{îaׯýÔ[ÿÍ@hŽ¥^|1NHYéévv6v¹vµ(Ó†0††4mׯýÂ0ôòå€Ò1æy~áâ%Ÿ|þ…¢(ǽø‚ó8޳mBˆ1FÚ»ûÎBUÓº[[ãbc†!]i À˜Lû¿’SlŒEžoïèxáåW¶lÛ&ð¹gŸ5jÄpM×Y†±m›Öó,žç—¯XùùW31¶322N9ñ„ä¤$˲önŒ1Ã0 BB˲H‘HáUMëniIHHÐ4íÚÝpú©'1"‰°,»o¦´I8ô@ 0LèÓOÀ4±Óé¼þz¦¦&ôÎ;@’~Õ4Æ€eas³øÖ[ìªU®U«v½xŸ7/7Çír!„$I2 c¯LY–ÕuÝþß{š”ß Æ»ÞÞ,ËêÛ×>ª*EÇm·ÓÔO8»\À4­ìÚ¶vÞyìŠÜÒ¥À¶ag'·l»jUÏ~=?s&iŒÑ£õcޤã¿Ë6fÌ0G"…„‘Ðu|à€ö!(‡û‘~„‚ˆã8M×EIMM=þØc’’;::¯ºîÿN˜1ãüsÏyèÑÇ‚¡ÐˆáÃ>þä3]ׯ¸ìÒY³g7·´^uÝÿ]~ÉÅII‰/¼ôŠËåúçµ× Ä<ôØã 誚Ÿ›»iËæŒôôÿÞxƒ(ˆ’$}õλ†a|øÎ›WÓ4Ó4ŸyáÅòíùyÿù×õ/½úÚÎu]]ý‹ oøçÿ=ðÈ£]•;ª`õŽ@0ät:ç-\øü˯8‡ä8ú¨#¿=ûñ‡üvö÷•UUÇ»û]Nçô#§%%%}ýí,·Ëuæé§ÎüfVkkë5×_ê‰'565E"r0|à‘Ç**+{fÚÕÝUTXøŸëÿÉq>Ð+?寶1BÖ9ç°›7;Þ{O>uuá˜hY.À–L€_'¬„ðÔ©úôé`YFgìê– ¢¶vvÉbvãF´c·j·jÕÒcðøãêè'ž!4‡ Á))¬¢]ßWý!„¦iꪤP~béÇs×ÜÚ\ßP/‰Òè‘#^|æé7Þyç£O??fÌM7ükðÀŸÏœyâñÇÍ™;ïÿ®½fösÁÐé§ž\Ô¯ ‰””•ßüŸÇÆÄüç¿· 2¸¾¡áÎ{ï¿ÿ®;KËÊî¿ûί¿ýnæMÿþçu÷=øðò+Ÿ1Ã4Í––Öìì,ÇÛÔÔÄqœËåzå7›[Z¼÷îû~ôõ7ßnmms{ÜçŸ{öï¸ëØéÓÏ8õ”âÍ[.½èÂp8üÌó/VUíxë½÷f==.6îµ·Þ…Ã-­­ã`(ÔÞÞ¡éºÓéxäûü~GGGdÊäæÎ{ÿ£ŸqìŽêêþïÿRSR>øäã©“'½þÖ;MÍM{gzÎÙwÞ{ß°¡Cú¦¥èºA{m‡ ÂS&qO=agfZkWAM·Ú<Ã4Í À¶ŠrË!AËúµÒO°m`[€à8̱»Äà’Àñ3ðé§¢ÖVnñb`ÛûéÅcÛâ…„ÒÒì/gŠo¼!¾ù&ÀØÎÍm›~Tå”IzZ4L0°1@@°l«_^?–ei‚r˜°w¯ŸAL(JŒOLë“ÖÞÑ÷Îë¯ý8wÞU×ýßÔÉ“Ï?眥˗?ýü ÉÉIcGÊèÛwõÚµ?üø£Óáè›–†>thcSS86 3';Ûív‡#¿ß?n̘ŠÊ ËL›:õ­w߆ÂDI‡ ôÐc/]¾|äðáÝÝÝáp¸¹¹%?7wð Aù¹9;ëê)?/oÊĉ)ÉÉáH¤ /ã¸q£GC¡÷?ú¸«»[SµiS§:Ž>ý”cY˲Y–å9Nx ×ã-*,´mûÕ7ÞTT53#£­½-!.ža˜Áƒò<Ɔ‚¼¼½34111`PXP‡ÑÀ‰ò‚1î?hÔuæy!aNf¶írÁ_?೿”À»†óɸ!ÆÀ¶A® xŸf“Vvßx³ðÑGcTUÅõUâó/ļónpÖ·æð@× U²Â‹âÖÒmº¡Ó×GÊáÃÞÒF±,ëv¹~œ7ïö{±,kÚÔ©Y™™II‰cG~ý­·o¹áß.—ë·ßmmk­ohìFÁ²ìI§ŸyÁyçN<©¬|{ŸÔÔÔ”QÛÛÛƒ¡P èè胆¡3 ÓÝÝ=ýÈi[¶n»î_7$ÄÇ·wt\{õ•ÞݯÇ3xÐÀšÚ;ª«3ÒÓ»Ý}RRÒÒÒÊ·o¯¬ªÚ;ÓM›úöIKHˆÿRÊŸŠiÚ âË/»®¾:òÜsêµ×ÂÖÖƒ°îÿ}ÁXÀ0 v:¡¦¹Ï=—]±@»»Ævb¢vÒIø¼ó6›zZA?§ Ú´ Rˆéfqqñ¥?)1ɶmI’BãH$bš¦ÇãùÏ-·*ªòì+Š"Š¢ ð†a*ŠBÎEAQTÓ4]N'„P7 ]×’‘ežãÃ(Šâp8 Èæp8,ËŒUMÓ4MEQUEQ5Íåtš–¥ëºÓéÐTÍÆØép„Âa¡Ã!éšþì‹/ñ<¿­¤T’ÄGî¿@(I¢eY¶e›–%ð|D–ÉÕŠ¢ˆ1¶m;‰‚ ‚¦k Ã꺮ëúþ3u84]'‡ú'£Àð¼óê«…>½ÿ¾~ÖY°£³ øÓ¸ßyÛ&3À²€i²k×òß~+|ü1ìê„23ô…‹`LÌ~')”?_–þä¤d]×11­ƒAÈ0Œ,ËwÜ{ßi'Ÿ4eÒ¤p8 v›ê“Áâgý vû[–Å0 qÙ×÷Ó¨ƒ.±%_!Bh·¥&ìñ¤ 6¦ -^½v]vfÆq3Žu9†aàÞÑòÑ'ÛIÈ.rð/fz¨/ `—m>P”˜´4+--°r%àyˆ1üÓÇâöoï»ÛÉ@ˆ!ª«ãçÌÞxƒÝ°Á80ôé§vJ UÊ!äWHb²nìíãJLÝ!„¦e&7¯C’8ž³LKV”ýúvQþ>` UUù6¬]‹º»uÛnmk9X7òß „Ðï÷{ÝÞ_˜°%^f<½^TUå=âT[X²Ä9ƒ€auURz)Qé?¸AÒhùðQØp$‚#@»ç, ;ÂôÓN– lkoMINq»Üšç]um5ÇpN§óçr$ânš°© ggÎ<Óÿè£â;§±(‡¿å.<¬!Ä DC°õ 0Æ¢¶6€1e €Ð¶mÃ0|^Ÿõ»„tþù‹‚(Š¢¢*d´ðN€s WÌ8&–emŒ†ñû|>¯Çá0Ƈ#&&&ê&æt8**+|äÑ‹kšæõzÝn79Œ¤€1v:Þ=jLŒ6W!¯×ã÷ó<p¹\^ÇçñÙeYÖï÷I’Äq\0\»nC|\Ã0=õLggW\\iÆX–ñû‰å ÇqN§ÓëõòiÏ<ÿBfFÆ©'ŸXد_ÕŽë7nv8G15)1!¦¤´¬±¹©©©yØÐ!éé²,õõ7‡4nÌð'Ì `ŒNvÅ nÉãÈ#­ü|(Ëxw/>Úëª3Ë0ë7nliiÍÊÌTUµ©¹ùˆ)“BåÛ+::;ÇAƒµµµÏÛ¼%99iЀ;ª«ÛÚÛu]/Þ¼eŪաPhðÀ‡#ÚGÁöoÎ!'Ñn>åð€¹ä’K’z,tŲlgW'Ïñn—Û²÷öbY¶;н|Õê©“'ÝzÇ],ˮ߸iñ²e11þ÷?úxÚÔ)/¾úZñ–-mmísæÍŸ2iâko¾½~ãÆæææUkÖ¤§÷½õ®» ]Ýݵµ;!„éé}S““Bu wÜs_|\¼a‡ã±§ž9æ¨#·•”~ðÑ'úÝv×Ýñññ†a8$ÇüE‹ ÓÌHOG>÷âK‰ 3¿™5dð ~œ;óÛoý>ßK¯¼–’œüãÜy–e 2X×uÃ0n½ó.Ó4ssr¾ýnö†M›EY·aCFFÆ?ε,+-­Ok[Û¦â͇4 Ñ'Ÿ)‰â›ï¼«(JÍΫ׮›2iâ}=lšæÖ’’ ›6y=Þ'žy.½o_YVr²³š¦ý8o~D–³³²>ûòËUkÖ$ÄÅo+-›5û{Ãпùnö îyà!–aHÅÆø?üøÓ1£G¹\.„P{{ÇêµëdE†ŠNÉIDATþæ»ïúöI»û,^ …232î¼÷>Á¼y lÛnji©Ü±Ãçõõë7gî<^àÛ;Ú—,[6qü¸‡}Üãv/\¼Øçóµ·w<ðè£/¤¦$'%&êº~ã­·ñ<¿nÃF’û}2eÒ¤ÒòòÖ¶¶UkÖ¶µ·#„^xù§Ó)‰¢$I³çÌ)ÈÏÿâ«™‰ ¥ååMMM‹—-ÛX\Œ úü«¯Ž™~Ô‹¯¾ †**«ê‡ªÿÑ‹\Ú6p8<ÂnØ Ür‹9j”eˆPw ÛëñãNÒ7aíúõÇa?ôø¹9Ù/¿ö/ðeååÛ+«òr²oºív·Ë5{Ά®'Ä'Ü÷ðâ9sç9Ž ÅÅ|ô‰Çí®ohhkmóy}¹9Ù‚ D;þ b‘0ƒ‡äè9ÊôsÏô¶µú\.Îçc¿ù†Ý´I»øb;5R·^Ê¡€a˜–––ßÒAbÛŽ‰ñ_~É%Ç3½OjÊõ×]ët8š[ZEA˜>mÚÃÜçt8ÞýàÃʪª[oºñÁûîmmo_·aC¿üüþã7üßu))É×^uÕ¤ñãUM8ÎÔ”ä`0›“=lÈ´>©«×®Û´yóøqcâã““’‚Á`nNÎð¡CúžvòIÇ{Ì‚E‹›[Z,ˮڱ£´¬ÜåtNš0áŸ×^sþ9gO?rZeUDzd$#=½»«;??ç¹¹óX¦¥¨êâe˳2ÒxÚÉ'{ôÑãÇŒÉÎÌüïnÈÉÎ3 Љ¹èüó®ºìÒH$²hÉRãÿÞtã‰Ç'IRllŒßçUeÐÀÃ0 0fôÈŽ›Á²ìÙgœqÑç/X´èŠK/¾í–›fÏù1­Oê¥]DjìŸ×^ëp8š[Zxž×u=11¡¨_˲ ¹Ù9×]}Õ©'ÔÔÜòýs33Òÿ{ã_tÁÜ ÇŽ5 ¨ð?ÿºÞírqwþ9g_yÙ¥š¦­Xµj{EƸ©©yý†‚À÷/,¼óÖ[ òóu]Äøc.¿äâhîN§sg}ý¨Ã}^/Ïs••_}óÍi§œtón8æèé²"äå_~ÉÅ'Œ¯ª®1Œ$I'üÿ¾žçøM›7¯ß°cÜÕݽjÍš?ün%£=MMÜ÷ßã˜cútG{Ð=Íxˆm&ãòØÔ¿ÿU—_žÞ7íˆÉ“Î?ç캺zUÓ’¯ºü²ÛnºqùÊU}úiNVÖÍÿù÷%žÿÍìÙ†nL™4ñŸ×þ㘣ŽÊÏÏû×?¯s:†aü”¸mÙØ>øYoŒYF"L}=5î¤ZZú1†ab ݇Cª¢Ú–M·‘µNmÛÖ5- ¦õécc»¼¢¢²²RÓ4¿Ï¯(Š¢*Y–e¥rGUWw7™Q”Dñ¦ÿ+';ëÆ[oojn>vúô?û¼´¼|ôˆà›nøwNvÖM·ÞÞØÔdšfuM¡ë.§Óãñ <ðž;n3jd Ô4- BB¡ªiѸ.¦e]vÉÅÇ{ô=<¸yËÖ¸¸ØÄÄÄf{ï·C„"¹¶¶6ަÙTTVɲbš¦iZ†aDd9"ËÛ>¯·¹¹¹©©)˲’ššrÇ­ÿ•åÖ;ï&Ó–eɲ‰D†iª*‰aç*Û¾½«««µ­-1!^QÔp$¼gAlÛN§ó‡ç~ôÙg#G çyÞ4MÝÐCá°ª©€ø¸¸Æ¦¦@wwyùvŸ×‹mÜÚÚVWWo˜¦i™¡p8c $Ir¹œùy¹7\ÿÏ3O;5X–M‚îA1º¡‡B=rAôÐc‡Âá¢ÂB˲\NWùöŠ`0 …š¦aÛ&}yÃ0-Ó2 SQ”P(„1xÁá2Òû^|Áù×_ûMÓþØÉ^ÛÆ.»r%jhÐN9ÅŽ†í2ïeƃ1¶ Ó4MÞ#[¶ ‡ƒ¡DÛØ´,UUkvÖò<ŸÖ§O]}CssóÖ’Ò¸˜€¢(†®ËŠÒÚÚVYYI"YíeásðåÇ@’˜ÊJnî\sÔ(++ * íòS!7Ö1fY&66Að¬Ã!y½ßïç8ðá§ŸÎ_´¸ /ÿÿÛ;ïð(ŽóÏÌÖÛëwê š„Ý4›nqÁÝ8q/ qâ8Å)¿8ÕIì¸a qÜâ^p‰.`L7]4@$¡.ÊéÊ֙߃ŽClc šÏÃóÚÛ™mß}ç÷ýÞEʲüú’·Æ—^|qÁ°üUkÖ@eYž5cÚ‹¯¼*ÂÄñã1Æ++_|õ5¡s'MaÌèQ -NLð8póÖ­¯¼þ‡Ð¹'*Š2kÆŒ?û¬Ï륙¶^_ò–ÓéÌÌÌp¹\زB>¯ú긜N cŽã‚ÁàSÏ>§iúð‚‚쬬k¯ºêå×^ohlÈÍÎ.–þìYÏ<÷¼Ëåºrîå# ‡?¶ðÉßÝ÷«ÄÄDY–½^/ X$˶‘# 'ŽÿÛûÿhšfrrÒö;ß}ïŽCSÎÌ!ÎÁØåtZØø<^Y’8Ž»íæ_yýõ_n–—7kúô/7l¡ëŒA¯×+<À2Í™™’$}ºl¹Ïëu8ì>BhWfÏœQRVú›ûÿ Ëòm7ßä÷ù¼^Ï£O<ñóŸþ$1!AZfaAÁ´óÎ{ïƒvûUW\n·Û=n7èrïø}>žçŽÔîñŠ¢˜Ÿ—·s×.Q“’’®¹òŠÇžxòg¿ºïüY3S’“½^ÀépØ`š¦Ûí²ÙlˆCN§#=-õê+æ~¶|Åö;Ï;&7;[;¥”›l;‰Œ‰¢pE;@K³1÷r¢(0f½~Æé…aœÅPgI’¢j“u¸<9 €‡«¥“m&@ˆ«¨˜#GYŽ÷Le0N Lúg1†¦‡Ýáóù¾æèë‰CG mljô{ý²$crb„€¡£ªJINf›gLúg1cMÕü%hE±3ÔŽ„E±Œ›Å!Ð TU‰‰LúgLúg7Ã4Lã«gW} uÂ!Žà“1+Ñt †ÎUW¯—$&B6ÆË8`ÒÏ8{èÍ¥BH09åÖžÃõ«ãä€èª¬"°^?ã ákJü¤ù¯±;&}Ý$ˆà[uE/c‚ìZyÒ•|½¶Ñùngn"Ü3BD’è1–ô2›P?1È7H$›H¿&Ãç$ ‚Z4 `³‡vt€S÷‚Áø*NZú©ç%(K캞:Ûôx7Ķ¡+eI¢p{¾Bº…Lé6ESEØ Û,\Ðã ïùÐvÛ’– Š"¶,Ã49Ž“eQÓu@ˆ,I¦eÅÏøíµ‘Ýj§±Þb3z¾ ºíºïD£ÑX.­ø°g ‡ëiƒã ªr¥¥€î Íá‘ ‹BÇ!zŸŽ_¨Û¥Œlà8N"~õakÏ7¹2ì²2ÎNBú1!6YÞ_QqÿŸÿš˜ŽDfNŸ6ïÚk"‘ÆX’¤Ø“†Ô´ÃÑÊDQ¤1j„¼À#ÄAVV¦¥¦J’ ®Âqœ$ІibŒ‚†aÒüï¦ir’$‰®©«¯wØ>Ÿ'ŽP¯>MÓhŽ=ŽãxŽÓt]@ˆÚ]‡ ùi 5ú n}}½Ýn÷û|áH¤²²*3£?/o¾õöÁƒF†Áqœ¦©!MBiš¦iš<ÏÓPû4$€ ­mm–i¥§§ÑÐÍ’$B☂@(¶Røç_|©lÏÞää¤Ù3g|´ô“{îžOKæ8¤ªÚ‰_ÿeh°þ@@~úiâp˜cÇ‚£ýâã{ý–eyÜî=óìç_|‘’œbYÖÝ?ºkÈ A¡0Ç!Aè5¥±êb=I’è,túþE±£££µ­-kÀUUc.üGzýL¾g9'Óë'„ã¸ÎPÈåv=ô·¿BLË:tèÇã±+J}C£Í&#„:C!MÓú÷K'ð<_ßÐ`FF¿~ª¦u´ujšª?¾àŠË.?n, C&‚ªªe{ö&&øív»®ën·c+x½^]×ËöìKðûü~ÿ‹<øòK/q:áp¸¸¤t@f†Çíîèì …B@`À€•Uœ¬ºa@9„!%¥e²,§¥¦H’TYUF hÆ‚E‹tý5W—íÝ»pñS÷üxþ ¹4hs[[[ Ð ‡ææÐžcIi™$‰·Ûçóµ¶¶ÖÖÕ¥¥¦º\.úêzí7;‚?ºã6»Ý.IRUuµ$I©ÉÉš®„ÍÍ-uõõI‰‰ii©š¦Ùl¶­ÛŠ–}þù]·ß†²L«¡©‘¾™¬ŒªÑA¹¹˜|˜ÿ³ÀHÄ,,4ǃ--ñ6“X -º jjj:öì;n½¹½½#ª©MNNÒu½¶®Îçõvv†‚AÅfKLL¤1yö•ï÷y=~Ÿ¯­½]Õ4BȦÍ[¾X½ú÷üÔçó‰‚p$|Á§töƒñÝp’ñú1!¼òúÑhôp¶¬†ÆË/ýÞ?{ü‘ÿñô3ÏÖÕ7ŒÓÒRóË_,yç¿ë7n@æçåÍš1ýW¿ý]vV6¤¾¡aÉ;0åÜsMÃhniy쉅n—;--eÄðáÏüç…'yx_ùþ^yåç?¹û±…‹\.gzZjáðá{ËËkjëÜ.׌iS,Z¬(J8þÕ½?{ÿÃV®Z™Ñ¿º¦&oèÐ’Ò²o˜7cÚ”p8Jˆõè ÃpØí·Ütãæ­Û–¯X!BÞÐ!ùùe{öª­MHð77·T:ôÂË/ßý£nÛ¾Ý4Í'Ÿú·ÃnomkcÚÔK.¾( ²üþGÑ$\?˜wý¸1£Û¶o‡#«Ö¬kniþÁ¼ëiNð•«W¯\µF”ĬÌÌ믹Z;Õ‰Ï* Æ ÎBHmý± £cË4EQÜ´e ¶,ŽçgÏœñǸéû7ìܵ[UÕk®ºò·÷ÿ!;+«²ªê×Ï;fÔƒ<†±ÕÑÑñÃ;î(Ú¾ýÓåŸ<¨¡±±²²ê¥W_»õ¦ý>_ÌÆˆ-L02ýgœÕœä”B !»¢8]7n»ù&M×î½ï7?¾ë®~éé-Àô©S>þh}Cã’wß]µvÍ=óçÿý/Þº­hÛöí‰ ÷þäÇ÷ÿî·22~ù³{fN›F9ž×5­®¾¾¿ôYÓ§5Jà…]»wïØ¹+èPI’jjk2úõ›9}úø±cGuý5Wÿà†yŸ,[¾w_ùÐÁƒ7lܼqóAÎ7öO÷ÿ>ªª?¾ëÎYÓ§mܼY%Ƹ®®^Q”Ë/½Ä®(¯/Y¢(J‚ßÿÜ / ÌÍθy×^{ý5×Ìœ>mÈàAºÿ÷Cº®sÝ~ËÍ÷þä'û÷W¬ÿrCUuõ‚‡ÿ9÷²K¡¦ææaùy³¦O§v¤Œ~ýfL›2mÊ”û~ñó­EE%e¥ÿóŸî¹{þ;ï½ßØÔD#Ì|ï 'OœX¿q#/„éS§äææüü§w˲¬ª*Ïñªª¾ýî{6›Íçõ¾¶ä­ÎP蔇Â?[€'&r%%Â_§3ö à¨]1$Ir»Ýô+íÞŸÜýà#í¯8p÷î ƒÇýìîßyÛ­.]ºäíw‚>ôï]xá˯½ŽDF,üÛŸÿtÅe— ËÏûãÿýÎép†KÔea‹òlý ÆÀÉI?À4Í~éé·Þ|Óü»î˜›C0–%YUUE±8Žóz<²,Ë69‰"EQqȲ,I’©ªšjš&&„Ž‹¦¦¦>þð?5]ÿõïÿ …f͘þößÛ]Z2qü9~¿oÁÃÿÔtý7÷ÿ¡­½Ý2MšEÓ4§Ãát:ï¹{þè‘#¢Ñ¨ º®{\nM×yž€ áyþýóAƒ~÷‡?–”–I¢hW”ü¼¼_ÿâ^¥|MÓR£ªeY˜Žã!Ɠƿáú뮚;AÈó<Æ&BšÔæt8Ü.—…±a!‚  ^;È’Œ-KÓ´h4ªªj|âßXšÆÓ}FŒoÊI'hD¡¤¤ô§?ÿe8¾`Îì@k+ä?Þÿ×<ôô¢…<Ï¿ùÎ;kׯç9nÞu×"Ž{è±Ç^(,(YX¸lù ˲ǰ¼¼‡[p×í·Ž3†²¯¼üý?f³:oò¤§Ÿ~PnnaAÁÖ¢¢–~, ‚Óဎ=êÕ7ÞeùÂóç”–•mß!ËÒ„sΉ ôiº°°eZ„縶öö—_{]E›MñxÜ_xÁ'Ÿ-!1!B8fô¨7—¼ÍshάY ‰ ÷ÿé/¿ùÕ/8ŽÃ6-“ºñƒÁñãÆ}¶üóù?ý™a˜N§cýƫ׮³,Ënw@„è8öÈ….XøØ oºaÞ–¢m¿úíï4M¿äâ‹R““阳®õ mmí·§kZ´,Úl-1ÁßÔÜüŸ—^¾äâ‹V¬\ÉsÇq†aTUW'$$xÜnêhQ^Qê ËÏ·Û‡Ýþ«ßþßèÑ#¯½êªæææŠƒéO.—Ó²¬ªêjY–û¥§···ïÙ»OQ”ÜœlUÕ!N§£¥%à÷û"‘ˆiY^‡>¨«ª˜œ”8PYÕÐØØ/----PU]m“å´´´`0XW_ß¿_?êüUU·ËEiïèHJLäy¾¶®î‹U«÷ìÝû‡ßýv[ÑvŽCà xž§ <ÏÕÔÖ™¦™Ù¿?àÀÁƒ²,gôïOÝŠAhko/+Û“–šêõyíŠBOfG0èõxÚÚÚü~]}}$ÉÏËÛ_QÑÐØÔ/=-5%åtß!gÔɧ¦Æ=y2q»Û7m¢, @Ø3A#„0‰´··›–Å!äv¹LËJNJRU5ØÙ‰DrÑUs禧¥eôïG; Õ55~ŸÏçõ¶¶¶B„l²Ìó|0ØÙìHNJŠm%„ˆ‚h œD‚FŒEE)Ù¼±pÚ yøðÖ-[`0Èb·1N_3A#•°Üœ„„À0L€eY‘H$3#Ãf“ÛÚÚ'M˜pîäI@€úÅgefB£Q•çù””êÎÏó|þСºaPPQG‰ ¤ ÷–—767M™<9 ɲLR5f€”›ka¬ªšÃᘉ Æa¾å¡Ð7OЈ1ŽF£gZV¬P($±§ ªâŒŒè=÷ØùKç¼yæˆƼy`Ú”(â9ŽCšŽ4 Ñðj„Ø{ F‚q°£ƒ£ñ8Ýp„zµÏP×~:ü~B}B,žO(+C„ï¾›uüggb‚Æo±œo÷Ðθ6õ58ƒê~„Û?þ!:$nܘ1ïzãD»½3;;8x°étÞ2„P3Ñ‘A ’p¼Š, vF€®Vúè²Ñ¹\.»Ý~B -‹x<Òk¯‰o½EdÙ4|'yŒ¯„mfœe@M‹þò—ê]w)ü£ô þ…OR=õ Û,JD±™¿ýqóMÀ0!€CD/a¢ÆT[‡š›A¯Ú À„¸\f~>IJ„‚a( tZ&r|̧ë+0Mâpë×;o¾Fäé§qNŒD˜{ãLà˜ÒÏÜ–g"Œ!85%ò»ßÓ¦Ž#Ç57‹«WÛ6l‘hjóçë»vEþsÀq¨©™_¿Žß²F£À0¸àà«\§ðˆ8+ è:II‰Þûs+k°Ù€iÂΦ!]ããî–B€ EáV¯º¾çæÝ7ÝdïèÀL÷g½ûõ;ìŽÔ”Tƒy2ÎT ÆD‰Óy84«eAMšß²Õ>>*+=lí9’˜hi Bd©Ë;€Cܾ}Âòå ¦%טrž™ŸoaÌšEl6hYˆ”`‡ƒˆâQ¥Aˆªª¤—^’ÿùO¤(/ì7u†ƒãN,™/ƒqªø ¿~ÝÐUM5º<Œ3 *÷º‚]« @ 4U3:òþ{¶¿þ•+-OsÌó¼ópB"€8Äë#n7á8Ðë§-„°#ÈÕQ@(?ý´ôчâˆï¿8'&ê—_¹õÖh~>áwám[¶Í-„ç!c"IèÀåoC55†b ßwŸ9pÒTàp‚±1§žÞ{ý¢ &%%1égœeþÀ@ˆÝ<¼[À4'2M@ÿÇÙ†ç$Ä@€ ðMÍbÅ~¾®^zýuá‹/€®›.—:v,áy DÙ¸‰ |dÐQTçÏï¼éF’›»o{QvV*xºÏ£Oó½~Qm²çø“›ºÂ`œ! "‘#B@×½Œ8 ñ@ÇŒK!‡{èQø|8}ŠÆqÚW –éÍ7åÅ‹+Vöÿ!„¸ÝêH[MÓ˜4IŸ;E"²aq‚ÀÏg½K,D-ëõ3ÎVŽ3 JºfyP9˜&è耄ˆÇ½÷^íšk` ¨É ËÖÀ„?êi‚š[[ X’™;?ãLã˜>¬¿Ï`Â#IÁL¶µ¯S×O„в`[ìfÌAp`Áýg$̯Ÿq6£í[ÿ$=¡ÂékÀ0`WŒ #+YRÆÙ“~ÆÙ„ 4Z>õJ8‘°É'Í®Œ¢êOƒ÷ÏàÙ5¹—Á8Kù:Òoa €ÇˆG†1îò ö8õZZÏí»ýÔswê&Ñk„¸cA㯎®~ܦž^z=Q„L:ö¡ÑhƧ4Åq®à·ÕúšÚšP¸[X¿?ÁçõuóC‹?^ŒÉ‰D?%„ð< …›UMC*6[Jrª(J–ÕýÕ°ßÍ3§‚“–~„Ãá@ZŽD"ÝzF!šf6¶†úÑ@Ľ>„Š¢èº†1éõ'MÓAÄ|¶Ûž"‘}ðô¯J\N±Ùl–eß]õXM=ÁׯWòMÊÒ³o” ÿ›MUÕ^³·Ó 8ŽÓ4íÛ:Šž(Š¢ëº…ñWýµßC4äõ¾ò½w`î BáPeåÁÎ`03c€a±{CEžç#‘@–¥Xú„ã4I„ƦÆúúºì¬ì´”DBÈÁêš={Êrrrív»…­Ø¸BÈnWÂáAhWí·.ƒq†ÃÝrË-)))±Øô<Ï·¶µŠ‚èt8-lu{fB‘HdÓ–­¥e{EA ŸÆô“9ªªû+x½Mi*Šbm]]KK‹Ûí¶,‹>ö4Q -|ï¾}Š¢P}ýD—÷ìÝçv»ê‚Á Çí¦ÂÁqÜ®ÝÅÛwît:œmííÁ Çíîj@èpî«ëË€"ðüþŠ ]ÓhÔ-”¶9ÖŒ± uõõ­­­^ïáLtK›, Ãä8D}Ÿ@¯˱åX™4Ñ.ý‰+çðú®râ3¾Ò…x¦G­iZùþ ·Û!´0¦þë<Ï·kׯç8ÎåtƲĪæ8®µ­­®®ÞãvÓl6†Ù½öø£ˆ½èUèÖ’X;i›éB¨lÏ^Qh2äø,†ô<Ä΀ã8Y’TM;)õ§½ò²=¥‰‰‰C‡ å9žã8‡Ã‘–šVq`?ÐårÑœ?ô VUU¥&§ UVU7·´øý>šW½ëSà¨cç8.8P1vÌX·Ç·¥¬©-däåfJ’´¯|ORRr¼î‡Ãá;wÓ¼]–e•íÙk·ÛAˆÝϽ¾c8Žkjnr»Ý¢ ²t›ŒÓÇq'ñbŒ%Iª>tèO<°mûö×—¼õÄ“‹-ËÁçõz·Ûív»?ùô³>ùÔçóÙívú„x<ŸÏ+Š¢a?¹¸¹¥Eç÷z<~ŸÏår†ñè #‘è'Ÿ-ûøÓÏìŠb†ËåܲmÛ^z¹lïžmÛ‹–~úé'Ÿ-³Ùl‚ øý~·ËI›êt8ü´:Œ±ÝnþÅ—v—ø|>I’h.¿ßï銟îñx¼^Çãùä³eo¾ýŽÃnw»ÝÇY–åv¹¾X½úPMMRR¢a˜²$%øý.§3þ V%1Áït:EQ¤9„n·;ö“Ãáˆ/Ç4M»¢$úýôUd³Ù|^¯×ëu:^Çëñp]†ôU—`YÖ‚E‹Cá°ÍfKðù\NÇqãÇžXX¶go(òù|~¿OQl°«jA¼^ï¶¢íϽð¢Ïç[±rÕ¡C5I‰‰ãøó; —Ë™à÷K’Dq»Ý^¯×çóIâaµ"„8ìv¯×ëõz9„<ÏçxðøÂ'Û;:ü~¿Àóô ê÷ù¼^/}CÐ3æp8dYnjjZúÙ²¤¤¤ÿø ºßÖÖfYVfFf82 Í4õh4‚±•]×PëF  Ãøóßþq ò !äÏû{}C½Ýn÷ù|n—«ç½AOêôô4Qzmã««>ùaÙ‹ïHII²Ù”†ÆzAè]$‰bCcã÷o½í­wÿëv¹¢Ñè?{¼¹¹E—óÈ©;ÝÏ5ƒqBœœÁ`a$ŠâˆÂ•«V/[ñÅ[ÿ}oÇÎ]C B!„ÚÚÛ[ødG°Óãv›¦)I’Ûåv¹Ý ~IYÙãO.Jðû¾X¹êÕ7Þ”$I„ƒ+ÿü·¿§§¥Ù„ðå×^ooïØ]\¼r͚Ʀ¦?þõôôt›MFyÜ·Ë•˜°cçî_y5oèÐÿ¼ôòž½{·­]ÿeÖ€>ò˜ßç+-ÛóÎ{ï9ìvŒ1!ø±…‹LÓÌÏ !h¢Gš™¹jõš>Zšžž®(Š×ã1-Ëïóõï×oñÓÏ—¼ýßÿB„JÊÊ>Zú‰$Ɇa¢àv»ÝnWRRâªÕk?ýLÞÐ!LÆÄ&Ë/¼üÊšuë½^Ï£ î-ßÿÚK¢ªÊóüÂÅÿâyc"Iâ»ï}°qó–””ägÿóŸšÚZY’é´,kÐÀ6›mÁ¢Åuõõ>ú ¤âÀ§ž}®lïÞÇŸ\ä÷ûV¬\ùê›K’’“é—Í×0÷[¦EGkh¦e&.>ÇqmmmW\~¶ð®Ý»çßyGeeå‚EÿêõÞÀ‡ Óâ ¥ˆ°-d†¢†S[–eÅ»äÓôýÒÒn¼aÞ§ž¢Z²$½ðò+kÖ­óy½<þÄ¾ŠŠØwƒq&s’O „§Ó!Iò—7ÞvËM­­­{Ë÷µ´@k[›eY/ðŸà÷×ÔÔ†4U–—7sÆô fÏúï”–•;ƒµuuÁÎPTUž—$‘ÚˆEQe¹²ª ÒÐØ(¢$ŠBIž7 Ãëõæäd ËÏŸ3s¦,K„§Ó¹¯|CCcMmm8®©­+,(=räÖmÛìvm5€ã¸1£GͽìÒ™_nؘ–šZqàÇq{÷îÛ¾sçïºëš«®:dˆ úY]}ý/öS:Þ›••= sÆÔ©çŒ»üó#GλîºÛo½yíúõÑhcœ’’áœs®¸ìRºý¹“&¶´´Ð¯™+ÛÛÛï¹ûÇÓ§NMLH(.)mllª©­í …š[Zòó†&'']zñEÙYTMmljÒu½µ½-1!Qày—Óér¹èXAÿ~ý²dΜ>}ô¨Qƒ 3zÔáóCÏsÁàÖmEwÞvËæÍ\úñò_Ìš9ò,Q›š*,ß_ …xž?TSÓÔÔ زu[UU‡¸y×^CÏ&„Ú‘RSS>ùlÙîââòýûóó†­¡Pgg§¦j]—†#‘¶övLpbBB×¼[–å–@kū׮íèè8oò¤º†úµë×´ô‡ÃqÞ¤IE;v–””~¶lyVf¦,IUÕ‡¶lݦŒUIJ,·Ûír¹7nÚ q¹\n·×át64Õ—””ädå’££%"‘H$$'%¹èëåÞ !Ã0²d×××íÝ¿ïºY¹±ð¯7:odö¦­[)))G¼Â ´°UÕH$òã»îܵk÷–mÛ|^_jjÊÇŸ-+..)ß¿?hžÎ‚2ÎNÎǺC´µ·åZ0,¿¨hGZjêØÑ£>ýlù®â»¢Œ(¾«¸¸¦¦æÜI“6nÙÒÙ–Ÿ—ššRYUµvýúŒþýo¸îÚ™™6nÚ²m«aš£GljnÞ°yó„qãQ´+JsK hLJÝ1iâŽãÖoØ0õÜÉkÖ¯OLHÈÉÎ&„Ô×7$$$øý~Ã0Î;æ£?>lØÐ!ƒ?üø“}ååY2Û;:ž}þ…P8tÉÅ 8Ð4MŽçëëëVV®]÷åy“'}ïâ ;:‚›·n…Ž1bÎÌË¿øbíúõi©i‚ x½žë®¾jé'Ÿfgeù}>˲’““Ö¬_oYÖÅ^UÕ¥Ÿ|jWì·Üø}žç9Žkhjzþ…VVΜ>}daajJÊÒ?ÉÈèù%—T8ðÂK/¬¬œ1mÚ¸1cükÖ­³°uñ47·|þŪC55yC‡F"Q—Ó907§²²rÜØ1’(äçG£Q—Ë™’œüÞVVW''%]rñE6›íÓeË÷í/ï߯¿Ïçmll;z”×ãÙ_Q±gᄂÄÄéS¦ „þûþ¦e8pü9ç¬^»Ö4Í9³f~þŲ,ž}áÅPèÈùAå Z´cÇú g͘>å¼sË÷WŒ9‚㸖@ëØ1£é¥¯>t({À€þýûgfdlØ´ióÖ­–eåç ­>th_yù¶¢¢+ç^>sÚTE±}òÙ²¶Žöo˜7n̘h4ºôÓOvûæ]Ÿ––VS[»s×®Ñ#GÑñöQIúLMImii)-+mln8Py ¦æPEÅ‚‘‰ ‰1çN „çùÆÆF»bÏ2ÄëñH’øÙòÏ÷îëyoäÒAŽãR’S‹‹w×Ö×;Z[-e{öZ;f\칇‡BÁÎ…Ã].WzZZ Ð:uÊy£GŒÜºmÛ—7Íœ>}úÔóTU¥nfñO óðaœ9PŸÞƒ6Û{jrªntw§_Ó¢(F£Q€ÝnD"¢ @„ Ã@™¦)Š¢eY<Ï©ª&IõAÓ4Y’‘-ASUŽçéø!–I‡L9ŽÓuÝn·ëšŠw7¤²$á.ß êÅhš¦$‰–…1M–!!„`,J5ÈR¿~€eš¼ ¨ª*Š¢ªªvE1»Ü:uMrMÓ´Ùl‘H„:ˆ‚ J’®ë†aÐr„QU¥º@gºn³Ù¢ª* Âoÿðǹ—]:nÌ]×9Ž3tݦ(Ñh”çy©«»¢hºŽ4M‹~^躮ØlÑh”„õF'„Ȳ À‹‚ŽDèŒ1„D¢Qç Ø²lŠ¢F£‚ ¨šf³Ù0Ɔa‚`š&‚ ÷8?<ÏÓ ‰ªªÍfÓ4(I½Öôš¦©ëº$‰/hšF¯ ¢(¦i@!B‘HDQzÉbGJºÎÆXQ‚±zô…"‰rKKó¡šjC7œ.Wö€lAzÎÕ ·qÌ£ÿÈëíÞqSy:ÔhFˆKMIMIIÑãC5}óB$Q”$©3¢«±S×½Ù„ˆ¢X\ZœÑ?™‹Á8EÄ‚6Ÿœôƒî³%϶%€P÷gZÝ !DŸº’þxû.o¼Øö±)9 ËÕ½gÕt &vµ$Þù½×¦ÆO¼ŒUGÛQ×{¥×Ýã÷÷p=º1'îX›MÓt:[¶n{áå—yðñ•9Qqåô<ñ›iyÜñÆ·¹Û.ñç-¶% ökÏÃìyŒt9v~@É«´ñÝ®`üiŒÕ;E½þùõ&ÁÆÄBhYXÓÔ^¯{Ï»ôø÷Fü#ÁóÄ0Œ^gÿÅKý»8Žëvêz}Ò˜ô3ξ"^?!|¬~Y¼Z^G$8¶ÍáG®K @¡ß>¾.Lº?«ôÕÒUבfÄ~ê¹}|uà許IIG­ìz{u;Æ£êê!GÚŒ1BHÓ´ää¤{~üc@ÌV“ã^Ëé¦ËÝNl·ãíÙ€#ïZÁ½Êqü‹ùXç§ÛEé½%G¿êâ7>~ {þùµí†aÄ:ãÁØ]qü»ôø÷F MÓè§@ì wœbAÜkµçÕŒ?d‚ ÖÏ8Ó8fªY–BlÀêä £„¡±ùÉŒ¾ !D%Žã˜ø3Î(z‘~áÁªƒííVœÇ4ãÄ9–‚Ñ7Aµ··göË<Ý a0Žpt^! ÃHKIs9]‡Óœ2Œo!$Á— Š"3ô3κ÷úi ÃÂénƒñ¿!„}C3Î(z1øB Ã8Ý c0þ‡€,ã)ãÌ¢÷a^fªf0ŒÿaXŽ!ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>“~ƒÁès0ég0Œ>ošf(2tBxºÃ`0ŒS!D7uÓ4yžçŠCçu&ý ƒñ¿ !DEžç™Á‡Á`0úLú £ÏÁ¤ŸÁ`0úLú £ÏÁ¤ŸÁ`0úLú £ÏÁ¤ŸÁ`0úLú £ÏÁ¤ŸÁ`0úüénƒÁ`œ¡B¾³ºh<…S]#!„˜ô3 F¯@yŽßU€˲<j5™Â#0ég0Œž@MÓ¬iªÑu œzùç8.%9ÐÐØ@ß§BHRbBˆI?ƒÁ`tBX×P§ØlýÓÓ1ƧPü @…¡šº@@rR¢Óá¬@ë ä@§õRïÝ0xž‡†"!Žã$QŠ÷ì¤.FáH˜Cõç! !„cÃ4EA ó u®Y»–ùõ3 F/të BLÓP Óà8ÞçõR‹ !DIé2„Ðãò`‚ !˜`êÍI²Ûí´nÕrT•âèL.Lˆ 4Ô¾ÓáŒß7~¢@üO1ï~¡,J˜Äê:ÜígÒÏ`0½ÒÝrd–„¦i¦§¥4MŸÒoU·ð‘ðËñë{ tx’×á…Ãëâ\Œb»'¬Ð±~ŠÓý#%2ég0ŒîP‰„ÇŽàfY–×ã]3{¿Q]GŒ6 ~ð):(„ `ÒÏ`0=A"„¢Ñ¨ÓéÄ÷:J•TøfyµBUÓ €UÓ¨#æ·>ôzøe@$E‘I?ƒÁ`ôB¢?±¡±±©¹ùTWD3‚%&$*«ªxž?U-Ó´Û>¯I?ƒÁ`t‡"ËrzZ¿ï&d,¨ƒ]±ŸÒ !6›­®¶ŽI?ƒÁ`ôÂaW™ïÄë=^îOi„˲!Lú 㘜ºA×Ó[#›ÍË`0}&ý ƒÑç8¦Á'fç:u ‚cyd¾Ý’1!±i= M´;‘㊥¿a0Œÿ%Ž)ý‡ƒã®š¦gª¤'+ß4f…$Iز¢ªŠ»’Ð÷ÔYŒñÉn“eç„ãn!ë!<ÏÛdYÓu]7ޝê4dÇw3¾Ï`0ß%½H?M¼ný—­mmss2ú÷Ç„Ä"Åâ Ñ-yžE1 Q_Tº>>}%®¦¯‡X¸ IVV–”–%&& ¯¢ªjKK`XÞÐÌŒŒÞq{Fÿþ²,ÛQ¼^b³Mrnmm­ Š„¿Ã]·ßÖÞÑAÍú¼ \{õ•ÿwß}×\y…a˜ss¾?ïú‹/¼ ©¹¹`ذ´´Ô›~pCqiéÁƒî¼íÖ;o»uÅÊ•¦iÍš1ýúk¯Ù¶}û•—_~ëÍ7wîd„ Ý®ˆ‚0eòäk¯¾*7'{ß¾ò­Û¶ýø‡w]{õUƒd¢Ï`0ÎRz÷ðy÷ý÷“G_òÎ;õõ 3¦O{mÉ’ÇŸ|òº«¯Ö4½pxÁ°ü¼ûþï÷€€‚aÃjjkËÊöÈ’ìq»æä\4gŽÃáˆF£áp$G¢‘H$  Ý`Œ%IÚ¹kwm]ݸ±c²d665™–D7oÙ’’œôÜ /š–9}ê”âÒRÃ0ÚÛÛ7nÚ<~Ü8Ó4«««ës²›ššUM›=cFÞС¿þ¿ß{Ý¿ß×Ñ5rDTU€ªªZ–…´LSÓµP8Ò †ÂaËÂÑh´³3ÔÞÞž™‘ñþGÇ=²°ðµ7—lÞ²-oÈË.¹øãÏ–UUWOž41‰‚P\Zºukц͛÷–—˜hm0þœ@ `fÞÐ!UÕUcG˜›ÛÑÑñÞAxÇí Š¢ ËË‘±iË–¥Ÿ~&ðBB‚_Ó´¿_±Ù †í.)É2dò¤‰ï½ÿáÖ¢¢ºúúÓ¦ú}¾Ø©c0Œ3:ÌÛ{n^E±©Qqœ ápØår½ÿÁ‡;‹‹ÿ›ûB¡°ÀóáHDQ„iš´ƒl†$I–ié†.ÍB©iµ†ÓÍt]§ó$I‚hš®( é•$‰ºô‚F9„l6[,tµ®ë´4݉F]N§išÇAc -%Iй~bŒAÐ4ã8ŽC†aÆÊ±Ùl¦að¯k:DˆÖÎó<=džç©ß'u*Õu]–%Ã0â\.Wmmí½÷ýúO¿ÿ¿ô´4–Ö˜Á`œ-ÐÄÂ;wîìÝà E‚–iP]Ó4mÙŠW\vb˜¦,˦i „‘H„zÜG£QêüN³¿G£*BP×uºY4¥Z ]…Btߨ*Ó€p$‚ŠFUA¼²‡ÃaZŽM–éJêhÓ_UUc!Œª*‚Ð4MÓ<ªápB¨t•`š&õ¥¯«ør"‘¨ÍfÛº­hͺuMÍ…i©©L÷ ÆÙHïÒO3xA!:¬é?¸aÞ ÜÜH$K!“¼˜É;¶@:\HÍz][Óí'ZH¯»ÄÚÐM|»ý‰`ïÍ8ü:úÀãsw+‡ã8Ó4³²ÐšayyÌÔÃ`0ÎR¾:h3 ~0jÄj®9Ý >`Œ=n÷¤‰!‘Hät7‡Á`0¾&<è‘E¾WbVÓÝàÓŒa1; ãì"¦ögAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìg€EÚÇ«:÷tOØœs&-9'Á1ç|zç{Þyžžžg8sΠbÎEE‚’$JλìvÙœ'wî®÷CÁ¸*p(õû³ÓÕUÕ5Ýÿ®ðGì|7vÿü?ô“C€Ÿ?ú˹ýï#Ž ?J?™ð!ün`Í¥i€Â, €ã8EáC|ôÐlŽckWŽã8޳—LS…‹·sw~¬&¸n4EC­ðoN|çã{þçz'!&v‘®6áXwç)Š¢FQT!žc¶m¦EQ»² £¨*˲4E,˲l›cÙ};Ý?ö¾!QÕý^G)ª  äyŽaÓ4ñÔ&N ªË2Žã8áü÷%ÄJ†i;¶(øå¤¦ƒžã„Àž·ÎÄÞÝ_7ìuˆ@8XðóÅ0 EQº®xžÇv›{­c·:ƒö@n;ÂoÖeÓ²ÞùlúÌ‹t]ïSVòð·Í_²üÉW^E1Uz<ò¯¿ÿé_÷ýãÆkúõ*ƒÎ_¹fúœ¹OüûŸ<Ï!Q4m€ç8Ý0hš¦(Dé†!ð¼ƒiš4Ei†ñ÷mëè”äßpé…9™éB†a,ÓŒ(ÊÝ?û§Ë.Ü\µm{mÝ=·þYUUQÚ-÷†®#°«£®ë’$½3íËϾ™ýÈï×»gskÛí>^Z˜ÇÍ×±4CÓ´cÛ†i², ! (Ú2M˶Y–pKA dY¶mÛ<Ï#„t]§išç9 @H7 ü.# Çq†©kl †Ã}{”VoØïóæd¤›–Õ]Û÷–~@&|¿%¶ãH.×÷ËW|üõÌÿÞ~kfjÊκz@8ó½ôེaP4 SÕ4Û¶!€†aäçdwêD˲šÛÚBЦe¥§!„jë²ÒÓü n–e³,“™±£vEQ)ÉB€Nදé׳Ç<ùá—3î¹õÏ»ƒ¡PAN6CÓª¦)š>¸_ynV¦ãØ€Šêí4E1 ã8NVz„p[M­G–}7À4Í@(üÙÌ9ýz÷ürÎÜšú†â‚<`csK{WWb\\FjJcK+rœˆ¢¦$&ø¼žÆæ–ö.bœ/=5…‚°¾±YÑ4–aâ¼^ŸÇ]¹m;ÏqùÙYm*·š¦•WÞ£üd‚@8 Çahº©µmÊ»ÞxÙEÂßzï¦Ë/ÎÏÉÒ £»á~¬¯ÿc¯ÿHWžpŒc[VzJrnVæ×ßÎ9xàè! đ7?™¦(ê€>½FHAˆ²l‹¦éª5_~;¯WIáC/LxÞ ö.-ž8zä£/¿úÊ#Ìþ~qõŽÚ1ÿÿÅW7^vÑ‹o½wÃ¥æd¤ë†á $pÜü¥?lª¬ …#gœtÂ÷ËW¾õÉç,ÇÆ{=7_y Ã0,Ã,]¹fû®ºaýËŸ~íÍíµuq^ozJòê›úç­.Q¸ç‰çþyÓµ‰ñ>€¢jÃöS4mÊ»VlßqâÈa¶mÓ5}ÎÜúæ–.àÊóÏY¸|emC#Ë24E?ôÏ[¿únþ®Æ¦NàÚ‹&iš6õÃÏ’âë›[þ~ýU-mßÿ°’¢àYN,)È{öõwò²23SSÊŠ ºÏn„PQÕ¡ýÊ#Š2ùÝW_pÞˆýEÝטCæú ¿M×s³2Ÿàß –­X°|Åô9s¾ãï,C8–µ8›ah|#r,Ë0, ¶€ç’³OOŒ{ô¥Wû”•Äy½ÇJ.—í8ÇŽjhi¹ãá'o½öʆ G",Ãà5UÓL˾ùÊKú”•üí¾‡'6ñ´ñ'üßœ1w¡[rÑ4 y~ź[wÔ<ÿ¿}^7„ðÖû^½a³[–ÒR’ôî ‡½Ö4Í´¤ÄƒüåßÜyó ‚«7lB ØKõöùË~X¾f=„`ÔàŸ}ú wÜS¹mÇ Ã‡¬\¿iñÊÕ³.…#—ž{æ©ãÆÜöÀ£µõs—,ëß»gk{ç'_ϺóÏ7$ÅÇßuËŸ2R’£ŠB–Ž ‡†ã Š¢\¢`Ù6@@xŠ¢í媻Ÿ¹þ#]s± Bˆç¹m5µ[ª·Ðc™Ç'OíèêBÉ’ë¢3OÓ ƒ‚Ð0LÀ®Æ&Éå¢)¨j:Èqƒ!Ç2,ð4ã·×Öµ¶w ä Ç…#’Klïê2tOýTM»êüszÙ–¥hš( ÍmíM-­ŠªúŸmÛ{­âþh9½xñ⚦I,|¿)!†¦„aEy^äyÝ0!ð£M ¶²ÿÉ­¸Ûzsw!Š¢8–Õt¡iÇq Óä9ŽcYÝ4 ÃàXŸ‡ ±¢±­›n˜’K0 ›A¼ (ªŠ )(»\÷=ó¢Çíþû WCalfŠŸã8p÷7ˆc¡®`H–\ôžq5¾<éÔ É.CÓ¦iº\â®Æ¦ûž~á¶®Чw[GGTQ㼆¦(òðþ7B<Ç1 U€Ë%Z–mÆÞþŒq·víZbáCøý°lBèEÇqUÅöïÝF£ÈqMA~”lw‹8!DSÐqMÓhšÆÓâ<Ç!„Mc(Jà8{Ï\9ÝÍ5  i!CSŠ¢bûyœ@à ¤( MÓ9<Ç®ÛR±zãæÇîº]×t¸>„ „«mXa¢Ïkw7ãJZ–!Hðy-ËxnÚÌ9?¬[!5¨¼wiA~(’].¯,[¶…/ÙqÈÓGø_Ñti¶ç‰D¸?‡ùŸr sý„ß „Pl%s¿7žmïçV´÷$‹µm»{€ýÓÒ½쵋¿Dí“À¶m„€eÙ¢®»øüÜŒ4Ý0ö¤?÷ü8û,ÌâJ"Ǩš6qìȲâB—(åf›¦°·Ú/^2pü °¿ý~Œ;É„á8B`˜fI^nï’âH4z¸žÇqd—«ÏRÛv4MÄk—päø‰…Yæ%b膡j:MS‡ñ¡°,+lš`Od!ò¸Ž ?Zø ¡;ØŸàðæ¹W¸áˆðc¯Ÿ¦i’ ByŽˆúm’GîsÂñÌO¤Ÿã82×Ì!´-Ä0ÌïW*–m~×B¹Fí»L 'ü¸ÌÛÑÙ±~ãzâ>~l!4M3#=ÐÑÙ~û·<ÐAˆçøô´4ä ÖöÖÝñcÁ‘éþC@I’’’ŽH„£ÆðÄûâ-Û‚¿ƒ$~w@,öw´oÛ±¢¨ŽÎŽßzúЉ„}>_fFæîÁå‘»Ç@4Ewtvttv¤$§X? fK W0EÉ’,Ër7;c±Ã0š®…·…šA˜†%ŠB ôÅy#‘(Ë0 ÃD¢QŸÏeI²,Ë´,Y–þCL „xž$¡¹µÙëõÆÇÅkšFAê¿–CDQTbBbõ¶jÒË!3àmïöGù¹`ït‚ŽIðB¾(šbY–e–e“’!€ñqN&Š" )1±û¹ÉÉI€ƒJ#ˆ011¾£ËÏYDZÈAøsàžWÄá ‰ìŽ „Á`ÐqœýÜÕñ‚ â~Õ÷âéÛàßHQT8IJJøMç^@”ä$ išîv⥨#Ùë8Žs„Ö„Ã ŽÆ³eËæ®@§ä’öÌâþ‰Dzõêç‹Ûwzsÿv1'/Š¢ÈPàØ†f|^/Mí!îµúá*oÚÙÙÅó<DZX÷c]_Þ0:ÞÛv¯·E÷§¥ tC::„cü tvu2RÈ4-,×B mÛÉIÉ«W¯òwu%%&ï;ŸÏì7GY–Y–Då—ƒz ]9B÷cûþHÓ4O"xžÃ¡.uÃ0Mó—‹8¨wEQ²[fhÆv,rv›”9ŽãE!MÓ(êg=fB‚ @UUíî8NìË_8÷—j)ä ¢ü„cÜÇ2 ½½³UWuЦ EA–cÓ4!)ÀÏìÒµW^,Ë~¿xñ†›ÇŒgYMÓ±—í88x!€P]×ñ÷x¬!ìþí7ÄoþɆaà–Ƕ4û±`€¦hÓ´šÁgÕîÚµióŽã{÷ê‘’œ¼×û,Ç:ŽmY6™¹ïýc!øÎ  C1 M#äðrŽ+»zíZQ‹‹ŠpDY|€‚«9N&BEe¥a½zöŒÅédY¶¢²Ò0Í^=zÄî:œ®¶í8 MãLºÇ,Œ­ƒ9€Ä,!K@„MÓ<Ë3¼@Ó´­M³¢K‹„9–ÃaÉ÷ËOäØqY–ç/\øÞ‡åçå565uttºÝ²,IXPܲ ð¸å¸¸8I’ž÷ýUõy½Žã¸Ýî8ŸÏ%ŠŽã¸eÙçó¹Ýn¯Ûíq»Ýn7™8ú iº³««ËïÁ²,Aºü~ °ïº?fè„„xHAQ››§õMNN.ðþ@Ð%¹Ü7¤ ˲›fhI–|>¯$K¯gŪÕM-­II‰Y–¼>¯,K‚.Éå‹óÉnÙíq»Ý²Çãæ8ÒåM×ð»± ˲DQüjÆ7K–.xÞ²lÇq$—+Þçs¹\ØÐÀãñÈ’$Ëò‚ï}ýÍ,Éåò¸ÝQ<Ϫ5k¿™9‹çyQããâ\.àñ¸ñè3Îëµm›¦iY’xž÷y½nY–eÉérvÛø| Ží$fdºM»}sEkW ¹©YÙ¼%7+_v{Çþ¹1îOzý!†¡[ÛÚY†=í䉓Î=Ç2͹óD¢ÑsΟﲋ/b𦩄Çã8’äzÿ£9~òÉ+/½Ø³´tËÖ­7þù/W]~ùå—\Gv¶öŒùhŠnélKMIfYNÓ4M×KKŠ&Œ?ÁÐ-••Û¶ï¾èüI¯Îøæúk®ÞYS³iË–Ô”Ôõ6vvuææäL:çl<€"Ý'3 1‚Ú±£zÊk=ÇŽµ3Ò¹P¨ù“ikÖ®s÷=êõS …Ï<í´üü¼+®»áÁGëòû=^Ï'Ó¦Ù¶=wþ‚P8¼jÍšwÞû`Âø““’2ÒÓÓ3Òúõí[Z\üé´Ï7lÚ4lÈàg_|±­½mñÒeÏ÷(-}óÝwÏ<ý´UkÖ,]þƒ$I6q>¬@UU;ûŒ32Ó3þò׿}7Á_þú·ÌôŒS'NPUm?>4ššÂ0Œiš=ËÊN;æå)¯=ñôs5»v¥¥¦®\µ& ï¬ÙÕÜÒD?øø³ýú&%&ed¤—÷+/ßRQ¹técFŽœ¿pÑö;›üัcfÍþ®ÿ¾E‹—ʒ̱lW—_Q–eDZÛ¶í=ÿÛ–e†ÉsÜô¯¾ž¿ðûqcÆÌþö»ïæÍûð“OCáð§çóvÕÕ?ýÜ yy¹ÕÛ·>ýËóÏ=§¨ ¦©/¿ž1áÂqcÇ~3kö²–o©¨X¿aã¦-/NžÒÔÜüíÜy~ ªºº¢²òܳΜ5{Î–Š Žã,ËŠ­6“•^Â1„pWuUÏaÃÀǯ_0¿êµ©e¢ ºÝ- »8žÿ¹Þ6µWŽãx½žßyÇ«/½U¢>úØð¡C“’’æÌÛÔÜ2nì˜þ}ûžuÆé3gÍiimËËËIˆ‹7vLzzú†M›TM«¬ªJLLÔu#.Î7xÀ€Áæçæ èß¿¸°0 ÓH¯ÿ°!´mÛëu?ÿôS9ÙÙ—]uMNvöóO?åq»÷rÔÀ]]𦣑(Ã04M34sÁùç>úàýe%¥¯¼öFbBBïž=֮߰sgÍàrss.:Òê5k¶ï¬IJLˆ‹‹+.*êYVZS»Ë°ÌêíÛ}^/MÓ¢(æ—egeæå䘦Å2  ))Ñëñ"ðLËnå…PàÉåâ~õÚu§žéÄq×]uUjJJGGg(ŽD#þ@@×µ`0dšÄoþ7B¨iºK~à¾gŸ|ìáîs‰‚¦ëû·ð¡hžã)H‰‚ØÐØøÜ “—.û!$'%# 6dþÂïÛÚ;z÷ìÙÚÒšž–:xÐÀ/¾ü:ºDqù+6mÞR”_ ¹\ýËË'}Viqq0ŒD¢¦aƒ!Ó0£Ñ¨nè ò «k:^Þ½xë Çqªª®]¿áÛyó-YZVZ½{UoÛþù—_jšvÉEæåæ$'%oØ´19)iü¸qõ ‹–,‰F•¥%†iäåz½^€P¯ž=#ÑhNVVjj Ùÿý·o2Îó|¿¾}B†iîeOEÓ´¢*­m­ñññY–¥iZQÕµµõõ nûâ 'AŠJNJZµzMVfÆèÑ#::»¾_²¤±±é´S&ä§§§666Ó45lØáòVvúý9Ù™Ç'&ħ¦¦Ø¶]XP@AÊçËÈHèºÁr¬mÛ<Ç{<l< !T5­¹¥µ©©©¾¡ñÜ3ÏbXfŪUÆ ùyUÕÕë6lHOOóz=ñqqçžuæšuë‡ ˜0oáB¯ÇÓ³GO«éÚÊÕk† râØ1EÑ Ó¿oyIQ‘í8CÊÊÈGÂ)ÉÉY™‘H$/7×çõÚ¶ D©ºêõzI r„ðu»j2 ÕM›è©o•öèYiÑUZ׸ýwz\}Mkk „0!!±»½MÓ­­­ðÝ÷ß1|DB\‚i™x)Ì%Š‚(âÀ¶¡Pˆa˜ÖÖ¶'žyæ?wýK’$–eyžGŽc;N4EQ’¤H$b†ÇãÁ&å‘HDr¹tÃpÇår…B!#HÓ4ò°ývÄïì3órs±¹î(G"–e=¦i‘hÄãö° ƒ …Ã<ÏUUõz<¡p˜çyš¦Â‘MÑ–m1 ÛÙÙ!ËrVF–®ëø“$I¼Ü †\¢Èqœn‘H„aY–Ñ«lÂçó…ÂaAš†¥ëº¢(n·›cY|Àëõš¦Fãâ|†aF"·,#¢Ñ¨×ãÑt’â)Í@(›•‹oø#ý£‡ˆã8¢(.^²¨ÿþ¥·ý÷!!>^ºæ*ÔÞÞõÈã©W\‘Ê©«V­`9¾¨°(¦½øÁß°aÃÞvý¨¢D¢ÑØ7n·{ñÒ¥Y™™)ÉÉÁPÈqUUqJŠ¢TUF£x¿¿ßO¡i: áŽg  i:CbÚÿ!ü¹@N1hšÎÌHÇ?„mÛ1‡)·$¯]¿¦é‚ü|˲BÁ`›1 ã8Ngg'EQ,ÃF£Q!MÓx³Yü‹Ó4­ë:€¡ŽcÛ;dIfY&6Ù‚Å7 \.MÓ`0æ%`šfGGè¶‘!EQmíí8瘫MÓ@ v_MÓ»?„ÂaœW @íqAˆÅ2"F>„?:E†©(Q˲$AèùàƒÛ··×Ô²•÷ôÓq©©¶e™–eûwÕdö›c÷?£‘ÈØÑ£AˆD£øPw}¡(*–¾û÷±ÏøMDÿ(kbkk[fF€ÀqlÇÆ¾T¶í”24ö„vp‡¦hœ ¬ÅÐvš¢qĨ}Ò „N“‘–NÑTk[k÷ýŸ±^Çnüg÷¼ºß~x”€«×=öC÷PÝÏŠù–Ç&sÇ¡ö|ˆ…á˜Áqì䤔E‹¾§ …Ãò SÕÙÙ™’˜hëhÛ=És%î^À9¸\® 7~öÅ—_0©´¤Äqœ>ú¤­½ýŠK/áy>¦ï81ÃЭmm3fÎ:픓SS’ Ä{8ÒmH 0ö#ýx^EÅÍÿºç?%ÅE4M¯Û°ñ¬3N—\.Ó² ÃE§dÀ²ìòV<ó‹/>ó´×+Y–Åó<@Ó4Çqܲ !Ä{rSe;ŽªªŽƒxžÛQSûÂäÉ~×+/½¸qÓ¦y4=-íüóÎu»Ý.Q„:ȉFŽã<OcSó´/¦<¨¨°@× ¡¦ixŽˆ@8Ê!}ÂQÅ~¤Ÿ¦i†a%—ÔÞÞÞÜÒrë-9eÂI ÃtùþÛßÏ<íÔ3N;í•©¯wtvŽ>ìÃ?‰*ê5W^ñå×_WoÛvã_n¹êòËòóò^xy²ÇãþËMÒ4ý•©¯;ŽcZfYIÉê5k n¾ázŠ¢ƒ ýÊËkëêæÍ_°`Ñ¢ôÔÔô´4–a[[[_zåÕÆÆ¦ñ'žpù%¯^»îíw߇ÃÏ»Ýî9ßÍ}ïÃËJН¹êJÛ}”‚'~Ó4t„ù‰ôãùôÎ®ÎÆæFžã‡úÐý÷½ñÎ;/Nyåì3N¿öª+ââÞûðã“'LøtÚçW^~é[ï¼×ÐØxÖ§g¤§õïÛw݆çŸwnZjê¿ï»¿ ?¯±©ùžûø×í·/\´èo·üå»ùó¿™5ûòK/žòÚë}ûô>éÄ𦥥¦žyú©·ÞþÏÞ½z^qÙ¥3fÎróØSÏ8È™tîÙ/L~…e¹3g––”ôï×÷óé_n©¨œòÚÔÆŒž3wž¦ë×\uyccã/oLL A@¼B<_z¤«C °o¯Ÿ¡Àï–Üéé麮9âüóÎýzÆ7·ÞþÏò>½¯¿æê›oýÛÔ7Þôù|ãO8¡¬¤tñÒ¥ë7n,*((**aÒ9g×îÚÕÚÖVTX˜“Ås|4MNJštî9áHdkuõ—^úíwó::»hŠB14£ëú¹gžõÃÊU§L˜  ŽÔîÚuÓ ×}æ™3g;ûÛï4M»âÒK\.×¼ ·mßnY–eÛ}zõòy½nÉ“CAb¥J8A±,»µz«nè’K"ÒO8JØ[ú@E¹\®ä¤äi_|ñà£çdg«ª: ÿÔ””Üœœþ}û>ý‹¾ñÇóì‹/ 7õ()=ã´S5]¿èò+Ï;û¬ýû766æçååççr,ÛÒÚê÷û;»ºÚÚÚB¡PGg§aèB)M×::;Y–}âá‡Ü²û£Ï>ëè茛0þÄ—¦¼:söœ†ÆÆG|àõ·Þ¹ý®»s²²êë미ô’u6´¶¶y½Þ¼Ü\ÛÍ0 ‘~ÂщƒžãñÚpô@_sÍ5©©©¶mãe(†aºü],Ê‚(ðBfF†×ãé×·ü†k¯IIN‰¢8ëÛïþñ׿&$$0 CQÔ§zÆé§%ÄÅ•˲TÞ»÷)'Ÿ¤éºeÙe¥%y¹9ii©e%%^§¤¸(';;ÎçíQZçóÙ–Åñ|QaAA~¾eY–mñ——››ŸŸ7xàÀää$Ir]{Õ•e¥¥ú÷x>--mÄð¡C 2x?ä8®¼w¯Ä„<‹Š„£ R­í­^¯—c9Dzý„# MÓ­­­pñâÅååå†a@B<ÏoÛ±MrI©)©!Y’„€H$b†×ëýï#ÖÔÖNyáy]×%—‹Ó4£Ñ¨ã8.QE1ª(–iʲŒ°LSÓu·,‡ÂažçišŽD"n·Û4 M×<Ï < ‡!ŽãAˆD"Ø.ˆeÙh4ªé:Ã0nY8E£Q†¦EQD躮i± µà»zsÅæì¬lÉ%”ã pØÁ7ä† ~Ö®BhF—ßû“eÙ®®®Ê­U?‰cYMÓ"Ñh8`wܨ¢„£Qìô‹O„RÕå÷Ó4­( B€¦©`0)Š‚ ëºªªØ}—¨iÎ-ccPŠ¢lÛŽÕÿ©jZ,ÿ#ݘðãç½yÑÞŠ¢(ê…§Ÿx>T·¯ºcÀŸc»‚þÜŸÝãFì• ü|°@ ü*Ì'E±,˲llÐJfZáÈÁÍ– „pžçY–ݯôÿêû¯}ýò7‡Çq~ëUµßáå÷]Å¡M:#„hšþ…I¶}ʃ ¶A¦Â „߇ƒ–~†ahšÆÆû±ÕqáH È´¬XâîO2Nã8˲ÇÅáÁDì|V÷£ûj_÷/c‡bâC!A†éžíiöüéü´’Ý+°WÑ{ý‰ÓÄŒ‹ö[IÐM »Ø;ŸŸñ“úì÷*°q~,q#Š"^ØßOã8hßËÇp, …TM£(êÇ2ºe»× °,˲¬½[²[¶N··…KcÕî~¥?פ¿ÃÛ@8&9éÇ=¾h4úèO=÷âËÿ}äÑ…‹ <ï8Ž,Ë.QdY¶±©éÁGÃquDAÀf9øá”$I–$Irµ¶µ546ú|^ü ó<ßÖÖVßИ˜ÐÕåê¹ç†ñx<`Ï›Æãñ°,Û]8†ñ¸ÝØdˆçy|G Ú}ˆãAØYS …<m;±|ð»Ç%Šn·›eYÉå’$©ûeò'Ë’$I,ËzMÓþûÈ£‘H„eY·Û« n(žç„†æ9ÇšŽ‹{ãíw֮ߘ˜sì”eYE„KÉ’KÞS¬û;kj@bbâ¦-[^yý„øxמJ<Ï{Üîî>¢xù_)!DS®Çq›cYŽã*·nÅ‘šlÛéžÇq’$ʲŒ/Jø˜K’kÚô/}âÉGŸxrÛönYAŠ¢ÜnYç»ÿ¸¶ã¸eùù—'¯Xµ*11¿iB¢ H.×7†Ë%®ÿæŠJQqµ%I ŽáöÁ?1Çq»›K–8ŽuˆúÉþíú9–sËnÛ±»Õ±­ç²+ç|7÷©¯Ž5*.Î'„pÕš5Yí‹—.?îA6mÙ²£¦&5%OlÚ¼eûö^¯÷õ7ß^¼tY^nŽËåÂÁ÷_~åÕ%Ë–æç›¦ùéç_ø¼žææ–ää$ç;;»V¬ZéEǃß(ËCáU«×X–EAØÑÙéõzmÛnljòz<‘HdÅêÕ¦esûУ757§¥¥Æù|+V­E1..®£³³¾¾~Ke¥(UÛ¶557§¥¦ÆT»¥µµzÛ¶ææ†aV¬Z-<~I445mß±3ÎçônƵëÖoÚ²åä '!„–._n[vRR¢eY4M‡BáŽÎ΄¸¸P(ÜÙå‹óùý~UU¿›?? F…ãX¯ÇƒZµfMGggzZš¦ëÍÍÍÛwìlhlJMIÁ‹êŠ¢<ôØMM…ù sç/ÝîÎή”ä$ŽãjwíZ¿qcBB‚(¸qxŽkjn^»n½ÀsŠª*Šâq»UmmmMˆß}HÁà½ÿ}ˆf˜„ø¸8Ÿogmí†M›âã].WKkkMmíö;].qͺõš¦%%%Y–ÅóÜΚÚç^zi‰'öìQ–šœU”†††P(ä–å•«×tuuÅÇÇOymjìLj¢8ûÛï::º@^GE†f¶íØÑÔÜœ”˜È0 BhKee0ÌÌÈøaÅÊ'Ÿ}6%)ÙçõŠ¢¸a㦺ºzŸÏË0 ¶þjimu»Ýáp8 2 ƒ« ôy½Gsoš¦ÛÚÛˆ]?á(Ûõ„ôp_låªUK—ÿ_RTHQÔëo½]UU½qófMÓÒÒÒ–,ÿá¬ÓO›9{Îwóç77·TVU1âõ·ÞšýíÜp$,Š®…‹546Bz÷ìÉq\—ßÿéçŸ7·´P4,**üâ˯XŽ›·`¡¢(yy¹O<ó¬®ó,(-.òx<Eµ´¶þ÷‘GU ‚ <ù̳§|òÖªê×Þx³¼w¯~TQÕ`0À±ìŒ™³::»â|¾øø¸g_|IÓŒoçÍ4 ÿ—3f¼ûÁ‡šª½õîû¡/g̱g2Ý0‘ãÜvÇ]‹—.[¼lY8þ|úWN·ì‡¯¿ùv}CÃü…‹Föö{ï/\´8ªDÛÚÚ'Œÿò«¯uvv-^º4ÎçÍÊÌ (ºf׮ǟzúì3Î|ïÞ~þ…믹ú™_êêêÒt}ó–ŠH$òÕŒoN™8á÷?¨ÜZµqÓfÃÐãâânùÛm ofÍÖt}à€þ¡5µÓ¿žÑåïŠóù|>ßô3ܲüɴϳ²2E}í·E]º|ù€~}išaÍڵϾø’m;¦i¶µ·¿ûÁ‡çsö´/¦/[þCB|ü£O>å8ަkáHôÛ¹ó‚¡`~nž?xów£Ñèâ¥ËFñÈ“O­Z½fgmí´é_„>þtZIqqjj EÑëÖ¯_¸h±$ÉßÎ[RRòÒ”WÖnØ`YÖô¯gÔÕ7ø¯Ç3ûÛïšš }zõˆ‚0oÁ†ÆF¿?0gîÜqcÇ~øÉ§3gÏ©¨¬ÜRQ1xÐÀ§Ÿaíº K—ÿ (JKkëò+#ÑhÏe6méò"‘ˆ×ëIKM¥(ª®¾þ‘'ž:ëôÓæ.X0ûÛïî{ðáH$òÙ_äåæddd˜¦ytª?‘~ÂQ–þƒ˜ð𦙔˜øÔcöë[þÚo>ÿÒäÖÖ¶ïæÍ÷ù|Š¢~õÍL!CSŠ¢|=s&Ã0,ËΙ;oKEåšµëÿ{ï=·Ýú×F1tè‰cÇÞzË-B]׳33ÇŽu˜Ñ¹é&˲î¼íï—^táŽ;,\TS[›’œ´nýÆÕk×I.—ã8BÓ2%É5bذAúû¼Þµëׯ߰q@ÿ~n·[7t·$ :tÈàAýú–_|áù]pþœïæÖîÚ•’œ¼ný†5ëÖ‹‚8jĈÿëN†aþtýu'ŸtÒú 9Ž{&ÁoùóÍgœvjœ/îÿÜCAX½mÛŒ™3/»ø¢Ç~Èå'¿6µzÛ¶þóï›o¸>99iíúõ«Ö¬INJ®ohünþ—KŠF£½{öLˆŸ·p¡ßð¸Ý /njn;f´¦ªçž}Öýÿ¹B¸zÍÚ…‹ù¼^EQ¿ž9 ”’œ|ç?n»`Òy›6oaFUÕ~å}öë{É…œ{öÙ¡p¨´¸øŽÜ6jÄð-•ß·ãâ|ó|¿«®n÷t„ºn¤§¥8`ôˆ¡P¨ªºzKEÅ cÆ8†‘ž–6xР1£F”•ÿí–[ÆŒ5múôh47á÷»êê\¢xÁyçÝtÃõ4Mÿ럷ççåUnÝêr‰š¦ 2¤  ÿO×_[VZU¢¢(Þ|à W]~¹®ëÇíW^>rذqcÇÜzË-±Ûtæ§ý÷¾ÿ‚ðÖ»ï­Y»öŽÛþöØÃÖÕ×OymjW—ÿѸóöÛ¾™=»_yŸ^=zÜw÷]%ÅEº®[–9xàÀ‚ìo!x Ä0 Ïñº¦gefü÷¾{Ï:ýô>ýŒ";7ÃÁ-óÒ4ZZ[/»øâ+/»tÑÒ¥º¡ ‚˜pÞÙgýõÏ7kšfš€¦è„øø‘ÇÝ{÷¿8ŽÕu=‰8ŽmÙ¶¦ëÁ`HÓ4„ŽÈ¯éz0rl!ŒD£¦e±‡ãq{²³²î¾ãöÁƒ*Šâ8NB|üc=(Ëò?«Ë?ñ¤ñŸLû|KeŰÁƒ$Izü¡%Y¾ý®»ÛÚÚMÓ øÇíÉÎʼûŽÛ‡ ‰DŠ¢ˆ¢¨(ŠƒÃ2¸7†»dšªÙ¶Í±¬ª*,ËÒ4M3L8vlû0† …U5M Bè]))É7]ݤsΉD"Ø mÔˆ¯¾þ†$¹.¿ô’§ž}>91)7'GÕ4Ó²"‘Çq ŽãqÓáµSUÓÇÆkBÛ¶Uó‚¸ýؽÌÐ4 .Î×£´ô¿÷Þ“‘žnš¦®ë½zöxìÁvÖÔÜõŸ{}^ïà_˜<ŶìÒ’â‚üüÇzpGMͽŸ¯GiéÿsŽÙgY–®ë¢ ¨ªJÑESxßÃ0°ç¶išØí`YÖ=ÿºsè!wßwßú„ÿ¸ã8ª¢EE!ŽDÂá°eÛn·Û0H$ …ñJC8ƒápäÆë®½âÒKž}ñ¥¯¾™)K’mÛE…Âa†aLôm @ÀqÜ¢Ñ}á`8éÇ ¤ÕÛ·ßvÇ¿®¸öº·Þy÷†k®)ÈÏŸxÒø«V/^º¬¾¡!=--¿þÖÛL:wûŽ -®¬Üš›“3zÔÈû|øÁGßZU5jÄðŠÊÊç_z™¦)¡¦éCªÜºõ¹—^¦iOì24mæøqã’““¾›7õÚu†aX–­©­}ö…kjkóóòBÇ­©©¥(ªgÏž[·>ûÒË5µµy9¹Ë>üË3>øèã3N=511ñ»yó׬]§Ã0MAqhŠ¢) `y€aHAŠ¢(š¢( RP„Ë.ºèëofþõ·{<ž®½fðÀ÷?øð+S_We@¿¾ú÷[°ðûå+V†B!¼,©ëú ‚¡PQaáð¡C:;;ûõí i¼ðA9Ž“™‘qêĉ+V­Z¼t^ZÀnÌEÑôîßÅvœÑ#GLÿêëϧé]4ESÒ48÷ì³TU›»`Áæ-í^õýaŪ—^y5äåÛ¶}â c/]ZXPœœ¼dÙ²—^y5çäd»\®Aƒ<ÿòËK—-»ä¢ E™;Áæ-¸O )Š‚øò!MÓ¤°•„eXŠ¢ð¿4MÑ4 …žŸŸcÙº†UU322$—ØÕ°,3>>k˲þ@À²,Ÿ×«¨ªärY–e†ÇãÑu½v×.ARSRðª ã8MÍÑh¤¨°¦iY–ï¼ûž¡CŸsÆþ@ ¹¥â8ÔÑÑI3LB|¼¦i8Ÿ´ÔT˲ð•FÅ%Цib[¬x4`Y–mÛ¢(F£QŽã$I ¡p8=- ðÔ××Û¶ç“$ BXS» !'--MØcçÀCQþ@Ó´¢ª M³,«(Š ‚À×Õ5D¢Ñ´´T—(âk7MÓ²l—kw}hšnïèàXVt¹tM“$IÓuä8' Ö74ú|Þ¤ÄD<%bF]} ¨°!„ô·þó–›oîQV ›ð!B¨½½Ý%Iq^¯?lhhôù¼ÉIIªª±,CQ”¦i’$á0ÇÅGDÝÐY†1LSàyŠ¢ÚÚÛÛ;:òrr<B( Zæîï¤ ‡£Ñh^n.„a˜öŽ˲ÒRSMÓd¦¹¥…çø„„x¼ÇggWW||\4ª446¦¦¤¤¦¤à›7ãΚÚÄ„„””äEK–|3köUW\ž’œœÓé§i?>„£ŠX Ÿƒ–~S¦i˲LÓ¢(ˆó¢)Ê´,˲°ØišÎq,Ã0جçŒW lÛfYØÝ€e!6ÁkÎx¿_Š¢xŽs2MíÙïwOÇqÛ¶oâégŸzìQÇá8k^àX!dšæù¤(€ã8¸,jÏŸ¸2± à]…išvǶm¬Ý†at·%µm{·i Ïñ[$ÖV1KPš¢lÇùÉ74íØ¶³§é ÓŒÕg¯ qób#w¿Wزm†¦9޳m;¶EQx×UU=n÷ŒY³çΛÿÔãD£ ^z躎mIY–µmÛ²,l.‰óÁ5{b%Å*ܽqð—xì‚ßÜ M¦iY€eüq)ŠÂ#\.;†à÷ŠišB B–eMÓ¤išeÓ²º/ÞbƒNÃ0ܲ<íË/,\4ùùgÁ eÛÔQ©û€H?á(ã×÷ý™¦ib­¡(ö„]{ü6c‡p2üÜâÝni,ÐÍ6¦Bl¥‡²lˆEj‹Ug…ÕȲ¬Içž-Ë2~{u/[!ìžÚóøá²özcÀ:…ÿÄï!üî <«<@Ót°soÌnÊÚóÁùiÑÝ›nߢcùǺ´Ý+LAhÛ¶ªªÝËuGÓ´X’äštî9ŽƒðYÚžèÞ8»ÃáíÉÇ9€ÆÁ_Æì)=*ŽÿŒý”±*á·c¬\|‡Ätoüãâûa¯dø¨ªª!EQÊJJܲ; ÚG±îG--ý`Ñ ºÓ]Ð5Í/œ-1@×õ⢢ž=ÊTU‹½c¡Ð_øò@.çW³:ë?âëð“ÆPÕ´áC‡â)—_nœÈq°?ô!4]ìÇ?S¡aš¹99E……Ñhôèœç!ŽrEú xÎ!6Ù‚ÿ<ØLð(OSöêaw³X¬‚£YböÛ˜{ )Ž%ð¥éºNBv‡Æ{r°³¾ªªª¦B†E‡d¡ñ…ìgYÖ²,UU CdzÕG³I¬1q¯‡ƒƒ öÇ‚lÕ@ ü/™^?MÓ õ¡P@Š¢(Ƕ’“’’Lë'™!{ÏŒ?6–ß+<‰| ±ûcRø«)!„ ÚÚUW)Š „2Ò3eYÞ+Z@¬zºWc655CAЦŽã$%&'&&îåÝŠ²m@÷èæ¯¶‰mÛ±¶ÅCŸŸS[‘&ZL üAø½¥„lß¾Ívœò>å¢èþM[6›¦™––,¦->.@A¨iZTQöšköù|B¼¡ã/Ší5Ð׿rk¥ÏçëSTÎó¼m;íUÕU¹9y>Ÿ/¦þ!žç$I9ŽŽDb¯¢(‘çñâê~‘\®ÝvJ¿Ú˜;¶!äôìÑÓ%J P(XQYazzzÆ^çÆ'꺎V†‰- ï[C·,G¢Q,úÇáý2÷½F\ žç£ÑèaºMÂoËï-ý ôw´G¢‘Ñ£F7´§Ï¬t‹ìycKôë¿|År¯×‡`5ikoîÅ—°qÎàOó Ÿ×‹GØâü´3Ë0ÌŠ•«RRRÒÓR±Á(Î{Ì‚=3û!–åjjwr×£¬§®kº®SRR!+**Êûôꈢ¸yË–¯gÎbÆçósæ^¯Kmla û‡îÅQGV¬\Õ¿_ßî‘)»×gÑâ%e¥%n·Œ]öjF<4a¦½½= 6ÒqÝÐn·§oyß+Wx½>Aº7æó/OFŽCÓÌÀýÆŒµ³¦¦µµ­_ßòØû,Æ™¢¨P(üÙÓO?õ–a8ŽÛZU]»k×ÉNÂ8±jضËn©¨<픓ñ¯@ Žr~×:¶gojjÊÍÉî „xge‡F­Ù}üÃ<ÏÆÇÇ7·4Ç‚$s×ÚÚºô‡ 0|茌t†aÜn76îöz½³¿»zͺýûs'¹\¢(âðË8:4î‡âÂË645†ÃaÇÍó5bø„ñ':-Yº,))qñÒe---K—/gYöåW_íݳ'EQϽ4™ãy€ˆ¦iÝ0ð~aص¿4]§i ŸÇ† …;::r²³yžß\Q±mûŽYß~[±µê²‹/ÎÍÉq¹ÄIçž3aüø¯f|S½m{bbÂ_ÿ|óÈáÃ_™ú†a‚Á`èåW^íÕ³'„𕩯磌û⫯o¹éOçž}–eÙ¤ÃO üQø½M2ÇIKMݼµ2?+éêñÙF Ñƒºn<½Œ¦à®ººôn˼„¦iöêQöÜSO¾ñÊ”X¶UR\œ‘‘‘‘‘Žòx܉‰‰§¹¥eâIã{”•Vn­JMI2xÃ2–iMoFzFVVV^NNzZZ^n˱E1 sâ cÿ|ã Ÿ}1}î‚ÅE…÷ßs÷òV|ùõ ä8¼À—•”ô(-}ãíw(ŠêQZÚÞÞÑÚÖ&ð|ÿ~}±#®ã8©)©Ûwlãyž¦˲mËæyÁ¶í†ÆúŒôtÃ4 üñ'æyÎëõ&&&VoÛÊḚ̂ûš+¯˜8þÄ©o½µµªÚÌùvî®]»DQPTÅãñdeeN¢ßïïèìÄ;á„Ñ––Vžã† ¼µª:%9©´´4-5•e˜@8X~ß^?„–eeffÑž·pAϼć®v÷CdÎ]0?-5ÍçõíµN¸¹¢âÕ©o<÷â˫׬Ñu£«Ëðû¦iE£Š?`YvЀ“_›úÖ;ïnß¹sÜØ1MM]]þÌŒ Y–~ü‰/¾úª©¹EQTMÓü¿ª¨š¦5·´0 ¹¹eò«¯-Z²ŸÁA„Š ‹[[ZW­YAÑ´ìv‹.WSKã’eKòs xžÍ«@ŠR•‚077×ãv‡ÂáÒ’’¤¤Ä„øø¡ƒ••G"Q\[EU»ü]Žcwvu)ªª¨J(¶m;ŽTlÝJÓtvVæü…‹jwÕuvu•÷é=ÿûEÁ`( ›¦5aü‰¯¾þFaAA¯ž=²³²DQ8`@¿ò>xAزÌÌÌ,€À÷KZ¶)»%—,…#ÁùßÏKŒKŠ‹‹ß«1+*·¾õî{/N™òüËS.˜4I]]]7oNKKchzùŠ›7WlÝVÝ»w¯H4jÛή]u_Íøæ‘'ž,,,(*È_´déö;ËJK½ÛÚÚ§¾ùÖ‚ï¿‚Ǫpìqp»tÇÉÌÈòûU[×oÞ²µzG[[{vVnqQI÷ø‹Ø.EàÓ4 COLL(ÌÏËÎÊLJLt¹Äü¼¼øø¸œ¬ÌÄÄÄÞ½zB;»º.¾àüÂüÜ0ŒÜìl†a–-_ž““sáù“Š‹ è««;ztYiIzZZk[[bBÂ%^š’¢éº[–Ï9󌊭Uõ ÉII¥%Å%ÅE•[ãââF žžžêƒƒÙ¥‹p”wé:èȇ žçÃá°¢(B·Û-Bw«A€×QiÚíqC!E©ª‚Ã)ŠêvËš¦áÈþªªBeYf&â°Žª¦á€”²,C"Ñ(˲¶e±,‹ƒ¸¹\®P( ³23_˜<%‰üûÎ;ºü~ìµKÓ4C3þ€ß0 B¯ÏDzì^aq[14ó6À߸\"@ ª(x'÷p$‚Mb¢Ñ¨,ËØˆ^àyUÓDQ°,KD„¦ª¶ãȲ0 CÕ4Y’Uuo®k˲ør4]ÇWýccr|0Ä^n·Ûå’t]ÛcB ¤ªjTUžgÆAˆçyä8QEqG’$Š¢ã¨š&Š"EA€@(¸Ý²iZº®{Ün€E—KD2-KQ”#}WuÈ„£ŠCÚ|k€cùlÛŽ™´ï•Æv¸Ç.IQ”í8T7 t€í8`OÔU_ŽÓ-TrÌ+8æzúñgÓÖ­_ýÕW%&&vwÖÅóþ±x™ûᳯƒk÷A7wüWüÔÌ¿{ú˜Gž€É4„`ßËÙ7†Á7&?ñæS=ɱ9¢˜‡D÷CÝJÇ2ù¹Z‘~ÂQÆ¡m>\`ùqêügÂ42û Ò€t?¥{Xì¼µ@÷ücÿÒ.¾`Òùçž# ‚mÛæOƒ4`¥‹)þÏUoߨ“Ý£JÄÎÅènÞ[`ÜwO¿ßÏû½œý6¦mÛ±¤1÷áççê³ß*ýr­ÂQËqm•á8ˆ¦iMßO¨}ÌkÝòU[p9®¥t‹µ@ LJ29‹§wq\øýý_*ôÇ2øåÚîµßÖ1víÜ:„ƒ–~¼þév»eYf˜½ BŽã~5‡½»~\*ï{Xø¹—ÓáBÈÿüÅâ8?¢ `kÞkÿUöý 2ÑO ü9¸ l …–.[.ŠbaA,K±ÕZ†a ÓlmkKJL¦)`qÈ¡ç!Š¢â7‡ã8<ÇA âM’$〠xõ²ûT˜îQÅllbÁ8cs88Ps,Øg,ŸîF)ØÀ¥»~íya`Ûý½w¿ê¾u—eY­­m‰‰ ± ›±Jb“›Êª*@nNNÌȧûá½ÚöÚc•E0Ýïµ#„ EAbë~Õxm–ã¸H$ÒýýÝÝPj¯Ò÷=„óÔ4 ÇÝoAÄæ‡@8:9ˆ'3û÷‡]´téÇŸM[±j%9çõz9ŽkjjzìɧmÛ‚z=žø¸8l)OQTœÏçóyã|ÞmÛwlÞR™œœŒ5B–¥í;wnÚ\‘””ÔÙÙùø3Ï Oı‘DQŒõßB‚ $$$ȲŒMݱB¹e BbB‚$InY^µzMkk[RR’eÛ8—(:ŽÃó¼Ïç‹s¹\>¯ý]¦,Ëq>ŸÏë‘\®„øx—Ë……[–儸x–e±Î&&&Z¶õÈ“OF"QAàãããqM¶m{½ÞïæÍŸüêk••†aø|¾8Ÿë¦[–ãââ$—˲mY–öÚ†‰Ç¹É’„w°ÁpÍeY–$)>.N†aâݲì8˲^¯7>.N–eçýÀ’¥Ë’““»_»ÇíNHHày.VºKqóâC8Z§$I ññ·»³³ëý>6 “ç¸øø8ÜÀqUããã%IB€LG#ÑëG <¿mûöÖ¶¶Ÿ}ša˜ÎÎNÓ²t]ïƒ].ñ”‰)ŠÆæð¯¾™‡ÇŸ8.Îë*Êg_L*ʈaCßxû.W èß·/˲ápäµ7Þ ƒŠ¢¤§§µ´´¾ûÁ‡<ÇMbbbâ–ŠŠ•«× ì߯gº®X–ݱsç+Vägef657êß?®]·¾_ßò55Ë~XQ˜ŸŸ—›ûÜK/çdgwÎÙúõÛRQ±rõêýúõ-/ßZUUS[ÛÞÞÑ«gºúÛ¶'ž4ž¦(€ƒÐòV465A òó×®[WÞ§wŸÞ½‘ã,ÿaEcsóà232ü~ÿ7³g×74š†)ŠBKKë·óæççå2Ä0 Žãêêê>øèゲÒRQgΞ£iÚè‘#„«×® éi}zõ …B{í]]Ó¦)ðüè‘#ÖmØPRTä8Îú  V¯] ã|q4M·´¶æçå%&Äðñ'y¹9£GŽhllÚ¶cgKk‹×ã0þÄ?ýlÑ’¥`pøÐ!’$á·Ë¼ù šš†T\T´ióæ•«× èׯw¯š¦ãCÆ ÎÏË[µfÍ–ŠÊþ}Ë322òrsDQhlnYµzuFFúÐÁƒ«ª·546446 ì߯­ÍÂÑÀAôú!„Šªö+//.,¼ú†ßz÷]<­ñüË“»üþõ7½÷Á‡¢À[–%Šâû}´ný†.à…—'Ó óò+¯®]¿Þqœ`(ä8ŽeÙ]]`OŒ6Ó²,Ëîèê¤)JQ†aÖ¬[ÿѧŸ565½üêknY~õõ7*·nÅn±»êêþ}ßB~ ¾8yŠ¢ª[**?ýü‹Ö¶¶»ï½!äøÃ‘0„0êš¾mûö)S_—e÷”×^¯««[¸xÉÇŸ~fÙö]÷Þ‰DæÌ;ý«¯%Yv9ÎSÏ=ßÜÒ²ô‡^˜<™åØ'žy6 }ñÕ×~òi{{ûC=ÞÒÒ2ùÕ©[«ªeI²l;?ýü ,Ã|9㛹óH’ !dY6EÓ†aªªöâäW/]ZYUõä³Ï557?þÔÓ[**‘¤¨ƒºv¡¢(O<ýLss³ªiš¦MyujW—¿µ­íÕ7Þèêò?òÄ“[«·ÕÕ×?úäS[««›šžyáE†a¦5cÉÒå5»êž|æY†aÞÿð£ù âáKGgv_$é½?úðÓÏDAƒ;vîœòÚT·,O™:µ®®þ³Ï¿øà“ODA‡ÃË~øáÉgžs‰bGggWW××ßÌÚ¾cç£O<ÙÑÙùîû|;wî’eËÞxûŽãžyáÅ55‚ ?&áhãà¤ß¶mI’{øÁ[ÿòçÍ[*yâɆ††õ6ªªÚÙÙµ¹¢ÒAˆã8EQ–.ÿAÓ´®®®5µ›6o©kh¸ïßw_uùeC *ïÓ{øÐ!—^t„Ð0Í´ÔÔAú2øÂI“,ËNJJºúŠËÏ9ëÌ®.ÿ’¥Ë:::Á`CcÓÎÚ]<Ï™¦éóùzö(kllJIIî[Þ'?7wÙŠë7n3jdzjjYiiccSJrJß>}JKŠÏ<ýôñ'Žû~ñ’ŽŽÎP0ÔÐÔ´£¦Ö-K£F޼ñÚkÒRS.˜tÞIãÆíª¯ÇîN¡¤ÄÄ+/»ô䓯çdg_Í5qqq;vî\²|ùM7\÷·ÿ»¥¨ `òk¯wùýwÿóŸçsVJrÒ† wÖÔF¢Ñö¶öÊ­UÇkºžŸŸ—Ÿ—{Ö§lܼùßwÞqïÝw…#‘5k×ö(+½õ–¿Œ1"‰¤§§àµs+üŠU«9Ž¿ûÎ;®¸äb¯×+»eŽãxž÷y}¡¼œœÛþúÇ MMI¹ëŸ·û|ÞÊ­UJTioo¯ØZÅs\yŸÞW\zéàA;::ÇŽUR\tó7z<Çq,Ë*+)‘\b(...^¼tY{Gg0jjj®Þ¾½¼OQ‘HVVVjJJVffsKKa~> ..îÛyóJJŠo½å/7^wíÌ9ßZ–5nìØk®¼"'+«©¹™Dô$ŽBn‡eÙæ––ªêmú÷1lè‡Êó¼Çí.ÈÏŸxÒxY–MÓ ƒ‘HÄãvg¤§Ÿ0v4Ðëõ¨ªºzÍÚ‚‚|Ÿ×k[VMí®¦¦f†a( Z¶mfí®]r4M †BÑhÔAŽÏçõz}-^¼«¾þ‚óÎý~Ñâ›7«ª6bø0Q>øä“µëÖçdg•–”Ìÿþû†ÆÆAúÇIHˆ_´xIcSs¯eUÛ¶=Êï÷·wt\|Á¤5µK—/¯oh(.*òù¼EÕ54L~õµºú†~ååƒ ÌÌHÿtÚéiž?©bëÖW¦¾^WßзOùÈÃÝnyÆÌY–eqÚ©55µK—/¯«¯ïÕ£G{G§ =ÊJ×®Û0jäˆÖ¶6Çqöï§ë:hÓæ-Æ †ÂŠª4põÚµûõ2hà·sçÍ_ø}¿¾å—]rMÑ|üñ¶í;xŽ¿`Òy¶eÍ[°pÇÎéii™é¦i²,»¹bKNVvïÞ½|ï×3g®Z½æœ3ÏìQZR±uëÈáÃñê7Bè¯=..NÓ´ŒôôP0øá'ŸVWo8 ?àãiŸ×7Ô'Ä'ôë[¾sgͨ‘#4]ÛYS3dÐÀ¬Ì UÕ|¿hûŽ9YÙMuvv5²bëV—è=jäÚõV­Y3h@žç†™5ç»O?ÿ‚¡™ÆŽ;jäÎÝ-ÖгGÙò+>úô3š¦O?õ”öŽŽW_#Ž5*?/¯bëÖ+.¹¸£³cÚÓ5Mÿó7457óׯoß5k×f¦§{ö`8>!‘; G‡¹[˜P‰DdY†êº.‚¦iÚî@BÈ0 I’,ËŠD"ØBF~Rš¦)M"&RÐ4-ltˆwNÇF„<Ç‚A†að6³Š¢t]×4-!!Á0 QïºçÞ‰Æ=JQTÓ4ñ!Ó4±¼âðgËÆò‰…9c&VV,lÙ^_â?Y†ÁÓS‚ ¨ªŠÿµmÛår™¦)B8v›9ÆòÁquAÀàX–Õugxh×! 8Žã8.àí-˧ÇòÁ‰Ãá°ƒÀóØÔÒ4M†apn CÆûPR …xž—$É4MžçÝ¥Âá0Ïó²,†©¨*rœ¸¸8l8‹wÖ4ã8Ƕ„ðÆ x9á8Ÿè'áÛG‡¾ «¡mÛ¢(†¿QU•¦)IúÑÀŸã8Y–elî­¨*MÓ.— O+ƒngàž×~÷à]ºbF媦ÅÌ+qzÇq8Žx^UUI’Ö­ßÐÞÙ1hÀUÕðU 8q¬bø-ˆEÕõŸŒêÇñz<B¸õTõ'¥ãCš¦C%—  iZ¬PEUiŠÒ÷DCêÞtGúV'ûá—ງ¦( !€ÐÝ™˜’vú‘}å`¯™Ý?ÄBw!dïž+·¼÷Í7\ϲlLøì}ÂmîU™½¾ÿÕ ÄþE{ÂmRì~-Ýw?ß7ª[Cí{ù{íE9±Ö»ÅOÞïåìU±ŸKÃþinÝKï~hßB©=r¿ß‚ÂÑÆ¶¾@ˆ·k?hp¿2++3—¢µŸnór«Gô‹@ {1é?ÝE~¡iZ°¨Ã-бê!lÛ"ïp,qĤŸeÙh4¢ª*€P–$Ac‹Ÿ<Ü’ŒÍ.iš‡Ãº¡Óå–Ý,Ç‘™kpÌp¤ÏÈWo«¶m[E ÂÖÖ·Û•™3³Á P· ú}ÍbAÜ~µÐŸ[fØ7^¼­­­¡šçyÛ¶›[š““““’Më'êß}ö«ÑXðµC8J ÿ GFú+·Vø|¾Ò’2¬n†alظ¾¶¶&//?Ö¹Æ*,J’cÛB˲LÓ °Æ24Í ‚mÛ†aüjÜ|—(š–[ þ9™Æ8•[·äæægfdÒ4í8(lظÞqìÔÔ´îÕcY¿hš6tý—­×÷*”¢(—KTõçÒ˲¤izÌß‚@ #¿«ôc¹ljj„Õ£¬çÚ­ Ó×Hsù„Òþ}û.Z²$>!Á-»±u#Ïó»êêž|ö9—èRå„1£Ï9ëLÓ49–1-‹¦¨`8<õùX†¹ø‚ó“““÷lN !¢–eáXr4MϘ5;?/¯¤¸ÎÇÞØd6B Ãnß±=!>!';GQ¢¸Ú¢(ôêÙkíºµqqñØ(ÞqY–—,]öÖ{ïÇù¼<Ç_qÙ%y99ºap[º€Rbƒ–e,ËŽ}ã÷û—,[>ñ¤ñ,ËbÓx| ö°,ëÓi_Œ><>>Ûbb{\:y„ÿ‘ß{J¢¨–ÖÖÜì̆–Î'>ÛŸ”²¹Ç?ZkÛNbbbkk+Öbì;æ"‘Èÿýù¦;nûûÈáà Ãp§©¥Å²,I’¦}>½µµõ´SNöù|¶mG"츄-ÓEE1¶µ·Û¶M34Ž¿‰DÚÚÛ±›Ïó¡P86dÛV(ÌÈÈP”ˆãØ99ªªH’Ë建:±ø"„8–mhlä8ö¯ùs^n΋S^¡(Šã¸Ö¶6¼¿À¢Šbš¦mÛÍÍ-¶c+ªÚÖÑÁq¢)¹­­ ;Ó4ÝÖÞ®i€fhË²àž©$˲xžïêò‡#žçômC þØü¾½~€ €š®¹xvÓ.?Å ,Ï%&0õÍ]ÁÏ1Á`wÆÁOWÛv6mÞ¢iÚèQ#gÌšýÝÜy>ŸÏqœ¿ÜtãŠU«"ÑèªÕkƒÞ~ÿ}Ó4 òò¯¼üÒûzXÕ´Aýûgd¤ñåW.—ëúk®®­Ý% â;ï€jïè1l蟮»vÊÔ×7mÞì8(!!þîÞ®BÈÐõ½¯ðf”Ã4 üq3†aâ|¾´Ô”ÄÄD]Ó)ŠzëÝ÷jví¢iú¦ë¯«©Ýõêod¤§g¤§¯[¿!.Î ‡332¶mß~ÞÙg÷ï×·ªj[iqñGŸ~fÛN¯e§rò‹S^Q¢JJJòe_T»«®³³«««ëÞß=õ75]/,ÈŸóí\š¡Ï8íÔýúé¿=+@8ø]{ý@Àó]ÁH^š;ŽÓj;vµ%8™E¢¢(:Ξ9q„ „‘h¤zÛöÊ­Uáp8 ååå>ûÄcþ€? Ž3jÄða×]}Õ”©S‡ òØCVïØþí¼ùš¦]rÁOÿñgÓn¹ù¦{þug~^^Í®]¡p(_zÑEùÓ+V­Zµfͪ5k{èÁÓN™è÷bÎY4Mkš0Lò,Ë2-Ër[ÓuŽãcžk!–cW¬Zu÷½÷/^ºìÖ[þ\±uëWßÌ>thMMí'Ó>§hŠ¡™ÿüëÎÌŒ Aàø¡H$z˜Ñ×^uåwóæ†ÑØÜTS[»¹¢â¤Ç<ᤶööV®ì×·ü¼sΦizkUU¯ž=¶ïÜY]]½iKEFzú[ï¾WVVJQÔ+Sß`Y†Dƒ!‡Ìï»Ì mÛY™Y›*6O?þÿÎî9kE+>{t¿¨m¨¯6t„i?F°¬¢‚‚»î¸ÿ9gîܤÄD†eâãáÈ<¶ãD¥  ßãñ$%&vvvºÝîŒôtÓ4ÇÉÏËÃ&xŽchZ’$Û­›ºÏëmmkÇWù¼>–eÑžŽ|bbÒ–ÊÍ£FŽV¢ªmÛ@G®kØFS’Sb£¡i˜£GŽüÏ¿îÔtÝ-ËsæÎã8.‰œ8î„þ}ûvtv&''y¼^Žã<DzÉII¢ „DQ ( 9hìèѹ99ï}øÑâ¥Kï¾ãŸÏ?õä§Ÿ±xé²;o¿eÙÌôŒýû¿8å—ËUR\*†a”•–Œ6T8Ò7@ø£ò{÷ú-ËJNNINHž9{ŽÀ˜7žÙë² eí- ¾ÿ¾¤¸ùÁ‰4E­Û°ñžû¸íŽ;¿›7ϱp8‡Ã¶m뺉F9Ž;ù¤“^™úú=N™8¡µ­- çæääæäÜùïÿ¼4å•]uu¦i꺎DLÓ´-»µ­}Ø!¶eÝuϦýu,2išy…¦aÍ›?7ªDD6²7Wl\³fMϲ^±É(¤ nš¦Ñ cšf(îÛ§wnNN{{EQ²,¦ ‡†a„ÃP(2LÓ0Íh4jÛ¶a?¬\ùÃÊ•n·ÜÕåß¾cÇÌ9smmm—ËEtŸ@ ü/\äÎò¶k×®šºš®®Nšf’ Š’““q5p2Š¢Uݼ¥B×5Ó4órsEQ´m;;+«ªº:5%%Ú¶™‘AQTeUU[[[ß>å»rkUVf†,Iºa,_±RUÕaC‡øý~Y’Á`Fz:B¨®¾¾¬´TÓ´M›·¬]¿¾¾¡á±‡ŒF£8¼%„°ªºª¾aW0ày!%9¥´¤§×ëÙ˲³µ­-UòrsðFW,Ëå+VBöïO3LGGgqQa{GG (,(¨Þ¶-%%ÐÖÖ–‘žÞÐØäñ¸W¯Y !5b8MÓËV¬ˆ„#CJKMÝZ]•™) BUõ¶ÌŒtÇ£iÚò+#‘HÏ=òrsÈÆ‡HäNÂQE,rçþXñ¶mc^ŽåûºËRåE¬Åš®cóG]×qÜPš¦ñŸQY–Ži|Çj–$‰¢`4ª04m;CÓºa@yž‹F•í;v$$$¼ùλ‰ ÿ÷ç›üþMÓ¸hŽã°AþŒã}îåÏ…mrpK°g¾GµTÀ2Œªi±d±p§Ëê†Ásœí8¢ œ!Éå‚ÔTM7LQpDQÔu½ÛåPš¦‘5Þ? Dú G‡´ùp!Ä/,µÖÏÉqÏ™àà ±sE‰EØE'{ì q\elCÛCŠ2- `EQŽãD£ MÓÛ¶ïøèÓÏòóò.œt^8‰é>k+þ»’íqÓ4MÃ4©ná*-Ë ƒ±Ä¦ibc!\.®6@±,<¦‰½ºp̓¸¶Ý®€Ç"?¹œƒ÷&„î±>±žr÷?÷e¿Á öý²û7Ý_?q&sö…çOEe/ƒ™îÕû¹ºí+À{‰r÷âöªØ_ çý^Å~/‡@ þŽë-³±âãùý#]@øý8®¥Ÿ(>@8>9Dí³äìãRd;‡ÙÉè°gH phÒðIœÈÑ1ñGPz]ìáš‹þ… »¿rÐOÿ$Âp(ÒOSpæÚ¦ªÆ0Ë@,¾¡j~·±E3¬ÅB¶ƒlY6²ˆ}Æ}y„€e#ËÞ½¼j9?~Žeøí†Ãrbêï ä $ 6ª±öH·!@ üÁ88éG0ìŠç>ºð‰é[\ñÖ7×D5ëÎ÷×%{…3f8ÞÜ n~mÕï­»rlÞ‡·Ž°tÚà ß]Tóß‹ú@  !ýB"Gok¯ØÖùø—‹*ZWmëX_04ëž zOì›Æ3Ôˆ²ä¬T÷+s¶…TóÒѹaÍZµ½ÐPy™;}`æå£ó²\Ë«;TÅ|àâò‹ÇäË»¶ºÃ6ª›C²È¬«ñëšuϽO*O‹“¹˜‘OªOäjK}°®#JC˜™à2,gS] -¨?'@8(¦×ÏÒï-¬9¹wêýõyòÊëwúýab©—gU¯¨îèèP8†š44ûoSW–gû8†¾çÍ5#J“ ’\QÕ23уªi¹‰’â —fU­ØÚfXvnš;#A¼iBÑ]çö*Íð(6š<«zEuGW—BQØ«ÜaŸWoÒÐnžºÊ´·þ2ì?“zÏßÜz×ë)¢ýp0Ð×\sMjjjl»W†aºü]˹e·íìµ,,ÛÖqÁˆœ!… …©n¿bÆËüÙƒ³Þ^¸³¶=Z–ãV’”‘àjŽÈ-L•5æ¬oæ„^)¢È–¤{³ÄÊ„ò´~¹q/­[µ½³<7îä¾is7µÌÛÔê8hlÏ”’tχKkkÛ¢¥Ù¾Ñ=’šBh†èáÏ1¼$IàhÓB¹IÒ9C²úäøx†&êO8j¡iº­½Íëõr,G6Ø!qhšnmm=¸È¯‹U [3mÇŦ à9ÚvCQAÅ€ø$.¢Z†íÈ?õtB|üµW_õÂË“âã%ÉõõÌY,ÃÄÇÇßqÛß7lÚüù—_€†4éœsn¾õocFœtöÙþ@ ûŽíðGç zýxf?/7÷žݱµªú¯ÿøçû}Ü·¼< l­ª^¿acrR²mÛ‹–,4 ÿ©'ôïÛw@ÿ~çŸ{îuW]5ëÛo׬[?nÌè¹ó,Y¶Ì4Í⢢{ᆱ¦¦öO×_7xÐÀ¹óˆ¢è8¤ ašo¼ýî¿îùOZjêyçœ=ùÕ×Ün÷S=Ê0Ì{}$ð@  ´µµüÙ´ÌÌ̧tâIãû•÷YºlY(Z·acï^=MË„e˜¦¦©¦iêºè[ÞgÉòå¡PhÝú ýú–×Õ7$'&=úàC¡Ðô¯¾þôóÏeYÊÏÍ›üêÔŽÎί½fPÿþQE!û8„cŒƒ5¡a¥%%>øß¯½fêoRž0zô—3¾Ù¸yó¨ò22žúÉ;w>ñìs¦iBݲ ììì> ]8é¼â¢"˲â|>žçSSSX–õù¼ Ëà™wä žçnºáºÇz𯹙çùöŽÎ‚üÏó}z÷öxÎ×»GUÕ(!R4EÓ4m[V¿òrÛ=õ­·ããâÊJKu]ÇÂ’⢵µš¦Üùê+¯p§GYYJr2Y&Ç7×/ðüÆM›/½êš;ÿ}Ï|ö™g „ÆŽµdÙòp8Ò¿_¿›7;ožÏçmiiÕ4½¸¸èý>š5{ΉcǸDW$áyÁ-ËŠ¢D!ÛVUMUÕÝV=F£ Bˆ¡iUU-Ó<ûÌÓg}ûÝcO<µhñҋΟÄñüï¼SU½Í´Ì‰'ÿ£Ÿzö¹9ß}çózøêëoŒ:”¦éîK¾Šª˜¦é $IÒÁƒ^{ýáÆh†^º|ùo½½ì‡•_pþAƒ@Ð%Š^¯÷Ž»ÿ=û»ï<Ol˜@ Ž "|„ÐvIrådg»eyÔȧLœ iZrròºõëû–÷½ ”¨’—›› ¹\kׯ¿êòËyžÇæÿx97';«  Ÿç8„,Ëk×­»â²KãââV­^ … òóÏ9󌜜ìâ¢BI–ƒ¡PVVfRb¢ÏçÍÍÉ‘\®îžÂÁB·Ž*pø¶ƒ3îDy½ÞqcFS4eYV$å8nW]] éÇ3'XúU=´@Єc‚‰ Ú„CàðôúB±^?žT9dؘ=þÏÖ˜alÛ&=w¾ëÇN?pP釠{¯Ÿ¦ižç£Ñ(MÓ8–26‘ŒõÎðgü´â7è—[]¢¨jŠO§(‘à?Û;:;þ„qO:±¸°pé?쬩=bxZZšiš³¾ý®¡±±³«‹Ìù? „8Ž[¿a]CCÝ„“NaYÎ4Y³gäææ÷êÙÛ´LÇq wppü¯Ò'ylÛÆQ€LÓŒD£Žã457›¦¹kW Š}ú™eY‹–,mïè8e„>ý¬¢²²_ßò'Ÿyöñ‡üfÖ—Kìêòwtvõ(-Ejko³,káâ%ß̚ݷ¼÷ÓÏ¿øß{ïù|ú—ë6n>tˆªª gO‰Gº ¿9¦i¦¤¤®X¹|ö·3Ç?ÿû¹ÍÍM1MÓ±Ò Ã9ácÛ¶Ëå9lX8¾åæ›:;;ËÊJ7lØؾc‡ËåºpÒyÇ¿ê†ÿ}çEë7lª««_»~ý ºüþ–¶ÖË/¹8//÷š+¯è٣ǭÿ¸]Q”`0´£fgUõ¶ÕëÖýõÏ7÷êÑcÅÊUº®£ŸîÏN8†±m;)1éÌ3Ι=û›wÞSÄ3Ï8'1!Ñ0 <Ü$ÒO ,‡Múw«¿eiºÖÒÒZ]½Í¶­‡{ü†k®ÎÊÌÒuÓ0Œp8¢ë:ÏqK—-—%)¹\¢$Iùy¹'Çql0T¢Êæ-éii>¯—a˜ÆŒ1lhvV„píú >Ÿ¯«Ë üq…ªª ñ &œ²aÃÚòòþ ñ ªªRå =Ƥ@  ´ù熂²$ïžð±¬„øøÊªªUkÖ 8ÐïTVn G"e¥%–e§§¥ä祦¤LÿzÆÚõëwÕÕŸuÆéY™™sçͯڶcÙ=ÊLÓüú›™ÉÉIcFZ½fíÚ ÚÛÛûôî•›“óÅ—_®ß¸Ñ2­áC‡xÒÔþž1´™p4ƒ6ÃÅ‹———c„ÏóÛvl“\RZJšaP¼â]õ»R’R°ô#„hšâXÎ0M\F ôù¼øŽG†ár¹$—«¹¥õ®{ï½ýo·†ÃaÝ0DA°m›çy„iš4M³ …žÇsGUUY– ÃøÝ<ÈG @B»ã/á@LŽãp×ÚÞš’”"ð¶ö9ª@q·¹bsvV¶ä’ˆáÈ‚oÈ 6Î üž0MË4-¬Ë¦iJ’KÓ´X©‚ ¬]·~íúõ­­m…é©©~¿Ÿ¢(žcq/^Q”Ø+†a<ŸEQ(Šb'$ÃqFÌŒ¡Ýñ—p¯?6õGì|„çpÆðÙ¾×u=--µ8ZÔ«g>½z™–…vý˜¦»¦w?Ý&;%~ žðA‘¹~á 8 Ò•úím,Ëòz<£G GE¢QDòþ"}}áP8 výË)Š‚çèäÓ4{¶ëdÞ†ð¿¡ê*)†><ãWá8aÿ „Rð—èÅR¦¦¤¶¶µ†Â!é‚~? P•’œÂ2¬ƒŽR?yބߙ½¥G`6 Ã0 Ó4} Š¢ÒRÓŽô…Ž_lÇÖtíèœîǃZÃ4ŽtE„Ÿ°·ôÛŽíq{š‚¡àOÅu6‘å(ß$Fý„£ŠŸH?„в¬¤Ä¤”䔃ºMòplsô/õâ'‹H?áèa?sýŽã+JáðB¦û G?»Ì{¤+F „ߊCÜF‘@ \ˆôÂq‘~@8î ÒO ÇDú ḃH?@ wé'„ã"ýpÜA¤Ÿ@ Ž;ˆôÂq‘~@8î ÒO ÇDú ḃH?@ wé'„ã"ýpÜA¤Ÿ@ Ž;ˆôÂq‘~@8î ÒO ÇDú ḃH?@ wé'„ã"ýpÜA¤Ÿ@ Ž;ˆôÂq‘~@8î ÒO ÇDú ḃH?@ wé'„ã"ýpÜA¤Ÿ@ Ž;ˆôÂq‘~@8î ÒO ÇDú ḃH?@ wé'„ã"ýpÜA¤Ÿ@ Ž;ˆôÂq‘~@8î ÒO ÇDú ḃH?@ wé'„ã"ýpÜA¤Ÿ@ Ž;ˆôÂq‘~@8î ÒO Ç̯¦@áÂߨ[Äa¬Bè·».@8:ù%éDzÈqÀvÛ¶9±ã84Ml Ça†a„˲c²þËUضí8Î!\s÷ªrwÈù”Ÿ•~„Ã0¡––VDZeY+/„ÐA !Œ)5Ë0.·;#„(ŠÂbJQ &¬±ôø{\Š$I¡P¨¹¥…ã8·,3 ã „‡¢(!>@AˆO„¶´´ØŽãv»EA@uàÒñ—±jàÑã8B!CÓ·;;ŽÓÑÙé–eAlÛÆ§ìU(„cýK?AEUŸéå9ßÍUUu@¿~Ï>ù¸×ëUÅ4MA†QUÕår€565-übúçË2LTQÜn·ã8Š¢Ð4-Š"PÃ07MKÓ4¬°.Qœ1sÖko¾ÙÙÙ¥ëú·ýý¼³Ï²,Ëår©š¦ëºËå‚Ð4£kšeÛ,Ë>ù̳K–-ç8N–å[oùsŸ^½š†å8ŽeY,Ë*ŠÂó›vÍ—Çù|7of!´dÙrÀ ‰ ñ-­m½zö¨©­Õ4‚Ô«V†Ñ·OïôôôÍ[*|^ï æ|7÷µ7ÞdY¶¼w¯«¯¸,;+‹‚T}CÃ>…órr233ÈtáÏ1éZ?²·ôC-ÛŠF¢š®öë[þâ+¯Œ>|Ò9g»Dñù—'÷+/ø¿÷?þÔÓii©³æ|»x鲌ôt†¡wìÜIÓô—3f¸Ýî3g-_±Âvœ³Ï8cð€·üí¶Ò’âú†FŸ×KQ0 ?óÄcùyy„sç/ì[ÞçO×_ç÷ûyž_¸xñãO?çõvùýüçž7ßy·¦¶ÖãvGååçŸý~ñbÀêµët]¯«¯¿èüóŸzîùyó$%&vtv^~éÅo¿÷ÁGï¾ýÍì9[¶Tœ{öYϾðâÁƒX–©ÝU·`Ñ¢––ÖÑ#G´µµ3 óõ7ߨ–ýÙ_ÜróŸ"áÈ]÷Þ—ÿ“B=nEUŸyü1·[¶mÒ÷'< „X†EñHW…@ø‘ŸH?Bˆã¸ºÚºŽÎŸ×WRTòöÔ×.ZüõÌ™—_sÝÔ)/ß|ÃõÏ¿}ܲ¼¥¢ò½7ßhiiyä‰''Œ?±©¹ù‹¯¾êß·¯[–Ÿyü±7Þ~·ªºzÊ‹Ï]|ÅÕëÖo(+-E°,£(ŠcÛ‚ ày•÷?údÄÐ!÷ÿçžÝóŸ7ßyW…SO™xãµ×ž5é‚55û¿[V­Y;å…çÂáð-ÿGeUÕ’¥Ë&¿ðœ,É·ÞþOš¦ãã|nIòy½n· TVV:å…çY–YµzmGg‡¢(7o¹ñºkvÔÔLü2Ã0ŸL›Æ0Ì{}4|ØÐï»·{¡7\sͤK.[½vmyŸ^x†êHÿX„?!š¦;»:Ë{• ¼à Ò÷'ì3ác;¹Ù¹ùK–.[´dÉØÑ£õï¿d鲆††ÆŒy÷Ãî¾÷¾ò>½³23 óó%—ë•×ßhmk0þÄ`0øÝ¼yq¾8¯×‡ûõ)OMM1 Ã0MÛ¶!Žƒ(вl BhÆŠ± TVIDAT)'LÿzÆÝ÷ÝÊ„“›J‹‹³³2·íرióæ;kzô(kll²-!D3´iZ¦iê†aš¦išŠ¢È’Ä0ÌÊÕ«5]ó¸=íËV¬Ü¶}‡iš¶í¨ŠjF$ùï#m©¨DƒÁù æææØ¶”š’º¥¢b¯BY’ûôê…)šø@ä ŽçÖo\oÛ6€ ÿ=Ká0°¿e^ ÃÐu=‰|;oþ§Ÿ!IÒmý¿>½{Ó }æé§Þq÷=×^y…  ¾_´iË–žee'ŒS\T4bøð§Ÿñúk®þó7~ðñ'mmí£FŽ(ïÝ;9)B(Kr\œ9NB|¼ä’ ªªö,+{üá‡^œýäwk‡ÝaY»}~ƒªƒœÝÒOzû„?8;×hš’e9þ/ý¬Cî7öW÷ Ñž0ÔØº[¬Tn>Ÿ—¢¨p8ò›šoÇê,I’®ëhIuPù3 ƒ=9pƒà ŽÒ ¦poéGá`±Š¢ö–ÙüH_5ð¿qÝ"„ÃСPè‹/¿2M?˜Ø#ÿŒm~‚¿·÷ŒÇñ÷xo–½bî›Õ^yâC¸C½×÷ÇÙíÐ=ñ¾™Ç²uöXøÇ2Äz‡47onkkÇ. ÝŠp~Zâîl~,¡?öêëo|±±ËǧÄrë~™û­d,%¾ŠX&øO†¦ñðbñÒ¥~û¯í{™¶mÛÝÚa¿¥woÝÙÃ0mmmKXAQ”íØ ÃìØ¹sÇΚ¦cµï¹GÔ Û¶9Ž[¹zõ’¥Ë8Ž3 ûØ{ÀÁ½1¸ò8þ³ûga, Æqä ßÁ„”@ø­9¸1CÓ`è£O?3-Ëçõº\.—Ëåv»—$ ¹\·Ûçó¹\.Çq8Žõx<>‡çy¡×ëõzZ~¬¬lhAÁ·.ÞøÉ–ªªš–– …zzz}èÁD¿_×u†avîÚ³sÏQºï^MÓÞ~oiX’n_¼âÝ÷?ˆŠŠjïhoim[±jUSsÓ£=ˆ‚v=½dIgWw{{Ç ×];{挭Ûvlüä–e³22n¸nþ»ïPU}vô¨¢ë¯G’dK[ÛG+>6L£µ­½±iSuMËé¼ùÆ…+׬mii8aü´)“Ÿ|æÙžžžH 4èÎÛnµ,‹a˜¶ööW^C’¤ñ×\3aÜØ<ó¬mÛ=½½÷Ý}Wa^Þšõ*ö'$ܾø–wßÿàà¡C<øI‘/½ö Àì™3®¿öÚMŸlÙ¶sgRbâý÷Ü}òÔ©›?Q5mþܹÇ •å©gŸëîîŽäž›“óÈ÷¯ß´y˶í¢(ÜqëâÌŒŒ^~¹âäéÙ3gÄÆÄTלýïßüÖ²¬ÿà?iš¢Hêݥ¬ììê=²èŽÛ+=¾rõj^n_|KB|<2±½,¸ï€„Ð2-žã}¢¢â­wÞ³,ËçórWYU}Ï·§$'¿ôê늢ضuÏwúý k7l8Tr86&æþ{îÞ³oß¡’#$I6679SÙÑÙqß=wGû|hôïÜkÚ$Aâæªæ’çÁ Q÷gϾ}S&OЉ‰Ùwàà£=¸qó'MMMŇS5göÌ7Þy§¬¼üù—^IKI™4aüs/¾|¦ªêÐáÃ#† Ÿ?oŽ?!aî¬Yƒ Òuã¸Úºº^~uÂ5׌**Jˆßwà`SssiÙñÖ¶öžÞÞç^xiâøkFŽ‘œ”4('gÜØ13§MÛ¹{÷º›®3ç£W,)ihl”åŽÛn]±jõìÓEA\±rµCÑ€ï“K–$'&Í5“ã¸ç_~…$©ÜììßÿéÏqqqƒ?nìØ1còóòRSR®ŸmrRÒî½{— +,œ2iâ.¯©­{û½¥·/¾%=-íø‰Šâ’’å+WÝpݵC 2MË4MŸ×;dÈàÜœœ™Ó§í;p€`þ¼¹/¼üªªª7ß´pÙGË:TräèäIQ=öðC›>ÙRS[‹^3¢ Ì5kúÔ)._Q^Qqäè±ë¯»fݺ£eeËW®\¼è¦@0øú[o=:#=cÁu׉‚`朙3®;gùÇ«ÎTU½úæ›Ó&O);^þáò’,>zlÎÌ™þ„øó£Cû¦NžÉ}ó–­•UÕƒåÞzË"†¦—-_ññªÕ M>ôÀЂÓ4\N׿=úˆ®Ûwî<[S[qêÔ±²2§Óy×í·­Xµº¡¡ñù—^ÎÍ͵-û©gŸã¸ïĬþ>•ã>½~˶MË$IÐÔÜ\u¶úáîÛ³orRÒØ1£ÞyÿI–·ïÚ5uÊdžç_ûíý¬Z³ö–›n KÒëo½]}¶¦¹¥ù¦7ŒY”‘ž¾ðúëyŽ3 £Oâ´±…æªç’¥9Kˆ‰-Ì/œ››‘–Z——'+ŠËé,>löÌ™9YY6}¡}Ë¢›®7Wtˆ•UU¹99“&Œ5b„ÀócÇŒNOKµ,K×õ¬ÌÌŸþð¿öìÛ·s÷î„øø±£GmÞ¶íXYÙô©“³33òÃÿÚ³oß®={£}¾(;ÈÄÄÄS§ÏØ–UqòdFzšÀó,ËÎÍ-ÈÏÏÌHÏÉÎ<8×0 4.ôË'oljÚ¸ù“®®®¦ææ@ ÐÖÞ‘åv{=ž¼¼¼Ô””„ø8·Ë5yâD¯×ëp88Ž‹>tè°¡…çXiYt´oÌèÑyyENž8ñž;n_±rUÅ©SI"OGÑ>Ÿ?!>!!ÁétN?>7'§¡©ñ¦… ÆŽ3xð £¥e)IIyù¨Æòó†ÄÇÇ)ŠŠÂÿJ²| ¸¸ºú,Ë2’$e¤§ :thaEÑGŽ1|èèQ£\ÝÙÚÚ¨(O\l̘ѣ†áy~PnnÞ!^oÔÉS§uM?SUéõFÅÄÆØ¶=dð ©“'ù|>˲ãbc >›»ª´¶µíܵ[× MÓŽ––Î=»hĈœœlÝ0ýþÌŒŒÁƒrU ž +,6´ÐïO8[[×455™–™‘žf—<%þ ÒWúmmÛI€$ÉŒôôœìì¬ÌŒÔ”äÁ¹¹4Eºž’”4~ì˜{ﺳµ­mçî½EÇ5òúkçUVUÙ¶=|ذ¡C “½Þ¨Q£F2 ™á8÷/îðc®~.MúAX¶m»{zdE‡Ã=½½š®÷ôô¢nÑñò[¶m;[[»èÆ¢èXò⋯¾þa~^^Cc“$I¦e1,óÎ{KËOT0 CQTsK Ë2ãÆŒY¾ruKkëü¹sV®^ÓÜÜ2fÔ¨ª³g9Ž7fÌò•«::»¼^ïšuëËŽ>´PÅ‚ü¼æÏÏÎÊêîªvuu+ª †uEQ½½½ÁPhæô©[¶ïhimZP ŠâÔÉ“®3›¤(‡Ó¹vÝúÃGŽ8ް$½öÆ›mmm²,+ŠÚÓÓ+I’¢(míí#†««oxwéûÅ%%¶m×Ö×§$'§§¥½¿ì#ÙD0 CA‚Áή.†a óó_yãå¯[³ì£åŠ¢CAI’UUíèèÌÉÎòù|i©©×Í›7º¨( uw÷H²Œì Atu÷Èòùç¥i½½Ó²Þ{Yt´/--51âÝ¥K7nÚ|¼¼Ú°«»› ˆ@  iš¬(²,C¡@0¨éZGGGB||jJrLtÌœ™3§Nž|y=š}Fùm›€„,K²,ëšÞÕÕ­ªjgww8,…Âá@0HRT{GÇî½û^yý´”ÔëçÏ+.)ùàÃÞxûÝkÆŽµ-»££SSUQkkëÞ]ú>Z,öÙ— –~ÌUõÀ$$$D išîîéfÖåtYöVƒ@EAÈÍÉáX67'‡e™˜è˜ô´Ta~~^qIIuMM8,Ý|ã…ùyyC×××K’|ßÝwÅÆÆ² “›“òlZZjMMmRbbB|œmCEQ¶lßÑØÔt×m·feeÆÅÅîÙ»/7'gÖŒé;vîjljºó¶ÅƒrsSSSZÛÚ†™:eÏq»÷î „B9YÙ¢Cô'$$úý$E ÎÍ¥i:>.>%)ɲ,Úûö8VV6Þ܉ã¯2dpMmí±Ò2Q232²22ZZ[9ŽVXí«©­”›ër¹ÒRSccb²³2yžç8nÌèQƒss•–5·´Ð4=¬°pÝÆ–mßÏ]qqq¶m“ØÐNNLJMI6M+;+Óãvæç‡Âáúú†Å‹nÊÏbZæàAƒ"5FDNN¶Cu]OMI ƒg*+Ç3dÈà˜èèìì,€Ûãž8þš„ø¸ceeùyy ®›ͱlk[[A^Ïñ¹ÙÙ¢(0 3vÌè´ÔÔ½û÷777§¦¦DGG{<žÌŒŒséAÓô ÜÈóJƒæ Ÿ×ûÉÖm’,{}¾[nº1)1199©üÄÉü¼!×_;Ï0”¤$ŸÏís8¹¹9ôy*4!/+2˰hjýËÜ2EQíí‡e.ϰÓŠ¢ÚÚÚ>×_¿?Þ¯ýí¸‘á(Š’$9I’†¡iýIQÔ~öÄü¹sæÎ™‡UUeÆépBá°mÛèÛ¶9–u:aIB@išEÚ¶iYªªš¦ùËßüöчÌÍɶ,Ûáp@Û¶,K’ed3£éZ8,9Nd[‡Y†!PUÕåt†%‰eY’$QÇŸ$I‡Ã Ã’D’¤ÓéaZòðìv¹4]‡Ã‡ÈóB0ä8Î4M†aE!Â!Š`PÓ´¤¤¤%Ï¿ÐÜÚúûßþFÓ4Ý0PìÆs¶ä!ɲËåÒu]×u’$Q1Y–UMs»\á>5ær¹EAó‡$IŠ‚ ÐT•eYt M‡ÂaQž7L3C].'MÑ`Ðáp(Š!tˆb0âyžçyBYQ „džߺ7@«1úåNQDz€¦iɲìt:)ŠÔ5Ý0Mžã‚¡°( çÖsI’†i†*™¢(T±º®£—¥×5ÔÅÇÆ÷]„z' LÓäy. yÜnEU!„QÏÑÒ²—_{í/üÏs@в,d¨fz tˆ"q~A€Ëé¤iº7ˆè5„a˜îÞn‡èðFy¿Œì¯sEñÏýõ_€eÛ@€¢(ô¯¦iªª’$]NgT”Ç´L4NBQ”išÝ==Äyê耦ërGÚ&Â0ŒžžT,·ËµïàA‡Ã‘“­ë„BúhšfGW I’H ‚ (JV”Ko @Q”rþO‚ lÛF†öèLÛ¶?/AI’C!‰¢Hd¬¢(*E‘B”æÊ5kKËŽ ÿØC¡a´’傿“Q¦ÁPˆ<ïѺ7ˆÜ~o¿ "Žæ-Ë ƒ¨$I*ªÚ÷LY–Ã’„ ‚è^")œ»kU” ôî‰<»ÀÅr7MÕº‘@0H@ˆîKÓ4Š¢P‚}@$;Ã0º»»#×^ÆÖŒÆâûv¨Cá0qÞŸ3EQÝ==$IB‚èêî¦iÊårõôô  =€p8 Ϲ%‡QB»{z AÐ}ÖfGLû/ãÍb0ß—Öëÿ. t¾Ï…‚·\îúù˲Uu»\$I^FCFL?êêë¼Q^4öòe úÊ4Mó«µ.š¦{ƒ½·'Ê…{ý˜«Ž¯ØëÿnJ†V ]QºOMÓ·­ź…À¹ð,$ @üs×:€@aàñU|Ažs؉Á\å\qÒOô‰ØuEVüW°³Àåtõöö²ûÝ(2jœ¢ Ú¶¸a®^®DéÇ`¾$¶mÇÅÆõÐ=²"òÛ G@†f¢}Ñ4M_™ æK‚¥sƒ‚´Èš Èï"0/ €e[PÀëñ^î[Ç`¾Xú1W3èìîÌHÏñ» Ж·çò.dÃ`¾Xú1W16´-ËxÙÚ~ëÙÙ¶ È42(Â?˜«,ý˜«d×ÿd±ëÇŠ¹ÚùJÑ„‘Iÿb|—½9¡ ! @’ж¯´¨÷W>(6o?‹[¡mC´ã¬Rdå…Ý·aþ¸déGŽÐjUM×Uý iÕ ²_ùÂ/“ }^y/ "öeèÏöK^Â0Œ(ºaèºÎò¼ªªßÔ­ ú¹TC+9ŽC­D’å¯kó¢OóÜR^ø%`0W6—&ýÈ©ÀâC𦆙𒒕‰Ó²,´üýÑ„„m[‘?#ÓbN‡CV»O'¹D$I€¼$¢¸‰(\bäAÈ•®4M!'ŠÈ½AäÇYÒÙ÷‹$¢ã‘d‰ó‹õÏ'¨Ó4íE䚦³³‹xžãìóѽ#~á‰ó~ "¥Š¸‹`Yyèûæè¢=RH´…„loï(=~<ÑïOIIn®¬ÊÊ̈TÔ¿êGÕ7 8÷|#¡Z†©ª®®©©µ!€VXèv»Ñ¹¨iEÚáùðœÐ†6€:ßP"ÇI’DÓŸþF „HûñsÁ\í\BÕ¶mŽãê~÷Ç?--+9|¤¾¡!*ʃ\z½^š¦EAðFEÅDG³,kÛ6E‘^¯7:ÚGÓ4 Êãñù|Ñ>ßò•«LÓŒòx"=kQcc¢].˲·u¸<OäÓéô¸Ý[wì¬ohŒ‹‹5MÓ!бÑчömQ|^¯×ëu9Þ¨(oTTDs‘#³hŸÏëõ¢¾7**Úç#IÒírmݱ³¾¡!..N×õ>^év¹Ü.צ-[Ξ­‰ŽŽŽŠòø|>Žã²Gû|>ŸÏétár:cc£ÑÂcÛ¶Ý.×ñòŠ‹‹C·"9"¹‡º\®èè訨(´ù8úûÓOŸ>sfÇîݧNŸ^ò⋦i’$‰*Š¡é+mIó•I_ʦiŠ¢øþ‡½úæ[§Îœ>r¬TQU¯×kÛ6rÕ!t9QQQ àpíõºœN˲8Žs¹\111ík×oˆ‰‰!> hÄükp‰îÛ¶í‚üü'~ü#‚ A¬X¹*%9yø°ao¿÷Þ¤ ZZ[kjj{z{§Mžœ““ÝÝݽrõYQæÍžÅóü†M›UM ‡Ã«×®?ZZºhá‚‚MÓ†)9rdï¾ýƒrss²³ÎTVÍ=³§7°eÛ¶©S¦>zt÷ž}ƒå ÊÍ}þ¥—ý ‹n\0}ꔽûì/.3jäÔÉ“K>qòTWWWA~^SS³ªi‹Ý$Š"Ráê³5[·ïp8 ®›OÓôëo½o¹éÆöŽŽç^|)!!þž;î¨khxùµ×ên¾éÆÔ”AV­YÛÚÖÖÑÙyíœ9yCŸ©¬Ü¸y‹ ðééÇ_³iËÖò'F¸fìX˲ºº»_zíµ`0ØÖÖ~ݼ¹­­m[¶owˆâœY3A0 ƒãØu6–?Ž\êÓ4Ųì»Kß?yút~^^T”GEA[´7Þ~' ÝpÝüø¸8ì/èŸÒ×í„ж,–an\pý½wÝ¥ªjkkÛko¼yÓÂ5µµ'*NNž4qëö]ÝÝËΛ3Ûét”Ÿ8¹ÿàÁ¤ÄÄysf+-­ª>«ëú™ªªc¥e×ÎãñxÐ\ö×ù—áÒfÀl–­8yòû?úÉ}»}jØ6Œ1|ç®Ý«×®Á¶mÇãv»EQ\þñª@ €<+½úÆ›ÍÍ‚ üí©§±¿ /}?Y–Õ'@£mÙ6äÛï.}äßþã§?ÿÏs§N-yáÅ—^yD(zñÕWEQ cÛB@`O>˜«›KvÚlFvVÖ¯~ñ„cÙ„„„ceÇ_~íõí›6ˆ¢Àqìô)SæÎ™ÝØÜüîËzƒ_ýâ §Óù½ÿüÁÑÒ²¡ùwÝq;Çq»÷ì»eÑ¢œì¬ŽŽÂD¼ٳKŸ4aBÞàÁùyCvíÝ[[[?cêÔ´ÔÔ¹³f¢CƒrsÒRSÇ_sÍèQ£ž|æÙ`(t¶¶NQÕή.‡ÃqÍØ±7-X°z݆Ù3fhªVYUE‘¤eY‚ ÜxÃõG•ÆÆÆ˜¦y´´ÔŸ`fWw·ßïÏÊH7vì˜Ñ£Ýnw’ßï]w ‚ <Ç2 ññ7Ì¿VÓõ§—<·gï>Û}çí·íÚ½gÕÚµùùy£G*9ü¨úìÙ±£Gu÷tÏ›3{ü¸qúË_››[(Š:tèP[[{rR’Ëåœ{6+#³³³s÷Þ½kÖ­òxbbb „==½ùû“ùùÉÉIŠ,“¡(J0 †B@$©Ö¶ö–ÖÖØØ˜D¿ÿÖ›ýð?¿¦L.w#¹Ò‰ÌÍž K¨ªÚÖÞÑÔÜÜØÔ¤¨ÊG+>.ÈÒÞѱÿÀBÁP]CÖmÛ¢¢¢ÆŽu¬´ìð‘#ë6lÊÎÊ‚vwwëšfZfCCãž½{‘ÍÕ¹À¼çfy/÷ c0_›K ÐH’¤®ë¥eÇ+Nž:P|Hųµµ99Ù?pÿšu Ž=z øPyEŔɓçÍ™èOرk÷©3gî¼íÖÌôôæ–ÖQE#DQt:[¶íðûÒRR‚hooí­·kjjfMŸ1|ØÐÄ„„µ6¦¦¦,¼á†ê³5o¼ónMMÍÌéÓÇŒ½kï>Û¶æÏ›×ÙÙµeÛö†ÆÆ¼!CdEq»\9ÙYµuucF …ÂËä噦©jÚ;Kß/.)Y4böÌ™ƒr²÷í?X|¸Ä´¬‚¼¼¸ØØÝ{÷Ú^3v¬ª©;wíZ–¤”ädÛ¶ òóšnmo¿~þµ<ǯ\½¶²²Òívùý ¯¼ñ¦–\]NN6ðûÊÊË›æÎžåóz×oÜÔÛxðþ{ãbb4]wˆ‚¦kŠ‘€6´0+3B¨ªZO ·høðæ–– ãÆÕ74ÔÖÖÝ}Ç{ì/.)±-+oÈËÝB®tP€Fd´ƒÔŸ¢¨öŽŽ'O>SéóùÊÊO|ÿ{¹Ýîã'Näææ|¼zÍÙššîžž;o»mXAi™›>Ùêv»î»û®ÎÎ.Ç“ž–êŠêìê*¯¨ZXÈ2Lß’"ᘫ—¯ Q°,`è: I4â!ð<À/~ý›É'Ì›3Û2MYQxŽ£† Ó4 ÃxÅDû5MCŸÒE¡ø'Ï+ªÊ2Ì/þç77-\0fÔ(]×Ņ̃ Èn’ç8M× Ãpˆ¢¦ë¨Ç,ðt]EAQTš¦I’D¡I’dhZÕ4QTM£(ŠeYMÓhŠR5eŽãt]× Cày@’ªª²,k™&ÍК¦Ásœ$Ë<Ï9ηÞy·ôøñ¿ýùOÝÝÝ$I²,±Ä§(ŠçyÓ4UUxž<_3ºa á~”¯(–mGÊÆqœªª<ÏëºNÓ”eY à Yº®_îvr¥ƒ4öu§!E‘cY´öPQA$IbYVø²ò¯¾þƯ~ñsË¥jšaN§Yè†Ãa´@V´~…€0,I}çY–íêé: ñK,À¡Z0W_#@£eAÔâ#–Ô€`(äv»MÓ°m› `X’hšÖt]Õ4â|`? h¡ª‘µTè€Bøº\®C%‡ÃáððÂBMÓ"ø’$¡×zK¡“#ÅÐÎçKèÓ$²ǶmUÓ’,÷MýnuÃÐÎ'(nˆÂ„¡÷J$¢ï[ï.­­­mïè|àÞ{Âá0e9²4Á4ÍP(„’’• `äÆQ-)ŠB’dX’ e ¶m£û’$  %…<Ò|……H4Û·®ÂápðüÔ @­B×uBMÓMà †B¨‘ °”èLI’ІeY=}b‹¢dÏ(ï¹ã‡ƒ¹j¹äÕ¼(„i¿=AÐ4­(Êþû¿ =ÿéH:±ôFE}娼(K<Ó‹¹Úù†=wê_{ýQdÜãJ“W]×5]W^Á2$Iò< yŽÿòRþuz†aØÐæxhÄ\Õ|ÃÒÿÈâ•©­ß¤Ó8Ì7„mÛñ±ñŠª|GÏq1q<Çã [ÌU ö×¹º!I2)1é»|/[¦eÙ8>æêæs¥/\Á\@‘A×w–ã%» Ç¿$Ì•ÇÅ¥@ò›õŒÁ|K\á­Wtñ0“‹H? €¢*a9Œ}Fb0_¡nè¦iâ9aÌÅE¤c9hŠÆÒÁ|lh³ KÑAÅ\Q|΀ H’Äqb1˜¯ I$Iâ.?æJãsÄ$°«) ƒù—÷ë1 fÀ¥sÕÏ9Y£«×oö«¹‚ (Š¢¨/ヹªÁKº0WBš¦mÛ‡C¶m³,#Š˲¾)fFUUUSA‚Ȳ,¶pÃü sÉÒüÖ¢í¾þl#G#Þ’# ó?oÒØ²mê ]x¹eÙ#ý¾/3¼-þÓ_òõòrÑŠB>„/|.úD¾ñ‚‘ßò!M3=½Ý­­-,Ë"GO$I¦¥¦SÕWýQûDÎe¿äC'PS{VQšaI’ÔÔFŸ×—àïç7%©m˲úy±Å`®.MúQÏËépØTUíëÆEQ‚ÀK’Ü÷AŠrq/+n—KQ”‹zDq»\², ‚@ŠmBŠ¡A’¤®iè9ôÅv:†i~±ß®Ï+*zÇ|ýÞåWNi7ª~—‹¢È2Œ¢ª½5–¡iI–‘D~ãn—KUÕ/]à|„úKó~!d¦£³£©©± ¿Ðãñ è=uõµ'OUä ÉtЙχÂaÛ¶]N§iYÿ´yPuêô)ŽãFEÓ AŠ"+-3L#5%-Ò÷‡Ò劊 …ÃèÅãq»eE±l`®:.¡3ˆt¤¥µõÇOüüç¿üõ/ÿç·å'Np÷ipGŠjïèxé•×"½-/iÛŽkÖ­w:‘(wA £–e½øò+]]tŸ¾ꢚ¦ùüK/+вeÛö-Û¶£èä(ÔÉSÏ.ùÙ/~¹gÿ­ÛwlÙ¶M˲ÐU‘­dwí¢(¾ûÁ²ÃG:Žˆ+ö¾ç£=N‡cÛŽ«×®ãùOÝ@TMCº!´Ï;î×ÓìÍ£_¥Eüþ÷M©yßTП‘z‹¤`Û6Ã0¡Pè…—_Q…8¿xÕ¶m–e7oÙúį~]|¨„ã¸È…è_Û¶yž/=~ü½eò<¯œWç~õ)'Ê=òŒP±~· !Émžéåæ–žçQÝF”ý|1>­1ëKñ… è««Í’åñèº&Ë’išÙY9·»®¾–¢hÔ¾¼¢â¯O>M’¤Ëé|{éûŸlÝÆó|ß{ì{ïBš¢ÛÚZMÓ>lxucÏïßÚÿÔ‡%’j*ÑÞÞ‡P¿þ\ãokûáÏommãy^Õ´gž¡««‹¦(Ôà±C7ÌUÄ¥I?ÃÐ]]]•UÕ×Ï¿vPnÎ3Ï¿ÐÓÛër:5]·,K„P(|àP ÒhEQ Ó¡ªªúXYЇâB5MxÞ²íýŇdY&©O#Ÿ„Ãa†aû4 ³ªºº²ªŠa˶¢¸jÍÚÚººÓ¦0 }êôéʪ³ Ãð‡BkÑ4ÍÐ4Ã0ŠªFÄe˜c¥¥g*«Uxe„cÑ4Í0 EQaIbY¶²ªúø‰‡ƒ8?–ÂsÜ+¯½¾gß~Q‚Á¶mŽã†‰ 7¡ ‹A0 ƒv¢©HtBÈóÙ¶}ßÁƒ]]]7ßt㋯¼ÚØÔ”è÷ÿûc¬X¹zÇ®]Ç ‚Àq\cSÓ¿?úh~ÞEQÇÖíÛW¯]!4MS…eËW9vÌåt>öÈÛ>ÙÒÒÚZ|¨Äír½øÊ«¡PhÈàÁ³gÎxý­·õó'víÙs¶¦vPn®×ë=zìØæ-[÷,îéí™2iÒo½ «EUž«­­ë½¥áphhAÁâ›ýúÿ¢½½cÖŒé·,ºI’$‡(>óü gkkS’’¦M²fí:M×gL›:sút@€wÞ[úÁGÍœ6í–›n\¶|ÅÞýH,¾yQÑð᯼þÆé3gP­^·®¸ä°¢ÈÿñØ£111_2% À `CˆFZÐ~˲hšîë»Í²,‡C|â'?ú¿?ý™¢èÇ~(7'çÕ7Þ,ÿœ¶¡( AEQ"¼¶ËœË%²<øx £'Äsl{°ûÓOt]›;{„ðÝ÷?¸í–›yž¡¶®þå×_—$©° àŽ[÷ð…Á\±\ÚìŸ !C3•UUßÿá~ðãŸÞ{×]4M?ÿÒ+C òiŠ~ö…†±m¨ªêØ1£ï½ë®Ø˜èå+W©ªzÍØ±ûóŸtMÿxÕê¥Ë>t8ƒrsž|v‰$ËË:7ÈÀ²ì¢Þ|㊓'s‹L8ÐÏI×õD¿ÔÈ¢IÆO<©âÔ)’4MŸ:uêÃO›:¥²ºzùÇ+÷îÛ¿àúùS&MBµ(ø×‚ë¯ûÓÿýîÈÑcûö¸qÁ wÞ¶X–åu7¾÷þ²±cFÿï¯9´°€"ÉÝ{÷¾öæ[÷ßswt´/ æç ¾àúù÷ÜyçÚ Ž——ÿêçO¤§§=ÿò+†aZÛÚÖoÜ4qü¸¹³g 4¨©©¹ªºúhi©(Ššª®Y·~âøkæÌœ5´0İa ¯»îî;oßôÉ–}Λ={ãæOöìÝ/IRbbâÏú“Ò²ãÜswa~þ†M›A I²««ëýe=üÀ}ÿõý÷DyNTœüpÅÇÓ§L­>[óÎ{KçÏ››’’òðƒ÷-,X¼hÑì™3·ïØyêô™ÎÎ.Û¶ƒ¡Pk[MS’$åR4bø‚믻ó¶ÛŽ•–(.ŽÔ „Ä ¯¾š›õË'/.9¼mçÎîîî…×_ÿà}÷®ß¸ EΡ(ª¾¡¡ /ï‘|ã­·Nç Üܧž}…2øûò_?X¿qӆ͛×oÚü½Gš;kÖ[ï¾·|åÊ'ùÄã©©)o¾óîì™3 óóüƒÿt»Ý‘q únÓ Ã¶-ó<†a@UM#>b3– óó òó½Þ¨9³f8X¼båª/h9– „ä”XÑE« m¡Ú¦îtt;IVxžûtÈŽ lBøýïoÜ´ùø‰¢ X¦õ⫯æfgÿêçO*Ù¶s§CñÈæÊçÒ¤`˜FnvöÏúÇí÷'hš¦©jo à÷'Ì5KQUš¦].×¶;·lÛFÑ4 ‚êr¹†<(÷Ô™3¡PH×u‚ -\!$ ár9‘IuOOï‡+VTVU9N]× ¸œNÛ†¨;Œ,7xŽ!ÊãxÁ4-—Ó ‚hmk=räÁƒ'Œ÷ßÿìãU«?Zññ¹1‚ (Êíry<ž„„øêššõ7....Öér† H`C(BNv–Ûí …Ãçžà Ñ€ŒÇã)1Ù8? ‚¤HMÓÒÒRo½åæ§žYbY–¦ëÝ==£Fôûý))ÉMMã˜+ŸK–~Ó4ƒápfFÆ¿?úÈþüM׋F WdÅŸàOHp»\u õï¾ÿAñ¡C<Ï£!xÃ4‹•¼ñöÛë7m^¼è¦¢áÃUE‰INLDæ=¯½ùV(bY¶µ½íxù‰D¢"+Iišúêo1 ³nÃÆC%%höU’dI–UM …CÑ>ï‡+>V5+3Ã2ÍD¿?59¹øðáúƆøøø²òrv€@’¤m;v>³ä¹æ––ÑEE;v튋‹5 “e¹Q#‹þô׿½ôêk'O†‚ÁYÓ§Mš0þ‡?{<SeYVjjêÒenݶýºkçUœ:õä3ϾüÚëóçÎå8Ž¢¨êššÃG¦¥¤œ<}º»»gÎÌ[·ïèîéUTT~âÄ‘c¥i))'O–$)==mé˶mß1yâD^à9–MNJŠŽöCÁP8lYVWW·iš’$Ë’L‘”¦i™þø„_ÿöw­ø¸®¾ahAA¢?ѶíäÄÄ„„xUÓ‚Á E’gªª Ïë•$ùÙ^X·qS0Žöyoß±3';ûÝ¥ïoÙº­¼¢¢¶¾þ\ýÀ²,·Û5eò¤ç^|éO=ÓÔÜý¬$É_ÞÞÙ• Êràળ•4C±ã¸ØØ˜ØØØ3•U.—óþ{îq8hahAÏç…Þ~ËÍ~¿?!>>5%Utˆ™é ññèÑ'ÄÇgefr,SŸoÙvsKK||œ?!!#-¦)—Óuçí·Eû|#G —epnîu×Îóy½Ã zƒÉ&Lš0Þåre¦§“•™‘~I˲<O”Ç[]]]V^ZVVÚÚÒârzŠFŒì×D6´£¢¢rs²].—(ŠC êê ã"m#b™“˜˜¤kæÉÓ§JŽ–žlØÐ‚‚ä¤ÄáÆù¢¼€·-¾Åï÷_heKQT{G»Çãa/Æ\v(Šjkk»wï6lj¯¨qWVW:D‡?Þ¯ú…ÒOÓ4DZ²¬@‡a¦iº\.UUUu8$ª¦‰¢x.‚’ms ú“è³ YBÉ4b‡) qÞZ¿oy.L]Õ÷OTžˆ1(2Ý‹\ŽÞ4;÷Èv¤B"¿g§ÓyðС½ûüàß¾§éz¤$^)Àù•Všé{×ýÒï›Hßé[¥dŸeèôIÙˆ<Ž~k€û. î[«‘’ô]{áŒ$دŠúýÙïq_j«½0ÙÏ;öy _Ü6"—ômc}×j|A²‘eß·¦K?æŠ""ýŸ ‘@ÿ]ì‚"Ïý€…L έ¶EÛŸÙI‘€‘+i’Šü9êû'0’Tä„H¦hGäPßìún÷½*’)Õ§AP}Ë‚ hêÓš eý¶#{PvA¨ªZ—7bØPÃ4Qí}¦T}®E8wwço²_­GÒ$Ò÷ÏHmô»…ÏÜE¡C‘›º°~>S±ŸI–ºè }Ÿ`ß{¹°ŠúýÙ7‘K‰O_´mŸ¶Òþx±{?Wi}Vê‘€ü§Éö}šŸWæs5ƒGÿ1Wý¥À¶mÓ2mÛþòæw˜Ý0q­aèãÀ4M¤ sEÑ_ú-Ûr:œÍ===øãô’Ĺ_xdƒ„i}ºBƒ¹øŒô#óµø¸ø„¸!*‡Á|@àô/Á|}.2Öÿén¨Ì74!;Å\Q\|Y n¦Ì7þAa®4®Ä˜$ ƒùVÁÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3àÀÒÁ`0,ý 3à MÓ ËaC7—»0 ƒùê¦nš&MÓ´Stê´Ž¥ƒÁ`þµ²,KÓ4ðÁ`0˜–~ ƒp`éÇ`0˜–~ ƒp`éÇ`0˜–~ ƒp`éÇ`0˜–~ ƒp`éÇ`0˜}¹ €Á`0W(Âï,/äOáÛÎB H`éÇ`0˜‹ )šø®ÜX–EM»š !¤IšÀÒÁ`00M³±½Q×5âÛ—Š¢â‚hmkEï€o a\lI’Xú1 ¦?€æÖfQR’’lÛþÅ$I†¥pcs#‰ø¸X—Óõ-å`YV[G{Oo–~ ƒémÛ¦a$ggyA]þ¦æ‚€IþDUÓ¾%?ÊBš¦mÛ>Q^¥ƒÁ`.¶mù@-Û€ `Ù¶mÛßžôÛ¶ Hl܉Á`0ã;`ò]f°ôc0ÌŸ@Š#qÀtÌ/<¿„Õ&êõ÷K‡$I’$È"ó+p±|À> ó9|FˆmÛ†REœ7Ä$I kDëÑŸ–eÓë󲹪¯ñþoÀgdÚ²,Ã0 „,ËÑ4…FŸ „‘D.܈$в I’¢(Ó4/|á^?ƒÁ\„ˆZBY†mji>q²‚¦hš¦«kkªÎVs,GQ˰•g†eÙce¥Á`eY ‘¦hI–CáÏqH¦Ñþ‹e÷é+„eÙÓ•göØWvâøÁC{½èu±,I’AÐ4mp,K‘$„$Iš¦9Ž3L£»§›ã¸ î K?ƒÁ\ÐwÚvÄæÒ¶-¡¦k½½½-m-š®Sèè쬩­‘doooM]mWw$àéÊÓ'Nžìèê¦Y×PßÓÛƒü 0-3#-}Úäi111•ÕU,Ëʲ\S_'ÉI’=½½è3" 𦩍jM]$I4MËŠÜÓÛÓÞÑ^S[WZ~­Dd´ŠÀcý óy|v”"2† †aêêKËËš[[.Ñu½¾±áä™S’,ëºN‘d[G{8>yúT]}¦ia)ÜÞÑaYÖñåÁPèLUU{GEQ_0Ù´´6‡ÃaÛ‡ËOž$©¼¢BQÕª³ÕÍM€Òò²®î®ŠS'òT~ò„¦i‡mnié ôèºÞÒÚjYÖ§/2HÄÒÁ`0å3ããBФH@’$I@¶옘˜kÆŒ÷z½•ÕU­mm…yùà ‡ºœN˲’ü‰‡Ã¶¡ªiþ„ÄÄxÿ°ÂaÝ=Ý]Ý],ÃH’ÔÒÖ‚æ"Ùõ!Ëò±ãeºa ɯo¨—$‰a˜îžîžžîŒÔ´ŽÎΖ¶V·Ó¥jZo —e˜îžžÎî.š¦ââG“žšîòŽQIJlßw À½~ ƒ¹(}uBȱ\ dIÕÔ®î.žç @€$h™&Ã0¨ËoÙ–n‡¥(Êépضm[¦ª©†®šv9œ…yùY陆a|j5tA,ÛNKMtÍ]×zƒ†e†òxF(òz}^¯×¶íŠ“'““H’dY6Êã9|D|lœnÛ6-ÛÒuMV”Ï|[‚ÀÓ¼ sq΋1À0Œø¸ø¸˜¸’£G>$BrR’eYMÍM{ìÕt=+#3=5­ªºúȱ£¦i² # Bgg§ª©EÅÅÅáÒòã1Ñ1q±ñõ M-ͪ¦’€üT”AŸ™e‚ ‚¦)C7GZjÚ‰“'üñ~‡ÃQ[W×ÚÖfDz>¯0ÚçKˆ‹wˆç™&MQEY–å‹ò’$u´ìاF> @ìÞ½{ذaº®KëÇ0 æj¤¾±>'++ò'²²×4 ™ß° S^Q¡ZVz&ÏóÈüFÓuÃ08–EþÂRXàŠ¢(’2Löm–e’$A‚à9ÍôB9Ž++/'8´ P;ïÈ-ëEÖ;ºaÐ4 –ÃEq,×ײ™I²D‘²çA°mÛ0M–aÐÉ4Eá]»wc»~ ƒ¹ý:ÃBÓ4†!?A¦AQ´ÏëE#*B–a8–EÛ€(w” m¡ md͉9”H¿ì üL–I¡•\6„ à Wû.§«ïµ} ô=±îð,gÃH^çºýXú1 æ¢ôùt•¦i&%&¡izß%]}GÕ-ûS÷Ë}÷_Ä5йE^ç6Îíëcb¹ü Ü }Þ¡>ºÿiŠXú1 ¦?H"Áç{p³,ËEœ_ÙûµòútІè»ø[º)’–~ ƒ¹’$Eq¹\¶m_t"))óõâjA‚¨šHBÕ4dˆùO½ž{™„,+,ËbéÇ`0˜‹ÛÚÖÖÞÑñmg„"‚ÅÆÄ€¨­«£iúÛêø`™¦Ãáôy}Xú1 ¦?Bžç““¿—ý§Ññ­æ!¡¹©K?ƒÁ\„s¦2߉Õ{_¹ÿVs„Z–!ÄÒÁ`0ŸË·7ézysÄ«y1 fÀ¥ƒÁ`Ÿ;àçúöGâÈ|³)ÛF–E\˜xd¡Ý—¹¯Hø ƒùWâs¥ßétR©ë†¦i_p=RÒK•o䳂ã8Û²UµÏ¡¿PgmÛ¾ÔÄžghšÚv?—uBš¦ž×t]×/Vuä²ã»™ßÇ`0˜ï’‹H? ¼gï¾îžžœì¬Ô”ˆ' ˆ_!t&MÓ,ˆÃad‹Šö÷ _‰¦«Ñë!ân‚cÙšÚÚ'ccc† Äqœ(Šªª¢ô#‰“$ép8Âá0Š‰Þ –e¡ø‘¼ÐI’EVUWwtvڶͱÜàA¹‘`¨´`ð@ñ¡ôÔÔ¸¸XÃ0PÔcÛ†F6„Iêºn†(Š}ËCôY¼¹# ƒ¹º xà„„„¾ñ‚9Ž{þÅ—÷,–e¹âÔ©±£G{Ün˲,Ër8HÉ£<^hšnmk+.9\4b¸ªª$IFEEñ§é:I’n—KE–aX–uºœÈù„PÅ’#Gž~îyšf:”’œœ•¹výúÔ”ÇcÛvTT”Àó]×?ÙºmØÐBŽåIÚ¶ír¹LÓ¤i:Êãáy^Ó4‡(r§i„ Oüê×G•vuw767646&†çyçm!„úëß:::bc¢ÓÒÒÜ.Í0š¦ ï‡Ã0 AÜN§Ã!=Vºkï¾kÆx^t8hšFþM=n·èpp‡nçr?A ƒ¹(Šjkk»040°,kÿÁâÇ~hÞœÙápXÓ´›7-,Œ‹=X|(:Ú»rõRUUçͳì£åÛwíîêêš=s„pé²¢8Þ\I–·íØÙÚÚêóy½^oÙñò™Ó§egf*ªÊóüÑÒ2—Óù‹Çªišiš{öí{æùŽ––Ý|ãBQ_ëm‚ \7ÿà¡’%/¼ØÐØxݵ󚚛ccbý ŸlÙ:zÔÈ@0¸uû‡(^?ÿÚ½†1yâDI’ m»œÎ»ï¼cü¸qš¦utt®Y¿¾«»GUÕÅ‹mÞ²åXéñ[oY”•™US[»gßþ”¤¤©S&•Wœlhhƒ³gÌ8rìXÉá#cFòù¼Y'***«ª›š›s³³'NoÛöòU«º»{b¢£Çív»ñˆƒ¹êè?ŒnÛ¢¨{ïºóµ7ÞüÉ??Qq2*ʳuûŽO¶nchú¥×^×4íoO=UV^X–åXÉßSKž3tãteå[ï¾§ÈÊSK–x<îå+W²u;ÏóêÝ0iš‡BóçÍ%âÞúpÅ ‚ ð ‡=,ËúÃ4EQ´,‹eÙe-?yò$$à«o¾ÕÜÒú›ßý>³,cšfMMí™Ê*–a „€º®ÿõO=ðècO-y.,…ÿñô³ M—–•½ýÞ{>Ÿ—ahžãOŸ9óÿþöáŠU«Ö¬Ûp°¸øÍwÞãXnëöK?Xíó‘$YYU½c×îÝ{÷}¸b…?!aÉ‹/557/_¹jÿƒ>¯÷¥W_kmkCžT/÷CÄ`0˜K£¿ô“$PUõ¦… žæ©QEEÿû‡?––¿õæ›ËÊËЉö>lTQ‘¦é½Þ´ÔÔ‘#†gge=pß½=½½ÇËOBÁ®®îºúÚ™wÞ~ûÈ#†æß{צeʲDÓ´nÉIIÏüãïÿöè#;víùÛ“OOMrrÒ=wÞ9|Ø0Ÿ×G@¨ªjggWAÞ´ÔÔï=òpjJ Ïó§“e¯7J„©S&5551, !¼÷î»{ø¡Þ@ ëÓ sÛâ›ùøã·Þ¼È0̜쬻ï¼ãºkçµwt$&úï»ç®òŠŠÁƒr}èÁGzpëöí¦iÍš1ýŽÛn=|ôèÍ7Þøàý÷Mž4‘$Ã!² 3eâÄÛß’•yæLeÉáÃÿñ½Çn[|KnN} s•rq Ÿ«VÅÅÄ6tÙòå--­3¦O{oÙ²'Ÿ}ööÅ‹5M6´° ?ïñ_þŠ€DaAAcSÓÉ“§xŽòxr²²æÏ™ãt:E‘$Y–$Y‘eY ƒ†naÛ6Çq¥eÇ›š›ÇŒ•™žÖÖÞnZ¦"+Ň%ÄǽúÆ›¦eNŸ:¥¼¢Â0ŒÞÞÞ‹Çcšf}}}KVf{{‡ªi³gÌÈ2ä‰_þÊ뉊ŽöÁ¢ÃU% ªªeY$ ,ÓÔt-,É¡`0,I–e+Š …{{{ÓRSW­][SS»s÷žÔ”@ $"6&fϾ}ùyC8޳,KQTM×%Y& ”dYE§Ó¹aÓfŽãÀ7n–ŠÁ`0ß ý§yQÊ+WoþdËââùóæÎ˜6a˜žžî­;vþìGÿøàÃ6oÙ’è÷Ï™53+3£²ºº¸¤dúÔ)‰~ÿæ-[Ê+*\.gRbb]]ý¤‰jëêbcbÒÓRÏTU;†¡iŠ¢Ž;öÁGËwíÞ#ü÷}ÄépÒ4½nÃÆ¤ÄĬ̌’#GZZ[ãbbgNŸ¦éú¦O¶ -ÌOINY¹fí©3g¢¢<#† {ïƒeŇç ¼ð†ëÖoÚ\W_?qÂxE–†)¯¨()9²¿¸øteå œì®îîkÆíêê2 3oÈàºúºÑ#Gædg•«×¾÷Èímm¢(ä奧¦àË$ ,Ó@º¦iÚæ­[-\HBh˜&Ïó¦ieYÜ+Š‚ŒßQôwEQI躎NS ÑF8F×Fö ™&B’e’$E€è«ì’$¡tžG;‘¡}DUUÜ@QUÓ4Mó3Å$   â| ¦i"ËQôºê›Ž,+‚ ”>²kÏž¶öŽa……‰~?Ö} s5rqéG¼yNÓï¹ëÎÜìlY–#!ä#’òŽl Cç¹à´‹îŒìéw%rÑK"eè'¾ýþ$ÁÅ‹qî=ôÙïã¸_:E™¦™‘‘Ž>h òòðPƒ¹JùçN›‘óƒ¢áÃÑpÍå.ðåĶí(gÂøk „²,_îâ`0ÌW„&.ˆ"Q"£:—»À—Ã0"CX¸60ÌÕEDíi’$Y–%¾«`4 ƒ¹\ i^’$é®®®#GŽ`o 3 I²««ëÿtþ$ÑÓB®%tEXtdate:create2013-09-27T12:34:47-04:00Á ј%tEXtdate:modify2013-09-27T12:34:47-04:00°Vi$tEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/system_policy_type.txt000066400000000000000000000006321330160122500254760ustar00rootroot00000000000000If you have more then one policy type installed, the advanced screen will become visible. You can select the advanced tab and modify the policy type that SELinux is running with. Policy types are installed as sub-directories of /etc/selinux. Changing the policy type of the machine will require a system relabeled in permissive mode. The gui will insure that proper labels get assigned on the next reboot. selinux-python-2.8/sepolicy/sepolicy/help/system_relabel.png000066400000000000000000001472031330160122500245170ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìux7úÇ% /ïší8ÆØNf¦¦M™™™®ýµw½Â•™{eN™9¥´af&³c;föÒðŒ~(Ù:Ô6½¶Ik}žÈ€î5æˆ}CîÆîŸÿÇ‚ö88ðÑŸÏí¯…rùIú©Á‡ò§A4—aƘ 8ˆ€B0¶m#„È!9J¦£–ØÜ•mÛ¶mï%Ó!lÛD¼í_qçÇjBêÆ ~kÅ(”?rs’;ŸÜó`ŒÙØ ‡ºÚ”¿3d8bXV–cç–e醉Ю£ËÊŠÂqƒÀ4MÓ²xŽÛwÐýÓèB€1B¨û½Ž1–€ žeYÃ0ˆi“$P•ãXÛ¶mŒIþû¾%ÄJêºaÙ–$ФsÒtÃÆ¶Àó6Æ`w/Eò±~¢Û!ð³ï {¢Pò|±,‹Ò4 ‚mÛ¦iîõn»ÕY¼zÛQþ8ˆ.¦ùîç3g-\¢iÚÀ¾ùßvÓ‚e+Ÿ|õ I’"Q¹_ŸœGþó¯«ÿs￯ºtHÿ¾ÀkÖÏœ=ï‰;oÛ1Œ®ëç5]g!Äkº. ‚±a Bª®ÿëþG[ÚÚ9ÙWžwVF¯T!˲¦aDdùŽÇŸ¹úü³¶•–WTï¼ëÆ(Š"I"Æ»ä^×4 € –eišæt:ßýâëÏ¿ÿñ‘[ÿ5d@acsËÍ>^›}ëµ—s Ë0ŒmYºap!@ˆ1 ô,Žãb‡<Ï!ˆ0À¦iY–%ÆXÓ4†aŒ5]'}…rPضͲìÎú†`8<¸__ÁºÍÛ>oFZªašÝµ}oéÔàCù#±lÛép,^¹ú“og=pó½’“v쬄£Ñ€ß÷âƒ÷hºŽ4tCQU˲ €º®gg¤ŸvìtÓ4Ʋª¦§¦`Œ«këÒSS:»‚𮛦Åqlï^i•Õ5¡´¤Dc@{g×MW]:¤°ßm<ùÑ×ßÝuã?jêꃡPNFo–aU•UmäA™é½lÛ•U0±,kÛvzj „°¼ªÚãrùrÿ‹—–UVO3òƒ¯¾¹êü³_xûý+Ï;+#-UÓuc‘ç,_µµ¸4Žœpä”Å+×¼ýé—ϼžk/:—eYŽe—¯Y_Q³sÌÐAÿ}ý­Šê~¯75)qÝ–mÝr£CïzâÙ[®¹,>àÈŠ:vøYU_yŠÊ#Ʊ,‹AhæìyµM]qÊ¢•kªëê9ŽeóÐ-7~3wAM}C{g×egŸ®ªêŒ>Oˆ Ô66ý늋ë›Z¯Zƒ<é¨#òs²žyãݬô^½’“úöÉénÝ¢P~%BYQF‘å—ßûpÉ™§>T–•})ÔÖOù3€¨š–™Þë¹ûï\¸bõ•«gΞ÷ð­ÿâXÀsœÉ[,Ë‘ç8–å±9lÛçž|||Àÿ苯 ì›ï÷zyžs:–mOŸ<¡®©éÖ‡Ÿ¼ñ²‹¦ŒŽD8–%sŠª¦uíEçì›ÿÏ{>ý¸éÇM›òw?øÝ¼En§ƒa€@„Õ·”TV=wß>¯Bx㽯ۼÍír¦$% Ð?{=œa) ñãF »îÎûo»öJˆàºÍ[1Æc‡Ý^V±`Ū•ë7A&Œ~ÎÉÇ_yë]Åå•SÆŽZ³iëÒ5ë~\´4Žœwê‰ÇNtÓýV×ÖÏ[¶bè€ÂæÖöO¿ýá¶\™Ü~ýÕiI‰QY¦Sǔ߆mc„CMËH¢€²m¼×RÝýØúuÍ)g0Æ‚À—WUo/«;lϱ¿<£­£cìr:Î>ñ8Mׄºn@j꜃ ¢j`ÛÆ6ÆBžc9–å¶3¬¨ÞÙÜÚ†±m+Ž8RkG‡®iÄôPTõâ3Né—×Ç2MYU%Illimhj–ÅçqËŠÚÔÒ*ËŠeÛI2M³º¶Îtû½žS>êÝ/fºŽ£&Žëþh„#òØaCž»ÿ®á ?˜ù-ÇquMO½úæÔñcÒS’uÓ°lŒ DxÝîêÚúyËWŽ:¸WJ²mÛÏ5·¶Ö76iºÎ° ÇqQY)ÌÏ8z¸¦ë–eéºf} )¿ c‡(._·þåw?¼äÌS/¿÷„`ÌÐ!²ª¢}lý»<|ˆËÚ¡®<åï ÆØÞÙõéw?¼ýéW¢(\tÆ)y9ÙÕµõÁPøÊÛîŽÊrßÜìûþu½×ãyçó™B‡$N7ÆãrclK¢!À „2ÓÓÆúôŒ·]NGVzú‹––WÕ<{ïO¼úF¯ä¤£§LÐu`ìr8Bሦª²ªºŽËÎ:ý­Ï¾\¹aÓ ~§;½®±ù›¹ ããDžÐ7ú¤ Ï¿ý>˲gô”±£>ý¶ö‘ƒªšFê/¼iY‚ƒúóË2,Çq·+'³wEU¢©YþtUS–±-›e˜@À—“Ñ»¢ºFQµÜÌÞÓ'áí¶–”·utf¤¥ž2}Ú‹–¶wv PX%ŠÐÆô1¤üvLÓLÄ]{áy£† „òðù,ËÚk÷'Ïé¥K—>Ü0 êáCùCÁ³  ˲$’ hºnÛƒŸ|Zˆ—ý·â.ïÍ]ilŒB<Ç©šÆ2ŒmÛºa<Ïsœfº®óGÎ#/ ±¢‰¯›¦N‡¨ëq7‚ ‚(ÊŠ‚1`t9÷>ý‚ÇíþוCaâfJžmÛp×7˜gYãŽ`Èåt0»ß«É%£SG0är8X†1 Ãájêîýïó7]yɰZÚÚ¢²â÷zX†±1@ôá£üo`ŒžgY6*ˇC2MK×õ½×3bÌóü† ¨‡åÏô,¡[’lÛ–…ø¿w{ŶøI²!Ü%âŒ1ƒ mÛªª2 CÌâÏcŒeUeyÞÚm+gº- ¨ªŠ d$Ë ñŸ' 6Ʋ,3 ƒ±-ðÜÆíEë¶l{ìö›5Uƒû8àCƤںi"ã}^«Û{3©¤iš‚8Ÿ×4MQ࿘5{ÕÆM¢ƒäd‡B!—Ãáu¹LË$—lÛôé£ü¯¨š†U•øóD¢2Üß‚ù=9P[?åOc›ÉÜïgYû¹­ÝÉbG÷Š1°öœ Ý7¹1 _bŒ÷I`YÆÀ4-ˆÐå眑™–¢éúî´à@ϱ¾ÏÄ,©$ÆÀ¶ €¢ªÓ'ï›—ëÄ>™½ ÃdµÚÏ^2…òø) `úý8wRƒ¥‡!Ð #?+s@~^$ý½žÛ¶]ÇÐÂ˲UUtÕ.åᇇæ¥Pbhº®¨àßñ¡0M3l`wd!ú¸Q!?yøPƒ…Ò²žà÷Ís¯p=Ê!á§Q?Ã0$$!} ýÛsHÔç0”ÿ¾æÍýÅb‹¼Btˆôwb¯1ï^ ÿ%’iÝGýÝ£âü ûMö+Ïý™Êض}8tBÊÿÙÊ¢½£}Ô¨QaÃ0‰\C€–e%&$®[·¶³£#!>q_{>»ß].DZƒ¨,ÿ|PO²Kõ¡n„žÎ^‚x }„î2øÀ]8<Ïó<Ð4Ý0ŒŸ‘Duù`5“X!„dì´1Þ¶±axðÇsB]Ó»c8ŽƒêºþÛÔ{רŸ*?åoÙŠ]×µÖöfMу B€i[ ƒ DÁý¾ä²ûæÅqÜâ¥K7oÙ?iÂø€ßoš&Ã0d„ˆ²l›/Š¢¨iùž¼+@»Æ»ß@hñA~2€®ë¤åÉBýx°ÀÝ£~0Æ<Ç×Ôìܺµˆø…ý’’MÓD ØØFuîÄñ¬eÙ–e!a{×÷AòÀŸn/QL[!€ØÂ€]÷ÀÇWTV ‚Ð+-•ŒDb¥@IÑc^àëë ÓÌÌèmBÈÆ6˲õ ¦iffö6tì~Y‰?lÛF ©6ØtîQ%¡mQ?fÊ߈1fFàV†±41 '9ÔH˜çxxàáÕÒoÛ¶Ûíþaöì/f~}ÒñÇ—–¶µµgôN7t#*Ë‚ ð•eÛÅ0¬a–e½÷ÁGÇwLJRRW0èv»„t]—Åír!†±m{W9dY>¬–tþm`¦½£B'˲Ãáhkoø¼Þ=¦w0€2 Ñ®ñþÎÚÚ™ßÌ:bÊÄ–¶¶Î`0+;c¬( BHEEQžgXÖ²,†A‹/KKK-ì[ÐÞÑát9Y–­ªª ñÇY–MBB5M‹¹ Äv alY–Ãé\³n}BB|Ÿ>9‘H„”ŲŒiZ¤hI’,Ër:?ÌžÈýû÷³,SQT‰—\.çÒå+[Z[ûõË7yžç9Ó05]—$Q–w‰DX–å8β,žçm˨ªJÚBh±Öá°¼€Bù]€Ø–ŸÖKÞ¹³¦¸Ôˆ‹†¯¨Ù&;\Û¶äÿ³‡ôcŒY–iniåX§Ÿ~ê)¦aÌ›¿0žrâ ›¶l).)=öèéŸ|þÅö¢âÉ' ˆÞyÿƒM[6ŸuÆé#† {÷ýªªk¦M2nì˜/g~]U]•å¾}KËÊ|>ßùçœÍ’MS)¿¶m;Ž>žýѧŸ¾úâ …ÛKJ®úÇu_pÁçžGözÙbÚ ù5U×T5??ïÈ#¦êº¾½¸¸¼¢òÈ#¦vuu-Yºb⸱›6oݺ½(#==;;óÇÙó<wË„ñãÆŽ^¹jMIiY~^îøqc7nÚ\ZV.+JzZZ0Š*ò±Gåq»I¯!$«yɨÈ@ä”ÑÁ@Ä2,˰+V®®®®ÉÊÊ;jd$9ç»ÖÖ¶£¦Mu9œ<ÇG‘ïfýxÌô#×mÙPRV^_ßп°ÇpK–®¨©©íÓ'§_ß‚ fO›:% }?köÉ'ßÐØXYU”•W„Âá”ä¤)“&B1ÀB¾FÊï¶1+Š¡ÊʲW^/œ<ÙJKåC¡ÆO¿X¿aã¤;îø€ {èB( ŸxÜqÙÙY^~åƒ<ÖÑÙéñz>ýâ ˲æ-X ‡×®_ÿîû5íˆÄ„„´ÔÔÔ´”!ƒäå}öÅ—›·n3jä3/¼ÐÒÚ²tù ^ú¼õÞ{'ÜÚõë—¯\åt:-ºløwB¨(êÉ'œÐ+5íºþ9wÁÂënøg¯Ô´c§¥(*ì¾ý†aX–eYÖ0Œ~} ¦N™ôÒ+¯?ñô³UÕ5)ÉÉkÖn…Â;ªkššš#Ñ臟|>lè¼>}âÒÒRóóò† ´½¨xùÊU'ŒŸ¿hIåŽuõ ]Á©“'Íš=gèÐÁƒ%K—»Ýn)‹ú9–#Bϲ† !r:ËV¬Ü¶½xʤ‰6nY¿qóü…K0Ç}TRb"Ã0MÍ-Ÿ}13¯OŸ¦æ–å+WŸrâ 999,Ë._¹šœµnýÆ’’ÒÚú†ªêšÚÚú/¾ú& ®ß¸I×ÆÆ¦†Æ¦;víº;këœNƒ–e4¢Pþ¢@kÊJ ÇŒŸ|²iá‚Ò×gô•Ðínª«áá@£m´W¶m{½ž;o»õµŸÊÑ}lìèÑ ³çÍkhlš:yÒÐÁƒO:áøY?ÌnjnÉÊʈó¦Nž”ššºyëVEU‹KKããã5M÷û}#‡ 9|xvfÖ°¡CórsÑ0ƒ £þß¡eY^¯û¹ÿ>•Ñ»÷ù_šÑ»÷sÿ}ÊãvïµPƒŒy†!ŠÌ0 Ë2gqÚ£Þß7¿àÕ7ÞŠп߆M›++«F š™™qö™§¯[·¡bGeBB\ÀïÏÏëÓ¯_AUunå>¯!F’¤>¹Ùùy}z§÷ÎÊÊè“›c&»[æ‰ôC‹–A,ðˆAŒ(I¯Ûér––WL7æÈiSǽfÝú†ÆÆc>j`ÿÂÔÔ^à7mÞ"+ÊñÇN/*.)ì×wÄð¡½RS „%eeÆ=êÈ©£Gލ¨¬=jÄÆ-[O<áØ•kÖ¶µ·="Ô· ¯°°oZjŠ¢ª,Ç!‘˧Nk”¿šªj$%YãGoœ~Ä _–uõ5ëúdŽ;¦=fæ@¶Í=¤c,Šââ¥Ë}òÉM›·X–å÷ûGL™üßgŸ÷y½½{×74Œ=*£wï—^}ͲlŒí¯¾þ¶¡¡¡oA¾Ûå:òˆ©—_|qrRR[[{(ŽD#]]š¦ƒ!àëæÿ „ªª9$ñáûï}æÉǾÿ^‡$ªš¶ßÖf–a„$Juu Ï<ÿâò•+»ººã°Ç޵pÑ’ÖÖ¶……ÍMÍ©ÉÉ£F ÿêëﺺBIZ¹jõ¶­ÛssrœÇAƒN;åÄ‚¼¼`0‰D ݃†nFeYÓ5ŽåÄ"bfaÃ"†c9MÓŠ‹KV­^»aãæ¼>¹‹—.ÿþ‡ÙK—¯˜fô(2W<`@aVFÃ0CJINRU-1115%YÓôŒÞé^¯×Æ»üX†õûý4P9å/ Ƙe¹5U½rr•­[™oô+,6uä(ØY_ñî»ý.¹´¹¹ BßÝßa˜ææføÞï;.Îg˜qÒpH’(I$°m(bY¶¹¹å‰§Ÿ¾ûöÿ8NŽãAÀ¶mÙv4•$ÉétF"]×=q)D"N‡CÓuÛ¶G("1‚TU¥ÛÙpmßUxÄû³­½mëö­Ù™Ù±Ífyžw»Ý¶mƒ¡ mÛ¢g^xé´“OÌÊÌ´mÛår‘:‰pçñxTUD#·‡cYãp8,<PQ¯Ç ‡A`ŽDˆ#?ƒ˜Ž®€AÀ°l‹X]N—C’ll º‚AI’AÐ4- ³,ëv¹!²¢ „„QEøý¡PX–åˆQTŽzÜnžç5M‹D¢¯×cf4õû}ºnD¢·Ë…1ˆF£^¯GU5]×IŸ§ë:Ã2Ù™ÙtBùKCâb-]¶dèСcÊxH œ—^Œ[[;y<ù ³9víÚÕ/ôÉíÓ^òàoÞ¼yooaT–#Ñhì·Û½tùòô^½’ƒ¡mÛŠ¢”!EQ¢Ñ(±Ÿvvv’S† †BdàÙÕÕÅ0L(†ÔµÿfWœ†ŸK±ËÓ†üeYVGGGì\·Óµqóf–ar³³ ÓăArˆc9Û¶ÛÛÛB<ËG£Q’ Ã0d³Yò‹3 £i:˜çøX†˜eYhA˰äž!å²,+Ë2ñòäX@ EíÞP‚íììBɲ‚±Lêó|4*ÿ%²ý@(†ò< † „/(Š àyž$ãXŽD•°‹®æ¥ü @éº!ËQÓ4¢Xøàƒõ­UÕBYÿý¯?9Ù2MÃ4uÝØïéì~sìþg4™“ ýÃâ׿ßY °iZ9YÙ×^• È¢ß=GÄ `ˆ4ƒ½"îþ¸+TC·#c±B ‹X€w-0fОýÓžíèm¿¡ßöêäbi~÷·»”Ø7`wïhcêfFù;`ÛVbBÒ’%‹DÛœ 0ˆשׂ3 "Äq\a¿†±õÿeg㸸8bL8ÔWJù_aÛx¿ñú1Àn·`xÈA1Fì.ëb‡8õ3 c›ôN¦ü€öíÛ///Ÿü‰1˜k„dÝâ®±Îþ¦µX€àç7’÷Ô0ú@FÊ‚°+ Ï~Ra¸ß£@LVQƒVdTîŸÕ!dƒº˜—ò÷BH⸈ùõ³¶m ˆÞÄŠþ_ˆ eY@À0ŒH4òçü BÓ4ã1Àíí‡ÏZî¤Ä$2ç|¨+B¡üü¶ÇŠuHŽÚºÚúÆz:úƒ’9=-=%9åO“~€Ã0<Ï\N—eY‡Ãô*ÏñäøPW„B9”°©)© аˆò·¼ÕY–åt8ÿ´BcSD<Ï&7˜mÛT÷)6fë0y2)äÅðÏÜ„9vSÅ6ÿ9äÐûœB¿ÆÃ‡ò7ãPiÕ\ åðºÛS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8¨ôS(JƒJ?…B¡ô8~!ƒ1¶mL¶7úvÚÂ[–Eöw ´OÈöž¥P(ÊAñsÒ1–Áét C‡#?“˜€;¨˜ˆcA\.W8ÖuàõzÄ„Âá}C}aŒY–u:Ñh´ûîò …B9X(ýD—7oÝöÍ÷ß«ª:°ÿã=†ì¸„ŠíøE4!dš¦aÇ‘­zÉ÷êH‡có–-Ÿõõ9gž^ŸoÛö‡ÚÒÚzáyç ‚Ów’˜e™æ––ïfýpÜ1G''%êºws¨ÛB¡PþbìGú‰]E’¤mEEÿ¹ëîü¼> Ãlܼ夎w:†iêº.IIɱ,€ã¸•«V?ýü /<ý_¯×iš¦ UUmÛv»\B À!dÙ¶¢(¶¯¬ª~þå—;;;^}ñ…-[·ÞÿÈ£©))gœvªÛívH„ÐÆv4*ó<ïñxê¿øjæè‘#úäæhš!TU•؈(”Ã:F¡VìGú†aYÎép¶¶¶665ÝxýuÇu$˲]ÿøç¿N<îØŽ;îÕo´µ·;æ£O>ÊÊ¥]øõ·ß–•—_uÝõ_p~vVÖó/½ìñ¸¯»æjUÕ^ñ†mÛ†iôÍÏ_·~CnnεW^Â6† 4¨zçÎù .\²$5995%…c¹æææ_}­¾¾aÚS.8÷œu6¾óÞáp˜·Û={î¼÷?ú¤o~Þ¥_äq»“@ðÊÏ`Æ¡®…ò{H?±§·w´×7Ö ¼0vôè‡î»÷Íwß}á•WO>áøË.¾(Îïÿ£OŽ>ê¨Ï¾øò¢ Î{ûÝ÷ëêëO:áø´Ô”¡ƒoܼåŒÓNMIN¾óÞûr²³êïºïþÿÜ|ó¢%Kþyýus,øþ‡/8ïœW^cðÀGq@UÕ”ää?öÆ›oпðÂóÏûnÖ6¶{êiÛ§Ÿzòó/¿Êqüw³fäç2øË™_o/*~åõS&Mœ=o¾ªi—^|A}}ýÏoLL¡B0ÀÂܬ\b/=ÔÕ¡PØwÔÏ2lgW§ÛéNMMÕ4mâøqgœvê·ß}ãÍ· 8àŠK/¹öÆÎxó-ŸÏ7mÊ”¾ùK—/ß´eKŸœœ>}r%Q<ý”“«kjš[ZúäæfôNx!&&$œ~ê)áH¤¤¬ìÂóΛ3w~[{ƒ˜eXMÓN=ñ¤UkÖsÔQ’("áHuMÍ5W^~ò‰'ÎúqÎs檪záyç:Žù •WT˜¦iZÖÀþý}^¯ÛéÎè õR¥Ž`Œ9Ž+)+ÑtÍépRé§&ì-ý`„ÃáHLHü⫯|ôñŒÞ½E6thrRRfFÆÐÁƒÿûü ÿ¸êJÇóÌ /vuumÞ²µ_~Á Ç«jÚÙ\tÚÉ' :´¾¾>;++;;“縦ææÎÎÎöŽŽ–––P(ÔÖÞ®ë€B¤jj[{;ÇqO<üÛåþøóÏÛÚÚÿQÓŽxñ•×fý8»®¾þÑïãíwo¾ýŽŒôôÚÚÚ Ï;wãæÍÍÍ-^¯7+3Óãv³,K¥Ÿrxbc[à27F¡>0—^zirr²eYdŠeÙŽÎŽå$Q±WZš×ã2xЕ—]š”˜–$é‡9sÿ}à qqq,Ë"„N8îØŽ?.ÎïÏÏËs¹œƒ 8æè#UM3M«oA~VfFJJrßü|¯Ç“Ÿ×'£wo¿ÏÛ¯ ¯ßç³L“„>¹99ÙÙ¦iš–)ð|VffvvÖÈáÜNÇe_Ô· `ØÐ!¢ ¤¤¤Œ;zÔˆá£FŽèì òÇv?!<ПÝãFì• 8Ø…B¡P~ö×'ÅsÇq\쥕ZZ( å¯ÈÁYK0Æ$„ƒ ÇíWú±? s_?ÿÍï‚mÛô¬ÚŸÐùýAWñÛŒÎc†a~ÆÈ¶ïOyPÁ6¨)œBùs8hégY–aâ¼{PmÛ¶1‰Ô€ ÓŒ%îþ$“4¶msÇó|ìy™ˆ}CÎê~t_íëþeìPìOrc,Š"˲ݳý)Íî?í=+Ù½{½×Ÿ$M̹h¿•ݤ°û‡½óÙ£ˆ=ê³ß«ø•óS‰ûkI’ÈÄþ~ÇÆû^>ç¸`(¤¨*Bè§2ºe»× 0MÓ4ͽ[²[¶v·ÞÂ!I±jw¿Ò5éŸÐ»S(KBúɈ/>úÄSϾðÒ<ºhÉRQlÛv¹\Iâ8®¾¡áÁG#qu$Q$n9äát:.§Óét4·´ÔÕ×û|^ò ‚ÐÒÒR[W×ÑÑùԳϱ,ëñxÀîžÆãñp×]8X–õ¸ÝÄeHrˆD ÚuˆçEQÜQU …<eÙ±|Hßã$·ÛÍqœÓáp:Ý/Sày—Ëét:9ŽóxܤhŒ±Àó.— !Dþôù|ªª>ðÈ£‘H„ã8·Û« i(AlŒY–xžÄšøýo¾óî†M›ãããc ;].—S’0Æä]Êåt¸vׇèþŽªª®®®øøø­Û·¿úÆ›q€cw%A"@7oÞ°qÓÖíÛ>êHŒñò•+-ÓJHˆ7M“a˜P(ÜÖÞç÷‡BáöŽN¿ß×ÙÙ©(ÊÜ ‚Á`T–yžóz<ãµë×·µ·§¦¤¨šÖØØXQ¹£®¾!9)‰LªË²üÐcOÔ74äæd×ÕÕÏ[°Ðåv··w$%&ð<_]S³iË–¸¸8IIã<ßÐØ¸aã&QàeE‘eÙãvËŠÒÜÜì:$J]Áà=<İl\Àï÷ùvTWoÞº5.p8MÍÍUÕÕ•;iýÆMªª&$$˜¦)üŽªêg_|ñ¨#Ž(ì×7911*Ëuuu¡PÈír­Y·¾££#¼òúŒØ $éÇ9sÛÚ:0À^G’$–aË++âãY–Åo/.ƒ½ÒÒV­^óä3Ï$%$ú¼^I’6oÙºsg­ÏçeY–x557»Ýîp8Ü ²,Kª ôy½‡so†aZZ[¨_?å0øõ„ôÈXlÍÚµËW®Š‹ ä÷ÉE½ñö;¥¥e[¶mSU5%%eÙÊU'ܬgÏ]° ±±©¸´t¸qo¼ýösæ…#aIr,Zº¤®¾B0 °çùŽÎÎϾü²±© 1°OŸÜ¯¾þ†ãùù ɲœ••ùÄÓÏhš>Ⴜ>!ÔÔÜüÀ#ÊŠÒìEñɧŸ9îè£KJË^ó­Aúßÿ𣲢ƒ]<Ç}7뇶ö¿ÏøŸyáEUÕçÌŸ?bØÐ¯¿ûî½?Rõí÷>ÀýÝw’(öë«é¶í›n½­½½céòKW¬‡Ã_Îüæ¨#¦®Xµú·Þ©­«[°hÉø±cÞyÿƒEK–FåhKKëQÓ¦½ôÚëííK—/÷û¼é½Òbªjjê¿'Ÿpâû}üßçž¿âÒKž~áÅŽŽUÓ¶m/ŠD"ß|÷ý1Óz÷ƒ‹KJ·lݦëšßï¿þŸ7€¿ÿáGUÓ†Š1ÞQU=óÛï::;ü>ŸÏç›ùÝwn—ëÓ/¾LOï%ËÊëo¾-ËÊò•+‡ Ì0Œ(Šë7lxæ…-Ë6 £¥µõ½?:픓¿øj投«âGŸ|ʶmUSÑèœyóƒ¡`vfVgW×[ï¾F—._1aܸGž|jíºõ;ª«¿˜ù Àø“ϾÈÏËKNNBˆÙ¸iÓ¢%KNלyóòóó_|åÕ ›7›¦9óÛïvÖÖuvuy=žçÌ­kh€ ìß ‰âü…‹êêë;;»fÏ›7uòä>ýlÖ³‹Š‹·1ü¿Ï=¿aãæå+WɲÜÔܼrõšH4Zدï'Ÿ±|åªH$âõzR’“B;kkyâ©“Ž?nÞÂ…?ΙwïƒG"‘Ï¿ú*+3#--Í0ŒÃSý©ôS+ˆô„ÁBhFB|üS=:dð ×ß|ë¹_nnn™;Ïç“eå›ïgAYɲüí¬Y,Ër7{ÞüíEÅë7lzàž»nºñ†)'Œ=úˆÉ“o¼þz¡¦i½{õšöðƒ;kk_y}FGGç£ÞÛÍ7}ÿãC ì߽߯wÜžŸ×GÓ4Ó4Fž›“CÖBEA³,+ð‚¦jé½Ò¸÷ž“Ž?þãÏ>Gtç å`8¸i^†aºººšš›Ï?看Î?oÉòåš®‰¢wÚÉ'ÝðkUU5 À &.?vÌ=wü‡ç9MÓ‘ˆm[¦e©š †TUňüª¦C!Û²0ÆÀH4j˜&ÇóÛ·§wzú·Þ!3#CQUÃ4#‘Ïó`žçããâIÓ‘¹SEUmÛ"sB˲dEíì ’öÇ`×$0Ë0¿ßׯ à{îJKM5 CÓ´þ…ý{ðþUU·ß}Ïë9|øó/¿b™VA~^Nvöã=XYUuÏýš†)ËJgg§eY"ŸÏׯ à»ï"1ûLÓÔ4MEEQƒƒÈ¾;º®“•Û†aeÓ4ïúÏm£GºãÞ{7mÙ ìêì"?.@`Û¶"+YV$I„#‘p8lZ–ÛíÖ =‰„Ba2ÓŽ„ƒÁ`8¹êòË.<ïÜg^xñ›ïg¹œN˲B¡p˜eYC7,Ëð<¿ë&FPݧP†ƒ~2AZVQqÓ­ÿ¹ð²Ëß~÷½+/½4';{ú‘ÓV¯]·tùŠÚººÔ””P8üÆÛïœyú©•;-YZ\\’™‘1qÂøû|øÁG/)-0nlQqñs/¾Ä0B¨ªÚ¨‘#ŠKJž}ñ%†aˆa—eC7¦Mš˜˜0wþ‚u6êº à8®ªºú™ç_¨ª®ÎÎÊÂ=ºªª!TXXXTRòÌ‹/UUWgedò?~ìØ¯¿ûîÃ?9áØcãããçÎ_°~ÃFM×Y–E ‚’ 01"o°, D!!„ ‚¢(žöÙß~?ë†ßìñx®¼ìґÇß÷àïÎxC–åaC:dá¢Å+W¯ …BdZRÓ´ÇC¡>¹¹cGjoo2x €aÈIJm»WZÚ±Ó§¯^»véòdj,cF1Ì®ßŲí‰ãÇÍüæÛ/g~í b„ Ã`N=ù$EQç-\¸m{Æ»f}W­^û⫯…ÂᜬlË²Ž˜2yéòå¹99‰‰‰ËV¬xñÕ×ÂápFFo‡Ã1bİç^ziùŠçž}¦,Ëó,ܶ½ˆŒ©!B’ˇ à ˆˆ—„c9„ùŸaÃ0ÁPè¹—_^³n]zZ/QG V\ZJ~\¶±(ˆó.úÇ 7:ŽóÎ>kê”IÏ¿üÊ=÷?8|èÐK/¼ /7÷®ûîåõ×O;ù¤ýû§¥¦=ðÈcÕ55ï}ôÑw³~ðûýÉII–m›¦™š’’˜póíwü8wž <ÇoÚ¼åÞœ3Á¹gŸeÛµ¥P(¿žÆðIIJÑ }ß—hÛ¶ÃáHgWg|||\  iÇqµµu9šœ”äózÛÚÚEÍÌÌhjjnmkKLˆ÷ù|<Çí¬«S%--Íé::ºLÓüD³8Žëìê2MÓçõÊŠât8LÓÔuÝãñhšV]S#ŠbrR™´m»¾¡1ôÉÍeÆårÝvÇ]£G<å„:»º›šÉ!žçÀmmí ËÆªª’|R’“MÓ$W•e‡$†A|]ˆv·Ó4-Ë’$)ò<ït:»ººBápjJ qà©­­µ,Ûï÷9NaUu ÆvJJЏÛÏ@!D>0 #+ Ë0Çɲ,Š¢( ;wÖE¢Ñ””d‡$‘k7 Ã4-‡cW}†imkã9Nr84Uu:ª¦aÛöx<Á`°¶®Þçó&ÄÇ“ˆ®ë;kë}rs0ÆØÆÿ¼å–믽¶_ß‚`0XWß@0Æ­­­§Óïõvƒuuõ>Ÿ71!AQTŽcBªª:NfƒçùX㈢¤éDzºaˆ‚€jimmmkËÊÈðx<ã®`Ð4vý¸d'µP8F³23!„,˶¶µ™¦™’œl˲MM/ÄÅÈŸí€?•ëêë““’’“’ÈÍIšqGUu|\\RRâ’e˾ÿáÇ‹/¼ )11. iõÓ´h ÊaE,†ÏAK?‰©À0Œiš†a"I^ B†iš¦IÄNU5žçX–%nÝ$g2[`YDZÀî+8–÷2çLöûE } ûõU5ÖÇü†BæË_s9¿˜Õ¯¹^pà°¿²{4„ŠªŽ=š˜\~¾q~}@Žƒý¡CÓÅ~\p€ @uÃÈÌÈè“›FO;…r˜ó[¤ÿwØbÆòçÁfBÞˆ™âw¯Yn‹Up8KÌ~s¯WŠ¿äÒ4M£!»)”߯!{rÈb}EQU²,‡“‡Æ²Ÿã8Ó4EÑuX«g’Xc’>™:í¯ݪBù_84£~†aêêkC¡€!d[fbBb|\‚aî± clí¶øgù½ò!Fä_»?&…¿˜B®®®R4!0À§¥ör¹\{E ˆU@^ªlŒÆHýóG÷j̆†ú`(ˆ0°m;!>1>>~¯Õ­c˲p·nþb›X–k[òês µ%ÙªÅÊ_„?[ú‰CHEE¹eÛƒ’$ ØÕ¹uû6Ã0RRRc‚E´ü~ ‚PUÕ¨,ïeköù|B²¡ãÏJü5åZÿâ’bŸÏ7°Ï A,Ënoo--+ÍÌÈòù|1õÇ ïtºÆ¶m‡#‘X7ðk@I‚@&W÷‹ÓáØå§ô‹YYޱ]دÐ!91À¡P°¨¸H×µÔÔ´½Óïw“5M#N«,ËÆ¦…÷­¡ÛåŠD£Dôyž'ûeî{¤‚ D£Ñßé6¡P(,¶ô³,ÛÚÖ‰F&N˜Xל9«Ø-q§MÎ6dèÊÕ+½^ H@Ô¤¥µõÙ^$Î9#‡?bÊd]׉·%BÈ0Œ7Þ~[QÔ“O<Áçõ’7âqö̲,»zÍÚ¤¤¤Ô”dâ0Jr +fÁnË>Æ˜ãøªê<Ï÷ë[¨iª¦©À¤¤dˆ`QQÑ ƒcŽ:’$mÛ¾ýÛY?p,ëóùN9ñ¯×K¤661ÐýC÷âBápdõšµC‡ {}–,]Ö· ßív‘¥{5#y5aY¶µµ5 3Þ¶mMWn·gð Á«×¬öz}¢(voÌç^zÛ6ðÇ ™4aÂŽªªææ–!ƒÅú³Xg„P(þü«™Ç{ Dz<Ï—”–U×Ô}Ô‘Ä'V ˲HxÑíEÅÇs4ù(ÊaΟú†NüÙ23zwt…ïwM›ŠÖ×Dÿhµ p@ ±©1$™çùæææå«V>lìèQii©,˺ÝnâÜíõzœ3oÝúÇåyÞépH’DÂ/“èÐdJB óW×P‡=· !I’lŒIFÂLBmËêèhÏÌÈP”¨aè¶mÙ¶†>¿ íídN‚D.*)Ý^T4jĈ¦¦¦^y•eIY–‘$‰,K&aAp¹\§Ã!<Ã0’$iºV³s'BÈáX–xBèp8X–%Œ«wî´mìt8-ËAàyç9Žxž8Âc Ä457¦§§Û¶©ëªm[¶m©ªÌó\||\S÷Æä¸æ––ÅK—äçgf¤Ïxëí/g~mÛöκ:QDQ$žIÛ2¹Ýî¨õ㪢’ú郞Z²l9Ë0d—žX5Ïóuõõó.Š‘(ÊaΟ:êÇeYöºÛª[C;8ÁëöºÖm©jî;$©µ­=&¤ŸHLHHKI5L#;+ëÇ9s—­X¡ëFRbâyçœõݬYª¦•–—÷JK{äɧÚÛ;FqìÑÓŸxú™®®®‚ü¼Á¾÷ÑG€+.½Ä4MEU{ò¿]Á`KkëqG}ʉ'|óÝ÷ó.â8¶wzúå—\l†…mMSyž-’"5Á3©ªJ–2€]&f@ÿþGO?J„—_a™ïfý¸lÅŠÄ„„+.½¤¬¢âË™_ó<Ÿ•™Q^^©éšËår»\eåå~ff†¬(o½ûþÎÚÚáC‡œxüqï}ðaqiYïô^çžu&`þÂ…º¡_så•_|53÷/,üð“O$I:çŒÓ3z÷Vu @(˲À Ý—’‘žçÛÃݵ›“sÒ Ç ‚˜›“óÌ /ÆÇÅŒ+wT}öå—]]'wlŸœÜ§Ÿ^Ó´aC‡9uJ$}ì©ÿ"¯¿öÛ#‰¢ «—-ÿnÖ‚ œuúiùyy_ÎüzÙŠ ñÏ e åïÈŸ:ê‡`—™"U“|‚“ÑÛäúæPª;EFQUŽã»I†ÙY[÷æ»ï¾øêk;ªª-˺ý–oÚ²¹¥¥uô¨‘ûžrâ Ͻô’Çí¾úŠË~˜=gÙÊ•eååÆ 7zÌË3fLŸ6íê+.OKM]·~CSSsQqÉä N9á„o¾û¾¤¬ì‹¯¿¾î𫆠\T\LbÎ ´Ë'’,sµ,˲L²Y7t–aÀîA-Ƙçø‹Ýtëmï¼ÿÁ¥]XU]óÎû9ujqIé'Ÿ¡ëúŽªª‹Î?O¥†¦Æ›ÿyã–mÛúäO?rÚ§Ÿ¡(ʦ-[Ö¬]7{ÞÜSNl˜i™ùyyiiiii©cÇïñx›š¦9­_ß¾y}r‹KJ““’FÁr¬i˜ÓœÖ¯ ÀëõÛN ÈÍÍÉÉÉöû}Å%¥~Ÿ¯oAAvf¦Óé$&u–e½^_ÅŽ ·Û0MÓ²l§ÓÕì †B ‰1$¡i™Ã‡ »þš«ï½ëŽ£Ž8¢rÇÛ¶+«ª22zçdg›¦™›“SŸïóyÓRÓÒÓÓ³22RSR²2³8žC±,{Ä”Éÿ¸êÊÏ¿š9oá¼>¹÷ÝuÇÊU«¿þö;lÛ‚(ôÍÏïWPðæ;ï"„ú´¶¶5·´ˆ‚0tÈ`²×¶íä¤äŠÊrA†5MË2-A-˪«¯MKMÕ Ÿ~bAà½^o|||Yy9À8½Wše[—^táôiGÌxûí’Ҳή®ÙsæÕÔÔH’(+²ÇãIOïuÔ´#:;;ÛÚÛÉN8áp¤©©YàùQ#G–”–%%&¤$'sÜ![#B¡P–?wÔ¡iš½z¥3™¿haaVüC—¹ãÂQ.Î[¸ %9Åçõí5O¸­¨èµo>ûÂKëÖ¯×4½££ÐÙÙef4*wvuq7bذ—_Ÿñö»ïUìØ1uò¤ú††ŽŽÎ^ii.—óáÇŸøê›o›dYQUµ³«S‘UU›šG ÖØØôòk¯/Y¶ŒŸ!A„úäæ575¯]¿1ŒËí–ކ¦úe+–eg䂳«@„YAfffzÜîP8\ŸŸŒ9¢o~^$%µ•¥£³Ã¶­öŽYQdE…–eE‘¢’†az§÷Z°hIuÍÎöŽŽA,X¼$ …CaÃ0švÄko¼™›“Ó¿°_ïôtI’†6dÐ@2!lšF¯^éƒÅË™–ár;.g8\°x~¼?ÁïìÕ˜EÅ%o¿÷þ ¯¼òÜK¯œyúé’ähïèØ²m[JJ Ë0+W¯Þ¶­¨¤¼lÀ€þ‘hԲ욚ß|÷ý#O<™››Ó''{ɲå;vô-ÈEaäðá}óóÐÒÒ:ã­·.^ÜÕü»®! Pþ~Ü.]¿ ¶m÷JKïìì**-Ù´m{IYeKKkïô̼>ùÝã/¿Q ÃÐu->>.7;«wz¯„øx‡CÊÎÊ üé½âããô/„¶wtœsæ¹ÙY¢(åæd;ÎÔÖÕ···÷ÉÍMNLÌÌÌHïÕ+3#Cr8âþý ‡ T]½³µ­Í²¬#§N5 “˜PRSÒjkkKJ‹7mÙX¹£²«£«o~azzz¬zB€1Çqi©© ññ–eaŒ}^oŸÜœ›·tvvöNœœ”ž–†JKMKKMu:œ9YY')11£wzBBB|\`õšµ B—]|±ÛåZ½n}k[ÛE盓“ír932z''%efdŒ3Úírõ/ìW^QY[W›œ”œš’BÔŸ4fG[GqIÑæ-›ÊÊJ[ZZz¥eôíÛo߯”QÓu†A§œtâø±cu]ÏìÝ›eÙ+WfddœuÆéy}ru]ß¹³vòĉ} òSSRš[ZâãâÎ=ëÌä¤$UÓÜ.×)'žPTRZ[_—˜PŸ—Ÿ×§¨¸Äï÷O;655Ü-ºKå0ƒìÒuБ;/A‡Ã²,CÝn·(ŠÝ½™Ge·Ç „)ŠLÂɲâv»TU%‘ýEº\.Že#Ñ( 먨* Hér¹ ‘h”ã8Ë49Ž#AÜG( ƒé½z=ÿò+‘HäÎÛníèì$«v†a¶³«S×u¡×çã8n¯°À¤­X†‰­6 ß8À *Ëd'÷p$B\b¢Ñ¨Ëå"Nô¢ (ª*I¢iš¢(aŒUE±lÛår t]WTÕåtÊŠbÛ6Ù\W×uŽãÈ娚F®ú§Æä…`(HV ¸Ýn‡Ã©iêþ"€±¢(QEcYcA°mGeÙ¶m§Ó‰¶­¨ª$IA€A(¸Ý.Ã05Mó¸Ý€,eQ ÛØ0MY–õ]}ØA#wR+~{Ðæß±$–/À²¬˜Kû^i,Û†»ýâÉ—!˶Q7t€eÛ`wÔU˜\ŽÝ-TrlUpléé'Ÿ±qÓ¦@ pÅ%ÇÇÇw_¬Kìþ±x™ûá³ï×î%‚nËÈRm°§›÷ô± »&3‚}/gß¿¾1Øc5oÌ™ ì^³ÅVHt?Ô= t,“ÕŠ¨ôS3~{Ðæß ¢ ?™Î¦‘Ý_0 û)ÝCÄb­ºçûŸpΙ§Ÿqê)’(Z–eì¤(]LñT½}£Nv*;—|`º­Þ»å¾{úý~Þïåì·1-ËŠøks¿~TŸýVéçkE¡P[z´W†mc†aTm?¡ö ­yË¿Vm)Ê!¤GK?èkB¡Pz¿Å8KÌ»$.ü~þ/úk¹@ü|m÷ÚoëovíÝ:S(”ƒ–~2ÿév»].ËîýÒ!äyþsØk²ë§©BÈþ±¿ êœ~/ „Â/–Äù‘DñW¶Æï{í¿È¾¿Âoƒú)”¿"gð!îá¡PhùŠ•’$åæä¸\ÎØl-˲ºa4·´$Ä'×°Û9d·Ð@(YVHÏaÛ¶ÀóA²ÉbW{»Óé"Èìe÷-¨Ý7¢ŠùØÄ‚qÆl8$Ps,Øg,ŸîN)ÄÁ¥»~íî0ˆïþÞ»_uߺË4Íææ–øø¸XÐÍX%‰ËMqi) 3##æäÓýŠÈ^í{í±ÊÇ"˜î÷Ú1Æ!@¬bݯšÌÍò<‰Dº÷ßÝ¥ö*}ßC$OUUI|ÐýD}~(”Óƒx2c±ïøÑ%Ë—òù«×®!!'ý~¿×ëåy¾¡¡á±'ÿkY&„Ðëñü~â)òû|>Ÿ×ïó–WTnÛ^œ˜˜H4ÂårVìØ±u[QBBB{{ûãO?#Š9‘ÄFŽ‹“$)6~Ç‹¢çr¹ˆ«;Q(·ËE1>.Îétº]®µëÖ77·$$$˜–EòqH’mÛ‚ ø|Þ€ßïp8|^/ ú»L—Ëå÷ù|^Óሠn—ËpGt6>>Þ´ÌGž|2‰Š¢HM–ey½Þ¹ó¼üÚëEÅź®û|>¿ÏGtÓírùý~§ÃaZ–Ëå:ØkgY6Ü\N'ÙÁ†| 5w¹\N§3à÷K¢È²l\\ÀírÙ¶Íqœ×ë øý.—K„ή®eËW$&&v¿vÛ'|¬t‡$‘æ%‡H´N§ÓxÜîööŽ>þD× ç?¸ª@Àétb@ÍAÊáÈAŒú1Æ¢ ”WT4·´¼ðÌY–moo7LSÓ´÷?üÈ᎙>!†¸ÃC¿ù~V8žvÄT¿×•åÏ¿š•åqcF¿ùλ]Á®¡ƒsG^ó­®`P–åÔÔ”¦¦æ÷>üHàù£¦¿½¨hͺõÇ)ì×OÓ4Çq•;v¬Z½&'';½W¯†ÆÆC‡F¢Ñ 7 ¬WZZggç÷?þX[Woè†$‰MMÍsæ/ÈÎÊ3j”®ë<ÏïܹóÃ?ÉÍÍé[P IÒ¬g«ª:qü8Ạ»ººÒRSöï …öÚÛ;:¾˜ùµ(ÇÛ¸ys~Ÿ>¶moÚ¼%77g݆ Á`Ðïó3 ÓÔÜœ•øð“O³23&ŽW_ßP^¹£©¹Éëñ5íˆO>û|ɲå]ÁàØÑ£œN'é]æ/XX×Ð0z䈼>}¶nÛ¶fÝúaC† èßOU5rh̨‘ÙYYkׯß^T¹9ÇÝkk3 …r8p£~¡¬(C ÊËͽäÊ«Þ~ï=bÖx;:;7mÙúþ‡I¢`š¦$I|üñÆM›;:»žée†e_zõµ ›6Ù¶ …lÛ6M«½£ìŽÑf˜¦iZmí B²,³,»~ã¦?û¼¾¡á¥×^w»\¯½ñfqI Y[³sç÷ÞocÜÙÙF_xùYQ¶öåWÍ--wÜs/Ƹ³«3 C£Ñ¨¦jå¯ÌxÃår¿òú;wî\´tÙ'Ÿ}nZÖí÷܉DfÏ›7ó›o.—mÛØ¶Ÿzö¹Æ¦¦å«V=ÿòËÏ=ñô3ÁPè«o¾ýèÓÏZ[[zìñ¦¦¦—_›QRZær:MË …Ãÿ}îyŽe¿þîûy :Œ±iZˆatÝPõ…—_]º|yqié“Ï<ÛÐØøøSÿÝ^TŽD BuíBY–ŸøïÓŠªªªúÊk3:::›[Z^{óÍŽŽÎGžx²¤¬|gmí£O>URVVßÐðôó/°,;ó›ï–-_YU³óɧŸaYöƒ>^°hy}iko#ËœNçû}üÑgŸK¢ +wìxåõn—ë•3vî¬ýü˯>üôSIÃáðŠU«ž|úY‡$µµ·wtt|ûý•;}âɶöö÷>øpμyËV¬xówyžúùvTU‰¢H×1Q(‡'ý–e9ÎÇ~ðÆëþ±m{Ñ#O¯×ã=räÈáÃR’“£Q™ÌŽ^}ÅåkÖ®½ýî{>~÷ãŽ9ú•7Þô¸Ü§œx¢¦ë×\yÅÚuën¿çÞOÞ{Ƕí’ÒÒ©“'ü~Ç=j䈡Cöë;ã­·ÁPÈ4ÍP($+ÊOQøPT5 GeY×uEQt]—DÉïó­]¿!)!±fçΉ&Ì_¸pýÆ’$vu½^¯ËåPX8fÔ(ŸÏ‰DX†1 #*Ë¢ 0 Z³n}Rb¢¢(I‰‰+V­ŽF£dþÃ4âÚyž‹kjn.-+s:/†Bá¶ö6]7B¡XVÔH$"ËŠªi¡PHày·ËÕ¿¿‘#†÷î¾nýz²xMÓ4˶ Ãhjn®¨¨p»=<Ï©ªš——{ó?o|âégjkëÆŽåv¹F1bøÐääd†aný÷Mÿ}ö¹â’’î¹û¦®ÿì«™wÞwÿ·Ü"Ër¯´´eË—766®]¿!%9™ì– 06 ƒšú)”Óƒ‹ÜÉq\EåŽWßxsÁ¢Eµuu×^ue~~ž(Šó.*)-•$qðÀK–.­©­=ó´S/YºeÛ6EQÇ#I⇟~ºa㦌Þéùù /®«¯1l(À¶í¸¸À’¥Ëêû÷ë[Z^>iâ„ÎÎÎÖ¶¶sÎ<}GUõò•+këêòúôñù¼¡uu/¿öúÎÚº!ƒ1¼WZêg_|•–šrÖ§•”¼:ãµuƒ?n¬ÛíúnÖ¦ižpܱUUÕËW®ÜY[Û¿_¿Ö¶vQûõ-ذqó„ñãš[ZlÛ>tˆ¦ià­Û¶52 ËŠ2zÄðu6 2dÔˆásæÍ_°hñÁƒÎ?÷l1~òIyE¥À gž~šešó.ªÜ±#5%¥WZªaÇm+Úž‘Þ{À€þ>÷ÛY³Ö®[ʉ'ö+È/*)?v,™ýÆÿÊk÷ûýªª¦¥¦†‚Á>ý¬¬¬|ø°¡€O¾ø²¶®6.7dð ;ª&Œ§jꎪªQ#†§÷JSuáâ%••齃ÚÛ;&M_TRâ'Œß°ióÚõëG *˲?ÌžûÙ—_± ;eò¤ÉÆïØÕbu…ýú®\½úãÏ>gæøcimk{í7#Ñèä ²³²ŠJJ.<÷œ¶ö¶/¾š©ªÚ?®º²¡±Qàù!ƒ¯ß°±Onn¯ÔT}÷ =¹“rXñ["w„P$q¹\BMÓDQTUUÝèaŒu]w:¦iF"â!#‰" ?)Š"Ã0Bƒ„È'/, 4 “8’Ó‰¡Àó]Á ˲d›YBHÓ4UUãâât]—$éö»î™~Ô´É'Ȳb9d‘WþŒç¸X>±0g,ËÆÊŠ…-ÛëKò'DzÄ<%Š¢¢(ä˲‡a¢(†ÃaÛ¶‰›c,WGEŽã8MÓH†¿íÚ¢(†B!Ïó<Ïwuu‘íMÓ$§Çò!‰Ãá°±(ÄÕÒ0 –eIn,ËèúOûP"„B¡ N§Ó0 A໺v•‡Ã‚ ¸\N]7dEÁ¶í÷û‰ã,Ù=XUUžçm˲1&3é„nè§áÛ(‡¿1|QC˲$IÒu|£( à §ó'žçIf—ËEܽeEaÆáp³2èpîîHßCvéŠ9•+ªs¯$émÛæy^EQœNçÆM›[ÛÛF ¦(*¹*QHé± ¿,ËR,+–O¬{•EòßëKò§n¡,Ë!EQ†a†t™²,“…lÝÇtäDr $`§¢(D|óµdY€1Ö4x”’jÓcùıБ^ˆ29ªi{¼ÕÙ¶íõxlŒIë)Ê¥“CªªA@UÕX¡²¢0i»£!uoºC}«S(”ýð§àº‡Fa 0þi8SÒîQc"²¯ì2³û‡Xˆàî`Œ­]¶rÓëq_{åÇÅ„ÏÚ'Üæ^•Ùëû_¬@ì¼;Ü&B°ûµtßý|ß|P·†Ú÷òöÚBvl§õnñ“÷{9{Uì@ÉbX{æÖ½ôî‡ö-í–ûýD¡P7±÷Æ@²]ûACÆ•éé½2£î¹ÍËïX=ª_ åïÇ!“þ_³»È/!4 S&ú½:V=Œe™´ P('™ôsFEºœNQ”b“Ÿü½%™¸]2 ‡5]cr»ÜÏSË5…BùÛp¤ŸXäËÊË,Ë% AØÜÜäv»Ó{õ޹Ù0¸›~_w£X·_,ô@Ó û&#“·ÕÕU Ë‚`YVcScB|bbB¢aî¡þÝ'`e5º ¾öŽR(Êÿ¡‘þâ’"ŸÏWß—¨›®ë›·lª®®ÊÊÊŽ ®‰ KN§mYBÓ4 Ã` ˆÆ² #ˆ¢eYº®ÿbÜ|‡$¦› >Lœâ’í™™Ù½Òz1 cÛ8l޲ɶ­ää”îÕã8Žô ÃèšöóÞë{Šr8$YV”Þårªª[oA¡P(¿#ªô¹lh¨‡õë[¸¡¤î‹¥UN‘½à¨‚¡ƒ/Y¶,çv¹‰w£ 5;w>ù̳É!Ëò”IO9éDÃ0xŽ5L“A(ÏxîyŽeÏ9óŒÄÄÄÝ›ÓBD`š&‰%Ç0Ìw?ü˜••Ÿ×‡8ÎÇúâ2OÞ60Æ,ËUTVÄâ2zgÈr”T[’Äþ…ý7lÜà÷ˆS¼mÛ.—kÙòo¿ÿßçxáÂóÏÍÊÈÐtçùØÔ„AHr8Ž5M+öMggç²+§9ã8âON!«LÓü싯Æø‰/&ñ·!¥Óþ€B¡üüÙ&„PSssfï^uMíO|¾5²øÇ?Þ`Yv|||ss3Ñb²v¬³«+‰üß?®¹õ¦;V×uÛ¶ššLÓt:_|9³¹¹ù¸cŽöù|–eE"²p‰x¦Ë²,IR4mimµ,‹a?‰´´¶’eJ‚ ´µ·‡Bá˜9ȲÌP8˜––&ËÛ¶0¶1¶Ev:‡ÔÑÑNÄcÌs\]}=Ïs7\÷¬ÌŒ^y!Äó|sK ÞI:°¨,†aYVcc“e[²¢´´µñ<D "1[ZZÈ`†aZZ[UU2,cš&ÜmJ2MS„ŽŽÎp$"¡¾m(Ê_›?wÔ0PÕT‡Àm­éDœÈ ||[ÛØÑŒ< †È`ì^éjYöÖmÛUU8aüw?ü8wÞ|ŸÏgÛöu×\µzíÚH4ºvÝzlãw>øÀ0Œœ¬ì‹.8ヌVTuÄСii©_}ýÃá¸âÒKª«k$Qz÷ƒ1Æ­míãÆŒ¾úòË^™ñÆÖmÛlÇÅî¸åfM×1ƺ¦íµðŠlF Ð Ÿ6caYÖïó¥$'ÅÇÇkª†zû½÷«jj†¹æŠË«ªk^{óÍ´ÔÔ´ÔÔ›6ûý¾P8Ü+-­¼¢â´“O:dpiiyA^ÞÇŸ}nYvÿ~};æè^yUŽÊII‰çŸsvuÍÎööŽŽŽŽ{î¼cÆ›o©š–›“={Î<†eN8îØaC†hŒ?+…Bé ü©£~ X„Ž`$+ÅíçÕêú®ÊšÖ> ÀïB‘¨$I¶½Û&Ž1„0”•W—”†ÃáP(”••ùÌuvuƒÁÉ“&Œ;æòK.~eÆŒ1£F=öЃe•sæ/PUõÜ3Ïœ~ä´O>ÿâúk¯¹ë?·egeUÕԄ¡p8|ÞÙg_wõU«×®]»~ýÚõë{èÁ㎙ÞÙÙ[œÅ0ŒªªÝÐMÓ4MÃ4MÛ¶TMãy!¶r cÌñÜêµkï¸ç¾¥ËWÜxý?ŠJJ¾ù~ÖØÑ£«ªª?ýâKÄ –aïþÏm½ÒÒDQxüá‡"‘è”I/»ø¢¹óèº^ߨPU]½­¨èÈ#¦}Ô‘-­­«Ö¬2xÐi§œÌ0LIiiÿÂ~;v”••mÝ^”–šúö{ï÷í[€zuÆ›ÇÒh0 å7óçNóB`YVz¯ô­EÛ¦O›ö'þ°ºÊÇœ…Bù_8¸È¿ $ÈZMMMÕÎªŽŽv†aââssú$&&’jd!YQ¶m/Ò4Õ0Œ¬ÌLI’,Ëêž^ZV–œ”‰F-Ëê•–†*.-mii“xŸ{­ç">9$€%Øm/"Q-eYÆp,«¨j,Y,Ü)Ïqš® ËÆö>KŠ,ûw^dô»gH¡P(ðÛ¤àsòÏÄÄ€ ô:¸ß˽o†öžÆx›®e¥P(”ßÊo‘~ÁYJëà 1eŒCŠ1wK“ªÛD”mŒ-[66-lÚûLÆòÓ¦µKÑMû§Ï± çlnÒMBp ,À²1€AÐ)°6Æ´ P(”ßÀÁI?Æ€E°#¢Ÿúè¢'fnw¬eÙ<‹âý’aÙ~¼ìw ¦e;Öãà¼.Ñ'Æ»ÇÁ%x…àqp6Æ‹½b¢WàY!Hp ‰^AàmãX†O|º%¢˜ƒdÝZQÖ ð;yÁÖº¦¢Ý%rn‘£êO¡P(ËÁMóÚ»$~Ƃʣ‡§Ed£¨6˜Ÿê)©Íøps}‡EvIQ‹iáó'eÍÞØÐÖ5Óš½¹±O²ûÿŽÍÿdyMyc¸º5zÌÔÓF§ïh ß;¿2¢š×Õ'5 Ýùñæ l\65§0Ý[\šñáæ†NE†€c‘ecCß®«{øËí—MÍ>uToŽA/Í.{nVé?¦ç+Hˆj¿egG …Bé±ܨA¨èæ‚­MwœÚ?)Î1k“À¡›ÞÝèžfcÌ!øâwÅŠn½³hÇζhZ@:edúÂmÍï/­ž»¶®®-:¥Ò}ŸmmîRïüx‹È1Sú'ù]ü}Ÿmk k)>鯷ÖGUó¶6&zņ§Ù6À` „œ7äás}°¬fê}óŽy纱—N͹僗½¼ŠgúS(Ê¯ç ¤ßÆXâ™òÆðêòöÇ¿.ZRÔ¼¶¼mSu—®šw9`úàEãú&¦'»_]RŒó&f†UsmE ©K\üñÃ{]01«wœceY›"÷Ÿ3èœIÙ.‘ÛPÖÖÖËC.‰ÝXÕ©©æ]g8rPŠßÅ[¶Mfz[‚êæš.ôÓã‚mÑmµA‘eR•} …B9(ÆàƒÀ1ï/ª:z@ò¿O+¬i‰ÞöΆΰ†8ôÒeÉ>±­MæYtúèÞg=¾øö3ð,s×[ëºtxk§ULC6º"ZP1Â!53Þ)ÛøÅJGçŧÇ92SÜ)~ñ¬±Y NÙÂ/ÿP–ä;:d „Ð0­{?Ý¢èöí§Nê—XÚºéÝÙ‰®W®Yê Ê]åJ¡P(¿æÒK/MNNŽm÷ʲlGgÏñn—Û²÷ÚV”·9.cTn\n²»S6.áä‘éï,ÚQÝí›á“ŸçhègËÌMv©ÌÞÔ(‰ì”þI’Äå§zÓã¤íòQƒR†dú?Y¾smEû LÿуSæmmš¿µÙ¶ñä¤üTÏGË««[¢½}“ú%r 2m<"7î’)9i)(›£¦œ3>Ó)°aÕDˆ ?åð…a˜–Ö¯×Ës<Ý`‡rÈa¦¹¹ùà"wb ¼NÑ-Õ° ¯@àËÆ,BAY‡øœ|D1uËv ¬aÙžÕL !h˜¶nÚV ex™6Ö @à8ݲ!Õx–g‘…1‹`H10!Í´B!B@3lD£ÚPohäNÊaÅ/GîÄÇþ}!ìŒjBA@0º+t°¬›@Œ1ƒ Æ 5¨"„!ŀȚ¹;@t„5AY3£’!{›¾+ôq÷C$Cmݶ $¨šecË’$Põ§®`ŒéHŸr²é'͆‰Yº³ßè’{ ~¼ßã<ú¹St…òWCÌ0 ÞsE¡rö–~bó©ÞYÝÚÞj[6PS(ÿ@Uá8Žÿ)‡{H?Ù~$595)! cLuŸBùÀ€ìùC¥Ÿrø°ƒÙåêP×Bù›@EŸr¸qài^z³R(Êß:£J¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=*ý …Òã ÒO¡P(=öçÛ¶1@ú…~c !<Ø`ŒmŒÆ„Ð/æ«€AøJì^U˲~M¡ …òwâ¤ßápˆ¢0M3‰üLJ!Ãq†aTñc–ebP–eUÓ~^ˆ%I’$ lY¶,˦i(ý®€½Ī !Œ dYÖtª?…Bé9Pú1Æ<Ï/\¼ä“Ï¿PeøÐ¡—\x>Çq¶mC1ÆB{÷ØB¨jZWKK|\Ã0d(“Ä$Þý'9ÅÆXäù¶öö_yuëöí/œwÎÙ£F ×teÛ¶I²îgñ<¿|ÅÊÏ¿š‰±™™yêI'¦$'[–µ¯pcŒ†aZ–EªD*¯jZWssbb¢¦i×ýó¦3N;eÔˆÑh”eÙ} ¥]…Bùû±ŽeYIZ¿aã½>”•Ñ{ØÁQ9Ê0 ¤X–ň‚@¬%.—kë¶íÿ÷¯wuB¢("„8–åycÌq˲,ËJ’IJ¬ $+žeÛÚÛ¯ûçMë6l6dˆËåTYEI’$± !äyžažçEQ¬«¯¿çÁ‡âãâòóòË+*ÚÚÛ]N'˲,Ã0 ³JA9ŽëêêÚYWW³³VQžç‰îû|Þ­Û·_ÓÍ]ÇåõÉu»\!I’ö-TEÒP(ÿ#‡úI§Pö`?£~„‚ˆã8M×EIKK;áØc’““ÚÛ;®¾þÿN<î¸ Î;÷‘ÇŸ…Ã#†ûø“Ït]¿òò˾›5«©¹åêëÿïŠK/INNzñåW].× ×]‹óÈO2 £ªj~Ÿ>›¶nÉÌÈøÏÍ7‰‚(IÒWï¼kƇï¼éñx5M3M£¡¡áÙ_*-+/ÈÏû÷?o|ùµ×wî¬íèìì_Øï¦þï¡Çïèè¬ØQ «vCa§Ó9oáÂ^yÕép8$ÇÑGùí¬YO>òð·³~¨¨¬œ8nܽ=ìr:§9-99ùëo¿s»\gqÚÌo¾kii¹öÆO;é䆯ÆhT…B=öDyEE÷B;»: ûõû÷7pG]Êÿ„Ð4ÍC] å'ö~Œ1ÇqM-Muõu’(9â¥gŸyãw>úôÓñcÆÜrÓ?øùÌ™'püì¹óþïºkgý8; ŸqÚ)…} ¢ÑhQIé­ÿþW\ ðïÿÜ1lÈàºúú»ïðÁ{î..)yðÞ»¿þöû ›6ýë†ëxøÑå+VžpÜq¦i67·ääd{<ÞÆÆFŽã\.׫o¼ÙÔÜüðý÷>øèã3Þ|»¥¥Õíq_pÞ9ÿ¹ëžc§O?ó´S7oÙzÙÅE"‘g_x©²rÇ[ï½wÜÑÓããâ_ëíp$ÒÜÒ‚1…Ãmmíš®;ŽÇzÀï÷···G§Lþqî¼÷?úø„ãŽÝQUuÓÿý_ZjêŸ|îìêÒTmÚÔ©N‡ã£O?åXÖ²l–eyŽèõx ûõ³mûµ7ÞTT5+3³µ­51>a˜Áƒò<ï¡ú†ú‚¼¼½ 41)) `Я 0‰ü¢ƒ…²/cžç·mÓ ¾>Rö–~ 0BˆeY·Ë5gÞ¼;ï{ .°,kÚÔ©ÙYYÉÉIcGžñÖÛ·Ýô/—ËõÆÛï¶´¶ÔÕ7tƒ£FŽ`Yöä3κðüó¦NžTRZÖ+---5UŶ¶¶P8 ÛÛÛáPGG‡aè ÃtuuM?rÚÖmÛ¯ÿçM‰ míí×]sÕÅœïCŸuþmííÜ}÷ ¯¼’ØÕŽD:::LÓŒÊrGgg8‰D£ ¹ÙÙãÆŒ¾ö†ãº‚¡œì,¿Ï{ù5×Fe%'+SÕÔŽÎEU,ÓÚ±£Šå8—ÓÑÖÞ‘””È0ÌY\xʉ'ꆮëú¹gŸuç=÷í·PÛ¶yžç8ŽJ?å7@Þ¤9Ž;Ô¡Pö.]ºtРAº®“ùLAÊ+ËgjJj{{{YyESs³Ïç>l˜$Š<ϯ]·îúýûãwßîž^\ZV]S“œ”Ô¿°˲;ªª*wTå÷é“¿xé²öŽŽAdfôÞ¼uë°!Cê"‘hÿÂ~›¶lIˆOHï•fÃ0 ÃlÙºuGUµÓå웟ŸÑ;½¢rGyEE~^~vVæºõ¼^Oïôô 7eefˆ¢¸qÓæÑ£Fš¦¹eë¶ü¼¼@À_QY¹ný†÷?úøåçž%qó–­~ŸÏápx=îÚúúÁò<ßÐиzíZŸÏçõxX]³sGUUfFFW°«WjjzzziYYEeåÞ…nÚÔ»WzbbÂϸR(?ClÔß;½·Óá$.dÊ¡‚Ü›7o> ô''%Û¶-IBcFMÓôx<ÿ¾ívEUž{êIEQDQÞ0LEQȹ¢((Šjš¦Ëé„ꆡëºC’¢²ÌsbEQ‡a±‡ƒeY€±ªi𦉢(Š¢ª(ª¦¹œNÓ²t]w:šªÙ;Žp$!t8$]ÓŸ{éežç·K’øØƒ%I´,˶lÓ²žÊ2¹ZQ1ƶmG£QADAÐtaX]×u]ß¡‡¦ëdÀ¡þÉ( þ4; ÄÍ@¥ŸrX“þúõC-Ë ‡Ãc²n–ã¸öövY‘O?ådÒ(Š"Ë2q©„ªªª( 1Œtƒ`÷à`(Ä0Œ¢ic„P$»Wá’ÿ£Ñ(Þ½š!Dò!„"Ñ(Iï:«+$¾¡¡P˜eÙ‚üüÕk×5òøãŽÅº®í^!ÔuÔM×uUUÉ÷±"B«¤’û/´[U)‡'Bÿl[UpÊ_¯æÅÐÝÀM¬ÞO=ú„0*ËûÚ¾»Ã0Ì^Ÿ„`·òþ̉{ýûûË™tÇ=ýä·LKVÓ4÷Ê*¦ÚÂîUŠ%‹%øùB)‡'BÝÐ[Z[vùÿR¢ßï÷º½t–ò—†=¨ÔdA,>œÖ¸F¢Q:<ï™´¶µ¦¦¤º]î?m$^USÅ1œÓI­7”¿0¿eT{X),BˆAˆ†`ë™Ø¶m†Ïë³,ëO(c, ¢(ŠŠJ¬…tàOù«rp£~ å0Ä4M¥ã.clZ&¶£·^ å·ñ[¤ÿ°2øVàÝ‘éþ´âþ¸²þ*¿2жí˜ôã=Cþ¾WA ú݉(”?Šƒ–~!˲ÿc@ò þ†gò7Ÿøk2´m;ýí7¼Ë“Å; ÃèºþÇ™H,0RO2ÑýG”E¼žºÛ²!8|øìÆî Û¶Y†’Õ¿­}º·ó^|pþÊaÈÁI?‰BÕÙÕåõxº?QdlE¬ŸDŠP7=»ç`cRât8UI-èöôîŠØ­Å»!0–$É4M]׉ê‘Sbåv¯j÷‡¶{J°{³†aÈÂ…X†N§#•‰W+„ˆh© ©•Mƒݦ»cs D÷[ÛÚÂápJr2‰Ö²;@hËïÞb±oºgHRÆšclÛÂ]~J<ÏE£2Ã0Ñh”,3†?%Û»Aàž?ľ¿W¬ÙI¹¤–eéº.Ø}±`w¸WƒÀCîA÷Q?©p0Æ»\νÆ(± ûŸ±¶úéƘã8A¢Ñhwǰ]ÒOn å¯ÌA<´äyhni½ç‡4Ms»ÝÇãvK’ðû%I"«ºÜ.—ßë%Ò p»]^‡ˆ…Óéôx<^¯wùªUc·ÛµKã0æy>8NŽãœÑ&§Ó ‡’är:7oÙÚÖÖgY– q€$жm <ïv»}^¯$IÇãñt¯6˲~¿ßãñÁr»Ý~¿àt:7oÝÚÚÖ–oÛö²+]N§Ûíþì˯ŠKJ€Ûåòû},ËÚ3 ã÷ù|^Ã!aŒG ˆ-s:å?öø‚E‹5Móz½n·›$#9`ŒN§wcÝBÈëõü~žç!.—Ëëñø<"»,Ëúý>I’8Ž …Bk×mHˆg执ŸíèèŒ'Ý˲¿Ÿxžpçt:½^/‰› p:{–.Ù¶- B à÷ì.È!I~Ÿ/..në¶í/¿>#>>Þáp8Ž…‹—,\¼Øïó¹\΀ß/ð<é|^¯Çí>Ô÷0èÙ4M§ÃñÅÌ™ï|ð×ëEÑãñH’èt8È]1–$Ñív;Û¶-ËbÆëñH’dZÇq’$ÅÅÅC¡ÕkׯÅÅݽ2ù¡Ú$ŽBù+Ã\zé¥ÉÝv;aY¶£³ƒçx·ËmÙ{o²lW0¸båÊ#¦L.¯¬\·~}EåÛÆsæÍC%'%UUW—–•o+*Š ¸œNãÕkו–—§¦¤˜¦¹m{Qyeåö¢¢W^Ÿ …~¿ßç³,Kàùú†ÆÙóæ*ŠŠÜQ]’œ¬iÚöââÄ„„¦¦¦çÌUT…eØytGUµÏçMMMÝQUõÜ9Ç¥¦¤T×Ôlݶ}õÚµˆaÖoØXV^ž™ÑìÖýP(4wþüÚÚºää$A/Yºqó–ÌŒŒP(tÿÃTî¨JIJÞ´eËÓÏ¿Èq\|\À²­@ÀßÐØ¸eÛ¶uë7$&Ä{<žP(ô㜹Õ5;5MKNJ**.^°x1‚0>>`ZÖÓÏ¿¨ëƉÇ«FiyyEeefïÞÛŠŠ×oÜè÷ùœNçÖmÛÖoÜTQYiÛxÎüy b‰ô(Š2áâµëÖ{ýÌív'ÄÇ}ûý¬¨,—•Wü¾@ ÐÖÞþÝ?D#ÑÌŒŒæ––²òŠmÛ·sçõx,Ë*.)é^:‚0--µ¬¢rÎÜy;këRSR\.WQIÉœùób¢Ñèœù t]ßY[›•™‰„=o8ÞVT´bå*‡Ã§iÚsæî¬«íž~gBáPÌǨ³(k×o°m» ?oõÚµ«V¯QUmGUõªÕkÒ{õ²m»¤´|ÛöíM--©))Ƕµµ-^º,*GÓÓÒªª«ËÊËËÊËç-XøÙ_‘®Ž„]#0ˆ‰D#!‡Ãñ+ç–†iimñz½<ÇÓnƒrÈa¦¹¹ù7H×òU«§Nžtû]÷°,»~ã¦ÅË–þ÷?úxÚÔ)/½öúæ­[[[ÛfÏ›?eÒÄ×ß|{ýÆMMM«Ö¬ÉÈè}û=÷@:»ºjjvB32z§¥¤ „jëëïºï„øÃ0ÇO?{ÌQGn/*þà£Oô/¼ãž{ ÃpHŽù‹¦™™‘|þ¥—“g~óÝÁƒ~œ3wæ·ßú}¾—_}=5%eÎÜy–e 2X×uÃ0n¿ûÓ4ûäæ~ûý¬ ›6)вnÆÌÌÌç̵,+=½WKkë¦Í[i@ÿÂO>ÿRÅ7ßyWQ”ê;W¯]7eÒÄyÔ4ÍmEE6mòz¼O=û|FïÞ²¬äæä4M›3o~T–s²³?ûòËUkÖ$Æ'l/.ùnÖ†¡óý¬AÜ÷Ð#,Ë ø?üøÓ1£G¹\.„P[[ûêµëdEþæûï{÷J¿÷¡‡“,^‡³23ï¾ÿÁ¼y lÛnln®Ø±Ãçõöí;{î<^àÛÚÛ–,[6qü¸GÒãv/\¼Øçóµµµ?ôøã/¤¥¦$'%éº~óíwð<¿nÃFRú}2eÒ¤âÒÒ–ÖÖUkÖ¶¶µ!„^|åU§Ó)‰¢$I³fÏ.ÈÏÿâ«™I‰‰Å¥¥‹—-Û¸y3‚èó¯¾:fúQ/½öz(.¯¨¬kh>t¨~(6¹„v»¼oLúÉ«çÚõë9ŽÃ6~äɧúäæ¼òú¼À—”––UTæåæÜrÇn—kÖì9†®'&$>ð裢Ùsç9Ž ›7ðÑ'·»®¾¾µ¥ÕçõõÉÍ!6ð'ÒÏ Æ!Qé§ü%!Òÿ[¬´BlÛ€ÿŠK/=ö˜é½ÒRo¼þ:§ÃÑÔÜ" ÂôiÓ}è§ÃñîVTVÞ~ËÍ?pK[Ûº úæçßðÜô×§¦¦\wõÕ“ÆW5 àt:ÓRSB¡`ŸÜœaC†¤÷J[½vݦ-[Æ“˜’œ …úäæ:¤¿~§Ÿròñdz`Ñâ¦æf˲+wì(.)u9“&L¸áºëÀçž3ýÈi••Ë3HfFFWgW~~Ïssç/°LKQÕÅË–ggf 4ðôSN9öè£Ç““•õŸß”›“ f\|ÁùW_~Y4]´d©ñn¹ù¤ã—$)..à÷yUE4pÀ0Œ¤¤¤AƒŒ=òÄãcYöœ3ϼøÂ ,Ztåe—ÜqÛ­II‰³fÏIï•vÙÅ“»áºëGSs3Ïóº®'%%ö-`Y¶½½£¾¡¡ONîõ×\}ÚÉ'765ÿ0gnVfÆn¾ù’‹/œ»`áØÑ£öû÷?ot»\Ç]pî9W]~™¦i+V­*+/Ç766­ß°QøþýúÝ}ûmùùº®þÀ—^+Ýét5b¸Ïëåy®¼¢â«o¾9ýÔ“oý÷MÇ=]V䂼ü+.½dâ„ñ•UU‚À#†‘$é”N¸ù_7ò¿iË–õ6bŒ;»ºV­Yshoe˲ìÝÍ81yÀö þý¯¾âŠŒÞéGLžtÁ¹çÔÖÖ©š–œ”tõ—ßqËÍËW®úèÓOs³³oý÷¿.½è‚ofÍ2tcʤ‰7\÷cŽ:*??ïŸ7\ït: Ãø)sÛ²±Mmý”¿:-ýÃ01†nD"aUQmË&áÛ ÜõÆ­kZ0JïÕËÆviyyEE…¦i~Ÿ_QEU¢²,ËJÅŽÊή.2£(‰â-ÿúgnNöÍ·ßÙØÔtìôéöyqiéè#0À·Üô¯Üœì[n¿³¡±Ñ4ͪêjC×]N§Çô;©çMrIDATã2xà}wÝ9fÔÈ`(¤iZ(‚„ÃaUÓàî¹GÓ².¿ô’ã=ú¾‡Þ²u[||\RRÒ‰Ç{ÿ]wB„¢Q¹¦¦&‰¦Ù –WTʲbš¦iZ†aDe9*ËÛ>¯·©©©±±1‰È²’––z×íÿ‘åö»ï%Ó–eɲF†iª*‰aç*)+ëììlimMJLP5ìÙbÛ¶ÓéüqÎÜ>ûläˆá<Ï›¦©z8Q5ßÐØìê*--óy½ØÆ--­µµu†iš–ŽD"‘Æ@’$—Ë™Ÿ×ç¦o8ëôÓ‚Á eÙ$è„ z8Ü­t€D<ñd8)ì×ϲ,—ÓUZV …Âá0À@Ó4lÛd,o¦eZ¦a*ŠBÂ: ¼àpH™½/¹ð‚¯û‡¦i‡p²7f…Ùâ-Ã4M“„÷ˆD"–m…#‘P8 Ä66-KUÕê5<ϧ÷êU[WßÔÔ´­¨8>€(Šb躬(--­Ä_+–3ñð¡Pþ꜇Ƙe™¸¸‚00,ëpH^¯Bà'&Q>üôÓù‹äåŸpܱ¢(~ôégضO:þøý -Y!EñÈ#¦¼óþÇ=Ú¶íªêêw>øAh¸±Ç 6ôÙ_JˆëÓ§ÏšuëÞÿèc¡ cÇ:Ž#8âÕ3~?Ùi‹X½32z{<Û²B€øêxÜn˶† …B¯ÌxCÓôdge}Æï}øQSsSnvö€þ…Guäëo¼éñxN?õ”!ƒ>ýü wÜzKBB‚(Š~¿ŸeY¡(JC;zôíwßkšfRRâÆM›¿œù àIÆ3ˆ1€mÛãv[¶øü¢ 0 sù%½ÿÑÇËW¬ê߯ߑS§®X¹Šç¸Ý-ý~?DZË4332AøqÎÜ€ßïr9>?„Ðépp,wÔ´#¶ýçî{DQ¼ü’‹ã¿ß÷ßçž»é†ÿKˆç9Žä9hÀ€)'Îüæ;—ÓyÆi§8NŸ× baòˆ X–ù©tŸŸçùÂ~ý6oÙÂó|bbâY§Ÿöôs/üó–[>rZrR’ßïø].§Ã0MÓëõH’„äv»ÒRSÎ<íÔÙsçoÜ´yÔˆá¹ÙÙše*‹¿eY1/2Óër;!DÇü~lÛ¿Ÿç8ŒÏëeÔØØøÐ£G¢ÑsÏ:sðÀõ÷=ô°(Šÿ¸úª q'+Ja¿¾ /~á•W¯½êJ·ë'„]L¤Þý”¿4 Úœ’”¢a½µmÛétÞ}ßôŸ:y’×ã1 CEQÈ!MÓb‰9–•U•`@Ãá°¢()Éɦe9ŽÛïº{ÊäÉG15F£QEQRRRˆ¯§¦ëضA@µ¶¶W–Ÿ»BE Cd‡¤3 ºÝnŽã8–UuÛ6ÏóAYQ9–ÝïU»\NÑGŸ~º~æ'y¨ºf'D˜Ñ÷[.ÆXàyÓ²Uõ¸Ý?ãìOš½«+¨ij\\Ü^‘aBdžBa‡ÃóûTU•çù½.“çù¶¶vŒm·Ûýk~8!Ë2MÍn—KEâ&ÔÖÖær»ù_ÚZ B0$W×ÝòO¦¦¶&91¹û† dn?æ‡jš&Çq¤{pHRyeå+3Þ¸þê«âž× C’¤h4*Š"1éS†aY–D­ #Nn‡Ãïóÿš]hÐfÊaÅ/mþ C‘°ËéLMInoï`FQUòÅ‚9tà ‚±‘š×ëõù|$¸ÿæ-[š[ZG!+ „"Aó-Ëb0 ñ׎Ã6¶~öq"–n·Û0 r˲‰‰‰D tà Ú¶mYX„}N"¸Ÿ|öE0Z¿aÃI'oÙvBB<‚0 z_ „š®C%QŒÅ‹>`JMs¹œ{ßµrÄx-I©0ɇèÔ^—©ªªÏç%§üÊ›@×ä¤$bÍ -œ˜˜h[–ýK³‘EQ‡Ëå"ûo¤ƒe/¿~@,'iŠ˜‚ë†n˜f$%o®²¢ „Âá0q²»c•“ È­iˆÝ¨{8wR‹?å/Ëï&ýBUÓ.¾àü¸@ Þµ“-ê¶h¯Ä{)WL×,ÛEñ²‹/!&÷1Éë¾F`š¿JãÈh.¶¸‰Øb5‰=ÉûÖŠ€1FædgWîØqåe— (ìF!„ö/Ålˆ­¥úű!)z¿¥ïµ2.vEûMy°QÌ „±hv7é¯]§Ðëü'‹áó‹=¦éñÀÕ—ÿ{÷e‘7|fžº½¦CHh¡„Ž•*‚ÜÙ»wÞÙïUï<ï½óŠzUïì"¢¾wvO›-OÛÝßóìÌoæwO´ˆ±Síu÷½£]ÊÄ ó¾ÏÐoFöðá†a|»²Vô%š¦õKOÏÌȈ½Rþîß´ï¸BÀ¨ì§¨j$ùoúæ_èûBÃý7 džaȲœ5d0m‡üë"„pF&Ï`˜³éûlðÒ¢]ß%šÐëPZ]ë\œ“„ÂaZ½ë|Û°Þ B(ðB8Eñ›GMÓ9„¾]s¦iØÄtŒ4›É‡¹p}Ï“6/añü,ºÂ"þù)!>¡±©1 w|f¾Éåø·›‹Ž.ž¯×k‘-çCKÃ|kl¾~æF“y$IŠ(ÏlÂ%°cu¢t®÷›a¾+ú™ „°¶¾Ön³{½Þ3ÞûJ:f ­«¯óy|²$cÂ.ü™  ýÌ c¬*ê ƒÎZFQÛƒí¡pÈjµšú9ÅÆ0ß ýÌ…¢º¡ýèªïa]„pˆ#˜¥÷0<ú™ „`rvrí !t®†¹Ð}ËÐ;hþ[¼‚¾Õõ{/~»@Œ B°óÎÓ^É·Û6:Þå‰{¤‡Ñ¼€æ‰@¾íGôT8vŸs½Û ó|›Ú¼4õ>zû¤rØ€“#`l@Œ~ eI¢áv?…t™2¥ËMQéÄ]Fá‚nßðî_Ú.ϤKE›¦nÇɲ¨j D–$Ã4cGüö¸‘]ÖNçz‹ŽHè~&èòÐ9ñN$‰ÖÒŠ6€µ##ðD…EŠÂqˆ~N_=¿P—·2:aÇq‚ Ð bQw´ö°w†¹ÀFèÇ„Xd¹¸¤ä©¿ü-Îï…ÃÓ¦L¾ãÖ[Âá0ÆX’¤è7 !¨ª³•‰¢Hç¨Aò!<^Zšœ”$IRtrŽã$QÔ cŒÔuB(‚a‡$I¢÷T×ÔØmv¯× …iVŸªª´ÐÇq<Ç©š& Déœ]‡ õéjtê7pkjjl6›Ïë …Ã¥¥ei©}yAXðɧƒ ™­ë:Çqªª`L „´¥a†aðò?8°=â8$}Oé\uÑ+I’è(tzþE±­­­¹¥¥_zº¢(ÑþWýì¬Ì\àN窟ŽãÚƒA§ËùÜ3#„¦YQQáv»mVkMmÅ"#„ÚƒAUUûöI!ð<_S[«ëzjŸ>Šª¶µ´«ª‰(/¼2ç†k¯¹hü8: ™ Š¢>ç÷Ùl6MÓ\.ÆfSS“ÇãÑ4­ððQ¿Ïëóù^÷úàAƒ®»æ‡»= å大¥º]®¶öö`0ØÔÔ”žž^WZ!Ìè—®é:„Cˆ’_P(ËrrR¢$I¥ee‘Hdà€º®Ï™÷ú o¿åæÂ#Gæ¾þæ£?4p@&´¹¥¥¥©©9 ÈÌ WŽù…’$º].¯×ÛÜÜ\U]œ”ät:é©kþ´Úÿçþ{m6›$Ieåå’$%%$¨š@644V×ÔÄÇÅ%''©ªj±XöìÍ]½víƒ÷Ý‹2 ³¶¾Žž™Ž/(‘™™˜°9¾^´„½ ª¯¯¿êÊ+ï¿ç§­­m‘H¤¢²*!!^Ó´ªêj¯ÇÓÞ ´¬K\\“‡¹ôy½-­­ŠªBvíÎY¿iÓÿ>ú ¯×+ ‰éÛfÓ53ÿN£@#!Dàù¦¦¦«V‡Ã‘Ý9{ú¤¤¬Y¿aíú ~¿ï¯ÿǕӦýóíwV­Y»s×‚É—_þégK|úiΞ=Õ5µII‰¿zü·%ÇJ}¦N¾bòW<þ¿¿Ú“››_Xð÷¿üùÑGZ´di]}=aæ³fM¼äbÀ¶;yA „L™tEffƯ~ñˆ,ËŠ¢ð¯(ʧ‹—X,¯Ç3á'íÁà9œ ÿ‚@ÀI%º¢$Ir¹\ôWÚc?äÙ_..9öÈÿ<8Žûå#?pï=Ë–/_øéb„àKÏýã³f}8ÿãP8!&Æ—^tÑ·ßvÓõ×#yžÇØÄCH ‚Zv»Ëé41Ö !D04k‡Y’±iªª‰DE‰-ü-Óx®÷˜a¾«Ó.Ð(ˆB~~Á/~õëP(4sÆ•MÍͧÿôÔßþñÜ?çÍåy~Á¢E[¶mã9îŽÛnE÷Ü˯¼=|ø¨ììÕkÖ™¦i·Û‡ee½ðòœï»gÜØ±„£EEK—}!­fuùÄKÿùÎ;33³‡ß“›ûùò/EApØíÀ±cFôŸÿȲ<명…¹ûö˲tñ„ ÑŽ>UÓ &6 Ó€ð×ÒÚúáü%Q´X¬n·kö¬™+V­!Î3zÁÂOy͘>ÝçêÏýÝoþ—ã8lbÃ4h_ ¸hüøUkÖ>ô‹_êºápØ·íܹiËVÓ4m6;Dˆöc™ýÒœ¹/¿:÷'wÞ‘“»÷7¿ÿƒªj?œ}uRBísÖ4½¦¶®¥¥Õírw ‚¦I7[óûêÞýàÃξz݆ <ÇÓ²b,Ð|­ØpL/Í!-X»¿a·Þtã{~ôØÏÙ±s÷«ó^¿áÚkË+*^xeÎñÒ²Ó§]>ñÒg_xé±Ç×h{ðÞ{¶ïÜ¥«z$ÉÌèGž~ö¹ûîþ©Óáˆ&•E×ÅZü™ Úéh¤i5µµŠªbÓôy½„—Ëét:KŽKII~ö…—â|þ ãÇ 0@–%„PYy¹®ëtþýÖÖV¯×Ëqœ®ëeåå~¿ßírÑD‹¢’’`{pØÐ¡6›Õn³ýæ÷OŒ3êÖ›njhh(9~œ>ät:LÓ,+/—e¹OJJkkëá#G­VkfFEQ !‡½±±Éçó†ÃaÃ4=n7ý¢/+«­­4p@B|<àXiYm]]Ÿääää$@Yy¹E–“““@uMMß>}hòODQ\N'!¤µ­->.Žçùªêêõ7>räøýÞÜ}‡F Îó<Íáy®²ªÚ0Œ´¾} ÇŽ—e9µo_šV$BKkkaááä¤$×c³ZéÁl %99µozÑP^Yéóz½Oss3DÈ"Ë<Ïím¶„øøè¤­„Q›ZšXFæ-ÐxÚµyiêBB ëÀ4MÃ0DQ´Xä‡~ñØìY38ûꦦ&ú|Y’ ‚‘ˆ‚ây>šN'K’¦ë´÷ŒÖjGÒ‚ŽeååÏ<÷ü³û«ÓáÀ„ЇU¥ß4Y’LŒUUãyN–厄è–D³÷ „ºaÀÎmàx^Ó4ÚX$I’ ðº®kšN51Ö4ç8QE¥™B†ixž×4-gÏ^I–>[òù°aCïýÉ]Š¢ E"Jôz“=!-2C“—¢iâ¿,I†a)çBzLèf ‚@Û :¶PÓµÎBƒÌ©”U”Åûã»ÌáC³ò!„ú±¡Ÿp‡Ýž_Xøê¼7^}ñŽC¡p˜`%I7 MÓh;a4a—¦ ǾŢ 6·6Ûl6Ûc˜Æ×Žíb¡Ÿ9¯|ûÚ¼´l—;Bô«uå´©ÉI‰@tŽHRTt–‰æ³B‘HtÌ!$Ó/˜ ííÁ«¦O§¥ziùšIMŸQBÐ4Í`(; „ѵЗDÿ¤›Q”Ø%¨ªª(*„ vBÃ4p$Z³0šõDGiEeWNÎÅM¸êÊé­mmcúúØ‹MµsgÑZ¯ÑG Ãh?¹bô˜Dÿ.'v ™¯F›ã»ÜC&ˆ$ˆ1n]N笫fCAz}@k4C!ÐYNt¾;ªªªÝ器ijѼ̅îÛLäÐc<¢Ñÿ³fjº;Ž)öɧº bʳ(Š2dð ÇE 4v©Ü»dØÓ_±ð˜?8Åk»/„ˆ™3®¼ö³u]§a¢ÇÊ-_±ƒÝ7£ûºNÚ5[¾BÁ¤£-¾ÇöwÒñ?P×u‡ÃqõU3ÚƒÁŽr¾±/!ÝnÄܦóõcÌòú™ÿßsÆö`ð»hÄG"‘ó­*V0 ‚XÆó m®Ñ ]à…o‘ !ööo2KÁ&¦ÝïìÚŸ¹p¿Çå|¿»vÞmÓ‡.)L„€hë ÿõŸÏ8\]]ÝYÜXât:m6ÖjÏ\ØØ¤Í̹&Š ¶=!`±ư¹˜& Ýµn—ê„›Õ–žžnæÙ¹‡òÏâ>s¡;eèg šÌÙjk‰i„ aQäËËå7ß„îÓ'ôüóØïïè¥Õut}1ÆØ0 BÇÁ™ï!¡Íý§ùš³w0æê9ôÓ&TÖÂÁœ9Ð4±Û-.]j¿ñÆŽëzýÈaLï!‚€ÓÓ¦AU5‡ Q¯»Æ„]‚@§ 7 ¤( 6"€ à{?œnWD¬S€9ïôú5]STEïÌDd˜ïŸn`‚¹²2€:p Þ·u×nÔÞN$„@ä7ß<ñ|­IIqB ëæàÁÊ}÷š¦áóééi†?ŽYHÐt ëÐÐn€S•Öâ8€PǼÞgìÓ4Mþ™óÊ)|H×ò ó}#"ð€ð~OmkמצO×®»{<($¢ !²,.[&~þ9 …Nô "lÙ"lÚDÿ§`¤¦6‰Ïg\r‰>aNJ"n7±XzÜÔÞ" Ð÷ßdľGÌù©çÐ/Š¢E¶ðÏ.U˜3E$D×ᔩ¡¹s¥†Fë¯~…““ƒ¯¼¢Íž x êôjW]_xĶ@B(lÞ,lÚD‚†Áñ„ÿ,’AƒôI“̾}!mDŠešÚÌ™æÈQ@׈,C]‡¡0O]zB€€ð´~#`‚%Qâ8Žuž1畞CtŠZÖàÜ)„]7ÒÒx-þ3 ôÚkêuסúúŽ{±ÌqÝÓ{´3Ôk®@B`k+¬¯‡á0íìEeeÂÆü®]|~¾Ûjt2é¹çˆÓiŒ«Üw‰‹3†%^ï)7c‰ÀH¾q7XG·0 ûÌyæ”>ìzŸ9³!²lyþyëÿˆ}¾ðܹúÔ©¨¡á”¹üÝšM`0ÛÚBÀó$%s}š9h>kÐu®¤„+.†¡‰h1±X„mÛ¤÷Þƒmmâ²eâ²e€çõ ˆßºÿ>NJR~Ø4`ÜqŽù†'öMbÎ?,¯Ÿ9 ƒøý–§Ÿ¶þñÄãi_¼Ø˜8¶´€¯dÛni£Pç@Uaìé!NO7§„ ÔfÍ ?õlo—Þ66ò[¶|Uƒò»ïj7Ýùõ¯ìl‰€p¸£ è¬ä•2Ì÷ˆ…~æ\ „ Ä;ˆ<ö˜q饰¡Â×¾N:[>XéÄ´ÉðyœŠ#ÐcG+B!âtF~ÿ{‚ßÖÆ×Ô]'BØ1ygìËï¼#|ù¥¸`ðÅÊÃ+÷݇32€®]‡ºtòµ§.†9O|›Ðob €§˜ cÜe@ý ªÛ ûó»<ÔýåtLM3Ä í·ø&³«Ãž}=(B&z×h†É¢ñïà×€ OŸ4íkOh¬¯¬ª †Ú±‰Aðùü^·K rìþbL „ð«—l°¡AàùvE©#¦‚ ‘M¶$&&‰¢hÒ±ÄBBsæÀ§žÞxÃöÊ+–gŸ•æÏW/¹kLœˆSS±Çx¶¶žøp^~І:íвÛíAÓÄáp¸KW0Bˆ–™ÞC§‡¦÷ž¬V«¦©“RUU@ì„Ï6›•ç…p8L¿á±…öˆb±XLÓüê‘ §ÚÔoxÚøZße9Bz4b/EéœòV‹EQµ§ƒ@ŸÀqœªªß×^tgµZ5M31þÚE÷|2M`±€@ 3¦çÝ7 ãhÑ·Û3 s À ÁP°´ôx{ –š®zô³!Š"Ïóáp Ë'Ê'œr“,–ºúºšêªþéý’3âÇË+çîÉèŸi·ÛOT‘( O=¸ñFË /ˆóç[, Bpß¾ÆÅk?øzÓMÀ0 aú51ç+îî»ïNLLŒÎMÏó|sK³(ˆ»ÃÄf—ï B(ïÊÙSPx¸¶¶6..N:[:!„㸈¢—óxÜZÒTŪêêÆÆF—Ëešf´¦ œ8rô¨Õj:ìÇþÐ>|ä¨Ë嬩­ n—‹ŽãÊÛwà€Ãîhimm Ü.Wç6„ clvþ2 „<_\R¢©*u‹NJ·9º=cAªkjš››=žŽLô™Y&èºÁq(:Ž¿Ë¹Á4qôvt™´Ð.}ˆ]NÇýˉ­øJoÄÆhº×ªª—¸\N¡‰1„Äó|cSÓ–mÛ8Žs:Ñ*ÑUs×ÜÒR]]ãv¹$IèF×µÇîEôô@ß….[ÝNºÍôB¨ððQh‘“Ø*†ô8ÄÎ|Àqœ,IŠª"€Ý..^Ì8 ®X!ää¨wÞ u½Ç.VZå¦ðpA\\ÜÁCxŽç8În·''%—+:N é;XVV–”ˆ8TZVÞÐØèóyi]õΟ'í;Çq¡PèØ±’qãÆ»<¾œÃ -!=k@š$ËG‹ÄÇ'F›òχ‚Á9{â‡f³gGn¼1øpë°a¼ÕŠ+*øœqõjsð` Ic`³0Mކú:—Ë-Š"ËñgÎ9ŽãêêêNãw:ÆX’¤òŠŠ??ýôÞ}û>^øÉ«¯½N cy=·Û%IRmmí«¯¿n†Õjõ{½.—Ëår­X¹ê‹+½^¯Íf£ñÂív{½Qu]åµ×¡£þ¸Çíöy½N§S×õ—^GV¬ZýåÊU6«U×u§Ó‘³wï»|XxäðÞ}¹ËW®\±jµÅbÁç󹜺©»=ÎÃÛl¶wÞÿà`^¾×ë•$ cìt8|>ŸÛí¦Ïw»ÝÛív¯XµzÁ§‹ì6›Ëåâ8Î4M—Ó¹~Ó¦ŠÊÊøø8]7dIòû|N‡#ölµZãü>‡Ã!Š"­éˆ t¹\чìv{ìr ðY­q>=Y,¯Çãñxv»Çíö¸ÝÑ)…é©Îï÷›¦9gÞëÁPÈb±ø½^§ÃNK‰½üêÜÂÃG‚Á ×ëõù¼V«v®Zdz7wßÛï½ïõz×mØXQQ‡1Ž=>ѽp:~ŸO’$BˆËåòx<^¯WêŒV„»Íæñx<‡Ûíöz½Ï^™ûZk[›ÏçxžžA}^¯Çã¡gzÄìv»,ËõõõËW­ŽGtÝ=š¸Ý¨©I\°À~ÿýÀ4,ƒ“gÈ¡q¿¥¥Å4Í´Ô´P(¨ëªah‘Hc³ÿþÕµUÑË¡®ëyæÇJBþòÌßkjkl6›×ëu9Ý?ôðVT–§¤$‹¢øÜüm:þÚ²Â÷¿ÜŸ˜o±XkëjA Ÿ"IkëëtÿŸ|4ßÅóÁ„„gvï-{ðAeÕ*räšû* …·Üâ3Æ5i’óÊ+7Ü }ðˆÛm¸œ€ã!'ýØ&`'æ\8«~Bˆ$ŠU55 />û‰—\üæ¿þ5éòËLÓ|çýò   …s÷íŸuÕŒÜ}û?øhþÁCyƒ (-/ß´ykiYY0™Q" ?]´yë¶¾))6›mÓ–-O˜àr¹LŒ Æ öùËÛƒíéii›¶l™|ùå%ÇŽñ?zÔHÓ4ƒÁàó/Ïá8n`ffFÿŒúúžç/¹è¢ü‚‚þýQ]}ý€Ì BȦÍ[-YjèzZjªa²,oݾcÿƒGŽ•D©_zÚ_®üdÑ¢²òŠ2!‹—.]¶|EœßW[[ !Ì1âßó?NNNöx<Å%%Ï<÷|~AÏóƒ Ì+(\´dI]}}F¿~ 30í?ppþÂOZš[‡vîÎýÜóy˰}ç®ù †1hàÀÜ}ûW¯[·ný†`(¸qËÖ»vÌ Š" £MMM|4æÍ-­­×þ`vYyù»þ»¶®nøÐ¡Ÿ,Z¼fÝú1£G÷KK_´déª5k%Iv8kÖ­Ñ¿äøñ£ÅńƦ¦ôÔ´??ýL~A¡(éiië7nZ´äsC×ÓSSéOáª5k׬_o·ÙâãüËW®Ü¹sת5ký~¿ßç£8·îر}ç΃‡òRÓR-þlã–-}RRýlÉáÃGÒRS]N'=bõõ ýÒßø×[‹—~‡SÓÒ,éÙÙ‘_ÿ÷ë'¬YÃçä ÆF}âÄŽ«æ˜ž  õ›IIIº®uŽ%¦iH¢XZZš”˜ h6]OMME~¶lY~Aaß>}~úãïÛ¿ÿÃæwÿl¤§¦¦)BqIñ ŒôÂòÖO¶×\:ºŸÃaÛ²¿rÒð8‚µ––¶ä¤dZUT„Úºº²ŠŠ’ãÇ3ú÷Oòy×®\uÅØ1Yþbû޵-­Î””¸#t› ƒÜÑ£|^ž¸l™4>ߨnh°''sqqóñ<ày ËÀb†A“‘Îu(`z‹Ó¾ê´í˜ç‹K޽4g΋s^1l¸×ë}î¥WdY®¬ªú×;ïʲd˜!D7ôaC³Ê+*Þzï}‘Ãa3jÔGÿY°ÿÀÁ|R^Q)IÒ‹s^¥ ´¡`šØ"ËÇ ûpþöäæJ¢hb“B›8hK®Ë錋󗖗¯\½†çyaCCÃ+¯Íë—ž¾nÃÆu6ìÉÍûæ›YƒÓÆúÃ^×õä¤ÄÌŒŒ¹o¼YV^!ŠâÈìì 7­^·þ“Ï–ì?ppðÀtƺ–ÖÖ—ç¾Öhw»\†aH’ärºœ.—ßçË/,|åµy~Ÿwý†ýg$I‚ ?^ú—gþž’œl±Z „Îÿ¸µµíP^ކ͛ëêëÿô·§SRR,!äv¹]Ngœß¿ÿÀ¡÷ÿýQÖ!ï~ðáá#GöäænÙ¶½_zú³/¾ìóz /Z²Än³aŒ Á/ÏgÆÐ¡C õtOÓÒ6nÚüùËSRR¬V«Çí6LÓçõöíÓçõþ+//ÿÓÏ>ƒå~±|…$ɺ® ¢àr¹\.g||ÜÆM›_ÿ翲† €`B0&Y~ïÃoÞºÍãq¿4gî‘¢âùÿYQžçç¾þÏsI/ù|çîœÄÄ„·Þ}·²ªJ–dúš¦9pÀ‹Å2gÞëÕ55Ͼô2 ¤äر7ßz»ðÈ‘W^›çóy×mØðÑ‚…ñ ô— m{CEQï¼3ôÖ[8=]z÷]ÛO‹¥Ç aÓ0io ]£abÒ19Žkii¹áºk±‰:ôÐ÷—––Ι÷FŸ ܱÐ “ƒ¦U„-A#Ñ2 Ø4Í“&‚¦åû$'ßuçsß|SÑ4€lµ¾÷ñ¶¬Yãõzþfsä>ù¤º|yÛÆ­ùùÕ«Õý†ðܳCýeü%—¸ ò â<Ø3x°gÈû]w‰Ÿ}0<Ï®ý™³ì43 „8vI’·ïÜyïÝ?inn>Rt´±±©©©©¹¥Å4MxŽ÷û|••Uº®755©Š2,+kÚÔ)3¯œþÙçŸÚUÕÕö`DQž—$‘¶‹¢ ËriY¤¶®NDI!„’$ <¯ëºÇãÉÈè7lèÐӦɲDq8G‹Škkë*«ªB¡PeUuöðácFÚ³w¯Íf§[Mà8nì˜Ñ×_{MzZêö;““’JŽã8îÈ‘£ûxøÁo¹éÆ!ƒ ¢ðåÊUÕ55¿þå/hoÿ~ýú§§M4iÂøqkÖ®52ûŽÛn»ïžŸnÙ¶-‰`ŒfLŸvðÐ!MÓ²:dðæmÛö<4uÒ¤´ÔÔ+§M=xè®ëƒHOK2yòøqcwåäÚÛKËÊ"¥±©Éf³]pÿ}?ºãŽÁ^ÏæÏ—YeÙ´ÙHB‚>qbðwZ7o¿õVãu×N'jimmÿš›¥O?uÜz«õ7¿a—üÌÙwz¡B¤jšÕj}èÁn½ñÆW^›gµÙ|^ofFÿ{ú“»ïú1Ƹ±©±äøñ^žcµY³‡‡Ã†i––•W×Ôlݾ}äˆ>Ÿ/9)é–o|ìç[-–¶@àhQ±¦iYÎË/ø×;ïL¾âr«Õfšf0zÛôá½+ûo?}ù¨þ»öäOd…Ahb3¢(ápøá8xðPÎÞ½^7))ñËU«óòò‹JK³† ÕTPU Áæf³oãž{Ž<õ‡ú;ÚŽk)*j)*j).n-, |þ9NJ’?üìŸ9ËN/ǦC´´¶ 2dø°¡¹¹û““’ƽrÕšƒyù6«udöˆƒyy•••—]zéΜœööà°¡YII‰¥ee[¶mKíÛ÷ÎÛnMOKÛ±sWÎÞ=ºaŒ=ª¾¡aÇîÝ/ˆ¢ÍjmhlÊÝ¿ßn³_zÉÅÇmÛ±cÒe7oÛç÷gôïO©©©õûý>ŸO×õ ãÆ~ñåŠÆ - ¶ÚGfp:)ÉÉMMÍ“.¿|̨‘{öænß¾}Ú—O¹ì2%¡If Š@ÞÄõõu®øÁïÇv;±ÛÅ‚Ýn‰È¯¿Ry¤{Ü!´­nÙ²%;;›¦ÆB$I**)²YmI IšÞ5UœþšE1‰l6[8"¤ë:Bˆöš¦É󜢨’$ÑLAATU•%)Ó%¨ŠÂñ¼¦i4ãÍ0 Œ1 ¦š¦Ùl6MU!B±é†´c@–$Ü™›A»( Ã$Ñ41Ƙö˜BÆ¢$Ñ4¯`/Š¢ˆ¢¨(ŠÍj5:Ó:5Ur ðX,áp˜ö(Š‚ J’¦iº®Óå #ŠBãÇq!]Ó,KDQDAøýÿtýµ×Œ;VÓ4ŽãtM³X­‘H„çy©s96«UÕ4„ a˜ôç…¦iV‹%‰ð‚€¢Ùè„Y–cQBá0 €1€Ð®‘p$"ð<›¦ÅjU"AUµX,c]×A0 AH÷‚N–Üåøð;×Ñ€é-héN/ôƒ®£%;FÛ@ètot! c >¢¡„ÞIÿïx~g6^ôùÑ!9 3Õ½ûªé=˜ع%±Éï=njtôŽIó§‰í¨ó¼ÒãËc_›áMQ&¼G·Ù0 ‡Ã‘³gï{~øâ³ÿˆ]鉳œîG öi'¶ÒÛÑãN©= wycct½ÑCÔãŸ=þ%H’°r¥í—¿D••í h7ß ››£ 0Ñà !4M¬ªJï{÷OéW6b¿ü0 ÚV Ç=.§K\îr`»ìo÷ 8q®€Üc8Ž=1ŸêøtySzÞ’“Ou±Oþê-ìþç)G6…BÊ7œ7Ýd»ûn®è¨ò?Bhñ^€®ëÑ‹qˆ`ôSñÕŸÒ®Ÿ Òù(!¦Ø Ñt]ë|-ŒNÍq@’„! IãÔØ(æä«V‰_,C••¨µ vér ;ÚøñPÃá°,IÈç‹<ø NK£W@ÃÀ‰‰ÄíŠÂâ>s–²T‹,Ë4Ýû\oá…€Ô¾}Bº¦ ß`22¦+Qm0{¶þÿ'<ñ¤õ‰'‰Ý¡üâR ¸ïé¼ù(f3Ça^ÀOºžN܀Ђ*+B\M¸t)wämƒâÊʸ}û!Àb ‰`Ú•úäI$.` €A06 ’Ê/Ìf·Ú°ªÆvçBMcqŸ9'zýÂãeÇ[ÛZͯœÀ–9•SµB0ßÄØ˜9ÃÕÜ4èw¿·=þ8.++þÉuŽCÁ ¡¿#O7VÒK{‹•ˆBE€„XZ[íuõöº:Kk[¯¢-òÇËo¿ 4-6é  |ÕèQmW\®OŸŽÏY>iæNB`$öæpµ75NŒ(Ý1YÜgΉ“B?„P×õäÄd§ÃyFkU3ÌW!„(*ÿ£ãìOúµ´ŽƒóáˆhšâWä8Óv¿ß2„8ÚÕW&ÐÖ"C’€ßoxk(Ô1"×ÄÀ8ùjI¶«â‹O-VüµÛÉ0gËIݼwAȱiÇ™s`lØl¨¤Äþ›ßË–ôtÆ!FV–™–ÖóÕ7„À0Œ¡C±c¡aÓŒN11ætb 8îk“2 !ì74s>è9Ã'öás½…Lï!$˜&°Z!ò‹/Zž}*J—V—o¾4zñ®Þ~»zûíæÀÐ4 „ô×ů ßá0 …z˜Âoº)U…3½FB°ÐÏ0 Ó#!ÏñàlMpcš&€çÏlL&„ðˆ,ô3 Ãt!4 £²¾RÓTpæÃ?Çq‰ ‰€ÚºZz8C!ñqñ!ú†aº‚V×V[-–¾))ã3ü @CÁÊêJ@@B|œÃî8Ck„š¦Y×PßÒÚÂB?Ã0LWcC×ûdfž…uB’IUÕ5”¤dEUÏÐ<Ê„žç1Æùy,ô3 ÃôBŒñYX!ÄÄB41ÆŸ¹Ð1&€È’;†azrÖ ˜œÍBú†azÒ-G/Æ!„_qaÞý!ò ²6éU—å „BBš‘ù-ô´^Y†Ã0Ì)œˆ1Æ„Žã@g"&BˆÖh¬§š¦Ù¯;ÃnôU±ÉûÝΓ´išº®BDQây޶>B¢ é~#ºPº „Çq†at?±«~†a˜D£%!DĪšêüžãyž/)=^|¬D%ŽãDAŒFyADQÜð@ E‘–Bä9>·ÛeI¢ašÞßÓêNœBDQ1>aܘñé©é·gì¨Ñ¢(Æžc »êg†éQl&„H¢Ôh …CŠª457ɲ @@LÃB@/ùMljº¾wÿ>Žãì6Æ›†¢*º¦@žwØìó†f¤÷×uýDÖP· 01NKM½ìâK5Mm ´ ¢ ¢Ûå;j´Çãõx<ã‚”ä„(Šn—kÌÈQ qñš®C16LljšŽDNúm`ݼ Ã0=ë ÆB]×ââýñ{öåîÚ›c±Xú¤¤˜¦YU]µmç6UÓ2úõOOM+.)ÉÝ¿Ï0 Q¬Kcc£¢*ÇÅÇÇ‚íòù}þø¸„òÊŠªšjEUD'‚2ŒéYÀóœ®é6›--5-¿0?)!Éf³•–•ÕÖÕº.‰¢×ã!€ø¼ÞÄø›µó!Ãà9Žã8Ó4½nBܾƒûO$ùÀ-[¶dggkšv†Æ1 Ã\ˆÊ+ËddDÿ¤YöªªÒôQò T]ÍHï/Ë2M¿Q5M×uIé| ÁPÐ"[8Žã§:ÆXEa("È’D{z !’$ÌË€Œ6\íœÈë¥Ù;š®ó< †ƒÇI¢›ÙISŒBá‡8šÏC@B1ƺaˆ‚@ŸÌs| ؾyË–×Ï0 Óƒ.ÄÃ0A4ÇÝÐ9Ž÷z<´E…" ‚$Šô6„Ðítc‚ !˜`šÍI²Ùlt!]VGÈI«äGGraBA Sí;ìŽØ×Æˆ}(šÝ!”E “èº:.ûYèg†éQ׆£´ 4 #%9 ªZì®ØVuŸ˜~9öþ¦êäÕq£ã¾˜£èË¿bZ¡S=÷O,‘…~†a˜®hˆ„§žÁÍ4MÛ :Gö~§uh´±c€ÏÐN! ý Ã0Ý!B‘HÄáp`Œ{쥑TønuµBEU!€EUi"æ÷ÞõÚq2 Žˆ¢ÈB?Ã0Lâ|qµuuõ gzE´"Xœ?@PZVÆóü™ºð‡Ð4 ›ÍîõxYèg†éŠ"ËrJrŸ³3etR›ÕvF×H±X,ÕUÕ,ô3 Ãô #Uæ¬d½Ç†û3ºFBˆiš„ú†aNéÌuºžÛ5²Ñ¼ Ã0½ ý Ã0½Î)|¢í\g®@p´ŽÌ÷»dLHtXD÷…GÚ}“ýŠ–¿a†ùorÊÐo·Û9iš®ªêW¼žFÒÓ ßtÎ I’°iFw¡ïg1Ƨ»p‹, < $w™²ŽÂó¼E–UMÓ4ý«£:²ãìôï3 ÜM=„~Zxë¶íÍ--23RûöÅ„DgŠÎ+DŸÉó¼(ŠÁ`æ¢ÒûcËWÒîjzzˆN7!‰âñÒÒü‚¸8ÿAƒ$I²Z­Š¢ÐåG޲ÙlÁ`ÖÀ¤çÓ4i}ƒèºè „!€ãPqIICc#ÆX¥ÁƒF‹!Эm vîÎIOMÓuV=Ƙ]Á„piš¦ëºÕjÝ3x/ºG Ã0îî»ïNLLŒ­,IÒÿ÷¯»v‡Ãá‚Ç'Œçr:MÓ4MÓf³ÑHîv¹d‹…çùÚººÝ{öŽ5RQ„Ûí–%IÕ4„Óá°Z­¢ ˆ¢hwØéäG„«Õº'7÷Õ×ßàyaWNNß>}23úñå—©}ûº\.Œ±Ûí¶È2„PÓ´5ëÖg!D "„1v8†að<ïv¹dYVUÕfµJ’¤ª*„Àb±üöɧöí?ÐÔÜ\Y]=2{Dœß/˲E–1!„¼ðbCCCœß—––æt8xAPUÕb‘mV›ÍfÓuÝb±8ív›ÍºoÿÍÛ¶_|Ñ‹,[m6žçéü¦.§Ój³I’Dwç\¿ƒ Ã0§ã¸ºººî¥¡iš;ví~ð¾{gθ2 ªªºrõêÇÇÇÅíÚãóyãüqK>ÿXQ”™WÍXøé¢ ›·455]9m*!äㅟج֫g^ ‡×oÜT[[ëõz<ÏÁCyÓ¦LÎìß?¢(²,ï;pÐa·ÿþñ_«ªjÆÖíÛç¾ñæ¾o¼îZ«Õúî®™}õ®œ=óÞü¿ŠÊÊÙ³fVUWÇùã’“׬]7n옶@`݆6«õWÏÚ¶s§®ë—Oœ …Æ»ýGwÜ~ÉE©ªÚÐиìË/›š[E¹ù†V¯]»ÿÀ¡[nº!£ÆñÒÒ­ÛwôMI™tÅey…mÀ•S§æîß¿goîø±c½^OF¿~ùEÅ%UÕÕ33'^z ÆxÑÒ¥ÍÍ-~Ÿï¢ñãœN'kbæ‚ÓµcÂqÜ]wÞñÎ{ïÿïo—_Pèv»ÖmظfÝzçÿù몪¾8gÎÁ¼<ŸÏ×ÖÖ&Š¢$Š4üÍ™÷º®éGŠŠ>øh~$™3ožËå\´äó5ë6ȲüÒœ¹šnð<lo¿zæU€»î¹÷“Å‹@Y’éƒA—ˇ_zu®nV«Õ4MQ~º¨°°òöûT×Ôþé¯O·ƒ¢(†qüxéÑ¢bQ!AMÓ^xyÎÝ<8gÞëÁPðåW_xþÀÁƒΟïõz—%ùÈѣϽø2!dñҥ˖¯Øµ{÷ûÿž/‰Òº ?^°Ðçõ"„ŠŠK6nÞ²eÛöO/NJLœ÷ÿ¬ª®^´d鎻¼Ï?ß~§¶®ŽÎ¤z®ßD†a˜ÓÓ5ô#E¹þÚkÞ˜;gìèÑyæïºåÆæåíÜã÷yGÌ;z´ªj­m­i©©cFÌÌȸû'wµ´¶ÊËok455—•W`‚û÷ëwÇm·5jÄð¡wÝy‡aápˆçyM×û¤¤Ì}ù¥ÿyàþ›·¾øÊ«/¹¸OŸ”ßqÇÈìl¯Ç Q¥±±iXÖ´ÔÔŸÝ_jß¾²,ÛìvQ<·Õb™tÅeUUU‚(BîúÑÞwok[mÖçáÖ›o|âñÇo¹ñ]7dfüèŽÛgÏšYßÐ0|ذä䤟üøÎ¼‚‚Áƒ>pï=Ü{Ϻ  Ü>uÊí·Þ²wß¾¯»îžŸþäòË&"m6«(WLœxëÍ7efô?z´hÏÞ½ÿìÁ[o¾ià€,è3 sê9ÃgñÒ¥ñþ¸‘Ù#.ZTSS;uÊäù ¾òÚk·Ý|³ªjÙ#†šõøO†VYUUXxX–d·Ë5 #ãê3ìv{$ …ÂáP( ‡Ã‘@  k:c,IÒƒ‡ªª«ÇÛ?=­®¾Þ0H8²;''1!þí÷Þ7Lcʤ+ò t]ommݹk÷EãdžQ^^^“Ñ¿¾¾AQÕ+§NÍ2ä·O<éq¹}>o[[`ô¨‘E*Šbš&BÐ4 USƒ¡p{  …LG"‘öö`kkkZjêÒ/¾8~¼tÓ–­©}ûBÛ@œß¿uûö¡YC$I2M3QTM …ÀP8l±ZívûŠU«%IjkkûÞÓR†aÎŽ®Ý¼´ åâ%Ÿ¯^³vçîÝWϼjêäÉ‚ ´´4¯Û¸é7= !\ðɧ«×®MNJš1}ZFÿ~E%%»÷ì™2éŠä¤¤Õk׿8ö”ää²²òË&^ZZVç÷§§¥-.¾hÂxç9ŽËÝ¿Á§‹6oÙj±È?{à~»ÍÎóüò+S’“3ú÷Û“›[S[ï›6e²ªi«Ö¬1|hß>}—,ûâðÑ£n·kTvöü wçìÍ<øÚÎþrÕê²òò‰—^ ‡AÈ+(س'wÇîÝGŠŠ Èljn¾ø¢ MMM†nd \V^6n̘™™mmmK>ÿBø³ûï«­«³Z­Ã²²ÒSSwåä,_¹Jà¿ß§ªªßç³Z,Ç;”ŸŸ5xðÄK/Y²tÙžÜÜêšš©“'ù¼Þè¡c†9ÿÑnÞžkóZ­%¢ Ž! 9Î¥Ÿ/;—÷äïCχÂa«ÕŠ2 ƒ^ ëº.I’i˜š® ‚@«PªªJ[ÃéÓ4M£ã$I‚¨ªfµZiO¯$I4¥G„H$Â!d±X¢SWkšF— /„#§ÃaÇqÂhAKI’¢©ŸcATUå8Žã®ÑåX,C×y×T "D×Îó<ÝežçiÞ'M*Õ4M–%]×âœNgUUÕcÿöÏO>‘’œÌÊ3 s¡ ……8ÐsƒO0Fš†N㚪ª«×­»áÚk€„Ý0dY6 ! ‡Ã4ã>‰ÐäwZý=Q‚š¦Ñ§E"ÚBBHoƒAúÚè=4LBá0B(Q ±‘= ÑåXd™ÞIí£ñWQ”èŽ@#Š‚ 4 Ã0NÚŒP(!Tu:—`Í¥§«Øå„ËŲgoîæ­[ë겇ONJbqŸa˜ QÏ¡ŸVð‚BÔÓ|ç33Ãáp´„|4äE›¼£7èC éö´ïŒÞÓå!º_݆.Á·ËŸö¼ç¡“w<¶Æq—åpgF¿~éôͰ¬,ÖÔÃ0Ìêë'm¦“Œ9’6לë >—0Æn—ëÒK.&„„Ãás½9 Ã0ߺU‘ïQ´Uç\oð9¦ëz´ ‹ †a.,ÑhÏ#„DQg« Ã0 s®Ðn^„ßÔÔ”››Ëf#`†é BMMMÿÑÍ8D¥œ=%tEXtdate:create2013-09-27T12:33:07-04:00§Ä%tEXtdate:modify2013-09-27T12:33:07-04:00ÖÀ|§tEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/system_relabel.txt000066400000000000000000000006171330160122500245470ustar00rootroot00000000000000SELinux is a labeling system. Sometimes the labels on disk can get messed up. One way to fix this is to trigger a full relabel on the next boot. You can toggle this behavior using this screen. Note: Sometimes a simple restorecon is all you need to fix the labels on a file or directory. If you add a new disk which does not have labels you could simply execute # restorecon -R -v PATHTODISK selinux-python-2.8/sepolicy/sepolicy/help/transition_file.png000066400000000000000000002102231330160122500246670ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýgtœ×¹  >_ªPr ‚9'I”HeY’%Ë’³}Ú>öñé>7Ì̺k~̯þ1kÍt§owŸãÛís•œ£lYE‰¤ÅL‚ 2‰*çª/Ì @0ˆERüžµ°Tío;¿;¼û}…—_~ÙZQQñå@ ð?[,–U†aX0111111ùL B.—Ë™™ùOº®ÿB_[²dÉÿ£¡¡¡ÆjµÞîô™˜˜˜˜˜˜|²X2™Ì†‹/þ¿{{{%áĉ§V®\¹F–e ø݉3111111ù„L&ÃéÓ§OÉÀrY–Ñuýv§ËÄÄÄÄÄÄä`V«‹Å²BÖu]ÑuÝ\훘˜˜˜˜|ÆÑu]‘ àôcbbbbbbòÙFL¡obbbbbò§$ëåÒ¦ð71¹9A(ÿ]êGs?+}.Âýl±Ï>‰tÌMËbá éøèï/½gîs‹}fbbrgQêû2`nõ›˜Ü‚ Ïç‰'S躎ÍfÅa³“ËçH¦Ò€a€¢È¸â‰$‡‹¢ÍæÈ䲸NDAàf{  èºN4ž@×5AÀfµb·ÙæM,@3 É$v« USÑu§Ãñ‘Þ•H&ÉæòxÜ.dIB7 â±8¢(àr:owµ˜˜Üˆ‚súwi ¹E}Ùú&&7G,‘ào½Ë‡§Ï¢ª*]K:øîW^äÃ3gùÙ¯ÿ€E‘Ñuƒ%­Í|ó‹ÏñŸþí§|åóO³fù2 ÃàÔù>8zœøú—p9º­Pžˆ‹¢ˆ®ë‚€ÅoA/~7W?'–HðÿúÁ¿ŽFQd™†Ú¾ðäc,ko-ÑhŒ}íW<öàýŒMN …ùÆŸCDQ,æ¬ð¦Ò2÷]‚|{ï<Âw¿ú[Ö¯æâÈ8ÿü“—iiläï¿üEìvk!¥†^Ü阻»`”?»¦ð¡˜C0t£øn0ÐõË“ÌÝƧ¦ Gctv´ÐÝÛO¥¯‚úšê«>3o«ßì@&& Q9ß7Àç…§§¥¡žL6‹ÕªNgp:ì|ÿ_Áª(X­VA KÏç ÂOש­°yÝj †.¢:¹|žšÊJEfj6HCM ñd’t&S~w]u5#£ØmVª++EMÓ‰%<ÿÄ£´4ÔóêþÌÞÃGikndbj†T:Mm  ]׉'’äóy–¶¶PW@É$ãS3XM×i®¯C.Oàózðy<†@*f&f÷YÒÚÌžqil‚êªJ4]glbŠp4†Óá ¶ºŠÙP˜|^%›Ëáóz¨òû˜œ™%R S_S ŒON‘ÍåE‘@¥«ÅÂèÄ$²T˜ÈÄ“INŸïAÓtªü>Vt.A–¤ÛÝLL>uA`r6ÈŸßÙÃý›Ö{åÙÇvQ_S}M™n†)øMLnC× øýÔTUrªû<†®³~Õ AA OðÎÞ%‘UË–²bé’ÒBµÜ߆GÆxïàaëjù·×$‰d²YjkÙºn5xû]þé[_ãÈ©3 ^aíŠ.Þ?t„í×óÁ‡ÇyþñG¨®¬,ÆWˆóÄÙn/Éfiª¯cï¡£¼ø(²$a·Ùxr×QÀ0àôùf‚aÚšxío05Äåtà¯ðÒ;4Ìw¾üE¬ŠÂ~ñ¾öÜ3ø¼^ Ã@×uº–´‘H¥øåorqtŒÕË—! "š®±çàa†Gƈ'“"11¹[1 ƒK;˜šåwo¾ÀÓîdÕ²Îknõ—tqÊgü&&&7Žf´4Öó?~û›œ:ãgÎqàØ ¾ûÕ—(l[;v$IÂj±PÌBqK½0áÖQ5­ü÷#ÜÛéäW~“é`ŒËU7 6¯]Í¥ñq^þÝùüc³når.+ç&xÜn¾üìçh¨­á¿¿ò ¶oXǶ kù矾ÊÑ“gÊ[ﺮ£é:çûŸä¿ñj««Èçóüàç¯sêÜyv;^·›¶æ&4M+?5UU,ëhãÕßÿ™'wî@FÆ'Á0hon&¯jœê>Ï©ó0 µË—±}ÓzþÛ˯silœŽ–&òªÊlwûCÕ4vlÙȆÕ+ùá«¿dtb’ãg»iª¯#•JóÁ‡Ç©®ªÄãrñõ/Ú››†#äryþõõ_£ë:ÍM|õ¹§ñy=ìþàï<‚ÃncýÊø*¼È’D…×EQ$¯ÇMs}«»:yëýýX­Vª+ýœ>t&Ë÷¿ñÞÞw€ãgϳ}ÃÚ²¢\eE¢ Ëç Úúv;ŸÛõo¾¿¿¾Í²Ž6¾oÉTš“Ý=xÝ.<.ËÚ[Ù¾qo¾·‹báÑÛY¾´¿¾g%™Lѵ¤½<¹Ð ·Ó"ËØ¬V/ëÄÐuìv—·ËE]u5S33h†A¥ßP¼a^·›*¿ïr˜¢.Áº•Ëy{ß.^b6¦¾&€Ï³Ã'O‘ÎdpØmØmV|^Oy×Á·LîUt ºª’çžx”®¢r_•ÏG•ÏwC}C8pà€±jÕª+˜\Ý0Èåód2Y, [A‰/¯ªäòj1TAߪ(dsùâL¼ Õ.Kºn (2ù¼Š,KžW ƒl>$Š”4⬠™l°¯†A6—GQäbøBq" j6‹QÉ«*ªª•' ¥°²Ng³@!NUÓøÁÏ^£Òïã_xv^¾ y3Ê×òª†aèX…l>O:Áb± K…´ˆ‚ˆ$‰äò*Š,¡j©r‰l6K^U™˜äú+ßzáó,_ÚA,‘$›Ë' 95EQ 7LLîaA@´Enß\ë™sçΙ[ý&&7‹Ø,l pÙ†,ŠÈ¶ù.® ÃÀfµ,aX-J¹–þDû"®²u]Çj¹,ðKج–+:¾a(Åmó’b^i«|n ü.AèºÈøÔ4Oíz°l' Di¢0÷=Š,R!/ŠRž\-ŸE)O Ãགྷ'9qî<º®³jÙRZ0Š» §£T†Ëu7“{Ã0˜«Æ§iÚ ?WÞêÿ$-ˆ™˜Ü+,ÖgŒÂ7v±ïæ+ì× ½ø~~½p‚ `³Yyî‰Gii¬g¡¯ë½ûFò¹0ÌÖõkiknÄ¢X¨¯ wCôk¾ÇÄÄäæ0ô˜˜˜ÌÃ0 šêjii¸Rèß*<.'nWÙò˜9™˜|ò\aÀÇìh&&&s¹Ñ­ÃO‚…Û–&&&·ÓV¿‰‰‰‰‰É=BÙ€$Iæù¾‰‰‰‰‰É=@yÅobr'aNB?[|–® ›mÓä³€ éíïã™ËÄäö éþ ?’$‘J§nwr®‰(ˆ8Nœ'±xŒt&}Kß)Ë2^·€h<Šªª3Æ[‹ÅbÁëñ’Íf †‚äò¹Û¤›FEü~|¾ÏÔDÆäÞDN$t¸;¨¨¨0g³&· AˆD"ŒOŽÓ¹´“šêʾhïD„Âê/ 261FMu µ5µ·.ÍäóyÆ'ƨ«­Ãb±ÜÑå“N§™˜œ  ‡Éæ²%¯»wFAð‡Ãa–-]†×ã5ÇJ“»Y@Àb±`·ÚÑ S¯Öäö ")KŠl6‹ÇåA–ïüS(Ap:œ ±´cé-O³E± ú¸œ®OUëþfð¸=ôôŽ„Ñtí®¨Ók‘J¥Èd2x=ÞÛ“E¹'wìÒÁä^ Ôþæ^/½ÓWUsMd~i.)áÞ-åSJ£€€$J?ÂÛŒ©mr§ ë:ª¦bè Ÿ²$¤ãú»{ nò™£4¸^˧ôBÁ[ݧ“æ’uM‚ ]]×ïØófÃ0 ÛúŸ)ý¡;µ¼Mî’ÉÉT¼àR/øþE —˃Ë麡8LÁorÇq·þ¹+ÀO#Íåwqw¬ú ƒRAð›ÓÄäãOÄHgRÈŠ»,#Ë C#›ÍÜw»]žëÆsMÁ/BÁæG4¡Yšá—V$up* wò frëX(ÔA@šãT¦tÎ}#ˆEtÚ-Ê¢ –·²uCG0„«¦ynº™>UŠsn|s'’(‚ ”Ïý Â4íÖNF$Q,›Ù½2Á…Ý Q‘D ƒBY†Q8Ú1æ‡ûØŠ·Ly°TÇ&&· MSI¥H²Œ¡gñU°ZhZ–x<ÄâQvç¼±g1®*øA søÈQV®XN}]Ý T‚ ÐÓÛ‹$J44Ô355EC}ýu{J“Q‰D£Äã êëÌ•Â]LÉíë\¡p#®#箞A`6dÿP5 —ÓÉúuk TUÝÐûGÆÆ˜™eõÊ•Ÿø–³Ž^`ÂâiÞ÷Á4UÅ–u.-§ybb’ÚÚjkjnø]†Qpï[–¥÷•ÊøØ‰“$’I¶mÙŒ,Ë _¼H0bíêÕWô!Ã0Ð £<)ú8;q¿ßGScãï(Å-Š"bÑ=/8N*¼…ï…ÂÎ@"‘ Ý´®‘(ˆ82™Lyòc``·Ù1 ƒL6ó±ë[ÐͱÈäö¡i:ª¦ƒ¦¦2‹]‘ÑT EÔðÚèy‰¤Ž¦k×üW A ûüyþÛ¿þ{÷ï¿ü@qÛ®4h”„õÜßÇOœäôÙ³$“INŸ9K.Ÿ/øs™{Fùöîw9×}Y–˜™™¥çÂ…ò`'Ì æ “¹ŸÍýmrg033Ë¥‘ÑyŸŒŽ ¯ù\i5[¤ãã¼ûÞû8FÇÆøõoG:¾BÑ­´Š¾¬TƒCìÝ·UÕÊaJáJ«ªzy2Rü¼ôÙܰsŸ™„×¼4OLðö;»°Z,H¢ÄÐð0ƒCìÙ»—¡á‹…ç £¼ƒ17ý ßWþ¬(ç~†a°ÿÀþÓý¯œ<}Qéííãý½ûÊqÏÝ%™™åW¿ù-‰dòŠ÷Í{±2½®ðÿž½{ééí-÷ɹé»Ã!IRáG–H¦’\¼xMÕP$…‹/Ž„Dár8IB–åËÿ‹‹|&IÈRáÿÒ®‚$I444àt: QD.77®ëŹðG”Ì# “Û‡( †Ž *äó ÔÜV9z]Ï!ˆÖr{¿W]†«ªÊé³gypÇ  ÅÐ5·v¿K6“A’e}xétš"—Íâóùxô‘‡‘œéås9Þ=z”ó=hlh`Çý÷ñΞ÷˜˜œ¤±¾žö¶6þðç?ãq»™ ©«« ™JqðÐaÆÆÇilhà¾íÛØ÷Á¦¦¦ˆÅã,[º”=ÈÉ“§8}ö,^‡Ç}Ä´Ip æ7ÿÆø‡ï±vÍjN>Ã~øCžöYž|ü±ëº‡-»‹ÆÀívÓÜÜD<g*“A††/rðð!òù<×o kY'Ýç{8qꊢ°ãþû iEÀà|Ï>8xEQxø¡‡¨¬ôóç¿þ•ÉÉ)êêêØ¹cï¾ÿ>©TŠX<ζ-[X½j%û?8ÀÐð0 <¼s'Ö¢ß{AÊçØº¡#"ÎsqíóU°fõ*^/§ÏD WÈd2¼·wƒÃô45±ë¡ C¼¿©t†m›7³rÅòyÇ¥rY¸ÕoµZYÒÞÎßÞz‡Öæf±xÄ¡i=vŒS§Ïúç®ìy/üóLNM±ãþû¸xñ»v>D,cÏ{ïóÂóÏ35=MoÛ·nå𑣌OLÐP_Ï}Û¶²ÿàAfgf±ÙídÒ…º8uú4ƒÃÃ<þÈ#X­Öyu'Š"²$Ï+3ÝÐIgÒˆ’ˆnè8lš›Ð4T*…ÕjE–et]' ¨ `’$OĉÇãø|>Y!—Ï GÐ4 ¯ÇKmM-N»“™Ù²Ù,»ŸÏ‡(Šd2b±555W3—# Åc;ûú¤ÉgYV°Zmäó9Âñ&Æ'¨ôgH§óø«ÉætlV’|ý4Ò‹/½øëëë±ÛíåA`zzš÷öîã©'çÌÙnêjk%‘ßýñlß¶•P(̹în$IâÈÑc<¸ã~Îuw …P5YVðù|¼õÎndYæø‰“<¼k'Mx+¼†N ª’÷öî£Òï'™JÑÞÞÆ}[·02:Ʃӧ …# ³mëŽýd2Iw÷y<«V®äoo¿C{[+¿øÍoinjdù².*+ýÃ&&·Aðûýœïéáw÷Íåxõ¿¤¾®ŽçŸ}‡ÃqEøt&M(¢¶ºöòª]˜™™áw÷‹ÅEšøõïO}]=5ÕÞzg7«•¿¾õkÖ¬F×tö8ˆÇã&‰ÐÑÞÎ˯½NC}=±XŒ ½½¬]³MÓ¨¬¬dï¾}X­V=ʪ+ðz½8tˆÚš~ùëß°aý:šñù}óôVòjžp8LUeÕi~óíwŸ˜àü… TUUÑs¡—`0D:¦±±É©)vïyŸõk×°ÿÀ**¼œ9{–¾ؾŸÏ‡Çížo4Àëñ–·´AàÄÉS,éèÀbµÐ×?€Ãf'¨ðË_ÿ–U+Wr¾§‡d*EsSCCÃ<þè#´45ñþþ°Z, _ä·ø#Ë—-ãä©SèšÎøÄýƒƒlݼ‰£~H"‘ä\÷yEaãúõ 191Iÿà ›7m¤ººæ¤7 ¢ë:Š¢”Wà²,c³Ùp:Øl64MÃn³ã÷ù¹Ð{D"A8f68K}]=‚ àõxéè'ÒÔØD>Ÿ§ª²Š¾>"‘v›¶Ö6Æ'ƱZ¬  ÇijjÂn·ãõz™edd„úúzDI¤ÂSqÍ8­Vky7¡´cérºp:·»{™Ü£(²L<G’dÒYѤ‚(ÎúSé$^Yºú±º ÌÎÎ.¾Õ/çÎ÷02:Æ_Þü“S“?yMÓ¨ðzY·f ìÚÉäÔñD’ÚÚ¶lÚĶ­[&—Ë—DQdøâEY·f ím¨ªJooçºÏ“L&E‘J¿Ÿ–¦fš››‘$Ý0¾ÈêU«Ø¶e Ë—w18<Œ,K,éhgù²N¬V+ÅÂÓO>ÉÄÄ!•¾µfSMn Ã0¨ø§ü>-ÍMüäç/ÓÒÜÄ?ýã÷ ×Ü‘Y¸®i:ÍMM|ëë_ãÿü?ý`¼·w/©TŠí[6³mËDIäø‰Øm6¶nÞĶ-›‰D#D"A 311É¥K—ˆ'ØlvR©½}}tŸ?O2•"‹á´;XÒÑÁÒŽv4M§²ÒÏ#»vræÜ9N9C.›½"}¥sê…inmiæÛßú&ßýwG{k+ÆeW]7#ÑÛׇÍf¶mÝB}]ïíÝÇÄ䚦-º…¾ØQ€(‰<ùØcŒóáñãLNN23;ËÀÀE¡ºª ¯×Cç’%V,ïâè‡ÇfÇ÷sèÈ.޲byÃ/²rùr6oÜȲe #IË»–ÑÕÙ‰( œ>{§ÓÉ’övŒE¶úçm³Ïù)ŒbY ŸÏc³ÙðVxiii¡®¶®|V©iv‡‡Ã(ˆ$SIzûzi¬o¤£½Å¢ :6» ÝÐñz½¸Ü®rÝ(²‚®ë8]N4MC‘•ëÆi±X®H³‰ÉíÄb±âvyˆ'膊Å"“Î$™ NcµÚnxÑ{…àHg2œA4ãàá#d³Yëëyx×N*¼LNNâ÷û©¯«c˦ØlvÎ÷\@×uVt-Ã0 FÇÆinjbåŠåt.YÊl0„Ýn§¦¦Ði·oÛŠ Œ±zÕ*¶nÞ„a@cC^Ahh¨§çB/Ã/²nÍ6nX¢(·»~LІÃa§µ¥›ÍvÕ•þÜ­þêªêyÏë†N2™"O ;î¿®ÎNZšš™œž&—Íñð·XÒÑA]m ££cØm6}xÕáH§ËÉ–ºx‘‰ÉI*¼^ÚZ[PUѱqšéì\Н¢‚æÆ&¬+V«•J¿ŸSgÎ ‡¹oëV–t´Ïë\ª¦‹Åðù|óÓ¬ëØl6ššçø …mþÉ)Ö­]ƒßçãB_?étšúºZBÁ§ÎœÁívóÐŽTx½å8A ‘L`n—{ÞD@Ó4jª«ñûýTúýå¾·bÅr*}>úú…BTÔÖÖâp8˜¥¾®¿ß‡ÍngÕŠå´¶4cµYY³zµ55Ô×ÕeÅ•+W°qý: ¾®¯»0YZº¤ƒÕ+W295E}m-Š¢”ÓŠ„«ÅZÐ;(þH¢D<'‘H`±XÈçóƒA$Y"›É ±ÙlD"Òé4‘h]Ó ‡Â¨šŠ®é¢ÀÄÄDá]Ắ ‡ 7tƒd2I*“"‹âJü(…HäqŽO ÉЬ ˆ…KC7°Ûí8æV¿Éí¡tÛnb|œö¶4M%œ R_×€ÓéâZ³°c,Œ¯ôý\×¢‹¹]øÜÜÿË÷u‹qÝéNKLn ÝЯ˜´^­n~þQ­ç]+|)[ŠF]„Å㹑´}”6+»7Æ“‚…q_ë»Å>Ëåô9ç®öjq/šãòu¾…cBɼ¨aÈV«ÕZ®w¿ßÕr°Z­ó’1ÀRqù|Óépη `€Ïç+*ª¨¨¸nœ¥8 9óŒßävSX,¤SiþöÖ›D¢4M¥Âë-."nlBzÃ&{ à¾®Ž¿ÿö¿Ãj±”gùkW¯fåŠw½ç-“;‡Ò¹;¹Â÷VÛÍŸ{=®ô¾;ÞV‘Ò=ú»óŒßäv£ë:ЬP]]Ëñ'™šž¡¶¦š¶–%ÈEÖ>’´E[qf\ÂÔv5ù¤¹ìôÕ¶úoõöïÕŒìÜ©”·ü%I–îè´^¡`}ðΜg™Ü#‚€ÇãaÅòt-ëšw¼izç3¹k‘e¹`Bºó›fiÅoµXQUõ–ïz•ÎÔ1(k»ßɨªZИ ÖÄñÎNïõîŠviòÙ§$èoÖU´lPPØÑ4ÍtBarÛMÓð¸=¨ªJú.±Ç`µZi¨o ‹‘ÎÜÚ4 ‚€¯ÂFAùífíÚZˆ¢HM †l.K2™¼ëWËŠ¢àr¹îê “Ï7Ûe›ÍÆlp–p4|£z&&Ÿ<¨y•@U€ªÊªE=ïDJ–ÝvÇ-W.{»án@%¥>—á*Üù¿³“{]J7!LLîväš@ ·¬SšÅäFXhþn±Å0לæR9Ý-Ê´åëÀòÝQŸ7’“»Š~ÅoäOgÒÄâ14U»ë·ùLn-6« ¯Ç[V½ÙO3Íw[ùÜmé51ù,sË– ¹\ŽééisÅorCD2òù<5Õ7î£ÞÄÄÄÄä£sK¿ d³YdYžçhÃÄäjd³Y&¦&æYÓ31111ùä¹e+~Ã0°Z­WµÏ.bñzÁ]ruÛäñQ˜˜˜˜Ü·NCH`žðy_ O«ŒÌdHe5¼™Æ€»EÄ< ¼7Á<2111ù¸åªÁ‹ æFbüíÐáÙ4¢ ¨rá8xpu%µ~ûM¼Åän§änÒÄÄÄÄäÖRü†aÏçÑô‚ÏpI’Êדæ{éoØThiwÙ[—ÀÅ©8?ÿS“}ã¨é!Üö,“½v:–¯ã/‰/îjÅë´šZÀ÷‚ ˜7?LLLL>Ê‚?óŸÿåE2Ë:—²jÅJfƒ³Äbq¬V+;ÜÁèè••þòÙý\á>÷QÑ}Þ®aÀûGG¸Ø3N…2ÉK_ßÂêU]œéîç¿>J µšõÞÔlžùßc†a®øMLLL>d(¬¶òªJ*•âË/½H}]ÅB4EQ,„Âaìv;ÓÓ3üè§?cçC²ní\N'³³³Ä N‡ƒH$B.Ÿ'‹QYYp­Yüª¦s¡Š|"Á–GÙ´qn·—õkDîåÒX˜þ‹.ÙÜ‚yÜ{oa®øMLLL>Ê+~AHg2|xì8¬\ÞE2™âÌÙ³X­VDQ¤§¯—ó½½äò9ìvn·›7þò&²,ár¹øâžç•×A0¦¦:ÀK/|QËG¢( kYtÝ@±Ø°ÙlȲ„"ÛI¥T -_0($˜Kþ{‰»Ý‹‰‰‰ÉÝÂ<å>A°Z­ØívdY!—Ï‘L&±Z-`¬[³†Î%Kxáùϳ¢«‹ÿìçÄâ1:—.åƒÙ¾m+ªª²uÓ&Ö¯[S¶m]Zñ˲ÄÊ%•œ91ɉ3iV¯œ ±ÁϹó£ô é¤Õ MÕ6Q@0LAp/!¦rŸ‰‰‰É§Á<å>ÛÍÃ;¢¹±˜ž™AÀ0 —/¬ÄEQ£^UUìv;ª*žÿü³ªª·Û…Ãá@×u. ~QxâÁ?3ʹsAþ?8AÀïbt2B8‘Àn»Hï‰YÂ;¨¨¨0üî!Ì­~“O‡²ÅA•Â<@/*ꉢˆ"+TUVrôØ1.ôõÒÒÜÌßxƒó=ؾm+š¦qid„D"(ˆÈ²„ 4ÿaŽv?P_íãÿò½‡Ù¹«ž´ãÜðE,î<ª)¤t}=§ùåë¯ÎS4î‘Sò›˜˜˜Ür„]]]äU•ÙÙY*ýþò5¾d2I:Áî°séÒ55ÕX,¦§§©¬¬Äãv399Ål0ˆ×ë¡®¶–H4ŠÓá@Ó5A ¡¾áŠ•» ¤³9&g¢d²yÜNz.ÉO~ô¯¼ÿÞ;466ó¯?þÙ]ãÌäã£ë:ýƒýTWU›üLLLLn‚ ÐÓÓsYð—Vøúœ{tsï̽?÷úÞÜAZ×uDAA ‹"Šâ¢‚¿DÉd/ D":ˆÇãaëÖm¦%·{]×éè'P0¿‰‰‰É- $øç-©õ—çç ì«ý½ðÝ0ʶ×3Ã:w>`è:^¯—§žúÜ¢ñš|¶1ÏøMLLL>né^úG±¿~ÙÈ1ï“{ÓV¿‰‰‰É§Ã-ü’$¡ªjYIÏÄäZär¹y7@LLLLLn ·Dð†Íj#sñÒE$IºÝù4¹ÃÉår8NS𛘘˜ÜbnÙŠ_E¼^/š¦™÷ñM®‹ÝfG’$³­˜˜˜˜Übnù}9óJžÉ a` }“O[.•ÍÁÜÄÄÄÄÄäÎÁ\Ž›˜˜|f1o‰Þ;Ì¿"nruLÁobbò™Ä0 ”Ò‰¦utS"|¦—M¤Ê)a:ú¼>×ü¦–µÉ§yíÓä“DàÃKYþ|>K0#¡êæÊÿ³Ž×ªñùå¶¶X1§y׿š‚_Ó4’©$Ùlöv§Óä3Š Øl6¬+ÉT’|>»“dò@–tÔúxÈo3¥þgB‰GF¢lh² ›ËþkrMÁ?15A>ŸÇáp˜žÓLn ª¦™ŠÏçq:ج¶Û$“»ƒ©p YWxi­¿S2Ï~ïrªÄöDÈ«²Å”W×⪂_UUR© u X,–ÛN“Ï0¢ Ž„© Ô˜zL>6¢rTzT¬rÑ7¸¹ùû™G|‰XFÇaÍÉÞ5XTð ‚@6—EQ$I2æ˜Ür‚ ˜mÍäã#@V3pÛ¬ra"iê|ö‘D¨°‹$²²9Õ»W]^år9dI6;Ìg QoëªZÅùîžÈçóX‹ióá.æNjW‚ Éi8,ÙÜAºUˆ¢XpÃ~›$iÞX" àuH$³š)·®ÃU·ús¹\ÁƾÆ"s'MÓÐuEQnøe†a ªêŸ'ÉP[SC,czz]7P¥\‹Æ™*ÄYpgƒ!9ºµkH$“ÌóeµZ CsêÎ[îÓ3ÅwY,–Ëõuµ+MÓ‹äh©õâu\VLE‘ÑÑ1Îuwóýïý=Ü·¶¶6â‰8¢ pêÌêjkiin& qqd ,€ යšµ«WÓ?8ÈÊåËùòK/â«ð‰D †BèšÆäÔ““ÈÅ݃©éi¦¦¦ ƒ¸œNDQdzf†±ñq@BááH„Ÿ½ò*ÕjÜn7¡PŸ·—ÛÅäÄ‘H›ÍŠ®ë׌AÀ>GhîÝ·ŸæÆ&¾ùõ¯±~ÝZü>ÁPˆp8B*Æj±055M$)Ç?95Ÿıx‚t&Í¥‘, ÖâXR*Ïææ&:D2™@%TMã_ôc¦gf©­©¡`ýô§ÔTð¸Ý$S©B‡±( ‹…l6Ëàð0.ôrìÄ îÛ¶ §Ó9O`9{ŽûÉO¨®®Æãöàp8èhoÃår ΩLG’Ôûl·õâN¥$øÝ;.m·¶tæ"Š"Ã/ât8xðþû8uú4kW¯bïþ8uæLyÿÂçŸå­Ý» ‡# @ee%íÚUœÙëô ±XŒÂår±eãFEaßH$ÔT× ŠƒC¼óî»<õÄãœ=צitŸï¡çB/‚uuu¬]½ŠŸ¾ü* õ̃lݼ™Gví, >‡ÝŽÇíFUUjª\¼4Âüª–w-cbr’X,N"™ä™§žäo¼Ëé$•NÓÔÐÀ®ñËßü«ÅBmM Û·måø©STx½ ¡ª»±â`›H$9pè²,c·Ùxôá]¼òú/®gMM =ò0ö9kl|œ÷öíÃf³²uóf~÷Ç?Ghin¢®¶–ÓgÎ"ÉR9þ—_ûn·‹h4†Å¢àv¹I¦’üÝ7¾ŽßçÃ0 –vt Š"ƒCCôõ÷#PüŸ|üQº{zˆD¢Tx½x<úËùšœš*ׯ ¼ô…çæÐá#8‚¡`ÌóÆ(Š"ýƒåxl6ë×® G‚P8ß7 çIóÚZ¡ ‡Ã<óÔœ9×ÍÎwÐÛ×ÇŸÞø+UU•¤ÓižýÜçâäéÓ…¶'Š<ÿì3åN?99Źsçq:œ¼µ{7V‹…e,éhçÍ·ß!•J!Ë2-ÍÍ7U |é‹/”W”@€Š /‡@U™L–ÿþß~„ÕjeiG¹|žéâäìñGæø‰SÄb1‹‚$Š|ù¥yã¯o’H&©ôûÙõЃtwŸGQd.ôõ32:†ËåÂåtÒÓÛ‹Ëéb÷ž=ˆ¢ˆ¦ë<õøc¼óî{׌óÑ];©¬¬, ÑÂVl2™œ—¯æÆFêëë絯×Ã_ßz»8A×yú©'inj¼ãÚ•¦hºŽÇ>ÿ(O@ +ìwÞ݃Ãnçû¯Ÿ¼ª"W“““üôåW$‰¼ªòͯ}ƆúÂNcEx=ü~?õuuìûà^~õuZ[[X·f5Ýç{ˆ'ȲÌS?ÆôcZZZ˜ššf×Îéhkçå×^£ª²’et-ë,ŒNzûøÓ_þ—¾øÇOœÄ0 NŸ=ËÉÓ§‘¦¦F¶lÞÄþç¡õ*qv.]ÊSO<>ûüydEÂïó±uËþ·ÿý?c³ÙX¹b¢ ÇRárüÿõ_hmmadt”ê@C7p{Üüûï}›­°¨ºû¶B™«ÇŽg|¢pýû‰Gål÷y.^Áãv333[Ì×_ùÒí¼½û]fgƒ &‹ßøÚWùëßþÆ…Þ>DQ,Lºí†Á©3g ñ¼ñ¾ú¥—x쑇¯ØårZe„âN™l1ÝÁ_E5_Ê‚¿xæ2÷GUUNœŸÏ# \‘>C×9ÛÝM8!É2>>Á¥K—Èd2x=n¾òÒ‹t-[ƾˆD£—ÛžÝÎÑcÇËB6—#žˆsàÐ!–vtð­¯­›7Qáõ²~ÍZšš¾x‘JŸŽ›©ÇK#¤Óéyý£¤ÿRhwy Ãàá‡âá±fÕ*–u.Á0tÎuŸ'—ϱqÃz¾øüs„#‚¡ÑX ‡ÝÁò®eØívâ‰õõutu.eçƒ;xðûQ5•X<Îþh¨¯ç›_û*Õû>8pý8ŽB5 MÓË[ç@9_×.û^¡î–w-cßsÞU]ÅþP‹}ìNjWyUCÇi+þË[ÚEQðUTàóù°Z¬d²²Ù Ã=vœÁ!ªÕô Ð}þü¼méBÛ‚ÒÁ|^¥¦¦šï}çÛÜ·};Û·m£sÉú¸82‚Ëåâ[_ÿ;ÜAÏ…^’©$©tš–æfV­\a¤ÓiîÛ¶•®eüÃ߇ŽövR©—FF9pè0_yéE¾ÿÝïÐsáç{zp_'ÎRz…bþN~ŸÇSç¿ðùϳeÓFŽ;Æ—_úâüø=nþÝ7¿Á’öv–´wðõ¯~…‘‘Q’©T¹ izY±Eà²Âõâ4 £<É,Å3¿}¯ÁÛ@©^„r ^ž¬ÝIíJ×5ÒÙÃÎÄj± In«ÕWÆ/ÆQ»ÝŽÕfÅf³"ËWWz´Z¬X-V¥p´"KšZè E¡´kƒQ8Ú°ÛxÜnE!—ËÚ1 zY—&Í’.Öw6›EQäb<‹+ €M‘U3m4_‹+¶úrÙÜ¢÷÷EQdpxˆ ¯—¯¾ô"V«•=•{éíëÃépp®§‡D"A4å駞俾ÉÞýûé>›ÍÎÊ®åœë>ÏÛ»÷àr9ñz<Ô×Õñö»ïrúìYÖ®Y®ë$â fŠÚÐn·ÛÍïÿôgôdY¦:P…Å¢ðÆ_ßD’DZZZhkiæBooa (Ÿ»Î»îQÜÊ+åK–åâà§‘ÍæŠç¤:Š,_Vf*L“;q‚t:SÞê’‹B¶¡¾ž·ßy·Ð¨E·ËE{[+æØÉ“X kV­døâÅ«Çi-œI•Ò&Š"’(–w^4MC–d0Àjµ²eÓÆ«Æ_ÚvÖu½¬@U˜ u|9~]בdA€Æ†FNœ<ÅßÞz›‡ÜAcÃå|†ÁÉS§I$D¢Q>ÿôÓ ñλ{ðûýD¢Q4Mã7ÿÆääPáõòð· ñì~Ý0Xѵl^›Ê«ùrZçnåNMM“J§ùÚ—¿D ª’sÝçÙ³w^‡A^ÿÕ¯ …ÃìzèAúû8~òTAg£˜¶C‡°wÿ~–vt`·ÛX³z»÷¼ÇØÄK–`±(¤Ói&§§‘$›ÕzSõ(Ë2FQ€–ûP8uÝÀ(ÖaèšF^Í3 ’Îd¨¬¬,îxPÜáQˆÅ✿pD2YÔ% Q’hnnæð‘#ج6¥æ-›6±gï^~öÊ«¨ªÊ£ïbï®§¢⼜^£ØFŒùm¾¨¬:·L¶lÚÄÛï¾ËÏ^y•¼ªòäcÎW¼Ú• @6—Çãp'åóGI±Z,ó5EAªª*ùë›ã™§?GUe%=zñù*X½jåñ̽e#ËrQ¸H¥RŒ£(”ÒD I–°X¬t÷ôpðÐaR©4E)”u¥ßO¥ßÏOþ _zñ‹X,šq:ì¼ö‹_"É2]Ë:YÞÕÅ©3g®§Ëí*ßh¡lŠ7‘D«ÅŠÔÕÖ°uó¦Åã/>+ËRY¸/Tòƒ‚^F! X­E¡kY'oïÞƒÃag˦Må|}ù¥/’WUþò·¿qüäIœN'O>öù|žþèǸ]nòù<ñxœ_üê×Äãñ²ÒæÃ;¢Ò_ÉO_~™¯}åË´·µ]1—M&—W+&‹#8pÀèêêš§±;15A<Çír_ñ@2™$—Ï㫨 “É’L%ùàà!B¡0[·l¢¶ºÇÃO^~…*¿ŸåË»¨¯­Ãår2 ’H$ðx<(ŠR<ç›&•NQS]ÕbatlIq9]TTxI¥RÄâ ª*ý¤3lÅë3³Á º®SUYYÔˆSQá%›Í‘Íe©ðzç5ÒD"¦éx½òù|9¼(ŠLNM‘H$p»Ý¸œN²¹·Ã0ˆ'8¦¦¦ÈfsT•T"Ñ(·›¼ª …©ðzÊåèt: …Ãd2Yü~6«•p$rÍ8ç¦7™L‘Wóx=žò9]I¹Çn·£ëúUãÏçóäòyfgƒlݲ‰šêjü>ª¦•Óo·Ûñù*‡#eߊ"SÌ+Ÿ’"¡p$ŒÝf/+#•Èf³Ä…c±8ŠFcôrèÈQv=ô 555Õüù¯o^‘¶X<Îìì,ˆ‚€Çãa6"PéóáñzŸ˜@Í«¸\N|¨švSõ諨˜w&YZú|Å‹íäjqª*Ëé-ôƒ‡X<~E¾2™Â‘\©î"Ñhù]s·ï”v%Ó±4þ*V/iº"}™L–h,J ªª\‘H¤ØÇ`|bœ–æf²Ùã“Øm6Ê ²%‚Á «·ËE2•"JQYY…¦© “Ëç©ðzq»Ý¤Óiª*+Ig2d2, —.`-ÍÍØl6‘0U••ÄŠ ¼5ÕÕ¤Ri;‹…‰ÉIt]§¶¦Q…Â=—EãlšW7¡PY–ËŸéEEh_E‹…¼ª2y•ø£±²$a·Û †BªªÊ“ˆ³³Á¸äp0[Œ×&&&p:ªª‡ÃD¢Qªªªø/ÿòjkjØ´a­-Íx½^Òé‚¡a¸]n|~ããhšŠa€Óé ®¶¶P>‘(µµ5WŒ%ùuf`4•¦j¯i½o‚ ÐÓÓ³¸à¾4L>—Çn[¼`aþ}zQùßß@EžýÜSmmUåg¯¼ÊÚիزq#ZqEwŽÔâ taœ%J«öÅî²^‘(ßUûùbáçÞéæ ÜW<Çåëq¥ïKgPÆœ¸ç>Wº–wÕðW‰ójy[ì³Åã¿|2÷×+‹…iž[î|ã/åú-­Î(×ݸ®V Ë( áq{PdåŠô Åmز,søè‡œ9wŽo}í«å×¢i[ÐfÖÇÂv¶ðªÚG©Gý:írnÌ-Ó+ÞS ·XûŸ÷Âç–ï¼ú¼JœóÊyN< óµXÜ‹ÕåÒ®DA`"œ ½­•¶†šEÛýB ‘W+ß«õÍ«Õé¼ÍMûÂô.6Ž.f±´\+übé]¬½Íµ¥°X›œñ „9öTæ•Åœ¸J—ßkóÚQ>Ÿçýÿüyà¾íìzè¡EÓðQë|aý^œ˜a6¦£!` þ”ÿ[ý¥kT¢°x%/†®ë,éh/[a+FÄÚ¢’^¾x–wnwyÜ”©Øë=±0ÎO:—7ÿG}çbå •õ{ù•~UUo¸­åóyjkªçú¸fÚn o7S&¹L?áp·âÝ·šO«]€¡kØ­ÊU-&Tæ~·Øß à >_L˜/ö¾…v8n4ÌG ¿Xþ®6ѽ^üÅ€W-·kMš¾CEzàšáÒ°Xú›¸ÏI&.»…)Õôòy-Ê‚¿Tˆ%…„6P.-jYÎ}fÝš5ó4†Mî^«ßK^Í—m-ܨºÚšêjkËÜ·*m&ŸŸt݆" X•oåÒä“GEÜñÀµƒ›E½pD`šî]9ŸÏOÄË•ËåH¥R(rÁ"–ééÀä– ÚZ>Ÿ'•N™nŸM>>hš^T|,è´˜ÿË­ªE–±*"áHY¾÷îò_s, ;§òäô$N·‡ÃQþ®¦¦ÆˆMn9%f[3ù¤0 ƒ _EÙڞɽ‡Õj¥¹¡‘©é)r÷ØŽ¿®ëD"‘«î åò9‚3Aä‚h U•Uñ&&&&Ÿ]®u–lrgã÷ûñûý·;Ÿ:š¦144T¶2x2ÎÌôLáŒÿVµ˜|ºÌÕ¬5¹5,¦¹mòÙäZJ€&&w"eºA<™  #˪ªy~L ˜ÏW»âbòÉa®ï̺6¹)¸Î008Tvž”Éfiom-‡1ÿgSðßzÌò½w0ëÚän%—+x=-ÆPçÜ®»ªà×uD"N6—C‘eœN’$Fæ\ÏŠ®5³èE‹K¥gãñv»Ë‹q7C2™(Úç.8„p9]ôªJ"ÇåvÌÙÞ&2™ ‰D¼\&%ÛÚ^oÅV®n5‹ VÑX”|.‚€ÅbÁåtÝÔq€a$q$Iž§ z«Ÿ-‘N§‹ÙÀá(xsËæ²xÜžOmUvµíß»¡¿Ü ©TM+Xâû´žMÓ?Dz¢àõx?ÕÕ÷ÕŒÈÌ«SAÀfµ¡iN—“d"‰Ýn¿f=ªjžh,†ÓáÄf³¡ë:±X¬h¥Ï43kòÉSð“0ÇÚbt]§»û,ÿL&Åbá±Gž ²ªŠßýá7¤Ói$IFžyú9.\è!›ÍðÄãO!étš=ï½ËÚµëhkmÿ؉>úáN>‰ÕZpÑÜÔÌöm÷“J%Ù»ï}Þõ>Ÿÿ# º®Ó}¾›ªª*jkj Sr„s=†/ñÞûï–½Z .—‹¾ðÒ<ŸÒ·šÅVüº®óÎ;o16>†ÅbÁf³±¬s7l¾!!“Édè¹pžö¶\. ªªŠ ë7ÝÒg284ȱcG GÂèºÆêUk©¨¨àüùnž}æóEg#·¯Œïôþ²mÛ}‹šà^ˆ¦ëœŸÓ/Ξ;C<‘à‘]Þô³ï|ä#õÍS§NpúÌ©‚“CG–êëêùü³Ïê‚a]§Óéyu*K]DcîÛv?ïîy‡6ÓÞÞqÕxgfføõoɲÎ.ví|UUùó_þÈÖ-ÛXº¤óS˟ɽˢ‚?›ÍrüÄ1j¶nÞJ&“Á_Y‰¡¨ªÊ÷?HSc3àv»9{îÌ<-BEQX²d)^—`(H*™$ŸÏc·Û©ª 033ÃáÀáp295Óá$žˆS[SG&“!ÐÐÐX^¥äòyšØùÐ.BáìçÄÉã¬[»žÎÎe(Š…ž ç‰ÅcÈ’ÌÒ%H’ÈÔÔ‡ƒêêDQ$ 3œEQ,ºÎ‘£‡¨«­cÅò•444 ‡ˆE£x½—}}½Ä1IÆíñàt8©««#—Ë311Nmm6›¶ÖvªÕ ÐÝ}–;Æép299A Pð[ I¥SȲD.—GÍçñûýø|~²Ù,ãH²LmM-Š¢ÜXí-À`ñ­þ\>ÇêU«Y³z££—8úáª*¬Y³–íÛîgpx€ššžûü¨®®¡»û]Ë–óøcOðà" 0<<ÈÅ‹Ã444]qvYººn È ]]ËŸgdä‘H˜%KDŽŽ¥<÷ìP…£G308€ÝnG‘eú¯ksþj\K¹¯4Ð4µpa±084@(Âë­ ‰0:6ŠÍfÇãñ¨ PYYÅÒŽN|>?Û·ÝÏÆ›Šþ uëtºxì±'hkmg¬(Ü+*|X­6&&'hhhÄ﫜÷¬a ô#Ë2Ï>ý+V¬äÜùsd2ª5Åvâ+¯è$QBÓtÔEË¥1¿ÏËéFÕTÆÆFp8¸=jjjq¹ÜØl¶r¾üþÊ›VÜZ¬ŒïŠþb³1>>ÆèØå~144ˆ¬¼¶ù}~ª5´¶¶T³fõZv<ðPÙG<€¬(¿ŸàìlÁn„( (…z“$ ‹bÁ0Àjµ Ïí¿WÑU21YˆôâK/þǶ¶¶y[¨¹\Žó=çé½ÐÃØøõõ lÞ´EV¸4z‰‰‰ F.]äÒè%Éf2Œ126Â¥‘Kˆ¢ˆ,ÉÔÕÕ¡i‚ ÐÜÔÌôô>ŸÆÆ&.]ºH4ÅîpàóùdíÚu¸œ.&&ÆçYÎÌÎ01>ÆÄÄ8¹\Žõk׳¬³‹\.Ëìì,­-­DcQ</µµu8.TUefv†t:M PÃ’Ž¥$SIzû. ©­©Åår1<ŽM›¶PSSÃ…Þ¦¦§ˆD z [6mÁjµ1U<t{<464ÝÔ`¥©º®_¡´76>ÆÄä““…qëÖm456ãv{H$„ÂArù\AÏ!¢¯¿‹RLêëÈçs ¡ªydY¦¢¢gq¶£} ‘hQ©Ô +«ÕʲeË‘$±hIªô¬e˺H¥’ôõõÒ³eù|A¼ÜN<OyÛÒfµT395Q˜¼Œb³Úh¨o`jºàGÜj³’L$EÇK&“adtÇÊå+‰DÂôõ÷•óu³!—ËÚ÷œöÝÒ_Ünϼ~Q]]®ëœë>‹¦j,]ÚIkk+’(2|q¸xÓ  i^S]Ãlp–ö¶vrù<éTŠÆÆ&‘0¹|Y–ioëÀçó1<<4çY +W¬Búú/J%Ù´q »ƒDêrûæææy“Þ`(Xð/ßÒŠTœÐÏÌÌ0>1Æ}ÛÀf³s®û,áp˜h4Êò®å¬Y³M׿å1P¸©Áq±ºÖ4•ÑÑš[Zñ…y<%‘LйtÉdŠÙÙ–.í$›É†Ñ ƒÖÖ6lEÔL&ÍôÌK—,Ãï÷#J±xŒ¥K:‘e‰`(¸\.¼Þ ,ŠBcc#ããc444`Q,D£V¯^K>¯ Éår455ÍÓ%0¹÷(™ìM§ÓLÏÌ”?—$‰Úš4]#!¼þËׇw=|EçÐ4|>€Åb-ûYV¸ØU]×ç­ÐJw®ŸæÒõ;A$©¼’¸ìËZ–å¢7?Y¾ìVSÓ´ò€(ŠbYà†ª©È’\þ~îwétÝбÛìHRaw ŸÏ#B¹3—Ò$ËrÁÕk1>Qç¥ ‹ñû?ü† 6±jåêE ]× ÊJ¥´Ÿ9{šãÇñÅ^Âf³òç7þDeUÛ¶lG–å²+Ël6K^Íc·Ùå›SîËd2¨ªŠËåš÷¹ªªe‹ss˯T¶™LA±ÙlåÏ «±R¾Jå ó}šÏ]‹¢H&“ADQšSŸóŸ-Õ…ªªåôhš¶h;YØ&s¹\ag@)8‘ºÜî r¹Â䢴{ ë‚ –ëva¾n†D",Ë岺›úËbý¢ÔÎyí±ônA(,Ä%Q*÷ Ã0Êí<›ËbèFy‡M„ùÏ”ûÚܾWê+¥öc`\q%wn›(µÃ½ûÞ#ñܳ_ Nñû?ü– 6±tIgY)v±¾ÿIÕu©l$I*×Ûܼ”ê¶”¯t&"+X­ÖyneUU½¢¼KéÌd2Ȳ„(ʳT6ªšG¥ò;Kï˜ÛM«÷6ªª2<Gÿ@ÿÕïñ¶•æ;º( ¸‹‡½~çš;s^x&Yz¾0XYn(þÒÖðbñ”„W|¶p5<7?¢(b™óî¹q†ÁàТ(ÒÒܺhþDQœ×ñr¹.ôÐÞÞŽÓéDÓ´‚b¡Ý1b `³Ù°ññ¯¤-¶Õ­;Ü’$•5íçæãZùZnnÝØíW¶™Åž]Ø–æÆqµôJ’tEüóÛ”rEøëåá“(ßÒ»îôþR ¿°_,LãÕÒ]êksëÔ¶È5Ê«ÝJYØ×k?‹å±D,cøâ0›7m)O2œNv›ýŠþt³¶"æ²X]/V6só2÷oY–½B¹0Ž…ÿ_-ísÛ÷ܲ[ØML®‡i¹ï#¨ °ã‡nØ ‰a¬Y³¶¼­\ØÖÞŽr‹|…›–ûn=fß>$QbÛÖí剷Ýnç¡wâ¸E¶2̺6ù¬"ƒi‹úFaþÃÀjµÒ¹tÙ¼8***ni:WF2ù¤0Ë÷öáv»éZ¶¼ü¿(JøoáÝu³®Mî6nT–ËP8ËR \£¡𑼦›áK,V®·"=ÙlUÕî²ò¹»Â'“)²r–\ñ<ÿv§Ç ëÂ'“É«ÖõÝ~3ü½^@(ëÅ\Y× ~r`UÎcW’Y ·M"•Ó‘EI„t^Çe•Hd5슈¦ƒª8,"ñŒþÎ »ÃÒc†7ÛáÍðfø[>×q(ð|×e»-WCzáÅÿ㇡*"š AR HŠ•±¤4™Œ®0Ùbe8d`HB‘Ù”’…a3¼Þ o†7ÛáÍð·-üxLÑBZYд쵯óýüµ×Œ“ùÄñr)˜-_Á)M Æ3ŠŸ]ë;3¼Þ o†7ÛáÍð·%|£ß‚Çjðâ²,b.Æ™s׸Î'yÍ ­é"˜»MPú³ôÙµ¾3ÛáÍðfx3¼Þ ÿ釟ŠåQ7âO¶¨Üw5U€¢uQĉÉ䎦äoD ðû£Ô©n” Ç|´wjº(ÞXC4¹1tãÊÉùµÂ•êܼ¸óÉq£u`bòi¡PëQhñIè†Êõ¬„ˆàPD¼viÞÀê+Z*¯ï³ÝäÎÆ|N‰¥5Vª\2Ëjl7,øeQ «ÖŽÇþѬŸI¢ÀŠz;n›tÕ‰¥ÉGC`iµ¿K¾f™ @{ÀJµG¦£øÛ¬ƒOQ€Î[a¼4 ÕäA`2–§o:ÃØ) ’RæË3XÝ Xßìà¥c5ºn E-Fa5§éFyWÀ0 Ïs~´¢S½ô]1ÜB ¼v‰ÇWz±ÊB9N“O©.Z«¬<±ÒËÒO­ñ¢HB¹N}ŽBÙgÖVPW¡êÓ¸\Ÿ«ìllu¢+¬TÿºŠ$ðüzõ^¥œ†…aJéÓ9íˆ9íå.iúÂ<Ì)£Òÿ ûËܲ(•ë岸|ƒ\Ÿó¬<¾ÒKGÀzÕ²Ñ E]]nVÔÛyt…‡uöye¾Ext…‡J—Œfv¾E1 pÛ$žZ]Á7¶Uòâ&kíæ„ÊäŽ@7ÀïiðYnhÜ”  Ò%c-œOa•E6´8謵±$`ãÂd¿Sfk›§MâøÅ$©œÎšF‹H(©rh0Aµ[áþ%.$QàÃáB˜-NV‘XZC× üN™ Ífçmÿ <°ÔÍ3k*¨ó*¼Óc4œ3·Ò>&°¼Þκf  jQÀ´UYùÚÖJ&¢yö÷ʼngõyõa~§ÌK\T{ê*0àþ¥n–¬„SgÇR<³¶MÂï84˜d{‡‹jÌX8ϱá$v‹ÈS«½lhqpx0ÉX$ÇÎeª=2ãá<´VYYÝ`'žÑØ×G‘XâÆªNr)˜»ÉÜßz ÀiÙÒæ¤Æ£pa*é‘]u6Ö6:&U>èOàµKóúËáÁ°­ÝE}……œªsìb M7ØÔêÄö'§T¶´;©v)$r:½“™«vêÒÎÝö%.š|ºjí Lg‘E–ºiô[8;šæôXj^ºk›|a½e5vv÷Dé™ÈÜ#Ñ ƒÖJ k›4ù-œI›ÇX&wQu’Ù / @8¥1)ø:荒ñ`§›ž‰ ÑðÐ27kšŒGrh:4û-Ü¿ÄE4­²¡ÅÁŽ¥n Ã`"šG7 ž]WÁò:ë[\ æx`© ›ED7à‰•^¤½ÅÂ)•dNg4œ#•×1{ÔÇÃ0 Æ«ðÌZ/cáC3ÙŠO€xZãÔhŠ&¿…]]î É¢ÀS«¼xígFS¤³…úÈäu.†r¬l°³©ÕI4¥Mkåzg4ÆÂyZVXmªšAßT†`Bå¹õ>*r9̃n¶¶9yaƒQ€PRE‘>·º‚jŒ(|a½»E¼cWUFq×ã‘å¦byrªA­Gá¹u>âÕ ¶·q¹¿4;ØÑéæ¾ËëìôOgX^ogIµ•gÖVPãQ˜ŠúâöÛÚ]DÒ[ZtT[¯^Ü·ÄEW­Ó£)")µœÆ‘PŽÁ™,O¬òÒR9·@¢iDVg"š'šÖ0Y‹$Ïê Îfé›Ê Kæ er‡ €ªdóú ‰Î¿¥pÆ…³Á‘PŽC .s†ÁÙ±4‘”Æê;6¥ ä5ͳ§'Î} –×Ù°YD}ª\ ~‡ŒMä8:œ`2š§*ùñ4KÁ»ØÜ#]7¸Ì1Ïsd(I0¡šrÿcbM> ™¼Á¾¾8}ÓT­°]<“P9q1Å‘¡$Kkl(Åã•Ò¶³£X—ô'8=š&œÖ‡"Ò°â¶JØ‘ÑpŽá`Ž—RèzḦµÊ‚Ë*Ré”Éäu.LfØÓÇ* 4T(¸mÅ06›"rx0AW¡¹Ò‚Û&±¤ÚJÀ­PçU°Ê"ò¬Y*ƒ9f²¬jpà¶Ê­¾B¡¥ÊŠÝ"â°Š0§¿ìïO°ªÁΪgÆ u0É“× Ž%Q$eµ6lŠ@g­£CIvŸ1Εõ2 ‚{îñÈ’À’j§GR»˜b²xt§C³YöõƉ¦UÚª¬óŽì `<’c6¡rr$ÉȼÃr;„Âé׆øÝñ/ rìbòv'ËÄ(—;dj½Ê •_á-f*–ç¡N+êíÔz 纙œÎÞÞ8/wó`§›3£i\V‘Ÿ…¥56&c*ÛÚ]Ø‘3£)ª=D¡ à% A/G-A°ÊKª­ÈRAã;–ÖÑ ‹,°ºÁΙ±4±Œf ÿAIÀ{ìëšÔy©0ió;e–ÔØXÛä`"šÇk—XZSôüe@0©I«lhqr~"Ç&ásJìêò°¯7ŽM¬j°´Fai ‡Edk»‹¿œŽPçµ `SDš* ‚Àe•ØÖîä¯g¢Ôy-Xeþ‰ ñŒÆ7ú¸Ì1Í“ÈêœI¡jéÜÍ`oK …wh Áš&­ðòÛãa¦ã*§FRDR3ñ§„, *ï_ˆñüzkšLFò´¬ôOgpÛ%ôpá½-•Fª\rù8,”T™ŽçYÑ`g2–§Ê%34[Øê¯«PXÛä Ò%3ÝŸ £Ú†ËZØIÉæ fytÝ`EhJ#˜TowÑÞ‘è¤r:ô'îý“{Q(Èî|žh½~xé‹/¾ø3•DrrªA0©á´Š¬m*x¼êŸÎⲊlëp¡jûzã(²ÀŽ¥e dVçíî(±´F{À†Û.q)”ãR(O*§34›Å[ü,“טŒªìêòаÑì/¬Œ.LfÐ h X 牧5óŒÿc Ïèä5ƒ ÍN‰KÁ#¡•.™¶*+Ù¼Á[ç¢ÔU(Ü¿ÄM³ßJs¥•Ù¸ÊÙ±4]u6Z*­DR*'/¥Puƒ%Õ6²ªNßT†îñ õœÅúóÚ%š«¬DRZá<¨ó*ÔWXØÛ§{¢ /Ò\UиÊÑYccIµÁ™,‡“Œ„rtltT[Ñ4¸Êݱʞ…c¯nœV‰ƒ ÎŒ¦É©«Ôx&cyìŠÈsúË;Ý1§³Ôy-¬¨·Óâ·Ð7%à–YÛì$˜Pù ?Nßt–&¿•-N–TÛèO3α´ÆFV5ØØâ¤µÒJ³ßJ^ƒcÃIê+,,¯³“ÎtO¤ÑtƒjB[Àʉ‘gÇÒ<°ÄÍò:;Í~+•.™é,‘”Æ’¡¤ÆŒ¹ãfbrW¡P_a¡­ÊB›'¨ß€å¾nc%i¡‚žÉ4¢PÐdQ(kå 45à ¯Ü·ÄÍÆ?=0K2«—ÏQ@7 4òýÜ»ÄpÙÑb\ë;“›Ã0@’JG*ÅU*WÖïbωˆ"¨Z!P©äµ9~ËŒËq–vyòÚe}±°Ó]n ÈB!-å8‹ñIÅôÝ ”Ž#òšQÞŠŠym‘þRÜšW$—UäÛxól”S#)¬²€:Gû_ p÷Õ-• ÎfÙ}>Vè‹‹”M©.ç–Ýåz G=×è{¥:611¹»0»"RåøÎÚ<ÂXî %Tfò—µè µQþ(Ô‚PT2yl~~˜Òµ®…ƒËB þ«a ýOA(üÒß°xý.öœAA`Ï­—r;(¼üË0(ë”>,šs>=7Œa,ˆ³øÅÝ"ôáÊv/—¯Î-Ö_ª=2wyð9d¦by†f2‹•/¥ÊXF#“ׯY6¥gæ~¹ ³ï™˜|V1 G«.«pCžüdðØ%,. ÓéyvçÆPZ9œOÓ?A3Œë†×ç®â‹ß›áÍð÷JøÅú &Û»ÏÇ gûI•tNG¯ÿßÎFÉkFáFŒpçæ× o†7ÃßžðŠ$`SnÀzÅ3þt%ᜇEdYhFcE½Í(¨¯(h‡¯jpÈê4TXÄ‚Æuç „o­²â´JHfx3ü=~±þ²¬ÖN$¥!‹5åºñw º•Î;?¿fx3¼þÓ ¿²ÞÎlBe&–ãþ®ïïµ_¼nˆõ›ÀæG g“ª²TÜæ¥0›ÐôÂgªVSÚÂ5ÛáÍðfx3¼Þ Ë ê ¡±Ä"pöšgü<ºÂƒßﻡ-“;CWŒ4®N„¢Æµ‰‰‰‰‰‰É]‹¦sC–NoLÀÄÄÄÄÄÄä3)øMLLLLLî!nZð'“Ir9Ó®÷ÝB*•bjjšD"ÁääTYéãzèºÎÄä$™ÌGóئë:ãù9“«cSÓÓ$“É놛™™!3]ümòÉ195e¶k“»š›ü†aðöîwéøÈÏž8uŠ‘ÑÑÛï{Žó=øé+¯püä)~ü³Ÿ£i7æ…-“ÉðÃý˜Á¡¡+¾ëëà\÷ùEŸËfsüà¿ÿáK—nwÖ?3†ÁÏ_y•ÓgÎ^3œ üò7¿åÐá#¼úú/9rôÃk†WU‡Ænwïh‰{ÞŸÿò/ÿ¿ùÝïé¹páv'ÉÄ䦸ÂIaôôö200H[k Ë–-ãüù¼^uµµœÍôô MM,[ÚI,ã­·ßa``M7Pé÷säè‡LÏÌÐÔØÈÚµk˜˜˜ ûüyœN'ׯÇ>1A2™dÃúõüèg?çù?ýÏ456΋;›Ë‘N¥‰'â¤R)æ™&2ùÄ™åß~òSÚZZ„‚MÕP…¿½óáH„§žxaŽÍV]×ùßþÌÅKiokCÕ4 Ã(×ñþX¿n©tŠd2I<'—Ë16>A*•âÝ—_ák_þRÑO€ÄèØg»»ùö·¾ÉØD!ÌžW^áÅTŠ¿½óÕÍM$“)Þ~÷].Œàt88Û}žÿßÃn³Ý*ÇOœä•×Á¶­[˜ššÆçóñ£ŸþŒÆ†9B:“A–%~þêklÙ´‰·vïæ©'G–evïyå]]üåÍ¿‘~êI‰Æb,ïZF,§§·—ßÿáO,[ÖÉÉS§xòñùõ´ý²{ÏÖ¯]‹¦©«^º€@2™âG?ýÿø½ïÒØÐ0ï¹L:C&&‹‘Éš[ØW#¯ªX-ª«T¨j¡_\«NLLîD®Øê?uú ##£ÌƒLNN26>Æ#»vâr:yýW¿æ‹Ï?OUU%†®c.—‹'Œí[·ÒØÐÀóÏ>ƒÍj%‰^ñ²Ö–f–uv²óÁ¹oû¶+vL>Y.ôõ#ßøÚWypÇX- ൵•/>ÿO<ú(‡½BW#‘HpæìYžöY>ÿôÓÔ×Õa5ÕÕds9R©±XŒÕ+W²~Ý:ž|ü1\N'ªJ²Ù,ÑH”‘‘Q\.'ïÚÉ¿ûÖ7 CŒŽQÍf‰D¢LMOÓÚÒB$Åb±’Ëç8|äáp˜`(Dÿ™ô-ˆ*+ýø}>‚Á¾ úé¹ÐK(bv6ÈÀÀš¦ÓÜÔÄß}óë<þ裼·wïïÛÏö­[xé…/°¤£Qinn&—Ë¡ª6›C‡°ãûøö·¾Y˜€©¯yâ"‚FÓ4Ž;ÆýÛ·óÂóϱ¬³]7P™m[·ðõ¯|—ÓÉ™³ç®xvÅŠå´µµòìçžbåòå·»HïXý4½}}†Ác<ÌàÐ0/¿ö:N‡¿ÏO}}-Ö­GQd\.çí.ÆkRUUÅ×¾ò%ÞÛ»Ÿ½ü*/½ð*+ýlܰž‡wí¤¦ºšÁ!rù<‰D’©©)*ý~$I¢çBkV¯&™Jb›7n¤±¡žŸ¿ò¢ àõz™™%‘HËåD]× ý1%‘HRò“èp8ð¸Ü _¼Xî¯` j¡p˜‘ÑQ‘(‡™™²Ù Ë26« Ã0¸42J}}=·ûv뉢(ÔÖÔð…ç>,ËH’t»“dbrSH/¾ôâlkkÃé( °ªJÆ'&8}æ,¡pˆÖ–VNœÕjEQTU%‘H`·ÛQI’ÊÇ‹…t&C&“Áép É2º¦‘Ëå0 §Ó‰ óÃÛB:“Áår•• 3Ù,ÙL»Ý†eÅÃ; MÓH$¶‚EQÄ0 ’É$à°ÛÙ÷ÁöîÛÇw¿ómü~?6«Ã0 GÑ(ÿùŸÿ…g>÷96mXO¼X¾»€l6K8槯¼Êê•+yâ±GI¦RجV4M+[é’e‹¢ËåÈd2å:Óu\>ªª¸œNDQ$“Í¢ ‹‚€Õj-¿K–dùÎh™˜˜\UU& q¶û¶ú{X’$<Oùÿ¹³ÛÒ@¼pÆ+Bù3Y–Ëa·KÉ­GÜ ¶nK¿„,Ëå:›‹Ýfƒ9ŠuŠ¢àóÍ÷é0W0Ûm¶yŠxÒ"“»…a‡c^›ÕŠí.i#’$áõzç}&.—ëòÿ€Åj! Ëy|b‚÷öî# b·ÛYº¤‹ÅB¥ß?/.«ÕJuu5n— I’ }ó[ñ…>w¹NDQ¼¢n¯V¶¶;X‰ÒÄÄä“CþøQ˜˜˜\‹Õ«WÑÜÜ„<çÈ¢Âëeåò.2Ù,íí×¼¶(Ï=û öâ.€‰‰‰ÉÇÁü&&·¿Ï‡ÁN‰ÓédÝÚµ7ô¼ æ¹»‰‰É'†©¡bbbbbbra ~“{S𛘘˜˜˜ÜC˜‚ßÄÄÄÄÄäÂü&&&&&&÷W~MÓÈf³ŸØ ÒéLÁ8Ì  ë:™Læ†}Å›Ü8ªª’J§Éçó¤R©.cÃ0H¥R7ìÆwîsÉ›xÎäÚ”êðz”ú]:¾áþgrc¤Ri³]›ÜÕ\!ø{.ôòÚ/5¯aG£QËÿ—l¿ß¯ÿêW<|è†Â΃üè§?#äŒLNM1::ö©àÝB÷ù~ò³ŸsìÄ þí'?½á+“ÉðßþõßæÕ‰k•y6›ãŸð04|ñvgý3ƒ®ëüôç/sêÌ™ë†ýE±ß½üÚë>zäºñööõ“J¥owïh2™ gÏuóƒþÝ{Þcl|üv'ÉÄ䦸ÂVÿÀàïîÙƒËå"‹ãv¹ygÏ~÷‡?R__‡¦iüë~ÂøÄª*$Ibbb’‰©Iò¹|ÙbÙ¥‘ÎëæÀ¡C46Ô³¤£cÞ‹u]gbb’©éi‚¡.§“x<Îo~÷Ün7áp¯×ƒªªŒOÌ‹¡}ÿt:Í+¯ý‚#~Hmm-^¯iK»H4åÜù󜟧`€sçÏsðÈÖ¯]K.Ÿ£·¯Ÿd*…¢(¼þË_qäè‡ÔÕÕâr¹¾ÈàЪ¦b·ÛøÃŸß@TUÅív#É2ƒƒƒ  £j*‡h,F_?±X Ûaô 0>9‰ËéÂb¹³Í:ëºÎèèC‡p¹\D¢Qzz{I§Óx=Ré4ã Ú0‚Àèè(ƒCÄb1, š®Ó?0ÀÌÌ N§EQ˜˜œdtlŒT*… ìÿà õu475-š–…ýnxøÁPQ±ÙleSÀs¾Èù—€`àóùp:ïlÇH·‹D"ÁO_~™·ÞÙMOïÚZZhkk½ÝÉ21)s£¶ú¯0à#cãœ8yŠÁ¡!ž~êIzûúbÿ°jÅJ™™¥©±§ÓÁk¿ø­-ÍC!¾ò¥—À€_ýö·Ô×Õ119¹¨#žT*ÅÿþÏÿŒ×ã!™L±¬³“w<@$áÄ©SƒAÖ¯[GkK3?åUZ[Z†B|ùÅY¿n¾á“x"Á…Þ^‘G>Ï=ó4V«C×éêìäûßý.<¼‹=ï¿_v´S"™LràÐ!¾ðùÏó÷ÿîïhnnÖ®^M{[+ªª133ËæM›¸ûv¾ò¥—¨¨¨`ãúu455 ‡éíëÇãqóâ Ïó?üã÷fbr’M7”Ãôõ÷cèÿöþ;8Ž+Oð}¿å-ÊÀ{ïAï½)’r”ï–iizfºwÌÎÌÝ}wïÛx±1÷·ÏÜ}»;ÝÓ^j9ŠF¤HŠÞ{Þ{ï}U(o2ßB™–ib~"À̬<'ó—'ÏɬóP©” CÆÅËWBr¹œÛÅŸ\®…®Æ/%ˆ"¡@dd$y¹9´´¶RQU^¯g||œÒòrqqq³bäÜ…‹¬\±œ¿ýùÏÈÎÎ" Î$¾ÊÎÊ$**ŠËW¯²lÙþýßý-)ÉÉx=^d0oC …¸~óÖ}q·AP©T<¹ó þñïþQ©¬ªž³îÊåËÈÏËãÿˆÕ+W,t•>´´:Ï?÷ûžyšŸýô§äçåJ¾ä‘4wÊÞ{wµr9šéáG¥RIÀÀåva4"W(p»ÝÓ/†—W©TáD=29r¹læß ¢θðûÙôðo™L†JÎØ'“ɧýȦ3É©…wgfûámËñx<ÞðþÊÂIG”J%^¯ǃ^¯—Ëäø~<7>¿Q@0œÏív#—ÝËÖ7ÝøËÂÃüˆàr»ðù}„B!ì;—¯\£° Ÿ˜è¨éLŒŠé:÷208ÀÁOްiÃÌ&¡`Aðùý¸ÜnA »§‡›·o³aÝ:Ì&*¥Š7^û1•ÕÕüñƒxóÇ?F­VMA~>7lxè‡s³³ù«¿x› —.ñÇ>äÉ'žÀ ×“’œD^n)IÉôΉ™ v>¿!B.—óìSOÑÐÔÄÑcÇq:]Èåáó]= ™ aúeKŸÏ‡ú8(rdÈpÍÄ]ø…>Q§Ïþ€¹\>ëå4¹\>+.·  0“%Q2›N«¥° ŸÄÄ z½”]TòÈ?Îý¼MœÓð«T* = C£Õ †HKM¼÷Á‡¼õÆ,Y¼ˆ3gÏ…S©j4ÔÖÕó¿~ùoL9¼òâ‹Èå2>Øÿ1ݽ½ôöõ±zåJÎ_¸@iyÅ̳Æ=»v299ɇŒR©dŲ¥¤¥¥aÐËd¨T*ôz=r¹lÎökkk9uör™dðôž=äSRZÊ‘cÇxõ¥—Ñjìnß§‚ü<ø_¿ü‚(1}¼ÆÆÇùůÃáàG/¿Lm}=§ï«Ï§vïæ‰Û8yú ·îÜ §âÕjQkÔ´wt2åt’ššJA~>%¥e=~Œµ«W#“ÉiniEÁ`§Ý=qò@€EEEäåæpãÖ-š[Z>ŸÓgÏa³Û1›Ì$$$°{çN.^¾ŒÇã%3#c¡«ð+546qåúuœN'q±±,**dÉâ"**«±XÌÄDÇÌ{+• Þ}ÿúþµŸ†Æ&òóò¸xå ½½½¨ÕjâbcÉÏËããC‡èéí£²ªšüü<âã9{þ¢(R\Z¾ÁÖ¯]Ëö­[8pø0=Óq·fÕ*´Z ·ïÜ¥²ªšˆˆ²ÿàAzzzA1ÑѼòÒ‹æóéñ(ä V¯Z¹ÐÕúP³Îää$z½³ÉŒÇëÁét!“…ï>TJ%ÿïÿþ?ØõÄvrsrHJJB!—319‰ÅlÆ?3¾²ªzÖöccb˜r:Ãϧo`¬KaÞJ€IDATxhÕfC&“)õø§y<†‡GPª” ´:.·£ÑHLt4N—kÞúÁëõa0è±Z,8].FGÇ0ED`4fÕy¤ÕÊèØS“S˜Ì&Œ#^¯§Ë…(ŠÄÇţѨ™YF¯Ó195Åää$QQQDGE!Š"££c8]N¬ V«õ¡>–n·›Á¡!DQ$1!½^Çëexx™,üª¤¬Œ³ççÆˆÝngdtŒwߟ½»w³¨¨p¦~ãâbQ(ŒŽ184ÄÑcÇY³z[7ofdddæxÜ{Œf4±˜ÍØl6&îÅÙŒßïÇétâóù‰‹E¯×12:ŠßçY8%sLt4Á`»Ã)"â¡e‘H$ó ƒtvv˜˜œd|||æÅ>N‡Ó夭½mnÿþ\í÷_¬ËÌÏ >.¿a¤¨°¥âóÍEO_ÈïÑé´³2”MNN"—ËÈÊÌ$#=}æï÷–¹—“}¾íGDÜ—ïüž/Kmú¸Òét¤§§Íú›vúØÝóEõ™?ëw«Å2ë<€ÙuK\lìÌïz½ŽÈ^${p£ÑHbBÂÌï2™Œ¸¸XâˆåQ ×ëÉÊÌœõ7VKzZêÌï‚0÷¥ªº›ÝŽ\.'+3ƒ¨ÈÈ9/ÞÅDGÅÕë×0èõ3ñbyàXDEEuÜiµ˜M¦9ÇàAJ¥rÎñ–H$&™L†Ålž¹^?øžÝ·NË›“…Ñhÿ ´Z-ûž}fÖÍÁw¹}‰äa1ß9¬T*Ã/ß)•üåÛo“œ”ô¥ÛxbÛ6L4à‰Dòe¾h¢¶9Cý‰D"‘H=÷†úüæ„Gî õKÝh‰D"‘H#RÃ/‘H$ÉcDjø%‰D"yŒH ¿D"‘H$©á—H$‰ä12oÃÿusµ¢(~§Û“|3÷ŽÃ79ßôøIÇý»÷uß·9Þ’/'Õ§äQ7§áokïàøÉS³òµ{<FÇÆf~·Ùp~ä)¢(rôØqJË˺œóz°\?dÍ--ì?xˆêšZ>Øÿñ¼_÷˜Çãåï@gW÷œ›œœÄîpÌ»žÏçç÷ïþ‘îîž….ú† ||è0õ _ºÜýqwøÈQÊÊ+¾r»##£s’5If ô ðþ‡Q^QÁÄÄÄBï’DòÌiøGGG¹[\L{G'CCÃAŠKKùÝ;ï222”ÓÉíçÒå+LNN˜œšb|Ü6+“Úää$Ô740>>>ï‡ûý~†GF°Ùì„B!\n7þ@Ap:‚@(bdd„ññqDQÄçóát:ðz½37 n·›ÁÁYûàtºè`rrjÎ]º 3åùÚ á£ÆïÐ×ßOsK+íØjëêhïèüÂFÂÇøø8ííÔ54àr9™šrÒ×?€ÝnÇpòô>‚Í>~v»¾þ~¦¦¦„MÍ´´µ208H0DÅYË„÷ïósà^ÆÆq›í‘:&SSS Ïœ{~¿ŸÁ¡¡™†! Î#SN'ƒƒØlvü~?¡Pˆ±±qFÇÆL—Ýív3n³195…Ïï§³« »ã‹œ㮳«‹Ææfzûú¦“jÍ56>οýæ·TTUážžÛ[2×”ÓÉ{|Äᣟò‹_ýæ¡íÐH$_eÎÌ}2¹œ¶ö~ò ¼¸o7nÞ¦¤¬ FÍò¥K¹S\LM] ñùôF#¢o¾þ¢(ðуÈer››Y»fÍœöz}|ôñÇô Åóûžã؉ÏX±ly¹¹üÛo~Ë[o¾NuM-•UUˆ¢ÈÎ'ž 2ÒÊÁßðò‹/påê5r²²X¹b9~|—Ë…N§ã­7^Çér³ÿàA‚Á Ë–,á©=»ÃÎîûü«×oP^Q‰J©ä퟼ùƒËCîõzÙð ½½ýØì6L&r¹œŽÎ.9J àÕ—^¢¨°`κÅ%¥œ>w¥BÉÀà Èdœ9ÂèèÈà'¯¿†ÇãáÜ…‹Ü¸u›EE…ìÞµ‹ýÝ·Ìë\»~¾þ¢££xõ¥éèìâü¥K Š,^´ˆ§÷î ç>Hµµ·³ÿà!T*‹‹ ybûv~r„þd2¯¾ô“S“<üɬQ(äì?xQäåžgrrвР,f3Ï<õ:–÷>øQp{<ìyrJ¥ò s´wt°ÿà¡Yq ܺ}‡®®n¢££xëÍ70>0eU5¥ååØvBÁ7¬_èj}()ä DD&&&P«Õ¨ÕjDQ|¨sIH$óQ¼üÊËÿ’‘‘A¾ôöõ3::Êü§d`p·ÛÅ¢¢"Ü7ÿþoÿ†ô´4:ººÙ¸~={ŸÜEgWÝ==üí¿û96›ªêj::;IHHà§o½Eo_q±1dgeÍú`—ÛÍñ“§HLL`ㆠ$ÄÇqõÆ ≉æÂåˤ&§ðÉÑOÉÎÊÂíñÐØÔÄ Ï=ÇØØ8ïüñ=¬V+/½ð<7ïÜáÖ»¬\±œâ’R¬V+UÕÕDGGóo¾AVf&ÍìT£*•ŠPHÀãñð÷7X¬Vä?°®ohàÆÍÛüãßÿ±±1ôõšœÌ”sŠþÿ„Ïçãnq1kV­šuSäv»yÿ£ýìØ¶•göî¡¡±‰%‹‘‘ž†Õl¡©¥¹\Njj ñq±3‰ÑhÄl6SRZ†ÉdbllŒÿè¶lÚÌÑcÇÉËË%59³ÙDIY:­–†¦fâÙ´qf³™wßÿƒÁ€ÅbáæíÛlÞ´ V»ÐUù…šZZ¸S\ÂæY¼hýþä(+–/£­½·ÇM„1‚®îîûb¤†öŽâùÉk¯ÑÐØ„Õb¡½£!bÛÖ-¤¥¤pâäIŒo¼öcjëë1›LŒ“š’BjJʬýCŸ%>>nVܳ~ÝZ~ôÊË\¸t ƒ^Ojêìu-3MÍ-¼ö£WY¹|ù¬sAò¹@0€Z­B©T²móf²2³ˆŽŽúö–H¾#‚ àp8aοÉd2ü?6»mþ—û´Z-FƒS„AÑj5(ä tZ-µZ…Z¥B­V2ŒF#q±±$%&099ÅääFt:-Êé‹È½aû{ÿ ~þW?E¯×óÎ{ïÓÕÝL&# ""¢ÈL^qQÉÎÌdûÖ-(•Jâââf2‰iu:\Ó¹ËEQä‰ÛIOKebrr:‹œ½^‡(г>_tZ-r…N÷ƒkô\n …c„1œ ~úï …­V‹ÉËížU/¡P 0¡ÑŒF£A®3åœâ؉“´ut R…ç™×j4(J´M8ƒÜ§ÇA¥Rá÷û‘Ée¨UjÌæðó|z|z¥ FÃÏþò/Ðëõ¼ûÞû´¶µáóùf2,>µgÚ‡¸ÑX¾t)o¾öUU>r‡ÝˆˆX³j%Ë—.ÉpùyŒL211V£E¯×£Q«Q©”¼ö£W),(àデ))+Çét‘@LLL8‰’Œ™óøÁx …B¸\."ŒŸÇ]øéV8ŵÑh@­Rát¹æ¬«Q«Q*•h5Ú‡zte¡ElÙ´‰¿|ë-žyú)òrsz—$’odîP?á;Q‘M7ñqqLNMòþGûyùÅÈHKãòÕkDšš[xÿ£ý´·w°{×NdrG`hh˜–¶6Š ¹tå*5µuÈå2´Z-kW¯¦±¹¯×K0D&“‘’œÌÅK—iljÆf³‘˜ÀŠå˰ÙìhµZ z½}}\ºr…¿ùÙ_sóömîÞ-fåŠåÔÔÕápL`6™ˆˆˆ`ýš5=~œÁ¡! òóIJHàÄ©SÓ7"+–-%))‰©©©p¹^xë}Ù òr¹xéÿöëßàñz …BÈårzzûxçïÑÞÙÉž];iljâʵëÈdrd2غe3«W®àБ#¤¦¤022J(bÜ6ŽN§%P(¤¦¦rûn1ÇN|Fnnv‡¤@b8Ý«B×ëãôÙsCAHˆgÜf#!!™LÆää$wŠKðz½‚Aô:=ׯ§º¦ǃÅlF!¸¿qÚÔÜB}C ¹¯×GnNÙ™™ŒÛlDEEa0èqº\457ÏŠ…BÁÁO>axd„†Æ&²³²¸[\‚ÍnD@dãúõœ8u ›ÝFm}=ÙÙÙDDDpöüd29•ÕÕ„B¡ðù¼|)k׬æÄÉS ‡ãnQQ!‚(póöš[[ñùýpèÈÑð£dDFZÙûä.’8|ô(‚(°lÉ’…®Ö‡ZRRâBï‚Dò­ÌIÒ399‰Ín'55•ÑÑQDQ$66–ή.ŸÚº:&&'yé…çIOKÿÂõQdÅòeDGI=q‰Dòí}ë¿D"‘H$’…÷u{üïÃS‰D"‘H$ß9©á—H$‰ä1"5ü‰D"‘&ræÜ9êꈎŽdëæÍ\ºr•—_|VËÁOް{çNªjj¨­«'2ÒÊ+/¾@TÔÜ4˜%eå\¼|¥BÁ‹ÏïC¥TqêìY¦œNòssؼiï}ð!þ@€ÉÉI6mØ€\.çì¹ó´··óêË/“•‘Á‘cÇp8°çÉ]üä‡ðx<ädeQTXÈ©Óg0ŒñÜÓOÏJaêq»9qòå•LNMñÖ¯³p#•”–QSWGH¡P(HNNB¡P —ËáȧŸ—÷©={P«U ¶¯¬G,^Ün7¿ýÃ;A9"‚Ÿ¾ý7oß¡ª¦†øÛ¿áÒ•+„BOíÙ=g?çXS)•¸Ün:;»p¹Ü¨Õêp2³`fOÉÛÜgü¢HRb"?}û'˜L&êêXµry¹y¼ôÂó,[º„ü¼\¶mÝÂæ·1:6ƾgŸAEŽŸ<Éé³çP«TüÍ_ÿ5‹ ʽ§ËÉ¥«W‰cýºuÄÇÅáv»)+¯ ½£ƒ¡¡!dr9—®„—Ù¸~:nÎvlv;Ÿ<ÅÖÍ›yóõ×ˆŠŠâà'Ÿiµòü3ÏPRVλÅôôö±nõj¶oÝÊÕk×ÉÉÊ"+3“gŸ~šÅ‹Š8}îCCÃäçsêìYº{zèíë'=5•—žžâÒ2""Œä³më¶lÚ4'yŒV«eåŠåäåæñÊ‹/`µXôàäç“™‘ÎÓ{÷"“ɰÙíÈ!"gÏŸÿ¼¼gÎÒÓÛóí?ðqôˆÅK0¤£«‹E‹ Ù÷Ì3tõôP[WOiy9¥¥e467s·¤”˜è¹Ó?î± …ÈËÉaã†õ<¹ó ´š‡;e´DòEæ4ü"`6›Iˆ'.6†P(„ÙlÆh4œ”„ÅbÁh0M¤ÕŠL&#::šü¼<–-]Joo}ýýdf¤‹Ñhœ÷ƒÍ&ñæ›LLLpøÈ§LNM±vÍj*ªª¸që6K/&1!ž·ß|#¼ÌÑcŒŽÍÙŽÃ1N7ZObB ¹›Ý΢EEäååÃÐð0z½Ž””dR’“‘+ä zôz‰  †‡G˜rN104DQA:¥RIRR))ÉètÚ鼿á²GEFιӗËåX­Œ)ÉɨT ÛƒÖôèt:b¢£0èõÈ!Îç>«¼…ó6’¯ö¨Å €^¯'';›Üœlòrs9{á¡Pˆuk×pêôErçÉ5ÿ¸ÇšÅbáù}Ïñ—o¿Å?þ1+W,—zû’GÒœ¡þðó½pŽoQ?ë‹´Z·qìÄgìܱ˜˜hnÞ¾MLt4¢(ÒÝÓÃÅËW()-eíšÕÈår®^¿×룽£“¼Ü\JÊʦS•ÊQ«Õæç3<:Bjj*ÍcéâÅ9vœ¶öv^|~SSS Ü[æ"ccã Œ|¾•ŠeK—`µZøðãäç岨¨ˆ¥‹sòÔijjj±ÙllÙ´‘–Ö6Aœy~©R©0™Lœ>{¥RÁÒ%‹¹[ì&=5½^Éd" Í<;™LFLt¸ìÑQQ$&ÄsãÖm1¼ÝüÜ\Ìf3ã¶ÏëÊd2-ÜÑÞoaú8*UJ‚ 7nÝ"##—û^yu˜r?aZ¼" ÂÌóù•Ë—sôØq^yñ–,^Ìù¯ÿ•½ü2f“‰»%¥tttH±v…\NQaáBŸvÉ·¢xù•—ÿ%##ƒÞ€Z­&!>žÄÄD z=ÉIIdge9}מ–JFF:r¹œH«×Keu5f“‰%‹³eÓ&23ÒÑju8Š X¼¨ÛÃää$ ¥µJEbBÇv»-›6²léRôz=ÝÝÝh4ZžÞ»AèëïŸYfùÒ¥ŒŽ199…B©@¥R‘•‘Á²¥K˜˜˜Äë󑖚²¥KP©Õ<¹ó ²33±Z-¤§¦b0ˆ‰!#=ô´4B!„øx–.^ŒV«ctt”ˆ#)ÉÉDFF’žš‚Ùl&ÒIzz™÷ʉÑ`d`p…\ŽB.'**’ü¼<¢¢¢Éd¤¥¦ žÞ…p不§CVf&Éɉ„‚A¶mÙŒÙlbdd”ˆˆ’‚ŠGÑ£/j•šÔÔR’“IKMA«Õa$55•Õ«V’˜˜@jJ*kW¯Æh4244Ìä”kÉ£BǼ/çÊd2ü?6»íÛgç»rí:wŠ‹ùßÿã@©üvY~½^/ÿã_ÉÆ ëØ¼qãBסDò“âE"‘|_þlÙù,3©)ÉßÉNOLL¢×ë(ÈÏÿóטDòg Å‹D"YhߺÇ/N?s{ð­Ûo" â÷ûÑéõH¯ÌH~ˆ¤x‘H$ß—¯ÛãÿvcÓû®ÞlU*•ßzøS"y˜Iñ"‘Hš4W¿D"‘H$©á—H$‰ä1"5ü‰D"‘ŒÅlæ™§öòäγ&bñx<=vœÒò2FÇÆxåÅ‰ŠŠ\°ƒ+Å¥¥Ü-.¡¯¿½^L&G.—sûî]ZZÛE‘gžÚK\lì‚íç£ìQ‹¯×˧'>Ããñ ‰‰Žfß³ÏP]SKKk+¯¾ü%eeø|>¶lÚ4g?çXS*•ô PY]MÿàÛ¶l^˜“N"ù–æ>ãE"""صcv‡ƒÒŠr2ÓÓIˆO`Պ夦$“O~^y¹9ôöõSVQIA~Í--œ>{Žó.Ò××ÇS{ö’œÌ|7ä““8|x:Ehzƒž––ªªkèî饢ª ¯×ËÇÓËäfç W(ælgÊéäÀáOˆ‹cóÆ  þ„ññqòórùìä)JË+¸[RBlL é©©;q’˜è(bcbY¶t )ÉÉœ¿p‘ƦfR““9|ä(=½á}Ë—qêÌd2‰ ‰ÓeÏ3‹Z­&=-„øV¯\‰^¿°©n{z{9vâ3Ö¬ZÅšÕ«Q*•  R][K}C# ×ét?iX¼øý~nݾF£¦° Ÿ»%%´¶µsõÆ >=q‚ήn.]¹Š(Ì݉Ç=Öü~?ÑÑÑ,Y¼ˆU+V „iäLòHšÛãââbY¼¨ˆÆ¦&|>?9YYÄÆÆ°bùrbccÈÍÉ!=-®îغy3J…’s/¢RªX¿n-‹Š ‰™Þêl¦ˆžÞ»—âÒRœ.™¬^¹’Òòr¢"#)*( )1‘§÷¤—ËEzz¦ˆˆYÛcÊédǶ­˜L&&&'éîéå/~òùùT×ÔÒÚÖ†1"‚¥K©¨ª":*š¨¨H–,^D\l,­í파ŽÒÜÚŠN§#$hÔj X\TÈ™sç1èuÄÅÆ’›“CFzúœ2) RR’‰aåŠå }lééíÃ`0°~ÝZÊ++ikoG&“…3œ)äçå²níš…ÞÍGÚ£/ Ãh4²vͲ33©«oàâåËxÜnqþâE¼^Ig÷X‹´Zyë×)ÈÏ'3#¸ØØïlF‰äÏiÞ¡þP(œ_\Ãy»õ=ãã6nܺŊeË0 TÕÔ‘ž†(ŠŒSߨHYe%ùù(ärî—`6›èï 7;‡–Ö6‘Éd¨TJ’“’ˆŒ´²aÝ:ö8Ⱥ5«Yµr§Î£±©™ÿò¿ÿ'|~?‘–Ï—Y³jô„·£T*ILH@­Rqöü òIHH =-ËW¯184ÄÐð{w½}:ßw¸L …•JÅí»ÅF²22…BlÛ¼•JE\L `A!LçƒAOUM éi©DEEÑÐÐ~ÉHNJD§Ó~^WË—cÐ/\o:%9‰ Ç—¯^eph¿Ï‡ Š„A …ðÔûax”âE¥T’˜˜€ ÓÇ~ÕŠüŸÿí¿ñìS{Y¼hÿçÿó¿ñÜÓOIsK ƒCÃR¬M“ÉdhµZ6oܰЧDò­(^~ååÉÈÈÀ 7 †Ðjµdgg ‰ŽŒ¢¨°€@ Àøø89Ù9$'%Ò?0€A¯G®Ý¸ÁÔÔ‰ <½g9ÙYŒÛl4·´ò%‹é触¶Ž‘‘Æm6bcbhjj¦¥­åË–²~ÝZÌ&­mm„B/½ð<~ŸŸ;ÅÅ´¶·³|ÙR6¬[KCcÓÌvl6¹9ÙäçS×Ð@_?éi©¬X¾ŒÑ±1‡†Ø¶u3K/& ›F«E.—³¨°¨È(º{zˆ‹eåŠå8›šE‘ÌŒ ÒRS±Z­ƒAòóòHIN¢`½Þ€V£áÆ­[ 344„^§gÉ¢ECAÆÇÆÉÎÊB«Õ,ØÁ5›L˜Ífªkj‚2ÒÓ1FINJ".6–¤ÄÄ…>iR¼ŒÛl¤$'a0ÈÎÊÂ`0`4P*lX¿žôÔ4 [6m$**ŠÊªjjëê¥X“H‚ àp8f½${L&Ãðc³Û¾}v¾«×¯sûn1ÿáÿVûvôÞK;@€_üú7æç±{×®y—‘HeR¼H$’ïË×ÍÎ÷­¯³É„êf »ÿe³Ùq¹\,Y´ø —‘HeR¼H$’…ö­{ü~¿Ÿ@ €Á`øÖ;ãõú˜œœ ::ZºxI~¤x‘H$ß—¯ÛãÿÖɼÕj5jµú;Ùi­VƒV+}Ÿ\òÃ%Å‹D"YhR7A"‘H$’LjÔðK$‰Dò‘~‰D"‘H#RÃ/‘H$ÉcDjø%‰D"yŒÌiø].ƒCCßIò QéíëcÜf[èr>–<_ðÕŽ{©z].×Wn£¦®ŽêšZt÷ô011±ÐE{hHñòøéêîÆét}û I$ dNÃߨÜÂþƒ‡f5}ýý\½~cæ÷Ûw‹iïèüÊ‹¢È§ÇOPZV¾Ðåœ#pñò•?ù"ûUe°®ÒÀà ï¾÷.—{οù|~~ÿîéêîùÒmœ:s–CŸáÂ¥KTVUsàð'Ô=ùâÿ\—xù6~(±695ÅÉÓgøÅ¯~Íþƒ©©­ý³}¶Dò]šó=þ` @ccï´‹Ù̦8qò4w‹‹±;ìdedòþ‡ÍÓOí!-%•†¦&¦¦¦ˆ‰aõª•ˆ¢Èí»wiï褾¡‘¼Üœ9,ŠÐÖÞFUM-¦ˆ–,ZDk{;«W®@©TRVQA~^ãcãTÖÔa4²iãŒóL|2::Æ­»wðûülÞ¸«ÕBiY96»Â‚|ÒRS¹}÷.“LNM±aÝZlv;ïüñ=V­ZÉÞ'Ÿ$+3ƒ;ÅÅ ±lérsr(+¯`dt›ÝÎâ¢",3ï}ø!±Ñ1<µw7kW¯ž5qŠÏçãÄÉSÜ-.Áf³ñÄöí˜Í¦;¸¢H8é‰(PRVÆÈH¸,‹ ÈËÍ ÷ReÐØÔÄÔ”“Õ«VÎÊ6ÖÓÓËÙ HNL"::‹Å^gz»•UU´´´’••ÉÊåËQÌ“ö‡îQ‹¿ßÏâÜn7~¿Ÿ˜˜h6¬[GggýlÚ¸Ö¶6<K/ž³s¬É€ªênܺMSK ùy sÒI$ßÒÜgü2¡Pˆøø8Ê*+¹}ç.…RV£E©T¢P(P©Uh5Zš[[9òé§ø|>N9Ëå«×¸zý×nÜ$5%­V;o~ñÉÉ ~÷λŒ!ü?—._¡®>œäô™sØlö™e |Ñz×ëåÃ?fdd‹9Ü09vœÛÅÅx½^þøÁ‡ÔÔÕñɧÇcjjŠä ZµZÍ•k×¹rí:!!Äûîg`p³.PߨˆR¡àý>brr ¥B‰J­B£ž›D.—‡ëG©@£Õ “/|ÊN™,<¬æÜùûʲ»ÃŽ(BIiŸ=†J¥š³®J¥D­RcµZhni¡¾¡Ùt9ùäȧÈrŽ|zŒúÆÆ….êÂxÔâÅçãÐ'ŸÐÖÞA 䨉ÏèíëãÌùóüê·¿cphˆ§N3088wÝÇ<Öüþz½Ž´ÔT2ÒÓ øßÉ#‰äÏmÞ´¼ii©ìÞ¹›ÍΔÓIa~>ƒìÝý$éé,Y¼ˆeK—põú RRRxõå—ˆçÊÕk(UJ6¬[Ç®'vÐÐØÄ|ùÅu:K/¦­½ÈÈH"##Yºd1%eeÄÆÆ•™Abb‹/šYF9Orph˜á‘þïÿ·ÿ„Ùlfrr’Úº:~òúk24¶3õ.“ÉP?P·ËËåâØ‰Ïxë×Y¾l霵ãââHNNbåŠås†\éëïÇbµ`w8_èÂ.ˆG-^E"""ØóäNr²³éëëãêµëØíRR’§¶ÏÛÛÜcÍl1óÓ·~BVfætöÀäY#dÉ£bÞ†?¦Óú…sc«Ô*šš[HOKE©TÒÙÕÅðÈ¢(âöx££³“„„x  MMäåæ0n³!"Ã##Ó/…ÉP(äXÌÖ­YMjJ |ÿ2ÒÒX»f5ÿŸÿþ?hhläo~þ3dÀÚû–IKM!3=Ç}ÛQ*•‚@Uu yy¹è´Z¢"#©®©™ŒÑÑ1rsshmk —I ›†V¤¹µ•ؘXb££E‘=»v¢P(HNL" Nç p‹3eÆh42888ÝC±Z¬¨”Ê™ºÊHOC£Y¸T¡ …‚)§“þþÙeQ@¯Ó±w÷“TTU±xQf“™‰ÉpÝÊårbccB!B!P(„\.GEúúûÑjµ$$ij}ËfvïÜIjJò‚•s!=jñ¢×ég΀•Ë—ó¯¿ú5[7obýºµüÛo~ÖM›‰‹chx˜ÉÉI¤X S*X­VžÞ»…B!5ú’G–âåW^þ—ŒŒ úð³À©)'^¯—%‹c³Ù0 ,]²„¾þ:»ºÈÏÏ#2ÒJEU*• …BιsèíëC.—óâóûÈËÍ¥¾¡²ò D`ùÒ%4·´rþÂ%êimoÇb1sçn1uõ ¤§§±yãbbb¨­«Ãérñú^Åíöpòôêï[¦¸´ìóí´µ‘Ÿ—KrR2W®_§©¥…´Ô4–,^Dm}=õ¬\¾œõk×2<2BaAJ¥‡ÃÁª+P*U”WVÍŠåËéè褦®·ÇCNv6»´”¢¢¢béâEDEEQQU…Z¥B©Prð“#ÔÖ×S[W\!cñâE ÑÙÕE^n.:nÁ®R¡¤¥­‘ÑQ¢"#ÉÌÈ **’¡¡a ó ˜˜˜d×O`4hoï``pKW®RßÐHK[©ÉÉx}>RSSÉdDFZ‰ŽŠ¢¬¢‚ ëÖP^YÉøø8™™˜L ÷>ÃByÔâ%1!ŸßOaA>¦ˆ zCƒlÙ¼‰Üœúûرm+I‰‰\ºr• /K±ö¹\.5ú’‡’ 8ŽéŽÈl2™ ÀÍn›?;Ÿ(ŠÈd²™^Á½ŸA˜yëÞ†¯ß¼ÅÍÛ·ù»Ÿÿ “Ù<3¼(~¿•Zü¾õ§w…BN0Äç÷£ÓjQ(„B!~óû?Ç‹ÏïÂoß¿Œ s¶#“Éðûý‚ˆF£žwï•éÁŸïõde2ÙÌ>+•J”JåôËo2d¬sïóeÓÏwï‘ËåÈåò9Ÿ½ðsH•J5§,–)ÜÛº7Ì®Ûé‚rÿƒgŸÏ‡F£A&“áõúfzƒëÅðQ‹—{ûøàþ?ø³kÉ£å[eç»t÷_d2Ù¬àº÷†­\.C£Va2Íz¦(—ËÑjµ³Ö0u¨J¥šõR™Ífg`p§öìþÂeîüƒÌxöàþ>X–{_±Ïóý|ÿç+çÉ«þàg/¤ù^Ú›ïø~eZ×û–½¿Ž´Ú…{”ñ°xãe¾ýðg)Ö$’¦o–wùÒ¥ädgÏÿ"ÑŸH§Óñ“×_#9)i¡ëE"ù^Hñ"‘HÚ·nø#""ˆˆˆøNvÆh4—›»Ðu"‘|o¤x‘H$ Mš«_"‘H$’LjÔðK$‰Dò‘~‰D"‘H#RÃ/‘H$ÉcDjø%‰D"yŒÌiøN§ó;K>119‰ÇãYèrÎ*_ XèÝø³óù|8&&ðz½8ޝ}|AÀnwÌ›ðåˈ¢ˆÍnÇïüêúû>†¾¯\î^ÜML<\ñ÷Càp8Ëkˆä‡cNÃߨÔÌGΚòoÜf£®þóìMÍ- |­8xønß-^èrÎ(.-£¸´lÞûªr=X’†¦&þøþ”WTòûwß›5 Ú—ñù|üæ÷¿§£sn^ôžÞ^Ú;:¾p½_þê7tuw/tÑ0Aà½>¤º¶æ+—½w~|€â’Ò/]6 Q]S‹Óé\è">ÔÜn7%¥eüâ׿áÔ™³tvu-ô.I$ßÈœ¹ú;ºº¸tå*r¹Œ±ñq,f3gÎ_àØ‰ÏˆŠŒ$ ñ»wÞ¡§·«ÕŠB© £³‹®žn</V«Ahnn¡¼¢‚’²2ÒÓÒÈÎÊšóá#££T×Öb³ÙÐj4t÷ô`žžï½£³ VÄÃAum-ãã6¬V˼³wÝÛνeDQ¤¡±‘¦¦fÔj5SN'Ý==ôõ ˆFü~?===ôôö¢Óépº\üò׿¡·¯‹ÕBTdä¬ÄŸ:ͱŸaµZ‰Š´Î;+ÞÃftt”Òò *«ª°Ùí¤¤¤pãÖ- ^Ÿ—¨ÈÈyggóù|ÔÔÖQYUMEU+W¬`bb’êšZ&&&Q«U|xà Å%¥DEFb1›ihl¤¾± ŸÏODD'ÏœÁëóâr¹0™L¨U*jëëi˜^&2ÒÊèØØ¬cjkkéêîÆ1kv·‡Q0¤µ­¦¦fDD,f3#££TVU3åt‰Ó餽£ƒ®ž</‹€Ö¶vêC«Ñ©©­£¿€S†ŽÎNÚ::˜˜˜D®S\ZJrR2©))sö% ÑÜ2;îz{{Âçó£ÑhæC ¥µ_üê×ø|>¬VËc™sáëp»Ýì?p /ÑÚÞF^néé ½[ÉŒ¯;W¿r¾g`pˆ —.c·;fdt„¦–fÁðÈ(~€Á††‡ùøà!Š èíëãÅ}ûÏN"7;›‰‰Iæ›Â}ÊéäW¿ý½¤¤Dt:=~|€½ò2V‹…÷?úˆ·ÞxB§Ó“˜ORR"1dàº;‰‰ $'%r·¤”òÊJR““±Z­TÕTSZVβ¥K™˜˜ ::šÁ¡!;uŠ7_`0ȸÍFYy啼ùúkÔÔÔ2å /óãW^áüÅKèt:HJJäÖí;446¡Õj©¬®æ¯Þ~{A3~•ªê>¢¨°p&F”J%Ÿ>MZj*wKJxþÙgèéícph˜ÌŒt¢££hoïàÀ¡Ã¤¤$ÓÒÚÊS{ö|éô»%eåœ<}ú¾¸“!"“vZÛÚ¸~ó&ûóŸ;k½Ñ±1FÇÆhik£ ?Oš ð „BJ•ŠˆˆL&Aœ•W@"yTÌ¹Šˆ¢HNv?yý5–,^ÌØø8kV¯¢¨ 7_{Õ+WRTPÀî];Ù¶e ‚ ””ÈÏÿê/Ù±m._æÚõëlX¿Ž·ò&‹Š ç}ž¬P(0E˜ðüÄÇÅ‘š’LnN%¥eÔÖÖ‘Gll,ƈü? ñ  †/ÝNbB‚ R\ZÊKÏïã§o¿Å’Å‹EX¾lñ“7‰ŠŠ$  …ؼi#ÿôïÿ¿ßÛíaqQ»wídÇöms.°Z†ukVSXXÈ[o¼Nd¤u¡ÝWjjnÁï÷ó³¿ü)»wíD­Ñ 9ÙY¼ýæìÞµ“›·nÏy^ét:)«¨àÅ}ûxíG¯’œnr²³0™Lø|~ìv+–-cíêÕ¼¸o&“‰œìŒv‡ƒŽÎ."""x橽ü»Ÿý5ƒƒ ’—›;³LOo/&ÓçÇN®ß¼‰ÛãÆãõPU]ƒÛí^èjüR::|c’’šBk[;µõõÆÆÆ¨­«' ’””4+F.^¹Âº5«ùé[?!7;QSD¡P«Õ‚ÙdæúÍ›¬[»†¿ùÙ_“ž–†ßïGó64¡Pˆ;wï²aÝçq'J•’m[¶ðó¿úKÔ*5UÕs,]²˜œìl^yñE–-]ºÐUúÐ2 ¼öÊ+¼ôü>þæçÍÒ%‹¥F_òHš;n~߬R©@ (• Ü7ccãDFZ‘ËåØìöég‚âtNò.— ƒ^B¡`ttŒ‰ÉIÜ7¢N— ¯× €\&G«Õðò‹ÏϼS`6™Ø°n-¿úíïihlâÕ—^D¯ÓñÒóÏÓÔÜÌþ‰ˆ0R—‡çK¶ó“×~ŒR¡dhx˜ÌŒŒ™Ì_J¥"œÌCü<Ñœ Šx}>‚¡ :¹\†Íngjj FÃÔ”“pözÐiu( <Óõ9ïc‡‡‰V£Áãç~w:¡"àñx™˜˜`xd­V‹×çcrj €ét3(•á:Œ‰‰Æï÷3n³qáâ%V¯ZERbB8#šRÁä䇃Á¡!Žý”'wí$*2!" âœr2<¿™LÆŽíÛÈÈHçデñûüètZÜ¡Ph¦g)"¸Ýn<ïÌù©Q«Ñh4÷Å]ø…>!$àt¹·át¹ÐjµLLL†oö ÅL6À±ñ1ÜúL%ý0ÓhÔ¤§§ñ£W^F£Ñ<ôñ/‘|‘9ÏøÇÆÆeͪUôôô¢R©X¶t 5µu4·¶R—J¥äÚÓ©’ÓgÏÒÕÝÍèè(/>¿Üœ\®ß¼Iyyccã,Y¼ˆú†FŽ;FIiÕ5µè z®ß¸Ik[FƒMÖ“œ”DqI cãã¼õæë8].>=~œÖöv ÓËܺs÷ ·c0èÙ±m+qq±œ=ªêZ ^¯VCA^]¨Õj‡†¨¬¬¦¡©‰”ädvíØˆÈµ7P(”Èå2~ÿî{Ü-.ánq1¡Pˆ‚ü|êêhnm%?/÷¡¿@Z-ú¹tå ÝÝ=X¬²22(¯¬ ¡©‰þ^zþyzûúøàÃýÓ/>–ENVç.\¤®¡—ËÍÚ5«¥¯¿—ËMzzK/æNq16»ƒÌŒt››Ãë ç{¥µ­Ò²rV­XÎÊåË©kh`ll ŸßObb"Õ55´Üwì⩨¬¢`…BAnNöC}­¦¶ŽSgÏâp8ÈÎÎbûÖ­LLNPW_ÏØØ)ÉIø|>>;u†îûb$?/Ÿë7oRZ^ASS3ùy´´´RQY 27¬cQQ7nÝânI)U5µ¬X¶ NËí;wQ*•=~œ;wÃç§( ¬Z±‚›·oOÇÝK—,frjŠÆ¦&Ê**Hˆç‰íÛ8|ô(gÏ_¤¸¤„¶¶vòóòܸu‹èÈ(’ºZjjµú«³YJ$ àë>ã—8t@ܱ}1Ñ1@øe¥@ €N§Ãçó"·ÛC  bº6åt¢R©()-ãòÕ«¼õæÄFGϼät:q¹\hu:ô:~¿¯/ü5$¹L†^¯Çíöàt9±˜-DDE‘ß½ó.Z†·Þ|A˜˜˜ÀérÍ,ãr¹¾Övî}Éj±ÌŒ`h4|>¡Pˆÿß¿þ‚¼œÖ¯[KlL *• AfÊ¥R*™ššÑ œŠÖ ×ãöxÂõð( Àîp T(Ðêt¨T*o'§¦ãÀáC,_ºŒ;¶‡ÑˆÏçqöùù`܃!<Þð9kµXP«ÕLNN˜Î×­P(Âõ.ˆ8].tZíCýN…D"ùbÁ`ÎÎN‚Óñ}?™L†Ó夭½mîP¿R©œÂÒh>Ï»­×ë€Ï{¸æ™7E´Z-é©©³†¾ŒFã¬aZ•J…ágô«Õ2ó»Ýá »§—Ÿ¼þÎÅmµZ±Z?žn0¾r;2™ ‹ÙŒÅlžSxF3óU¶èèÙ½¹\~_¹˜÷9¾^§ƒ‡¼§?•JElLÌì¿™L³ÞÜÖjµó¾=o±Ì®?½^?ç…ÆˆûޱÙlÆ|_«Õê9ÇêÁeæ;d˜M¦YÇáa¦V«IˆŸõ7¥RILLôÌï¢87F†††¸[Rʸ͆R¥$+3£Ñ€Ñ8»¾L Ì&32¹ µZ=óržaž—Kç‹;nö±÷­}9óÆ‹D"ùáùÖ© ò󉉉ùNz¿r™Œ§öKttÔ÷ú9 Ì#:½žè¨(ô=»wíœsóp?™LÆÞÝOb4<Üï;H$’GÜ¡~‰D"‘H$ž¯;Ôÿð?¤–H$‰Dò‘~‰D"‘H#RÃ/‘H$ÉcDjø%‰D"yŒH ¿D"‘H$‘yçêÿº)[¿Ž`0ønOòÍ‚@0DàŸ´n ˜w&¨ïk=É»w ¿Îr¡éi“¥øûnƒÁyóH$Š9 Kk+‡~:ëbátºèë˜ù}phˆ‰‰É¯Ü¸(ŠúäÈæÿºÛ‘|{MM¼÷áGTTVñîûïÏûuùx<~÷λóæ·Ùw=ŸÏǯ~û;ºº{ºè?‚ ðþGû©©­ûÒåDQäБ#Ü-)eÿÁC””–}åv{{ûfriHæçóûiïèäwï¼Ë­;w[è]’H¾‘9sõ·¶¶qùêUbccñx< ®Ý¸É§'>#3#AøÃ»ï1:6J|\ E8aÍn' ¡ÓéE‘ÑÑ1Ú;;¸~ó&±11ädgÍúà)§“ßþþFÇF‰‹‹EÿOÍú¨r»ÝtvuQS[GgWñññܺ}‡øø8 <Õîe{¤­½k7n²dQòéÄ2~Ÿ¥RÉᣟRV^AZJ ZŽááaÃI‘T*Ž;Ž~:!Þ`@.—384^F1ô¸Ýnúúûq»Ý3¹ú·ÙÐët}"”pr›q†††Édè´ZÜn7=½½ü~ ~¿NŒŒÓ?0ˆÇãA¥R!Š"ý8&&Ðiµ(•JìG8·Áô4Õ—®^%!>žÔÔ”y÷e&în„㮽½ƒ)§ƒ^F«E£VÏYo``ýÕ¯ÑhÔX­Öygq”ÀÔäï¼÷ç/^¢¡¡‘„„232z·$’_w®þ9WU™\NWw7ç/\dpx˜çŸ}†òŠJjjk9þÙI–.^LMm-DDDÉÁ߃ÛãáÍ×^CE>>tˆ£‘ŽÎN6mX?g'zzz©®©¡£³½AÏ3{÷>ÔÉXEn·›wÞ‡c»Ý^¯C.—Ó×ßÏÅKW˜œœäÅç÷±bù²9ë^¿y‹KW®`4¦{õ2.^¾LGgv»-›6QQYŸ͆Åbæ™§örü³“Ølá,po¿ù^¯;ÅÅTTU‘‘–ƾgŸáØg'±O/óÖ¯séÊUì±11¼øü>›¸~ãr¹‚¬Ì ^záyT*ÕBWå g…<€Õb!?/m[·ðÁGû™˜œÄïóóò‹Ïãr»ùèã³bD¡TpàÐatZ-í¼üâóŒS_ßHLL4{žÜ…\®à½>D£Õ`³ÙyzïžpŒ|Á rcS3¾/î6 …¨ª®ftl ZÍ_ÿåOçL‡ÜÐØH}C€VÇúukºZJ2™ ™LŽÏïÇ T*f²&J$’9=þÞ¾~ÆÆmüó?ý#Ã##¸Ý–,Z„ÛãáÿþïHOK¥³«›M׳w÷“tvu14<Ì?üýßáv»)-/§£³‹ìì,þâ'oÒÝÛKlL4ÙY³{ü‘V+]lÚ¸ž§vï~è{v¢šº:ÊÊ*øÿøDGGÑ××GJr2N—“ÿôþ A¹yçk׬žuÓår¹øðã<½g{w?I}C‹-"-5­FK[{;*•ŠŒôtâãâø‹Ÿ¼‰~:)ŒF£¡¢ª‹ÙÂØ¸×ô*;¶oãÓŸ‘›“MrršÊªŒF#=½}˜-f6¬[‡Åbá½?D§ÕaŒ0RRZÆÖÍ›çÌ5ÿ0éì¼‚åË—±léúúû9zì8E……tvuáóù°XÌ  >#dgfòæë¯ÑÔÜBdd$ƒCCx½>6®_GFz:ÇOž$>.Ž·ÞxƦ&Ì&ãã㤦¦š2»Ç/‡Ž!3#ƒ¿xë'ôôöÍØ¸ ë×ñú^åÊõëáÔ²i³§ÄŽ´ZijnáÍ×ÌŠåˉäS !$˜M&Tj;wl'7'«Å²Ð»%‘ÌøÆ=~µZ…Z£A¯× ¨ÔjDQQD¡P T*aæF‹y:ñ‹ÏïG©ËdáäîÓË<ø’Q8Bzùë{ „_B’Ëe ½בDÉ+äÁðËJ÷‡@ @0D®ø¼˜˜œà³Ó§INJÂh4"ÂLFC€Þ¾>}r”¥K£×é§³¿…?Q!—#"ÒÙÕÍÝâb/Z„N§C­VóÓ·ßânI øã{¼þãWE£Ñ@Vf&‹ ¦“C=¼ñÓ·Â…‹—iljbó† ¨”*LìzbééŒÏ‰‘{/ÞÉårär9 …‚W^|‘Šª*ý”‰ÉÉpHS&“)<ü.Añûýó¾´ç¶,<ì?s¼ ä…m 0s¼e2 ¥¹\Ž(ˆÒKk_ ׳jå ÒRS1™"¤,†’GÖœ†_.—£Rªfy€ä¤D¼^/ï¾ÿ¯ÿøGäåæréÊ zJ¥’ú†~õÛß34<ľgŸA.“óñ¡CôöõÑÖÑÁÒ%K8wá"UUÈår´ /îÛ7³VË®'žzß±‚ü<®^¿Îÿüå¿P«T(•JøÕoÇàà Ï?÷,õõ œ»x¹,Üh<ùÄl\¿ž#Ÿ#>.Žñqr¹ŸÏÇèØ­FCvV&wîsäÓc,]²×ÃÐð‚( Q« Cœ8yŠ@0@fz:éi©\ºr…¡áD1œöÒ•+LLL R)‰´F²}ËnÝ ç›OMIyè‡Q¹}ç.¯ƒÞ@AA>ùy¹´µ·i$3#¹\F}ýìQ*¼ÿÑÇô P×POnN6Wo\gph¹\ŽA¯gëæM>ú)ƒƒCTV×››CTd$§ÏžCEJË*…B¢ÀÚU«Ø¼a‡~:wË–.E&—qóÖ-jëêËå,*,äデèííDGEñüsÏ’™‘Îá£GE‘•+–/tµ>Ôîϼ(‘<Šæ$éq»ÝLNM‹cbQ±Z, ãõzINJBúúû‰ˆˆ ¡±‰“§Ïð¾gINJ"%9™LF_ÿv» ƒÁ@lL N§»Ã2 ¹œä¤$”J%}ýýFâbbáá¾Æ?’&''éîíE¥Ra1›‰0Áéta6™HIIÆá˜`hxxæÑq|\t÷ôàöxˆ0IHˆÇîp000ˆÙlÂjµbŠˆ `…\A||}ýýج V«甓ɩIA$=-½^OwOÏÌ2&“ ûôKoq±±3çVOo“““ÄÆÆ÷PßNLNÒÕÕ…(Bzz³™É©)zz{‘!#5%™Šªj>;uzVŒÈåræãƒ‡yjÏnrs²Äb¶žNáÛÛ×G__?'ÏœaóƬ_»–Þþ>bcb°Ûíáž½N!ÃÀÀ ¶{q‹ÇíÁ>áÀçõ‘’œŒÙl¢§··Û„So§$'ãóû&&*zN:f‰DòhøºIz¾uv¾+×®q§¸˜ÿüÏÿ,½œ'‘Ìc¾·ÑÜÒ‚ÝáàúÍ›üíÏNzZênãýòßÈÊÊäé={º8‰ä!õuþoýF]ZZÚÌóC‰D2×|1"ˆƒCCL9¼ñÚI›çëy÷ˆ¢Èúuk‰´Zº(‰äà[÷ø%‰D"‘,¼¯Ûã—ºê‰D"‘}ÞTTVÑÕÝÃá˜Iþrÿ2÷öojj ·Û=³ŒËž6úQIãóû™œœÄï÷Ï”ibb¯×;ó»ÏçÇívÏj\}>Çn‡P(„(Џ\.œNçL \n7>_81OCc£cc_¸/^¯—¡áaªkj¢¡±‰æÖÆm¶9I}îqLLð›ßÿƦæ™2H暘˜äï½ÏÇó¯¿úwï/ô.I$ßÈœ™û¦œNþ„þ” K—.!PÈåì~rï¾÷>ë×®alÜÆõ›7 ìݽ›ÝFqI)*• ZÍ3O=Ź‹±ÛðûýlÙ´‘3çÎó—o¿M}c#ÍÍÍrèÈŒF#^¯—¨ÈHFÇÆØ¾u+»w휵_¢(rùê5®ß¸‰k:—{^nîB×ßCÍï÷sôøqšš[Çj± W(hmkã|µJÅ«/¿4'e2@UM Ÿ£±© ™LÆÖÍ›9wá"6› ŸÏÇ Ï=Ç¡#GÆ ×óãW_ÅívsôØ .^ºÂêU+Ùºy3ïïßÏðô2oüøÇܼs›ÖÖv¢¢"ùÑË/Ñ?0Èé³g †B¬YµŠ'¶o{¨§‚îîéåÐ'G,]²˜;¶sü³“´´µ¡Õjyõ¥q8&8zì*µZÍk?ú …œ‡ãš¾Ù}qßs¸=îÜ-Æ`ÐóÜ3Ï`ŠˆàÃàñx !v=±¥Rù…‰‹zûúøøÐ!¼/ Mͬ\±‚P(ÄÅKWhlj&=-•½ü2:Ý쌇%%¥\¿q“þþ^}ù%6mX¿ÐÕúPR*•A††‡„jQúDRɃæôøKJKéíëã­7^'&&†¾¾~l6¶é„ CÃÃ8.òórÙóä."­V.^¾Ìàà±±1üü¯þ›ÝŽËåbíªÕ¬[»†—_xÑ?0@H155ÅðÈ(SÎ)”*ùö[¸Ý–.Y̶-[¸}÷îœÞ‰L&cíšÕädgóö›ožž¾Ðu÷Ðkim£ªº†¿ú‹·yqß>4j5¢(’—›Ë?üÝß’Åg§ÏÌ=ñx¼œcÊé\èjüR===ttv²zÕJÒÚÞÎÅËWÈËÍedd„ËW®†GKü~Þ|íÇXÌNœ<ÉÉS§±Z­üÍÏþ“)‚q»Šª*”*%Û¶l!::Š3çΡV«øÉ¯!Š"#£cȘ?—• œ;‘è¨hþñïÿž¥K#ŠJ•’½»Ÿäï~þsZÛÚ©®­³î²¥KÉÍÉáÕ—_dÅòe ]¥1‘åË–²}ëVö=û,³)³˜äQ4§Ç?66NBB<ééÄÆÄ02:ŠL&C„ðEG&# rëözzûðù|3CøQ‘QÄÄÄ`2™0ôx}>, ã6Â}C·2yøfŠˆ :*ŠH«‹Å27~þ¼àF#jµš¨¨(4jõB×ÝCÏ11fº Ï/ЍÕj¬ I ‰ÔÕ7 …P*??ü~SN'II‰˜M&T*.·‹·n!‚B"""‚X-‡†8uæ V«‘ð0¶\®Àh4’œ”ˆLTU×`6›QkÔüÕOßæÊÕk|°ÿc^}ùE¦¦¦P«ÔX,f6­_Z¥ZèjüR+W,ÇpãÖ-ZÛÚ(,(Àç?ÉÎÊ"7'‡`(ˆÅb&-5•ÜÜ._½ŠR¡dù²¥DEFb4P«Ô¼þ£qõúuö<ÄsÏ<͸ÍFaA©))DZ­Èdá‘/‘¹±qï‘΢¢B,3Z­Q Ç«^¯'66ƒÁ€ÍfŸ³®Þ Ÿ>'¬è |Îd2±çÉ]äædCDDÄBï’DòÌiø—-]ÂûíçȧǨ¬®&5%…Ä„xΞ¿€J©¤«»›Pp]]è´Zd2-¯w:=¨0ýÿðÅ)!!›wîpòÌV,[F(äð‘£ô÷÷£Ñjf¯#„/h2dLNNrúÜyj•™LFbB.]¹ŠÝáøZËK6»ËW¯âN•|¿@ ÈÅËWýÆËÏGœž±ñQI½|oŸ½^ïL&ïŠ!‰äaõ… ÿƒ'õ½9Áï7_Ð>øýAQç4À÷ÖE‘k7nÒÝóÅ ¿(ЏÝnnÞºMKk7oÝ¢¡±éKó†»Ýn>øèczz{© Ë÷%ÐÑÙÉÕë7èèìââå+8®/­›ë7g׳×çãÂ¥KØíŸ'y¹ý—ÜÍwÞÏ÷ÝÚ/;nCŝը„ákÅï=6› —.ãõzçü[0àÜ… ôöõ˜Þÿù–¿·í`08gùù ŒðÇ>drjêû;ß1‡ÃÁ?ø?¼÷>ÿöÛßrëÎ…Þ%‰ä™';ߟ>ÃØØ8Ë—-aûÖ­\»~ƒòÊJ¬V+/<÷,6»ó/°Z,ì{öYdrÇ?;ÉÐð0¡Pˆ½»ŸDD®Þ¸J©äÙ§ž"2*’c'>cl|­FÆuëP*_ø]æq›cÇO08~f›¢(RQUÅõ›·Â±óôS˜L&ŽøŒÑ±1–-Y¶-›gX·Ûê•+ؼqÍÍœ¿pAÑëu¼üÂóܸ}›ŽŽNÒÓÒØ÷ì3´µwpîâE4j5,.* ÛyÊ'“Ép:]|tà 1/±mËf¢££ËÈe2‡†8wþމ Š Y·f5N×çËoݼ‰uk×ÌŠqQ9{þŸ?Áàà ¯ýèUr²³úP~%¥J…Ín§±©‰qÛ8O푦O–<šæôøkë¸[\ª•+HKM¥³«‹O?ûŒœœ:»º¸pù ƒCôµ·³yãFÇÆøìôiΜ=Ïää$/ì{Ž©©)z{{9}ö€uk×`48wþ½½½lÙ´‘žÞ^º{{¦3ÂÍ%Š"ç.\ÄérñÆDNv¢(¢P(Ø´a=Ï?÷l¸—ÙÔ4gÝì¬LR’“Ù¶e399ÿåûÒÙÕŹ —Øûä“<±};*¥QIMIåõÿ…BÁ‰“§æíEÞ_Ï7¦GYÂo‘³çÎÓÕÝÃö-[hmkãüÅK_ë¸üŽŽÒØÜŒ ttuÑÝÝÃ[·éêîfúuÄDGSZ^ÎÍÛ·YTTÄÍÛ·©¬ª¢§·»ÃÁ–M›0O§±¾'pêÌÙ™Ø1 œ9wž®înrs²9vâÝ=½T×Ö¡ÕjX³j%§Îœ¡¬¼‚#Ÿcù²¥¬]³Š–ÖVÚ;:9sî<¹¹¹ä355ÅLJ‘šœLvve¸=ž/,Ÿ(2“àgÛ–Í?¾¹—Ëeøü~þQ„Í7rùêUÊ+«0è 3Ë;y’áááYÛ”Édä瑜œÌ“»vßMÏÃ,œ”Äê•+ؼa#r™LQ”<’æ4üË–†{—¯^£ª¦†þl6mmmh4"ŒF@$>>Ž•+V°~ÝZZÛÚhmk%/7—œ¬,b¢£Q«Õ¼°ï9Ôj5§NŸ¥·¿Ÿ®înV­ZÉÊåËILH@„y{ü‚ ÐÛÛKaAééX­–pÃ/—Ka~>‘‘Vz{û欅Éd";+“¨ÈÈ…®ã388„Á gÉâE$$Ä#W(@1™"ÈÌÈ`é’ÅôööÍ;-WÜWÏV+½}}Èd2B¡Ý==,^\IJ¥K(,( «»d|åqù!º7ûž\.G!—#WÈybÛ6r²³9yæ,­íôöõaw8hni!*2 Fƒ\.'3#ƒÅ‹ŠÐëõ³¶©V«yéù}3±Ó××Ooo/6›ŽŽNP(¨”Jr²³Ù²yQQQTUWãv»Y¾liéèt:RR’yqß>ª«k¸yë6ýƒƒøý~žØ±ÅEEôzîµ]_4ò¦R©HJLdåŠå‚ÈÈÈ(r™ÇËðÈk׬fåŠåÄÇÇÓÝÓƒZýùò¢ 02:6g›q±±˜""ÈÏÍ›¾¦<ü¬ ¯½ú ?}ë-~úöOX»fµ4ó¢ä‘4g¨ßf³cb‚’Òrþú/Þ&%)™¬ÌL¢££HOK£³«‹ÁÁ!ŠK˸}·˜åK—¢P(¸|õ* …‚žÞ>²³2™r:Y²¸ˆ'OÓÞÞAaA>ååXÍúúûÉÌÈ@¡PPZ^ŽÕj¥«»AE‘Œôtrsr¸qëJ¥‚îîòrrñÔ×7 åÙ§Ÿâö»Ø¦Ÿ=F ×ë¸|õ†Œôô…®ç‘žžÆÔI'ÇOžbll ¿Ï‡ †3ÆÝ-¦  ŸþûzôPTX@àz~rçNªkj(+¯ 33“â’2BÁ•ÕÕlÛ¼™[wï~¾üÈ(/<÷ÜBÿÏÂb¶088ÈÕë×ini¡° €q»ì¬,‡†¨¬ªfÓ†õÔÄÆQTP€Þ '=5Úºú™mtvvQߨ8s‘•™1;v::(ÈÏÇçó±bÙ24Z QQ‘øšš[‚LMMñÌÞ½ pøÈQ"­V\.èõzòòr¹tù Û·nÅb6sþâEL&\n7Z­›ÝNIY9V«…Á!d2*¥’‚ü<Ü7å••TÕÔ R©ÈÌÌàÒ•+457“‘žÁÙóhkogdd„-7R^Q9³¼Z­Æjµpñò¼>/ˆCB|<‚âìùóìØ¾Ø˜‡?WˆL&C¥R±j劅Þ‰ä[Q¼üÊËÿ’‘‘Ao`|ÜFeu5r¹œ§öÜn7>ŸÔäp†N—Ë…ßïç¹gž"'+‹P(„ ìÙ½‹@ÀÏÔÔ;ŸÇ£\.ÇåvO/ÿ4ÑQQTÕÔ01áÀér¡R©((È'&&»ÃAZjÊ#Óë—Hf‚ àp8æýF›L&Ãðc³Û¾Yv¾+×®s·¸˜þßþ µZ €×ëÅérát:ù·ßü–7_{%‹Í»~0ä¿ú59ÙÙ<-å—Hþd¡Pˆÿöÿý¿Ø°nÛ·n™ùûÄÄ¡@IYwŠ‹ùüÿù _²ìéíå—¿þ ÿñŸþ‘¸ØØ….’D"ù–¾×ì|F£˜˜˜YéDGÇÆ8qòã6+–/#÷K^ª“Ëå$&&i]èz’HY±11†Y«ª®áNq ‚ °ïÙg¾ô›Z­–ŒôtÔÁ·/$Éç¾Q?  …fzûbðx½ˆ‚€^¯ÿÊãÁ`™L†B¡Xè:HI~¿…B1+†^¯•J…V«ýÒõEQ$ ¢T*‹Ç2ÉÝ÷Úãðbá^¼á·“¿ŒRù>Z"‘L»ÿÆû•JõµçO¸÷²šD"y¼HsõK$‰Dò‘~‰D"‘H#RÃ/‘H$ÉcDjø%‰D"yŒH ¿D"‘H$‘møÃ3ûµ06>þ•˵¶µ34ÖÖQ\ZŠF£açöí¤¤$ÏÚ±ñqö<ˆÝá`ttŒ½»ŸD£ÑüYµ\® µ­â’::;Y½råŸõó%’ïÊœV·¼¢’'O“˜€Z­¢¯¿Ÿ Âd¢´¼œËW¯ÑÙÕÍÅËW°Z-ܾ{—ó/rùê5ªkj)ÈÏ£²¦††Æ&þ„¾þ~@¹|õW¯]'ÒjåúÍ›467!—ɘï’#Š"—®\¥º¶ŽÕ«V‰(ŠÈd223ÒÉËÍåȱc´wtÎY×l6a4’œœ„ÕòøN Ü?0ÀC‡IKM%77¹\Ž(Š˜MfÖ¬ZEGg''Ïœ3\ï÷øøÐáYÇîÊÕk”WVN§ÝD&Oþ²tÉ:»º¸qû6—¯\¥´¼³ÉÄþéëïçÆ­ÛLNM¡Õj9zü8iii—–RYUB® 9) ¹LÆG099¹ÐUö'ëêîáÆ­Û„B!*«ª©©«åÜÅK—–‘’œ‚\.£º¶–ÏNŸ&:&šSgÎR[WOum%eeÄDGÏ™DçÁúE‘‹—¯Ì©Û+W¯ÒÛ¾Ñþ`ÿ~›šùøà!4j5‘V+—¯^£±©‰öŒÙd"ÂhÄétòþ‡áp8…Nž>ÓåüÂòMLLðÇ>$ E äè§Ç¦° SD2À`0°lénܾM]CG>=ÆÀà ‚âƒ>Æf³qþÒ%ô:ãv;W®_'33“ÏN¦··•JIFz:ÃÃ#|òé§sF’´ V«•¨ÈÈð9#ÿóVúý~L&¹¹¹3,¿ïQ‰äû0'zr²³ÈÏË¥¢²Š‰ÉIºº{èé饭½—ËŔӉ(Ф$'ñôÞ½ìÚ±ƒòŠJÊ**Xµb9›6l 59•JŦ ë øÔÕ7àñz©­¯gó¦<½wéiiˆB8hæëå ‚@CSkV­býÚµ$'%!Š"J…‚¼Ü\vlÛJ¤ÕJKëÜÇéi©ÄÇDZ~íZÒRSºŽLgW:Ž'w>AQa*¥D‘ø¸8Ö¯[Ë–M›hhlœs‘U©”lÚ°aæØ¹=ác·nͶlÞD~^.2™Œ¤¤D6®_G^N££cÔ540<üø%eå$'%ÑÜÒBA~މ‰™hk{;éiiŒŒŽ"Š"""1ÑÑ$ÄÇSY]MrrÃ##äædèéí¥¢ªŠá‘QžØ±ƒ–Ö6œN'È@«ÑN]Ê©ª©Áb±<¶™ÇâcãpØ””•ÑÛÛ‡ÏïG$.n¡ëyAX,fT*·ïãr¹ÉÎÊ$+#ƒ‘‘Z[ÛÐjµ¼¸ï9úúû9ñttva2EÐÙÕEqiiøØ=ñEtuwS^QR¥"66™LNa~>.§ «Õ¦õëé ¦®¿ÏGVV&‡´ÔTL¦ü~?……L9$'&‘ž–JSK d¤§³dñ¢¯L,ó°1  S]SƒÁ` ¨ ÇÄ—¯^C­Vóä;X¶t .·‡ŠÊ*ìv;™™ˆ¢ˆÕj!-5•†¦&.\ºüåõ_X@ÿ@ÿçu›™Á’Ã=ùëÖ±yãFâbc)-+§¥¥•‰É –.^µ7è`íš5l\·Ž˜˜hnÞºMeu5v»ƒ½OîÂ11Ífcbb’»%%´wvÒ×ßOT¤•òÊ*ê)ÈËcÛÖ-dfdP[WG]}‘Q‘tzL&ééØí232X¶t)MÍ45·¢R©HOKeÊé$?/FCVV&‡ƒ‚ü|Ìf3õ„‚yy¢À•«×èè줽³“èè( òóéííÃåv‘—“³` ¾¤F_ò°‡Ã1ï·­d2þ€›Ý6v¾`0ˆá¡áû6á»Þ«×opûÎþáïÿ£Á€L&# á÷û™œšâüë/xé…çYµb~¿•J5,¢(âv»ùÍþ@^n.OïÙC0Bù%A …fù½ƒ”Ùïë …Bááèû.XÖéƒDQ$Ì:v>7 Å—^ü¾Î2÷/û¨gi¼WW÷'Í ÈåòYå …BÈdò/|‘n¾m~Qý ‚Àÿëÿúï¬^¹’­[6ϤÖõù|„Båœ9ÿú_þT*ÕœlšÁ`®în~÷λüóÿöODGGƒ(Îûì\‚Áà¬õEQ$ }e¯û^ö¿¯#H™%’oá[eç›/Pï¿ (•Jtz:­v&H9uæ,£ãc$&&’›“ÌÍ &“ÉÐétXÌftZ]x{_qѰQxÔŠ?·ùêê«êO&“Í›ýíë\Äÿ”!ØB–Æùêj¾gÐÊ9ûuê_«Ñ Óig}€;ÅÅ”WT☘dǶ­3#(~¶R©Ä`0`µZÃï&Èdáæ!—Ëçãïú\2J$óöø¿ŠÇãÁãõbµXf~¿ßÏÈè(Á`ˆØØô:Ý—ncrr•J…î+–“H$s‰€ÝnG§ÕΊ¡‰ÉIl6:­Ž˜Ø_òö{0djj “É$ÝHK$?ߪÇÿUt:Ýœ[­V“œ”ôµ·a2™ºŽ$’G– ˆ´ÎýªªÙdÂü5cK©Tbµ>¾_w•HWÒ\ý‰D"‘ññ1®ß¼EKk+z½î‘œÛáa‰¿ßÏ‘Oqüä)tZ qqq8].nÞ¾M_?1ÑÑÊ**¨­«§¯¯Ÿ±±qÊÊ+P«ÕDD©oh µ­®®nÌfóæMèé饼²Š‰‰I¢££¨kh ¢²—ÛM0$&:¯×Ktt4~¿f¢£¢P«Õ  qëöúúúñùýüîwéèê$"ÂHlLì¬){g—KKll šyf4üs·Ù¨ûŠã¨Óé0³Öä¿þ5]]˜""ˆ‰Ž¦¥µ•âÒRÓõÕÕÝCuM-5µuLM9iln¦½½¸Ø8œNçœóg!ÒK~_w®þ9 iY9ïïßOtTr¹½^Çoßy™LNiY9*• ›ÝÆ{~„A¯çêh49{þ<³™SgÎa4¸vã­íí ¢¢"innáàáOP*œ¿x£ÁÈÈè(©))ó6ü×oÞâ̹ó$$ÄÓÖÞA~^.ƒƒC„„Fƒ —.‘›“‹É1k½îînÞºE¤ÕJFz:±1_VÂ’±±1~óû? Ñhðx2ÒÓ©¬ª&?7—;ÅÅø}~²³²f]l¿÷´ut`4ˆŽŠ¢±¹‰“§Ï`1›Ñôˆ‚Èí»wÉÍÎæÆíÛ¨U*††‡9{þ …œ«7nŸ—ÇG004ÄÄä$§Ïœ%11ó/“‡€Hk[Ý==”–•±rùòy§©}˜=,ñ …¸[\LWW7ii©$&$°ÿÀ!lv;íá„Zf3ÿã_IlL ¯\ahxA¸~ó&E…üâ׿ÁëñÒÑÙI]C#K—,ž3n[{;ï¼ÿ>r¹œ²òrÜn^¯Þ¾>ÒRR¸pé2‹… —¯ Qk¸xé 6›mfâùÝ;$ ¡ÑhÐiµÜ.¾‹B¡$#=”ä¤Ù¹ î/Wj ™é –È©¼¢‚÷?Úÿ…Çñ䙳DZ-defÎZolÜÆå«×P(”df¦ãtºøèãƒèt:®^»Nrr2·ïÞ寭Ûèõz9BtT¥åå‚AÜnï}øáÌçªU*ÒÒR¥œ’9¾nÃ?ç¶12*«ÅŠÍfÃjµÐÖÞASs 6›±±qÚÚÛ …RSRxû'oòäÎ'¸vý:×nÜ`ýÚ5¼òÒ‹dge"—ËIMIÁï÷ …ÐétÜ).fÓ¦ üôí·ÈÌÈ'hð<á…B”–—³qýz^zþyòss•JÉúµkyãµc4¨­›;ìYXX@FF:Ï>ýE… },Lsk?yý5¶lÞ„Z­FEÒÓÓyé…çÙ½s'Å¥¥øýþYë)ŠYÇN«Õp·¸„MÖóãW_aíêÕÈär232xñù},]´ˆîž^î–”226ÊØø8Ý==Øl64j5›7n`÷ÎDGGñìSO“œœÄàБ †@ HwOï#ùLøÿßÞ}>ÇqÞ ÿv˜éI˜€œ 3)‘¢,Q"E‹¶lËrØ»­Ý:Ÿw}å}qýºººPuu{åÚ»-{-­´^Ÿ-'Ù´•mÉ¢(€"‰œˆg0&wºƒƒ(JÉçS œéé~ºŸiüºŸ~žç·YÎÍéäàýlß¾o½ð©Tж‹íD£ D"óôôöaš&åe¥|í+ϱ³¥…Ö;øòÉg‰Çã$’I4§Æ³Ï<Í÷¿÷=Æ'Æ_Û4}¾­ªÊJ¾ó×ÅÉ/~‘?úˆD2ÁÞ=»ùÆ×Ÿg÷®œ=Ÿ}75=MûÇóeèí룫»˶øÎ_ÿ_>ù,û÷íeǶíü(<|dÍlá~}ó…¯ 6¬®oVÛš›Y¯ËKcC=;¶g÷ñá‡ârÇFFG™ ‡™œšbl| Y–Ù·w7Ïå9JKJxòøqìßÇÄä¦iæ·ûÔ‰|pæ ú:S² ­Z3eoyi)ùßâï½ÏK/ÿ ßøúó””óÀÁöíÙK<‘À¶m?ø µµ5üó+?A’$?ssabñ8]G’%,Ëbfv–…ÅEb±Øò‰cãõxðû| ŒäßÃ4‰ÌÏ36>Î|t¿¿ˆÙÙ9Ò™4Õ¦iضÍèØ5ÕÕ}²£rðùXZŠqux˜H$‚¹œu1‹1=3ÃÀÐ~¿Ÿd2ÉìÜ !Iàóz9|èõõuùº+*Ê¦Š G"¸–oîG’%dY&à÷SW[ËÇŽñä‰'¨­­ÅXÎÓŽ’$cÛ²$aZ&§^ÙÙ9öîÝÍÕáalëîë(¸YΗ"ŸEQXZŠ12:Š"+„‚!víl¥¡¾Ÿ¯I’®ÕY>[&Ùä<6X¶E2•bzfY–Ñ–›åsý8Ü.¡`žÞ^†GF¢8BQ‘33³ŒMLPS]M,Ç¥i„‚ÁeH¦’,,,rux„²Ò¼^/²"319Ed~·ÛM$¹î~UWUmh2ŸÖc<d;;æ:`ʲL(Êïãüü3338°Ÿ±ñqª**(.Î>žD zð<ÏF¶Od³œ/–e³g×Núéíëãû üœ=á‘Q‚ee¥LLLrðÀ¦¦¦ …‚TUU22:ʞݻxëíwèéí¥·¿ŸÇ¥¡¾Ž¿ü žùˆsÚˆD"}ô¢óQÞ?}šL&Ã׿öU2™ ]\¼t ÛÍs_:ÉÅK—ØÙÚJÓ–-œ=žá‘Q?öí#º°À[ï¼ÃÕá¶65QäóqúÌTEE‘e^|ùηµ­Ù¯¾¾~Zvlß°Ä^#££üî÷ׯǞÞ>ìÛKÿÀ ¿yíw´]¼È•ŽNêë(+-åô™3ȲÂC‡195Å¥ËWˆÌGhnjbi)†Ç㦱¾Á«WÙ¿w/‹KK(ŠŒÏëã·§Nå·ûüW¿"r,ëºÕ¦þ5Ùùr·°mü~?²,cÛv¶ÖÇÍŸOŸæï½ÏßþûïP ár¹°mH§SD£ ü¯ü€/Ÿ<Ƀ°‹áv¹òÐSé4óóó¼ôÊ+ìÙµ›gžz’x<ŽËåÂ0Mrmeªªât:Éd2$S)4MÃép`Y™ŒŽaèø|>dY&•JåwT–e4M²¹ÉUU½'R¿Þ.˶‰ÇbÈŠ‚æt"Ë2º®“J§qiš¦aFAs¿„ÙÍßÇWÔ]&“!‘Hàv{p8T,ËBUÕü¡¢(èºN"‘À©i¸4 Ó4‘eI’0L‡ªbFþµÅÅEdEÁ¥iwe.öÍv¾†a˜hšI’H$†ÛãAU ÃÈÖ™eeÈ2†aH$øÏÿõ¿ñÂó_cÇöíü~lÛ&•Jå‡l*Š‚¦iX¶M:Ʊ|n™¦‰®ë¤3¼–eñ_þûÿàé'ŸäÈáC+ÊàPUlÛfii Y–ñx<ȲL:Φ–eÒ™ÌM÷k#üñ½÷ùÓû7®ÇçNžäƒòÙÑré•EÉï£ÃqíüRT·Ë•?ƹúPÕìùeþàôší Âzn;;Ÿ¢(5(*è©jÛ iNÊÊÊp,ÕÉÉ þøÞû̅øÝn¶mmÆétRR\¼b].M£¢¼œ"_Š¢ (J¾7÷zݺœNçŠ_²,/òkWý×;Ä ’}¼úQ‡¶ðsÖ»8r¨*®‚e`ýº€•¹Þ‚ïOázsß•Â×{f{'l¶óeu]®nAÉ5“««êL’²kB¡P>»Ÿ$IëÞ]Ë’„»àÜÊ•+w¾õöõÅ©­©^· ’$­ÁQø}\/¥÷f¹€¿Y=n]®Çõ:©îca=®–«£ÂójõváÓXÓÔ+ü~?ÍMÍ”‡òWßÒòÕzeEO?y‚²å¡.×SS]MC}ý†5Û Âçån8_E¡±¡ÚêêOý ݶagk+÷XÏó;Qwj»‚°žÛnêAáîs«Mý¢k¨ ‚ ÜGDàA„ûˆü‚ ‚p_Aî#"ð ‚ Â}dÃ2™¼íy§-Ë"•N‹œð·À0Œì±ÖuÉä§:f¶m“H$V¤ä5M“ÄòÔ³ÂÝåÓÔeYĉÇt]'™Lnôn}fÉ$¦i}ú ‘ jY?þç—¹téòm}>‰ðÃúñò<þŸT*EWwϺC$îW::ùÑ‹/ÑÖ~‘üánz±599ÅÈèèºïe2:ÿƒ`ph(ÿÚøÄ?ø?ÿ˜Ÿ£\¸{ܬ.çrXkff–ÿù÷ÿ›h4š­íâE^þÉ¿®;–x=wËù•N§¹ÒÙÉþáÿòÖ;ï019¹ÑE„$Iº6ÇÄòïù®ÅyÕ¶m¢ ÑÁß¶m,ËZ1sTnšÕå¶lÓ0QU%¿¾Â©tW3M“x"Nt!J8^w¹¤"…Ÿ×uEQ˜cbj’±±1––q»ÝùD$¦i¢(×Êa[6éLmyY˲ò³kY–…aùÌV›œšâׯý–ûíoÝ•9ãÓé43³3ùc‹Ç¡¨¨hEzÿô$ žûÒÉ|=躎ÃáÈNÝ›Œ39=…×çEs:‰ÌGH$ã„#aÒ™4–iac_wý÷ºÕßÛõ¾“7³úܱ,+?Mò¦‰Ä檧 §N^muÝ­Þ?¼ñ[8|èÁ|9 ÃÀ™«÷Dœ±‰q2†ŽCU‰.D‰ÇcÌ…çPÓ4ó3®çn9¿æ£Q~öê«ôöõÓÝÓM<ãñG‚˜SgS‘6Y…ØØŸ[¹ Ó ­h-<.©T*›øé¯ÿÁ®¬ªÜ°ƒbš&²$#É·qPììŽfÿÀe3ËÝlùÛ9ö¹?Úª¢Þ'ùræ5Û¶‘%˲ù†(Û”yýÀmæò…`.Ë›iZ¨êýèïf7«»l]_'pœƒ…Ù–mÝòEßÝt~麞¿ s87¼>_º¡3'£g`j«k+–K$X¶Ïë]ñ™Âu¬(Òšî ’$14œËåÒ%™Æ†þÀš9u ƒxî÷5Ë å¯zÒ™ éT ¿ß¿¦<¹O‰À/‚ ܳ ÃD×õ‚X–E:“&“Î`˜&.— —¦aY±XŒx"A,ò-âñ8‰T§Ã‰Çífxt]×ilhÀçõ¡ë:±x§Ã×ë]Ûs_bÝ9 ༴ŒºÚZFÆFŸœ àH&I&¸Ýn\.ñD—¦¡( ñD§Ã‰n$ \n7·›T:EF×±,“ùh”p8LÓ–&üëMÒ&‰À/‚ ÜËÖif—$‰‰ÉIæÂs¸4†i°­y+Ñè³s³¸\™Lv Ùð‰D‚x"NyiKKK¤3iæÂaªƒÁ«Ù©Ë3ºN]M ¥%¥·ü •N±‹‘N§q»ÝÄ p8èºÎ–ÆFÆÆÇ ø”–”ÐÛßGey³ss¨ªŠ®ë475333ÃlxŸ×G2•d)cfvÛ½6ð‹^ý‚ Â=­ Þ[¦I0dgK+n—›ñ‰ fçf©¯«ckÓV¼^¡`¯×‹mÙ¤ÒiJJJ(/-§©q ñDœÈ|EQI§Ó„#‘u‹°^ßÛ¶Y\Z¢°Ÿt&M]M-áH˜X<†¢¨,ÅbÄbqJŠ‹ G"„#ªƒd*{±[fqq° C´îh¡¶º†P ȶæ­hš¶naDàAî ëX‡C%™J’H&H&“Äãq4§ ØùiãuÃÀ4MlË"“É0tuÛ²Ñ\Z~ÚsÃ40 ›ì´¼>¯‡†úz*+*×¹Û—®ÛêP]UE뎰!™J!IN‡“¢"ÍMMBÁ†¡3<:BIq ªªât8®- eË¥((Š‚,+ù|kÊ"eûˆÀ/‚ ÜVXÛ¶)Sä+¢§¯—®ÞnE¡¬´ Û¶™ž™¦³§‹Œ®S[UCee%ãããô ôg{õ«Ù`º[B× ªJ à'‘L0<2L‘×G("‰F1͵sñK×Χª*²,ð(/+c|bœ` ˆËåb.fqqËÎ&“Ëv0´)…(-)A+Xƶ,EE‘eìåN‡HCƒÙÇë éôéÓvKK˦™éHA>)˲˜š™¢¡®nMò$kùîݶmœN'ªªÒ?8@:¦¦º·ÛÓáÀ¶mRéT>i•ÓáÄ0 Ré4‡‡ª¢(J> æ²½fïÖÁ¥¹V‚ ½ægÇ ‚ÀíÐϪLŸW9DàAîz’$¡È éTÏ'È{ÿY¦ÊÍd2È’œÿý†MðŸ1Û¶H§38øA„»Ÿ$Iøý~‘yæ£Ñ.–eã÷€é™Ydyãný³ù TŠ|E"ð ‚ ÷·ËKsmšQj…óx½¾ /—,ËÌLψÀ/‚ ÜV'ÍÙ ƒýf)—˜ÀGAî#"ð ‚ Â}D~AA¸ˆÀ/‚ ÷‘vî“$ YÊf²mòóždYÎNÆdƒeÛŸ[¯Èìv¯uÄ0MóúÇH–±,ë—­pZHAAø<Ü0ðÇ ‰ÅãTUVQ[S½b¾àëÉaÈŽaü4,Ëbdt”‰‰I|E>¶44àóz‘dÛ¶¸^ÌÌâÛeÛ6CW‡³™°qi ÙTŽ«„Ãffg(++£¤¸ø–·‘ÉdÈd2x½>6IGOAá>pÝÀoY¿øÕ¯Ÿ ¤8DÿÀ ßxþk8ÎüÝ­¼œV& ˜˜˜dxt”#‡­y?óËÛvv~ååd…ï_º|…_þæ7ÔTW“L¥ÐžzŠæ¦-œ9ó»Z[(..Ʋ¬Û^XXàâ¥ËPÛË-Š’ÍSœkɰÉÞɯ.›eY¼øòˆAyYÁ`ŠŠ ¼Ov–˺°°ÀK¯¼‚Ëåâ‘/ÎÄ亮³w÷.FFÇ¥©i >¯—âPˆÁA&&§˜F©¬¨àû1 ƒómí,..âõz9°o/‚ R‚ ‚p»”ï~÷»ÿ)›¥h%UU±m‹÷?ø€¡!Š|E„BAN½þ‹‹‹TWUñòO~JMM5¯¿ùcã‡(*ò3<2ÂØø[››(/+ãg¿ø%éTšÑñ1¦¦§ üðÅ©«©áƒ?$™ÇétòÁé9x`?š¦aÛ6^¯—ŽÎ.Î_hÃ0t*ÊË ‡#œ½pÊŠr¶lÙ‚žÑ™œœbjz† míx<úilh ®¶†×Ný·ÛE0àÅ—_¡®¶†ŸþüçØ¶Ç㦲¢‚žÞ>æ£Q¶oÛšüo¿û.—;:¸r¥“™¹Y??úñ‹TUUÐÛ×ÇÌì,E¾"º{zÙÕÚJF×yíÔ)¼^—/_aaa‘Á!>üè#ÊËËãì… TT”Sä+bvnŽ m™ ‡iko§º²’7ß~‡ÆÆΜ=ÇÀÀþ¢"þðÆ›´ìØNiIÉFWA„»˜$IÌÍÍݸWÿS'Nðwÿá{TWVò£—^b``ˆC¤«»‡ËW:piNš·4Ñ´e ™L†ÅÅ%‚Á;[[ØÒØÀÉgž!JÓÙÙÅ\8L$2Ïèè¦iQZR“O<ÁÖæ­477qü±ÇH¥S¤Ói Û<ßP_Ïü»ïóıÇ9}æ,?ÿå¯hnÚB]M O{œÛ¶áõx0 ƒd"ÁÔÔ4 õuÔÕÖðìÓOS]U•ßÙ\'ÈW¿üeØŸ}¼ e˶«µ•“_|†ÒÒFGÇèìêâ©'Opâø1ÊÊJ7ú‚ Ârݦ~]×9ßÖŽÛ墾®UQ‰ÇãìÚÙÊo½Í/~óž>qMs²³µ…Šòrþß«¯âq»©­­aii‰¡«ÃhN'¡Pˆ­-ÔÕÖâóy±–ŸeÛ¶µÜcß&ûÔ|9gò²þÁAfgç(--¡¢¼Œ¥X $ ›á‘QÊËËyówXŠÅس{7““È’L&“aèêU¶mmF–e¦§g(…ˆÅãØ6|áÈÆÆÇùéÏ^¥ª²’’’btÝ`ksS¾9ݶldIFQTlÛÆ0t,+Û-²e[˜¦…mY”•”ÐÛ×GÿÀ}ý””” ª*,÷…ðû‹dgk n—+ÿBmm-#££\fÏîÝ„BAÚ/^dxt¿¿ˆ²ÒRæÂavïÚE8Îvž+/gjzš=»vár¹èììâõ7ߤ££ ¯×Ës_:IIq1¦iÒ~ñcŠ‹C‡BôôöF)).æÐƒÉd¸ÜÑAcC=¡`ˆ3gÏ226†Çífû¶m¼÷Át÷ôRUYÉÃGâãK—™šž¦uÇŽ|îé륻§®žnÆÇ'¨®®"‘H°{çN≆aÒØPO8’Ýšêj¢ œ;løÒ³_$Îàñxhnj¢´´„+œokòlþ†a*á/*¢¡¾ž±ñqš›šhٱΞ§£«“ññ ~øÈ'1 ‚ «åšú¥Ó§OÛ---ëv³,‹t:o"Ï5™¿ñÖ[ ñ7ßùw(Š‚®¤RI4MËç¶, ˲PTY’I¥Ó˜¦‰ætæ{¾ç†ÝåÖ»º‡¾mÛ躎aš¸4 EQòå4 Y–‘e™D",Ë8 Öm&ªª IñDY’òïgtL:ÛíFUÕµ# ÈööÏÝ‘K’´ÜçáÚH†Üë¹×r¿ëºŽ¢((Š’ûŸ{ß0 R©Úª} Y–òÇ"·žñ‰ þ饗ùþßþ 55Õ¢sŸ ‚pÛ$I¢»»ûÆãøeYÆívçÿmÛ6™L†®î:t§ÃiY8*GÑšÏæ©mÛkÆÀç&Ç) ¶…¿ç–q:8 ¶Ÿ£ª×ŠîñxÖ|Îá¸ö¾wÕûšÓ¹¢<«· äƒ÷ze.Lµ˜ûaS}îß«/bEÁëõ®Y_a9$I¢«»‡ ímÌÎ…ÙÖœm-A_A¸n+-ïS'ž ¾®sfò»×Ù¶MUU%ûÍ}ȲLCC}~”ƒ ‚ |ZŸ8ð;Z[ZD0úŒŠC!@LÞ#‚ ÜY·uÇ/Ñg+7óŸ ‚ ÜiùÀ/‰1c‚ ‚pÏS#‘ÝÝÝ]AA>c‘H„ÿ7ðƒjèšå%tEXtdate:create2013-08-30T12:28:19-04:00¯Û(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshotï¿>IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/transition_file.txt000066400000000000000000000020321330160122500247170ustar00rootroot00000000000000This screen shows the 'file types' of the specified 'class' that will be created by processes running with '%(APP)s' type in the '%(APP)s' directory. SELinux allows policy writers to define file transition rules. These rules define the label of a newly create file system object. By default an newly created file system object will get the label of the directory the object is being created in. Creating an file in a directory with the file type of etc_t will get the label etc_t. In certain situations SELinux aware applications can override this behavior, for example the passwd command creates /etc/shadow with a type of shadow_t. A third option is for policy writers to write a transition rule. For example a process labeled NetworkManager creating content in a directory labeled etc_t will create it with the label net_conf_t. File Transition Rules can be written to create all objects of a particular class, or specific to a particular file name. You need to build a policy module if you want to add additional File Transition Rules. selinux-python-2.8/sepolicy/sepolicy/help/transition_from.png000066400000000000000000001733771330160122500247350ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýw\Gšà þž‘©µ†ÈLh­5YÅÒSÕ]Ý=¢{¦{vvflwÖÎÎö½9»3»ÝÙÝž»ÙéÕ]U,ª*’E ‚ ´ÖH¤ÖZFd†ŽxâþˆŒ@&A`‚„ÿÌÒ23Ÿ?wþ¾ÏýóÏ?—^}õU›Ïçûi~~þ¿µZ­kMÓ´"à[$I‰D"Ñ299ù—†a¼©æççÿáŠ+þ?¥¥¥…6›m¹Ë'àÁbÅb›ûûûÿ׎ŽEºvíZãš5kÖ«ªŠišË]8@ I’ˆÅb4555ª@½ªª†±Üå@ð0M›Í†ÕjmP ð†!fû@ |Ë1 ⚦IúG Á·J_ ‚o9i]¯¦ÿÊ_ ørH’”ù;ý-ü,ý¹$Iw¼gK}ö ʱ°,K¥K•à‹ß?}Ÿ…×-õ™@ x´H¿û* LýÁ—@’$’É$ÁpÃ0°Ûm8íÉáH01M°XTÜN'ÁP§ÓÕb OKÄñ¸\È’Ä—}%IÂ0 fƒ! CG’$ì6»}ÑÀBtÓ$ã°ÙÑt Ã0p9_è^¡p˜x"I–Ǫ(¦Ip.ˆ,K¸]®å~,Ác,I°àýNËûqÔW…Ò¾s¡ïz”ËM-hšFÝŠZþìg?ærs ¿úÝ{X-*†a²¢ª‚?þÑ÷øË¿û%?{åeÖׯÆ4M[Û8sé*ÿâçÿ·ËE굕2qY–1 I’`þ[0æ¿[èŸ3 ñþêoñÏÎbQUJ‹ ùÁ ϲº¦*# 0MfgçøÛ×˳Oîaxlœé?ô£ï!K²,Ï×,u§´Yx/I‚÷ãĹ‹üÙü„í›ÖÑ?8Âÿù¯RYVÆŸþôG8¶TIMcÞұк`f>»•&ui¾†`æü½ÁÄ0n ^Ö€‘ñ ü³s¬ª­àfG¹Ù>J îzÍ"S¿x‚/†,Ë´vvsæòU~øâsT––‹Ç±Ù,D£1\NþG?Ãf±`³Ù$‰Ù¹Éd2¥ü ƒ¢‚|¶m\‡iBïÀ†iH&)ÌÍÅbQŸš¦´°`8L4ËÜ»¸ €ÁÑ!v¹¹È²Œ®Ì…B|ÿùg¨,-áµ÷>ää…KTW”1:>I$¥(?Ã0†Â$“IVVUR\„ÂaFÆ'°ZTtࢤI’%Û›EvV¦)‰F™œñsäÌ9VTUpìÌy†G)ÈËE7 †GÇñÏÎár:)*ÈcjÆO2©O$Èöf‘—“ÍØäù4%… ÁÈØ8ñDY–ÉÏÍÁfµ24:†ª¤2Áp˜¦Ö6tÝ /'›†U+Pe¹»‚@ðµ#IcSÓ|øÙ1ölÝHœ¼p‰ï>»Ÿ’‚{êtÓ4…â¾ ¦aŸ“Ca^.7[1 ƒMk$$‰¹`ˆÏNžAVdÖ®^IÃÊé‰jæ}ëæø¹ ”ñwoüE‘‰Åã”±cã:Þ;|”õ'ÈÅÆfzúÙÐPljóÙµeg._åûÏ=MAnî|~©<¯µÜ¤g`X9Ûå$Ç祣·öÓa³XøÅ›oó‡ßûÙ^/¦ibu+ª E"¼õÑ'ô ³®~5²$£:ÇÎ] op˜`8ÌÓ{vÑÒÑÉÄÔ ªª * ú³sâü%ú‡˜ …yqÿ^â‰ÇÎ^Äa·1å÷óÞcbzšæ¶žÜ¾•ªòRÞxÿcŠ ¨,+¡¶²ÕáøÒK$Á7Ó4iXYËøÔï~ò/?³µ«WÝÓÔŸöÅɬñ ‚ûG7M*ËJø×ÿôilmçjó Î^¹ÆŸýÁOH™­NŠ¢`³ZI+fiÞ¤žphºžùûé'öàq¹øí‡Ÿ01=æ­Õ0M¶mXÇÀȯ¾û>¯<{€kê¹åœ;_0I"Ëãá§ß}‰Ò¢Bþú7o²kóFvnÞÀÿùË׸t½9cz7 Ý0híìapdŒ¿ø£ŸQTG2™ä¯~ý7Zq:x=ª+ÊÑu=µü`šæå±º¶š×~ÿ!/ìÛ‹,K ŽŒiRSQARÓi¼ÙJck;¦i°¡~5»¶n⿾úÃ#ÔV–“Ô4¦n¶qúâ4]gïö-l^·†¿yí-†FǸÚr“ò’b"‘(g._¥ /—,·›Ÿÿà;T–– Í—E x‘ ãcÃüß÷§ÏÅŒ_ øÈ’DßÐ0=½”²¢ª‚#§Ï1 aš&.§“­ë×bµX°ÛmFjºoh›ÕŠ,KD¢1ȼV‹§Ã,˨ªJ4§{`©?¦iO¤œ6³sA¢±»}‘sî ûö²emº¡3 a³Y™öû'‘Hâv9Ñ5ñÉ©Œbª|£膎/ËÃÛ¶ðî'‡±Ù¬ؽ›Õ’šI¤ý ƒ]›7R˜ŸKEI Ÿ: ¤Öß?|„šŠ ò²³Ñ4 Y–±XTœv;6«•áQšÚÚ©./'/']×±X,øg瘜š&‘L¢ª*U ¦²œŸ7ム*)Ë>ï 9qŠîƒ‡Y][ÍÝ; G¢\¿Ù†×ã&ËífuM»¶lä“ã§°Z¬<³wõ+k8xÜF8¡nEMfpa˜&—‹ªb·YY·z¦aàpØÉr»ð¸Ý0>9‰nšäædÌï0¯ÇC^Nö­4ó¾×ÔsøÔYºû˜šñSR˜OvÖN.\o$‹átØqØmd{³2V!·+P—Ë÷ž†ºyç¾¼ìlò²³ïëÝΞ=k®]»öŽ=ÀàÞ¦I"™$‹cµZqÚSN|IM#‘ÔæS¥<ðm ñDr~$žòjWÃ0±XT’I UUH]o±¨`šÄ“IY&í/I`³Z‰Å m~k išÄI,u>} i~  é:v«Y–Ijš¦g VKjfÇTžš®óW¿zÜœlþèß]TïTÝÌ̶D€¤¦cšV‹…x2I4Ãjµ¢*©²È’Œ¢È$’UAÓu"™4 ñxœ¤¦18:Æ›äO~ø õ+k™ …‰'óƒ -‰ÕbIíTc$IB–$ô%vßÜëš7nS¿@ðe‘»ÕŠÝjnÅÃPeÕ¾øˆkÓ4±Û¬Kæcš&6«%ó¦ÿ–d ÇGe†ÍzKá§±Û¬w¼ø¦ib™7›§óÒ¦ò…i€Ì½$I¢³·Ÿ‘ñ ^Üÿd&N@šô@aá},ª(©ºX,™ÉÝêiµX2Ó49~î:×n´bkW¯¤²¬sÞºårb¦ÛÐjý\á&<˜¦ÉB7>]×ïûºŒ©ÿAF–zgÌÔ÷•v©ï;왟›þóò¿ýóÏK'Iv»ï=ÿ •e%Ü~ˆ×çÝû~êy{š›6P]Q†Õb¥¤0ÞbÜó>àË!é‹0M“òâ"*KïTú‹,· ŸÇ‰<&ä‘@ðà¹#€xÑÁBî×tø ¸Ýl)"V¿@  ™>Š¢ˆõ}@ 23~àQB B¿]|›¶ ‹¾)ø6 NÏLÓÑÕ±àd.`yÐ _Š¢‰F–»8÷ÄÄD–d\N.§‹¹àÑXô¡ÞSUU¼/³ÁY4MûŠ9>\¬V+Þ,/ñxœé™iÉÄréK#Ë29¾²}ÙߪŒàñD …CÔzjñù|b4+X6$I"026ª•«(,($sí£ˆ”šýMÏL3<:LaA!E…E¯Ì$“IFFG().Áb±<ÒíFÅðã÷û‰'R‚LL$n­›^jL+Ôô÷™ï–9=¤¿ßïgõÊÕx³¼BV ¾Ñ¨V«‡Ía ¿ZÁò K2k„xKc·Ùý^®ô±XŒx<‰Ýfäû¤àñÀ0 4]Ã4R>UEýBËõþ´JðX‘VnºRæO«ûzʼÈô<¤®aìzóÂò¦|6¢¨ªŠjQÝ剻àt9q©3Õö<>„Ã!‘`êtJ#uö‡,+¸ÝY¸]îûÊC(~Á#Ç7Eñ/Üûu”93Û4ùFXEÒí!IRæ¸aEV¾b®_?š¦Gðù„‰_°¼CsDcT‹‡ª¢ªVLS'3;—:¾ÛãÎúÜ|î©ø%IJùCh¦MéÉN'œGX¨ ·+5I’P*“^ç¾äùèô‡ ”e)eÊ–0LÉ”îZæ…ïЗy§ÒyBjY$=ãO£È2HR&Ú^jv ºþp#Š,gÂìÞYàÔ"+hèH’Œª¤ 21oÍü%RÎu_u2mòÕó¸£ ²$ãv#v> –]׈DB(ªŠiÄÉöåc³¹Ðõ8Áà4`2œÅép-’=KqWÅ/IsÁ .^bMC=%ÅÅ÷%¨$I¢­£EV(--a||œÒ’’Ïu|JdY&0;K0¢´¤X˜Ö¾Á¤}]¨îçèÈ…³gI’˜šžæô™³hºŽÛåbÓÆ äçåÝ×ý‡‡™œšbÝš5\p)&-]æSg΢k&°zÕÊL™GGÇ(**¤¨°ð¾ïešæ¢ò§ï—nã+×® ‡Ù¹}ªªÒ×ßÏôÌ Ö­»ã2MÃ43ƒ¢¯Â•k×ÈÉÉ¡¼¬ìŽ{¤ó–•Ô D’$d%µÒçõ¥¾—À4LB¡sÁ¹/ík$K2N§“X,–ü˜˜8ìLÓ$}¥zJÒ7ÓZ!øö ëšn€é§07ŽÃ¢¢k YÇëð£%³… tCÿ\ÅWI(I7[[ù¯ûwœ<}úÖóë\i¡‘VÖ _½v¦–Âá0MÍ-$’ÉEŽ>i®Q>r”7[QU…ÉÉ)ÚÚÛ3ÂNZ  *“…Ÿ-ü-x4˜œœb`phÑgƒCCLOOßóºôl6­HGFF9zü.§“¡áa~÷λD£Ñ;œêÒ³èôt÷ôròÔi4MϤI§Kÿ­iÚ­ÁÈüçéϦ]xÍÂ| ¥¼•yt”ßÀfµ¢È ½}}t÷ôrìäIzûúS×™fÆ‚±°ü·ßoágé6Ê 6L“ÓgÏò—ÿù?s½© Y–iïèäøÉS™¼ZI&§¦øíÛï ‡ï¸ß¼—jÓEu6MŽ8E[{Gæ\XÞ…Ö‡ÃÍfCQ‘0ýýý蚎E±Ðßß?àG’¥yïúÔªª·þ——øLQP•ÔÿéeEQ(--Åår!ËrêGºõݼ>/Ïô$Khš6?€2F°<Ȳ„iH²…d2„–ǦÀ˜Á0H²-Óß?»NÃ5M£©¥…'÷>AOo³ssºÎ§GŽÅPT•gì'ræÜyñ8ÙÙÙ<óô”Ûœ`’‰G/]¢µ­²ÒRöîÙÍgÇŽ3:6FYI 5ÕÕ¼÷á‡dyE$cç¶m¬i¨_¤@Óír»©ßf³±¢¦–C‡?£ª¢YN Äu]çÒ•+465§ÞÏýû8vâ$ïøããã<±g7ýýØ÷³ss=~‚}ÿûŒOLÐÑÕÉ®;¸pñÒ­wpçNŸ=ÇäÔ‡ƒX,Š$K\oj¢··çžy›ÍvkÆo¦LýÑh Õ¢b³ZSƒ$Ó ‹"+2†ià´;)/+G×u"‘6› UU1 ƒé™iòóò1MEQ†‚ƒA²³³±¨É]×ñfy)*,Âåp195I<žŠàt8ÉÎÎF–eb±sssÞ=ÏDÀa(V‹Ï²Ü¯”à1GU-Ølv’Éþ`9#£ÝäæÄˆF“ää¯#ž0°Ûì(êç[¦”ÿäÇÿ¾¤¤‡Ã‘ùP’$&&&8~ò/>ÿÍ-7).*BVdÞ}ÿ}víÜÁÌŒŸ7o¢( /]áɽ{¸qó&Ó33hº†ªZÈÎÎæÓÏŽ ª*W¯]çÀþ}”—•áõy1Mƒü¼\ŽŸþäcãc\½~]×ñy½l\¿ž§÷ïcl|œ`(LQQ!Û·neçŽíôôö‘H$3˲,Ó×ßOYYׯ§¶¦MÓèèèäÆÍVÂá0²,“›“Cey(ŠŒašôõõ³níZvnßN}}=}}¨ªÂŠÚêW¯Âf³aµXyù…çÜ…‹D¢7lªàþ0M“‚ü|þÕ_ü9•åüï_¥²¢œõN~~þ=-2·›ÓuÝ ¢¼œ?ùùòßý› ¦Éñ“'‰D"ìÚ¾Û·#+2W¯]Ãa·³cÛVvnßF`6@ @’$ü~?££c  …°ÛD"::;¹ÙÚJ8ann—ÃÉŠÚZVÖÖ ë¹¹9<½Í7nÐØÜL"¿£|éuêÛË\UYÁ?ý“?æÏþÉ?¦¦ª s³«a˜  3㟡£³»ÝHìܱ’âbŽŸ<ÅèØ(º®/¾—¹Ø¹o¡i]–ežöY††‡¹|å*0:6ÎäÔ$ÝÝ`‚EµŸ—‡×ëeÕŠZòóòh¨¯çÒå«ôôö²wÏÎ]¸ÈÀÐõuuôõ÷³¦¾Ž­[6³zÕ*z{ûPT…ºÕ«¨[µ Y–ij¹Ë墶¦úζ!µ/©i¦¹È¬ž’óæxE&™Lb·Ûñú¼TVVR\TœY«Ôu‡ÓÓéD–d‘0”•”Q[S‹ÅjÁ0 ì;†iàõzq{Ü™gcQ-†ËíB×u,ªåsó´Z­(Š‚Íf#77G8÷ –«Õ†ÇE0Â05¬V•h,Ìäô6›ý¾'½wôdI‚h,ÆõÆ&~ø½WøÓü'üãŸÿœîž^¦gf…B´wvræÜyJŠ‹ñxÜLMMÑró&W¯7²¢¶—ÓIgWÃ##˜¦AeEó×ttvÒß?ÀõæfÖ4ÔÏÏþM\.Í--´¶µ¡ë:²,³zÕJ®]¿ÎgGÒrã& uu˜¤œ ÓÄ4 "Ñ(N‡ƒ-›7ÒÖÞÎÐÐ0²X‡{$0 #¥üÿüÏùÿoÿÿêÏÿœ‚üüÏÝöf˜Æ djfš‹—/sêôbñ8k׬!Ëãá³£ÇøôÈdIb׎íÄâq>;zŒÏާ  €‚‚††‡™žž¡´´„ÊŠ öíÝË»v2<2JSs õu«ñfe¡ë:š®£ëÚ¼ÂÕ ƒäååR·j—®\Áܱöž®ë"Åo¤Ìì6;v»=µ³@O­ÇCÊÆírQ˜_ÀúukyþÙg(/+% ±¶¡EQ¸tùÊŠ?íüvûý4]GÓ4rsrxæÀ~š[n‰F)*, ¸¨ˆÕ+WòÌý¬[»UQI&“œ9wžÉÉIÖ4ÔÓÖÑA$åùgŸæzS#˜P]UImM ×›8rì7n¶R·j¦a¢iZê¬ ^xîY"‘Ÿ9J2™Ä¼MñË’ŒÍbêZPäÅkè²’òôWdÕ¢f±ÇãannMÓ$i>ðOJ°ÉŠŒÇíÁívð¸=X-)? EVÀ„‚Bùóæ;‹jáÊÕkDc1ÜN'/¾ð<³³sœ»p‘x>AqQ‹%SÞÀlÊâ¢Z,(jÊÌ/ÉЬ  …BX­V’É$ÓÓÓ(ªB<gzz»ÝN  ˜ ¤,ºƦkº$KŒŽŽ"I3þ Ã`Æ?“Ú!`˜„Ãa"±³s³©¼"©ó,V À=òEQ,jJ–è†ÅjÁawàr S¿`yHï¶¡¦º]×ðûýLOMSR\ŠËåæ^²Ò¦~é7ß0·nÝJNvÎ"¡¬(Ê¢Åb¡«»›_¿ö:ÿí_ü9¹¹¹H’ÄÉÓ§¹rõñÏÿ »Ý¾hKSú·a‹¼ú:@-¼OúïÛ¯K§Õu}Éôéï¿ìþhÁò“Ü]=]4¬n¸ã»ôvÐ…³í…{åÓŸ¥=¹Ì¶®…ŠZ’RŽ~é|ÒiÓ}gáöCE–Ñô]iÁ>ùt¾‰D‚ÁáAjªjî(³"Ëh Òßn*¾}‹Þí;Un ¤È ££g¬ z_¦WUÓ$c=»Ý10å /ev;¨Š‚1ÿ]Ú©n¡©^–$ŒïàÂ|Òkúéõð…ñ úû‘eMÓ±¨*N§3õý¼s£a8NtM'fÖσÁ ‰D‹Å‚ÍnCKj™ÉI4Åf³ Ñ §Ã‰Ãé Žàp8Ðup8|ë^¤œC¡š¦ár¹°X,„Ãá{æ™.‹ašhZH?v4¾n$Ifbrœ®îvlßÅôô½}½Œ³kÇòó 1ïqæŽ$I´µµÝÝ«¡€ƒ”—¿¢(dû|‹®Ýn'k~ö½ðšÛ_ŒÛóK¿ðhÑ¥Ž½ýº…ÿgöëÎçu{ZÁ7Ã4î´ÞíÙÞþùžw¯ôé¼ïvoIJîI‡Ðý2eû"}6í%obf–Cî–w"q÷ï–L¿àÿD"qÏ´w»ïíuÉìã—e²<.$éÖÈ„5MÕ¦b³Ù2Ï=''ç®í`›£¿Ð!¬¾[ë›.§kqL²³³S§òÍòù|Ÿ›'Rª=¡YYžû~VÁÃ!5YˆF¢úô³t]ÃçõÎO"îo@zß!{MÓ¤¤¸˜?ý§ÿ$µ%g~”¿aÝ:Ö44|#NS|3Ho‘{ÔY8Ã~ØqónmLßßÄD‘bÑ‹ŠÍjËÌøÓ2êÖ1¸ó.ù>³ƒbÓÛmv¬y6’Z`91 ‹j¡  ˆ«×®3>1IQaÕ•+PçXïG&|!m-Ëò§\¥t‚Å7!N?Ü«ÿa›o÷êÿÆÄê—%œ.'¦iŽ„qØ$‰T`E!žHà°Û‰DcX­ #µ¤`³Y‰D¢8ìöeM¦âFX­–X ø"H’DVV õ Ô­®[´¼)Nç|cQU5Byô»fzÆo³ÚÐ4í¡[½ Ã@Vd˜_»Tgûit]Çj±¦Âéί½‡’á”§¼&#Í + )ã=/Ë ``ЬÜún¹ÒK .— UQˆÇã߈~)øö“Vô_æ,Õ$5úÕu=µ^),²”Š2—åÉBÓ4¢ßx 6›Ò’RæææˆÆn™%I"Û— fÊùíËÆµÿºe™ÂüBâ‰8áp$°XUbñؼÀ2H& U&‹¢¨2Z2™:´G–ˆÅc¨eyÓÏ;õ%“)GC·ÛýH[Y_¶/ªv»©é)ü³þoÜ9Ù‚ohIü¼|òró–tô|Iljw:œݹtáî†o‚’å”éÜmºÑtí/_ÒA‡‚o:ja~!«V­zh/¥xQ÷Ãíñè¿)±†§ý:Êœn§oŠ3mf;°úÍxž÷Sà›Ž óçŠ?ÍE™ ΡkºpŠÜ»ÍŽ7Ë›qý& Ù¯³Ìß´öù¦•W ø6óЦ ‰D‚‰‰ 1ãÜX€d2IaÁýŸQ/‚/ÎCQü’$¥<`UuÑAÁ݈Ç㌎.Ц'‚ÏC›ñ›¦‰Íf»k|v åù0¢˜|C¶n _tª@ ¾ÏCHbQŒðE_IŒj NƈÄu¼N•²|«ŒX |<‘$I, Á×ÀCw ^J˜·Îqèü8þ©(²¤‘Ÿç&'ßÉ“ër)Êq|‰»¾é¤›ÁÃ%£øMÓ$™L¢©3ÃEÉlOZtJ×üIe÷㥛žÅÝ:­K¢<ȯ?èd¬s-Ú‹Çg¬ÃAmýF>Eøñþ*¼.›ð~Ì$Iìü‚¯ŒâƒüÿË_¥NÊRUV¯ZÉÚ†5LMO17Äf³±ïɽ “››“Y»_¨Üþ/K2†d,2áš&œ¸4HÛ>Ë?ùùvÖ­­£ùfoþîù‘u\+qr`k…XóÌ0MSÌøàk@…Ôl+©iD"~ú“SR\ŒÕbevn‹ÅÊŒßÃá`bb’_üòWì{êI6nXÛåbjjŠ`(D~~>.§“@ @"™dnnŽÜÜÔÑšiůéí]ã$C!¶?SÆÖ-kñx¼lZ/sîBÃ~ºúÝ<½­±Üûx!fü@ðõ™ñK’D4ãò•«ø|>ÖÔ×GhniÁf³!Ë2m´vtH&p8ìx<>úøTUÁívó£|Ÿß¼ñ&Ó~?…ùüä‡?@–åÌR,KzÃ0±XíØív$ TUÁ¢:ˆD4L=™ ($‰)ÿã„$ ­/_‹œû$IÂf³áp8PU ‰d‚p8ŒÍfÓdãúõ¬Z±‚~ÿêêøû_ýš¹à«V®äÌÙsìÚ¹MÓØ±u+›6®ÏĶNÏøUUaÍŠ\š¯q­9ʺ5£”•æp£uˆÎ^ƒ¨£¼ÀŽ$KH¦P’)œûàë`‘s_–ÇÃ}OQQV† LLN€$ašH¦fâ²,¥Î7M4MÃápŸ—Ç÷_ù.ùyy€„ÇãÆétb·¿,I<ÿdW›‡¸qcšÿ㯮‘Ÿãfh,€?Âaï§ãÚþ-µø|>áà÷!Lý@ðõ‰˜"Iª%50æõdYÆ¢ZÈËÍåÒ•+´wvPYQÁû}Dk[;»vî@×u …BÈ’Œª*HRÊó‰Ô˜i@ ¤ ›ÿþŸ`ßþ¢æ7úú±z’äç£D;élkâ­7^[ä((~“¡ùà¡#={Ö¬««#©iLMM‘›““ÙÆ‡‰Fc8œ),,Àjµ211Ann.YccãLMOãõfQ\TD`v—Ó‰nèH’DiIé3wI’ˆÆŒM΋'ñ¸ì‰0ÿð‹¿åÄñÏ(+«àoÿþWߘÈ_Ã0èêé¢ ¯@Dð‚‡€$I´µµÝRüé¾±`ÝÂà; ÷ã/ܾ·PH†,I IÌÎÍ"Ëò’Š?M:d/& IΟ?GVV;vì‘Ü# à«»‹ü¼|¡øà!Vü‹¦ÔÆm›ç*ì»ý}û5†if ¶Ÿ†uáxÀ4 ¼^//¾øÒ’ù ¾Ýˆ5~@ øzx¨¶ô/ýVsÑÿ‚Ç«_ ¾šâWMÓ2NzÁ½H$‹v€àáðP¿išØmv‚Á ýý(вÜõ<â$ \.—Pü@ðyh3~Y–ñz½èº.öã >‡Ý¢(¢¯ÁCæ¡ï—[ò÷…‰Pú@ð5ðе²æ@ <:|®â»¬“Å[;@ðð¸§â× ˜Žè„â†Ì‚‡‚,Iø2ÙN´G ¾î©øvF9Ù«3›…â‡»Ìø%ÂqŸÓ‚"fû‚‡ˆØU·ÃB,iâ² GRÁWGQl6’$‰¿Ò1c Ý@V…â¿wmp\'Ë®ˆ¿à¡bVUÆi•‰% ±uTð`0Áj±’H&–»$‚¯ I’PU•DB<óÏcÉ¿iš$4—MA’HIçÛeI’Ðuý ÝPQ”E#ð/êtsû)~÷ƒ,Ëw8|†ñ•g’$ÝQŽ/S¾û)óƒ(/98Éjµ>ÐÙPú¹~^½“É$²,/:¿Á¢JØ­2qM»£ídIB’åûÊ;$IȲ„aÌŸôHê¸è/—yŽ’$Ýq.…iš_¨ìK!KÒ|¬ƒ[yH’ô¥êµt[}±ö]Šthn«Õ <˜cµ¿HÙ4MC’eÔtØg)5L&S΢ Oý\øŒæî3÷º—¢(wìøªïfúdJÓ4ïèû·?÷/Ãí²äA…QO·¹EUï(ûWi‹û}æÉdUU‘e9“V‘’ZrIÙ,¸Å’Š?©›H˜¸l qû¤_’$‡†ñûýÔ­^…Åb¹¯›%5öŽN*ÊËIj©Ò›•õ¹×-|)¦§§q88Îûº§$I ŒÐÞщ<¿la&ååÔTW}éí>†a095…ÏëÅf³e:Ùìì,HÒ}Õë^e§½£Ã0‘$X½jE…_ÍiE’$9J0dÿ¾§0M“‚‚Ïm÷ÏCÓ4::»().ÂãñÜ5MÓøÍoRSUž§žÌä­ÊN‹L,‘D×-e&IÓþCÃÃÔÔTã°ßŸãŸiš âóú°Ù¬Dc1|^ïç>ë…õ C ç>ׇ%Ibvv–›mí©­ RªŸådûXQ[û•ªš°Ûì8ŽLù¢±±û¬×½ÊŽD¦²¢‹E]2ÍçõI’8qêÁP˜Ý;w`&yy¹‹¾O?—ûÍR ª`€Â‚\.×’÷…Tÿ{ç½÷)/+c×Ží·”€¢Ž„3JD’$‚Á ­íhš¦III >Ÿ¿ßÏëÅçó-Y>I’èèìdl|"#K0¡¦ºŠüüü/ý|“É$sÁ Ù>ߢó*ÒÏÝáøò¯’$ÑÓÛÇÈè(`¢ª*«W®"+Ëó•zé6¯©ªÂn·áõzïúŒï«‘xœáá*ÊË–Ô+ég …xówoóÔÞ½¬¨­Y0x“ÅŒÿ>XÒÔ¯é&à²)KMö1t×ßz‹ÿ÷ÿü¿02:šQ*Š‚ª*™Ñeæ3%õY$á7o¼ÁÄä$Í--45·dFà©<¤ùÿoå˜åÃ?&žH I§Ïž£o` ó}z¾89ÓA$I"˜¥­½ƒ·ß}_¿ö:íLNM.*Ûíצ󖜿ðžñxœ£ÇO0>>ÁÁCŸ255…ªª46/®W:àžy.‘+ŠÂå+Wùå¯Ck[;míÌÎÎf®O×y©üÓí˜Ns»¥#O$8}æ,Ÿ9ši#Y–iljæÂ¥K™™ÒÇŸJÕkA-|¾é2Dc1^ó-‡î¸_&ŸéiTU%‰fžåB¼…xÒ@×õÌ Ê4MΜ;Çÿö—ÿ‰›­m@zoö-°P¨/Trˆ®în‡‡¹tùJJÐ/àv!'8rìSÓÓȲÌÖVn¶¶Þ!È ãÖrDz0š.C8¡«»›“gÎðë×Þ ½£ƒá‘ÑÔ5K(祄d¦>óŸkšÎÅK—âüÅKt÷ô¢* ƒƒC‹êµ°=î•gúÿôgüöß ïPÐ Ûd¡uhá½Ò?ÑhŒx,Î…‹—8yæÌ¢[Ë›\¹v=#”æyû³»õdph8ÓÎéŸLÙ¦¦$‰H$B<Ç\FQ’Éd¦O  ñêk¯s³µ•Ž®.¦¦§¸q³•–7ùøÐ§ttuÝÑ7Þw||‚öŽNÞúÝ;|úÙºzz˜›[T‡ÛŸqæóý%ÕŽ©¿?À™³ç糣LjÅb†1ÿÜ3m¾pt¯LËÍ›™û™¦É¹ éîéÍÈðÃGRõJ³ð~™ë€é©iÞþý{ÌÎÎ-ºŸiš‹ò1 ƒP8L2™\”F’$±¼sÜ1Ä—Í0%§íÎYŠ,Ë Ž2==MuU%MÍÍÔTWs³µ•ÎînB¡0+jkØ´a—¯\etlŒH$ÂæMÍ.Ó3öÙ¹9Nœ:ÅôÔ4;wìÀétpâÔ)tÝ`çöm´¶µóú[¿ehx„Ÿެ¬,v;““œ¿p‘D"Á¶­[Èòx8qê4áH„d2ÉÓû÷QVZŠiš4Ô×±¦¡ž·Þ~‡©©)þ›?ÿLÏÌðþGÇ(+-ejjŠÑ±q*+*عc;gÏŸgnv޹`Ý»v²jÅ .\ºLGGeeelݲ™lŸ—Ææf^{óMšš›ùÎK/ár9‘$‰P(̹‹˜™ñ³¶¡ÚšjŽŸ<ÅÜÜÝó|bÏn¬ F¹õu«ùùÏ~Š¬ÈØm6Nž>Íôô ªª²}ëV››˜^ÿ±“'™™ñ£ë:Å……  Q]]Å{ö`™w|yrï>r”‹—¯ ‡)))a˦¼ù»ßáðûý8N~ýÚk4·´ð—^BQ:»»RÏ·¦†-›7á8vâÃÃ# #Ýæ*Ë2W®]ãW¿IåóÒ‹/ð£|»Ý¾X¨YN ãS:š®gR8¦³»›ºÕ«h¹qƒõk×099ÅͶ6"‘999lÞ¸¡áúG"TV”³zÕ*L3%ü,ŠŠÓé sa^®¨­¥ª¢œs. ‡©[µ M×xç½÷hkogÿ¾'±Ï;†ƒA®76˜eåÊT”•sñòeB¡¡PˆM›6²¢¦Ã0ÈÍÉág?ù1×®7ròÌ~ú“cègÎ'âŸe áózÙ±}]ÝÝLMM3;7Çʵ¬_»–Þ¾>n¶¶áv»Ù¶e n·›Ñ±1úŸÏË}O‘“ƒÓé$‘Hp½±‰‘ÑQJKKh¨¯§¹¹…©é¥ót¹ÝìØ¶÷ü :¥0Lb±8ÇNœ LÕkËæMÌÍoµÉSOR]UIsË̽Ö64dª¶nÙ ¦É™sçilj&SXPÀš†z>øø sss©~e·/ÊSQ”[Ï®¼œ5 õƒ!Î_ºÈøø££cÀâåI’hjiÉä³ïÉ'xöéØl6´Û–MÓ$©%Qä”,ÓuƒÂÂ^|þ9œ'6›•¶öt#eþ6 “D"Acs ½}}TV”³aýzÔy‹Í–͛ؼi#¿L&©ª¬à™ûâ“O“L&)//£`P(Äê•+©¬¬àÊÕkD¢4Mg÷Îx³²¸zý:㓬\QKiq N—“s.päØ FFGyò‰=¸\., “““\kl"™L²níÜn7—._¹kž+jkXÛÐ0ÿ™H’̆õëxöÀ~$YæØ‰“D¢Q|^/Õ••4߸±(ÿ —R}Üjµâq»gíšêW¯Î,3¥Û¼åÆ Îœ;OWw«V¬ //wߟlŸýO=ÉÄäbtl”§ö>Áôô ““Äb1ê먮ªbtlŒ‹—¯011ÁÜܦiܱŒ|æì9><ø £c£ìݳ›¼ò >oÖ¢t²$£éš0óKÎøuÝD–ÀnIuöôè,ýs³µâ¢"žÞ¿ŸkMÄã .]¾Â…‹—°Ûl¼ýî{\»ÞÈá£GéîíÁ0 ~ùêoÉÌHoÜl¥¹åï½ÿýýÔTWgL™y¹y$“I^{ã-LÓÄétRXX€ÕjåÂ¥K´utðêk¯319IRÓø‡_¿J[G<ˆÛåb||‚~’qLLÏhÓå—e¿?Àïߟd2‰ÃîÀf³SXPÀG?áâ¥ËüäÓÌÌôwo¿CwO¿zõ7Øvl6+±XŒ“§ÏL&q:äççáñ¸3õzç½÷hi¹Ãnçõ7ߢ±¹™ƒ‡Ý=O«sÁ:¡$I\¾z•ÿø—ÿ‰¿ú¯ÍøÄÇNœ¤µ½—ËÉ;ï½GsËÍEùrè0Š,3:6Æá£G)))á÷|Èððpf&žŸ—GaA’6›Õ«Vrìø z{ûðfe‘åñ——G–ǃÃáÈÔëÒ•Ë·žïïÏ•k×ùýû0:–v»=3K]8ûq»Ü8òòSy–““½¨_D–®›èú­Ñûàðpj·oƒCøýú8qê4‹…ó/¥Ms3×±¨*?=Lkk’”P ŽÒØÔÌÙó¸v½‘Ò’\N†a¤–Œ>øøcYv;>Ÿ§ÝAGg'­íí|rø3Ú::°X,|ðÑÇ´¶µqüäIbñ8&ðÑÁOH$‹f;fÚNfšÄqŽ;ÎÔÔ4v»ÈÏËãzS3gΞãÜù‹ Œ•åá£O184ÄÛ¿H4ŠÃa'‘Lp½±1³Äåq{ðx<ŒŽŽr½©‰³çÏsæÜyœN''Næâ¥Ëœ»p÷<{ÆÏãV™!qôøâz©ªŠÍfÃçóâpØ9wáâ¢{]ºr5“Ïë%''‹E¥²¢‚³.Ð?0ˆÛåÄétâózq8Ø3y:hlZðì¦ùÆ >=r„ññIVÔÔ`µY1ŒÅ³}Ã0°Ûm Êæ ?/Û½(4oãHÏ ÍùAÎÀà¿|õ7üý¯~EOo]ÝÝttv¥:Œí|vô.§ƒ#ÇŽÓÞѰ觟$ ††8~òŠª K2Îù~õáÁƒ´¶µqôø v“““;q’–›7ùô³£s{`6À¥ËWPd»ÍFNv6ªªr½±‘®îÞ}ÿ¦¦¦I$“¼ýû÷èîîùÜ{–¿þÅßóî{ï˜åèñãLOOðÎ{ï35½8ÿ'OâÍÊ¢©¹™¶Ž\.'}ü ¡P(Óùyyd¹Ý¦‰Ë墸¨ˆOF(ÂaŸï«n7N§›5U/EQ8uæ,ýhóËÝ=½¼ÿÑÇ`šTUVÎû ™wXyœNg¦}ìv;Å…Øl¶ÅÏ\–Ðtí ûž=nÜ©ø%Hè:V,ê3þd2ɹóçikïàäéÓtttÒÛ׋$ËÔ­^ÍøÖ4ÔÓØÜŒ,ËlÙ´‰ŸÿÁÏð¸Ý´wt qË, ‡èèêâ…çžãÀþ}TWU!!1:6ÆäÔ“SS”––PR\Ä}û(*,D–eÆ'&˜˜œä¯|—Ÿüð‡hšFOo…ì{r/›7mdvvýž7&ùù¼øüóÔ­^E4¥`€¹¹9&&&ñxÜìÙ½‹'vï&‹“••ÅæMéèìÂï÷§šJ’¨®®¢¤¸˜=»vS]U…,Ë„Â!ÚÚ;xþ¹gùÁ÷^¡°°€–7ñxÏ…å[¿nñÏÿŒüÇD^n.‹…Ý;w°uóúxþ¹gnËßÍ®;ذn¥%%ìݳ—ÓI(ZÂYMbõª•<ùÄb˜µµµ¬Z¹’Û·³jå Š‹Š2õ2M2Ïwíš5œ9{–®îž{ú»vì$/7cÞÔ¶pɤºª’’â"žØµ›šêꥀL—]ÅÄ@[`êoljfphˆSgÎ022B[{;†™š±í{r/»v¤,Bñxœêª*žöVÔTÓÚÞžšÉÎ hMÓhëè`ýºµìÞ¹ƒµµ˜&fgŸ˜ ˜Åív“ŸŸÇ¦ (++…yóqOo/{víäÙ§“M{g'N§“MÖ³iÃâññx|‘ð1ÔÌÑ0R³§ÓÉÎí[YS_i  ‡˜˜œDQêëÙ¶eKÆArýÚµLLN266žQ6yy¹R_·šºU«@’Ð5Ö¶Ö­mà™û©¯[ÍͶ6dE¾kž£óyêº~Ë>/`NG¦^±xœü¼<òóRmRTXHk[;k×Ìßkõjn¶¶¢iÚ¢üL#%¼·lÚH^n.º®SVVFUeׯ£¢¼œ¼¼\6mØ@yY)†iP]UÉóÏ>ÃÊš®\½FÿÀ»vngýúuø¼ÞŒ3ÚBssIq1ùóù”•–¢iÚ¢e¢…‚´â× ]7(..â‡ß{…ýàû”•–`˜Æ|7L]×ÝÓËÄä}ƒD"Qææ‚w <ÒåÐuÓ4(--áÉ={(ÈÏäúÕì,Ù9rr²ÙºyõuuÌÎÍQXPHyY)]D£Q Ã@–e**ÊÉËËcû¶­dggƒ$15=ÍÔô ö?ÅsO@Ó4?7Ït[èó´-›6ñÓÿˆgŸ>€EUq8œìܾ¢Â³ì[œvv6›7m¤¢¼œòÒR6®_¦iÄâñEykºŽ"ËÔ­Zɦ°Z­Øm6Š‹‹¨¯[MýêÕTUT,¨—I–h¨¯ãåžÇåtrñòeæææxò‰=4Ô×ápØÑ ý¶T”—¥òÙº…lŸä|ß[¤ø% -©‰-œŸÃ’3þxBÃë´Ü±µJ–eúÌÎòGøüôÇ?fõêUó#ƒÙÙY¦¬´L“™?]]C!JKJˆ%âôôöF±Ymdeeqñòeúúû™ž™áÓ#GƒlÛ²UUQ•ÔöŒ¦æffgg1tl¯»ÝÎù‹—8ñ"º®STX˜™É@ÚÛùÖÌS’¤Ìú¤Æëé¿»zR#èÍ›6’ŸŸ‡aèè f¦™æ{vïbúuüþƒ™œœšw¼KÝãÆÍ›LNM¥f’v;…ù\¾r…+×®119IeEż`\:Ï÷>øÉ©©ÌÌÜ0L\N'¥¥%a±X0tÃ0±Ûmä/¿a˜˜fê'=£K³x}V_ LMì6+Ã##tvug”xº^@æù ±rE-Ù>/—®\¡§·‡Ù¹Y ä«»‡¦æfšš›iïè$™Ôç󙘜\z-T’pØ,HfJñ›¦ßï§§·—çŸ}†û÷±}ÛV[ZˆÇãDÂÆÆÇééí#//Y–™››cphˆÑ±q òóSƒ¡¡y'=‰œìlZÛÛéíëgrjŠÆæfºº»Y»¦‡ÃŽ9/ü;»º˜˜œD×5, Ù>Í-7hjnazz†¢Â‚”ÀÓt c±¢ÉDCÏ®[JÑ`zz†#ÇOP^^FIqq*®/Rš‰d’Úš¶mÙÂÅËWèéíÅ0S–EQèëïgphM×@’(,, £«›æ–ôôôQRT„iš÷Èó2==½™> ë©6O§_X¯´å¢³«‹™?……tvu¥îÕÛKIqñ¢{e”ëB%¬ëXT•±ñqºzzÑ5 2ílssÁùg7FyY)n·›æ–  †Ðu¾þÚÚ;hkï §·D<‘Égrr*Õß @Îø´ B7tTE!7'73˜Ö5}~ f24<‚Íf#?/­›6ñ£ï¿ÂŠššÌÀB×õùÄÂç{ëÿÆæ–ýÊ>?ûÔ(KE‘ÙµcÙ>‡%2¯¨eI&‘ˆÓÖÞžš¸è:n— «ÕÂõÆ&®75¡i99ÙhšvÏ<ÓŠôÛå¢ /lŸ2ÏÚ=¿œ°Tþº¦a˜F¦Ÿ¦¡/î뙀6ßßæOê|_J­»Ï×knvC×ñûôöõ ‡©ª¨ ©¥…¡áᔿH)ß’‘É,’ŽUU˜ñû ‡Â<¹gE……äæä295…*+\¹ÞÈää$6›}{÷284Äõ¦&Æ'&()*b׎íºAGW9ÙÙx³²Øºe3ÃÃ#´Ü¸„DEy#£cŒOL’“MC]Ù¾l::;ñy³°¨¼Þ,6mØ@ÿÀ ý¬]Ó@C]sssTVV¤£Qjkªm)ŠD"hºFMu5†a˜¥ª¢ÇM8¦§·UU©®ªÄåtRTXH–ÇÃìÜE…\½~®ž*ÊËÙ¸n‘h”âÂ"JKKèîîA–|^/²$±cû6üþí””³cû6B¡Ð]ó¬,/gãúuX­ÖŒ G"TWV‡3õŠD£¬^µ›ÍFgW^Ÿ—5õõLÏøS÷*.fçŽíwlåš›ÃápPZRB   °€ò²2††† …CÔTUeòôy½LOOs½¹™ñ‰‰”…içN hmk£`·ÛÍÊÚZ®56Ò|ã}ýLMOQUU‰Ç墣« ¯×KnNö"«@º<é8ýéúÆ¢1bñ8µÕU™g6;7KV–‡Üœ::;Y¿v ²¢p³µ•Àì%ÅE¸œÎ[yÀ,yy¹äçå‡À„ªÊ , Ã##ŒOL’›“Cue%²¢PS]M"žÈ8Þž>wŽp8Ì–M).*"‰ÐPW@Oo/ÅE©‰Ley+jkiëè`|r’Ý;wPZ\B8¡¶fé<7oÜHeEy¦¼þ@€lŸ‚‚üŒ¢ÌÎRYQNvvvÊ’µDþ55Õ„Ca²½>rr² †BÔÖTc±XµóŒßOAA>Ù>þÀ,ÕU•äæäÒÝÓƒ,ËTUV’L&SVÙÂBÚ;;éìîf|b‚µ õlÞ´ÇÍõÆ&&&§ÈÍÉ¡¬´”ÓgÏÒÑÕE__áH$㽟jŸ"Ün÷’Ï<••…Õb]nýúÈ!IRÊ!öìÙ³f]]ÝÇh˜¤¸ —Š¢ÜûÚÊ#Ið¿~C7øÙ?ú v»]×ùÿûÿÁÖÍ›yjïØl6ÀD7R£´´‚KÇÐæ?“e™x<Ž,ËÇ¡´Gñ™âBÔ…B÷Ë6†®ë$5 ›õî%=êOÕeñõ_¶|wËó~Êü ê¿Tž ½n%Iâ—¯.~¾éº¦GÚégµT\ƒ¥ÚçvL.ÞèÂŒ‡ð¹lKFï“e™KW®ÒÔÜÌO~ôC\N'Š¢ðÁGc˜Ï=ó ¶ùøéíƒ ûiš‹öþjš†aš‹úâRåíœ.ƒÅb¹k{†ARÓ°Þ–æ^q#Òæâ¥žÁ½ò¼ß>ñEîu·<–êW~|pѳK§O[ÒNuwëW÷º¿$ICAtCÇëñr?¤ûŒ$I™˜_äЗÔNŒÅýj)’óÛ Ó’…×ßM–Üþ÷ýæùEŸñƒ”%·ÿ¯ë:¿zíuêV³yãÆLY%IJ9fšffëë—•%sÁ9 ÈñåÜò·©6lkk[z¿¦'qÚ¿ÈhI¢Z¬2Îù‘1€ÕjÅá°g¼¸MYFY @Íù½ða§•àÂ4·?èÙQ—*ÃRX,–ÌÞÒÛ·º|ÙòÝ-Ïû)óƒªÿRy.¬—$Ýù|î•^¸÷øs·4ÝY–pÙ­øÃ†n¹ëë*I©6³ÎÏ:t]GVdIÁj±,2ñ¥,$]ÖôÚ§ò‚=(‡!õ>ž|™ (ŸW¾hå˶ÅíÊànÏRlîöl¾H0'-©ež÷ç±°ÏÜZvûbfãûéWÊ|ÞwkÇ/óŒ>/ÏGô2€ÅbAUÕEe•Rw_Ïüží#¥¶-s—às‚%¶ó† †ŽÝªÎï ýü—Å4M^zñ…Ìß°ÿä~ŽcÁ@àöQìRÜOš‡ÍýÜ÷a”íQ=;|©ç{{Y¿jÙ%IÂã°2=¿–¸Ô{m+W¬ ¢¼|ѾòÛ·#ñh <ÁÒ<ìg'ËrÆßâQ}¿7^|î9lvÛC{æñD|¹«ùH³HñK¤ÌEv‹ŒªÈ|‘Ag¶Ï,V éhVbOå7ŸÛŸïÃÀa·¢ëItýî3%Û¼×ð™«k>&„pèùæñ°Ÿ„”YNç´?x½Y‹‚=h$$‰„Ð;÷@5 ƒd2¹(¨MMżþ"fä¥Ò‰†ÿöðu9¾ÜEùÚ1M“H$’²¦Ü¾kzÞú53=ƒª%5ª«ªÉÏK™åÅË!X.YaÕŠ•ÀÊå.Š@𕹧VÁÃåq³:kšF__ÉdrQßK÷ÅP8Äøø8*ÒÂЩßÄK'7›X°.3 ¢È ^¯U½eõúV.zÝq‚•@ |Í$XR‘ôôö˜E’¤ù o¥™4ßZ7×ÇÍÄ#-„ ,±x €ahšÆÔôô¢£É—œñ§¢ž%SñÚ‘2‘Îî—ô¡ªº|±I ,'Bñ –ÛÎgYxŽ ÜEñÇbQ>øð=Bá0ª¢RZZÊŽí;q»=÷uÏkׯ‰DØûÄ“Ëfê/@ XNÄäC𨲤â7ŒÔéhkÖ¬ÅétqîÜ ‹X»fÉd’`(ˆ,Ëdy²e™X,F8Æj±âv¹ˆ„ÃCÁL¼ëô3n·]×™››Ã0t\.ªj!aš)eíq»QçCØ~%Ä;'–1ù<ªÜÝ/ILLN`±XÑôÔÁñxœ³çN32:¦ICýªªª9sö4³s³È²ÌÖ-Û@"3 8{î ££#ØlVvíJÖsâä1bÑ>ŸU+Wsîülv;ÑH„††5lݲý+GÙ/@ XV„<¢ÜU»J€Ãî Ûç#//Ÿ®®Núúû`ß“ûÙ´q MÍ\¸xH4‹ϿDEy%W¯^ÎD^¢£³¼¼<‚¡--MØl6*+ªðù| 06>ŠnìØ¶“ººúúûˆÅb_©RBé ‚åFÈ!Á£ÊݧÕ”””R_×@~^>‘H$µ=…ùír˜0$/fº“ß:Í-O™ÿ!uZEy¥%etvvpóf ‡UUÐuEQðdeáõz1 Ãøê‡7ˆ—N ,'b_ð¨rSêÖ3gNaµYñz}ìØ¾“¢¢bÆÆF8yê87l¢¢¢’³gOsèÓƒ(ŠÂöm;‰ÅS&þ‚B**ª˜ `±X(..Áeua˜&Ùªª¢ªjæXZY’±X¬Ä!p)ÅŸ>¬#¢(_Û΃ôùðŠ¢,:Ë|áùßwC7t´ä­­²,R& ©®ë™6¼ ë.Ëòç¦Ðu ÓdYwgßDÒ±Dîvdwú|”´ ºó—QU•d2¹hW•a÷õ¾Ò[¾,Ë’½iù (ò¼ûb×hZI’¿pLýd2¹ä‘ÛBVÝK¶’ÃáàßÿÑü‰V v»‡ÃÀ{ö …e·;û™§Ÿ# c±¤ø4M£¸¨›Í†,+~ ÃÀ—Õb%77Ó0Rçª[m¬[»·ÛÛí¦¸¸‡Ãù•+¶ÔhûÒå‹´ÜhB‘ Ó nu=Oìyò5¦ßï' SZRzÇ ‰F8zô3Ö¯ß@eE“““œ=š§öî';;û®ùvwuqòô äùC“òòóq9]äçàv»iooãéÏb³ÙîšGºî²¬àr:Y»v=õu ‹^8Ã0Æãñàóú¸vý¡pˆ}Oî`m$<.,5ùH$â\½v•ŽŽ64]£¬´‚ýûÐÛ×ÃÉS©wÜ0MŠŠŠxjï~úˆÝ;÷PVV@Oo7íím<óôs÷|ß¿]\¼tgŸyž¢Â¢û¾îÚõkD#V¯®ãìù3<µwÙÙ9÷¼&™L0<2BaA!V«•“§N““ËÆ ›¾@»|vôS†‡‡Ô²´‰IÝêžØ³÷´É·%¿,Ëø|K+"UµÜñÍf[Ô UU]”¦ð¶Î”—›·dÞŠ¢`³>˜Î¼ÔK Îáv¹Ù±c·‡`0˜ÚMàñ0;7‹ªª¸]nB¡‰D·ÛÕš:6 ’H$°gê*át9 ÎÍ¡(*Í- ñÔÞ}äææO$H&ØLÃ$ð355…Ç…ÇãAÓ“L܃ôn'kÑÈ5‹`{ŸÚ¢ªX-VBán·‡ÙÙ³³LÓÌì˜edzÈA2]÷íÛwÒÓÓÍ¥Ë(*,BQR³ —ËE<ãÄÉcT”W²ní:B¡ 333LOOaµÙp»Ü"™@pŸ,%ƒ¹Þx•M6““ƒ®ë¨ªJ4]ôŽÛmv 5™H$™ë½Y^*+«$‰Ù¹Y˜ï].7²,‡ðx²ˆ'â·,RJÖ-”oi4M£­½•‰‰q:;Û),(D×5B¡0¦i IOš¦¦QU·ÛC$& áp8¨®ªÁf³ß’“ñv‡‹j! eÊ0>1Α£‡Ùºy+••U”–”ár¹R»Ã¡ù`¢ÑÉdrÞ‘šT¦äĆu©©ªåʵË8ìÖ­]ÅjÅï÷ãõzSí3oUÖtÓ¸UEQˆF£D"œNÇ™h~ÓøVÚEžÕ¾I–‰D# !Ë2ŽêZúú¸q£…õë7p½ñ[6oÅíöpöìiâñ8………ìÙ½—Á~®^½ @AA!¦a"É2{v?ÁáÏ>¥¤¤„þ~üþΜ;ÍÆ ›èêêœï|6mÚŒaš46]çfë ÊÊÊ©ª¬B–Rʹ³³ƒ+×.cµµ+غe{f6žÞ92:‚,+ÓÓÓšñ»\™£¯^»BGg;²$³aÃFê×,ª{4c||Œ¹àYž,BáW¯^!âóùðù|øý3D£Qb±(²,3<2ÌÇŸ|„"Ë8ðìš5K,ñ;)E3=3MvvU•Õó~Q,xÇeJŠKÉšW` ™ž™¦­½•¢¢bŽ9ŒiÄãqJJʨ­©åÂ¥ó¼øüËtvu0>>FII)]¬_—’o›7maõªºL~ãDÂaÖ¯ÛÀÐСpˆH8ÌÁCc³ÚH$4Ô5àp:¹pñüè=ž{îETUåðáCTW×ÐÖÞŠÕb%‘LP_×@mí Ξ=ÍÜÜ,O{÷>E¶/›Ç‰omÈÞ¥€D"?àÇð‹ÇX½ª¯×˧‡QTXLUe5ÍÍM„BA hïh£·¯‡ææF*+«øÎw¾Çöm;ç×Ö5 ©%ñx²X¹bE…Å<ûÌó”—WP^VN^^>ÓÓSô÷÷¡ª*[·lcÿ¾§ègdxY–‰F#\oº†,Édeyil¼N0\TrMטñÏ0ãŸ&“H$ÐôÔˆ^’düþš[šð¸=(ŠLcã5’É䢺ǢQ&§&ÉÏ+à©'÷“—›GEEÅü‹~Ün…¬_·'÷îÃb±RZRÊ Ï½ˆ¢ª ,÷#¾1,µÜX\\Âw^ú.ÙÙ9\oºÆÁC1;7‹$ÉhºF`^6E¢‘Ì5 •¿®ë$ Là ©%©¯_ÃλÅð£Ï‡e5ÌÔºýêUux³Òò­ˆµ·N¾4M“Þ¾‘0.§‹É©IFF†3ÖÃ]»ö°}Ûn´Þ`ff‹Å³Ïó<ªÅÂÐÐbùcÆ¢I^qQ v»ÞÞúQ-*……hš–©ËÍ›-\ºt‘ѱQ ‹¦·§{¹»Ê×ηrÆ,9Ú6L“‚üöìz»ÝŽ4sÀœwIu$“ÔÒC}Ý\N&`fÆd¤¨*³þYþÉdE–±Ùlè†N2‘`rb‚«×®RZV†ÝnOÅI^°ûÁR = ¥^XIÂétQW×€ªÜz4¦aíËæ;/½‚Åb!™LÒÓÛ“úR’H$„B!LÃ@7tòòò™ó õ’TTTò—_É|výúUnܼAyYª’r ²¨’ÉDJ¸˜&6› Ÿ/§ÃIrÉQ |KÈ ÿür_MM V«•K—/27›2Ù{ÜvîØrz¶Xæ¯7™ezz*z5„„ËåÊøZIó“`†H$5peéù–& ÓÓÓ &tõt¡ª ílܸyQ™o?½U’@’SÿÇb±Ô2Eª@HH9™4uššŸ'77¿‹jA–%â‰8ÉDrQ]LÓÄ0 ã–CdÚ¹<%’,MªN6›úú5\½v«ÕJÝêzlvûu1Mc~wšÁª«ÈÉÉ]îžòµó­UüK™ú­+Ã#Ãüî·0 ƒ†úµá÷ûyúégiii¢¯¯—†ú5fLMOá°;ðz}lܰ‰Ë—/10ÐGIIeee püÄQ CGVŠ‹Khm½ÁgGSYQ…jQ™ $ ‹Å‚ªª4·4!KU•UÔ­®cph€®îª«kééífzzŠìììE^»Š¢`±ZY(I, ª¢’¦i Q[»’á‘!4MÃét.òPU †i,ò2¶;˜¦I`ÖªªØm6*+*iln$¤¶\Z,€™Ù!î¥fü3ÓÓœ<}‚D"ŽªZ¨««§°°ˆ`pŽ`(ÈïßÓ0)..aÿ¾X,Ξ;ò²Ù©©®Åf³!É2«%¥ðIÉ—ÜÜ< Š8}ú²"“í˦»»›@ %ßš[šèêîdõª:$Ibtt‹ÕÊK/~‡¬,/½}=\¾|ÿÌ4‰Dœ3gN!Ië×m@UUk|vä0Û¶n'‘Lpîü:ºÚ3¾6lâòå‹ ôSXX„Õj%‘H Îa™ÞZ\\Âå+Ëxâ¯ZUÇØøŸ~zEUÙ¶e;cc£!ƒ{ÉŸ´\MSUY͵ëW ƒTVVňÇc‹êRV^A4MY1¬VTËã'פ7ÞzÃ<°ÿùyù™5Mc` Ÿx"žJ„DyyEÆ ãn†ÁØØ(6›Üy>MÓ&';·Û}×k5Mctlo–—¬,ïWª”®ëD¢<·-‰„‰¦ƒ™`·ÛæMön·›`0ˆ¢(8N‚¡ ¡`«ÍF¶/;ã8“H$°ÙR»Âáðü·Ôlßjµ‡Ð4 ‡ÃI4%cµZ±X¬èº>£@Âív£ª*¡PÃ02÷ŒD"¸œ®Œƒ @<'áñdeLkápEU±Ym„BAäyÇÈÙÙ‰D‚¬¬¬Eg+„ÃaLÌE–]×çw\˜X,*N— Y’S»6EV01q9]„ÃaEÉìîw'íäæq{Í–“É$áp˜x<†ÕjÍ8òÆãñTèr,–”ÝÜÜú|\Y’°Ùlhºžy'í;²$Ï;ª¥Öß#ÑhjÛ°”²†¹H¾Ýr¦‹’Ô´ŒÓ®®ë„Â!~?GŽ}ÆSOî#?/µs¨µí&W®^æ¹gžÇíöàr¹2éYÁ0R2t‘œ´§œûfg™í‰n·MÓˆD#XTKæ07‡ÃA<'‰`µZp:]ÄbQtø«ü1M“p$Œ,É8)=MÓøð£÷q8<÷ì ŒŽòÉ¡ÕE–Sí5;@‘•ù‰–u¹»ÌAÓ4úúú˜žž¡åæÍÌØjµ²qý:É]Ý]KÏøãñŸ~v(ÕÑìvdIÂëó}®â×u‹—.PXXÄ®yÅF9uê$;¶ïdÅŠ•w½6‘ˆsöìiÖ®YÏš5_MñÃÒ3~§Ó…Óy÷:deeÝúÛ“E–'kÑ÷·RäñÜyhÑÂ4÷³Ýfá`(Û—½¤“Éí»&$IZtŸ…¥¼¸…,õìEÉ ÐâóùîYN@ðù,%ƒ,Ë’ï×íïxš¥Ò¦Y$¯æÿVU›Íþ¹éìv S*Š‚7ËK4Áfµâóeg®‘e»ÝNvvN¦œªªâóÞY¾Ûåd~~Á¢ÿSÖ‹;ëz{,ô¶_JþH’tÇ’æääÓ3Ó<½ÿ$IJé°Ûêàt:3ƒ…Ç‘»Ú8dYâ‰Ý{©¨Hm±Z­´µ·‹F‰ÅcäååS]UCwO“““x<*+«@"ãVZRŠÏçc~º®ÓÙÕA  ²¢’ââ¢Ñ(]øý3„ÂáÔÒWÄÄ‘ûÁ²òM•A>Ÿ={ö.Rª¥%¥ó‡ª=ÚfqÓ4Y·v=%%¥w­‹àŠß4MNœ:ŽÕjÅ›åcßSûikk%àóúhm½‰ËåN­MÍÍÑÖÞJ ÚOžÔ’Ìçè:ÕÉæ[R¦.n¶ÞàÚõ«dy²èêîä¹g^ ­ífj) ']×x »Ä¿™ï›@ ,;v»ƒªÊêEŸe=€%دƒâ⒌ҿ[]+ÁÛõê]¿$Ilܰ‰¢¢b¬+Ngj¿xMu k׬ãýßcjrMÓHj)oËééI$jkV°mëvÞ{ÿ]‡2Þëý$ TU%‘H0>1ÆÈè0k×®§¶fþ€ÿ’¿©£m@ðí@È ¯`,…,ËȲœ —Š¢{k÷þ’ŠßtÝ`jzj¾óJX­6 3µÕR#ˆiÿ ½=Ý””–áv»ÑõÔV·¡áAd9å$VS]ËôôTj_¥ªbQUÜn7>ŸÂÂ"††éêêœÚ~`[ˆ—N ,'B –Ó4q8219‰¢È¥–iRþúK+~UUY±b%áPˆ‰É dI¦¦º†ò² ²²¼¨ª…ŠŠ*JKKq:œLMM’““rôRa&?[¶leÕÊUȲÄäÔ$«V®Æårã÷Ïàr»q:ìÚ¹‡––&³©uÿ¥œE¾\í—»ùÁãŒPü‚åBQ*ÊË(*,Èøè-dÉí|_Ã0™>M×Pdå¡™e’Z’`0HÎç!Ó4™™™!''G˜Ÿ_š¦ÑÛÛ› ô”ò¯KÙÑ%I"Ý};ßå‹(}`QTº‡‚)FÛ`yyPË–Á—ånzð[«_(~@°œ$xTùv*~aYËŒPü‚G³oÕ:”®ëÄãq¦˜ZÇÓ4‰F£LÍ®#|¤ÂŸ›NEJ…/¼=®½@ ¾<·‡ü6š®1˜ýÜt*¤N­»Ÿ¸ò@ MíþvË};×ø@ ,‰Pü@ =L8^îjL&i¹q“P(tÇw÷S¯…í xøÜ1ãoïhçøÉcÌÍ-íØÕÝÍ_ÿÝ/øà£1 ƒ©éiŽ;Nb^ñ›¦‰ñî_5M“ã'OÑÓÛ˱'Ê(úH4JgW7IMÃ4M‰D&ä!@_?§Ïœåfk+—._!f:q*}rQzÃ0Ðæóêà“O3 Þu`!¾ý=~‚7[ G"†a¼óû÷¸|å †a06>Î/~ù+³³‹äËíÛ³’É$ããã9vŒH$²ä½LÓÌÈ Ûî¼ÓiîÆRi4M#™L.J“L&éìî")˜¾f©z-äöv<|îˆkmm­(ŠÂ}Oãtº}¯( ›6làêõë¬]³«ÕŠ¢¤< oÜl娉$“IvîØÎŽmÛ¾p8߇E 0KÿÀ?ùá¹ÞÔÄko¼Å¡ÜÏxjïÔTW3 ÒÔÜ̉S§3ñþðg?¥¼¬ŒëMͬ^µ‹jåÃ?Æï÷SZZÊO~ø®^»ÎÉÓg$‰ï¼ô".—“?9D"‘äéýO!K­­müÿþË_¡È ø³DuUÕr7‡@ øšIÄ|tð.^ºLmm kêùýïãq{gjzš>ú˜ññ ~ö~B[{;ƒƒD£Q¶lÞ̾'÷r­±‘ÏŽcvv–Àì,Òòubb’÷>ü™?›7mÄår1:6Æ¿÷ -7nÐÙÕÍ®;øðãƒÌÌøÙ´q=Ï>ýôÞà óÙ´q=OïßωS§¹pñ>Ÿ——^xžƒ‡>%’Ÿ—G<‘`dd”ß½ó.‰DI’øîK/qâôiÞÿð#ÆÆÇùùÏ~ƪ•+ݧµ­wߟ,‡ñ‰ ¾óÒK(Ê£¡7¾­,ݺ’„r—xú†aPS]ÍsÏ<ÍÛïþžééidYfÆïçßþ–ÚšvîØÎ;¿ÿ³ÖrÒÓ׋ª(”••â´;xå;/ñü³ÏðáÇéê½‘ÑQ&''ùþ+¯L&¹xù2‰D‚ŽÎNÖ­]‹¬Èlذž?ù£Ÿ3:6ƉS§©¬¬àÙ§àp8øà£8züCÃ#ìݳ›Â‚ Ó¤°°?üÙO±Ú,œ¿xq¹›B ,²,³uË&~ôÃïsñòe¬++W¬d÷®ìÚ¹ƒ ëÖQQ^Îw_~‰’â"šZZðz³xò‰'8tø0.]æ½>dÏ®]üø‡? ËãYr}£µ•ËW®²}ÛVjª«ÈËÍåÂ…‹ŒOLpöüE¡£³sAšê%Ë»0ŸÚêzûú8|ä(/<÷,/¿øN§“›­­ÔÖÔ°iÓFÚÚ;ãÆÍVvîØNnN¿}ç]VÖÖRUYÉw_~‰Ò’â;îS^VÆÊµìÞµ“;¶#Ë"àÑÃæÅ/+ ë֬㩽OÝ1ÛOcš&O>ñyy¹¼÷áGº? ³}ÛV¶oÝŠÕbabrr¹ë—ázc«W¯Æír£ª*…lX·Ó„©éUA’d ¨­­¡¸¸˜d"IOoº®³jåJ à Û磢¼œêª*zûú¸ÙÚÆ©3gðûý„#žÞ¿ŸúºÕ¼ÿÑG´ut`&9ÙÙT–—SR\L,öèûB‚¬È”–”RY^ŽËéÄbµàófQR\LaAyyy¸Ýnjkjp»Srª¦ºš];w›“KË$“IÖ¯]CqQV‹eÉûlÞ¸‘gž>ÀÑãǹpñe¥%äååqôØqFFGÙºy3›6l¸•æÒå%}æsñÊe‡†q9lXŸ Øl6œ.kꩬ¨ÀbQA¯7‹5 <¹w/Ó33Øív<7+jjp¹îÔ)¯×›iéðásÇ´~ÝÚõTW×ÜSéë†ÝnçÇ?üÿãÿôÿ@–eŠ‹Š(,(àw+ËåÂn·S[S³Üõ  ÑÛ×ÇÏ~ò$Y" sáÒe.]¹ŠÍf£¼´”K—/cšº®cίOé†ASK U¸œN ೫‹O>=ÌõÆFž9p€ó.P\\ŒË墷¯Ÿ±ñqÊËÊ¢¹å[7oA7ôÌZˆß-<ž†±HHHdggsî (,,À4 ><ø1žÚ‡®ë´Ül%‰ ‡xå;/395ÅoßyoVs¡áp˜+W¯Æ0‚|¼^/>¯—¢Â"®76ñ£|ŸíÛ¶ðŸÿê¿òÄî]äÓ×ߟIÓØÔÄsÏ<Íå+W‰Åî’Ïõ&þìŸmf.äwï¼KEE9ååó!bMÃÈ fü~.\¼DwOµ5Õ¡ë:~|gž>ÀÈè(}}ýH²„Eµ°mëræÛ¡ ?Ÿ ë×=2KÄßV”ÿäÇÿ¾ºº—Ó…$IbµXïzªªPR\ŒÇí¦¦ªšÊŠrêë©«[M0Ä¢ª¼üÒ .wýhïè ·¯—^x‹Å‚Õj#™H`š&¯¼ü2¥e¥x³²¨­©¡¸¨ˆ²ÒR¬V+9Ù>®^»ÎžÝ»).N°U‹Šß`Ƕ­)s~a#£cdgg³uË&¬V+ðâóÏ‘›“Cnn.åeX­6JŠ‹)(È_î&_36«•ÊŠ ²³}¸\Njª«¨©©&‹ãõ¦äO~~>áP˜ò²2®^¿ÎÌÌ V«•ž}†5 õTWU166މɯõ¨(/§«»‡p$B"‘ÀépàÍÊ¢½£‹ÅÂK/¾@qQn·›S§ÏðÂsÏQS]Íìì,7n¶b±XxùÅÉÍɦµ½H$z—|žgõªU”•–Ò?8H2™¤ª²’œœª«ªp88N²½>ο€¢Èòò /RPO^náp˜Šòr¦¦§#™Ô0 ŠòrV¯Z5ß©™¿˜õ9 à ,é$)I‰d‚ÿ Òo½aØ€ü¼o¯2 ƒD"Q ¾Ðu¦i22:J^n6›õ ]+_Ý0øŸÿÃÿʞݻØ÷ä“_9¿öŽN~ýÚëü»û¯ÉÎÎ~håîîéá¿þÝ/ø¿ÿÿŽœ‡xÁÒhšFooï¢]fi$I"ÑÕÝ…ú%òþÆáñxðx¾ø!D’$QZR²ÜŦIqq1n·ûd×?0ÀÚ5 UéX­6ÊJKPåëh%Á—ä±Pü@ðMBQþäçøÀÖº÷ìÚ‰¢>|q_VZ¿üÿB(þG¡øàD}€Šz)oú‡$IX¾††à«!\'@ xŒŠ_ ‚Ç¡ø@ xŒŠ_ ‚Lj;¿ˆ,'Á·—EŠß0 ::ډέ¸ƒCCœ:s†øü³³³s\½~}Ñ1*£cc465sõÚufgo;ÇAÓ—>:síz#-7nÒÕÝý…îÌÒÕݳ(’R4åâåËüþý8sî±Xl¹›F D0@(¦©¹…É©)>øèc>>ôér7@ xȼ÷Á‡\ojZ4 øô³#ܸ٠ÀÌÌ ¿}ûÝû’¥““S¼ùÛßœ›[îj©ˆq§NŸÁÜñÝýÔka;>wl¸Ô´$W®^A’$vïÚƒÍf_ô½"+ÔÔTsøÈ1êëêeI–‘$‰‘‘ÑŒ5`׎í¬\±â¾ ò° …BtuwóâóÏÑÞÑÁ›¿ý§Îœaÿ“O’Ÿ—‡Óá »§—kD"ìv;ß}ù%rsrh¾q3uPÛÍ‘£ÇˆD£¬Z±‚gì§©¥…sç/`³Ùxî™§q:=~‚¹`½{ö`š&7[Ûø/ý7¸].¾ÿÊwÉÏËãŸþÉ£( ï¾÷>]]˜¦)âS ßb‘‡Fcs3k¨(/ç7¯¿Avv6/¿ø<“S¼õ»·â{ßýÃ#£ ŽDغy3ë×­¥»·—£G161A @Z"ÀO0䨉“ŒŒŽ²aÝ:N³³s<µ÷ zûúéíëcó¦œÅpêÌÆÇÇijj^ƹ¤sQ>nÃÃ#¼õöÛTT”S__‡$I|vô(Éd’ÜÜ\Î]¸@Oo/‡F¶ÏÇèØoýîmr²³ç뵊¬¬;C§{³¼äåæRYQNyy¹…_w(~I‚ššZöí;€Ç“uǦ™ŠÎôÒóÏ£i‡>û €ñ‰Iü?/¿ô"¯|çeL```p¹ë—¡±©‰ÚÚ²²<Øl6êëêxþÙgH$ Œ ¨ ’$QQ^Îî];©­©! 288D$¡¾®Ó0(/+cÛÖ-4Ô×sãæM‚Á 7nÞdzf†©éi¶lÚD~^>ç.\`.Ä0MJŠKضu +jk™7ÍMLNò÷¿ú5u«W³{ç®ån@ðQT…5 õlݲ§Ó‰Óé ¤¤˜5 ¬Z¹’ÚšjòóóÙ½s'ùyy(ŠÂ†õëùá÷¿G¶ÏÇÙsç …CŸíó2í÷súì9º{zˆÅbè†nÙ‰ áp˜þþ~.^¾LAA>9ÙÙÄâqÎ_¼„ß ·· /qáÒe®\½Æl`‡#Õ=½½B~ (?þÉÿ}uu5.§ I’(**Æåºû‰PÑh—ËEmM5999ø¼><»vl§ª²’öަgfxé…ç©­©y$Fo45·ðÊw_Æb±233ÍèØ#cc¼ü TWW¡%“TUUâv¹X¹b‘h—Ë͵ë×Ù¾m+ååD¢Q¦¦¦èêêfem-/>÷§ƒÖ¶v0MêW¯&©iœ9w»ÍÆóÏ=K¶Ï‡,ËÔ­^E4%77‹ÅBgW7>¯—Ññq´d’úºÕD[ ‚‡ÃÜÜåeeäç§Î¦¯[µŠÒ²Rº{z°ÛlÔ­^¬Èt÷ôRQQÁõÆF:::˜šžæÉ={صsù\¹v©©i*++©©®æØ‰“tuuÑ?0@2™Ä¢Z8qêáH„gì§¶¦ÛÅ¡Ï>ãÙ§Ÿ¦nõjøìØ1"‘Ï8@aaŸ>LWw÷]óÙ²iN‡ƒ‹—.119EUe%¦i°zåJœN'¡pˆüü|Nž>ÍäÔ¦iòýW¾KEy9HÐÓÓKUUJG\¸t™ÁÁAFÇÆ¨ª¬ ªªŠîžl6;•B~I à ,r M#I‰d‚ÿ Òo½aØ€ü¼üå.óCcrr’i¿‘)=ª¼WÓ4Ö¶vª«*iÆ"çMÓ¨¡i², @ð¥Ðuÿå?þïlß¶•}{÷.’/÷#»ôù­ÉÊü)yƒƒü_ówü›õ/)*,\2Íýä)ù'IÒ’÷ïîéá¯ÿîü÷ÿößPŸ/ø×Œ¦iôöö¢iÚßI’D(¢«»ëñ8/??ŸüüÅ›û骪²níš;>¿]¡ß~ŠÖƒ°¼òóó¾–2«ªJ¶Ï÷µÜKðå‹Ð@ =Ì•«×ˆÆbŸ[†d2ÉøÄÄ7¢½Áƒczz†P8ü@òJ$  ‘\"PËr`š&sssKŽ>Hì.Š{xd„ÿëoþ–¹g_ÿîw9wþ}ýý  ñÖÛoóɧŸ~n&§¦ù›_ü=sÁàr7‡@ øyëíw¸zíú¢Ï._¹š‘EÁPˆã'OÝsâ•frrŠ¿þ»_–»Z$’I>~ ‰X,ÊÙsg$™ 6bQ-·]"‘•åáÝ÷ß§¶¶ÐuI‚¹¹ ×›I$’¬_·–‚üG' p,£½½];wòÁGóñ¡Oikï`ÇömØmv Ÿ˜¤¯¿ŸÙÙY\.»wíÄåtÒÚÖN^^n·›ó.ÒÝÛKk[+WÔòìÓO#I¯½ùCCà Œpåê5tCgËÆMr½©‰ÑÑ1V®\A–ÛC_?¿ÿ<{w聆°à«WP <Òø~N9ÃÐÐ õõäädó¿~•ÂÂ^|î9ÆÆÇyý­·å©'÷2;;ÇÄä$±h”5 ”••295Åù Âï÷³T8žx:ø #cclÚ¸EQðù¼üôÇ?Æåròêë¯D0 Ó0Ó ºÜÍ#¾ 3-c $R¯¾"+  15=$ÉÄqº{z …B˜@8e|b‚H$BYi)†aÐÖÞÎÿŸ½ÿŽŽãÈ|ßo–÷UðÞ@zŠ^ôF”÷¦%µŸéžYïÝóöÎÙûv÷í¬¹;;3í¦Õ-/ÊP”¡H‰ÞŠžH ¼÷®PÞf¾? „TËQ€ÄøœC ¨ÊŒÌˆ*Ä/Mdü„Ãaºº»ikï ­½ƒþþì6?öH¬Ïyý ´ ó*+ØñÖÛ(@nN‡ý³eÞx—ËMW×畳­F‹slŒ¦æFFG G"7ÔE‰ ŽV ãv»éèìÄb¶`2™‚4·´àóù¦­½öö::»ðû¨Õ*:»º&Òù ·×ä{ü’ŠËWb4šn¹B||þ4EaÁ‚ùÜ¿};]]¤¤$óðpøØ1dYæž­[ÈÏËéúÐÖÞÇ㥴¤ÈHOãèñ„Ãa6­_Ïœ¢B›šHˆO 3Ó‡$©HIIFB¢ªºšy••hµZ¶mÙÌŽ·Þæ…_"ŽO$¦­½Å‹PZR¾ý¸|ù*E…t÷ôráâEÁ +–/Çf·‘—›ƒF«Án³‘™™)²X  3#‡#µFCNNf³‰Õ«Vðþ‡»9áw¯^Í¢ øxÿ~¬V+‘H„öìåâ¥K̯¬díšÕètZ>þd?z½ŽÔ”‚ ;ß{·Û¢(—›Ëñ“' Ž÷9z½žÅ‹²ãíwذn-&“‰ºúz>Þ·ŸP(ÄÊåË …C¼ñöÛxÜžéËYv•å´wtðÚŽ7IKMåž­[ÈËÍÅ`0 V«ÉÍÎÆd2ÒÓÛË?ýá ¸ï^òóóX¸`>Ÿì?@œÃÁ•«5œ¿x•J…AoàñGfÍêUãíp‘-›6Š>ñ6“v¼µCY¿n=I‰_l ž,Ë(€zürÌõ#½ëéÑ( Z­ö •÷mèè줳«‹Ë–!I±Áˆ¡PE“É8QI’PµZ,˃ANŸ9Kee ãW/"‘Ø=8½NK—)ID#ÔjõÄ—Õãñ R©&2kùü~P,ËÄöÕjõ”¶áû+6ZB¥RFQ©TH’D8F’$4ã—Ê#‘’$ñßþßÿżРV­\Íjè_ü~?  ÓéP«T„Âá‰+‡*• •J5¥ÏéàþÝßóË?û9ÙÙȲŒ×ç›XøBå(Š‚Ïç›èßE™¨G4¥µ­ßþþ~ñóŸ‘–š†Ñh˜¨×õ:Þx{S«Õ¢R©&µƒðÕD"Z[[§+!I¯‡¦æ¦/Ÿïæû/’$M \ÚYø¡ege‘•5ñ»Z­Æh4Þ²×ëi4Y·öîI¯k4,7Õñæ/êõ?¤ë¬7ý~}[ÓmW„ï§ÿÖ'õ™7œ$©T*t:]ìÀ@’°XÌØokucß ×é¦lëæ>§úòRR’ÉÌȘØÎÍË|‘r$IÂl6ß²~×wœÃ1ôo¬×õŸ§ î³édñûnöEiA„;œJ¥âé'ž˜v€õWQTX@IñœÛ~¢‘ž–ÆÏ~ü#¬Vë·ÑLÂW$¿ Â,#IÙÙY_¿ qy¹¹ßÊ~Fòóò¾•m _xnBAî "ð ‚ ÂD~AA¸ƒˆÀ/‚ wøAá2)ð+ŠÂðÈð-óÒClnú±±±‰i#‘ÈĬQ³](Âíöàv»'Mp ( ápø–ue%¶Î˜S?  gºª‚ Ì2×§{Ÿ‹uåIDATØý&D£QÜn÷çöÕߦ?Õ‡ ³Ë¤À/Ë2§N¤¡±þ–àñ'øgÿâ_r­¡€Ö¶6þþW¿ÆãõÎt]þ¤CGŽòÊë¯ó¿þ-míí¯ ñþîÝøýþi×ëèçïþñWŒ üÉm=vœOö˜éª ‚0˼óî{\ªªžôZsK+ƒCC@ìÀ ¦®î %íäû;FΙ®›õïƒÝ1888å½/R¯ÛA¸ýnš«_Â9æäð‘CH@QQñ”™ú‚ÁNço½ýÿò¯ÿŠH$Šsü @(¢­½H$JNvÖ-gxš áp˜êËW˜[ZBSó1NŸ=Ë訓’â9è´Zâp{þ8+–ÝÅ¥êË̯¬ îÚ5>Øýq‡åGÏ?Çû«‹ìÌL, *•D{{5µµ¼S_Ï?ÿå/(*,œéê ‚0âr”Ʀ&‚Á {?ù„ï¿ÎÎN\®1òr³é¤»§‡3çΑžžÆûîÆåv£ÓjÑéôüèùgù`÷Gô÷÷£ÓéøÓÈËW®òêoPŸOaA>:žOOæ_ýõ?çèñãôôö±hÁ^Û±ƒ‚ü|òóòHKKRÖåäåa±˜ùÃK/‰DHMIÁfµñwÿðÄÅÅQŸOݵk(ŠÂ®÷? /7—ÁÁ!V®\Á˜sl¢^YY™SÿÐÐ0ãíCNv¶ü·Ù”Á} ‡ƒE c±LvQQÌ&?ú0«ª¨¾|µZMOo/Õ—/óì3OóË?û9]Ô74Îtý&\«¯'%9™øøx, =pÿø~vÒÒKjÊäæfóÓÿˆÒ’ÚÛÛ¥¿¿Ÿ9EE=~‚ÑQ'*µšËWkèï@§Ó¢( ™™™$&&"+ K/â§?ú!ÉIIt÷ôÌtÕA˜´-›6là‡Ïþ€H$B|\•åܳu+›7ndåòåÌ)*âÇ?|žü¼<‚¡«W®ä¯ÿò/ñû}ì;pƦ&~üÃçyâ±G‰‹sL{KV¥V!I*, ùyyT–—ár»¹Vß@Mm æÍC«ÕN,SX?m ½±œÂ®54àr¹ù‹?ÿ3žyêIâããÐét<òЃܻm+², ‡1™L<ûÌÓ<ýäãœ:}šÒ’bŠçÌáÇÏ??í¬~E…T”_o‡ S®2 ß¼›Z8ô×­Ý@ñœ’[^¢–e™Üœ6mXχ{öàñxÐh´H’Ę˅Ëìw=;ÝL‹F£T_¾JeE9z},FÀ`ll,–)O£ÿRP«5hÔjt:’$Q[[‡Íj%33µJMRR"ó*ÊùóŸý„ÌÌ ¶nÞÌæÙóñ'?qr"ñŽJ¥B§Õ"Ëb°‹ ë_T¨Ôj4 ±9ùÝn7~¿µZE$alÌËTG,øÈJ,‰N4*366†ßï'"G£¸ÜnÆÆÆÃëõ’Ÿ›Çø£N'xéŒF#sK‹ykçNüþsŠŠÈÏË´Œ×ëýÜrþøò+„‚!Á'6O–‘T* z=ê’î\ï#ãYHµ:m¬^®1Âá0~¿b;.—k<[égí€ xÛÝt_ÅÊ«qØ·¼Ôb00[ÌH’ÄšU«¨¾|…žÞ>ÒÓÓX·önv½÷’JbÉâEÌ)𗏻{z¦¬t.ûúð£=„Â!æWVRTP@õå+ †‰lT&“ FÃ¥êjÊæÎŠ׳iãzÞzg'§NŸ!-5•‚¼|=J{g'ƒž”äd¢ÑèÄ‹½^÷•÷[„ï‹ÅŠ^¯G%IØl6ô:óçU²{ÏÇX,V­\AvV&¯¾ñO=þ8áH„÷?ÜÍ™³çHKIa˦(À‹¯¼ŠÙdB­Vãöxxùµ7&ž¬*,, 7'›ÓgÏáñxÈÎÊD§Ó±tñbvîzŸÇy«ÕÂù 9t䯗œì,<^//¿ún·gÚr²23©¨(çòÕ«üý¯~CVV&›6¬Ça³Mdå³Ùlè´ZºººùÍ?ýžp(ÄÆõë)ÈË#+3ƒWߨÁžz’+Wk8ñ"*• ƒÞÀ>‚ùóؽçcÌf3Û¶lF%.õßVÒŽ·v(ë×­')1é ­ˆD£XÆïÝû‚v»EQp:Ç™8‡cÖ jkhl¤¶®Žû¶oG¥R1æráóùP…ä¤$T*^¯­NK4Áb±àóù8t˜•Ë—“‘‘ÀØØNçf‹‡ÝŽËífdd«ÕBRb"Á`yüvˆÇãA«ÕΚ+‚ ÌœëýV«Åãñ`2™A稽^‡ÕjÅçóáõz±X,üÏÿý÷äçå²léRÒRS1 D"'n¹šÍfFGG‰Ê2( ×ëÑô ¡( ©)) †GFøÏÿõoùÙLIñüËhµZ††Çåþœr‚Á ƒƒhÔøý˜®„¸Ýôöõñ›ú=Ï<ù™™™ýëõzÙívü~?>Ÿ$PIGšÑÚAøj"‘­­­“W¿N’$<^MÍM_>;ŸÁ`˜ô»Ñ`À8þš$IÄÇÇÍtݧ(*,¤¨°pâ*†ÃnŸ2ÀÄf›üe3™L˜L&}ø¡I÷œìv;öÖ‹#>î³:ߘ+ÛrS.kAî\7ö7¦ÛMLL˜øùz¿FQ…´ÔÔI™õ4 éi“Gà'''OÙ–9;{Òï55µ$&&’Ÿ»Çn4ȹi™”/PŽ^¯'+3sâwV;©NƒChµZ ˆs8¦Ô @§ÓMêC§káöº#Òò~¢b ‰ ß6•JÅö­[IIIþú…‡ƒíÛ¶N Ô·CrR"<ø ¦N€„ÙçŽü‚ ß%’$±`þ¼o¬¼ÊŠòoe¿m6w-]ò­lKøêÄé¬ ‚ ÜADàA„;ˆü‚ ‚p_Aî "ð ‚ ÂdRàWŸïóÓë*Š2)#”¢(±É#¾E!Ê_:ot4«£,Ë„Ãá[æÁù¨A˜Ž¢(ßXÿps?,_ƤÀ/+2§NJggÇ-W8ùé)þÏÿÏ «»€öŽ~÷O¿Çëýü†ÙàÓÓ§yíüî…hïø¬Ž###ì;p 0ízÃÃ#üö÷¿§©¹™ßÿñü×ÿñ?yóíwÜ´üðȯïx·Û3ÓUa–Ù½g/W®ÖLzmph·'Ö_„Ãazz{¿P@âw/ü§Ó9ÓÕ  ±ïÀA†GF¦¼÷Eêuc;·ß¤À/!ÑÛ×ËÁÃèêîœöètÔéäÂÅK¼ùö;ƒAü~?-­m±„²ÌÈȃCCÓN8“¢Ñ(gÏG§×ÓÜÒJ]}=]„Ãa$$•Š`0ÈðÈ]ô L|Q›Zš úòjjëX¶t)III(€slŒ®înÜ>ŸÓçÎÑÐØHk[;¡px¦«-Â,qµ¶–+5546516›6ü¥W^cßþŒŽŽRßÐÈßÿê7446ðz½ Œ008H(ëK"‘]ÝÝ\«o ¡±‘pxj?«(ʤ~É;>].Ä‚°k|^ÿ‰eÜîi÷wºeB¡Ý==ôöö …chx˜‘ÑQ$)ÖÏŽ¹dtÔ‰¢(446Mª×Í&µƒÓ)®š~ ¦Là#!ÑÓÓ͉“ǹgëvl¶ÉS+J’ÄŠåËpŽqôø ²³2Q©U(Àþƒ‡8{î P\TÄCÜN7;’Ô Ò?0À½Û¶qìø >Ê©Óg(-)aéâÅTU]&‰òÑÞIKKehh˜>÷*ËË©ª¾Ë7]_O_?‡E§Óçpðáž= ÊæÎe^e%ƒƒC|ðÑGx¼^î^½Šû·oŸéª ‚0 D£QŽŸ“ÉDA~Á¤yç'ÞUâãyô¡‡8xøMÍ-¨Ujúúú9tä>p??yþyÎ_¼DCcÓL×oBCcv›¤ä$, Ï<ù¿øùϸTUMSs3Î1'>¿øø8~ùóŸ‘“E]Ý5<ܵt)K/bÁüy<òЃ„B!‡†ani)•å±™±’“’øé~ÈÆuë¸rµ†h4:ÓUaШ5lÙ¸‘?ûéOÂç`Á¼yÜ·ýîÙº…5«VQR<‡ŸÿäÇæç3<2Ââ… ùÅÏFk[æÌÙó<÷ƒð£çž#..nڳ㑑щ~©¢¬ŒÒ’b:»ºhmkãRu5…¸\.†F†c}WEù´ÓšßXNeE 4·´ðË?ÿ9?z>¶ý@ È=Û¶²}ÛV\n¯—P8ÌÓO>Á–M›øxÿ~*+*(-)æÏ~ú ò§lgNQóçUÆÚaËô¿SÎøF+–¯bá‚Å·üdE¡¼¼ŒÅ x÷ý÷qØíD"aEÁn³a³YQ«U±Ëè³€,ËTUWSQ^>1‡´Z£Æd2¡(2ÁPhü‹/a2™°X,X­VEáZ}:ŽüÜ\:::Ѩ5ôzæWV’˜À¾ƒ©½vG|­N‹ÉhšHï+.[ ‚ ©$Lff“ƒ^$IhµZÔj5ƒA$©Ðjµ¨T*T*v»Ô”TŒF#α1d9ŠÉd$#I±þ%‰L¤°W©$*++x^­fÿ¡CÔÔÕñWñKòóryïÃÝxÜÊËæb4™xþ™gbËÔÖñ×ùh4š[–SwíK—,A’$,f3&cl´Z-‰ XÌæ‰¼&zŽøøxBá0ápZJ5^/I¿-Û$F£FwC;·ß¤V–$¸ë®e¤¦¤Þ2è_ÿBªU*¶mÙÌù‹—pŽ9ÉHO§²¢‚—_}­NKnNΔK:3ehh˜ÞÞ>î¿w;Š»Oµ{Ï^"‘™äçårîüyT* •JB!vKCQª._¦xÎ4 *Išør«Õ*êê¯ÑÐØ„,˨$ I’P«T(( Å–AP«THÄάc}¨šü¼\9‚ÉddÁ¼yX,f^|åU{ø!Âá0ûäjM-µš­›6á÷ûùÝïÿ€ÍfÅï÷ãr¹Ø¹ë=<Š¢—›KzZWkk'Æ(i4–.YÌßü?ÿ‰û¶ßƒÃá ªú2.]B–e$µÄؘ‹ï½×;}9QI¢´x'>ý”ÿý«_“›“Ͳ¥KQkÔ±§ø,6ôôöòúŽ7â®%KÈÍÉÆd2ñâ+¯òÄ£PßÐHõ•+¨$z½ŽûïÝNA~>‡ŽÁ`4°aíZ‘í6“v¼µCY¿n=I‰I_h…ÑÑQ ii© 1ær‘—›K8¡½£h4JNvöDÆ™VS[Ë©3gyþÙ V©hkï`Ì5†,Ë¢×éèÀb6ãHOKcphˆ@ ÀÞOö±aÝZ Ãëóáp8Âh0ÒÒÖŠ¢(bµXèéí###}â2#=ýkeáû¡»§³ÉŒÕj¡»»‡ää$E¡µ­ »ÝNzZý “•‘Áßÿú7ÄÅű`Þ<Š‹ŠHHˆÇëõÒÐÔ4qu55%…–¶¶ØÕU%–^Üf³ÑÚÖë— HHH`tt”ÿðÿüùñóϱ`Þ¿œ‘ÑQš›[Ðëõäç1<2BrRZ­–îžÜn7¿úíïØ¶u 9YYÏ™ƒN§£¯¿Ÿ¡áar³³epx(v¢¤V“Ÿ›‹F£™Ô¢Ïüj"‘­­­Ó®—$ ×CSsÓ—üßE‘HY–¿Ò@Ã@ €~ü²œ ·!ò_þÛgÕŠ¬]³úk—wîüöîÛÇ¿ù=íØ­oJSs ¿}áþý¿û·8ìö¯_ ð¥|ÑÀGÜPù:÷ ÃLï¾ wI’X²xéißHy¡p˜»W¯º­AÀn·±jùrtZí·ÑLÂWtG~A„ï•JÅ–¿±ò–-]ò­Ü7OJLäûî½íÛ¾øA¾çÄ#rÂÄÐIAA¸ƒˆÀ/‚ wøAá"¿ ‚ ÜA¦þÙ2Í® ‚ ß¼I_–eÎ_8ËÐðÐ-W¸T]Í?üú7ŒŒŽÐÓÛËÛ;ßÅï0Û]¹Zû?âíwߥ§§wâu—Û͹óƒÓ®çr¹yg×.ö~²c'Nܲü1—‹OöÀëóMû¾ßïçRUul¯WÌã/wŸž¢©¹yÒk>ŸP(Ä&íñx<Ÿ›·þº‘‘vîzï–)u¿m¡p˜sç/àr¹¦¼÷Eêuc;·ß”3þ–Ö9ÈÈÈð´+tvuñÖÎwÙõþD£QœÎ1Μ;G8ûÐÂáð¬ÌC¯( ÇOždhx˜³ç.ÐÞÙg¶N8<‘ ÃçóFq¹Ü|²ÿýýý¸\®)ýБ£üö÷¿çÅW^åÅW^Åç÷Ït³‚ð-ùôÔ)jêêuGˆD£¼ùÎN>=}†p8LWw¿ýý •edYŽõ§7D¯ÏGwo/§Îœ™6¿=0Ñ/E"Ññ¤8± «(ÊDÆÐÏ–‰ÜrŸ§[Æï÷ã÷ûcsøG£„Ãa‚}ýƒA¢Ñ(¡Phb®î~3^¯é‚$™ÔÂí7õ9~š››Ðh´lÚ¸‹Ù2émµJÍÒÅ‹¨ohàâ¥*¬VkìQIâÂÅ‹>zœH4Â’E‹X»fõ¬y~txd„®înžzâqÎ_¸È[ïìä“ýX¹|%Å%ôööqþâ%>Œ^¯'óÜ3O“Ÿ—GÕåË”£R©p¹Ý\¬ªâÔé3¬Z¹‚£ÇŽãñzY0oeeôõõñ‡—^!pÏ–-¬^µrb´Z-]]ŒŒŽr×’Åb`A¸ƒ„Âaö~²ó.’™‘ÁÂóÙûÉ>,3### ³ÿÐaFNžyò ª._¦³³‹@ Èüy•lݼ‰ÓgÏräè1¼>cccHÓLÊÓÝÓÃ;ïîÂëó±pþÁb±0::Êý÷nŸ5qãûjšÁ} jµ»Í6mã˲LVf&÷Þ³÷>ÜM__*•Š¡¡av¾÷>K/âž-[øø“}´´¶Ítý&4·ÄKd¤¥c6›xì‘GxüÑG8pè0MÍM´¶·34Á¢… 9ñé§Do8Ò¶Ù¬l\¿ž ëÖQN|zŠŸžâã}û¹gëV~ðÔSØíöio65·Pw­žeK—PR\LVfÕ—¯ÐÓÛË™sçpØm´u´O,SZR<íþÞXÎÜÒš[ZùôôižxìQôlV+,Z¸€5«VÒÞÑÁàÐ0]lÙ´‰9EEìzÿæ––PXPÀS?NNvÖ”íäåå2·´”ëÖ±öî5"3ß·`Ê¿F£aÁü…¬\±½^?íJŠ¢°léR®Õ7°ëƒÐét¸=n‘sKKp8huZF£3]¿‰ý­ª¾ÌÜ’Ìf*•‡ÃNA~> àtŽ¡V«$‰øøxÒÓÓINJ"ÒÔÜ@QAµµuŒ:X­’“’(ÈËÇëósäØqZZÛX¿v-&“‘ää$†‡‡©oh@ŽF‘ˆMÁ¹léRòssq¹=äÏt³‚ð-R©T$%&’’”„ÙdB­Ñ`6›ˆÇáp`wŽa4HOMÅh4¢ÖhÈÌÈ ²¢œ¸457DÉÏÏÃçóÝ2É¢… ðú|9vœæ–V~ðÔ“¤¥¥N܆|øÁ°Z,¸=Þ‰e~øìÐÞ4¿þå´¶µ“Ÿ—‹Á`  ?FƒËåÆh4’Ÿ—GJJJl$°Z,äçáp88söZ­£ÑHZZê´¹OLF#f“™øøx⎙þ˜îS¾9 æ/";;çsƒþõLw?p?.]Âëõ’‘–FNV¯ïx£ÑˆÍfcNaáL׈ ºkïèäîÕ« ŸÏÇÑc'8zì8V‹…œìlΞ??Q·ë—©¢²Ìå+W(ÈËÃ`0•eV¯ZIœÃÁ‹¯¼Âê•+ …‚ÄÇÅÓÚÖN$!*Ë(²‚¢ÈH’DWw7~´‡>÷,6«•ääd’““gºIAø–)òõþ%ö•$‘œœÌ±'ˆ‹s›“ƒ$©xûÝ]lÛ¼™H$¹ Äï÷³aíZœN'¯¼ö:v» ·ÛƒÛíæè±ã±ñBŠBzz ññ„‚×û¥6Ôj5w-^Ìÿ_ÇúµkILH ¡±‘`0@|\¥¥%H’„ÃagÛæÍÄÇÇÏtýhhl¢§¯—-›6¢ÑhHˆG§Ób±X¸÷žm¤§¥‘š’BaA99Ù¤$'c³ÙHJL ªú «W® %9‹ÙL~^.Ë–.E«Õb1›ub³YÙ¾m+ii©¤¦¤••‰Åb!3#ƒ¤¤$$IENVö×Ê(Âw›Ãa'''»ÃARb"9ÙÙä£×ëIˆO ';›ì¬,T*é\¼TE8"1!‘m[6SŸOQQ!~¿“ÉÄ]K“™‘ÁÐðƒÞ@\œƒøøúúûcýÒÖ­$&&b1›9}æ Û¶n&';›@0Hww6{¬ïŠs8è¸e9÷lÝJ~^.ùyŒ¡ÑhÈÉÎ&3#ƒìì,ŒI‰‰X¬Ξ;O||<…lÞ¸„øx232Q©Tdefâ÷û  FŒ&#Y™™”ÏA¯×“˜@rR’ÿôɲŒÓéœv¥$I„Â!FFGv¼µCY¿n=I‰I3½Ï·ÍõGE_ú2’Âðð6»­Ú‚ |KdYæ?ÿícÕŠ¬]³úk—WS[Ë›ïìä_ÿõ_a³ÙnÛ~7µ´ð»ß¿ÀÿõoÿÍWèo…¯+‰ÐÚÚ:í“’$áñzhjnº3²ó™L&L&ÓWXS"!!a¦w_„;Œäçåç°#åõõ°pþüÛô!v¿¾¨°PŒÊŸåîˆÀ/‚ð]¢V©xêñǾ±òV._ŽZsûƒqzZ?ýÑÅ¥úYN~A„Yè› žƒþë2û-Übè¤ ‚ ÜADàA„;ˆü‚ ‚p_Aî SÿI )|u##£ŒŽNÊØãñÐß?0é5ñY‚ ß´I_–ejj¯âñz¦]8 ràÐazûúèíëãè±ãß™<Êíœ:}†ã'O2<22ñºßï§¹¥…ð-ÒSúý~Ž89m®é[ñûý´´¶ÒÚÖÆ…‹—b)|£QÞÙµ‹³çÏO»o¯½ù&~¿Ÿáá^~íuþñ7¿åȱc"U¥ Ü¡®Oï;SÛnïè `€“§N1v‹þOŸ¶Wøî˜rÆ_Ss…'ŽáÏU#µZMGg'o¼ùn·›·w¾K{gçÄT´ÓeŠšM>¥˗ÙýÑ^:»º&¾¬n‡ —ª&`®Ï§}]{GíÝ;±üõ|ÖÓýQÞX楪jjjë8tä(Š¢ÐÑÑAcS•åSö-//@ À•št:…ùùÏ)âýwSßÐ8ÓM' ¨ohäwwMêg¦ëgoì³®÷OŸçó–¿q[W®ÖÐÖÞÎî=3<<ãY—Æ\.Z[Ûxà¾{©©©åõor0ù0ëî¾›ŒŒtP®]«çôÙ³„Ba´Z >ü©))\¾r•¢‚®ÔÔRU]? 1!P(„ßïçчÂ`0ðöÎwq¹\”——±`Þ<¢Ñ(’$M$œ¨©­#9)$‰W^ƒ ëÖÒÓÛKWW7÷ß»ÜìlΜ;ÏÒÅ‹Y±|ÝÝ=ì?xI%ž‹„ï2EQ¸ZSñ'Ѩլ_·–ê+WY´`>¹99ìýdùyyD£Ž;ŽF£áîÕ«yïƒ9sîƒCC<ùØcôõ÷sèÈ´Z-÷lÝ‚Ñhäww ‘$ñqzz{Y´p!ë×Þ=%ÙÍÀà ;w½7íòëî^Þ?¡¦¶»ÝÆý÷nGQY™È^z³Þ|çFG òèCN›O˜]¦Ü'!Ë2Á@`Ú#Ǹ¸8¶mÙLUõeîÛ~f“‰7ßÙI Àn·óú›oÑÓÛË;ïîÂf³QVZŠfLߨÖÞŽ‚BNv6z½žuwßÍâ… ÙùÞ{45·p±ºš¶Žv¹{õ*9}ö,‘H„kõõTT”ÓÒÚŠËífù]K9rì8%ÅÅDe™ƒ‡`Ðë™WQAÙÜRöìý„+Wk¸T]M0D’bGÑ]]¤¦$“˜˜ŠÂ?þæ·¼óî.2ÒÓQ©T$&&288ˆ,Ë Œðû_dÑÂ…³&Ë¡ _M8æ½>Äëõ1þ<¬ .—‹cÇc·Ož:…$IŸ-3¯»ÍFaA>Y™¬Z¹‚H4Âk;ÞÄápàóûÙ¹ë=œN'—ª/³tÉúúq޲há>úøc\n÷”ýp¹Ý·\Þív“•ÅÊåËèèèäÀ¡Ã\¾z•Þþ~`ú“«ÕJ^nù,]¼F‹0ûM ü’J¢¸¸„µw¯Çb±L»RFZz,“Tf&^Ÿ¶övzz{éîéÁfµaµZyðþûéîéåøÉ“ø|þ™®'ÕÕ—™ST„ÅjA§Ó’›“ÃÊˉF£ôô£Ñ¨‘$éééÌ«¬ ;;¿ßO[{;Á`ˆ’âb$ ';›²¹sIIN¢¨°€Üœl|>_ìÒ~u5 Mx½^¼“òeKH’„hµZ´ ë×®¥±© NÇüy•0þžZ­F’$º»{HJJâ¡ûï›’'[„ï­V˽ÛïARI8t—ÛͲ¥Khjiæèñ$'%‘ŸŸÇ=Û¶M,ãñzHOO'11‘yø|~º»»ikkÃívc2™PˆsP>·”ì¬,232)).A%IÓ'jáË«Tøü~ZÛÚ8wá".·§Ó‰J’PI L{Æo4IKM!#=9EEh¾…i…¯oÊ¥þ’âR ?7™ƒ¬(DÇtX¬VŠ P©$/\„ÉdEÁh4r×’ÅìxûmÚ;:HI™¹ô^Ÿ¦æ~ðÔ*^¯+W¯r­¾•JEZj*‘HE–‰F£±Á*ã—¸®\­!+3»ÍFT–QøìÞþõ<Ô ±å:»ºØ¼q#MÍÈr”h4ŠN§££³“†ÆF²33imkÃï°ÿÐ!*+*p:œ9wŽ•Ë—3444žÆWBVdÒRSÑét3Ön‚ |3Bá0²,³léRvîzêËWxðûÑëõ¼½s'ùË_€¢ Ëщe._¹Êœ¢"†‡‡9rìsŠŠÈÍÍ!??‚¼|âãã$)Ög)Êx¿EQb}S$áüÅ‹8cXÌfŒ&ã´Ë+²Ì訓£ÇO°~ÝÝøþ‰~^¥V …¸p©Š`0DgW×ÄA@Éœ9Øl6ª._æÜ… ̯¬'*ßêG{ôoòòò0›ÌH’DJJ*ƒñsWRFCQQ½žÜœlzz{immÇl6‘š’ÂŪjš[[Y¼p!ËîZŠ~X}C×êë¹oû=hµZB¡£N'.·›ûœœl´5yyy$ÄÇ‘››‹,G±Ùl\¼t‰åËï"3#ƒh$JJJ2i©©¢ÕjILH ¼¬Œáᆆ†(-.fni qqqT”—166†^¯§¨°€c'N’““ßçç¡î'';§ÓIRR»Þÿ€Õ+W•™ÉðÈ^¯—‚1÷µ |ÇÉÑ(Wkj¹rõ*ùù¹lX»›ÍŠË妡©™çžy­VËÕ«5ˬ_»–ŒôtdEaÔ9FÙܹæçÓØÔLOo/I‰‰¤¦¦ Õh)*,$ÒÒRINJB­VSŸOUõeÚÚÛ& ’›“ƒÍj£°°`Òò*µŠÊòrL&MÍÍ$%%1¯²‚Ô” ò‰s8Ä ×SwíÃ##ŒŒŒœœDÙܹ¸=äh”ü¼|‘™oɲŒÓéœö) I’…CŒŒŽ íxk‡²~Ýz’“¾ñPeV­ÑÑQ\n79ÙÙ_j½h4Jk[éé“9~UÑh”^|‰‚ü|6¬[;齫55¼÷ánþò¿Àn¿½©3A˜7ö‰ ðæÛïàózùásÏN Ä›é~s¦·/|u‘H„ÖÖÖéoóH¯‡¦æ¦Û›o¶|yââ∋‹ûÒë©Õj ¾±ýP«Õ<üÀýÈÓ<Ž“™‘ÁŸ}V}Aø»±O ôôô°iÃúI£ïgºßœéí ·ŸHËû-KLLœöu‡Ãc†yáÛ£Ñjyö™§güQgáÎ#¿  ШÕ$ÝâD@n'‘¤GAî "ð ‚ ÂD~AA¸ƒˆÀ/‚ wøAá2)ð˲LKk3ÁPð–+ P}ùÊDîz×K}CôÌ6Ã##465QßЀÇã™x=344|Ët–áp˜ú†|þ[çp:Çhjn¾e^jY–éèìÂïŸù¼‚ |ûzz{qŽ}#e'R‰Ï4Y–&Ïô®_ÀMgü .œçܹ³·üB9wžýüŸœ8ù)üᥗñù|3]—?é“ýØûÉ>^|å5::;'^á“§?àéìêâ/¿ò¹AûZ}=¯½±ã–_üP(ÄK¯¾JgW×L7ƒ 3`ç®÷¹TU=éµã'OÒØÔ ÀØØ{>þ„àæƒCC¼øÊ«Œ¹\3]- vr´ïÀ†GF¦¼÷Eêuc;·ßMÏñK„BAΞ;Kº³hé”$1*•ŠÔÔ>Ú»—â9EHRìØA’$†‡‡9}î¡PˆÅ ’•™9Óõ›àóùhljbÝÝwÓÔ¼‹wßÿ€ —.±zåJlV+ ñqtwwSw­—ÛÙdbãúuØl6j뮑‘žNww7GŽÃåv“ž–†Ûí&‰°yÓÆñæ“ðû?ù)ùù s­¾ÌŒ .˜ÏàÐ︻ÝÎòewQQV6ÓÍ"·ÄívsèÈ)/›KJr /¿ú:‰‰ ܳu ýƒ¼ùÖÛtuw³uó&†††éíëÅçó3Þ<Š èîîáè‰ãt÷ôât:§eÏï÷sêÌYº{z(Ÿ[ŠÁ`Äëó²xáBzzzéèꤼ¬ŒsçÏÓÕÝCYi ,øÜr®/ÓÔÜ™sç0 ¬Z±‚+55x<L« ŸÏÏÁÇq¹ÜèõzV._Ρ#GymÇ›tuw³mËæ)q¡µ­—^}¤Ä¶oÝÊŠåË&Íd(|ó¦i]‰`0HWwÀÔ3\EQ˜_YIùÜ2Þyw@I’ðùý¼ôêktuuãõúxáÅ—šéúMèèê"PTKz““N«ã•×^§¥­£ÇOpµ¦–½Ÿì#!>žÓgÎòéé3Ȳ̕š*+*¨º|™ —ª°Z­¼úƨT*®54pððT*n·›7Þz‹¦æfFGGyáÅ—P«Õ¨$)–ÉOQˆÇ`г㭷 ƒ_¿b‚ |'((˜Œ&ÒRSyëwq¹\ ¬ 6« “шN¯#Îá@£Ñ°ç“O¨»VÏïç/½LCc¯¾±ƒH8B~^^,Î4ÓŸ¿x‘wÞÝ…Íj%âõzÙõþ¸ÜnŽ?NccUUÕ¼½s|™HåO”Féëëã•×_G§Õ’˜˜@8æÝ÷ß§»§$‰£ÇÓÐÔÈ[;ß% R}å o¿û.Z­½^OœÃ1m¶QN‡A¯Çj±`µZgúcº#L üdee³vÍ:l6û”·EA­Ñpÿ}ÛurøèQ$I¢·¯¾þ~}ø!žzü1B¡0-­­3]¿ —¯\%/7»ÍŽÑh`ñ¢…<üЃx}>:;»PkÔ Iäåæ°eÓFæÌ)btt”îž\.e¥¥€ÄÜÒb6¬½›”ädîZº„²¹sFR©¨ohäÜ… ܳu EE…T–—ÓÔÜŒÛãÌ&+–/cõÊ•D"üÀL7‹ ßFâ… X{÷ =‹™¼Ü/ZÄ¼Ê æ––ž–ÎæIKME¥R±dñ"ž{æi¬V GŽcÔ9Êý÷Ý˲¥K°X,(Ól'';‡¼Üê®]# QR<­FÃÙsçinn殥KÈÍýl™p$·œew-EQŽ8Aww799Ùx¼ÞXù&ýƒ¤¥¦päèqºººq{<]&I¡pˆ‘ѤoíPÖ¯[ORbÒ7²áëGk³éƒëéí¥¿€ùó*'ö+‰ ( Z­ö–ë…B!.UUSR<»ÝþE77Ñ‘H„H4ŠÑ`˜é&a–º¹Ï”ǯ:þíÿüY´`kV¯šÔ‡D"@«ÑL,#I’&žÊÒëõ@¬üû_ýšö‹?'#=EQ¦,óEÊX¿(IÒ´}gSK ¿ûýøçñ RSRÐh>?.Ë2*•ê³+ž7lG’¤Y;¾k"‘­­­Ó>^/I¯‡¦æ¦o>;ßlüÐÒÓÒH?#¿îÆ/ä­èt:îZºä+·ƒV«ýÜ A„›ûÌëÁQ«Õ`4§œ8ÜÜwMwOüÆ@ ±1Néé餥¦Nlóæe¾H9Àç^¥TIz½³Ù|Ëý¼èÿT;·HË+‚0˨T*žæLfó7R^EyóçUÞösüòÏ~ŽMŒÎŸÕDàA˜e$I"ù‘žþ­ì·^§›¸ª Ì^â¹ AA¸ƒˆÀ/‚ wøAá"¿ ‚ ÜADàA„;ȤÀ¯( ýý}·ÌKàñxèí뛘ì! 184tË<ô³‰Ïïghx˜Á¡¡Ii‡eYÆï÷ßrªÈh4ÊàÐЗÎ5­( ccc"Gµ ¸ÝnßP~Žp$ÂÐÐÐçöÕß&EQðûý߉8 ÜøeYæÔ™O©©¹rËðøÉOùgý/¸|õ*­míüïƒ×ëéºüIâ7ßâW¿ùmíí¯_O—ë÷û§]¯·¯¿ÿÕ¯u:¿Ôö‚¡/¼ô2]Ý3]uAfØ[;ßåbUÕ¤×jjëèííb©ÃÏ]¸Hä óÁÁA~õÛß}é>év …ü¿{7ƒƒƒSÞû"õº±„ÛoÒ\ý.ž§¾á&£‰ÄĤ)>446r±ªšÁÁ!.˜Çãáüù ¬Y½Š¨,sµ¦–ÎÎ.Ì3†Y4Um0âýwS>w.5µux<\.6› FƒÛíÁl6ÓØØÄµúzúHLH@£ÑpîÂFFFX¶t 5µu446b4P©Tœ=žkõ ¨$‡¶övªª/ãóy±Ym¼÷Á‡º{zc9«m¶™n AfÀ'ûÐ××ÏðÈáp„_ýö·´wt`³Û¸V_Ï^|­VK\\ƒƒƒ´´µÑÖÖŽÁ`Àl2166Æ™sç¸t©Š¦–î^½ “É4i;‘H„kõõ\­©Àëõ1<2BœÃÓ餳««ÅB}CWkjQ…¸¸¸)û{c9×—âüù ôôôb³Yini¥££3–¡T’HHˆ§³³‹Ö¶6†††‰‹spúÌY^xñ%´Z-ñññSö·¿€øM¬ìv;‰‰ b¿¯è‹ÎÕ?e —ËÅ•š+dgçLIØ£( w-YŒ^¯çý?bÑÂãs:‡yï Œ ×é8~ò$?ûñ±ÙfÇ NÝÝãéuç–²{Ï^¼ÞXÒˆªêËlÚ°ÃGâr¹Ø½w/+—-£êò‚ÁkV­¤êòe*ÊË9rì8'>=EEyV«•Œ ‰ú†F¼^/‡ŽááàÍ·ß¡¨°·ÛEzZ:¡pˆÁA†GG¹T]Í¿ûWÿRLã+w ¨¥`‹ÅÌ‘cÇxü‘GuƒƒC  㣭½¹¥¥¼µs'Á`³ÉÄC‡ùÉžg×ø‰„ÑhŒÝBœ&@^¬ªâµ7Þdþ¼J –ðБ£üÛù×>vœ‘á*ÊËxíÍ7™_Y‰¬ÈäåNMŒsc9Š¢àp8xáÅ—°˜Í¤¦¦‘‘Îoþé÷¤§¥RXXÀ…‹—P™wßû€ò²¹ôôö2¿r²¨WEy‰ “¶ãñzE’$))ž#ÿm6epŸ‚Bbb"ËîZŽÕ:õìTQ =ü0×ê9wá*•šžÞ®54òì3Oóg?û)CCÃ446Îtý&ÔÖÕ‘ž–Fœ#‹Å̶-›øÙDÿÀ-mm±ÔºŠBA^?xú)æ––ÐÓÓÃÐÐ0CCÔϋÃaG­V!II‰X-2ÒÓÑh4ôôôâr¹ˆ‹Çç÷‘2ž Âb6sï=Ûxð¾{q¹\ø|þ¯]A¾{´-ëî^Ã>‚$I8vÊJKÙ´a=k׬æ®%‹)ÈÏã™'Ÿ$7'›h4Êê•+øË_þ€}ÒÙÙÉs?x†ûïÝŽÝnŸv\’ÕbÅl6 †HIM¡¢¼Œ`0À•šZ®]»ÆâE °Ûm˜M±eÒRÓ¦ÝßËIKK£¾¡‘P(ÄÏòc}è!âL&#=p?[6mB’TD¢QlvO=þÏ>ý.]¤°°€Â‚žyò r²³§l'?/¹¥%íp»§¦~…ÄÄ$6¬ßD~^Á´€‚B4%==í[·òñ¾ý¸Ü.ŒF#jµŠ®®nºº»‰ÊQ¬VËL׈]²ºRSCey9:–p8ÌØ˜‹®în"‘Xöͱ'()žƒÉdÂd2ñÔ““•‘Á |‰¾þ~ vä:‘ ‘kZîDAZ’b‰x•Jbphˆ1— •JE(¦·¿ob`$Åëõ ‡ˆ‹#•éîîÁét‡‰F" 300@ÿÀN§“´ÔTžÿÁ3ȲÌ_z½NGEYo¾ýáH„‚ü|ÒRÓxîú2/¿‚ÇãahèÖå¼øÊ+(Š‚Ç㡯¿×;1°P­VgדAE– G"Œ:ôz z=¡PˆÞ¾~Á.·›þŒ ´V«T±v»å ká›3éR¿$©X¹|ÖÏI°`µXIHˆIbÙ]K¹Z[KWw7i©©Ü³u+û`íšÕäçÏtýèìêÂécni)v»÷ï'³bù2Š ¨©«Ãfµ’˜€Ä9ì¨Ô*.UUSYQŽZ­æü… œ¿x‰p8ÄÜ’RÇç¤>wþ ñŒqêÌYÜn7¥¥%8ìv’““Ðéõè´Z’““Q‹£YA¸#%&&`±˜Q«T¤$'c4Xºd ìÞM|\kV¯¢¤xï¼»‹§ŒH$ÂûîæÌ¹s°qýzÔj5o¾³£Ñ€ÕbÁëó±ó½÷q»Ü(ŠBQa¹¹¹œ¼––VšZZظ~*•  @0@Vv;•ªV©e½^O(&pôøq–,^LJr2@±±1´Z ‡•JŨÓI4Ål6¡Öhðx<„B!âôz=@`"e(B¯×ÏšváÛ Q«Õ¨Õj‚Á :I’ðú|hÔj áp˜@0ˆN«åü¯¿£´¤„Ë—‘F£™xDøú-WN‡×çCÌ¥ÑhÐjµŒ¹\(ŠB|\†¡¡aþëÿøŸüùÏ~BA~>ápçx9ñqq¨T*<^ïŸ,'ât:Q©ÕجV‘:­I’CttuòÛzÿð92ÒÓ'ú×ëõ2Œ„á‰Ç©%IÂd2¡V«'µƒðÕD"Z[[‰D"SÞ“$ ×CSsÓ—ÏΧÑh&­¤Ñh&å]¾yÄælŸŸG~~ÞÄïFƒaJŽkÃMy§uZ-:­–{ï¹ç³e z †É³âŽI¿Çß4:öÆ/±øB ÂëÆÜö7ö–RïjµZ´ZíÄeô¸8)7dé‹ pL*wº¸I‰‰“~¿|õ II‰÷صZí”e¾H9jµš„ç©Õêê¤G%©ÐhÔ¤§¥Nýë Ñ1S¶eù†R šHË+‚0˨T*~èAâã¿‘òÒÓÒyðþÌI'i·Cjj Ï>ýÔÄãáÂì$¿ Â,#I%sæ|cå•se}‹ÙLyYÙ·²-á«#ÍAá"¿ ‚ ÜADàA„;ˆü‚ ‚p_Aî “¿¢(¸Æ'l¸•H$B œø]–e‚ÁàwbšÅh4J0$ NÊ^¤(Êçæ‘Vå+Õ1Κ|Ù‚ ̬H$òå«õI¡YÕïʲ<«öG¸µI_–e>=u‚ÖÖ–[®püä§üËóoiim ­­üÍoñz}3]—?éèñ¼üÚëüê·¿£­½}âõáá>Úû1~ÿô t‡†ø‡ßü––ÖV::;¿ðöŽŸü”ýÍtµA˜v}ð!UÕ—'½v}Þ}ˆ¥omm#úùõï~Çèøº3- ñÑÞžö½?U¯ÛA¸ýnš«_bhxˆÎ®N$I"''wJ¢¯×KKk;Þ~›¿þËF0¤·¯Y–‰D"ô÷‰FIMIž4SÕL‹D"\¼t‰ü¼<®Õ7Puù2ÁPˆÜìlÔ5f³ ŸßÏðÈn·ƒAOVVµšÆ¦f¼^—ª/s©ªŠ>û,9ÙYH’DWW7ÁPì¬,Ôj5Ý==( d¤§ÓÛÛK[G)ÉÉÄÇÇ‘•™)2O ª©¹·Û$Idd¤cÐëùã˯““ÍÆõëèééåÕ7vðƒ§ž¤xNáp¯ÏK$!99“ÉH0¤½£ƒ–Ö6Ú;:¦½¢(Ë2ƒƒŒ‘˜˜ˆZ­F–eâãâx<âââÂ96FbBÂ¤Ùø¦-g|ŸÏGWwjµŠôôt\c.BárTÆd2"Ë2ý´Z-)ÉÉÔÔÔòÊëoÄêUk¦©íë`phˆ‡|€‡sábWkjÉÌÈ`ÕŠåœ:sŸßχí¡¨ €Î®.ž}æi/\HUu5E…444RS[Çž?æÉÇãø‰“\©©!!>ž-›6rþÂEêIIIfëæM¨T*ê®]C«ÑÐÕÓÃ_ýÅ/ÉËÍé¦aD£Q.\ºD__ÁPˆ­›7SSWGGW'v»ÁÁ!ùhï^Ìf3ŸìßÏÐð0‰‰‰<÷ƒ§ÙóñÇ446¡R©ðz½ÓÈÚºk¼úÆ’“’()žƒÑ`àÂ¥*þêŸý’c'NÒÞÑÁ²¥KyýÍ7IJL¢xN!÷lÝ:¥¬Ë)žSÄÚ5«yùµ×&%9™ë×ñëßýF£‘¼Ü\ÚÛ;P«Õ¼ÿánR’“u:Ù¼a#]]446²{ï^l6+E……“¶ÓÕÝCMm-]8ìvîÙºµZþÛiÊé§‚‚Åb¥ln9fóÔ´ºŠ¢`·Ùxü‘G8ùé)ê®]C­VÓÛ×Ë©Ógyê‰ÇøóŸÿŒºúêgº~êHˆ'1!«Õ“=Ê?ûó?§¾¡¦æü~?¡P˜Œôt~ñóŸQTXHSS3cc.º{z¸kéV­\Á¼Ê þì§?!ŽpáÒ%~òüóüâç?#7'—ÛZ£¦¢¼ŒääddEaé’%üÅŸÿqÇ—ºM Â÷‹F£aë¦Müü'?ÆãñÇ‚yó¸ûv¶oÝÊšU+)ž3‡Ÿÿô'äãñxX±|õ—ÁÐÐûäò•«üäùçyþÏ7í=õ@0@ à'++“¹¥%”—ÍephƦf®\½Jùܹ„ÃaüþëËÌöâÆrÊæ–RßÐH_?ÿü—¿àGÏ=KüøtÂ=p?÷m¿‡`(ˆ?@­ÑðÜ3OóȃrøØQÊËË().æÏ~ú“i3¶Î)*dÞ¼Jîß¾m[6£V‹«¢·Û”¶Z¬Ü½f-å•·œ×Y–eæ²jå ÞûàC|¾îKŸåŸŸ dY¦êòe*+Ê1 ȲBTŽÆþEo¢ ×ëÐëõɆê®]Ãd4‘“=‘*FˆD"(Š‚J¥B£ÑðÈC²rùrvîzŸS§Ï Iºñ䃞hô›Ø#Âw„„N§‹ýÓjAµFM8&¢ÕjQ…H86PR©0 X,4Z áp„hTï·¢(Š‚"Ëü~?~¿Ÿ`0DiI ?zþyÚÛ;xéÕ×°X,Ì)*bç{ïáv{(-)¡´¤˜=ÿíí¼üêkø|þÏ-çå×^ÇãñDQˆåˆ%é±Z,“’œi4Lf3f³EQÐhÔ€B8FQB¡ðÄvü@lµ†p8ü ~>ß”{üË—¯$1!ñ–÷¢5ÍDþåMÖs±ªŠÁÁ!2ÒÓY¶t ¯ïxµZÍÜÒŠçÍtýèëïg``€Çy…ØU‹vD8fNQ!ùù\¸t­F‹NK¡«ÕjA’¸T]MiI1jµš¬Ì Âá0xé%ž|ô1ÊËÊøí /•™ÉšU«¸RSCoo/³É„Çã™ÈH¥ÓéÆÿA¸éõ:Ôã}€^¯G«ÑPZ\̾0,[º”ÄÄþøÊ+<ùØc„Ãavïù˜ó/aµXغyáp˜ß½ðG¬V áH—ËÍko¾…ÛíFQ óóÉÊÊäâ¥*<^v› ­VËÒÅ‹ø÷ÿ÷ßðð`³Y¹p©Š'OÆ–±Ûq»]¼þæ[¸=ž[”c§¬l.gÏŸçïþþÉÉÉâîÕkÆÓ±Çb…Á`@£VÓÕÕÍ /¾„ÛífõÊ•äçæÏ‹¯¼Ê3OÈX!;+ ›ÕÊÈè(ÿñ?ý~ú£ç)/+ÃívÇÊA!'+ ƒÁ@Ww÷-ËÉÉÊÂjµâñxèìêF«Õ’™‘ŽËíÆa·£Ñhfxx˜_ÿîŸxøÁÉÎÊ$;+k¢#%9—Û͘˅¨TjÒRSÐh4“ÚAøj"‘­­­Ÿã$IÂãõÐÔÜôåÿwÑõ‘¯7æŽþ¢Â‘µzÖܶáû/ò_þÛgÕŠå¬]³æk—÷ééÓ:r”ó/þú¶>mÕÔÜÂo_xÿoÿMìÀFøV}ÑÀG¤åý*ÿ:ímÎ_-‚p3I’X»f5™ßHyZ­–Í6ÜöG¬ãããØºi#úYò4—0=ÕAf•JŪ+¾±ò/\ø­\µŒ‹cúu·};Â×#FP‚ |ω[•ÂDàA„;ˆü‚ ‚p_Aî "ð ‚ ÂdRàWP3½O‚ ‚ Ü&“¿,söìiúúzo¹Â™sçùOÿõoé ³«‹—^yŸÏ7Óuù“Î_¸È[ïìä¥W^¥³³kâu§Óɱ'¦?èu:ùã˯L›kúOimkcÏÇŸL›>S„;Çþƒ‡¨½vmÒkcccøý±\'‘H„á‘‘/4_ýÐÐ/¿ö:c.×LW €P(ı'u:§¼÷Eêuc;·ßM—ú%:;;9xøýýÓ®000ÀþƒyçÝ]D"ÜnWjj&f òù|xÆç{žMdYæÓ3g†B\­­¥¹µ•¡áadY&*Ëø|~Âá0>Ÿááa\.×DZZ[ijnFQ”‰/o("‰ …Æ966±¼ÇëeÔé$Ó×?À‰OOÑÕÝÍÈÈȬkA¾.]¢¶¶ŽžÞÞñl !^Ýñ&GŽÇçóÑÚÖί~ó;ºº» ‡Ã„B!¼>ng¢ßQ…‘ÑQÚÚ;¨¾|™P08í¶ü#££‚AB¡¡PˆÍ§,s+7/#Ë2££NœNçxY¼^/¯ŸÏK$&àöx&y[ûäzÝ,xS;·ß´øtt´sìø¶nÞ†Õj›ôžJ%±ü®»èêîæÔé3$%%MÌŒwüä§?y9*3¯²‚m[6ß2Ãß·mhx˜žž^6­_ϧ§OóÁîÝ:r„E 0o^% hµ>Þ·»ÝŽÇãå‡Ïþ€’â9TU_¦¨ €·Þy—ew-e~e/½ò*w-]ÂàÐ0'N~J `ëæMXÌö|ò :ŽukÖ V©hljäÅW^ÅëóñìÓOQQV6ÓÍ!·,‰pàÐ!ª¯\!>>žËîâè±ãœ¿pŸÏÇÐð0'O" ðÌ“OræÜ9º»» …”–”ðà÷qìø Nž:E(ŠÍw?M2›Ö¶vÞ|ûmdEa~e&“™Ææf~üܳœ=wžÆæ&V._ÁÛヒ,ËT–—³}ÛÖ)ÏúßXNey9›7nà½wS[[GBB<Û·mãõ7ßDŽÊdd¤ãtŽa·ÛÙwà :­–`0Äý÷ÝË¥KUõzö™§)™3gÒv9zôç/\Àï÷óÀ}÷~­ÙV…?mšÁ} :ž´Ôttº©Ó;ʲBjj*Ý?{>þ„ŽÎNÔ*ƒƒ|´w/›Ö¯çÉÇåØñ457Ïtý&465c1›HMMÁj¶ðôOð£çžãä©Ó455Ñ×ßÏØ˜ NÇÏü#’¸|åÊø‘xK—,&#=OO¢³«‹öÎNRSS)-)fó¦ $ÄÇsðð._½ŠÛífÕŠåäææ + y¹¹üÅŸýœœ¬,ªª«gº)A˜µšõëÖñ³ÿˆöövlVó**¸gë¶nÞÄÊË™STÄŸŽü¼\ºº»)--á¹üè#*ÊË(ž3‡=ÿù¹¹S¶STP@åx;lÞ´QýoÁ”ÓqNÏÒ%wq×Òe)eo&Ë2 ÌçZCï¾÷>‹¿ßO4*“™™IœÃŽF«ÁãõÎtý€Øå±ªêjÊæÎÅd4!©$Œ&#))É€‚Çë‹¥”$l6ñ ÄÅÅ!Ë2 M¨Õj òó±X,œ=Ý{ö’—›K|\;Þ~‡ÁA"Ñ(áp˜-›6’œœÄ»÷°dÑB2ÒÓ1›ÌØív;¡Pøk×G„ïI¥Âa·á°Û1¨Ô* =f““É„ÅlF«Õb·ÛÑjµ¨Õj’“’(,(ÀfµÒÝÓK4%%9™@ €Z­E™üΟO4*säØ1ê®ÕóóŸüˆ¬¬L>Úû1CCCÌ«¬Àb6ŽDÆ—¹ÆŸÿìgètÚ[–SßÐ@yÙ\´Z-©))èt:\.z½žŒô4âââb[ŠeöËHOG§ÓqøèqÔ5Z­‡ÝŽN§›²¿z½ýx;ˆì¥ßŽ)ñâ%d¤gÞ2è €F£áþí÷páâEÆÆÆÈHOgNQ/¿ö½žäädŠ‹Šfº~ŒŒŽÒÕÝÍæðûýìÛYŽ’@^nçΟ¯[ìI!v€S}å Eã_ðtØwà ÿù?þ QY¦«« ½Þ0~”*qåêUœÎ1´ÚX*ÊŒôtÆÿ8g Âk¼EA%©ÈÈÈàðÑ£X-JJŠÑé´¼öƸï^"‘ÇNœ¤¥µH4Âæ p{<¼ðDZÙlx<\n7{>Ù‡×ëEQ ;+“ää$:»º0ŒŽŽ¢V«Yºd1ÿù¿þ7¶nÞD|\WkkéèìŒ-ãtâsòñ'ûðú|Ó–322JQa!‡ã·¿œœlæWV"ò }¦$Iôõ÷óÞ‡»éîéaþ¼J²³²Ðj5¼úÆ~à~š[Z©­«C’Tèõ:6oÜ@Vf¬Ìf3«W®ˆˆ ·úÑÇý›¼¼<Ì&3’$çˆûÜK-‡ü¼<ââ *Ê˨,/'++‹¹¥%Øí62ÒÓÙ´a=6›íKìÊíÓÜÜÂÈè(Ö­E«Õ••E\œƒÔ”T¶mÞDJJ ¹Ù9PXX@b|I‰I¤¤$“‘žNaAv»ô´4.\¸ˆA¯§ ?Ÿm›7“™™AÉœ9èô:’’YµbééiD£2ññq$%&’–š2qE %%…m[6ãp80™Lœ¿p‘í[·’™™„„×ç#5õ³eBáÐç–“‘žNIq1v›¬¬, òóÉLOÇ`0™…ÉdâÂ¥KäçQY^ÁÚ5«qØíäc·ÛÉLÏ@¥’0 $'%’œ”Dfz:%s攘Djj ñqq"·ÀW$Ë2N§sÚ'($I"12:‚´ã­ÊúuëIJLšé}¾m‚Á ‘hô+]Fr»Ý˜L&Ôj5²,óOø# <úЃ3]-A¾§¢²ÌùÛÿƪ•+X»zõ×.¯ªú2ï}ð!ÿæ_þ5f³ù¶íwSK ¿ýý üû÷oqØíßf“ Ͷ¶N€Ålf~eå¬yšK˜ÞqÆÿMQ…p8ŒV§÷êAøÎ‡Ã¨ÔjÔâÞù÷š8ã¿ $IB§ÓÍôn‚ |)Ÿ;X[¸ãˆÃ?AA¸ƒˆÀ/‚ wøAá"¿ ‚ ÜA¦þh4òUÊAá;`Rà—e™ªêKŒ9o¹BmÝ5^}cn·€ÁAö~²ïsS;Î M8t˜½Ÿì£``âu¯×ËÕšÚ‰Ô•7óz½ìùøœÓäš¾‘ÇãáħŸÞ2¯t8æZ}='N~J()záráRí“^ …ÃD¢Q 6õm0øÅúçØïÛw–äC ‡#\­­ÅãñLyï‹ÔëÆvn¿)güõ õ9v—klÚšš›ùÝ /ðáž=ÈŠÂÐÐ0žÈ ­L“4b6P…#ÇŽÑÒÚÊá£Géìêšô>¿ŸÆ¦&‘Š¢ …&} ÛÚÛ9v⊢F‘åÏê¨( ‘ñõœÎ1Þÿð#††G“·:|„ßüÓ ¼ðÒK¼üÚë·<@áûçБ#ÔÔÖâóùeY–y÷½÷9á²,Ó××Ç^z‰±±±IýËÍÓ¯†Ãaúûû9xøð-ó×ߨ/ÝÜO×wÝÊtËD"‘IÏ‰Çæ7 ÑØØ„o¼O“e™ë«LW¯ÝÜÂí7å9~E–¹v­µZÅúµ0™&Ïô¤V«Y0o/UQ>· N‡Z­F’$jëê8tä(áp˜åwÝÅÒ%‹gM²§sŒöŽ{øaª._æõo±/ákV¯&?/·ÇÍå+W8vüdl ž~âq²23©¾|…‚.UUsþâEFFG),(`˦|²ÿÃ##,œ?Òâzz{øýþÜ»mK/º^*µšú†FFG™WQ!棄;H(⣽söüy òó)Ÿ;—÷>ø«ÅJ__?CÃÃ|øÑúxò±Ç¸V_OGg'~€E °vÍj.UWsðÐaœcc8ÇÆ¦é_yÿÃÝŒŒŽ²pþ|Ìf3½}}<üÀý\­©¥±©‰Ëîb÷ž½ ޲`^%›6l˜ÒÝX΂yóذn-GŸà̹s8ìvîÙº%vµ7 1!`(DOo/ï¼»‹P(„$©¸oû6Ž?Á»?¢¿€§Ÿ|‚9E…“¶Sw­ž]ï€Íj¥¿€{ï¹'–yP¸mnѺjõôsûȲL~^›6l`ç{ï1<2ŒJ¥bdt”7Þz›‚ü|–-]ÊÎ÷ÞŸrYk&µ¶µ¢V«ÉÌÌÀh0rßö{ؼq#»÷ì¡©¹…ºkõôôö208Àƒ÷ßK(âìùó„B!ê™WYÁâE Ù¼i#—œìlš[Z8wþK/&?7°Z¬/gÏ]àüÅKèõ:2328wþ<Š"ß×'êyåêUrs²±Y­:r„ƒ‡óȃR}ù2Zn"½oÕåË,\°9E‘ed%v¦ßÝÓËþƒyò±G±X,dfd™‘1ÓM"·LŽÊDåèÄ}{ ‰¸¸8NŸ9CJJ2)ÉÉ(ŠÌî½{Y¿ön¢Ñ(5µuøý<÷ß{ƒƒC¼óî.lvn¯×Ë…‹—(ŠBrr2» Çx¿t©ªšG|€¥Kó¿þ-«V,'99™¶övŽÏú®M7páâEà´åTUUóÓÿ—ÛÍ;»v‘•EvVòõþRŽõ#££œ=wŽæ–V òóHKM%²{ïÇl\¿ŽÞÞ>ZÛÛQIZ­–Å‹?ÞÉÉIÌ«¨'E·™úÑÇý›¼¼<Ì&3’$‘””ü¹óÑk4R’“IOOÃjµ’Ÿ›KvVe¥¥”–ãv»PkÔÜ{Ï6RSRfº~Ô74ÐÚÖÆ=[·¢ÕjÑéôCAdYáþíÛÉÌÌÀfµQŸOZj*™èƃú…KU¬Z±‚´´T†††±Z­WlV+ Mh4¶oÛJfFz¬Mòò0 $%&’””ˆslŒÂü|1_¶ ÜÁt:-9ÙÙÄÅÅa6™ÈÏË%?/0ˆÝë’“ðx=dedr±ªŠáá´Z [6o¢lî\òòréíëC‘æÏ«$;+‹Ææ&¼^/ÁP£Á€Íf£¾¾a¢_JKKÅb±püÄI¶nÞL~^Nç5µµh´îݶ•„øxê®Õß²œ{¶n¥xÎ23Òioï “›“C||y¹¹FL&#»S§Ï R©HMIaû¶m$''‘€Çë!;+‹¡¡!zûú‡BD£Q²³³(ž3 ˆÃ;ó㟾Y–q:Ó’”$‰P8ÄÈèÈ‘Ïívãõù¾ôˆ¢(ôôô’˜˜€^ÿUû ‚ |9QYæÿ÷·ÿ•+–±vÍš¯]^}c#¯¼öÿê¯þ’¸¸¸Û¶ßÍ--üö…?ðüëEümÜŽ0=‘ïV««Õú¥×“$‰ŒŒô™Þ}Aî4Š2q¦þMhoï ¼¬ô¶}NGfz:µúÛh%á+º#¿ Âw‰Z­æ¹gžþÆîu¯\¾ µæöw÷™üâç?›2PP˜]ħ#‚0 }“ÁsºÑô·ƒ4>`O˜ÝÄÐIAA¸ƒˆÀ/‚ wøAá"¿ ‚ ÜA¦þÙ˜YOA„oƤÀ/Ë2 õŸ›.¶««›ã'?%8žÒvlÌÅ¥ª*ÂáðL×åOêí맦¶ö+ÜȲ̕š'^ëè줱©ùkï—¢(ÔÔÖ2xCÙŸís×êëg¶áAøÚZÛÚþFÊòú|TUWO‡>Ó¢Ñ(Ý==gÉþŸoÊUÕ%N>9%Ÿüu««øÿñ?rèðº{zxãÍ·¿¹å÷<Èé³ç¦L …x÷½÷éëï¿åº.—‹×ÞØÁðð ÖgΞãБ#_{¿dYæýÝQߨ8ñš¢(?q’úÃùÍ?½ÀÎ]ï}'ÚX„é½ÿánª._ž4꾩©«`dd„·ßÝ…ßø“e ±ãíwp»\3]- 6cÜñ'u:§¼÷Eêuc;·ß”E#‘0.^@R©X±lz½aÒûj•šü¼<ö/ZDyÙ\>Lm]=ññqlÞ¸µJ|v@"I`€“ŸžbÔé$;;k¦›P„¯ÁëóñÉþ\¾r…ò²¹defñÚ;ˆ‹‹cû¶­ òÖÎtuuñÀ}÷ÒÓÓKW÷gýFEy-­­<|„¾þ~œÎ1¤i&øq»Ý>zŒžÞ^æUV`2šs±fÕ*ÚÚÚimkcá‚ù;q‚îž^*ËËY±|Ùç–SYQÎò»îâjM-Ÿž>ÙlbýÚµœ=¯Ç‹ÕjE§Óár¹8uæ ·NÇúuk9xøo¼ù]]] q±Kë7Eÿø¸8R’“9}ö,[7o$3#“ÙÈ…ª‹ôõõ±qÃ: ÉãËlÙ´qR¿3}9›¨o¨Çî°±há|4j5n‡ääD.˜GB|<6›•p$DFzåäåæòÖÎTV–“—›CiÉEž²-I¹9Ù䓘?í¾|³+³Ÿ‚ò­íW$ÁãõL¤H¾¹]( }üÉÇJjZêÄ›rT)6Wôtƒà®çª×¨5D¢‘ñe$Ô*QYF£‰%gˆF£H’ •jv|±ý‰ù„ÑñßA£Ö ÑjˆD¢¨Õ*$Išô3J¬A5ÍD9*•j"=ïõªÔªXûÿFQI*dEF%©P©TD¢$IB‘Bá*I…füàH%Ån›L|P’4ñÜø³ ß=7ö×ûY–'^S…h4:1Uïõþãz¿qýÏ_£Q÷IÑX2œ›ºØX!£ÕjQ«Õã@BQd4Í´ËÜìæe®÷Aµf"˜ÝÜoªT²¬LÄH$‚Z¥žþTÛ|UáH˜Qç(¡pfAw©ÑhpØ8ÇœÓfÍû¦M'$I…ÅlÁçõ¡±ÛìädåÜQAåÆ#/e¿×÷c&÷A„ï' éOö-ßÔ2³Eÿ`?q;6›}Vœ÷ûü>FNJæc6™fl_¢Ñ(ã#tú»b—ú¯ÿ»SÌ–/ñlÙA¾¾HÿòM-3ȲL($=5uÖd4  ¡(?割o[8ÆëóŠì|‚ Â÷Çlº-úÙ@»™ß/I’bO(bÊ^Aáûb†Ï¨§Ý¥YqÓaÒ‰À/‚ ·4ñŸYC\êA¾¦ ¯×ŸD»þäÂõGݦ{’áF‘HµZ=å¾üõß¿Ìeûé.DD£Ñ‰Qþjµú—ðy·$$øA„ï‰i‚ôÀàn‡¢‚ØL²Ý½=(ŠBnöäo|t:‰ÐÐÔHfzv»}Òr>ŸYQ°˜Í“Ö¹±ŒIû€4ex¤$I´¶·184„Á G%©ÈÍÉÁn³O:ÐPeÚǺ§,ƒ4qÔ …Øl¶)ûs}-øA„ï­H$:)‰\$A–e‚¡ ¡`ˆH4ŠÁ`À ×#Ë2¯Ï‡ÇëAVd¼^/¾€V‡Éh¤½³ƒp8LnN³…p8ŒÇëE§Õb6›§ŽÜ—˜vNH$BrbY™™ttuÒÝÛƒÝfÇç÷ã÷ù0 ¼>½µZ×çE§ÕŽDðû|ŒFLF#`€P8Œ,Gu:&?/›Õ:õʆ$¿ ‚ð}6Íeöë¹e††‡0è D¢Š q:ÇÄ`Ð Å&ÂçóáõyINLÂív F«ÑÒÒÖ @(&+#ƒÄ„Ä/|  àöxƒF¼>Í-ÍhµZÂá0y¹¹tuwc·ÙILH ¡©‘Ô䇆Ðh4„Ãa ò `px‹Ù‚?àÇíõ008€ÉhœøÅ¨~Aá{í†|ãÙ¸â°;˜[RŠÑ`¤»§‡Á¡A²³²(Ì/Äl¶çˆÃl6£È `„„’“ÉÏÍÃëó22:‚Z­! 2<22í.L7ö@Q\n7M-MCA²22Æãõ Vkp{ÀP!>.ŽÄ„ô7,£È2jµõx¾‹Ù ’DskKìvÅ4 $}úé§JIIɬ™éHA¾,Y–éè#'kjj_yüì]Qt:†¦–f‚Á éFtZ-Š¢ˆFcI…tZ‘H„@0ˆV«E«Ñ V«'ª^¯'ŽŸ­ƒAo˜tO]’$››(*(œgÃá0’$¡Ñhe™p8ŒN§#Q«ÕôzTªX·h4ŠN§›X7ül™ë)Û¯? …e½^?)Mï˜ËÅÙ³çÄà>AáûáVÓä¨T*ŒÜø|»¢ ×ëqØí“—3Œ“¡Óét±{åÊgY n¼w®V«±Z,ãE~±Çù´Zí¤ý»^¦V£EgÕMÚžzü2þëêtŸ-sóÎõ„[5’ü‚ Â÷ÃçLÙ«×s+ŠBbb"±TÅSÃòͯý©+âŸû¾Ò—¼ þE®À•«ôbAáûæ ÎŽë°;€¯@o×>}[û!¿ ‚ð'Ij•š` ˆéK使©rC¡*I5ñóç^‚¿ÍE& ¡ÕjEàA¾û$IÂf³1<2ʨÓ9Ó»€,+Ølv$ `•jæNýcù 4X-VøA„ï£ÁˆAo˜5O©Ý8O€Ùl™ñýR©T ôˆÀ/‚ |?Üœ4g6¸1ØÏ–ýø‚ ÂD~AA¸ƒˆÀ/‚ wøAáò¹ƒû$IB%Å2 ) ó›T*Ul2&dEùÖFEƶûÙ@Œh4zë6R©eùKïÛÓB ‚ ·ás¿×磥¥×KZj™铿 ¾•Ø# ±g¿Y–éè줧§‹ÕB^N³I¥BQdn3¯â¯JQZÛÚc™P0èõäääÄR9Þdxx„Á’’’HˆÿÂÛ…B„B!Ìf ³d § ‚p¸eà—e™wß{Ÿ®îâãhjnáчD§ÓMœÝªÆÓÂä$==½´wv²lé’)ï_ÈË+Jl~åñd7¾ùÊUv}ðééøô›6QŸÇéÓg(+-!>>Y–'m{llŒªËW¸ké’‰@­Œ_)P«cyН_ÉPˆÉß¼o²,óÒ«¯‰DHNJÂáp’’‚ÙdŠÕg|_ÇÆÆxùµ×0 ¬\±œ¤Äĉ6¹^®$IH@t|»×ÿÕ76ÒÒÒÊÖÍ›Ðh´ûx}n<Àú*WAa:· ü¡p˜†Æ&Öݽ†5«VF$‰s.—›KœÃAm]‡FÃå+WP¨(›Ë¾ƒ9ñ"Î1'+–-# ráâ%t:‹.I¢ªú2.— ƒAÙl¡¯¿ò¹s)ÈÏbW ZÛÚ0™L<õÄã)¯ÔÔðÚ;X¸`ÖÝÑhäÂ¥KÈ²Ì¼Š êyg×.úûûY¹b9###$&$bwØ©­­cNQÃ##Ô]»†ÙlbÑ‚…´w´Ê”—ÍÀ:ŽM6°pþ<@" qôø ¼^/‘h”eK–p©ºŠÚkר°n)IÉ´¶µÑÔÜB\œƒŠ²2ºº»ééí#SY^FGgäçça1›‰‹£¹¥…žÞ>FNRSRX´`>‘H„ó/ár¹0›Í,˜W‰ý† R‚ ‚ðU©ò“ŸüM,KÑdE‘9~ò$Í­­X-Vââìùd.—‹ô´4^}ãM22Òùdÿºº{ˆÃjµÑÞÑAWw…ù$'%ñö»»‚tvwÑ×ßOœÃÎ /½DVF'ObddNÇÉOO±pÁ|ôz=Š¢`6›©©­ãü…‹D"aR’“áì… ¤¦$“——G8¦··¾þ.\¼„Éd¢©¹…Üœ²23øpÏ^ŒF»—^}¬Ì Þ|çEÁd2’š’B}C#£N'sŠ 'ÿÁǹRSÃÕ«µ b·ÛøÃ‹/‘––BCc#ƒƒX-V®Õ7PVZJ(æÃ={0›M\¹r•±1Í-­œ:s†äädººº8{á))ÉX-V‡†¸p±Š¡áa.^ºDzj*û"77‡ÓgÏÑÜÜŒÍjåã}û))žCbBÂLWA„ï0I’úüQý›6là—ösÒSSùÃË/ÓÜÜÊ’E ©»VÏ•«5ô: òòÉÏË# ár¹q8ìÌ--!/7‡{¶l!R[[ÇÐð0##£tvvÊ$&$°qýz )(ÈgÝš5‚‚Á »<Ÿ“Í?ÿå/X¿ön>=}–wv½GA~Y¬_{7ÅEE˜M&"‘~Ÿ¾¾~r²³ÈÊÌ`ÛæÍ¤§¥MTöú <½^OaA>#££„Ã4 ׯcÛ–Í—Ù@oгvÍjžxìÖ¬Z‰„Dbb›6l`ÉâEŒŽŽ’›“CZz*kï^Co_©))<ñè£lX·ŽKÕÕ*Ê˹gËfÚ;»Xºx1Ü{/ ÌÝ^bûVVZÊ=[·˜˜@ggµuulÚ¸ ëÖ’””ˆ8ÑA¾)·¼Ô‡9ñFƒì¬,4j ^¯—²¹¥ì;pw?ø€Í6 ×ë˜[ZBJr2oí܉Éh$33·ÛMk[;zޏ¸8æ––•™‰ÅbF¿—­(òøˆ}…Ø]óñœÉãšZZ"11”ä$ÜH í$''³ÿÐ!Üååôôö¢’T„B!ZÛÚ(*,@¥RÑß?@|\¯EË–ÑÕÝÍ›oï$-5•„„xÂá…ù—ÓYA%©P«5(ŠB$F–cWb»¬ +2ѨŒ"Ë$%$ÐÐØHSs3ÍM$$$ Ñh`|,„Íf¥¹¥…¹¥% †‰ûùׯ0\ß®V«Åh0pµ¦ZC ƒÿA„oÌ´—ú%IÂï÷sðða>=}šÖÖV–,YIJ¥K1™L P}ù Ï<ùZŽÃGqáâEÌf3+—/#33“ŽÎNÚÚÛ©(/'.ÎÁ¥ª*Ú;;±Ù¬$%&24žh4Ê¥ªjâã㈋£¾¡§ÓIB|TÊeì6›¯VQ›šÄëÕ5lÖ·Ðl¶°°0ªŠB!¤›žêg+++ªV«˜8–$ Â0L§Èõ”ù‹¥%|úü‹B(’h·Á¶íô}ÃI’ IC€3Žv"ŽcØ–•f¾ë²;Ýow†¾R QAÆ1®Ù6„é8¥”àœƒsŽ À9‡•é[ʆ!ÀÃa€3–¶w¢0„ã80 £·ÒGÙþú‰œ1ö'çḒA×ÇôvEB@‘Öþëv)%Úí6ì®{8géo¡ûi¶Zxúì9ž<^ÄÈH‰’û!„œc žçý»ŽŸsÇqÒ}¥:ê^s³³°Lq’À4 ˜f_Ϲ:*¥zjàõâ8Ù`›ÝÖß±, VæúšaÝuÝžóLó¸=×Õn[Ö_ãé¾.€4xŸ4æì«õgvª^ïwÿ‰B —Ëõô—c u¯õ·øþcãG³ô !„œ‡3½–÷îÛ(Ž"¾„•ü®:¥ŠÅaÜŠo‚sŽJ¥œV9B!ÿëÔß4ML×j@Áè‚ äó,Ðâ=„BÎ×™žø)],½ò!„rÞÒÀϨfŒB¹ò ß÷áyÞeƒB!Ì÷}ü{Ÿ®3ÐÝDÅ%tEXtdate:create2013-08-30T12:28:19-04:00¯Û(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshotï¿>IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/transition_from.txt000066400000000000000000000011531330160122500247460ustar00rootroot00000000000000This screen shows when a process running with the '%(APP)s' type executes 'Commands File Paths' that they will transition to the specified types. Under SELinux, when a process running with a 'type' attempts to execute an executable, one of three things can happen. 1. The process can be prevented from running the executable. 2. The executable executes with the same label as parent. 3. The executable 'transitions' to a new 'type' based on policy. This screen shows the executables that transition to another domain when '%(APP)s' executes them, and the 'SELinux Application Type' of the newly created process. selinux-python-2.8/sepolicy/sepolicy/help/transition_from_boolean.png000066400000000000000000002034011330160122500264120ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýg×™  ?é®wU÷Þò®` Þ;-hDOФDu«{4êi³=3;3½ßDLÄÆîÌNìô˜¶jÙ–(‰%zo@ð–ð¶P(åýõ6Í÷#ィ*T ‘£‚…¬Ì“çœÌ<ï9ïy@·Þzë·ÝvÛ÷]._OäÑÿ0 Ã0®w,,,,,,,®–à·°°°°°¸…( þÑBßþ_O¬¿…ÅU@@ Ãü]×ÍïHÅ1ç麎 ÀØ ¶(æ÷wUê"”îQ¼ÏDßõèzˆ‚€þ¾}QÇ”_¼·®ë×¶Ã-,,¾0–à·°¸ ô ±eÏ>ú†ð{=ܱj9å?¯½ÿ‘hAxøž;iïè$›Í±~õJD©ïº…-³˜ÞØð…pAغ{ ,àcÅÂ4Õ×^4Øsèét†™Ó¦°y×îZ³ŠPyÙ¢ Ð30È›mböô©¬YºÃ0عÿ ­íg¹÷öµTW„¯Ùx2¾-·*º®“Îdp:H’D.—'—Ïãr:Æ|'£±Tý_AHg2¼øúÛô 3½©H,N6—'›Ë±y×^¦6ÔSƒ’(rìÔi’©4w¬Z!€( €€¦ëèºù-Šâ…Õóø•´a€$™ÚMÓE A0òÑS§9ÖÚÆ’ù-´¶ŸãdÛYþü¿E¨,@^UEAh=s–H,ÆÌiS… š ]×Ñt½¤…$©pOÝ0DDH4Ƈ›·qìT+Ó@øÝ›ï2‹³|Á|ªÂ!TU@’¤Òc’$  kZé¡pOMÓ)ŽY’$¡ë:º®—ʉDÑ Q ø¼iV,,nA OðÒ›ï0gÆtÏkáƒÍ[‰%<óðƒØeÂë&\ñ[‚ßÂâÊQ5‘XŒ`ÀϺ•˨q»œŒDcȒ̬éS™9u ²,S^A(*Ã0÷p$J&›aÓŽ]=yUUñzÜÜ·n-[vïeJ}ÓxùÝX8g6Žgõ’Eô Ò70ÈÜ‹ËéÄ0 ª*B¬^²ˆÝ’ÄÑS§‰%ìØ·Ÿmíø}^î»} ¢$"Š"¹\ž¡HUS9ÛÑÅû›·‹Å©ª382²óX¹hﺕT:Ãcî6UüxÜ.DQdÓŽ]hºN™ß‡ omãýO·¢ë:KÌÅít²mï~(ôoܵžt&Û·¡ë:KæÏeÁì™|¼}'mç:$‘ÆÚV/]ÌG[wÐ?8Ä¢–Ù,_8WßÿˆÖös|^¹÷.æ4O·¶,n= ·ËÉ´¦F6íØÅÎýÉærÜ¿þvYžT–KÅ_ž}öÙ‡jkk—Úl6Kð[X\!†a È2SêëébÓö]œh;C°¬ —ÓΦí;9qºýGŽqæ|-3¦sêL;yUeÙ‚y$S)ÞÙ´™ÆÚZºûú8×ÕÍí+–²kÿ!DQäLG'^·›Pyï}²…•KÏ«¼µñÎvvqך•ÔUW„¾Àþ£'Øsè0ÇZÛP5#¾ÁA¶ìÚËkVÑÕÛÇÑS­(²„ªêÔUU²qëfM›Ê;›>Å0àö•˨©¬ sôd+3§Ná•÷>dþì™4ÕÕ00<Ì£'¸ïŽÛØ´m'½C¬_½‚þ¡!æÍjÆãv‘ÉæÌóŽÀa·sôÔiîX½‚ÓgωƘÚXO^UéæàÑ$Ri=Á«–Ñ;0D$§§¯Ÿc§Û¨­¬dÓöLmlàxkÁ²2¸ë*Ã!ìÖ¸eq b²$./ã³£Ç8xô ZfqÏm«Kö7aíñ[X|I4MÃnSxäÞ;‰ÆüðW¿åÓ»yô¾»D‘o?þ ógÏ <.Wá;ÓQU QÐu£ ~7Uà•¡ KçÏå³#ÇH$SäUM3Õï²$3gÆ4Þøðcj*+˜R_Wª‹èºÆ¢–9ü‹gŸÂ¦ÈØm6^~ç~‹çÎ&•NñÉŽ=¸t]/¨óE2Ù,#Ñ8«—.bñÜ9†Ëéàg/½Â›·a·Ù˜5mÊ…1ÂÃÐi™>L&ƒÍfcjC»öDU5޵žæØ©VÙlŽ\.OÀçeÉÜ9ôöÐÛ?Èá§8ÖÚ†Ãn'ÍÒÕÛG¨<À²óŽpæ|}ƒCäó*¹|ŽÆºÚÒ§º"ÄœéSQ5Í·,nYÒé nÙ†ªª¬_½‚Îî¶íÙÇÚeK&Ý»hßú€,,®ˆ'“üü÷¯24A‘òªJKót4UãÕ÷>dã¶‚Àó}Q9pìÿùï~Ìš> Ð {蚦¡ª*º¦c³)Ô×T±}ï~ÚΞ'ÍK$ØùÙÌ™E$ãÝO6óè}w—T{º®#‰"n§0¿íù³grôT+ÿø‹‰Äâ¬Yº]×ù`Ëvœv;ù¼ŠÏëaÁœY|ºc7Ç[Û¨® ³aÝmL©¯cã¶<°~å?º®#Š¢YW]G”D¾q÷zA íÜyÓF@Óèî –HâõzJõÐ4¼ª–Îéé žHàõ¸y³šÙ±ï?üÕKt÷õS[UIóÔ&>ݹÃ0–ð{½è†Ž¦é¨šZò °°¸Éä²$Riî_¿Ž93¦±uÏg  jÊ$Æ}¥£¯¿þú–-[ö}¯×k  ‹ÏA^U9s¾“î¾~ `J]-Mõµ¨y•C'N‘J§Mƒ6A`þ¬f†£Q:{úJßYe(H^U©©“L¥Éä²Lm¨§í\.§ƒ€ÏGkûYdI"ðÓ78ÌÔ†:Ré4½ƒÌ™1 »Í† œ>wMÓižÒ8ª–=ýœïî!àó2£©d:Í©3çp:ìäòyfNmBQN9K$§"TÎôÆö:ÊÏ~÷ ÿî_þSêJ+îX<Á©ös´4OÃé0'ñd’3ç;™R_G^U9zªY–qØl”üÄ“)fM›BOßÙ|Ž€ÏÇñÓge »ÍÆÌ©MDbqº{ûÙ¼kŸo=ö ÚÎwÐÝÛ‡Ïëanó ºúúp9œÔ×TYã•Å-Q0t… ƹ²$MzþÁ¿téÒï{½ÞëÝ ‹›I2-åK+÷‚¡™,K>3TMCÓ2¾€nèÀhë}Ð4I1 0 Öì`ªò‹~÷Zá|QP –ñ`zP(c4¢ JFaµ,BéB¡nf[ ÖõºŽªiüêÕ7‰Åù—Ï=ÝvÁJ¸x½ªjc‰"Z¡ý¢(–Z¯& ¦‚y¼h™/`º;vt÷²}ß~Yaßá#ܽv5·-«²ÔuÓ‹ÁÕÏW޵Çoaq-üF“Ï«×4Ë1ºL][Ž6ÉïÀ˜IÀ˜k ªù"“ NuÔ½â‰$©L–U‹b·)cƇ‰®l2Á<ºýÅs@QdY&žLòÐÝë™?«¹äÊ7]Ÿ¸_-,,.µÇoaa1).§ƒï<ñŠ,]óÕµ”ûý<|Ï¥cºe¸gaqÕ¹hÅ?úÿ·6‚ `“¥ÒõÆRß[X\{¬>—Ä ,,¾^”¿Pˆ&f ~ ‹¯/ þâï×йên†÷qüdùšÖyTß\ó{]ê~•}sÚcaq³Qüªª2<2Œ=e·^l‹ëŽ¢(8NÒéôM±ç«( .§ MÓH¥S״΂ àt8±Ùl¤3ir¹Ü ýÍŠ¢ˆËéB’$Ò™4ù|þzWéK¡( N‡ó¦ŸÀXܺ”*¢«»‹ÚšÚz±øú£:ÝTWUãp8eùËzÉås¤3i0Àf·]Ó:Ä13>€v›ýz7ÿ’è†N$AS5zúzˆÆ¢7õãv»™Ò8…PyèzWÅÂâ qÁO7p¹\ÔÕÔÝÔ¥ÅÍnè  ( µÕ7ÇDT×u>H8¾æuá‘aNµžbÁ¼8 YùnTA ³»“ö³í¤Ò)2™L©¾¹\‡ÃN&“ÅfSJ>ûŠb#›Í`·;Èçsˆâ…L‚×ã|›ÍF6›Ån·£ëæû, Z«~‹›’‹–%º¡ßЃˆÅ×Ã0Ðt ¡ÍîfPõ ¢P Js­ëlFëÉ«yQpçFÄŒÌ'Ëå .¦=‘,IH¢„,ËI*Dã3 äBô@E–M¡,…¨€×ï|MÕI§3x=ž+ Àdaq£rãëP-nIŠ+)C¿9üºE.„”½ÖuEá¦pÁ-†,Ìôƒ€Ëå¼p‚ʨPÀcŽ]êo_õùŠB6›E’ek¥oqÝ1 ƒt&M:4ífP—»ÝqÉk-ÁoqÃb`ܨbÒš¯ªÎÅTº7GÀ›b˜žC`®¬oFADEKð[\W à &—Ï!KŽB’¬|>Ïàð^Ÿ×?éõW,øKÛçÐA¸án‹ãbµùø÷ó¼[×ò]ÔuÝ\Ê~Î:‘:¾ÆÐ tôIÿ~­Û}©ûŽi3¦à·) ¢[,%š0:Ð ,S5MCì–à·¸®$“ òjY’q8]ø¼>ÒéÉT’x<ŠÍfÇ1ÉÊÿŠ,AÀëñ\qåTU%™J•öÄDqÔ? Ba¯­¸ªÉçóÈ…}8‹[‹¢ {´D"¤ÒiDAÄçóáv»®H¨†A<Çív_öü"Œ^ñOTçtÁ M‘ÊÊ¥ ~j>çs|S¢`Ú¯ês=‹eMÓÌv{<(²|Q_] ]‚ ÍfÉd³x=^ÆËD3k¡(ŠºA:Áéàp8J†âÿ³Ùì—ÒbŒNO:ºŽ¢(^Ж|¡†BÀï/Q׋T:‰ €¡õRî­AV\ ØÄ(†–%›UH¥’8þ^‘àWU•ø§ù熳ð±_þâÇ$ŽR†AwO/¯½ñðü·Ù½g/MÌlž1æºÑå†ÁÐð0ýÌž9“T:Í~Ī+¨¬¬¸p¦Á¨€C²ŽBô¥>p‹«JQ°¥Šèº~É 1æ9jšÆ?ýø§¤3i|>»§Ÿ|‚P0XHë:v`/¾º®O$øÉÏÁ“=J}]ÝEÌÒ»3ú]* ó ïª( €0Ƹ«x}QÀ¯ó~ô¢±(€Ÿp(Ìík×rüä ƒ¢(ˆ‚PºŒ¦9&ãTýº¡S\ð ‚@ûÙ³ü—ÿï¯yþ¹g¹kýÄb1~ø“ŸñÌÓOÒØÐPJû«ëæ39ÕÚŠÏ磪²rÌ$bô„ (0‹}2º?ÌÔ¼ÇOœ`˶í|ヒÃá3™­ê—m ~¿ˆ(™Vôn—§ÃI8¦¯¿L&SÚ¯€0&pQ±Íã•ÊÑul>‹(ˆ$’ veee Œyvi)Æ—Yt›ˆD¢x½Kð[\G„‚Ñ©†ÏÅ®8„8 €œÅ®€ ú/YÂe¿(Šœïèd82tuu1}Ú4:»ºˆÅãä²9êñy½œ;ßA2™Ä0 ¦M‚®ë$S)0 ‚ÁrÜnÉd’ÖÓmdsYšgÌ NsöÜ9ìv;Ó§Neó–­ìÙ·'}”©S§‡±ÙmÄbqÎ?,ËLij$“ÉÐÕÓC<Çép2kf3†ap¦½d*ESC¡PÈþ×Aèéíã7¿ûwÞ±Ž…óç£ë:ò ígÏñ­g¾‰Ë5ɪ}œÚ\Ó4t]gý÷ÐÔØÈOþ ºº» –—s¾³‹¡¡AB¡05ÕUhšÆùމ$µµ5(ŠB2™DU5TUåL{;Ã##456RÓÝÓùsç±Ûí4ϘN2™bphH4F8dê”)¤RiΜm7ßï)Sñz=c[^í©³¡óÐ÷³há0 É I&S¤R) à ‹qêôiYaÆôiØívº{zèî顬¬Œ¦ÆF¤Q‘5Ǩú… …|>†Á{~ÈÔ)Sðù¼$’ITU%“Ép²µ•\6ÇŒéÓÈåòüú·/Q]UÅ]ëï0±ÛM°¼œÖÓm~ÊδŸ% bç::Pd™¦FóìíëGUUzzûH¥Òäó*çΟ¢¼¼œò²²1ýSœ(ä²yº¦s¦ý ‡›ÍFÛ™6TU¥ªª »Ý^ê?‡ÃQ˜¼Å‘%»ÝŽ"+dsY’É$’$áv»H$ !IS¦LAQúúûˆÅbtuva³Ûp»Ü8TU%•Ja³Ù.[fÑs¢¼¬Ìœ Zrßâºaàp8‰'b¤óõœio§"dN¶UÍ… 4£k#8ÝÞIåße¿a>z”E ËåØà S§Láå×^'›Éâp˜~­?ú(ÿü „C!R©4UU,_¶Ì\U;wífþ¼ytuu108Hee5UÕttuÑzº®înŽÕÖ‰EéàÔéVB¡ ›·nÅív±s×nÀ4êê‡C¼üÚ,Y´§Nñðƒ‹ÅÙ¹{73¦OG%B!+ÀÆ@qÂ÷wÿøþìûßgpxˆŸþó/¸ç®;‘eÒ—S7ô1BÔ0 2™ ï}ð!‡ƒá‘ü>â½?" Ñ?0Àƒ6Ð×ßÇþƒ‡Ä6mâ ÷VåðÙlút3¡`;wñü·ž£ýì9N·µÑÙÕÍé3gPÕOC}©TŠÁADI$:¥Ø¸‘»vs×ú;øÃo »ÍÎgûf„½Ý{ö‰DÈçóœj=M__? õuƒåÈ’È©ÖV2™,sçÌá©ÇÇïóÑ?0ˆÛåBS5€UUKõ*ªG ~óo:²,3³¹™åË–4aZéZèëëcßgûQó*‰d‚ƒ‡Ž N‡UÕ¨­©A’¤’ÆC×uSÅèÚ…{é…¿ ÜyÇ:²¹,ŸlÙ@¯2mÚTfÍl&•JÓ~ö,‚ b:™lUUMÕœa®@R)óC³ÙlärY‰š®›A04•¡AÒé4Éd’W_ƒh,FCC}ÁH"“Î0<<Œ¦ª†Óá —Wb``EVPlJ©ara°˜?·…'}„“­­¼þæÛ7¼›Ó­‚®ëT„ÃüÙŸ|Ÿ5+Wòîç;ßznr?˜®jŒ¢ºa^¯‡2€ò²2R™4‡á‘‡†‰Dðû|Øív$•Náõ¸Qó*ñxY– ‡Ã,^¸ïþÁw(+ ðêëo‹Å©««Ã0L:‚€aè¥=îµkVsçúu|ºe+Ûvì(µmô~öxÁ¯ë’$1}ÚTÍŸOcCƒy~aÅžL¥Èf³¸\NšØpÏ=<úðCx}^žzâqB¡ ¿|ñ7ô Œ){ÂûFáw—ÓÅý÷ÝËž}ûèéíEµ55¬Y½ŠçŸ{—Ó\ DˆD¢ÔTW!+2ïøwÞq;›>ÝÌÜ–¯"É2ù|žh,JGç92™ ¶Ë„ñ¾¤ª¿h,´|ÙR{øá‚²JûÙ³d²ÞýàCöí?@}}=-³góÖ;ïò»—_Án·³lÉæÌœÅ'Ÿnæƒãt:i¨¯Çívóò«¯ ¹{ýTTTpöÜ9DQ",§©±ÝN¯¾ö÷ßw/e³gÍÂÀàw¯¼Š(ˆÜwïÝfØÒáAÀãñ I{÷ïçСÃäóy¦Ni²>Î]× ‡BüÅŸþ+à ]ÌÆ»Æv»Â‡?fÏÞÏp»]²$“/Ld%IÂï÷SUYÉŽ]»8Ùzš5«Wqäè1ÚÏcþܹH¢Ä‡?&IÓØØ€ÓácˆhèF)²aAe¿ß®kLmjbýí·³yëV<wÞ±ŽO6oaxd„)L›:…y--lÜô ·›õëngά™D£1æÌšE"‘$‹2¥±¯×ü–^}ýMQàîõë)„ÀU˜:e w­¿ƒ×ß|‹'O1gö¬‹öøí6²ß?ÆO@ ™J–"ç¥Si4MÃ0  ‡Âˆ’H2‘4WóªŠ(‰¤Óæy5U5ȲL:&‘LàõzÍI^"ŽÃîÀír“N§I§ÓDcQrùÁò étšþ~*++ÑTmÒ2“©$²dNrF’|^/‚`yY\F†G˜:uÁò ígÏÐÙÓ‰ˆDSÃ¥Ç×’d|á…~Ð8¥ñû-³[Æ\ÍfE E1窪’ÍåøÑOÆŒiÓX¶t ååådÒiþûßü-÷ÝsÓ§M¥,P†( Äã t]Çî°—ÂcF¢QtMÇï÷a*ow˜>‡v»;¯ª8Nò¹<6› A€d2‰(I¸].òªŠVÐ4är¦°®ëD£QE!à÷[.€7)†a°ÿÐ~ª«ª)ó••ÔÚ`¾¦Õ·€Ýn/mäòyrÙ,v»£ô®µQN‡ÃÌ —N“Éfñû|äry’É$v‡—Ó‰¦iD¢Qìv;Ž‚a‚€,Iäóæ 5—ËO$p¹\xÜî1õ•$‰³çÏðø¥:]R‹«Y0ßÓ¼ª¢È2‰DYQp:¦^^Åí63ÙÅ òù<~¿Ì–ˆ dsY::;˜:eê˜ýf]×QUµ´ÂÕu\>oúÏ‹"©TšL6ƒËé,Ð¥3$QÄn·—¶-E)mcË2 ÓOœN'ªª¢i6›­t©åË™áp u‘h·øúc³Ù˜>}UÜ~[ A øý¸Ýî’Öm2¾ð´{¢´”VªJ‹«Q²ê¿Ñ3ϕР¡t¿‚:÷ÛEQ4×ås®?…½v› [0hºË)6›B"‘ ‰Dq»]hšF¾Ê8‰ðûIöÛåúïv¹Ó•ʲ²¸Þˆ»œŠ áÒñ+{.2î›;gîÍ1ÐZ|mÑuã§Žã÷ú‘Ä›cÕtíBh[„kZç¢$I¨ªjúÁßÀeJ!{EC3°Ùl1…G»Ôß¾êó13 ÙívÊËʯw×ZX|!J+~A4]jÎuœ»Þu²¸ÅÑu C$SÉ›bÛátàõxQUÓìZïñÃÎ&“I2ÙÌ =YWDǃ,ËÄqòùüÄÛÍ]„+øÛWy>àv»ñz¼_YÿYX\mJ‚ßírÓXßX ÄsÕ¹q$7†a*áp8pÔ«7:Ž}›ÍF8þò^†â¾¹×ëÅW°þ¿‘)Ö7àÜð6 —c¼—……ÅÍFIð‹¢-«èÚrµÉçó– €Åe)ú³ÃÝlïÌW]ç›MÝlõµ°ø:2ƸïZ%Åâ1‡Éår¥<âã10 Ö|>áŠ1¾ÞW‡kîLk#‘~3–…ÅdhºÆÀà™t¦pÅÂÂÂÂâêñ•~ò²òËúZX‚@*BÓo.¿………ÅÍÂW"‰Q0ƒ^Œ3ês Ï«:yÍ@lŠˆTžaqë!ŠâMá¾gaaaq³òÕþ⣿ €®Ãñó1öŒ3Uñºeê+m,šî'ì·[jÞ[A, ‹kÈ„‚ìªË@Ó.X⊂PJÀsÅVöãÿÎcý¼þañ¾^´T'.·äì¹ô”³aE •å.Køß‚XÆŸ׎‹¿(Šì?p“­­ˆ…lZ+–/#“Î`wØ9w¾ƒE æ£(J)lèå( ý ñ¹¡g(É›ÏÐuòuá(k74“Ík|ºyóÙlƒÇ$Yjß[‰ñD ‹«ËE‚_víÙÃÀà ‹.DVd4Mãȱc„C!6~¼‰9³g±ÿàAR©4w­¿£”(¤øAÀ0 (ð+ø%IäDû Ýíƒø])žyróçÍFD4Ucã–óˆ;±åuýfªU‹[aÔ;caaaaqõ™PÕ/Iõuu,˜?Y–q»ÝäUµ”™j``×ß|›‘H„ááaîßp‡áÀÁC”•ØpÏ= °uû4McÁ‚¹LŸ6½T¾(ÄI’ñ4M.jª+Qdš®Q[ÄPˆ¢r~[Ü:XÏÛÂÂÂâÚ2¡à×tÏö¤·¯ÊŠ 6Ü{‡Áëqàõzhll ¬,À’Å‹èííå­wßeÍÊ•8tˆÍ[· …8qê~ã!ü…¢uªr7²-OÿÂÐpŠªJ|>OGW†DV¦ÊeàvØ,Ap‹a©ú-,,,®-“®ø×¯»7lA ŸËöò \.á0.§“æ3غm;ƒƒC´9ƒ(ˆØl6jª«Y²hƒÃƒÀÁ¯óškižéçÀž~òË,_c8’bמ~Òjš|bˆ|v%‚×ŵI`q#ra«èz×ÄÂÂÂâëÉ„‚_× ņÇãA×u¢ù<š¦£(2Ñh„ÃGŽâr:9|ä({öî# QSUE󌔗—SWSC[{;š¦•bs_Éù½.¾÷ìþ>·™Çú8Ù6„ !'Ѳ'H÷§ùí¯Åþñ÷¬n·–;Ÿ………ŵ¥ ýÙgŸ}¨ººz©¢(hšJUU%áP¨$pfÎhA “ɰ|ÙR2Ù,š¦1¯e¡pˆÖÓmD"ª««øýxÝêêëH§Ó˃¹ó•û=,_ØD]›ŠZ‹VðÀúih±vεŸáı#,X¸„ºúz+¹Ç-‚(ŠÄãq3S¤…………ÅU¥$‰_ýõ,^¼øûN§³”mô*»xl4Åcº®OøwAPU•þÁ~¦O>¡ëŸ ˆ‚@qN` 000À/_ø9'çßþûÿƒæææ›.K›ÅCEºº»ÐuŸ×giz,,,,®2“¨úõ+:6ZOô÷’¶`œ;ßEeƨ=]ƒP(Ä_þëkÆùå&hñõg|„G ‹«ËW“5G0WrŸg@·¬»oMÑzî×’¯,V¿aH’•_ÝâÒ‚PÒôXXXXX\}®¹àEÓ½o`pŸ×gYl[LŠ€@6—%“Éàõx­ý} ‹kÀW²â÷ûü$SIúúû®w{-nd SÕïõxQåzׯÂÂÂâkÉW£ê|^Ÿ¥¾µ¸"t]·Vû׈¯Æ¸,?| ‹+ç­……………Å-Ä ~3Òž¥¨·¸–ß3 ‹kÇeUýÈéliËr¤O#•3¬ÁÙâªcPá¸k†a˰ÏÂÂÂâZqYÁ/аû\–Íg *|xkwÀâêc`ÊäyýH’ï¯q)–}ŸÅÕ@’$A@Ó4Ëhô@+fÌe¸¬àWuIi<½ØÇÜZšn}8× ?Û’àø™s„\–à·ør…8àvÅŽ är9KðÍ)ÿò¸=„Cá óÃX\àÏ©¦j¿¡L"äЬïÆâ! !·€lsS_[†`i—,¾$š¦ÑÑÕª©4Ö5Zñ!nr¹ݽݸÝn+Ø$\Rð @^3 ·]B7°Va× C€ ¯ C2 Y­ŒŒ_A0Be2$I²²|ÞȲŒ"+äóùë]•–K¯øÈk:‚»¹gbᱸ–”{d†#éë] ‹¯²,£º•åóBQLÁo­ö'沺Լj NEÄê¯×ÛÆ¼ÿů_™[!“·‚=ÝÌ\Ï}UAÆÜß0 dIÆÐ +ˆØ5b|Ÿß÷W…¼j­ø'ã²{ü鼆ß!!ˆÆ8þb&µ\.‡¢(ˆ¢xE3,AÈ«*¦Åí•dc¦·øž,n‚  ë:éts?Y×uDQÄáp\qÝ/*Ð ×é©ßdu6 ƒl6‹ªi`H²ŒÃn/ýí‹–;‰ðÙþ,_º§ÓY²|.ÖYÅRèÜâGu¹STU5[ùâW«XŽattvÒÞ~–U+W (Šy_|N™LN-Ü{ìõù|Q?ׄE×Í•ž,ËWü<Aó\¿ÈsÌd³èš†Px¯Àn·©²ø¼‹)®¯Ö{VDUUQDš Žãûd²~‹F£9vŒóæáp8Æ<+AAKõ¾’2‹-ò'z¯Šå@Ww7ç;:Y²haé\AÐt MÓÆôS.ŸGUU(¼ãv»½ÔŸÅwf2t]'“ɘå †®#IR©Œ/Š1j,1 £ôSlÇ—A7 rÙl©ÿEùÒ6‚ ÐÕÝMGG' .@÷}Çíâ=‹ã알]ªª"â„ „ ãµÁÉS§Éd³Ì3§t?I”Póª•és.+øSY•2·ùșövþÇßü-O?ù·­Yc ÓÂÇ”ÔkÅÎ/>ð÷>ø›bcÙ’ÅìØ½›õëÖáq»Ke…òèkºº»q»\ƒANž:Źó¬»m-²,—„VñA¾_ñX2™ä‡?ù)ƒCC RS[S÷Ÿ{–ò@ƒ±ƒ¨¡ë0IY£}¶w¢(ÒØØ€ªªÔTWÓßßÏÎ={Æ´ërõ»pÌzÅôÿýÿþPd…Y³šyò±Çp8cúf²ö *õiñ¹ŒŒðÎ{ïS³oÿ~žxôº®“Ífééí¥¾®Y–@Õ4ª«ª&|¾Åû‹¢ÈÆMŸFyüÑGƼ+‚ 088ˆªiÔÖÔpöÜy>ظ‘¥Kc³Ù 'Ë&" Ùœ†, ¥kãñ8ÿðÃÓ2{Þ¿¡t¼ÈDƒ£ >r”Ö¶66Üs»öìaÁüyËË'ì¯bCÃÃhšFe8ÌàÐ0båŠå¸œÎ’€ýžŒ.«Ø'¯½ñ&çΟghx¿ÏG àá ¾®î¢ºNTÑçÏ;{î<Ý==Ì3›D2EMu™L–í;w–Ú5QLVæèc†aðêo2¥±‘eK—”¾Ûñ}Ryæãï5<2ÂGBY Àá£ÇØpï=ø½^tà “ÍÑß?@Mu²$18®ÌÉž§(Šlß¹‹x<Ά{ï¹è½*Ö­ª¢‚óç;øtëVæÎ™]žÅI¬ªªc&±?ýç_Ð?0€Ëå$ qûÚµœ=w§ÓIWW?ô 9¶ŒzæÅï§«»›ß¿úÉd’x"A¨<È´iSypÃ}ØíöI¿ËI¿UÃ@ÕtvîÚEmm-N§‡ÃAY @ûÙstuw³bÙ2dY¢púeËý|EQäܹsüôç/àóyX¶t kW¯3Κ×N^þ迹€:w¾ƒ­Û·ãt:i?{–ûï»·4™ÇÄâ1jª«Á0èêíÃétðû/Ȇqý[œ(¼ùλÔÕÔ°tÉâ‹& =…rŠïY4eö¬YæØ„9qÊås–àŸ„Ë¯øs¡€sâ?Ÿí?@ÿÀ »÷ìeåòå†ÁÈÈ™lEQ¨¬¨ “ÍFÉf³¸Ýn¡##ì6¢$ár8H4Joo/n·›Šp˜þbñ8¡òrì¿øå¯hlhà¾{îF–e{iõF øýøý~‡†H§ÓÄã ª*+)+ `.·›ï|ë[œ=ŽŸ¿ð+ž{æ›T†+Èf³tvwcèv‡ÁÁ!l6…ÚÚZ²™ ±xœx‚Á ba€¼ëŽ;ˆD£üê7¿áöµkiž>AèééEÕT\.‘HÃ0¨¬¨0'y±©T »ÍNeeƒƒCdsYBÁ¢("K»÷îãàáÃ<þÈ#”——a³Ù€t&ÃÐÐ’$,/'ŸÏ_²Ì`y9î¤T×u Íç‹ÅI$ø}>|>︑d2Áî# ¡ª*CÃÃ¥{Wy‡ÛÖ¬FDŽ=FcC=¿Ÿúº:NŸ9Ãëo¾Í£ßxºÚZ>øh#‰„YfY @<‘(=»`y9¢(Æèè§õôiE¹hÕžÏçKu{ðþ TT„Yµb9¢(^dÈ—ÏçK«xUU‰Åc¬]½Š¹-sJ‚Íf³‘L&BÓuò™ ½}}È’DE8lÚ è:ÁòržyêIŽ=Æ®={øæ“Oàp8‰ i’löG4Åír‡ˆÇã¤3’©á`¿ßO*•bph›b#,Çf³‘J§xû½÷¨©®æö5k¡ HuFFbÄ ¼^/^‡h4:i™Šb# –ÚœL¥P…'{ §ÓÓá “I§É«*¡`L&3¦üH4J2™"—ËðˆÆb8*+Ìï^ª«*Yµb‰d‚ÃGÒØÐ€Çã¡¶¦šÝ{÷²ÿÀAžxì</¿ú55Õܶf5N‡ƒD"I.—Ãérðûͱlh˜þÁÚÚÎà÷y/JÚ•H&ùý«¯Q[(§yú4²Ù†®£z7tCGÓ5Ë¥o.ïΗWñ9•ÂoìÌ)ÉpâÔ)¾ýì3lݾÞ>3íîÿ›¿¥"&qÿ}÷â°Ûyñ¥—¨¬¨$™JòÜ3ßD’DDI"‹±sÏêêjyã­·QU•ÆÆFî¾s=o¿ûÃ##$“IV¯XÁÑãÇ9wþ<@ŸÏËÁC‡) ”ñú[o™/¡¦ñäãóú[o122‚ÝfG”DþÍ_ü9A¨®®"›3' µÕ5”•øoÿó14<ÌŒiÓ–—sêôi†‡‡Y³j‰d‚Ý{öQUYÉÐðþ'ÂŽ]»8~â$áp˜ûӧÛèéíåÄÉ“ Œ Yºd ;÷졾¾ž·ß}l6C6—ãÁ hmkc×î=“”âž»îbÖÌfsµ"$S)¶lÛFYY çÏ'‘Lð¯_¤©¡åË–ràÐa²™±åïÞ³‡`0HOO/Ó¦N¡³»›G|;ÖÝŽ®ë”—•qïÝwÑÕÝÍÐðŸnÙB4eŲe$SINž:ÅÛï¼ËëÖqàÐ!†‡‡ ƒ¬\¾ŒúñOžï†{ï¡yÆt~úó_`·Ûik;â… Æ Î¢(2‰°ÿà!F"#”——óô3¥©©¤E*žo“%œ6‰LNÅ­¥•Àá£GY¿î6δŸ¥õtÍ3¦óÏ¿ø%6»t:ÍìY³˜7g/¼ø‚åeÄ n_»ÖTxÙlŽýR^VÆþƒ"X^Î]ëï`מ½tuw‰DYºxÇN'â÷ù˜7w.û¢²¢‚O7o%›Ë‘ÏçXwûmœ;ßÁÁC‡ƒD¢Q¾ó­ç¨®ªÂ0 ?6›‚Ó餼¬ŒŠŠ0¯½ñ¢®¶–¦ÆFN>M"ž ¦¦šÆúzÞýàêëêèëàÑoÚô ç;:Ð4Å °jÅŠRyá0e.—“ŠŠ0™L†¿ÿ§b·Û™>mù\Žþ†G"Ü{×|và ±XÅfCE¾ùÔ“¼ýî{æ½¼œõ·ßÎÑã'P™S­­tvváõ¸q»=œ8u ¯ÇÃÆM›ÌI®sÿ=÷ðѦO&-³¼¼Œ»×¯' š}aÀHd„m;vàt8X²xæÀÁƒÔÖÖ2{f3ûB³ü{ïá£7‹ÇH¥ÓTWUÒ?0ÀÓO<ÁÔ)M†AUe%µ5Õì?pˆ®în¶íÜÉÀÀwÞ±ŽcÇs²µ•?ù”™Í38ÙÚJgW¿ÏÏ»ï¿O0$NóÀ0 Þ~ï}¼^]],^´`ŒàîînNž:EWW.—“uk×^´…`’(‘Ïå±É¶RL “KN… rªŠÇ1ñ~mk[ígÏ’ÍfæÈÑc¥}ØçŸ{–G~ˆ›6Ñ×ßOyy9ÿêûßcÑ‚|ðÑFòys_Ót’É$;víÆétò¯ÿâ/xâ±G)++cõÊ•´ÌžMÿÀš®³pþzðØpš¦Åø`ãF¦45ñ—þgÔÖÔðáÆär9n_»–ñÝ?dhh˜‘HdT›Š/‡QP©äóyÖ®^Å·Ÿ{–åK—²tñb~?{öí#OÐÒ2›?ýþ÷°ÛíttvÅd‰óçRUiNfü~+—/gíêÕ|ëÙgP…d2ɶ;0 ¿øÓÅÚÕ«yçý÷‰F£—(sUU•^`Lµ•Ïç£,ÀápÏ穨ó/ÿÅ3<A×´‹ÊŸ7·…ï~çyDQäч¿Áâ… 9vâĘgX\åTTTðÝï<ϽwÝÅé¶6–/]Ƭ™3ùãïþ!kV­dÅÒe¬]½šo?û ¢(!Œ{¾}¼ Ÿ×Ë¿þó?cýºÛÇ ÌÅ{TUV²rù…rÇ„¡ŸeIÀi“ÈçµÒ?08ȉ“§ÈçUÒé4‡#“Í’Íå¸ã¶µ<ùØ£9z”óˆ¢È7|€;ïXÇö;‰ÇãhºF*•¢õôiúúûyîé§xôðûi™=‹YÍÍèºF_?óæÎeñÂ…<ôÀýˆ’H2™bßþhºÆ·žyšE òÉæ-Äb1¦O›Æ³O?…¢(%®ëhšVÚ—Öt MUÉæ²LijâÉÇenËÌ5ߟc'N04*.S¦¦i%;óÛÈærL›:•gŸ~ Y–Éåó,˜?Å òî§£³s̽vîÙÃààà˜=isrYÎcƒÕ+Wröüyæµ´0¥©‰'}”…óçé碊yô³Ûºc.§“çŸ{†Ë–)»ØÇåee,˜;¯TNQÅ<ú<]בD‰\.7æ€ÓáÀëñà°ÛÉ«*ÉdÊœ\ƒƒìܵ¯Ç®ëìܽ‡|^sM×ÐuMÓJö-w®[Ç]w¬cþüyÌl6'ðG'—ϱdñbžxôF"††‡‰Æb¸œ.æÌš‰Óå$‘0'‚³š›¹ãöÛ¸}íZ4M%³uûvjkjxþ¹g©‡ØºcÇeÊœ…ËåºðŒ I’ñ¸Ýxö(Ÿ8À+¯½N*•.íCÊ’\øÈŒÒÝ ÝÜc%ÉT‡ª~©2“É$÷ßwŸ)ü ðy½Ü}ç456ÐÝÓÓá,ÕY˜ |»ÝŽÃáÀårb³ÙLµ^,6ñK IØmvœN'²"—>$AQl£ÛÅØç«é¥ˆh£gܪªš†Sìv;ŠM) B“©ßdQÄ©ˆdSyt]Aàt[J¥ðù¼œ>ÓÆÈH¤dår¹ ÷Ì#I"»—ÓU¾ù|¾TÇ\>o d̉I,ç÷? ¦ºÊ$ š¹®é€aê•&4&6›‚,ËØ›y~ap2 ÊÌAËÐõÒï‡›ÍÆæmÛ9wþU•U¨šf[É2v»MUY²x>¯—ÍÛ¶ÑÓÛK]m ` Kº^¬_qrQXÝ ê§ëú%ËìêîæñG³lêi³ÙJíÒ †kÅ>ÑTm̽(Ü¿4à º¦#I¦¡—MQ t†¡“/ôÓè~Ö ÷ýìr¹ºa Õb;Í1C+¾æ(Š‚$](G*ìÉFÀü>3ÙLIPiš†"+,Z°€óç¡ëzA˜¦\>O:AÀåtQS]ƒßçÃ0t4íªR×Byæ3E—ËE:“áÝÂ{åv9Kß‚Ífæ(H’Œ"Ë<ú‡8tä(/¿ö?ú0æø%Š"yUEÕ´Qu¥íà‚ÁÜde¾òÚë<õøãÌlža>M#,ç¶µkp9¥qÜápà(hB„Q}V2”eEÁf³#‰"¶Â–Kñg´L ãÝf+wy)x 2©àÈ©EB‘EF÷Ì3ííüÁ·¿ÍÂó9ßÑÁßÿàŸèê§—~á—D£Qn[³§ÃÁ‘cÇøÁB?=ò0ýý¼þæ[Øìvv+–-ã÷¯¾ÊÿüÛ¿cÆôéÌš9“l6[Ø×5p:ÌlnæÃãv»±Ùl¸].îZ¯¿ùÿëïþž¼ªòäcòÖ»ï!‰¦•ºÍV°¤.‘…´ÍfG(XGÛl ’xÁ"dd÷ÛU8lvù|žMŸn¦»§I’q:(Š‚€ÀŒéÓÙ±k7¿õUΟÝfgõʼõλüíßÿÙ\Žû7ÜËéÓm¥ÎÅeJ8ÎÒ.Š‚¹‡+m@–dlŠ‚¬\±œ“­­•/–ÚfC3¨…¢Œ1+ö…Ýn†4% EQ–•Q^^ÎÏ_øßzöšgÌ`ç®=…vÍ£«»ûÂó]»š–9søáO~Êÿú»¿§¯¿Ÿ¹--|vànü¸dxß=wÓ<}ºYÎ+¯òÄcNh-ˆn‡Ì`üÂjêä©VÖ­]Ãík×’H$øÅ¯_äL{;‰D‚÷>øA˜ÒØHUe%½}}¼úÆ›$’IÍŸOEE›·mcçî=H’Ä”¦FøÕ‹¿¡ºªŠ…  æU‡†Ig2Ø…ºÚZ>Ìû~Dsó dYfÞܹlÞº•_¾ø[r¹kV­ä|ggÉI’/ă/Ʋ / ºâùš¦'‘¥Aìv[ÉZ5):xè0mííhšnz"¢(‡Ées¼öæ[ܶf5²,3µ©‰D"ÁK/¿‚¦i,Y´§ÓI_ÿÀ%Ë=a“ ž’(¢&ŽêúÚZö8À{~Èê•+©¬¨s¯@ Pnʼn„,ËY%©0Yôñú›oòÀ† Ô××éç¾þþ ÏnÁ¦MÂ˯½Î ¿~‘¡áa¦O›ÆÑcÇÙ±{wÁ(L`õÊÔ×](ç®õw\0…(Šä “¾âóe©¤ò/NXeIÆïóÑÑÑÉé¶6æ¶Ì¡³«›d*…Óá¸È"] qt­ô¼ òù|¾ô^ƒAòù¼éÅ ë(ŠL,çøÉ“$“IEA–¤’pl¨¯gמ=8ìvÅœ¸­Xº„M›·Ðõ«_£ª*wß¹žÍÛ¶_¢L[a’¨—º,Éhê]|'–/]‡oâãÊ3ü±,K%á.ŠÂÍIq'¸¸øDÑ0‡Bds9^{ãM¸ï^Ø]h—,Iœnkã·¿™¡áaÖßnj ßûðCzzzèèìdÆŒélÙ¾ã'NÆmwÞ±Ž¦†víÙƒMQX¹|ÙE¿ø~XA|&¦49~ýõ×°xñâï; 3AA‰§è¤X:{ ò8— UU(Ùl檠¿€þÁ~üÓŸñèÃß ¾®ž©S§°uÛ6Þ~÷={øajkk¨«­%ÉpöÜ9ÊËÊÁÜ'DèêéÁïóQ[SCwO‘‚Ñ^yY¹©NíéÁíqãr:I¥Ó„‚A†‡‡‰D£”—•QVVÆÀà .§ ‡ÃÎÀà Áòò1Fdù|ÞT­†BH’T8߉Çã!‰pöüyÜ.7~¿¯ð’‹ø}>‡p:ÄbQzûú ü4ÔדH$A¯Çc oQ¢¼¼Œh4F(2…q{ÜÛ‡( à÷OP¦ßO}}=ŠR0BÒ4ǵ!™L–Ú.Š"ÑXìâò¯ÇSj:FUUÊGY~—úbh˜p8D&›%•J ‰DˆD"TWUa³ÙèîéA–d©$ûÿÈc…çÛÔØ€,Ë  ÑÛÛgîi——aÐ?0`¾bT†Ãx½^º{zE‘ꪪ gê¢ ÐÖ5À™sÔ–91 ƒá‘Ü.WÉàq$!›ÍòâK¿gÑ‚ù4Ô×QW[KÿÀ /¾ôwÜ~;U•ÔTWc]Ý=æ@£Èø¼^rù<½½}(ŠLuUñx‚¡A0`xd¤øZQ^V†kÔó*~ãQU•‘èÁ²`i?xd$‚ËeŽÅo!ãñxèííÃårâóùèëë#ŸÏ †ðû}cÊÍd2¤ÒiʦñH$‚ÏëEQ†‡‡2ß+MÓ …H$ŠÛífhxˆX>þ™‹¢È®={9rô(Ï?÷lÉÛh¢g~¡^ÆWÂË=ó\.‡ª«LiœbeëÇäª~@SUì²TRñŒg¢P^VÎ=w݉c”/딦¦1¾ö ž¾QªÁDAÆ Ú‹¶+ùaÒAhü=&*×0&¶_—KÝãre^ÎGýrkLùãŽMÔ§—èF×3X~ñó- ãÊÿÎ\êy”ÎÜ;¢º¦™y¡'xþ’$±lÉbϳû¼øÌwÓ(ØR¨“ /Ò7Úsü¼u½šïäç¹^×uª*+Ì@j…=ý«ÞVÔ‚1¦%øÇ2ùŠèêÄåv3­¡¶dØuÙÇ­F';fqsòU£1î˜h½g7)×úÙEbÓˆÕáüò…Y|iŠÚ§k5y2 ƒX"Fóôæ/QñëÆ˜¿i<4*t­¡á²+|žç2‘Úe¢c7'_ų”$‡M4Cv^2lêDÇ,¡³r­Ÿ(ˆ%Ï ‹[USqŠNK¢4ªær9ÎwžÇî¸àBÓ4|žFÀÊÊgñÕ!•¡ ígÛ‘+ê–ÅU@¸à2|#lY|5äÔ]Ý]cŒnoŒ‚«éDq J‚?I“WóÌjœeF92@Vä’´…ÅWISC#¡`К¥[\5„bì+ŠÛ-ƒ€pË>ïb±‚!ŒþÆ8U¿Ýn'Œ¹øfx­$ 7'’$ð®w5,,¾4Ödq=Ȥ3¨yS»UÜâ*fÑpõföãÛb}t7'_§÷ÐâÖe¼;§…ŵf´gV<‘ £³“\.O(XNmMÍå“ôÜìX……ÅõÄ,®'ÝÝ=ŒŒDÓ–Ïív_^ðOäÿ~¥\Ê/ÞÂÂÂâVàr±+,,®Å$t`¾ªª’Éd/-øA íÌiººÌ˜ä>ŸŸiS§áv{®è¦±XŒ3gÚ˜1£·Û}]&Ö¤ÃÂÂÂÂÂbTtÛËxº­•ÃG14<ÄîÝ;Ù¾c›é_=.ÙËèÿÇcì?°T*9éyÅ_ª¬/ÛP ‹ëE1r …Åõ¦(W/¯êG ¼¬œ¹sæ±'µ›D2ÀÈÈ0‡"‘HÐPßÀÌ™³èçØñ£¨ªÊÌæY(6¥ã}$2ÂÁƒûÉårÌžÝBMu î§···ÛCËœΞm'žˆ“Éd¨¨¨dþ¼c’ë|¬ÎÂÂâºc C7W´Ç?84Èž}»‰Æ"x Ñh„Ý{w“Ëf©®®aßg{Éf³´µ·˜Ù²¶nßÂÜ9s‘\.ÏÁ½»‰2›}òÉF}ô‰RøÓ§O‘Ëe‰ÇãTUVqàà~*+*©¯oør«vÃ2®±°°¸~XãÅÆeUýºaPWWÏÃ=†{ ÐÝÓM4aÚÔi,^´ÇË™ö3d2Zf·°páâRJRAÈdÓ  ’Wó‚€Ãá$ÒÓÛC,C’%âñ8‚(P[[Ç‹q¹\%í—ÁRõ[XX\o,Í£ÅĹóuuuòÁGï“Ëf …ÂÔÖÔ222ÂÑcGèìê$I³bÙJNœ<ήÝ;e—ÓEC}mgNÓÖv¿?@,Åår …ÐtÎÎó„ÂØmv C](¤oÕ1 i\¿,}p“e¨ûª˜,;á•Ôc²•ÃdY¯NÛÌlÈÖàeañy1 ÃŒž6—Ê:YY㯽šßå)SÀŒ w¥cÐÕºïDý7Q?Y\Ì%¿a̘6—Ó‰ x½>š›ðû,_¶‚¶3§I&“ÌŸ·€ššZ**+9s¦ MUiš2•€?ÀšÜZTM¥¦º†³çÎOÄñz}TVT²j娬¨Äçõb`¦ç´ÙìÌŸ¿p¸âª§ŠX,Êá#‡PUÃ»ÝÆÂ‹¯Z“­ö“É$§OŸ"‹âr:™1}&n·›ƒ‡ö—¾qA˜?oCCCäÕ<3›gÍf9~âuuõ„Cá«òMæóyŽ9L0¢¡¾áН‹Åc´9Í´©ÓéììÀívÓØØtÙ:ÝÌE¡·¯—žžnæ¶ÌE–¯Ì®Kzzº9Ùz¡öÛ³®æxþuä²+þ©S§1uê´1Ç ÃÀáp0·eÞ˜c~ŸŸE 96gNKéߡ ZÌË>kÖlf1û¢{†Á¼¹óK¿)&¸<‹±k÷Nêëê±ÙìØvt]›4¿ýè:>6‚ Fødó&–.^N]]ÝEçž=×N4£yFs)éñǨªª¦¾¾aÒ{æò9öìÝÏçÇëõ"Š"—x£®¶ÛsÉö[XXŒÃ¸xËçólݶ™žžnee ¨ÔÖÖc³)c¾qÓ÷út[+™l†æ3KcF$¡"\1¦ÜË}›“­¬A ·¯‡Í[?¡¶¦ŽªÊ*l6ÛeË.zo8°Ÿªªj≂(\².Åã»÷ìD%V®XE6›%¢ë—kGËæ²DFFˆÆ¢ S[S‹ÏçC×õËŽÓŸg\ÿºqYÁ©Ž˜(ýî•\_<öyÊþ¢LèJ#€Ãá`ñ¢¥øü~lŠB:fÇÎíÌž=‡H$ÂÐÐ Ë–® ³³ƒÓm­øý~æÏ[ˆÝnçØñ£tvvàt:©©®¥§·‡¥K–ÑÝÓÅðð0ù|޳gÛI¥RÌjž…ÓåâÌ™6l6³g· "½½=¼ûÞÛƒ!fÍš(Šˆ… Gަ««“šêZZæ•<Ìö-sZ¨«k@‘eF"#Äã1(xPˆ¤ÓiÜÏÈÈ0S§NcÆôæ š‡BÛ—-YŽnèlúäcb±û>ÛKOO7^¯—ÆÆ&Ž9ÄÐй\ŽšêTUeÛŽ­8NæÌi¡¾îÊW·2 .MS  ±fõm8N©Tªô××5 Š"~q\¦ÊbÒ¡ãÇÑÕÝI>ŸÇíö0oîŸ/“‡“Ù³fÓv¦h,J8" qüÄqt]'‘ˆSS]ƒ(š[ŠÝÝ]=v¤äæóù9xh)ÍœÙ-444b M45NáØñc|¶/÷Ý{?‡ƒ-[7ÓÔÔÄ´©Ó Þgq$Q"™m©©eΜ¹ ôsôèdEfþ¼…„B¡[BøýCö2 ŽF@ “ÉðÞï "uuõܹþndYæãMÑ5eËV‰Œ°uÛ***8y꺮 †Ù¿sæÌÅawÍf8þ, æ/`xxˆžžn¦Oo.M *+«Hg2x<^Ο?K,Ãçóãt:©ªªæÄ‰cär¹BÅÌ€I{÷í¡®¶Ž=ûö˜Íì9ÚclÙºEVWTP[]ËùŽóÌš9ÛÜgÓu:ÀÉ“'¨¨¨`ó–OñûTWUiû»ï¿Ýf§¾®žéÓfÐÙÕË墵õétš@ ŒL6Kcc“9ó7 ÊeD"öíÛKeEv»ý–øH,,¾ ã†a`·;¸í¶u>|wÞ{‹ÊŠJ/Z‚Ãá¼ð+ ~€ï袽lUU9þ,UUU öÓÕÝÉìY-9r‡ÃAWW'²,8{¶©S¦!IÆ·¥KW”„¾ $’ Ú϶3oî|Μi£µõ••tvv :õu ì?ð¹l–ö³íTUVáq»Ù¾s-sæ"ˆ¦}VWwyUE@(“v»Y–q9¤S)ÜÏìÙ-øýþ’ðŽÇc¥ql˶͔—•ãöxض}+--s9Ývš9³[H$ìÛ¿—ʪ*vǨñÇ(õµ,ˆΡ鬨âÈÑÃæ×Ù¦kf[î'—ÏÓÞ~›ÍF&›aÛö-<ôàÃnÏ~ÝøÚ þ‰TýæVÅýÄï ˜/¥ËE󌙋.FQΟ?WÐ*˜(JTTTâtº˜Ò4…ªªjvíÚÁÐÐ ’,“L&p»Ý”—Y¼h ±X”þþ>DQÄ0 Èe³är9¼ªšc4#ën»ƒúúdYæì¹³TMe` Ÿ¼šGÓ4Oww©T Q’PU•ÊÊ*’É$3›g1<<„ÍngÞÜôõõrèðAr¹v»ýz?] ‹›‚‰öùCÁ ë︋Hd„>þAY¹|Õ…o¼¡Qñx½…ý„‚†¯°ÂC,Z¸˜ÞÞ’Éĵµ ˆ"6›™Í39xè@a|›2Fµ}þÜ9††Ù»oétšD"Îüy $‰êŠ–-]FWw'ƒCƒ(²Ì´iÓ©©®áܹ³Ä¢ÑR›L­#  à5N ÒÕÝEQÿ*I"e2A`æÌY=zQI$d2æÌnÁëõÑÞ~†h$‚Ãá`Îì–Òø“ÏåqØu4’$1{Ö6}²‘CG" ÐÔØDwwUUÕ,[ºŒîî.Ξm'‹â÷û±)6dY&ŸÏßãÚ×^ðK~2™ {öìÆf³áp8X±|%‡¢¶¦†t&áÃillÂï÷#ˆe2*+*q8œ=w–6~€Ó餶¦AÙºu3‰d§Ã‰MQ°ÛììܽƒšŽstvš³o§ÓI,—à§§›HwO7óæÎ§§§›¶¶V§àt:‘e™P(LYyð¾ ë^¯—òò ¢`δeEANž:×ãCQl6••Ux½¾1m( ”•R0GF"tvuW`·ÛÑuÇC$2ÂÇ›>"T0Ô žº¡ƒåždaqYóSõ¹‚@*•âƒ> “N#+2j>Oe¸²°  sèÈ!Úϵ# °fõZDAàì¹v^}ýeª*« Åš!XuMG×utC/­ôOœ8ÆÀ@?Ùl–L6Ckë©1ãÛ²¥ËE‘l6CëéSÌlžÅìÙsH§Ólß¾µ´¨i;sšx?6›Y3Í}±\.‹×륺ºY–Kmw:cŽ9N3—‚®›A“êhllÂåvc³Ù‡+(/RYeüx=ÂáÊ‹<,,,Æ"¹\Q/ú^$IB’D_0¨žGMM-¡P¯Ï‡M±108€(ŠTW×0oî|¡ Nœ:ß離²Š… Q]]ƒÛíÆátPYYEUUuÉ»¨8NN™2¯×‡ ÔÖÔR_WOC}#v› ‡ÓIe¸’`yÚÚZjkj·ÇÃâ…K(//ÇápRu‰ñGD¼/••U…~•Ð4¶öÓ¬^µ¯×Kkë©R[æ¶ÌcÊ”©T„+P5 ¨W ¯÷+sÕÞ»D"A:f``l6[Z@JG¿xá?˜9kæ÷—/]>F­´}Ç6Ž=„$JèºÎÌ™³¹ý¶ucn2Qö©ÖÖSœ8yœ{ïÙPÚ Þ»o7©dŠÛn[7&>ÿøë÷ØÇÈÈ·­]WN_”x<ŽËå÷’\Y­ñ~©£-A¯ôºÏ{ŸÉî=¾îãûìRe\‰ïï•ø?] ‹[‘âþ¹,É©'Ë|úE£ü}‘qg|]F×!ŸÏóÖÛ¯SYYÍêUkÓ+èõ7^eÅŠU4Ïhžô¾_tœ¼Ôu—&:¾eë§ôôóAÞ~ç1m™l|ÿ:`º:ö044ÄÑcljÆb¥¶656^^ÕÇð¸=¬\±ðz½d2iÒé ºa®Þ}^ªªÇ@ðy}dsY††Àçõâv{H%SÄñÒ,8žˆc·Ùðx¼¤Ói’É$ƒƒƒ¤R©«Àg«þÏSîès¯Äá‹Üc²ó¯äØDõ»Òó¯Æý-,,.Ã$ŸÌçù¯øV_ðÚ‰Æ A¨¯kÀçó—Ž)Šb®Þ=ž1×}ѱâó^w¥}–N§fÖÌYØl64M»¨-㯻ƶb /«_I¥Sttv Š"Ó¦N£ýl;ÛwlÃír‘ÎdX³z-’$±wß²Ù,õuõü¢±Ÿ~ú1°tÉ2(¤d2¶ïØJOO6›U«VãõøøtË&â±8‰dœêêÚËUí j`mG[XX\/ŒÂÂMºW’$-Z2f%ìp8Xµrõ ¿:¶ÙìÜ}×=Ø €µåV¤¨K¹ìf½€1.!ÍfMc2Ibýú»©ª¬âLûؽ>û ÒéKÔ@€µká@’ASG¹ì]{l6¹|Ž\>÷å ³°°°øœˆ¢ˆ®ë7f ‹¯UU'Õ0•1]k°üI Ο‡?†ÿŽ…Q)'åàfÍ‚¥Ë "|½ûÄÂÂÂÂÂâkK>—'•JM(üǨúÂj¾´Þ^8}áÅ!ÎN8rÜnxôQŒû²‰ïœË!¼ü²9Qøßÿw°Ù`Ñ"¸í6Œ'Ÿ„ÆF¨ªúJ5_g.gKRúëo~òãÌ?ÛþýÙùÂ^¼ªÂñã°k ™ÂÙn‡šذãÎ;áþûÍ À¥H§áðaؽaçNxï=³Ý\¥Ûl¥YÃD)bK8°|9,_ŽñÝïÂñã¿ú<[¶ <÷Æÿ1Ü}·y/IúJ&£;c|zÊKÙ8LvÝ•ÞÓŠ$haqksµS[ßh©²o´úX\LIð‹š†”Íœ9ð_ÿ+CÑRUå+0¼Þ‹.TU•ÎŽNB¡ Ã0èíëÃãñà¯(¾n7,]бt©¹ðÃ"üÝß!üÕ_Á?üÆŸþ)Ìš…ðÛßÂÔ©õWàñ\õ‰€¦iô÷ J"²,8‘L¢( 6E™ðÚ¡áaòù<š¦Q_qtAÃ0Æëõ`³Ù®Éô°°¸ñI§Ó¤ÒiÊ’/,¯Tx†ÁÀà »ïãôõj0&[‘˵˚4|5”|ñŒ¢ª½¼zˆó ðI&I Ã\ÙFéGbÑÿÇÿï?òãþ9ªª¢ë:?ûù/8xð‚ Œù)1ª ÊÊàßý;Œ^€¿üKe„¿ú+„LJßüvì€|þª7Xºº{øÁÌï_y•·Þ~§TO]×ùð£œ>}zÂ6†Á‹/½Äo½Í?üÓˆÅb7úüÑÿÎfsüäç?§£³óâ~±°°¸%ã'Nò«ƒ¦i¥± ·¯Ý{ö–þ½ÿÀAÎwtN:¶Ëß½ü2;wížpL¹’ë'¯/QÎ¥®ß½w»÷î›ðo£Û5Ñ=Æ÷ƒÅµáâåªa€¦A.lj£G ƒÛo»¿Ï?æ4ÝÐñx=8xm;vrÛšÕäóæÀ0 Nœ¯—S­­  ‘Ig˜={†nð³_¼@uU%÷o¸y-sÅ Â=—Ëñλï±c×n"Ñ(+W,Çëñ\ïÇõµdr=µ  ë*íííLŸ6ã"Áoåeå¬\¾Œwß{Ÿ¦ÆDQ@víÞÃÛï½ÇÔ)Søø“Oyø¡Y±lÙX!'H ¼ñ|ò ü_ÿÆsÏ1î&W½Áªªrðða–,\ÈÀКª¡é:¿þíïxâÑGضc'³gÍäÃÓ<}:Ùl–#GŽòWÿáßsìøqàÃ?fáüù¨y•ñ‹cAˆFcüã~DEEõõTUVòêë¯# ååe¼ôûWøƒç¿Í?¿ðáp˜†º:R©.—kÌ–ÃèrêêH¦R|ºy 'Oµ2}ú4Ré»öìeÿ¬\±‚žžÊËËéééAÓ4|>›·mcý÷’J›íJ$˜þccm¦Éd©´‚ºµ8ºúLvO(%âYºdӧ͘ð,ÃÐYºd1sæÌæw/¿B:!ŸWÙ¾s'Ë—-å»ßyžE °mÇNt]¿¸€ãÇaófX¹ššŠ…^ø¹Ê‚@__?CCô̙ƒ¡Ì›ÛÂÓO<μ–9ìÞ»·¤±ð¸ÝÜ¿á>¼ÿ~"Ñ(Éd’CGŽÒ2gŠM!ñàýxæé§8zì™L–²@€|.Oo_/©tššš††‡ñù¼H’„Ûíæ¾{ïáÁû7,¼à–:ËÂâÖÂ0 ¦NÂ>¼¹s‰D¢,\¸€ææfž|ì1.˜ÏÌæ¬_w;«W®À0 êëëùÃç¿Í½wÝŧ›7³uÇÖ®^Å“?ÆÌ™3Æêâ˜b³Ûh¨¯'¢( ÕÕU´Ì™Íî={9pð uTWWQ_WG4Åf³áp8/YŽÝa'ŸÏóÙ<þèÃ|óÉ'˜3{6‚ °háBžûæÓƒA Ãï׬^ÅŸ~ÿ_" "‰D‚Ù3g²~Ýí¬]½QÇlØív/ZHsó ž~âq€%ô¯“~»ÝÎòå+Y¾lŤ«RMÓE‘‡z‘H„‡!Ëåååtttr¾£“®în*B¡‹œ®#üú×0Ì”ˆ£’}%ØÂÂâFbô#V´²,‘HÄ9ßÑI>ŸG”$º{z òù<Éd’¾ÊÊÊøýœ=wžþþ~b±8†a0‰ÐÑÙIggÝÝ=ä²Y6Ü{·­YÃ+¯½ÎÑcÇYµb'NäãO>aÉâÅØeÜ9Lj\ªœW_çÔ©V­§Û‰DÌ0ï†1ÆJ7ÌàÄ™l–áá2Ù ~¿QÍv “Édèìꢳ³‹ŽÎ.¢Ñ(’$'Jý`qm˜PÕoè:S§L£yF3Š¢L8ë’e™úº:E¡,àé'Ÿ ™Lâõxy`Ã}üþ•Wyá׿& ±áÞ{ǪlâqغՌ °jÕWâÇŸËå8pð óçÍC‚åå>r„øáñz½ÜyǼûþüêjk±ÛìÈ’D}]'NžÂívS[WK4%à÷óÒË/“Ëåxä¡ñû}:|„»vS]UE"™äÕ7Þ ³hÁBÊÊ˨­©Åép`·Û©«­E’$kFkaq‹áq»©©®FÊËËÑ4Ó¦QóÚoðo=ÇšU+yã­·Ù½gv»£ÇŽó¿þþpØí|ó©'_½øþéÇ?!•Já÷ûùtóöì݇(Š8î\Ÿí?Hÿ@?Ó§O£¦¦šŠp˜ò²2ºzz˜3kñx‚·ß}ÁA¦OŸFmm ›>ÝÌÞ}ŸMXδiSiž1¿ßÏko¼Áá£G¹÷®»ËK‚? ¢é¼ùÖ;ìÝ÷sçÌaþܹhšÆo½Í®={™:¥‰_ÿö%S˪¬\±œeK—PYaöÃóÏ=[ÐXcäÕ¦´ ë¿þ×Üñ_þË÷Ý--›6!L"ð‹†ªªÈ²\zàÅ}oI’PU•\.‡ÍfC–å±B?—Cøoÿ þó†… 1^{ B¡k.ø³Ù,ŸnÙÂâ… ‡ÃfóyrÙ,.— ›ÍF>Ÿ/Yø]õ4MãÈÑchšÆÒ%‹Ñu|>O6›E’$\.ñD]Ópº\ˆ¢H:•"ŸÏãóùe™|>_*s|ßYXXÜ躎¦ë(²Œ¦™Ó$I"¯ªhªŠÝnG2Ù,²$±uû>ݲ…ïýÑw)/++ße³YÒé v»›MAUÕ ‰Y›¢ËåH¥Óx=º®óßü¿Ïdzß|]×Kî…^»ÝN.—»d9Åú¥R)²Ùn±0ŽI’„¦i¨ªÊ_ÿ¯¿anËn[½¿ß$Iè†N6›CEDQ$›Í–úE–es ןŸ+à3žËͲA¸h  øoÃ0$©ô‚Ž)+•2ÝõþÇÿ]ÇøÞ÷L¯`Vg·Û¹÷î»ÇÖQ’püMM•›Ù%’$]è$Yfá‚ù%­… Øl¶‹üñÇ[ z½^.¨ôG÷—eÔgaqk"„ŒgYFÄ1JðÙí6Âá0¶Q ²ñcÐDc’,˸ÝîÒ5CÃÜïèà»ßy0Çq—Ë5æœ+)Ç0 œNç„Å6 €Ï룼¼¼´µ! à°ÛKçM£ßWŸQÙùFq­fY‚gðoþ ärÿÏÿ>zíîw•ù"*'KIeaañE1 ƒùóæÒP_‡ü·G k›¢ðÄcÒP_?ÖÞè Êý<÷E‘o>õ$¿e w#r!;Ÿ `H’[?1UïpuVâEÁ®ª¿øärðŸþ|ï{àõZ1ú-,,,&!X^N°°jþ²ø|>–,ZtÍ…± L›jưÿGIðgü~†šgàùl?Â_þ%ÆãÃ}÷™!s‹|‘(ðÙgpâB[|ú)LŸŽñGd } ‹ËpµçW%ˆ-ãRüi¯—§ž¢Qá­·^{ ž~ã‰'Lw»ÊJSPÃÄÂz2uý üëmúì46bü§ÿô•íë[XXXXXX\à‚ª_SÑ׮翃ñÉ'ý×ð›ß˜¾öõõ°`L›†ñÀ°f™V·t±É$d2æ6ÁÙ³ííÐÚ /¿ ðg†ÑÔdfà[¿þ¦Ù×·°°°°°ø:1ÖtR̽ý'ŸÄXµ ¶mCøðC8|>þ^yá7¿1·-Y]‡Ž„Ý»áØ1sN›ÖûÙ,ðÿ#Æ_þ%-E­•¾……………ÅuabŸ ÀÚÚ ªþÞ^S¸ô‘©øáMá^D 6jkÍ=üæf˜6 ªªÌI‚ÍvC üÑnv×ãú1eY©(-,,,,¾"&ü‚ Ç‘d —Ó…Q[ µµ+VÀw¾»vaœ;G"‘Àåp ƒ³g“nlD.+Cq8ÌÌ{ãSòÞ †A*6ÃñŠâ¿ÒbªÌ‹² Èfshº†Ãá˜ô¼‹î ä²YEsM6›%‘Hb`P˜.;×»ƒ,,,®Å7öQãÎøÉÿçY d2$Iºabƒh…¼,ÒcãåÚe-‚¾JÑ#{ü±‡B¡ÐÒÚšZNž:ÁÉ“'¨©®5ƒ)D €ÐÒBdþþÃ;ï’X´˜¹ßþ6z}=ÿôË_!ÛíÔÕ×™B•B|€è!õüøg?ãô™3œ=w–¹--¥h}n܈a„ ùÆç…~ñ¥—8zô(ú)óZæàt:/´õùª³Ù,?ÿ寇Ô‚€¦i¼ûÁüîåWزm###4Ϙ1&¨‡……Å×A8vü|´‘ys[$ AˆD£tvu,7Cß¶Ÿ=‡¦i¸]®‹rÚ. à—/¾H"‘dJSã„÷»Ôõ“ýíRå\êzAصgÝÝÝÔ×Õ]ô·ÑíšèãûÁâ‹!2@¦ ÜñL*ø»º»Ø¾c+º®QYY…"+c Åxë·hkmeÚ”&*ÃaÞÿà#êêjijl¤¯¿ŸŽŽ ÝÀív]AU¿ºùlÿÎutàu{h=}º$¼=ƒø|~‰Ý=½œ?ßËéÄápÅxã­·i™3‡»wãq{Èçsø|~TUåTk+ç;:K™øúhk;C6›Åawð»—_A‘eb±N§—Ë…ßçcùÒ¥ÌlžÁ«¯¿Áüys) ®w7YXX\Aàô™3lÜô ^¯‡X,Ž×ëå£óêëoPS]¦iüèg?£§·—p8„(ŠôôôÐÓÛG.—ÃãñçÏwpôØq¶íØI]m 3¦O¿è~Ñh”ÖÓ§‰ÅbØ…¾þ~¯wÂ…G±œâ9ígÏqöìYE!•NÓÛ×OÿÀÙl—ˉ Šæ±þ~ìv©TŠüÑÌv…BfdÓQBIÓ4Þÿð#^}ý ª««ðy}¥HªŸË ~ùRær9:HEE%sf·Œù»aTVV2{ÖL^~íujkjK¡(Ÿ8Áoÿ2·›D"Á3O?Ŭ™3oõ®ëì?xy--$I:::Ù½g/o¾ýß~îYvíÙÃÌæf>úøcBÁ ÉTŠÊŠ þ·?ûSNž:…MQ˜>m*ÑH”#ÇŽ±cç..œÏ²%KøpãÇ$“I²¹O<ö(¿ýÝï)++£¶¦†ûL6Ãþƒ‡8tä([·oç_ÿÅŸSS] @Ww7n·§ôQZXX|=®înö}¶Ÿö³gyðþ œ<ÕJÛ™3lÞº•¹--´µa``€ºÚÜn/¾ôM ðìÓOa`ð»—_¡ºªŠžžÞ ÷d2Å?ýø'¨šFuU«V,ç׿}‰o?û ~Ÿýôg|ëÙoòêëoWUª*+ñ?ࣲ¢bÌX=ºœªÊJú9tøŸnÞB8bõ*ƒã'N²k÷fÍl&›ËQYQÁ?&‰ K>ŸŸÕ«VrºÐ®êª*ªkª‘FiGsù<ÇNœ íÌ>ݼ…ªŠJœNÇ !7¾nLºA]Œ[?sæ,';‹u·­% ñÚ›o¢if’ˆ›>aάYüÅŸþ+¦M›ÊGoB/ìû\OA`hx˜žÞ^æ¶ÌÁÀ`Åòeüù¿ú¦M™ÂÖ­ÛÈd³äÕ<6›Çy˜o>ù$]¤Ói9Jsó ìvUUUüÁ·¿Å·Ÿ{–í;v°tñbjkj8{ö]]ÝhšŽ×ãaîœÙ(Š ÛÃSO<Ƴß|ŠÞ¾>’É$§Z[ùý+¯ñàý÷YÙ¨,,¾æ†AóŒéüË?þcæÏ›Go_kV­dþ¼¹üÑþ«V,gÞ¼¹<ôÀÜ{÷ݨªJeEú'ßgõʼûÁ|ôñ&–/]ÊŸ~ÿ_²`Á¼‹Òˆ›UÕ°)6fÏšISSMìÚ³—#ÇŽSV  ’WUlŠ9³gáóú.YNËìÙ‚Àæ­[yôáoðgò}/\ˆ¦iÌŸ×RH$ —Ë’Íf¹mÍjþÍÿöŒDFÈd2,\0Ÿ‡x€ûï»IÇl¸œNÖ®^Íüysùô]‚Á«­Ðâb&ü²,3oÞ|ÖÝ~GAµt1FÁÀí©Çãø‰“9vQ‘$‰l.G6—#—3…è²_süø <õuuc²ì¥³„¢1ŠaÆš¶ÙlØí6DIb$áÌ™vÌ›XØŸÏår¤R)ö}¶Ÿ÷>ø`0ˆÝn§¼¬ŒïýÑâp8øÁBÿ@?¢(˜¨¥©Êàä©Vþñ‡?bÁüy,˜?ÿ†˜ YXX\C Y’‘$»Í†a€¬˜Ù;Ó©`&ºI¥Rär9ÀL(f³™c‘X–©tšl.K>¯bÉf‰ÅãÄãq≲,óü·žcfó ~ö‹_rêÔ)V¯\É‘£GÙ¸iK/ÂçóñüsÎ9qò$ÙK•ó œ8q²` 2Sê``·; õD Lû.YQPAÌÌ­¢hfõ+dŒî‹ÇÉf³fÓœÙÖXxí˜PÕoMMLŸ6ôêŸ`Ö%Š"n·A¨©©æá‡ä?ü»ƒû_z‰¿ý‡D–$žyú©Rf»ë‰ªªì?x–Ù³‘$ ‡ÝÁÉS­ü÷¿ù[Òé4øüó¼ýî»Øì6Ü.¢$!›Ó§Ûd‰Æ†z¢±8¹|ŽŸÿòWD£1î¸ýv¡[3Û9ÙÚŠÓ餷¯»wÇ©…q8¸Ýn$QBEdϾ}ˆ¢ˆÓéäŽÛoãà¡ÃD"~n·›úº:dY¦§·ùsç1‰ðö»ïF ø}xoà¿]ãÓÓJ’Jà6N¿ØRi±)Š‚,ËŸêEßT!S ž›ó=µôîæ¥zs¥[èÚÓëkêó\yßlnþýßüy* À±'9ñ"ÿé?ü-Zæ¶üÍ|ŒŽñÿãW|ë¹g(Y¶lNŸw+» ]ê|ŸÏÇûû`Ó†õÜï½sŸ§(³¶nŸ«Ÿ[þ/ÔœºùÆ|V}çŨŒéKUæÊã|»y£žÛ=÷Võ³ëI ÜYæúýÏçOss²1…†¢º©£õY}ÇTfóÆ defÎëƒn×î|éEAR©xø¡IJH\Øþçð£‚/ŽG‚%LjJ ©))_8 *ŠBTd$lyèŽçY%I¬]½:x]ÁÒB~@ XÂ|™ó«\]%þÒåö6š@ð@~@ î"Dàà.Bþ/‘[)\ @°ØÌ;¹Ïív5ž\¶ñ׳/fí?ðϽ¹Ü²,cµÙˆ0›¿u –ó­á¿ r_'¿{«r‰5ü_ sÊòJ’DSS#íí$Ä'ÌZÃ.IV›ÿúÿ>¿Ÿìì,dYæÏo½¤R‘ØÉi)>ˆ’$a±Œòæ;ïÐÒÒJgWy¹¹H’„,Ëœ;EQˆŒˆ˜³ÿѾOè 3#I’¨ohàÐá#øý2o¾ó'Oaxd„ü¼\4ͼÖŸ<„Ûí&>>nIÖ•@ ør‘$‰–ÖVNŸ9KnNvp_§ÓÉØØØäV¾`±Xe½^·’åw¨ßérrþüY**¯ãóùf÷x<Ô76ðç·Þ¦­­ €–ÖVFGGp8] Œàr¹–\Pkim¥§·—ñq+57nÐÞÑÝnì8å÷ã÷û±Ùì ÓÝÓ3)”‡“KW®` 5áõzéé饱©‰Ææf23Òù‹Ÿþ„ž{† /Ò×?ÀØØÝ==X­¶ ìäÀà`ðᯪª¦æÆ ÚÚÛƒ£à›Íààç/^¢µ­þþü~?/_á•WÿÈàÐv»×ÿüGŽŸÀj³áõz±ZmŒŒŒ011ô§ãV+mííÔܸÁðÈðœ×šîs<^/V› EQP»ÝŽßïÇ{“_º•©4cccôôöât:q¹\Œ[±X,¸=d¿?ÄÇDZXðù|¸\®OËeíïEù´‡ðùü‹}«¾±Ì;Ô/IŽ Î_8‡Éd"?¯`fE!%9…ÄÄÞÛõ¿øÙO'Õ—Ôôôôòö{ïát:1 |ëÙgINNZÃ7Š¢„zŠ ñùü?u ǃF­æÅo¿@Cc#>Ÿ×Þø3jïå6€IDAT»ÝNIq1ßýηiim ==-(12:Š)44 À£VsêôbbbÐé´üé­·F’$^úÎ œ8ušîîbb¢yö©§e™'Oq£®£ÁÀ/ñ˜L¦%QOàÎ ©T4·´ðö{ï3>nå©'çô™3\ºrNËò²2Î_¼@Uu5( I‰‰ìÚ½“)xé……?¿ý6*I¢®¾>¸YÎtÜn7zëmzzz‰‹‹ážM›ÙûñǼøÂ· åÕ?¾ÎSO>Á‰S§¦ù¥ÄÅÅÍðAÓíÄÄDóÜÓOÓÕÝ͇ïC«ÕðÀý÷ÓÓÓÃÅË—‰‹Ã`0Ï¥+WéëëÃçó‘——GA~>ç.Ê%ûý<¾cûŒíÓN''Nâêµëh4j¾÷Ò‹Äß”Á—Ãü“û•JMBB11±³pؾu+^Ÿ‡ (à—ý|rð üü§?Áh4²ÿС%só¬V+”,+F6¬[Çßþõ_Æñ“§±X°Ûí8œvlÛÊÓO>IUu5.—‹ªšZ²³2ééí¥©©™¿øÙOyfçÎà°ÕÅË—9ñßùÖóÄÅÆrß=›Ù°n-½}½\¹zæ–bccØ´aaa&Tj[z€ŸýøGô284´ØÕ#î0Š¢“Å_ýüçdgeÒÚÖÆ¦ (+)áGßÿë×­¥´¤„ncëÃ[˜pL ÑjøÉ@Fz:îÛÇþƒÉÊÌàoþú—,/+CQföÔ%IÂívÓÔÜLll Ö­'#=pS—._¡¡±E‘1™Biljžæ—´³yãÔj5ûàÞ{6ñïþê/YQ^†Ín'%9™~ï»èõ:ÆÆÆ¢¬¬”Ÿüè‡Ü¨«Ããñ°¼¬ŒncÛ#ÏÚ>Ýh0°y²~üõdâÆ7ù¿$‘••ÅC>LLtÌœIE!<<Œçž~Š3gÏÒÜè;¢"#‰Œˆ ""‡Ã±$n $I446¡ÕjÉÊÌD–4Z F£ÐÐPìvûd€tfÄdþ5 ãV+ ,/+Çåt¡Ö¨  C§Ó•ŽEaǶ­de»öì¥pFƒ^¯ç'?üƒW_{öŽÔj5a&S@Ñ0$dÎW*à›GHH&S(ááaȲBˆ!µZÁhD¯×£Óé‚ÿ@Âd2‘@Jr2cããX­VÂÃÂ1 A;Y–ñO¾ªôù|˜L&~ú£}NwOëׯ¥¢ªŠã'N±¼¼ŒØ˜~ú£™~ia;oÐØÜ„Óé$22“É„^¯G’$"##‰ŠŠB«Õ"I V«‰ŠŒ"5%£ÑˆÛíF§”I¯×£(Jð:~¿EƒµZÑhœ5·Lðå1ïPJr éiéDFDδ%@¥ L.ÉÍÉáÞ{6óÊïÿ€V«åÞ͛ٵgÝ== ŒðÌS;Q©T‹üý~?UUäåæ¶$QS[Ë˯üŽ–ÖV¾ó·8tøHpBÊT~U*ø|>ÒÓÓ@Q8pø0¿þí¿át:ñM*÷õõõ%uN–ÑQR’“‘$V«• —.áñxðù|ø|>T’ ¦©.­¹àËGbš:ßäo>!>«ÍÊëþ3ÏìÜIFz:ÇNž ¾úkhhäõ?¿Iss oy•¤âƒ½Ò?ÐOcs3ËŠ 9zü8UÕ5¨T*ôúÖ®^E}ccÐçx½^ òòpº\tvuóÓÿѱ1Î_¼4-£ÇOPU]=§¯×‹Ñ`dÅòrÞ~÷=***YµrÅMó¸$$I…ÇãáØñÔ74 ’T”•3b±L–+”ô´4>Ú÷ ²¬ (2ËËËINJü´ž|’(Ñë¿#Ì+Ë+!4ÿ² ¯×KGg')))„èõ¸\.ZÚÚHNJ"Âl¦³«›¡áÀÌÎ䤤Å.gà’ÃÁ^{‡|€ü¼<ééíÅ>a'9)‰Œôtºº» Åjµ’˜€¢(ô ÒÔÜÌøø8Ï=ó4CÃÃ455£Ó鈊Š"3#p®J¥"%9¿ßO}C## Q‘‘DGG184ÄððÉI‰ädgÓÛׇ)ÔDxx]$%&`0»ªÁÄjµ2b%=-•¡¡adE&>>ž¶¶6'y¹¹ø|^šZZˆŽŠ¢¥µÝ{÷²õ‘‡ÉHK ®Bjjnfhx“ÉDZJ*cãc !I QkHKK¥¯¿šÏÉA£QóÊ«Àn·ó7ýK<uõ |ê—:»º´“›“ƒÏ磾¡«ÕFnnÎdï%ЀéLXüÃk¯Nyi …ùÄÇÇa·Ûiji!*2Šð°0š}ŠBBB<©))´wtLÖCμ³ÿ s+YÞyÿ퇹׵ϵ¾±Q§ÓIHH*•jV…,¤E=µ:aªG¿Ð¹·³®öVZÜà›É|¿ûùüé±'8ñÿùû[4jÍZ·o³ÛùÇÿù+¶oÛÊê•+oé»çb¡4SÇü~?ÿõïþžM7pÿ=÷|>ÛŠ‚ð†Ÿ[þ/¤Îw;ZÒK I’f¬+óåûæ–çíœ{«:ø"ÚÚàëÉ|¿û¹>K’DRb"å¥% |1Ÿ15ꙕ™InNμv>˦A [^VFB|üŒ¿}QÛ‚/!Ë+KEQ(Èϧ ?ÿ DEQˆ‰Žæ…çŸC£VßÑ«R©Øñè¶àuK ø` óeN•Jõ• ´ˆ€¿të%@ ¸‹_ ‚»ø@ ¸‹_ ‚»ˆy¿ßï›W©iŠ[É4.eæ’¹¼2|–2~]êB |uÌçC>¯¿Xj~÷‹æg)•å›Êœ_’$Ú;Úih¬g¾ã~û»ßs­¢"¨eÿÉþ457/é'I6»=~Ä¡#G9{îüŒ3ªkj阷 gÎãòÕ«·lXm6Ž?ŽÃáXÒõ!¾:$I¢»§‡ÓgÎâŸÜêÀçóáp8‚é\.^¯÷–öEáØ‰ÔÞ¨[~F’$ZZ[iimóø­Êus=î óöø­V+'O§±©aÎeN—“ýñÛßýžÁÁ€ªÜ…Ë—ééí¤Ïç»­Ýš¾jÚÛ;¸|õ*ÍÍ-\­¨Àj³G7zûz±Z­È²Œ×ëÅátÏóx<9v—Ëâ©ïTãÇív#Ë2ããVö8ÈàÐ0vûÄbY ,ººº9|ì8£cc8œN$I¢º¦–7Þ|·ÛÏçã½vsñÒeü²Œ¢(Ȳ<ßNíŽ7>>Î¥+Whïè˜÷zïä¹ÓGqåIÛÁ4·hhLO3u}§Ó´#Ë2^Ÿ/°5ùÈHP„ÇçóÓËåŸ{4¹º6P.·[,¼ƒÌ»Ž_’$,£Nœ<>©f—ÅŒû (¤¥¦f2±kϾÿݗШըTjÆÆÆØóáGô’Ïã;¶¹$n¤¢(TTUQŸZ­æ£}û%!>ž§w>Ɉe“ÉÄ'âv»·ZÙ¸~=Û·m¥½£ÇC~n.²ŸªêjÂÂÂxfç“ IìÚ½«ÍÆŠò2–Ñ××ÏïÿøGdYaû¶Gظ~ý’¨@°ˆHuõõüúåß‚;Ÿxœ?ÙÏå«W™˜°S^ZÊÇŸìÇd Å2:JfF:FQL&Ï>ýŠ,óÎû»¥®¾òÒ²Y—ñù|ì?xêÚÄDGsïæÍ;q‚§w>‰!$„wßßÅÃ[¢²ªŠªšZ¢"#yö©ÄÄÄÌðSÓíDEFòÜÓO16>Ξ?ÂårñÐ0:6ÆõŠ $ÄÇóÞ®èêéÁåt²jÅ âããùxß'˜ÂL ŒðØöGƒÒ¼’$1ápðáÇû¸zí:V›•ï~çÛÄÇÅ ŸyXprŸ„”ˆ¼¹î@§ÓòÔ“OÐÕÝ2W™}26>ÎSO<ÁàÐPð¡] 8œNšš›)-^†J¥båòåüô‡?dllŒ§NÑÖÞÎàÐí¬Y½Šû﹇§Náñx¨©­%%9™Ë(ûöï§  €žÞ^;NSS3U55¬[³†¼Ü\ÀÎóÏžë×Í »ÙÎÆ ëQ©T|°g/™|ÿ»/QŸOo_Š¢ðØöí8Nº{{hhj">.Ž­<Ì‘ã'p¹]ʵiã Ù]EQ0„„°ry ž}j'‘K&n|Ó˜7ð+ŠBBB"[z˜”äÔ9ÓȲB\\,O>þŸ8@wO²,ÓßßO^n.y¹9dggÑ×ß¿$n $I´´´¢È)aY– '11””z{û‚ÃhCi©©¤¦¦¢R©±ÚlÔÖÕ±¼¼œÑ±1¬6;]]]ÄÄĘÀŠåå<ºu+ÇNœäÔ™³ø¼^Œ¡FIJLD–å[N–ß|Àl6“”˜@|\>¿ŸˆˆL&©))DN~މ%** I’ˆ‰‰¡¨°åååtvuÑÝÓCVV‰ „™LAÛÓ'ÖE˜Í|ï¥çýÝ»±Úì¬[³š«×¯súìYÊJŠIJLä»/N¥ÙÃÐðÈ‚vvíÞCgW–ÑQŠ INJÂlG¥R‘ššBvV&F£•$¡ÑhHOKeÕŠDFF`³Ù3…KLtôŒ Ö’$¡R©ˆŒŒÀ¨­V»Ø·ê˼Cýq±q<üÐ#$'¥Ì´§‚ÙÊåË©®©åÍ·ßA«Ñ²jåJŽ;ŽÍf£æÆ ¶>¼•JµèÁ_QªªkÈÌHÇh4"Ë2õ ìùè#®WTòøcÛ9sælð}ÕÔ»+EQèíícbÂANV&^Ÿô´Tbb¢‰‰Ž!+3ƒîžÔjq±1Ô74²~íZd¿Œ"+ÈŠŒ"‚¾@ €Iÿâø9àk"##±°ç£yèþûˆæìùóÄÆ†Ý;;»8rì8/_fíšU¨T*Nœ:…Ûí¦¥­ü¼\.]¹Bss ’J…N§£¨ Ÿ¡á!22Ò8pð0CCC”•–°kï^š[Zxê‰'°Ùí Ò:Ìðð0ƒCƒóÛ9t·ÛMNv6»vïfÕÊ•äææL¾Ïø8YV'çx]¯¬bll§ÃIaA=½}rÅD“˜È™sç'}lA^æp3#–OëÁl6/zÜø&¢žú°ó©;bbbV%'%£( ááá VºZ¥"**’ŒôtBBBÈÊÈ #=‚ü<Š ˆˆ0ãt:Ù°~+ÊË}‚Ÿ$I8NŽ;ÎæMHHHÀ`ÁÊ„ÃÁÆõëXµr%æð0232HMM!=- S¨‘¸¸8zz{Ñé´lÚ°°°0ÒÓÒÂï÷“š’ŠF­¡¥­ £ÑÈöm””HLtéiiFHLLXôz‹‹N«#!!žäädBFR’“ÈÉÎ&22I‚Œôt233‘ˆŠŒÂérq½¢‚ðp%ÅÅÜ»y3Y™èõ!ŒNö¼KŠ‹™˜p0>>ŽJ­B«Ñ”˜Èèè‹…Í›6²¼¼œÐÐPÚÚÛ aû¶­È²LWw7Ëèdš2†††°³•+VŸ›‹×çellŒ¤Ä’“IMI!:* ƒÑ@rR7ê꘰OnbÛ#“•™IrR’$‰)4”îžÞ@o_’ˆŠŠ¢° Ÿè¨($ ÒÓÒD¯ÿs"Iv»çääÑYǧ>¼þÆë/çäÿlͪ5·ÝšO?z®ïK¿ßÏðÈ‘‘‘è´ÚY²Ð „ÑÑQ$I…Ù>£ì·âfm@pw3—ß\È÷;q’ /òÿöoÐjµ3${?+N—‹ÿùÏÿ†õë¸wó¦YÇogÖBi¦Žùe™ÿúßÿŽMÖsÿ½÷~nÛÂg~>$I¢¯¯‹Å2g!u¾…´¡—â S«Õ$ÄÇ/¨ =_¾###gÿ,å[Šu!‡ùüæ\~B’$""̤¤¤ÜVú…$‰±±q FE…óÚ¸» ¥ ¼ÂIKMÅ>#ýµ-ør¸ëdy?ïC%F@ðU£( 奥”•”̘ÿymÅDGñ“|ƒÑxG}šZ­æÅ¾5¹ÒKøÎ¥Æ]øàëÄ—¹%¯F£A£ùjÜþm¨îâÎ@p!¿@ w"ð @p!¿@ wóÎò¸5—7¯Oÿ:­WŸo­è­Ê°ÐúÕ…êF àË÷ KÍ×,µüf3gà—$‰îî.ÒRÓç¼.·›“§NQXP@zZ²,sõÚ5’’’HLHXìr-ˆË墲ªNGHHEù(Ôîž‚ëOo¦®¾µZÑhäze%Æ+V,'Âlž‘®¡± ³9|ƾ@02ba`pü¼ÜàÌ÷ù:O·³áMUM ‘æRSS»h ;g~*×ÙœHpûÌ;Ô?4<ÄÑcGèîéšuL’$&ìvþõß^á_þõe¬6Š¢ðѾý455Ï_XJH’DGg{?þ˜³çÏsêÌ|~p½éµŠŠb=ÓG>|>?»?üˆ†Æ&þôÖÛ´¶¶ÑÜÚÊààà¬ò~¼? Ûëóù»È`‰ IÍ--ìÞû!.—+è_¦þ6ø>9pêšÚY¾ôæ^¯—#GQs£vî­Yç8çvŽ-dgú÷©üOÿרÔDcSÓœ¶§—k¡º¥;˼Cý-ÿz9zì=¸e–X¢@rr2N—‹}Ÿìç™§v¢R©T.—‹£'NÐÙÙEFz:÷Þ³CHÈb—5HuM Y™™ F9ŒÍf#';›->€Z­ÆívóÖ;ïbµÙ·Z¹gÓFÖ­YCOo/v»‡ÃÁÅK—)+-!<,IRqáâ%®\»F„ÙÌöG·ár¹Øð×®WPŸÏ£Û¶¢ýŠÖÏ ‚¥‹¬(ܨ¯ã_þõ·FÝú»÷~ÈÅËW±XXVXÈÛヌÙlæñÛÉÎÌäÜ… 8œNb¢£ÙúðdYfßtvvQS{ƒeE…³¯#Ë\º|…«×¯Áúuk¹rí:?ô :­–CG޲nÍjÚ;:¸rízÀwmÛFdäL9Üév"Ìfv<ú(‡ý2:6ƽ›7ãt¹¨oh 2"‚ØØŽ;NwO‡ƒµ«Wc4xëÝ÷6¶oãá ŽxH’„Ãédמ½\¾r•¡áažÙ¹“˜˜hѸÜrrŸÃáÀåtÍÞ’£ÁȳO=ŵР*«k‚7ñðÑ£TTTR\Tĥ˗9vüÄb—3ˆÛí¦®¾ž’âe¨5j²3³xø¡‡¨¨ªâ̹óTVUÓÞÙÁ¹ ‰‰‰&-%…½~ŒÏ磶î±11”•–Ãò²2zz{hhläí÷ÞÃ`0““h!‘™™ÉÆ ë9|ìXpT@ Üå( a¦0¼ÿ>FÇF¹|õ*é$&ij¢¼œÔ”ÈÏ H›wvwsùêUòór©khà“9tä(]Ýl{äRR’¹96J’ĸÕÊ[ï¾ðKÙÙFꨨ¬¢³«‹«×¯ãt¹xëÝi¾K­ZØNN6²ìçýÝ»ñx½Ü»y3 ññÔ74ÐÜÒBQA]ÝÝÔ76rîÂ&&&HMIáí÷ÞÇjµ‘”˜(WNî¬yV:­–Œ´4âY¹|9£Aý;ļ_Q"""xàþÉÌÌš3,Ëdf¤³åÁù`÷†GFðùü446±rÅ 6oÚHYY)õKâ†ù;qº\æç£È2‰‰ ”•–P˜Ÿ?cxÊd ¥¼´”ò²2dEÆf³SSSKYi)‰ ñDFD—›KtTaaa<ºu+==½\ºr—Ë…F£&?7—Ò’L¡¡8ŽÅ.¾@ X(@||¥%Ådedàv»IMI&..Ž•+–“ššB|\,ùyydfd IIIIÜï½ÜÏ=T×Ör£®žåå”–;iuæ.áaalß¶žž^.^¹‚F­fõÊ•\¹z•ó.RTX@Jrò ßåv¹´såê5†GFèêîæ¾{6³¼¼ŒÄÄT*ùù¬[»³9•$¡Ñh(^VÄcÛ%"ÂÌØø8 ñqäçå‘•è M{ ÑhHMM%>.ŽU+Wj4.ö­úÆ2oà7›#xàþ‡ÈÏ+˜·§ê÷4¥ï»g3ÑÑQT×Ô ÕjÈÏËãʵkœ<}†ªªj–.™ÞnuM-)ÉɘÍfü~?]Ý\ºr…ªšr²³QY–ñûýȲ<ù]aphË(ùy¹“ÚÓ~dÙ_–q8DGG±aý:***ikkGžL£Èò¤Åoø‚ÅG‘• ï”'ýÑhddÄ™s瘘˜ 44”ʪ*šš›Q…‘ µuu\½~Âü|òrs¸pé—¯^¥§§YVhljæÄ©Óœ<}†sç/ÐÛÛôK×+*iimcÕÊttuqæÜyV¯\‰Ûí&:êSßÕÚÖNSóüv®]¯```ø¸8=FUu ƒƒAŸ à÷|ætÿj³ÙÈHOÇh4RYUEcSÃ##œ>s–S§ÏpòôiZZ[1B‚õ`Ÿ˜Xì[õE=õaçS;wÄÄĬJNJFQÌf31Ñ1sž$I²,ãóùÈÏËÅd2‘žš†^§£´¤˜ò²2Ü.7­mm””sßæÍ_ÙþÐó!IN§“ö}ÂúµkIMMÁíñb³YikogYa!÷ßw/~¿Ÿ´”ÂÂÂÈÍÉ!$$µJňłÇãáÁûïC¼/¹99¨Õjâãâ¨oh¤©©‰åeelX·Y–IMI!&&&˜Öº¨u I’ðù¼èõzrsrðy½DGGQ\T„Çëaxx˜¼œ’“’èîé%ÔhDVdNž>Õj#1!íÛ¶’—›ÃðÈ ×e¥tw÷PY]ÍÀÀ# ±±1ܨo ©©‰ò²26¬_G„ÙLSS3~¿Ÿ§w>‰ÛíæÜ…‹457³¼¬ŒõëÖr£®nA;÷lÚHNN6­mm457C„ÙLll )ÉÉÆDtÍ-­´¶¶a³ÙxàÞ{)+-!&:šîž^ŒF#!z='OŸ¥¯¿ŸÞþ~ %ÅÅø|^†‡‡ÉÍÎÁ`X:sþNH’„ÝnÇétÎ=‘rêÃëo¼þr~AþÏÖ¬ZsÛ½ÓéÊK7¿¯YŠšÊ^¯–ÖVÒRS0³´°Ú» «» iò}Ú\é|~?õÌÎÍšÛàîæf¿³Ðg€ã'OrîÂEþæ—…ñ¦áïÛÙoÅç÷ý’Çëå×ÿú2ùùl{äáàùÓÓÜŽ)dYž!Æ3eÏï÷óÿý?°níî¿÷^T*ÕmåUøË/‡Àäü>,Ëœuþ…ºá iC/Å›¦Õj(,Èæo®üÏ—ïÔ›ô°çJ§V©?·¾µ@ ¸;˜ÏoÎõY’$ôz=æðp´Zí¬ts}¿™)¿$I– ö‰ JKŠgœ?ŸïšËÎtæ’Ýò­ááá †`п¼ÞnÁã®[_öy*ñ0 ‚¯EQX¹|9¥ÅŨ5š/䇯pÃùÉ@lLÌõijµšï÷%tZ­ðK».ð Á× N‡^¯ÿRhHHÃW³L.ÌdA‰"Dz`‰óeЯ*‹ ¿t_ ‚»ø@ ¸‹_ ‚»ˆÿ­Ö\Χöôu`>EªÏªRu»u3_@pwñeûÉ¥æw—Z~³™3ðK’ÄÐÐ ÃÃCóÞ@¯×KuMmpƒEQhkogtll±ËtK¦6òiïè ··oƱ±±1œNç¼çöõ÷ÓÞÑAsK+^¯wÞtýŒ[­s ìÞå ØðùÄD ¸‹°Û'èíëŸ1ùíóv¢E¡«»›‘‘‘Å.V›Í†Íf›óØív¬w–y{ü==Ý;~‹edÎ^±Õfãÿúÿxùw¿Ãåv#Ë2o¼ùÕ55·­ñ¼H’DwO¯¾ö:~ü û æS–eŽ8IK[Ûœee™·ß}CGŽòÊ«¯2666¯¦õûìæÚõŠ9Ð}}ý|°w/¿ú—_³ëƒÝ´wt,¹z_>’$QßÐÀ›ï¼ƒo²Ñ/IÝÝ=œ8u:øýÜù ´´¶Îë_¦lÂ{örùêÕy5î:¡ã ÙYèük×+¸VQ1ç±s>-×\׸¹w†ù×ñK-­-¨ÔG¹ÿÞˆŽŽ™µ³TtL4Í-­œ8yŠ->€"+ äõŠJ:»»HOK l>¡VßN~¾êêë‰#ÒlæüÅ‹¨5jòsóX±|9QQ‘hÔjNž:ÍØø8V›ukV“›“ÃÐð0ƒCCl_¹’Ʀ&ü“:Õ&S(Z­ŽŠª*ÂL&6mXÕjãä©Ó´µµQXXÈšU+ƒ[[úe?§ÏœåüÅKŒŽ²¼¼l±«D |Ex½^êêëyãÍ·ˆ0›Ù´qîÛð££defòÚŸþLll ;ÝFZj*uõ Øl6âbcYµr%Š"sþâEZZÛ¨­«#?/wÎk557SQUExX8%ÅËhnieÕÊhÔj®^¿N~^###“¾+ŒÖÏ©)2e'ÌƦ 8wáÃÃì\¹Ùï§««Ï‹!$„ˆˆ*«ªèÄétR^V H¼öF \Û·meͪU3¶ûu¹Ýìýøc.\ºŒÅbáûîÃl_ìÛõdÁwüŠ"Ó××ËàÐàœÛ2šÃÍì|üqŽ?NKk*U •vúÌYö~ü1>¯vïáÜ…‹K¦õæõù¨ª©¡´¸­N‡Ñ`$>.žö}•kW9wá"õ¼÷Án‡†çÏo½ƒ,ËÔÞ¨Ãl6“œ”„Çãåàá#=~×Ë+¯¾ÊÐЊ¢àñxPPP©U„…‡óæ;ï04<¬—ËETTi©)$'%áöx»ZÁW…$áóù‰‹‹åòÕ«œ=w­V‹Z¥B§Ó¡V«Q©Uh5Zô: M¼ÿÁ8]N>þd?ÇOžääéÓœ8yŠ”ä$Bôzn^2/IããVþí÷¯244Œ¢Èx<=FMm-Ý=½ìûä‹…W^ýÃŒ47 Ì´£àr»ØóÑGTVUJRqþâ%ö:„ßç§²ºšÊªj>Ú÷ ×++æ•WÿÈÀÀjµ­FÜ~x:*IB£ÖLÖƒvÉÄŒo"ó~EQ0BY¿n#¹9yó¤‘)-)fõÊ•¼»kvû^Ÿ+×®±nÍž}ú)V¬XÎå+W‘ey±ËŠ$Iôöö2>>β¢BY!//—mãùgžáá-qîü.^¾Â†õëyd˲23O÷öŸ ˜C¥ÅÅ 2nµEyi —._áêµkdee’œ”DÉd«ÍTQÏŽÍnÇáppãFïx”G·>BnN6*•Šò²RžxlÑ‘Q0ÙñY»f5?úþ÷ ÑcµYÉÎÊbÝÚ5¬Z±•J5ã5€N§cÙ²"²23Ù¾m›èíßAæê7 lܰ‰åå+f ÇLÇï÷#In}„ÚºÁõÊJ¶?º•Ä„›ÈÎʤ¥¥•´´Ô%Óz«½QGlL 1ÑÑøý~FF,ttvÒÚÚJ^n.V›- —-Ë3+# ½}ý<ùØcÈŠLll,…ù9vœÄ„Ö¯[KZZ|ý ÒSSõ#Ë(²ÐÝ–®]¯ &&š´ÔTxòñÇÑjÅ®ÉÁÝ„¢(“šõ2  Ë2Z­–±ñqIOKC£QÓÞÑÁÀ@`´Õét2<FrRñqqôöõQXÏ™sçÑëõA¥?µZl£ ÜMH’„ÍfÃårQZRÂȈ…ÐÐPÊKKèî页­Â‚¢"#¸výzà€ZÅþƒ‡éêêF¥’xê‰'ÈÏË£¦¶–«×®¡(P^VJCC#¦æÆ ššZˆˆ0sîÂEjjk~iÓFâbc©ª©Á>açÛÏ?‡ÃáäãO>¡v*ÍÆ\¸|‰ƒ‡Ìm'-î¿ô´4Î]¸ÈõÊJ"ÂÍh4jÂÃÂÈÎÊbpp“)”ή.*«ªioogÅòålܰ£Ñ(—F‹Z£æ÷vQ]SCÕä¤ðÒâbzûúhmk#??o– ±àö$ »ÝŽÓéœ{"åÔ‡×ßxýåü‚üŸ­Yµæ¶‡§k'OÍŠP©TȲŒßïG£ÑÌ)ݸ¸=._¹Ê²¢B¢""•@kÛãõ¢×ó=½ò¦ÊYßЀ¬(e'§ŽûeÙïÇívc0Ðh4A;SeŸª1[U ¸»™.¹;õyÊ÷Ȳìlùe•$qòôΜ;Ç_üô'˜Íf´“Ãñ~¿ǃV« ž?ÝϪÕj|>ß ¿ä÷ûyù•ß“ÇÓ;ŸDQ¼^ïŒ4>Ÿï–v 0IÑëõ¢×ëgÄE¿ßÇßýÓÿ`yy÷nÚ4#€ûei2­ßïþ]¥R%|§×ƒà³X=Ö\n3_hœyºÁépêóÔ²‚>€^§cóÆ ((( “CYj “Øô2Ü\΢ÂÂe™žN­R¡V©fèeÏ^vü¯LÁÝÃ\¾aÊgLvêÉwà*Uàýwxx8ÚiÒ¼*•Ši#©sJ­væDºÀe/ÛyxÎ4Š¢ÜÒÎÔõ5MÐÇÏ,ß§¾Õh4:³!1ÍÎ}¾$‚þæ®{Áüy!K¥ñ"îE¡¼¬Œœìl4jõòC Û!¼øÂ ¤¤$ßQŸ¦R©xéÛ/`Ò¼K’».ð Á× sx8æðð/%€šL& òïx0–$‰ä¤$@tš–""ð ÁæËœ_U é"^: @p!¿@ w"ð @pq‹Àûò‰_·õéó©Qݪ_¤œ7/œ¾†u:Ó×Ñ.U•C@p÷!|Ñ7ƒ9@˜a»Ý6ïMg||<¸ …ÅbÁáp,vyn Y–±XFÃz“n´Ûã™7 Ølöyµ¦çÃãñàõz±ŒŽ¥8{z{yo×3vV’$ ‡ÃÁ®Ý{ lÕÙÓÓË¥ËWhnmÅçó-vÕ ‚Eb1ƒîÔfA6› »Ý¾äò'ølÌÛãïèlçôÙ“L8&f÷Š%‰+×®ó«_ÿ›ÍFo_ÿó_~MWw÷-5›I’èà׿ý-o¿û~¼/˜7Y–9xøMÍÍsæ[QÞz÷]Μ;¿ –õôïS6¯WVòò¿½BOo'NfÜj±4&Μ=‡ßïçâåËœ8uŠýí+?yr±«O | ÜÊwÜœÆï÷SYUÍfŸóø|6ò¹·ëÃ$I¢©¹™ÃGñáÇû8täèœ1Áápp½¢2¨á"XºÌ¹W?@oo.žÇãv“Ÿ€N§ ž$Iq±1\¾r•¾¾~®WT’œœÌ=›6ÑÕÕMUM5~¿ŸÈˆ\n77êêhimC¯×:‡ÖóW‰$I\¹r•¡¡!Ìáfjëë`r Þ³‹e”ðp3ƒCC´u´ÓÔÔŒÑhÄd ettŒ}°vÍj†‡Ghljfphññqjjo Óé £©¹…ÊêjÆÆÇ‰Œˆ`ÜjÅh4r½¢’ååeh4Þß½›Gz§Ë‰×ã!$$„ú†FB !˜L¡<|”5«WQ²l›6l`tt”Ö¶6Ö¬^Jü¨‚¯->Ÿæ–êëPPp8ŒŽa63>>No_¦ÐÐ`$èäýæ_ñxýH’DIñ²Yå:á"¿ûÃ1BˆŠŒÄ`0,vUßµÜj¯þyÿ@? õŒ[‰ŽŽ!66nƉz½žÄÄ^ýãëhµZ~ø½ïÒßßÏ^§ÓÅé³gIKMãÒåK|ôÉ~$IB¯Ó’’œ¼¨"Ë2{?ú˜âeËðùýÔÕ×f ãèñãÄÇÇqâÔ)Þyï=FGGiim¥¦®Ž ëÖq½²‚îž^J‹‹ù‡ÿù+Ôj5¡£³“‹…‹—.³rÅ .^ºDGg'ÇNœ@«Õrùê545½½ý¬Z¾œÑ±1.]¹Âöm[¹^QÉþC‡·rôØqV”—ÆþC‡)+)!66†uu:zŒ->@Ú¤òŸ@ øú!I×**xõµ×A’Pd™±ñqö~ô1kV­âèñÔÔÞ@B ¦‘ý2N§‹ã'O¢V«IOK££³“=~„ÍnçÂ¥KäåñÇ×ÿDCc#Ý==ì?x½^ÇÁCGHNN"1!aF>dYæ×/ÿ–Ʀ¦YéSSRp8\ºr…ºújnÜ@RI\»v½^^§›;ð_¼È¥+W0dff¹ØÕ}×r«À?ïP¿¢(hµ:JKÊÈÊÌžóxfFùùy¬\±sx8W®]§££ŸÏGgW-­­„™ÂPIƒ¤¤¤EÝÔA’$††‡ Ší¬\¾œ}ÿ{äçsîü¼>~ÙÑhäñ;xêÉ'ÂápP]SKa~>:Ž˜èh^xþ9Š (ÌÏçÙ§v2::ŠËå"//—³¯×K}C#>¯EVÂ* §Ó‰Z¥ÂÎ#[B¥Rñ‡×_gçƒF£!$DÇëÁív³çÃØ¸a=kV¯›b_sBBBÐét¨$©©)”ãp8¨­«ãF]+——c4g¤Y^VJnNÏ=ý4e%%œ9wž‹¯×K]]=ƒChµî¿÷ß±³™çžy†”ä$zzz€Ù¯4jõœé;»»HLH %9ƒ!„¦æfÆÇÆgÝlO’$Ö¬^MNv6ß}ñ;dfd_µ„™7ðkµZV._ÉÆ ›æ²‘$ VT‹ÒëtDGGQVZÂÏ~ô#ÊJJ(--á…瞣®¾÷v}0Cýn1¸QW‡9<œ¤¤Dd¿ŒÃédÜjett4PÎÉaÈæª5jT*££c´wtPZRxð% Õ¤‘JP•R©ÕŒŒŒðç·Þ&Ä÷•edE ¼>ccㄆQ©T8&&¸\.ŒÆÐà„>Ÿ×‡„„!Ä€¢(,+Zƺ5«…È@ð5GQÒSÓøÁw¿‹Óåâ÷|½žâ¢"Þy‡œìlÒRS‚i^}íuÜn7 022‚Óé$DBbBv §ÓI~nz½žÕ«VòÞ»yþÙg ãò•«Á4y¹¹„‡‡³¼¼ŒOÄ`0°õá‡xû½÷9~êI‰‰ädg!$­VGTT*•г“)”ÊʪÀDf• I‚G¶<xSz³ÙL¨)£ÑHuM-7êꉋÅd2AfF{>üˆäÄSÔÖÝÀj³¡È ¹9Ùlß¶•ììlÞ~ï=^|ár²³D¯‰üý×_Î/ÈÿÙšUk‚‘·sÓœN'jµN‡$Óébll­N‹9<׋ÅbA§ Œ,–Ü¢8].ö<ĺµkHJLÄåvãt8pº\˜ÃÃ1Áòø|>ôz=XâW]]ƒÇëåžMñù|¸ÜnŒn·Õd‹Ùéta4p8œŒŽb2™ A‘e4-n‡ÃALt4û ½½ƒï¾øŒZ­»ÝŽJ­æ7/ÿ–ÌÌ žÙ¹¿ßÏÄÄF£QHU ßÜ– 1ÑÑèõz†‡‡ùoÿüìÇ?$/7—Û=+ÇëeÂnÇ`0 ×뙘˜Àjµa0 ÃívF U*Ün7ƒ—ÛZ­Fžô#S.?4Ôˆ¢(ó¦W«T  ¡Qk0†ѨÕȲŒF«Åb±j4âõúåÀÒg­VKXX§ÓI¨É |õH’D__‹en©ù©7þ/zQ˜­]¿ZSš›ó Ó³'I¿O-Ë»ù¼›Ë3õ·›7ê™}-âÚõ î»gs q0yžÃáàØ‰“¬]³šØ˜˜ÏÔ_¦ûDI’8vâ$—._áoÿÝ_£Õjf¥™~ÞÍ~õæ4pìÊ<×ü¢éçòsÓÓµøÜ*ðß‘&ÙÍ7})=ó=¬³Ë03Ííœ7õ·ùm~ú÷ؘÙòЬó Û·m üoaO |=™þ›V…¸¸Xß±N»àïþæó测k~‘ôŸÅÏ –&b,f‰"~:ÁÝòÂBÑS|eˆiâ@°A_ðU!¿@ w"ð @p!¿@ w"ð @p1oàw:x<žyåEÁãñ̘âóù}KÞÛÅëõáóùðûý³Êµ~¿ŸÏ·°mŸoA;²,mêI |¹(Š2ËïÜ,¡ûYdÌ—šßU¦m{~3·+,¸³Ìø%I¢µ­…K—/Îü%IÂjµò¿ÿ—ÿ'~¼¿,ó‡×^§¢ªê¶õ ƒ)¡ž—_y…·Þyö}̧,Ë?y’–ÖÖy˰kÏ^Nž>3¯–µÛíæ_û ­mmó¦9{îúúûÙµgùy¹äåæÒÓ×G¾ÍÀØø8V«s¸™ðð°Å.ç š›[·Z1ŒÔÖÕ‘—›CB|æÉ­‡U ãt:qº\¤$%a4±ÛíTUWóäã100ˆÍnC§Ó¡×ë#1)ZMWw7.—‹‰‰ N'áaaAž„„ºzzèêî&1!ÈÈ’Ń.Ü%X,®\»F~^fs8)ÉÉœ9wŽsç/ðÃï}ðð0^{ãϤ§§±åÁ0…†b³Ûq»Ý„A¹ÛÁÁAú¨«¯'2"bÖu$`bb‚Á¡!t:‘‘‘LLL‰$IX,£„…™ðz}  ¢Óꈋ‹EsÓV»3ìhuÄÅÇ¡V©èÀf³$I8¼>²"£×êÇátâóùˆ‰Áëóñ‡7þDFz:[x€èè¨~O–eΜ=ǹ øá÷¾KRR:­v±o×7’y¿$I¸\.._¹LDD$…E3( ÉIId¤§óÞ»ùå/þµJJ­¢µ­·ß}7 øöóÏ-™FEQ¸^YIɲe¸\.êO7ðñ'œ.ßý穨¬bÂáàØñ“„†™˜˜ '+‹Ÿüè‡457£Q«1ü¿þ¿ÿ?RSRèéí%..¿ÏOdT$ßñEÔj5ÃÃ#9~‚Œôtœ7ê뉉‰aûÖGP«TÔÔÖ¢( CCCüõ_þ‚Œôô%Q?àÎ"©T´wtpàðaxâ±Ç¸zõ:•UÕìùèCÊJJ©¨ª¢¹µ“)”˜èhÞy±11¸œ.^üö (ŠÌ›ï¼K˜ÉDk[›6¬Ÿu‡ÓÉïÿøcããÄÇűyãÞÛµ›¿óá&ÿöûWyþÙgØð£ccÄÆÄðÔ“O7ÃM·ÃS;Ÿ¤©¹…fâÞÍ›imoãÂÅˤ§¥¢R«IŒçäé3  ¢’’Âò²2*«ªiimÅh0°ãÑmAý‘©ÑÒKW®PYUÍ{öòÒ·_ ¾æŸÜ§(¨Õj2Ò3HJLž}‰->HHH²Y–ñûü<|˜´ÔT~ù—¿ !>žƒ‡,™›7:6FwOÅË ™ ëÖñ7ýK8qê46»—Ë…‚ÂÎÇãùgž¡±¹—ËEUM-9ÙÙèõz †~ð½—ÈÊÌ ;+“—¾óííLLLàt:ùýk¯cçá`xdFÃÊååÄÇÅ!+ kV­â—¿ø ÂÂÂhïè\ìj_Š¢›“Ã_ýügÒÕÝͦ(+-á'?øׯ£¼´”Ç·ogÛÃãv»1‡‡ó—?û)¥%Å|üÉ'<|„’eËø÷¿ü+–——ÏØ'êŸÏçchxsx8«V® 3#ƒøø8.]¾ÂúB "Ìf††iÖ¬Z…9<|A;kV¯F­RsøèQ¶m}˜÷WÉŠåËq»ÜäååòÓý0“ »c«Íƺµkøå_þ‚®®nÜËËËx|ûv¶oÛŠZ­žñÀh4rÏÆY÷ÿˆèèè%7¾iÌø%•Š‚üB¸ÿ!"æF‚Àjä¹§ŸâêµëÔ76 ©$ü~?ZV‹N«]2O$I¢¾¾CHééAi•J…J¥ÂëõÓjÔjŒ¡¡„††¢Ñ¨§©¹™ò²2T’„V«Å`0JHH!!!h4jdEF­VÍøø8>Ÿçžyš5«VM¾‹»ŒJ’ A¯Óa0„Ìšè#¾Ùèt:tz=F£EQÐét“ANB­V£Ñ¨ß'ƒbHHf³³ÙŒÛíÁ=©¢'MSóù|¸\.\.WPmïÇ?ø> ññüþ¯ÑÒÖÆ†õ먪®æØñ¬,/'**Šýà{4¯½FSsóÂv^{úÆ|^ZN‡F£I"ÌdÂd2òEÀ¯šBC‰ŠŒD§Ó!Ë~´M0˜Ë²¼ŽËåÂçó¡Óëf”[pg˜w¨?-5¬ÌlÂÂÂæluI“Á2ÒÓydËC¼üÊ+è´:¼ÿ~Þyï}::;q¹\|ëÙg—Ä>Ô~¿ŸŠÊ* òóÑh4¨5joÜàWÿòk‡†øÞ‹/òɨÕj´Z-Òd9uZ­mm @zzÃÃÃh&´–ê`}HH˜L&Û¾³ç/ðö{ïc2…2<<‚Z¥B§Õ¢Vk‚C\µZ¬ªî¦d¼§FUQ %9 §ËÅÞxo?ÿn娉“232x÷ž@LQX³r%99Ùzxýu¾ýÜs¢×‡˜W–÷VRº>ŸÁAbccÑiµx<úúû‰ŽŽÆd ehpˆÑ±1¢£¢ˆŽŽ^ìr%oß|ûî¿ï^²³²ehx˜‰ ññq$ÄÇ384DHHŽ QÑQ (XFG©««Ç>1Áã;¶ãöx!>.ŽÑ±14 ¡F#ƒCCÄÆÆ2<áÉÇ#59…Ô´T$ »§‹ÅBhh(ñqqØìvFGG‘$ •ZM|\###XFGIˆ‹'%%•JÅ+¯þÇÃ_þügx½^Ú;: ¤INNb``ѱ…íȲL{G6›ô´´`$‰ŠŒÄ2:Šßïç·¿û=q±±¬Z±‚¬¬L"#"p:t÷ôfÂh4ÒÙÝ J@=**’ø¸8ú‚õ “û>·’å7ðß®ñOß-}jn!MúÅDQ¼^o g>Çò•¹ò=õÝëõ"IÒŒÉ(77æÓ©žï·ÓÀß,æûýÏõàØ‰œ¿x‘ÿüþšiCåŸg%иÕÊ?þ_ñÔ“S^V¶ Ï›…®?u¾ßïç¿þÝß³iÃzî¿÷ÞÏd[øÄ/έÿ’å© ÓÅd—âM“$iƲÄ[é]Oÿ~ó—¹4©o¥S=w½-½zwŽù~ÿs}–$‰ô´´9ƒágõS3çËJKÈÎΞ×ÎíÚ/ÝÔß7®_OZjꌿݎmáï<_(ð àΡ( ÙYYdge}ဨ( 1ÑÑ<ùøc¨Tª;`U*Ü÷iO_°´_ –0_fàü*w é"¦“ @p!¿@ w"ð @p!¿@ wó~¯×‹_^x+Ùùd¿Ì'Ey;ò”_äz@0Ÿ„îôÏ·ë/$Ib)y–…ò~;å~òÎ3gà—$‰¶öVjjªçÜg_’$ìv;÷Oÿƒ3çεìßûàêê–ô“$‰±ñqþüö;ìýècŽ;>cìå«Wéîž_úðÑ£œ»pñ3•Q’$®UTpþâ¥%]7àÎ"I<|¿ßô‡ñññ`:«Õ†Óé¼¥=EQØ·ÿ׫ª–„o‘$‰ºúúyãÀ­Êus=î óöø'&&8}æ$7êjç þ.·› /ñêk¯ÑÝÓ@uM-ƒCƒ@`K_‡ÃoÚýThkk§¾¡Þ¾~*kjÂãñ`µZqº]x<&&& –ßårsúÌ9Tª€b•ÕfÃåràv» >ÔŠ¢011}bY–©¯oäÊÕ« 211±ØU ‰Þ¾~N9CÿÀcãã(ÀµŠJþðúØl6Ün7o½û.§ÏžÃíö Ë2‡ÃÜAtj3žÁA**+éíí›óZ²,c³Ûq8œøýþ ŸƒÀ¨®,ËÓÒ8æ]‚wsš)Ùö±±1¼^/>Ÿ·ÛÃáÀj³1á˜Àëõâr»q8Á]S?-—{ÎëLÕƒÕf[2ânßDæ]Ç/IV›•ÓgNBNvîÌŠBZj QQQ¼ÿÁn~ò£¢™¬â½v3::JTT$OïÜI\lì’Xש( UU€'OŸÆfµnç…瞥««FÃ{»>@öËXmVÖ¬ZÅ3Oí¤µ½ ¿ì')!‘W^ýÃ##d¤¥ñÔ“O°÷ã}Ô74€ßzîYzûz9wá"¡F#O>þ8*•Ä…K—A’$~þã“¿$êD |uH’DCc¿{õ¸=nžzò >Âå«Wñù|”—•qäØqBCC™pLžšÊ‡ïC«Õ¢Óéùö·žC–eÞzç]œN'7êëY¹bŬëx<^>Ø»‡¦æbc¢¹wó=ì?tˆž{£ÁÀo¾ÅŽGåâåK465ųO?5ËWO·ÅóÏ<ÍàÐ0{>ü¿,óÐ044Äå«W‰0› #1!ÚÚt÷öâq»)-)!#==X.›ÝÆ;vÌØ}bÂÁƒ‡¸zý:n‡ï¿ô"ñqqÂGޜܧ’T˜Í„……Ï:¦ØÆö‰Çv0::Æñ'@Ëp߃|ïÅñx¼ì?xhÉÜ<ûÄ­­­”#I*Ö­YÍ/ÿò/Pd™ã'OÒÓׇet”ááa¸ÿ^vlÛÆ…K—p»ÝT×Ô’ž–†×çåze%…¬Y½ NÇê•+yøÁq»Ýœ8uŠËW¯¡Ñh¸ïžÍÄÄD#+ å¥%üâg?ÅívÓÔÒ¼ØU!EQHOOãç?ù1‰ Ô74²~ÝZŠ‹ŠxñÛ/°fÕJŠ—±uËC.ޏ¸84j V«•úúzÊËJÉHOçGßÿ>­­m¼óþ.ú8|ô(UUøý~ü~?ßùÖó¤$'óæ;ïßw™Íf¢¢"1›Íx<ÞÅ®@°H˜BMDEE‰,Ë„††¢ÑÉdÂb <<œ°°0$I"2ÂLfFùyy 284DbB‘‘‘„èõ³ì+Š‚9<œÿàx}>Þxó-†††Y¿v ×**9yú 奥$ÄÇóã|¯ÏÇŸÞ|‹Þ¾¾íüé­·hikÃj³‘ž–FtT¡¡¡H’Š„ø8’ Ñë‘$Pk4$$ÄSXP@xx8C \áááSÊnA$) i¢'6&f–>ŠàËcÞšMHL"))™¸Ø¸ÅdY¡xY«W­â¯¿F«aÃúu|üɇ†hïèà‰;îøÞзƒ,ËTVW““•EHˆ…Úº:þôæ[TTVñÜ3Oqìø P&˦(Ú;:ˆˆ0S]ÓÍØØ8mí ×ëq{<ÔÔÞ@§Óáóù°X,ë+Jж@ ¸KQ% A?õ/6&šÑÑQÞ~÷=v<º¤¤DNœ:E„ÙŒ¢(´´´±û說fóƨTfllŒ¦– ò9uæ,uõõ¨$z½Žò²Rš[Û ÃjµaµÙXVTÄ;ï½_øcããÔ74ÓØl¶íŒ[QIRÀÎ{ïSZZLɲb@ ¾“W…À‚s.ÒÕ݃×ë¥xYƒƒœ8u ³9œ”ädŽ=Ž)ÉÉ8].JŠ—±rùrtz6»U+–³~íZbb¢ÉHO'**’¸ØÒÓÒ5»ZÁWŒÑh$#=¸¸8"##IOK%##ƒ”ädL¡¡$§$“™‰Ùl&..›ÝÎúzÒRSX½j%ëÖ¬!=-˜˜h|>?+W,§¸¨(0éN%a&""‚”ädü>‡ûï½—âeE Ú;: 3…ñÈÃ[«ÍŠ×ã ¦q: Ú)).&/7£Ñ€ßç'9)‰ô´42ÒÓ1›ÍDFDžšJum-*I"%9™mŸï¶diEáÂÅK45·,v±‚tuwÓÝÝ3ç±[•ëæzÜæíñŽZ8vâ(mí­³ŽI’„ÃáàÍwÞå7¿ý-–ÑQ °ÃT[GûŒßRkýI’D{G'ÇNœ ¢²Šó“ŠƒMM #IRPCz*ÿ^¯}ÐÕÝÍŸß~‡Îή M ؘþc–$‰Ñ±1víÙˈe·Û³¤êC |uH’D[{;ûöÀn·ýK]}o¿÷>~¿YQØóÑÇ\½~}ÆySÿO÷©§“ÓgÏÒØÔ4÷Ö¬“²ù6ºUšùìL÷y7Ûëìꢳ»kÖh°2G¹n¾F]çõ ¸sÌ»Ž_’$††9vü([|˜´´ôY»F¥¦¦ ÕêØûÑÇ|ûùçP©Õ¨T*ìv;ŸÜ·îžV”—Q^ZÆþC‡fEy9ù¹¹ôööò»W_E¥R³ýÑ­¬\¾\ll!Ü…(Àú:þù7ÿŠN«åñ;ØûÑG\ºr•±±1J‹‹Ùµ{áaa ‘•ɱ'ñxl6Üv»êšZ4 ‘‘‘ÄÇÅ|bw7‡“5«Waf×» §¿€G·m JóNu&wïù+×®a±Xxáù爋~òpËÉ}²,Õ“¦£!úžyêIêë¸rõ*I:L{{;÷Ýs :ztÉ}§ËECc#%ÅËP©Õñü³ÏÒÖÑÁ©Óg¨kh §·—êÚZòrsY^VÆþƒ‡ðz½ÔÔÞ !>Ž5«V‘’œÌ½›7“—“ÃÁDZX,<ýä”S[WÇù Yµbi©)((CCÙ¶õÒÓÓ8rôØm ã ‚o ŠBLt Ïì|YQ¸^YÁ²¢"2ÒÓyðûÉÏË#3#ƒU+W°ry9}ý457³iÃz‡øxß'ì?x»ÝÎ Ï?OnNö,ÿ<µ=ïÞ>":*ŠåeåDFFÒÛ×ǵë´wtÐÐÔ„ÏïcÏdšËËÑét ÚY¹¼ xw €?õädfdÐÖÞÅbaóÆŒX,´¶·QQQ‰N§gÕÊ|øñ>&²²²åZ±</‚U¢ ×ë)*, #=->@xX˜úwˆy¿2ùp>ôàÒÓ2æL#Ë2ÉIÉlt+{>ú˜þAü~?í”–³¼¼ŒeEE´·w,‰(Immíx½^òóòe™èèhr²³ÈÉ΢½£#8Œj4’Ÿ—K^n.’$a³Ù¨½qƒò²Râã'';›ÈÈHÚ::()^F~^ÉII,//ãÞÍ›8vâ$•UÕø}~ÂÂLdge‘™‘Ž×çCYÁ]ŠDGG“•Ejr2^¯ØØX¢"#)ÈË#..–ÈÈÒRSILLD’$âY½jÖ¯¥±¹™–Ö6Š ÉÎÊ$2""h{úksx8Ï=ó ý<|¯×ËšÕ«¸zígϧdÙ2’“’xîé§éàÐá£X­Öí:zŒÞþ~Y³j%¹99ÄDG£R©ÈÊÊ¢¤xa¦PT’„F«%/7‡û¨ÈÆÇ­DEE’–šJrR*•jÆ« µZM||\ òóÑëõ‹}«¾±Ì;ÔÍC=LfFÖ¼A[–ý(ŠÌ†u먮©e×î=h´JKJ8wá~¿ÌõÊJîݼ •JµèÁ_QªkjHOM#ÌdBöË´´¶qôø ®WVñðƒrñòedYÁ/˓ﴣýŒ[­äåä¢V«1B8~ò$Cù¹¹œ8u­VG|\,*•Ф¤$Æ­6.^¾LIq1~¿eò™èí w/Š¢à÷æÉJÀÏ„‡…1láБ£lX¿Ž³™ËW®’œ„¢(ôõpñòÎ_¸Hyi)*•Š3gÏ¡Õjèèì"?/—ªš:::‘T:­Ž¬Ì @¡¼´”]»÷ÐÝÝÊåå|øñ>›ø¿þËÿ‡Ã¢L¦Ù³‡îž, íóÙÙ³—ñ±qRSRøhß'¬_·–´ÔÔ€¯œ×õûedYÁçóÑÐØ„ÏçÇfŸ 7'›Î®.._¹BrR"q±±\½^¢((ŠBfF¦PS°6®_‡ÉdZìÛõ$¸ióΧv‰Y•œ”Œ¢(„‡›‰ŒŒšó¤©– ^¯#;;{R_:èè(–QZ\ŒV£a`pÕ+W°níZTªÅÝ2@’$œN'ûdÓ† $'%&¬(2ƒƒ¬Z±‚MÖ£ÕjIOK#.&–¬ÌL ¦Pý(ŠÂ}÷lF«ÕLjÅBB|ËËËñx=´´´NHˆžŠÊ*$ Ýú))ÉBBÈÉÎB§ÕAzZš˜ä'ÜeH’„DD˜ÉHOG5ÙË-ÈÏC§Ó2ᘠ'+‹ô´4Æ­6ÂÃÃðz}œ¿pY‘ÉÉÎæá‡$';·ÇCgW7éi”•”04ŸêÚZº¦Ò¬ZE[{ûvV³~íZòss¡«»‡ø¸8bccILH !>I’ˆ£±±‘¾þ~@áᇢ° Ÿøø8¬6áaá ªjj°ÙlØìvÂÃÃXVTHˆ^Ï„c‚¬ÌLÑëÿœH’„ÝnÇétÎ=ésêÃëo¼þr~AþÏÖ¬ZsÛ=óù´¤—ª¦²Ï磧·—ø¸8BBBfUÈBzуƒA‰Ìée¿ÕyóÙ_*u"¾Zæò›ó}8vò$.\ä?üû‡^¯Ÿ5³þVL·çv»ùç_ÿ+ËËËxèûg¥YÈ—}–4~¿Ÿÿö÷ÿÀ†uëxà¾{ç,×­ò ÂM~>$I¢¯¯‹Å2g!u¾…´¡—b`Óh4d¤º:á³hQÇÇÅÍ8þyË»ëE |uÌç7çú,I¦ÐPbbcf½.ý,¾d* ZFG‘™âeEó^s!»·›FQbcc 5ÞöyŸ§\‚ÏÇ]'Ëûy*ñ0 ‚¯EQXQ^NYI Ís׊¢ÉOôCÌááwÔ§©Õj¾ÿ⋨Õjá;— w]à‚¯jµµZýÅ :nÆë‚;ÉÍKK!Ò#w¢._ ‚»ø@ ¸‹_ ‚»ˆ/4¹ïæ5é_§5êóí3p«2|‘2~êG ܾl?°ÔüÊRË`6söø%I¢¯¿þþy7\ðx<œ»pþà¦7êê^ì2ÝÇCuM-õ ´µµÿ®( ƒƒCØíöyÏmkï ££ó3_S–eZZ[±OLˆû‚»˜ññqÚÚÛgmÝýy¼‚¢(457Óßß¿ØÅ betRªýó ¼ãgÞ¡þþþ>Ž;ÌÀàìà/I6»ÿþÿį_þ-‡Y–yw×ܨ«›!¼°Ô‚œ$Itvuóæ»ïrèÈQ;ü»¢(œ=žŽÎÎ9Ëà÷ûyw×.¦i_ßœnzúéß=oüù-ºººo{§?@ðÍB’$›xçý]x½Þ hïèà“C‡‚ß8I}Cã¼¾eÊ–,Ë|üÉ~®UTν5ë-Οõo|ÏçÛnþW]SKUMíœ×^®¹®qs=î sîÕÐ?ÐÏÕ«—%..“),x’$ILL8¸|õ*ö ;*•мÜ\NŸ9GffI‰‰œ9wžÓgÎ`µYILHøÒÖ¡~Q$Iâô™³¨$‰sgΟ£«»›që8ÉIIô b2…réÊU._¹Ê™sçЇèIˆ§·¯ŸÓgΞ–ÆàÐ0©)ÉtvuQU]ƒÁ``÷Þ9sî9pÖö6’““ ™×Nk[)É)8Nöí?À™³gÑëõôôöqöÜyª'~xx]]Ý\º|…+×®¡Óéç_^~™ú†t:-i©©3‚»Ëíæ?¿É¾ýq:¤¦¤b0„ÜV½ fr«½úo9¹otÔÂøøøì-jQ0™L<³s'gΧ¾¡•J鉓§ˆŽŽæð‘£œ<}fÉ´Þ<^/µ7nPZRŒF«!>.Žò²RNž>ÃùK—¸tå M--8|EQ áÝ÷wá÷û¹Qwƒè¨(¢££øhß>ÆÇ­œ:}–ŽÎNÔj5ÑÑÑDGEñή]œ9wŽ7Þz‹°°0BCCQ”À°^JJ2111¼¿{7.·{±«C ,­†ÒâbZZ[9é"ÑÑÑ„‡…‘’’Bd„™ðð0ââ∋¥µ­ÃGa6‡söÜy9ÊÑã'¨¨ªfÕŠDEFÍÚÓ^’$ÆÇ­üñ7ðú|DGF¡R©¸tù UÕ5tu÷pâôi¬V|ãO4QQ³_?Ül': ¯×Ë®={éí룰 €°°0®WVrñòe¢££ilj¢¦öGŽ££«­FÃkú‹…ˆp3qqqÄÅÆÂM1A£VIxX©))huÚžMßXæÜ§( &S÷l¾ì¬œ9ÓȲLA~.—‹÷v}€}ÂŽÏ磪º†µkV±õá‡ñxE™á_dYF¢Ç2jázE%N§½^G}c#]](Š‚Õj£³«‹uudd¤“žšÆõŠ êêD–:»º¸v½‚kTU×0<2BA~÷ß{/§Îœ¥¾±‘5«WÑÚÖÆÉÓgXµr~¿Ÿü¼\î¿÷^NŸ9KCc]]Ý Ø9CWW7‘‘‘œ=Ö¶6FGG'}f`´Àï—‘å@¹†††©«¯Çj³“”˜ˆN§¥¾±‘ŽÎNÆÆÇ¹^YÉõŠJ®]¯ »§½N¬‡Ó¹Ø·êËœïøEÁn&>>aÞI>¿Ÿqë8E……˜Íá¤$'áq»Y^^ÆŠåË¡¦¶–œìl¶<øÀ¢ïÛ,I.—‹?þ˜5«W‘‘žŽÕf ¾gËHOgë–‡˜˜p’œŒV«#?/V‡ÛíÆf·aŸp°åÁP«Õ„††²ÿà!¶<øE…èõz::»èéé#99‰¤ÄD.\¼Dww7ëÖ¬¦¼¬Œq«•ü¼\ !!8œN–¡ÕŠá,ànA’$œN'Š¢PTX€ÝnÇNiq1–ÑQºº{(ÈÏ#..–ú††à;þÃGÓ?0@XXO>öùy9´µwPY]Á` ¼¬”ÖÖVNŸ=Gkk+]ÝÝDEEqõÚujëê(ÈÏcÓÆ DGEq£¾·ÛÅóÏ>ƒÓåâðÑcܨ«£0?Ÿ×sízg泓hdefPU]MuÍ ¢"#1 DFF’‘žÎ¸u³ÙL{{7êêèïïgãúu¬^µ ³9œ†Éré´Z>þd?M--47· Õj(-)al|Œ®îòrs1 ‹}˾–Üêð/¯¿ñúËùù?[³jÍm¯LйéÅÆãõR;Ù æßçóÍÀÓu§§ÊÖÒÚŠ¢(Á 4]ÝÝüæ·ÿÆ/ñ$%&àóùP­VlÕûýþ (ÆÍ6—B‚¯ž›uíçòS?yŠsçÏóË_ü&“)8;å»Rí“e¯Ï‡^§ tØ|>~óÛWÈHOãñÛƒ#ÓÓÌå—nN3õ7¿ßF£™UŸÏÇÿÇbõÊ•ÜwÏft:ÝmÇá¿8’$Ñ×ׇÅb™3ð¡ |>‹®ôR@§Õ²bùò`¾¦ò¦ÑhfO^¼© ÙYYÁÏ’$QS{ƒÔ”âãƒi§V.Lÿ>]–r©Ö‹@ øj¹•O˜ÞÐhÔ  *•jFº[IõªT*ôÓF[‡GFæÉÇwÌ™f>¿4Wš@Þ4óæ=D¯Ç` ý…ìÏU7‚;Ç]'Ëûyª›ìò²RV­\±dæ.‚oŠ¢°bùrŠ ¾°¶½¢(„™Lüð{ß%)1ñŽX•JÅ÷_z‘ƒAò%È]ø¿,kðÅC-î$¡F#¡Fã—âkŒF#ééwÜoI’Dtt4 |äRDþωx˜ÁWÁ—ík¾*ß%|äÒE¨ó @p!¿@ w"ð @p±`à¿ÕŒõùÔž¾̧øYËüEÒ}]êJ |y|Ù~r©ùÝ¥–Álæ ü’$a±X÷úý~ÚÚÛ±Ùl@`"GÿÀ‚ZöK¿ßOo_ýŒŒŒÌ8611Çë÷Ü‹…‹å–×ebbbÎcSrš½½}øý~ñ#î"œN'#ËŒÉoŸ·¥(084„Õj]ìbÍ(ŸsžívoU.Ñhøj˜·ÇßÙÕÁ‰“DZZÇçì[ùÏÿçá÷| ŸÏ‡,˼úÚkTTVÍ«ÿ¼$‰ÞÞ>^~åw¼ÿÁn>úd0Ÿ²,sèÈQš››ç,ƒ¢(¼ùÎ;\º|eA=j€ww}ÀµŠŠ9ЃCC8t˜ú_ÿ‹ýÑÓÓ³äêI |ùH’D]}~ëmü~9èú¸tåS¿r½²’®îîyýË”-I‚÷v}À…K—æÝ^}áó¥Ûò×s¥™ïüKW®réÊÕ9M/×\׸¹w†ù—ó) õ õ¨ÔjîÙ|/æpóŒÃ²"c2™¸^YɹóØ´q^¯/(<ÑÐØHOo)ÉIädgÏ+ô³Ô54AXX••ìÚ³—Üìl ò‰‰‰F§Óqõúu¬ãVlv;ËËËHMIaxd„ÞÞ>Ö®ZÍ‘cÇñù¼¨Õ–——ár:©­«'44”åeŒX,œ=þAòss)^V|Ý.7ûäò•« EòbWŠ@ øJp»Ýܨ«g÷Þ½DFF°rÅ ö8ȹ ±Zm¤¦$óÇ×ÿDBB<Û·>Bbb"mííØíDGG±¬°E‘©¬ª¦­½º†²23ç¼VWw77êê1™BÉËÉ¡«»‡¢¢BÔ*uõ d¤§1nµr£®žÐP#+ÊË1̱?þ”@šå¨T×+*¡¤xY`Äw`Ç‹$I„‡‡ÑØÔÌðÈ.—‹¢‚dY毽Abb>òÅÅËPM î‡Oäü…‹Œ³vÍÂL¦Å¾]ßHæü’„,ûhkk%';gVàW…¨È(Ö­YÍ'’žž†J%!©$.^¾Ì¾ýÈÊÈàØ‰<±ckV¯Zë:}>•ÕÕ¬(/gxdŸÏ‡ßçãÍwÞåéOpöü ò9|ôy99¸Ünªkjø?þÓœü™HJJd°r«×+hko'%9‰?¿õ111¤¦&ãp8Qd«Ý†ÝnçÕ×^ãÿüÏÿ‰ØØXÜaaaÄÄÄ×ãý‚¥_$ ›ÝŽßïçàá#8œN&N&, Q‘‘LLL0>>Ž}b‚Úu¼ýZ¹‚ƒ‡óè#€‡£¬´Ÿ×w³´}pTö_ÿíâbãHKK!>.žöîE’$¢¢¢x÷ý]|ï¥ùão;é»§mt³ÔÔd&œ’$ E–ihlÄl6“OFz Ï2)»)î¦ü‚¢(¨$ ¿,£Ñ¨±Ûmtuw“J¥¦¯¯ŸÑÑQ@Áëõ21á`phˆÈÈÔj5]  a³ÚP…ѱ1ìö $)°W~¨1t†_Š‹eýºµüê_~ú:¾ûâwÐiµ³|W~^.¶yìüù­·1 „„„ÐÜÒJbB õQiÒïÉŠ‚¸Ý,££¸Ü.Ìáá¨T*úúú±ŒŽb aÄ( „…™P«ÕØívºº»ILH²åwˆ9#º¢(def“—›”˜u¢FCjJ2Z­–Ȉžæ&&„™Âxtë#¼÷Án^ÿÓ›ÄÆÆ°íá-KbÈÆãñPQYEiII`/é¨(ªkjøÍoÿ0“‰î¿ýa6“œœ„^§C£V“’œB]C¡¡FRRSèéí¥±±³9‚×Þø«V® öF=ƒCƒääd“’œL|\ááá¨Õj’“’Ðétì?xˆâeËHˆG’$ŒBÀB ¸ë0…†’”˜r÷ûýädgËî½òÝï|›Ö±÷£}\¼|½^Oí:þù׿F¯×óü³Ï Izëm~ûÊï°O80›Íœ._½Ê²¢"JKŠñûýìýx/]&+3ƒ7ßy70Ê*+¬[»†Õ«Vëá¥o¿09z |ä—M°«ùú¯¿œ_ÿ³5«ÖÌÒ†ž‹éZÐS=V׋fRŠÖëóáõxÐétsÊÞ.n·›“§N³|y9q±±ø|></n›P£V‹wò½’,ËÁ‘¿ßOMm->¿ŸÕ+Wâóùðz½–€Ü¯ÇëÅétf2¡×ëñMÚQ©TÁzòz½A©^@pw2¥c¯Õjñûý(€F­Æëõâ÷ûÑëõ I¸]n45gÎçäéÓüøß':**8ùÎåvãr:Ñëõhu:ü>^Ÿ N‹Ûã ú¥dYæß~ÿ*æðp^xþ9dYÆ1¹ünÊw¹=| ØÑOŽR:Ün7¡¡¡H*)r¿ßÏçãõÏ/+bÓ† D˜Í¨ÕjdYÆíö V«P©T¸Ýn@«Ñ ÓéfÔƒ ý|H’D__‹eÎ:œw¨ÿVZ’¤YÃ0ºÉ Q«ÑL> K!èCàõÅÃ[ æI­Vc0¨1BãS}ëéÁY£ÑP^V¾Ÿ+xkµZL¡¡Á²N=2UOºiºØàîD¥RW9M÷#Z­v†O ù4ðéõ:âââÐMÕëtè§ùµN7ËÇh4š~Éb±ÐÙÕžûðã¡FãŒ47ÛËŽ¢( †9WL•IÂÃÂ‰ŽŠšñÚ3$DLk4gs=¾|„:ßgáí—¥ÒÀß E¡´¸˜´ÔÔjõçò1ÓƒµV«åéO’–š:ÃÖíØý,×V©T<÷Ì3DF˜…_\‚ˆÀ/K˜èè(¢££¾”ÎÊåËïx0–$‰œì,@tˆ–""ð ÁæËœ_U é²t¶Ó@pÇ_ ‚»ø@ ¸‹øB_¬±àëÅœ_’$ìv\.ç¼Á]Q¬6[p£è0{§}_ª(Š‚ÃáÀï÷ÏYö[5h|>ß ½iY–q8_Š×ëÅérÍÊ€Ãá˜ñ] |ýðûý¸=ž›O2÷vp¹\x½KGèK–åy}á­Ê%äx¿æíñ·µµrîüY\.׬PlçûßÿÞÝõŠ¢à÷ûùÝþHEEåmé;/’$188Ä?ÿæ_±ÌÊkÿ ½èÇ'¿?y’wÞßõ©½¡!~óÛcl|ü3éVÏuìÚõŠI­îO%ããV®\½Æ¯~ý.]¹‚ÅbYìjŸI’¨oläíwßÃï÷÷cãã4·´¿·wt0<22¯ß˜²ðö{ïsþÂÅy5î:ÿv}õíž/I—®\áò•+s›^®¹®1³ûn}s™w9ŸÏçãÚõ«¨T*Ö­]OHÈÌš|~?Ž bYa!%Å˰X,8]žðÀà Ë(ÑÑQÄÆÄ,v9gÐØÔ„ßç#,<ŒÎÎ.,££¤§¥b0x÷^¬V+Ï=ó4éé8Ú;:P«Õdef¢V«¹^QEyY).—‹æ–ZÛÛéîíÅáp`·Ûq»Ý„„„ R©HˆÇápàp:1™LŒ àt9 #)1«ÕJ{G²¬•™Óåbttl†HÐèØ(o¼ùUU4·´ð7ýK¢¢¾œu½à«ÅjµQQYEvVf3ÙÙY?yŠsçÏóý—^$**ŠW_{ƒ´ÔÙ²…È3#K`Ëܰ0’QPèìꢻ§‡†ÆFâãæ¼ÖØX@\,$$„„ø8FÇÆIJLtrˆŠŒÄíñÐÕÕMHˆžô´´9wÍûÔN J¥¢³«‹±±qÒRSA›Í†×ëE%öøÂn·ãñxINNÂçóñêk¯“–šÊ#["9)iFÀçóqüÄIÎ]¸À÷^|‘ìì,Bôz_>ó~I’ðx>ž‚ü¡ÆP&&ì|ë¹g)ÈÏ_J–e®WVRVZBSS»÷~DX˜ I’Øñè6±ŒZ¸p)sx8o½û.vûññqÄÇÅáp8±ŒPTXÀ;ï³V‹Ë餯¿ŸW^ý™éé$%%ÑÔÜÌü›ÏÕëTUW³fõ*þüö;d¤¥1båÛÏ?‡J%qøØqÆÆÆˆ‹%''•jfSWQ4š@Ýj4š[î (–.’$ÑÓÛËÕk×hkogû¶m444ÒÜÒÊÉÓg(^¶Œæ–‡INJ"ÌdâÍwß úž{Pxw×$&$ÐÓÛ7gzbÂÁo÷{|~?‰ ¬_»†7ßy—_øæp3¯üþ|ç…çÙ½÷C¼> qqìØþ(ñqq3|õt; ñq<¶};ÕÕ5œ8ušØØ6¬[G]C/]&?/¯×K\\‡Žcll ZÙlfýºu4·´284DbB‰‰‰¨§|z¼^nÔÕÓÜÒʉS§ˆ‹Ã²$âÆ7? §x73%R“—›GjJÚÌíùTVòžÍ›Øà {>úŸÏ‹×ëåȱcäåñøc;xïý]9vœÜœœ%1ì?<2B_?lÙÂþC‡°ŒZˆ‰‰æìùól}x ëÖ¬al|ŒçŸy†ë• ð·ÿî¯1 h4®\»Fll,‡Ú7øå/þ¿ßÏ˯ü¯×K˜ÉÄw_üv»ÚººIAŽ€¨Ëå".6–Ÿÿô'=vœCGŽð½¿CYq1µuuÔÔÖ HYËÉf3ßzöY¸gÓFâã¿”ùà«EAA–ersrøÉÀ[ï¾G_Ö­Åátðý—^D­Ñpîü–²åÁ8uæÌ ¿±ÿÐ!4 +W,çñíÛq»Ý÷êŠ<£S ˹!z=…ù¤§¥‘ž–ÆÅK—ILL$"Òèñ»ÝèõzŠ 3™fù–év–!'OŸæ±²¼¬ I’¨®­¥¸¸ˆï½ø"o½ón· —ËÅÆõëY»f5ÿô«ÆårRVZBQAly‰™Û ‡èõlܰ·ÛÍ¿÷]ôz½ðs_€…LÁHüÖ[o½û³ˆÈPÃ6££âââ0Œ³Œx¼^ÚÛÛIOKcÂá`hh•JEtt4ãããDFDÉððV»ÌôôÅ®&z{{ÉHO§³»›þIq5ËŠŠ˜˜˜Àëõ’š’ÂÈÈV›Œôô€Z! ½“­ksx8=½½defâõyéêî!.&†Ááa23Òñz¼t÷ô™‘Á¸ÕŠÍf#<<œq«•Ìôt¬6ƒƒC$&&ÐÒÒŠ}ÂNxX111¸ÝnÒRSgÌe™Ñ±± Ê•h _OÆÇDZ•™ÁÀÀŠ¢`4±XÈÊÌ ½³“°P11ÑX,Æ&ý†Íf£¯•J"&:šˆˆ::» 5=ã:’$1b±ÐÒÚJDDY™ŒŽŽa·ÛÑjµhÔâg¦ÉȘ%@6ÝNdDÉÉÉtww“š’éééíE’$’ééíEQÀãqATd$mí„8œL“åšåÃ$Ç2­¾^Ÿ·Û½$|¥$IE·Ç×ãE¹ÃC·n·{Æäûù™ú°wïÞ—ËËË29´25cª×9WAT*U E&J Ì”ùÓód% B%ì_-·éùV©$$éÓùS“m 0â!©u0=ïSªZŠ(›_ö#1ÝæÌ¿ùeÿŒºœ²73ªYu=«¥+ñ©Tòâ?Çàs2õÛ÷ûý7ù ÿ¤¯Q©U (Ȳ2ÃM _ô±Òκ–JB­ tü²?à§%‚>dÊÏMO3—™žfÊgɲôWÁT-©gúØ\†$Isû¢i'ÍJ3)Ÿ5—å·¦Çizº[ÕÍç÷S«Î"ÌáÄÇÅn;_6ƒCƒtvu‘›“‹9<|Qó"Dz@ðÂï÷c4^C,•¡~N‡×ë#D¯_ô<‰n¥@ _ÒÒxS+¿@ ¾Y,þ²935µÜb#¿@ ¾QHÌ`çÚ…ö–¶¾Ähç³òUït+Þñ àÏç£o ŸøØ8ôz=.—‹¡‘aãœÔnµàóùgí@;µÂá3MˆŸ£ááp8èìîBQ´-±±1„‡}9“ÿ¦VŽÜÜ =~@ |ó¸©óìóûé ¹=‚º(sM¸óûýŒŽ1:: –+úåÀ²J§ËISKó Á¥©ÆÀmf —ÛňłÉdBA¡¹µÇÜ¿åVçJ£( ^¯—æÖÀ17#zü@ øÆ3%²ü.$©p¹]´¶·vjJ*†:»»°OرÛíÄÆÄ26>NWO7²?ÐûŸp8èéíÁåv‘•‘…$AWO²ì'>6~ÖÁHèõzb£cp¹ÝXFGñûý Ó?8€J’HINÆãñbŸ°“‘–ÎÀà ^¯‡ÃŒ4Z­–Ö¶6$I ØÆj³’‘–FlLlðŠ¢Ç/‚»¯×Ǹu|r—Z b³ÛÈÎÌLBBBHŒO ,,ŒžÞÿ{wþäFy&püÛ­V·Ô­[£ÏécllŒŸx“Æà„%`±ÁR›lRûŸlUj«Rµ[»Ô֒Ť²@Cq˜c.;á² öh.3Í¡ct´ÞýA3B3ðÄÁ<Ÿ*—GÝo¿ýJ¥ªGïÛïû¼ƒ8ŽC ¤£­ŸeÑ“L¢~ŸŸžÞž Þ*YÓ`"3Á‘cpì£c4&Õ {{°§2#&ûú°,“T*ÅD&ÃÐð•Š"Ù›œQ¦T*3‘™ Ñ ­µ•€ãÐÚÜB$™qO üB!®(ÕŽý¹}lU7T_.» º¦áõš„Ca Åã™ql¿M0À4M@‘Éd8}ö4ù|·ââ5 à p¦†þ') ‹E‚ÁàÜõæ8¦l‡öÖ6tÝCÀ àº.…B‘\.€cÛ8¶ƒmÛôôãº.€Ãd¡P+pLÓ$ 1<ŽcO½‡OHàBq…97Àz½^B¡=É>>y‚d_’p(„á5( Ñ?0@("O06>N²¯—ѱQ*J‘M£8Žhx<(E_?¥r‰h$‚×k GhˆÅçÌb8÷p5ír,c~{;}ý}TT…p(„eYD#Qb‘(‡†xœS§O  C„BÁZ™h$òÉÆGS)å½^/ƒ§N1>>>㎵éˆ;wîünssóº¹öbB!¾ ¦gÊ›¦‰Ïç›q<£Mí3 GhnnÁ-—9}æ Žc;´¶´°L‹|>c;Äcq¢‘(¥R]×iˆÇ‰F"8¶=ÕûDqÝ2…BÓ´pl{ÆFk…BT:MSccm%€6µ¶ßòUËÛ¶ax°,ñhŒÉÉ¥R ¿ß‡Ïòa™~Û&oÀçó)ÔÊøñû«eÇÁãñ`Û6nÅ­Ÿ&“û„B\qæê]†AsÓ¼ú}ŠÈ+…ÏçcÑ‚…Xuét 3&è)¥X´`áŒ×±XŒX,V»¦½µmÆùÙ-š=ü¯PX–E“¯±V~z¥ êvµUJa­Í-µ Ýl¿ÿœ2MŸÔ  ƒç´G¿Bˆ+ËgäÁQj憸Çq>Ùý´®Ü\×^Ìë õi÷ý¼mø´öHàBqEÑ>ýú9lÛféâ%“¬yÓ®/“~!„W”jòUûûBÊÙ¦³üUÜ šyy£¿~!„W ¥ŽíÉN úŤÔý’T\—l6Gc"Azt”b©ô7ËË? üB!®(>Ÿ]¯fåS¥òånš¦…1M“É©õþ—“~!„W¥¦ibYÖeíY×·gúŸÏçÃï÷K_!„ø"MÚ¿7í’Ì}B!Ä׈~!„âkD¿Bñ5"_!„ø¹ À_M†P!“ÉP,/jb‚®ë_X¢¢|~’\.G¥R©µë³fFžïü…PJáº.år™r¹\»÷§}F®ë~AïV!„øâwV¿¦iœ={–§žÙÍÈHË2¹íÖ[YܹhÆìÄé<ÇõÖu]††‡kÛ ÖŸ¯¿n.õ?.Êå2{öîåý÷£P¬^¹’›·ÜH6›Å­TˆF"çÜ[)Ejd˲8Níüì-sµgúoÇÃ[òôîg hšÆM7n¦{õêsÚ{ô؇¼¸gíímlݲ…@ pÎç3×û. ¼yà +W\C<eºyõíœ}­Bq©Îøu]ç̓I§ùáîellœX4B.ŸGU*ضM©T¢P(bÛ~2™ Ù\ŽP0H6›ãW»áÆn`Å5ËñYcããäsy"‘–e’Éf™Ìç)K„BA&2™©ý…#@5è §Rìyy/÷ìØNc¢R©„RŠöì!“ÉrÇí·p&&&Èåó„‚A ÃàwOüžŽöv®ûÖ7ñårÛ¶™œœDÓ4LÓdtlŒb±H8Âã1Èæ²êH…¦‘Jpî¾ë.Ð4¢‘0Ùl–B±H.—#¢i:Ï=ÿ<¶m³òšx½&£££T*‚ÁhËæ(»e,ÓÂ4½Œ¤Óhš†cÛ(UÁ-»ŒOÏçQJÑcù|žÑ±1L¯Û¶gl3)„B\¬óþê6M¼ñÖÞ?t˜µkº‰ÇãìÛÿ?Îy›žd’ ëÖòäÓÏà5½,_¶]÷ðîû‡¥hhˆóôîg©¸‰¶Ýö]~óÛGI¥RT”B)‡‚ŒóÃûîeAGŠê& ápˆwÞ}—ë¾õM–tv244Äo`ll Ã0øÎÖ›yê»I¤Ð5î®.þüö;=ö!š®‹F9òÁQî¿w'Ï¿ø–eÑØ˜à¥—ÿ„cÛ\»q‰†ÿ÷Øcüü§?! é#é4GŽÅ0 ÖvwóÛß=Îp*@4á›6ñáñã„Caz’IúøË;ï ”bé’%¬¸f9=üápˆ®U«¡'ÙK<ãÆÍ7ðÁÑc˜¦ÉsÏ¿@,#N³eófºV¯â±ÇO&“att”U«Vpç¶m—û;#„â+ì¼Ïø+• k»»Ø¹};=É$ÿþŸ²ÿµ×Yܹˆ¾þ~’É>>LG{;£cc ¥†Y¾lW/[Fת•,YÜÉ÷¿w«W­äO¯ìc|lœ¶¶VÞÀö;¿Çúuk9täþ™r¹Ä?ÿÓ¹úêed³ÙËý}BñwA™ûÊå2‹;;YzÕžøÃ“¼úÚë¬_·–Žö6žñEÆ'&X¾l)¶mðêþ×øðøqvîØŽá1°L ÇC.ŸG÷èø,‹­[¶L “k‡@ @Àq°ý~lÛ¦R©Ôžm»®‹ã8Üö·°bùrþãÁ¹ñúëðû}äry|>ƒƒ<óìsÌïèÀk ^¯Ã00MMÓ)—ÊSð* Áæë®# ±gï^ú¸óŽm$ðèu¿‡,éìäÎm·×&ðišN($ b™fõƒ4ŒZzH¥Ñh„H8ŒÇ£S,ðû}4Ä㌤GÑõêõ~¿Ÿr¹ÌôÔ˲ƒ„B!”Rd2<~¿˲(‹—ûû"„â+î‚ÿþ×_gï¾W‰E£Ld2l¾þ:,Ë¢{u¿øå/Ùºe Ñh”CGŽT‡Ö5b±ˆešÌ›×ÄÓ»w°qÝ:^Üó2ã„C! ¯1cBž¦i(ªÃ뚦ÁÔ„¼3gÏòÐû0M×uY±|9‰­--¼uà Ï<û‹§X,†aÐÑÖÆþ×ß à846&N ó›GãÃŽ³¶»›÷¢¯¿]×)».ƒƒ<þ‡'ùɇªmÒ5ù€ÿ~èWhšÎ¦k7 ëÕv*¥ÐuÐj^SË–.å±ÇŸÀë5imiañâNù€J¥ÂâE‹ØûÊ>þçá]´·µÒ½º«6Ÿ@Óª# k:Ý]«ùß]¿æ¡‡wq²§‡¥W]u¹¿/B!¾âjQ÷©§žú¯5kÖüÌï÷ŸShdd„Þ¾~ŠÅ"óæ5ÑÖÚŠÇã!=:Ê¿þâߨy÷vºW¯fhx˜¿~ü1(è\´ˆ††8éô(ýƒ4Ï›G4!ÙÛÇÙ¡³D#QÌï`hx˜`0ˆ×0¦µ¥…³CCø|>bÑ(J)& z{{I§G ,\0Çq(‹ô$“x<ím­œL&I§ÓDšš±L““=I"á0Mœ8q’T*E$!S*—éI&ñY>–,YŒG×éë`á‚x§~”Œ¤ÓôööQQÕe|m­­‹E‚ ¶íg`pyMM §R"á0“““$ûúp]—ùííx<NŸ9KkK3^¯—Tj„'ObY&‹.$52B(d|b‚––²™ ™lŽÖ–fNŸ9ÃÀà ûö¿Fó¼yìܱ]f÷ !„¸dø5M›êÙV{¹•J]×yçÝ÷xéå—ù—Ÿÿ ¿Ï7£\¥R©-¡Óu½özºw[_Oý·úcõÇu]«5wº.¨.¹«¯kzaz½ýt]s¯_ç__¾~-~ý{ª¿nº}Óõ×›ý9Ô¿·ÙuÖ×÷É£ ]ÓÈærœ8ÙC±Xä¹^`óõ×óM×J®!„—삆ú§“ØÌ>6Y(°qÃzüSKÌ>­\ý±Ù pê_OóÙeªuÌÝËý¬ºÏw~®žóùÚ?ûºé:ëïšÙç§ÏÕÿ_Ê®KO2ɩӧٴq#kºVKÐBñ¹\ò¶¼J)Ö­éžÑ_¥ÇáÖ[¾Ì1B!.Õ%~¨³‹/×ìÑ!„âó˜ø§Ÿ=KB!®LµÀﺮ>::J~*‘ŒB!®<µÀ?99ùëÇ¿}¹$„Bˆ/O-ð+¥ö¹®»ïr7H!„B!„B!„ãÿøBO í{%tEXtdate:create2013-09-04T16:55:40-04:00>–È%tEXtdate:modify2013-09-04T16:55:40-04:00O˸ttEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/transition_from_boolean.txt000066400000000000000000000007171330160122500264520ustar00rootroot00000000000000Transitions can be controlled by SELinux Booleans. SELinux Booleans are If-then-else rules in policy, that allow the administrator to modify the access control on a process type. Transition rules are either always allowed or can be turned on and off based on the boolean settings. If the 'Boolean Enabled' column has an arrow on it, this indicates the transition is controlled by a boolean. Go to the next screen to see the effect of clicking on the arrow. selinux-python-2.8/sepolicy/sepolicy/help/transition_from_boolean_1.png000066400000000000000000002140451330160122500266400ustar00rootroot00000000000000‰PNG  IHDRþpÖ·ŽÚgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìw|ÅùðŸ™mw{]½KrïÝ€+`ÓÁ¦÷’@ ¼éí—BHB*$”„ÞÁÆT7lÜ{ïE²,É–dõ~ý¶Î¼Œt>ËÆtÛ˜ý†sºÛ™yæ™gžgutt466*Š‚1&„€…………Źòv»=++ íÛ·OÅ’’Œñ™.˜…………Å׈iš4M“7M³_¿~„Ã0Ît©,,,,,¾F8Žëß¿ÿŽ;x&ñMÓ´´~ ‹sÃ0Aàyž§”²¯â,,,,,Îa!ݢߒûçCË—„•þhÁ,,¾&Xãd-ŸµùOÒN(¥|<Á™.¶Å¹ Sç1ÆÏG£1B©$ `š¦®# €0x>‹ ‚Àa †a¦) ‰J÷1í! ”9,ÇÛ:¥4SBH’DžçtÝ`¦MvALQž'„JYþ'ÎâwAišnb·IlpR5P"‰"¡zF)–?Älj„Ÿà”ó†^?YX|^Xÿâyc¬ª*H’Äü6{Í­ãM§=XÍÎâëƒÉeÝ0^oÞ’ÕëU: ß£¿úéª ›ÿõÜKv»=‰,)úë¯òÀ¯þé÷î1x´jÛÎyKWüó·¿$‘Š9NÓ4DQÕ4Žã0F¥TÕ4›$Ju]ç0V4í'ü­µ½úõ¹ïÖós²B<ϺŽFÿïÿ¹ÿ¶›ª¨ª9ú»=‹Åìv¥Ýâ^SU I’išªª:Ž×ߟÿÞGÿõ—?1dPSKëÏÿüþÅ}~ùýï Ïq1MM×A@0æ ]7LS„øO ŠF˜5 Ó4MI’(¥ªªr'I"JUMcc™…Åç‚ÂóüцÆ@(4|àØ±ï@’דŸ¥F¢lï-úÁ2øX|˜„8dyíæ­s.þÓÏ”“‘~äh„"‘$Ÿ÷¿þƒªi#]Ó£Šbš&¤iZŸüÜk/›aFSkPU”ܬLJiM]}nVf—? jšašÏçåd®©Åg§§J@G—ÿ§ß»gÄ ¿úë¿æÌ_ô»=X[ß‹òóxŽ‹)JTQÆŽV›Cˆ eUæxž#„äfe"„ªªk\N§×í]×ýÁÐ{‹—Ž2hþÒÕuõ}‹ PCss[GgŠÏ—‘ÞÐÜB Gcé)É^»¡©¹½³+9É›•žŽªkhŠ*ŠÀó>Çëv¬¬’D±O^nk{ÇÞƒåºn¤$ù†ìÇ-CXX|&!<Ç5¶´>ûÆœïÝvBèéWß|àö›ûä窚–è¸×õiýgºðç8¦ad¥§äæ,\¶ò‚±£' <ÏCáWßy?‹:xâØÑ!J©aÇ:\=ÙÊÁýŠÿòÔ³6Iê †ôï;cÒûßóÏýõ‘×®¯8\3yÂØ·>\ð½ÛnzúÕ7ï»õÆüì,UÓ¥6Q\µqËþòŠ`(|åÅS×nÞöê;¢äqÿÎ[xžx~ãöU5G'Œöø ¯TÕõyoôˆ¿øªÓ!ææ|¼f}euíÿß?Ÿ{)'#ý’©5MJ² …UE‰*ŠS–¿sãu¯¼ûÁæ]{† ìÝå3š[,_–œd“¤!ú͘<ñÉWÞäyþÆ+.™zÞ¸w-imï;|¨¢ª¬ü’$¦ Æ " <Çq‚ ¸]΢‚¼ªêÚ˜ªúrEáxŽ˜„ç¸$Ÿ·O~nUMmLQ‹óófL¹àéWßÚ_^ÑÞÙ•Ÿ5sÆEKÖ¬ïèò2¨ŸB›MB€µº¡ÅÇ0ŒÔ¤äî¸uüˆ¡(I^¯iš½VqyN¯_¿~ôèѺ®[>_+”Ržã¡P$j·IvIR5Já˜O ó²?®)v{ov_C(Å‹‚ ¨*Ïq„M×%QAÕuMÓDA`éØD!~kI’LB4MwÈ6MÓ™»B(`’ÍÅ(#§,?üï§Ý.×Oî»+ 17SÖ{Bêþ†Š€,Û ÃÔ4­w<#¥¢(îÚµËòð±8}¦‰rÉvBH4cþï ³QJå08&²êâ€RÊaDQ…ã8f—D‘RUc›(š=¶r.!4 EÁñŽFcÌž]¥Ñh”­4H¢°»´lǾÿÍÏUEE'8à#„€RVlÍ00B)^ÉæÍ¨»ÌFÌŸ:Ùë1 Ã&‰ï/^ºe÷^„И¡Cúõ ƒNYö8†i°G&Äê}_EU©¢0žp$ŠN0ÜF–­ßâ´A)¯dž´á™æIš¢ÙsYüWÓ4/@æñ ¤½.µË¾¤”žpiš”‚a˜ãïÞ|}Av¦ªi=×Â'õB©vÂÂ,+düIcŠ2cÊúÉ6{IAžnÀ¢ÕNùÈ_€c[¡ÀÉú“8wZ‹o9¦ëý †ôëŽD¾ªAqÊòÈALBE+j×âÌqœ‡µÌkaGÕ´˜¢rþ ;…a!]‡ž…¬îfq9æác|,,añ_mž½¶ë±°8#Óú9Žc[Z“Ðsž³Aú ¯›sï¹ÎBÉnõk‹DŽý¢(Z¶þs„[Ø<³/šj“)_Užì¹xž?sO†i „^€³¬™¦iE[Ä9¶ÌÛÞѾgß«qœÛ „tCÏÊÈ€@0 §OEe·C€¦ÄEIINa]§Sî3(Pžç}_ù¡òáC†w»™b „8Î#ÕGÀçõ),žåtJ]„´Ô´ÊÕííí#»Ý~oÿéD‘H$âq{N t°87`ÇÞ D)ù$‹f–RpNB)ÅB(PÃ0άqÏ$&0=ãË[!(¥”Ðø‡3bצ”†0ÆìtÉÓ\€S€¢ÜYT‹¯„P  „ôR¢X ºÍf³Ùì'í|Ïu–Ð?§AìŸ3é…Ò}j(f¡_ÅÖ„B „%ìôÄÓü\¤gŒ1æNïœãÓèvÞ³z÷¹Û§´ô@§¿Ã!;N¸ ‘Hxðà¡>¯ïD{þ':E˜¦‰1þÔy!bÇk|–ICâŽ(§Ô{…øçO}׉'>1ºƒ"„(9I1(N8\÷‡JÇ!„$jýñ<Ù‡xüÔ—,y¯;ö*X|æ1æ9þ“Ú=##n÷QòèlŽ,¾"X«îèì7nÂÔÐ „qOãD¦i¦¥¦íر½«³35%íD{þÉE?BÈëõF£ÑS¯ýRJív;;ST’$vnê']ɲå9sœ®ëgºÞÎ)z ¨§_ 9fûã8Îív³ëÃá0j'J(&>DQdg¦™r'©{ü‹ãÅUUYÁ0ŒOm'‰£Ó¾Ù7²,cŒÂá $ /ðÑhìÄ´ŸKaõàeÃ4UUŸØŸy`ŒÙpiš†nć1Žãxžÿ\k¿Ä$ll’t´®®µ­mİa½®‰/bŽ#=Ÿã¯•“ËÞ#[rèÖú{rfŘ·p¡¦éªª2$--457§¥¦fevï¡Æ2Œ·=ö'$|3ø°Ònݶ]Ó´ ãÇ™¦Y]SÛÖÞ>jäMÓâ%I’b±îãëXÃ6 á{Z8Û”Š1kÌ„R"Šâæ­Û’““òrsUM‹_—ËÇÓ4}>_ZjS†Aðü]]]£Ä>Èdú'ýéö¹#‘ˆ¦k<æ %n§"‘»Å©“LJ„É™gÜÝÈâk£»õJ‚ÈK6ŽãLUÃ'Øe%‘mK~RzÏ‚ !’(ª¬|èÇ?]¹fl·€Çãñù|I>BHày¯×›äó¹NY–—¯Z½~ã&Ó4×oØd†Ëéôy½.§!äõz¼^¯Ãáðx< >Z\QY•œœ\WW¿cçNŽãœNGrR’Ë餔:NŸÏçq»›Iø¼^¯×{úí¶ßD8Žëèìììê²Ùl†aØl¶Î®.¿ßÒ“ÉGÓ4A¨­«{éµ×=nwù¡Š'þû?Ó49Žó¸Ý^¯‡çyÃ0AðzS €€ã8ö™Åæ0G)ÍÏË—$‰ÂóN—›ó“^þÉ´~¯]·þö›o*-- …ÃáHäýyóÆèŽ[nilo_³n½ßHKM¹ç®;²l·Ic×c“¤å«V­Y·¾¸¨hæUWþ÷Ù·j5bÄ ^yíõää¤[n¼!?/ÏåraŒç/Z\VV6xР+.»tÞÂ…õõ Í--Æ»tÆô»v¯Z³ÖétÜpݵn—Ë 88„‡C~ëí¥sÞyçùÿ>=°ÿ²òòû|è®Ûo¿ý–›B¡p¯á“Ä»Õg E……Ó¦LÖ }ÿRIë.^S”K.¾xð {÷ï_±r•(ŠwÜz‹,˲lçy¾¢²jÞ‚…²,_?k–Ëå|êÏ644ÐÿÊ+.åõ7@KkÛÕW\6bøðe+VnÛ±£ ?æUWvkú¨ÛàC(ºÿ¯_ß¾×ÏšEq:ë6lí²Ã! ‚ÀqxÑâ%;vî5rÄ%Ó/nmkûxٲƦæé^8rÄpEQ ጹ¸Öu=Éë›0~üs/½ôä€Êv»C–ß¼eëòU«òrso¹ñ†÷çÍý­Ù3¦_|èPÅÌ«¯joïx~Ñ¢ûî¹»º¦fÇÎ]×Íš9oÑ¢Ò²ƒƒ¼üÒKæ-\tôh]rr’ ii©ûöï_¹zÍí·ÜƘ‡ÏñlQ%‹tvvº\®H4"Ërqa1B(Ùmv›d‹Æ¢Í-Íù¹ù!I”ZÛ[@ZzšÓáÔt­¹¥9à$§$çåäy=Þ¦¦&¿ß²I¶ŒŒ Qý~gggQaÑ'%F¶œ¶Ïe(¡¼Í+Bß’’é_øÑÇoÞ²uåêÕééýû–¼öæ[ÕÕ5=ñäˆaÃú•뺿)“õ„“˜„Ã0yž+¯8ô›ßÿá§¿úuù¡Cû”nÛ±c,ü–mÛߟ7oÊäI³ç¾³gß¾ù ­ß¸ù’‹/v8d]×I‚±%nxaF§@0pù%3òrsž{éY¶BuuõÏ<ÿÂø±cvìÚ5÷Ý÷†œž–6jĈ‚¼¼ÍÛ¶í?p`iéÓÏ<ÛÐÔ´lÅÊ@0¸bÕêå+WM›<ùãeË–¯\¹eë¶–ÖÖáC‡r·mÇΗ^}m@ÿ~Ç=“¶æÆm„ÃáÈÉÎq:²,gee¹=nÛSVVÖPßPQQ±mû6·ÛäKr»Ý•••¥e¥¹Ù¹‡#/7¯´¬´üP9‡¹¡C‡¶µµuvv–(=zôhŸ>}222rsr]mÛ¶%''û|>ÛÓ+ù²å‡Êy®çÇfgºZ| „jË š0æÎݳjÕ¡^ ËÈåh®¯%铤èq¢Ÿb·Û÷—–ª¨|ú™gWWoß±“㸼ܜËfLÿñª<|¸³³kÈ S'O¾óöÛ¶lÛn†l·Ûl¶´Ô”m;vŒ=æÂ©SÇŽÅaÜÔÔ¼ÿJ©ÝfËÊÈ5rdAAÏón—{ÛöW^vÙ¤ .˜~Ñ…7oñù|ÆŽ2q¢Ï륄þ¿‡ª®®Ù±kw–yIŸ…0k»Çã~êñÇòóòn½ûžü¼¼§Ìã:Yô&‚LUUí߯ïŸþý{³ßÔ4õù—^&¦yÇ-7ß|à ·gî{ïeffÜpݵwÝq{sKK}}ƒ×ãikkkjj®oh …B‡CSÕæ–æ}ûð<ßÙÕ™•‘9~ÜØóÏ›@MKKýîÝwnØ´éð‘jè‰awgk¬”RUÕú—<üÛÿ{ô÷-)á0v:Ä$²]>t¨BQ”Ò²2¯Ç …g^uÕÀþý-^‹)ÝéM“e’x f ‡ÃÜ{ïî½{Ö­ßäõª¨ †B••æ0‡óór““|_4-77wâyç­Y¿áð‘#7ßxã’¥Ëê/œ:eæMW\zɔɓ¦_tá¦Í[¼Ï”I“Fi—íó.ÊÊ̼dúôX,Ö=à˜8Ìñ=àž3ÂâÚw8æÞíqççççææš†I*1Å.Ûe‡l3‰lÞ²¹_¿~}Kú"iºf·ÛuCw¸N—Ó4Mbžã¡€d—Âá°ÃáˆF£²,'&ï߯II æp·ìçyÌYVÓs„ EÑ3ÒÍ Æïžqá•w}§ð{÷ï(.Lºü²ŽPˆÿäÿ¸f1Ö4mÁG‹ïºíÖÿ÷Ѓ?zèÁµë7´··Cá}Ìy÷Ýœììää了†#ÕÕó}4tÈI’vìÞ]]Sã÷¸vÃúµëÖª¨,-;øö{ïM2Y…p$"ŠâÊÕ«kjj Ã…ãG\´dÉÆM›W¬Z}Þøñ~¿ßD"‘p8ìÜn×Ì«¯ü`Þü}Øí6KúŸ„¢¨²l{ô‘‡ÿý¿?úÈòlSz\Pz‘`ž&„š£G—¯XùîúýI\ ŠâkoÍž3wn ¼næ5 ï¼÷þ+¯¿‘‘–V—·{ÏÞöŽŽì¬¬Üœìëf^sõ³ö•–¾ûÁ‡“'^Àó‚Sºþ@  £Ñh{GGa~þç÷⫯µµ·³USfäI\楔jºŽDº­Ò…ÃᘢB6mÙâóùÜn÷ØÑ£î¹óö¾%ÅMÍM—]2#¦(oÌž#Iúñø€n !‰Å‚¡×ã¹ý–›?˜¿ ³«+//×ãqèßÿö[n:ÂEQC¡ðûί®®žæ6ÚÙÙ9tÈÐaC†%%%544ÈŒã“çåäI’t¬0˜³lýç6ˆÃSxÝàƒ¡ºòC­Τ$ÒÕÅãS…óq³®•—›'ÛeæÕFÛÚÛ¯ºü²”äd6¯·Ùl›·n;ZWÜûÝÖ¶ö¥ËW465eedÞrãõ.—kï¾})ÉÉ™_8Mà…å+W+ª:ñüóL“lÙ¶­0?äˆá#G ?PZf³Ùòór1B×\ueLQ6oÝzþ„ —_zI{GgqQŸäääh,Ö·¤dÕš5[¶m»hÚÔ)“'±¸«åž„®’$>œRªiz/?ÇqÑX´­½-;+»'’%mííM]W^~ÙÈáÊ‹ú”<ØÖÖqÓõ× Ø?';{ÛŽÇßzÓM™™UU’$]qÙ¥k×o(;XîåáÆjš¾}ç΂ü¼aC‡Ê²½¤¨HŒqVfÆüEÕÔÖμêªú37M„i˜]i)iq½®ëÇõ-.&„ €H4–‘žÞ·oñ–mÛ/¾pšÏë[¶reKKkßââ£uuó,JNNºáÚk¹ÇGˆ÷üàu{ãw‰D#9ÙÙ>Ÿ73##99)9)ù¼ñã’|¾Õkש©IOK-êÓÇn·—¼I‰IÈøqcÓRRKŠ‹tÃØ¶cÇ„qã¦_4­³««°  5%¹«Ë?hÀ€Iœ¿k÷ž’âbAXÇéèì@Ùl6ˆa‚ øýþ@0 ÛeÝÐ[[[EQŒD"ÍÍÍ™™™­m­áH8 P Ä$¦i ¼ ËrYY/ð]]]„’–––`0B¡¢*mímíííº¦WTVØíö.Wïä¹´¬TDQ ŽãØz»Ëé²6f?Ç ”ò¼p´¶:§¨8¶?÷â«ý:hhn»ÜÿhCÕ민ûž––f„PrrJâŠ)Çq---è·Þ8ÿ¼ó“}ɺ¡³p·Ë …˜Ó^JJʲ²?ñÔãÿø›l·cŒçôÑ–­Ûþþ—?뺇yž—e™õÞp8ìt80‡M“Äb1¶™‰ ð‘H”âñ¸c±˜a˜’(†Âa—Ë%¼¦é¡PÈíviš¦iºËåŠÅbv›‚0ŽD"–ÊÿÙa:ï‰ÁYl §½£½ô`阑c˜|dÁÛÓ‘Æ¢±h,&Š¢Óá@E"EUív»l·SJƒ¡¥Ôír©šfš¦Ãá „èº®(1‡ì^bѨ(Š‘h!$Ër,“e™˜&ˆD"¬$cM×9<°ÿ@ÖÀXÙìv{(b:d™ñív{8¶Ùl<ÏSJ#‘ˆ(ŠlgfUU™g=¥Ô&Ùjêj  ·@Qö¥Óá0 a.Cn·( ƒ‡CEB©ª*±˜âr:%› †4Móz½º®G"ŸÏ«iZ4C9NA4M …Bn·[Ó4EQÜn·ªª„—ËØÄE’¤ŠÃæÜ.·IL¦ecŒƒÁ aÉÉÉŠªø»ü)©)áÖÖÖh4*I’Çã‰D">ŸRê÷û=OKK‹a¾$Ÿ×ãmimIINÑu½¥¥%--ùÔú’|---JLIIM‘írsKsrRrïä>Ÿ×çG™E¢¯Ç›™‘©ëº%úÏ%XY¿aÝÈ‘#‘ÀU>ò[r’ãž»h[[ç_ÿ‘qÇ}.½lûö­‚(•—(Š2EqïÞ½½=|(¥]]ñÝH€iš<ÏE£QMÓ\N§À ‰D¢Ñ(Ïóº®wuuÅ£™Œ`n×ÁPJ9Œ µµI%EQ8Ž ƒLNaŒ ûÉï÷³¨‚x†gºz¿I „>µÆâë¢lÏËææfÖ Ø‹Ð4­-‹ÿFÃá0ô8æ·wt „‚h4 ЭÜúè , G£ì]wvvrS&i§ ”Ðø’+†ªi±XŒÝ! …Ø&µ Ã0r²s0Ælåœ]sÒäÀu×<‡­Ntn‚1Ö4=˜†!Ûlƒþò熪ª¶êãÂÇOÊÈ0 C7 M;y\äIœ;ãâƒ-!æde=òûß± ¡h,6aÜØ±£GkšÆô¯^â&±“3)ÿ;~’»žu¿^wd,‰ÿõ—'Í%n~'ì…øSüC< ¶{üèÉ–é øøè⸠f÷î _Æw=KŒ°ÅCÂv”Òî;!/¥”íÇ>ôÊ$ñzmÀÀþäJÜæ!¾P|XŠçÓëK_È=Ò…9 Ç…U³Ù3ËðlM bsìWŒ±itÇÄñßý¥†n @@»·>%&aºÇ®9Yrè‰"¶zÓ9 !fZjúÚuk1”A’8ÌкúzCׯ‚ 8ä¤QñŸ~°Bˆ•°?YHºu´Ë7&§ÎÈÄŸípÐv” ­É<Ùê.ôœÿ…Ñévh‰ïM„9Ì<)Ï’eUV$ËÃç!4`ÀÀ¾}û±?™CbªB4>…=±ËóЭR|2‰n‚gPvX|q(Çq†aœA5!dj¦È‹º¡ ¼ð•,äJâ{<0m÷ôÂ$ žçÙ‡3RŒ^P ,”÷tŸa`qa§¸à“z߈ˆpâtøÄÜOñ§ÅÙÛRÉçóÅ”X,;S;dPB%›TÔ§¨­­í«R !)É)”Ò¶ö¶3¥áRJórò¢ÑhGgÛ茣¡„çyŸ×ÇŽ>Ó%²øZøbí—ír]}]CSÃ—Ô Î’ænqR0ƱX,'''+#+ 3«È9›WEŽãl’MÓµîó¾ÌÙ¼@9̉¢N‡“yלþçây^D—Ó¥¨ÊÙÖl’ ¬îiq|VfÖ!CÔOˆúŒ „xŽ?;¦¹'!¾ºkš&sÇ<ƒ%1 c,Ûå¯$Ãø²(ŠgJ±ï“j·]§3BÂG‰ð½œ¾aM×ZÛ[‰I,éB)µÛì^¯—‰€3{3ki݇~E²gPÆÅ»ÏYxÀµeç±8)_vY !¤zm]mÜeÍâl!ÔÕÕ¥ªjfFæÙ³DÿuãŒ?Ú/€…ÅgäK‰þî0úˆcÜ·¸ïÉ.èþ`õˆ3 £«©­ÉHÏ8Óe±°°8+øÒÎp!Ù!I’ª©q¯jv<“]â8Œ “*º‰,è A)•e™m‡p¦ËbaaqVðøA£nS'b¢@µ œIieS$¢—ë“. ºI°%ýO;Ý#®Uñ=ýŸdf‹rŸ¢°#H8¥šÚ%¾¾=2wusG«a-/Ûãöù¯“ê–EÃ<[lÍß>ïùãç<ÇD?ÛŽØ–Š<Ç™„€¦i‚ ÄÄ€^¢„vŸÝí¹ \{Hyì­ƒÍå­Š¯,özGœ7íÍ@äÞË‹­ÓWN?¨‡3] ‹³º·ÒÕÿëߨªªëúè‘#ÇÛÒÚ ‡Âµ×\]×ÐàõxØ><Çq‚ ë:¥Àö2d[ú0éO$‘[´¾ºjo£›VÞ{÷Ø .8oÍÚ­³g¯,>iÓÇŒ1ùaE·Ì>§Kî[XX$Ò½û¦¦iMMM¿üÙOÓSÓ87·¶:ŽòC<Ï+ªúè?þyÛM7 2XÅh4ÚÕÜ’™™º®+D ƒvÙÞmò0)ÝWÖ¤ù;¦Í,¾hê¼à¸lúyÛvT©høôhýc5!»œ»ÝSLžCn—+1U% €-ãÃéǪp ‹D0¥@×ôæææ£uõ¡P8‰657³ó§Nš4pÀ€>øýé]ôæì·ýÀ¨#fÏ}çHM¢(“'^ðÐ÷«ªÆaÌN“@ˆÜ×R•{´£õ-‚`––וWàQ' žâ,N+`mäbaaÑÛ´™„ø|Þû¾sOfF|¸`Ýf7MC%›Í¦ëšËéÄCA»dã8îûß»/9) !”ž–f·Û»OB! &¹ñò1«7V®ÝÒÔÒ¾µ(ß··´Ñ#¢­¦lK׌ó‡òÖÙ§¸ô·°°°€c‡hQ ‡Á ?P5Í0ÌH4’‘žñînß¹s@ÿþÿ×ãÛwì¸òòË¢±XWW%D’¤H$‹Å(ó EÝ«¾ºi¦'{ÿõÛkÇMrW·Ö¿·t§&(ˆß'FK•îyù¥DQ¤=§/Yœ>,Ç~ ‹Ðúõë‡FëêësrrDA@uùýáp8=-móÖ­}KJ’’’öìÙ[Ÿ——›[z°¼¢²2##}Ø! >Ÿ˜¡´° 0~î3!TxM7×5#Ñôd¯ÌÿááukV¦§g­Z·AÓ´3µeü·–²ò²ìÌldéþßbâDz£õë×6LÓ4»ÝÎŽÀf§‰r§ëºÃáPUÕ0 §Ã¡¨ªªªv»]’DÃ0£Ñ(Û&·¥µs¸ ¯@×õÄ“]Â<ÏAO@$™3û­Ì̬˯¸"ñJ‹¯Vÿe˲2³,Ñoañm&.ú…tE£Q&ŽB†a°ýǃÁ `!ÄNüˆÅb€1VEÝÆ„D±Â²Ò h÷Þmv»ý»÷ÞG)5MÓ’û§ËÞcaaÑ‹c¢?QÇ…xüË¿æ«CÆýô{)•\Ÿ”RMÓî  ú­…RŠ1¶ô} ‹8_J #@”Rs¦aÇq§–/gð@ðo9º¡µ¼û-,,ºù² ¸iš.—«½£½¦¶†¹îœé'²è B(»ÝnŒ1Û¦ÉÂÂâ[ÎW±i3B©)©±XÌ: ñì„êõxEQ´ä¾……ã+ýLÓw:œ–Ü?kaDzŸéRXXXœ-|5+®”Y“-ÎV,+¿……E"'ý”ÆÇùç|,ár–bJ©u<²……Å1N"ú)€$ ˜Fši‰‹s·ã9¤›–ÁçI|ÆfùPœNÎù‰roÑO)Ø´®*6w¯Ò¡pìtu‹o(LVùè&:3½"±^æ7x¤y:9ç—ÇNÐú„ÎÝÚ'5Ç'–´ø&C)<ÚYœ·/rïµ%ã¬Cr¾i‚àq{E GÂgº,ß"l6›Óá<‡¥ÿq¢Ÿjòë2ÄŸLqš ÈR4¾ÙðL*ð>òNM}QÁ†Á2|ÃP5µ¡±!d³ÙÎtY¾E4·6§¥¤¥¥¦«Òÿx­Ÿ +f&˘šÔ çº¹ëœ‡Eð3ÃçLI÷I’Ͳã0 s÷þÝE…EɾdBÏM1t¶†‚G릥¦é²|]ôÖú1F¨á“ÄadšÖùéßh˜µÎ!"ÃŒ™n3‰%ú¿IPJ%Ir:œaEULÓ<Ó%ú€(ˆ‚Hš¦y®®÷/ú)å1 ÄŒ¯ õò×d ãg©¶Kðg/ýlž¡lCéøŸÝR~>oÁ>µ_  P“_¸<§NHé9ž»ÈÉ" )f²“'ú±©Üg¼ûWRi'/gó==S}ì <à×ýó ¢(*ªâp8â }ˆytê Y‹í¾ àLés‰ÅøÂ•Æ>|á¦ò©§{- QQ‡ì8'm>'Yæi†ËÆöY;&“Ù&þl?çOÍT„¸zr ƒI‡1p÷ë'…ã¸Ä à(¥Ÿ¥0½r „˜„ĆÏï3—X BÈPÄAˆwƒxrÖ¼XË‹ËîS×p¯’ÇSI’He9JËÓM̶YíÙËSEMÓN]TJ©(&!,óSÔÕ±ñæ3Ô*¥”ã8Ùf£”PJ1æLÓTUõsU#»ÓËâåó¾M„ ºÞ; ñ¯€íxŽèºÁqØ0ºCB)Púß (Іaôò c©Àf³™¦ÉJEŠ‚Øý¹GÖÛl;äZ×uÖ xžg­±×M)¥’$ò¼@AcvÇç’ž!Bi\2"„>o¿¡” ‚  ªª~^…šRʪ…õ”xòxU³>u ?¨“¾ëÄT²,kšoQæ4Ms:œ_Ÿös9Nôc„` ; *-“û`0¦§¥±êŽ+&lS0&¹™(¯ohHMIa_J’dš&¥ÀqLÖþXó•$EQ9Çb1žçyžgÒ*ÞyºK…1ð<ßÖÞ^SSãp8BáH$#==3#ƒù½±aÄa¦l§b椅1ÆE¢QQl6›ªi@Ó4 ‰¢iš¬ð‰²819˜OÇ…B¡£uõ†¡›„äçåù¼^Ã4Çq&!”Ò^ùÄuCVQ¢(Î_¸( ÝxýuÁ`Ðår±ËØxÀ±‘$IÓ4–ŠÕKN)eÖ74$ù|6Û1Û=!D’$UUEQ|îÅ—Š‹Š.œ:EÓ4ÀÉÇb@mÄ4)vîBccSjjJb¶ì©iÏ8Œâ8®¡©É!Ë¢(êºÎú^|hBH\‹”íö˜¢ÄÇcQY °wÏŸý‰1…Ã{÷íEç…h4êr9³³³Ø"4BˆÉDœ Ä+ýÄqœ¢ª!—Ó©†®ëìÖ6›]ƒÄÁ‰Éã"L7ŒÎ¦¦Ô”8~^ˇÂÔ…Ä eY^üñÇápäÊË/ …ÂN§ƒ©H¢( „b1cOަ”$ö&VÍ--GE’ ÈÛíöX,& Â+¯¿QŸ7eÒÄH4†ây> 3ÉŽ1Öu½êðaUÕLÓHMMõy½ …ìv»C– Ã` žÝŽçùêšÚŽŽ‡Ãaš¦ªjÙY™çXÇÀÇ¿£xŒËDUUm6›ÝnD"cUÕxž;u‡'gÅà0nimmmk#&AåççÙ$)®îôÒ{…R\¬Û$é•×^/,,5b¸ªjv{÷¢·Íf3 CÓ4žçl6[$MT>zÞ;¥@MÃèòûSSºÛ|ü6›-‹BžyáÅ]XR\¬ª*ÏócUUÏ=¡ßýšŽûƒ¢Œ¨ÛÎ…øé¬%=óÜ ×Ý|K$agxI’$IÏól<—$É&IÇiºþ»?>×oÜ´rõžçA°Ù$–Ê&I’$‰¢¨ªêò•«0F‚ Ì}ïýÒ²ƒ<Ï‹¢(Ik.R¬ï!„ªª¿õö;ÿù/?ÿÍÿ½ýÎ{»÷ìe÷ÙÝm’$Š˜DQ°Ùl¢(š„¼òÚë]~ÿº ƒÁ  +V¯^µ¦§„=ן49Ë™Õê5kü?zïÃy¯¾þfMm-Ïó’(J’âÉòa%B¼žkjk[ÛÚ?ZòñÜ÷ÞE‘ã8QËUìÙ·Ïf³ñ<¿jõšp$Â~J¬çxµüõŸÿª<|˜ã¸x f©Bá0,?ÔÔÜ̾g¯0ÉÁ+š©&¡„ÉÇõ›6Ý|ç]‡««žgâÌívÛívÃ0xžwȲÇíæ8Žçùg_xñ`ù¡Ú£u }ÄüL|^¯M’ÀíryÝn¦Í­^·^Ó´”ääu6nØ´Yày›ÍÆ21MS–e—Óév»9Ž3LcÜÙÙ9oáÂ^~õ7øÃólܼY¶Ù]N§l·Ûl6ŸÇãp8Øxæt:=n·(†apçq»‡ ó,lhlÜ»ÿ@CccfFFYyùÂÅK˜fçõ¸™Z}Òä.§“9Ës×ÚÒú·=®(ŠÃáp:lSQW¯[o†ÓéÐ4ME¯Ç#ŠS9BGëêÛÚ;–¯\µhÉ’ÌŒt‘çm6[eÕ‘¥SSRXm†áp80F‡ìq»ÙDât:]NçSÿ{öÈ‘jAàÙ—L'X³n½a.·»¢²ª¥¥!LLÓ4MžçUUe¢_„šÚ£¿ø¿ßÍ[¸pλïU>¼iËÖí;w½úÆ›»÷ìçyŸ×ˆ^ö6wíÞóÁüüË£OþïÙù‹Õ76ºÝn—Ë%Š¢ËéôzÜLíp8.—‹é"„»ÝæõzG[[û»|¨ªêª5ke»]–å‹>*?T!ð¼C–Ý.œ4¹Ïë•$‰¢ëºìçÌ}÷oÿ|lÑ’%Î_ÐÕÕåp8œ‡,Ë„§Ó‘˜ÛårȲÝn÷¸Ýl€!„B‡*«Âáð³çìÝ¿/#=cl·Û¶ïÜÙÔÜœ’’¢iúÊÕk‡Àó‚ 8·ÛÍalMòz5M{ü‰§B¡0$¸í›¦¹rõ‡ÃÁq\YÙÁ`(fϸ¥jê¹NÁÝsÏ=lŽƒ1R4óhGlh~2Ï3õ‚>X°Àn·{Üž¾%%µGî?p`ûŽ’$¥¦¤”—Ú_z`×î=ééiN‡cɲeS&M–írVVæª5kW­^íóyuÃxïƒ÷ìÛWŸ·~㦿?öÆ(';›˜$##Ýëñ¬Xµª´ì`^n¡dÓ–­;wíÚ·aAS6³²2/¿ôUU““’ùÃï232vîÞµwßþX,v ìàÒå+ˆIrsr¶lÛ¾wß¾›·d¦gx<îʪ# }†r²³Uíêêúë?þá÷ûórsEQtØå¬¬Ì-Û¶mݶ=É—äñ¸7oÙºwßþã’ôQ ÌÏË#„ð<_ZVæñxþø»ßΘ~qNvöÞýû”–ª¨(.*Ú¶cÇæ­[“{òÙ²m{yù!Ó4.úcœ•Å´Èô´´ñcÇì/-Ûºm{ggg ÌÍÉþóßþ¶jͺìÌÌÖ¶Ö‡ÿü—@ ••‹ÅvïÙ³cç.VϦi.]±båêµ¥e/š6•M­@„½ûöýþ‘?C¡ŒôŒñcÇ”»\N¦÷p Å´–Î`¶W4L @ !Î_ I1ɘQ#›š[”–îÚ½' ææäÔ=z ´lÇî]Æ™éékÖ¯/,ÈOKIÕt­° `מ=/[ÎÎì\üñÒM[¶zÜî¦ææþû‰Î®.ÇÍFúÌÌÌ­ÛwlÛ¾Ãírº\®m;vìÛ`óÖmÉÉIN‡CÓ4‡,_qÙ%^§££ó¯z¸¸¨h÷ž½û”¶´µ665-Yº¬­½-?/¯´ìà¾ýÖoØ(BzZZKk뒥˪kj232tM×tý…—_­¨¬t:.§“Ò§°à`yùÚõ(…ÌŒô½ûöí;PÚ;ymMfFÓ0ÁÀÎ]»/8oÂÒÒ=ûömÚ¼%++«ººú±ÿ<ÙÙÕåt8332JË®[¿RSSuÃ0M399iØÐ!‡*+öìÝWßÐÐ夦¤<ùÌ36mv»]­­mO<ýߎÎNŸ×‹ÅöîÝ¿c÷s)Éɺ®¯Z³víú •‡Ÿ7~¬ÏçcJº( û”>þÔÓ]‡þ˜Ã8--Í4MMÓú–_yùe•U‡ÏŸ0þ§ÿHd÷î=ûKhº¾yë¶›7ËvÙn·oݾm×î=ûÈÊÌ”$iÏÞ}ËW­¦„z½Ã0UT¼ôê몦%'%™„¤¤$;Ž5ëÖ(;˜‘žnšæÖí;NH¾Š’š’Âæ‹›·l9oü¸ŸÿäGãÆŽxa×î=ÊJ››[22Ò×®ßp ¬Œå³eÛöÍÛ¶546utv,]±Âãv{ÝnÓ4MÓÌÎÎؿ߆M›kêêUTœˆ¢°|åê^yU×µ$Ÿoøða™q]“Y¥|^_ÜwnÀq\KKËqÐM‚uØxJMQBÛvì,.*zð{ß[¾r%|´äã^~¥½£ã·ÿ±±©éÕ7ßZ´xIeÕáß>üGv”£M²­]¿a÷Þ=ó.œ·`Çó±˜â÷û ¹¥å¯ÿøg8¡££!4Ñ¢ª#Gžúß3kÖ­?X~èÏý{}Cã#y4®^·î¥W_‹Û”À4LÓ4€‰È²òò. µ­Íëõüç©§wîÚýŸ§ž*¯¨¨©©}üÉ'[ZZ~ò‹_"Œý~¿¢(sß{¯¾±Q’lþ@€Rº~ÃÆ]{ö,XôÑoÍikoÿý#­«ûמ8t|rŒpW—?~ž°$‰+V¯þÙ¯~ýÓ_ü2 ½öÆ[sÞyG×Wßxó­·ç¶·wôäóŸæææõ7þóßOØeû_þþææA ÃÈÍÉIJJ¢”ú¯×ûôÿžÙ³wŸ$I†¡û~EQ9žó¡Å/}á¥îznjnž3÷%/KKMQUõ„\°jQ•ãùP(Ž„ûfd¤›æ1s³Ï)&1 “^GjjTMûåO~¼ïÀH4ZYUõÌ /úýþç_zeç®Ý›·lýλÿ~êéÊÇyžç0WYuxãæ-;vîzsÎÛA8ŽD£ÁPˆRúô3Ï­¯—D1˜&Ù¶cçÒ²–|üáü?õt]]ý‹¯¼zøÈ‘úúúg_x±{ÅÅ4cјª©†iÄbŠªªÏ¾øÒÖmÛC¡pcS³Ûíž¿ð£uë7Ì[¸hͺuš¦=õ̳íû×c­­­±˜¢¨êêµëÊ–‹¢ÆE­:|dãæÍ;vîzáåWÃáð3/¼p ´ìà ׮[|ò6EQCá0êQý¥¦Iþ÷ü‹‡T×54<÷ÂK†a`Œƒ ¥dë¶í/¾òj8~öÅ—vîÚ-‰¢ªªéé¹ÙÙ„@(èp8^kö²2 Ãðû1%Æq\ ¤”®^³îíwßëèèxì‰'ç/úhõºu>¯—ƒÍ$+D,ã0‡C¡p¸OaAJr²®ÌÇÞ£ªª”›TVVýú÷øÉ/~YQYµÿ@éÖí;xžçy®¢ªêÕ7Þr9¯½9»¼¢BBˆ¦i±hÔ0uEUMÓ,+;øßçžojnioï…ÄÐÿ½ð¡ʊÿ>û|$Ù¸yóÂÅKöíßÿÔ3ÏÚm¶ŽÎή®®…}ŽDxžëê좄®Xµºº¦öÕ7Þܼm[åáÃO?û\cSóSÿ{&&&—íöÖÖ6VÃÄ41æÞûpÞ~ü³ýç UUž{éåÍ[·GbÑç^|yë¶í•UUO?û\ccÓÓÏ>Gy÷ý>^¶<Sž~æYM×@×õÂüü”ädÝУ‘Fø¿Ï½ÐÚÖÆqœSÁ ªªÇuvv"@sÞywÕšuÕÕÕ=ñT(zñÕW«v:œª¦±jgoÞ4ILQxŽc¼I ³˜±kxŽg3§sIîÇ9Þàƒª›<@8îÈ, «×®Ý¹k×ò•«ö(Æb’$;öþ{¿;é‚ æ-Xèq»f\|ѯ~þS·ËµzÍ—Ó…0r:ähLY»nýÏ~ô£»ï¸}ÐÀÙÙÙ.—Ë4ŒúÆÆ!ƒÝïwS’“GíÑ£å‡*þï—¿øåÏ~ …¶nÛ>|ø°Ûo½eæUW5467>!—zÅEE?zèÁ©“'æçG"ÝÐTWçæäÜ|Ãõ÷ÜyGW—ßn·1¼¦¦¦ ?Ïn·cŒÇÓ§°ðö[nÎÏËcóèå«V=ôÀ÷¸ï޼ܼE‹—õ¹éøäÕµ5ùyyRiR×aC?ôÀß½û.—Ëe³I·Þ|ÓUW\¾nÆ¿w_<Ÿ¢>}n½ùÆ‹/¼°0?ÿÖ›nòz<-­­Ð—†aL7öš«®ìÓ§PÓµ ãÆ;ö’éÓÇŽÍJXŸ¯ªêyÆßïw§NžüÊkoìÚ³çG?xhÖ5Wä³Zf%€1£GÞ~ËÍÆ Ñ4í˜Á%Ôi(¥ºi†.ŠÂÎ]»ËU|ôñÒššÚòC˜ãŠú>xÿ÷n¾áºe+Wš„Œ1ìW?ÿé¨#–¯\%IBˆ8IW®^sÕe—=pïwÇër:ÓÓÒ4MëèìÌÎÌ,,(¸éúëF†hš¶aÓæ;o»åW?ÿYNVÖªµkssr®¾âò¯¿. G£Q&Ñ%”Rˆbšf’ÏwëÍ7^6czaA¾¢(¡êÚZ‡C¾øÂ ïºãvŽãÃáðˆaÃZÛÚ7ßxý%Ó§×54ddddee657çåæP ’$3:;;û»÷Ü••i³IU‡üðûüò§?‡#»÷îí߯ßÍ×_×+y~nŽišÄ4 !&1ÇŒuû-7_:ýbJ©×ë¹çŽÛõPQUùÃïßÿËŸý$ŽìÞ·¯_ß’[oºaèÁû÷¿ý–›E ‡»M4Š¢°f?yâwÜz ³ìõï×wúÅ]:ýâáC‡æädß{ÏÝ99Y”Ò)“&>üÛÿóy=o¿÷~—ßÿÃï?pù¥3Ü.§®ëÇaŒ™avìèQÙÙY÷Þ}WNvv JLŒ±®é&97ý;‰~JÄT=É! ø§”Š¢ÐÜÜ\]S{ÝÌ™N›š““³tÙr»ÝSbP]S“¥†¦ÐÞÑ‘Z[Û"‘(Çqv›}Ëö튢¥Oýï™}û÷O™·gï>Œq$Q5íPeUíÑ:–UFzziYYyyùÁòòœì,EQBÇ'¿túÅO?ûüž½{%Q4 Ã$¦ªj&!JL †BÁ`ˆP¢ªj4=PZÖÖÞ‘•™y ¬¬¼¼¼¼üPNv6“ lõX×p$ÒÕå×4M×uMÓjÖUTV*ªEKËÊZZ[BÑh¬¹¥ùh]}nN¶$‰;÷ì®ohèìꢔ¶¶µ566566·´´Fc±X,VZv°µµ­{EºG±U7]Ó)¥„P]×yž/)îÓ·¤Ø!;b±˜®𦵴¶J¢äv»F ú“þ`ø°¡q¡I(ÕtÍÐ T×õH$jÆ’e˼tì˜Ql‰.‹Áh4ªkšËéüÞ=w#„þþ¯Ç C)Š¢¨@`ÿÒP8‹)²Ã1Þ¹{Ï®Ý{%–’œ ƒ¡P¯ä{ìqæ@(ÑT5%)i@¿¾ùyy”REQ  ðŸO0U‰Åb@à¸æB)¡TÓ´P8ìLÃÐ4]UÕŠÊÊšÚ£º¡ü}ƒ! FkíìììS¯Ä”]{÷645…ÂaÓ4›š››šš›ÚÚÛUU ‚û”ƒA„ ·è7trŽî{xœ‡¤¨šÏa‡„…u(?T1|ØÐY×\ ”»v''ûV®^ÓÒÒêõz¯¾âŠÍ[¶¾9{ÎÊU«Ï?o„qãÖ¬]ÿüK/÷ë[’š’rÅ¥—üퟭ߰ñÎÛn:iÒ›sæ,[±²¸¨O~nî”I“žþß³zø÷999ùùyÜûÝW^ƒr×m· èßÕš5àñx²23!Á999‰6›­ ?Ÿ’Ÿ—;hà€·ßy×átdfddgeÙ$›ÎE……Í--Ͼð¥ôš«®LIIÉÌÈðz=³®¾êõ·æäæä˜„\?kÖ¿Ÿ|êw?2iâÄé]¸qÓfÙnS5.!9\sÕ•)ÉÉl®íóz™›“I“ív»àÿ=øàK¯½¶cgw>ë7n´Ùl^owùórsí6; ŒHINxr²sxžŸ~Ñ…«Ö¬}þ¥—üÃ̺暷ßy·° Àãv¿9çí¦¦fŸÏ{ýµ³øŸ§ÿ»{Ï^·Ûíq»Ÿ{éåÊÊJžç=ÏoõËfÍšóÎ;^¯÷¼ñã˜É‚ÕsápÙ…ˆ¢%{]Õ5µn·ëº™W»\îÔ””÷?œŽT×<òèßLÓüÁ÷/]¾bóÖmmí.§cÚäIŠ¢,]¾b¸±©))—N¿ø…W^}ôŸÿºà¼ }KŠ·ïÜõñòåéiin—kʤI ?Zœ•™‘–’B)½hÚÔ7fÏ)-;8bÄðñcÆìÚ½G„PFzºI¢”Pj†d“ÒÓR à„d²…;›mİ¡k7lÐ4­¤¨¨•ã²L)ÍÊÈÔ5ýõÙsÁàèQ#³³²½(ŠS'Ozñ•WW®^íóú\Nç•—]úÆœ·ÿùï'23Ò/¿ä’×ßšÍÜáãɃÁàè‘#rsrUAcŒ32ÒÒŒô4žã 5%•çù §LùxÙ2¯Çsý¬™¯¿5ûŸÿ~"++óÊË.D"lÊ¢ëšÇíÆ†‘–šŠ;fô–mÛßyÿƒ»n¿mÚ”)‹?^–‘žá°Û?Z»®µ­ÝårNŸvaQaá›oÏ-;X.Ûe»ÝöÎ{ÔÖå9ÞétÜ{÷]M›ºøã¥Y5rD¢o Á!¤é!Ä0 AÒRR£Ñ[:òz=Ù‘œä›¿è£‡îÿÞ€~ýÞyÿ¯Çsåå—¹]Îî)¦®§$';NUQv{ZjŠ¢ªÅ}úìÞ³çãå+ÒÓÓÝNgzj¥T–í™ËË?X°P„iS§H¢˜ìKJKM=rÄì¹s¿ß}i©)™éé×ͺfþÂE„Ð+.»¬OaA’Ï×+¹(ˆMŠ˜£jRR’Ýn…C1E¡„d¦gBn—ë†ëf-_¹Ú4ÍÄ||^ŸËåBef¤S8&‘u]OMIq9œ„6ã™6eòko¼µlÅÊË.™1jĈÙoÏ}èþï ?ÑG›¶l½¾g>©kvähªG6L¼›Ù­Ýn÷ÊÕk¶nß~ß=w3W–—_{Ã0ëgÍdý!UÕ˜ç"p …$QdqFºn¸].¦‡2]‰ùaŒ1FºnH¢¨jóóaÉ£1؆”†a Žç{Ü p t»\P`åñü#Ѩ×ã‰?)«6Ô!„€R^TU•$I×õ¸CúñÉÝÌhÎ꜕­W Ù³³ï™ae˜ø™Å€)¬­²gaeÐuÝåt¾þÖÝÐYe=W*Š"÷Ø”}äã!½Þ Çqþ€ß4Í$_»Qb5Æ£LTU^ÅP(ÄŠ˜Ïó”µ`̺LâdÈþem•¹êz\.M×Yå°•*V™ìO&ŽAÐ4ç8ýÄänw<\#^]ñò0ÎL©½òaBxŽ3Žaau/Fb¶Ïkºn·Û{âÉ¡ƒ_pÞ¼"I’¢(„»Í¦ë:fAè–ì¹NìPæÚ:Û²³²““’Ï™8j•²wïÞãµ~„tCwÚ%8>^.1êÁ0 ธ¢ @¬Kð<‰Dç8ŽÙјb·s!!¦y™¦ép8 '#¾nÎþŒÇM°ïã_ö {I|=ñ|8Žs»\½²e˜oeâO‰1 0аkz…Š$&O¬ce ï›Ü+ŸîÕé“ÅÚôú)2cš&%$±žYÅbbŒív{bS<·OŒ‘A\²è°¥-ÓTºNº¡©ª®kªªº]®`(¤iš¢©!—ÓÙå÷³òpf}ƒåÇ<²™9^ÅX,ÆbýŽSzZT8éî±ö“XH&æºêÑs)¥YN 7c‹œìW§Ã—&‰Ã|‚M\GE£ÑON®%¶pV¤^%Œ)Jüq˜&È2L,||ð`™'j †¢0ñSbãxe²ÌyžWzòO$v²/Y@/ÆÝ9°»$VcüÁ9¦©G£Ì“¸—´b•¯(få‹¿ÁxEÅ¢ /7~Sö¼lìAiš´^É#Ñ(>¾œñbÇßH4c¡Ü'ÍçÄUÖøƒô*膔bF£QŽÃ²Ý9Žcáã“ÖðIrãoSQ_¯— ÿ𦥧¥€®¾M2,NÄ4ͯª21†aœ3f‡¯BHnnóËü’Y%ο‰œ(:âÆžÍƒ˜õPQUCÿ)gµÇ-Ýqãò9òp–pb=á|@yŒLUÕNÜø7Áè ›A[|I¾ªÊdª³¯Z:Ö§ò•(éáxìÅ74¦cŒÑ„S:Ø®<c¾¹¥™îïÞjCQ”‚¼&hN]qñŠˆÇ|ég<7éUÏ_†$¯7#-µ­­EíŸé'³øÜpQ"Ø:=é4B)¥@:x¦ òÑ4­[î³ß#E:Û;ùP84©dRJrJâ^ƒ–(?'>tø™.‚…Å7o¨ªD©¨¨ˆ{Ísˆ …CuÑ:>~Üs/‘³‡somÝÂâ¬Âêb§æZ9Lâ3S!ó÷u:ÌÁ cÌù|ÝXíÒÂâkÅêbç0Ä$•‡³øÿ¢>…¹Ù9Ýîì'¹4!lúSóý,G¬|¾îü-,,¬.vNÂb9#±hSK <ªoh4Ìî †“hýŸk-û4( V»´°øZ±ºØ¹ ¥,ªclè:íÙ—³·è7 cÁÂy~BhàÀÁcFMtøéµBh箑HxÒÄ)ñHÔÄÉc¯‰ä›W&z&YXX|åX¢ÿÜ&¾mAâk>‰Ö_QyhÌè±wé²%‡sð ÁpüY£(áÔÀöö6¶Å&BÈ$&F8¾' 퉇fGo©³˜-,,¾¬.ö-ä$¢ßf³‹be;lÙºyÿ}ã©S¦õ)^ºlIuMµ,Ë3¯žÅ€­Û¶”•ðz}—\r™ªª Í'&ÉÏÏÐàÒeKAðü“'N4hðçÖý­fiañub‰þo!'5ë£ææ¦¦æFÇsäÈáÆ¦Æ­Û6_vÉå#†\¹jùÚukjÖÜtÃÍ©)©‹—,2MSŶ¶Öuë×—ô­o¨[¾|©Ïë:xhjjêÎ];êêŽCÁ ÎÐà–m›?¯Ü·–y-,¾n¬.ö-¤·èG1'OšrÍU³ôXu¸* ¼‘‘™••­ëzGg»Ëéöz}ééáH„L‡B!„ª(}Kúö9x°l×î.—[–e]×ív9==#''}Ÿ³©¸ñçòAúì9÷|y\¶§Øþ©WIzF©SU§.|ükÀ³8œ¸œo¨q3q¯v›Ø/¾dse™Æ+O¼û']ùyË–øŒ_^¶œýô6øBMÓœýö[’$ ‚pá´‹KJúîÙ»ë•W_Ô4møðÇœû_y!\zÉ媢|8ÿýÔ”ÔÜœ¼–ÖQúô)V¥Ë߇E1L#‹“hšª(±/`ìïÕ.¿Âг“惎”?…¿Ó'•ä¥;uá{`aqz8QÌõj¨'¶ÛÄ~ñ%›ëgïÑñË>Õ ñ t¥³6¦õk¢·èçyþ–›oÓ4㸤¤d§Ã ×\}mSs“(™pó·4·´¸Ýîä¤dÃ0î¼ýÇ3|ÄÈ#G†‘‘žáv».§®ëÇp:ÅÅ}í²½° ORR2Ï ð9ÛJ¼]2'¢]»vìÚ³ c‹E‡ Êœ‹â¯R âûkŸÂ¾‹E5Móx¼‰_꺾äãFŽ•“ ]]]k×­¾ø¢ì¼ï&‚®©©^½f%PU%7'OÅôôŒ´Ô´»v\qùU(;W%‰~÷Þ]„P·Û}Áù³³r³õû»$Éf·ÛwîÚ …¦LžjÅÚXœE?krå‡nݺYÓµ‚ü‹/šQS[½jõJPU53#óš«gÍ}gÎäÉS2Ò3 ªªr÷Þ]×_{c¯LNz£]þêê×®[}ÍU³Øa'½8îO¨(ʰ¡Ãæ/øðª+gºzŽfêuBˆßïw¹\‚ ,^²(==cÔÈÑ'uALÌ|ÑG ëNP† 6ñ‚IñT'^ÿ©æ,çDƒÊÎÊ),è“—›ït8»·÷äù¼Ü<&÷)¥v»\XP˜œ”Ì6ËÍÍs»=’( è?pÈà¡ì´Â‚>}Kúeee»Ýž¬Ì,s²,gfd~çÎãU’úÆzUUΛpþØ1ãóòò)¥uïkØ}ä=¶“hÜÝŽ?vïÙýá¼Là@ !F%ª¦¶šh š¦V׉©âÙ²uvu6·4=vì˜ñ%%ý222SSÓü~ÿÑ£µ€%žC/|,›4q² Îû ‹"„ CgåÿÃ÷öîÛmm­MÍ`a-N ‰æ„PíÑÚ…‹æô:d|--ÍcG7f\ÿþLÓ<|¤*í>àÅåvä@‚á‰ý.¾;,ûœx÷]»wìÙ³»´ìôÝÈZï¹ímm v»\XØGºÕÖ¸ñ‡m± ¡pè­9oÔ××;c züéëÕ¹òó †  t]1|dZZ$^ëÉð|bûI<|z=RÏgÊþJIÏŽpݻá“€˜x†ÑgçDSÀ ‡Óårq˜ËÊÌÚ±s{yyÙÌ™×½=÷­qc'ô-é÷Ñâ…~×ÀƒÇ›ÐÔÜ´bå²p8Ü·¤/2 }ÆôKç¾;§¸¨ø`yYWWç˯½4uÊ´Ò²¾¤¤É§8dÇê5«Ö®[=fôØü¼BQ^hmk]±b™®kãÆMèßo+Çq²,»Ün›¦gdd¬ß¸cl·ÙQ€Cå[¶lEqòäiY™Y=ƒ¨àrºR’Sì6»(Š]®{_UÕ’¢›ÝÖÞÞ¶uÛæ¶öV—ÓÕØØðâËÏɲãê+¯q8œß\åÂâì§·†A);.qèa6›šº®éÉÉÉ!›ÍW‡CÁ`]]ÝÐ!ÃçÍß4‰ßß5rĨ>}Š~´à®;îÙ¹{GKssffÖÁƒe3¯¹vî;³G;lèp¦PwvvtuuMž4åСƒcÇŒëìê\¸pÏóápxÆôK`Õê¼ ˜†1kæu’Í&ªŠª*ÕÕGF ÕÖÖúñÒÅáp¸_¿þy¹ùë7®CÆhïh‹DB‹/2xˆ®ë†i.[þqMmµÝ._}åÌCå¥e¨(ˆW_5ÓétQJ‚jmks9ÆŸ_YUñÜ ÏÜ~ëÏ¿=wö€þ«WêºF¦M½¨_ßþË–/­««ÍËËŸ2ešÀ gú~nNb2‹oúóIÆ>„êñßö¹çK-/cJ;¾Yò<ßÐP·`áüE‹”*3z¬Ýnþ…g2Ò3‡ ºjõŠ–Ö–’’¾/]\__·fíªÔ”Ô›n¸yäˆQªª°£ÝÁ€Ëé8pPrRòµ3¯ÏÍÍë×·A~aeeEiÙŽãF3cúe›6m¬=ZÃNd]±bš––öÁ‡ï)ŠÂŽå8. |´xá‚EóÊ–ùýþ@ €â0‡ÃË–/MMM#„Ì_ðA¼ðÏ×Õ×½ýΜ.×ÕW^“žž>xààŒôŒÍ[7¹\ìaCG\vé¦i&'%Ϻæº@ PZzàL7‹sž.ÆT´üü‚»î¸§©¹ñåW_\´xð</Y´ð£ù{÷íéuÐt,mimAµw´—”ô4iÊ®=;Û;Ú5U¥”êºF#Ëòó/<“‘‘9,aÙŠÊ %>lDCcCcSÏqííçŸ?qìØñËV,moo‹*±+.¿*+;{ÉÒÅ„˜a]Ó[Z[%¶lÅÒÔ´´›n¼uÈa)©©C‡ “eyƵ…}¼^ßÔÉÓ.8RSs“ªª¥eªWÝxý-))©/ý(QJ¯¹úÚ`(XZVÚ]”€®ëlêPXÐGÓÔ#ÕGêŽU%?¯ ©©qâ“ÆŽ¿zÍÊõÖ–,8`ÐÖm[öìÙ ŸaåùlãäZüó©…53¶Ä7>µfú…õÖ^˼ªª8xæÕׯë:;;gûŽí“'N€`(Èq!tÜØñ”ÒH$Ò¿_Ÿ/‰=‹®ë€EÑ&Ù0ÆIIIMM7m(**öz½š¦aŽóz½ùãP(ˆ0V55¦Dm’ÝnwŒ9Æ0»§«º®§¥¥ïÞï³G;|¤JBLˆÆ¢¦a躞‘‘™““?5WUÕAͼæ:¶{êÒý;wï,..aáÇ9d™ÃPp¹ÝIIÉi©iŠªœÞ&añ­#±‹!„"‘0Ïó×μ¾ºæÈk¯¿2fô8„PZjÚýß{5uÓ40ŽŸ¹ ˜ã$QAÓRÓ|>ŸÍf7tÝ$&!#Ľ²²²¶mß:yòèY·£”ª(ïòw½ÿỆ¡ï?°üØñ’$¥¥¥{ÜžÍ[6jºæ)É)9Ù¹ õ†nP #›Íf˜f,KOK÷ù|°nýšºººŒÌÌöövI’Ân›çyçA…‚N§Óëõf¤g656¤¤¤y½>Ÿ×—–š®öô/6‰Á¸{cžçÇŽ¿{÷NYv 2Ìn· ‚/X{{» ðŠªŒ1ÊëñÂ7Ð5ã$¢ÿs­‰ö„_¸jzÍF1‡woßÙØØ Æ;¯¨Oñ¶m[o¼áæÕkV&%'3~ñ’Eí”BZZúØ1ãÖ¬]µk×ÎÜÜü¢¢â…‹æ¿5ç@  iZvVöšµ«^|é¹>}Šc±h(ŒF£†a躶jõŠÕkVfdfŽ1z÷ž]6¬-**9t¨¼««Ãn—e»ÜÓLvT7ûSUUUSSRRöïß[\\ÒÚÖjFFFÇqL•ÐtM‰Åâ¥(Šßß ‡c±(ä忝\½¢¹¥™å¬H§§)X|kéåIq´îèû¼k·Û)¥C† ÍHÏhmi®«?úÔÿ£(JvvÎM7ÜbÆÜwßEQ¥~}û¦A ‰Å¢º¡† SSÓ<﫯½d˜fjJjUUåöÛn¼þæ5ëV¹œî¾}ûÀá#Uí÷Ü}oZjÚž½»W­^QܧˆòÁïCÁáÃF¦¥¥mظ~öœ7ÛÚÛfL¿Ô0ô…‹æ‹‚¨(ŠÝn7vüê5+wïÞ•••Cˆú].W4±Ûì©©©sß™3jähÃ4#ÑÈçM,-=Àü/»äŠšÚêh4ÑhÄ0|¬˜ «©S`èa»vïlmk½dÆ¥š¦kšöá‡ï‚Á¡C† <ìÝ÷ßnïhÙ!ŸéøE@¯¿ùúå—]žäKŠ/€~Ó$€€êõzyžoÛ_xA¡Pãx»ÝÎò ²ì`‡@±Üâ^7”’P(l·ÛDQú\å3M3‰°¥c–gWWÛbÈ0 Ÿ7 hš–™‘ÙØØÀó|ZZzkkKcS£Óé,,èÃq\[[k0ôz½ÉÉ)­m­ªªˆ‚èt:g[{[$ÎÈÌôwuuuu¹\.§Ó©éºª( ++‹çøöövUU²²²ëê::Ú““RrsóXÙÂáP ÌÎÊf¶´¶Ø$Éãñ665¼œœr¤úp8ÎÊÊJKMg…ïèh'„¤¦¦ÅÝ~jÖèš.;)É)<Ï765ˆ¢$ ¢i©©i­­­¢$zwC²°øjñü‰mLÓ´öö¶`0h—åì¬lžç#‘Hk[+bÚlöì¬ìú†z]×(Œ±ÇãQU5-5­¹¹)))™çù–ÖæŒô M×[Zší6» ˆ&1MÃÈ`ýTÒRÓ Ëߥë:ûlšf{{›¢(‹/œ2yjrrJFzFYYéÚõ«/½är§Ã•’’bzss³(Іi¤¥¦ó<ßÖÖ’|ÉN§³¦¦šã8»Ýžžž¡iZKK³Ëå2 ÑëõF£Ñ––f·ÛœœÒÕÕi'ï_mm­<Ïû|IlüpÞûš¦ÝxÃÍ­­-sß}{ÚÔ SSRSSÓB@àh]-Ïó……lEälÃ4Íêêê®®®]{ö21ÎqÜ„±ccjì`ùÁÞ¢_×õ§ÿ÷D,AUÕ»ïüNvvÎ'ÙjÞšýznnÞ¤‰S@ÓÔ_~aúE3Š‹Kz<¢(ô8Y†ñÚ/3~È࡟Ëòcšf8öx<§¾ì3:“}^¬ÅU‹o]þ.Ÿ×wntŠ~ ¡–––Ùo¿y÷ßñz½°ÿÞ ›Ö?ð½‡à“2?Ó}àø=(?K9ÿK¯¼pÅåWõ-é×ÜÜ4gîlV0J)[½< 5öe8µèïmðÁBn½åöü¼&Á ÈD"iiiÉÉ)õ õím¾¤¤¼Ü|A;::®JMK“í2ÇqÌìßÜÜÔÙÕYXÐÇáp „ê꺺º Ý`«£Ÿ zBpl|Ú‘¸\¢;Nõ¬4'NAz-cœÚu21I¯lã%CV╟1 $̵Op—úânQŸ‹O,Oôâ£,bèq³€Þ}°×¿qCJâ5p¬µ÷ò—Ë9iâdÉÖmÈÌÌš0þüÞ;=YõêÝ„¶¨øý±ûöt®^=>¡?@{GGaAŸâ¢p»Ý‰ƒ“õîo½E?¥”ç…%/–DÑn—g^3kÝú5]]N§3 Üs×½UU­m­ÍÍM“'ME±®þh(R媫fb„x^¨«;úÑ’En—k×î·Þ|û®Ý;7oÙ˜š’Ž„¿È‰Ò´{ *!•à2tÜ…Ç9 Á'ú&4É)ø¤lO‘ÛgOr²L𩯷°øÊ9q#„œ´¡¾éêØ‡^™ôºæ¤ŸeÙ1jäèø—))©))©Ÿ”¼W1ÅˉÅK,Ì' „^ßô)ìSÔ§ˆ}N,Ø1—EøftÏ“Š‘e1¢”1jРÁ¢(aŒ‡ vÇmwñßÐP__˜äK¡¦¦šP2|؈;n»K–å]»vØe™²gïnÓÔÔXUU¹ÿÀ¾©S.¼ù¦Û’““ã¾1Ÿ‹îqØŠm²°øz8«")ýÊvú’ô2 $웥¢<Ï#Ü3Ržx¦in—;#=Ãáp˜¦wtåy¾¹¥iþÂÆ^¯Ï0tÓ4ÛÚÛššý~jJj,mniâ8Î$¦ œ?)=#Ã&IµGk›ÂáðßgU»´°89›z:¥ò~Ú “8/ùüF‹3 óB”e955UÓ5JHNvÏqÝá¥'&ÈÌÌÚºm˶í[5M»ýÖ»RRReÙn·'#=cà€AÍMaŸ/ !T{´fé²%ƒ=zl(ª¨<4eÒ4Mש²I¶Q#GϘqÙ²e¯[·ÖëõÅ}>gS»´°8÷°´«sŽãú•”defr;NÒs@coŸÏ5 “Ïr TUe1J_²Üº¡ü””ËÙÆÂâk¢µ­•yXZœKB*++Ù¡[,NÍ0 Žã‘pù¡ò“Gó&Æèžð#$Êý7±c„$IÇ¿úÿù ÖÙ¼_/–Önsâ–yÀ >'îcǾ8EF'þÙ+“S\óÙAQ ¤guÅj _ÖÑ@ç'ú²÷º€‡D_¥³Ï¢‚Å×ÕÏÂâYXœËšz.rêwÊ ] S]bG-žéÒö.º¡˜(¦2Mr–•ÎÂâ#ª œéRX|eОóBà“uÞ& /oõ›‘³q·#LH˜EZXX|å`Œ ‰œéRX|u $î‰EN*Øy„ 6È7*’ˆÍ³S´Rzöï–aañ Æêbç„‚Æ'éÌóðˆ|²%B€2 €37AˆoœA Ìvs;´L>Õ–uÆŸËÂâl€©ÿ_Ìö‹Ocú¤.oÁ ôSêçø˜i&wéG4ƒc&ûÞ¤QÏØ^@7iD#„ÆÇÍ8ùSF4ÕˆªÓSÏg€A¨¢[MÉâ[ Puj˜4Þ]0:f §ìD”BD=}º“fœÄõ“J˜øŒnÑO)ÕLªªjª›´[ÇG 4Ç'NêëÒ 5)¸lxL¡ƒU#‡‡O«[AhšKž+Èsø< ‘GyI"FÝåázNŽÃ†çÊCrä¾é6B€Ãˆ}™x ‡¡à±s%é›ßXÄâ[S€ S¤T—@0Œ@1¨I€Çb:aýýX'b»y"@d .tõÈ!#&|qÏõìÆÝ?H<»>Þgã}™k 1xìÜ…Ü„BgÄD@Ì šA³¼âíR.(vNêçj êÕÄ¢éŒ]Qà ”RÄŒ®¨á2í·ŒKî aÕÿü’Ì!9²fБyòç¥dûÄú.­_¦}J÷´þ®°Jê:õÜdé®óS'÷u{dnEYP'ÇÖØ8„.è¾v”¤¹„™ö²ÆXqºm|‘óH›:c°gæHŸÇÕíj\€ÄSÍ鳋¸¼I˜e¿óü”a9òÑNmZ÷¤¾®‚©3jsr?פ×°\GYƒrõßí’³½bKPï<‡Õ Åé¶ŸLÏœ-#GÚÔo‰ô§†ÉTÀÇ-â"„4]kïhÇLµ)æÒRÿÁ¦˜MÀ!Å\¼ß_ÓÞ]G”‚,r{ëbk…˜šÆt|Ã.L·‹Ø5tqz’Ì™ Cý×F è¤0U²‹¸²E‘E¼£&r´SûÞ”´,¯x~±³ EšÖß½åHxDž<¥¿+¦‘Qù޽õQ‘G­A}yYðÒ¡žóKœ]Qsó‘ˆOæ¯4k¤ï‚ç–Ãa“t« «ËƒÅi¶‹yª‰¿M䌃(áLƒ7 Þ4C ÉžÕ»žô’÷~5ò½_Œü×nÊj¯ØÝ1ÏtIÏ}(‡¡-llª ß>!YäQ£_«ïÔšz[Øè›‡ÛTÔœ1È“åZ‚ÆCÓÒs“Ä{'¦bƦÃaÌŽ/AÝ&E'ç;oŸ²½:Š™0s„\8ÀéFæÉ·OHÞ^ )f·ÅæøT;j"]#ÝÃß79µº]-oV(…K‡xlnêÓú»ò’Ä«†ûZBFŸTé;Sê:µÎˆYÕªDT7ñ…³5hÔwj~#d…10Pfï^s(XÖ[]lôë6ÅWQLB]6<{k‡,âY£|a£ ErJÜóëZÿ·ºÕ0é l9¦}ífƒÐ1Žò&%¬šªAwÕFŸ_׆JÒ¥@ÔD•-Ê’ý}õQ»€ R$YÄ{ë¢ W¶¨îê\u0xA±3ª‘þ6‰Gi.aí¡Pm§v~±K7©À¡Úmuyp÷Ñ¨ÇÆYdŸ ¢QB¢€>Ë»G”bbr ÿEHå.wj»'½Ã“Úœœ;âÐÆ?<ÿ½Ü–Ã!»'bw >¼ýïOÞ:äð¶ì±¤ÿi€PØYYq0ˆ™!ŬëÔ6m¨ Uµ¨­!ýýÍ 6?¾¬¹²U™5ÒG)¼²¡}ë‘pH1‚¨J¢‰¨&PØSÝTº Äå²q;j"LîçÎò «Ëƒ›bë+CûºJc‰ŸjR_—Iah¶Ü4^Zß¶ê`0¢šQÌßÓµ¹*¬›”RÚÔçïîz|YsIº­5¤7ùµvv54BiD%Q&=Ú¡5úõ‡Ãë+B‡¬~Íè^)¥8™V•Ä£øR=y$K˜úüÚ¶ÿÞšßÔë:5Jéµ#}maÃ.r•-Š$|½uJ̲ÏÛÝ÷Ï´å%‹v×uj#òd#YÂNvH\{Ø–+7õްÉ!”Ÿ"NîçžØ×µ²,ø RJbaãüBðÞŽÎï\zÛ„ä%û ;mœ,Z†…OS¢ó¢y›D©yL)¦&e£BïÔàĘä2q÷°Š)‘•0¢d@õΑ‡6ÉJˆ S2mû<_¨ýù™¿~{úƒ‚¡Ý¾ø?·-yòÑÿÞùÛ[;ò WÔÝ#Íq³ØÓ´Üô-€ÃÈ)qN \·ÄùÅ®ŠÅ Ô+s—ñ¬«!Ù^qR_WQªôüº¶;ÏK™9Ò×1œÇc4ºÀ!p#Ä̘N––¦ôs?05m}ehí¡à/JßQ©íÐò“Åe‚“û¹î›œºvl@® £ãRMíç~hZÚß—4ß4Vº|¨·=lø#†À!·ëM‘G!—ë“j;¯ØÙ1üQ3ÙÉ_:ij­:’ìäÓ\¼aư¯>jzA±³¶Cm}‘ƒÏIzœþQ÷öË$ô*J©À¡ú.PpÚ¸šõ©•-²ì•üouëÕ#|Ei¶g×´6Ž›%|å°åÙa¹²SÂû룉ÛY–+»$î• mõ]ze‹ÚÔ6*^éê_Ì™ñ #¢¿rÕÏ»\)¾÷Çß½ô`R°íéw󦯧1lšÒ«&ÆÖòÀç‚RÊs¨¢Yiòk°·>f:ow×]ç§ŒÊw,Úë_°Ç?¡È¹çhT3è…Ü2í öøwÖD€Â¬Q¾¨FöÖE1‚éƒÜ"EjV*Zb—õê&}yC»Èã­G"ß™˜ZÚ‹¨fš‹ÿÄa¸x ‡ÃHâK5gkge«2w{ÇUýÍýÝûêba•ÀúX fúü½“R#ªùú¦ŽÖ¾`ÿ¼"çþ†Ø ,û¸>ލJ0F-AýÝwŸŸ24[^Zù¯QR}ƒ@ïÎ}saÇ &Õ%"ã¤Ñ¼l©Ä$T0 ˆiÄ Ôeãtƒ*‘ÇÒ×\›nÐ,Ÿè“¹Ò†˜À£°B0b¦I$r(¦C†IŽj„©›bŠNu“j&á12 8$ÌÖou“"Œ"”272Õ  +: 6[íã¤`BTÑ–ßTù»—¾Ÿ×\–Ý’¦†p&ýé;ÿkNΑÕÈ´íóÞapB·a•R‚qZgcv[MbVá.WòᜫG_ÕîÍD”`BI.+É›:K‹( Éž©;üì͟˱ð²ñ×-p}§; ÓnïcL̈ÝU—Vt\)ÈJXÔÕî£'(ÅÄìÕ¸ BÖØÐ f®á9$r(¬»ˆ ¥QH<¶ñ(ªB€}äꜵ¡e6Ù¬èÔ #0È"Žj„m°ÎsˆÃˆ@(P£$ÿ³ÿø¸93MB aq”TpD%ÝÇ$¤"”ÚY†ÀaE'6s:#æ ,Û÷§¦ÿa~C0fÚÄsˆYx§D3»'‡²„ …øS|Kº5ÛÈá÷SL;\œÆøjé¥ ñ"€‚,b„I¨À#‘çÙtáë–’”‚À¡F¿V× lzá¶wŸ0É"u¦ÌN%‹˜l9–xŒH²‹<»˜P° ˆ] =“v`1P$Ä.@VXïIA@MŽ39þ¶%Oä5W½wá½5™}òÖ/)žp翞¸é¤©( 4,{–N¸þhz1¦&E˜7ô†Ô‚µ£.§ˆ38>n±Á„ÈJ˜-!EÈñ¯}•ß•òË×~¡¨M‰º褲à[jA¢f}Êeã˜Vä“yB)¥à1Æ(¤˜Às òH9“PI@6èÞøÝ$Ômï©gJiÏì cÜ1®îjMÝmÃñØÖÝ£Áù“»ž«ÎäŠøKêöû]É¥}ÆÄ‰xÓtµ—¢T04L㥀MüÙNoF€ 18A$ãf‚±¤)C+·Øµ( LÌÙÕ赫_Êj­aR(MÖ»|Ô<.; ]ßÖáÓWŒ¿¾Ó“ʳG£@˜˜A›«.½P ]~ÐTÀØ.qfÞÁèó™y£Û5ü+°3ÝÎ$ô[â§ÿ¹@L²]váDÿìÙopyç#[2ÝÚçÂâ BtÙ™<ç•é~¿âºïlü狞¦f]´Å$™7 Y ǯ¤'3£Sô¥fa”bÚ;¸—"±»LÌ%ŠÑP¥=Òœ6ZµÕ®Fˆy³µ´à·Þ€Æ¦^Û€1 RKjÞº‘—ƒ Âwî’‡ûlC”…ÅÙà€ö—Û¸ãÇÙc¶~ƒÐ=I>÷<6ÝâÛƒiÇÁÆ· oIZ߀œàÙr‘ Ÿéò%"÷׈ѣ!q·BúûßÑyóÑ ëÇö«ä8§¯^}ýÒgÖ?ÿ}n½³ûÙ-,¾9B*+ÛM“œT°óÀvj‹G´ZXœB€çè¶íhÇ^Îf£ýÀ@#ö¹f>Ç}…1r:Ñm·Âm·ö¾Ú0èŽÄ0`ölxæðÔ3pÅLð¸Á$Ö´ØâAϧê›<@÷†v>e?îy(OM؇/Yà^Ï8ï9 Ó£³mFMñìÚ3¯H{ eeò”wL&=fô6È=mÇBõÜ%õØo„¥Ý%ü‹Æã(… ·†zX°¸fÏb‚ |2XXœNm]ý&y/ „0sèêùðå3<ÅŸ‰JIlûŒ÷%„|aW2v‹ø¿hÂ}ÖGþÛß ±þñøÉOÀ4{ oŒ»ÿƒÏr0Î×,÷ÍÿT7B8x¡÷¿¦ ºðÃTVv?¡åhq®ðé~ýgL öuõõYFE"Ñ´´Ô´ÔTÓ4€K°ÃÆ…ûÒìl´`bŒ !I>Bˆã¸X,S”$Ÿ¯Wòî»B¦I‚p8"Ëv–Ê4MÓ4EQŒgŸ”°[°’³ Æ”}@cÜ«`ìbŒ1hº.ð<»†ã8MÓ8Žc·ëõ ‰7M$>ðôÊ<ñÊxþñZJ,ÿ±G¦$Lˆ«¥-^L‡E=D(!ì)zªjj £$ úõQ0Mf<ïV¦™†Íó ëÐÞ€Ðq×°ÏL ÇÕñøpÂH¼ž äØì'ö™ãÀ0€ã@ÓºÅ{¯ûó$p\wFãÇƒ× ;wÂw¾?ÿ9ôï, élš“YX|¾Z?“bå凞{ñ¥_þßï~ð㟾øÊ«›·lŒ1wüúÊ×óÅõÀ„ÇqLÀµ¶µýêÿ~§ë:K¾~ã¦Çþý»Wbr&»«Ù ”ãp[[ûÃþ‹n,ÕÒÒÙs߉#ѵk÷žºúz&Y†¸§`ãø]â©0Æñ‚½ôÊ«áHxÃÆML"Ïž;wii¯»ôJÞ«ºØ•ì×øŸì3{®¶öö-[·±ÇŒ&±ü ÜöÇ¿ý]]½"¸ìR°Û±®s‚Àž‚éÁÑ(LŸÿü'<òüä'Ý3ÆÀódz)ãôà –™™yÅ¥—¨ª’œœü§?ü¾_ß’p8²nÃÆæ––¼Üè‘YŠ¢,Z¼øh]}ŸÂUUwïÙ»gï¾²òƒEEEº¦/YºlÛŽÉII²]~çý÷c±X[[{qQQumíÑ£uÓ¦LŽ)Ê¢ÅKêêë òóâ*ó£ÿçêµkóóòÇÜ÷Þ3MóÐ¡Š¾%%&!A~^Þæ­[7mÞâóyÝ.B¨³«ë׿ûÃá#Gòrs0ÂûKKËÊÀÖmÛ·lÛæõxd‡cçî={öî;X^^XÏó|iYÙŠU«%É–œä3L³²²êïÿÛf“òrrL“d¤§y<ž ›6WTVææd†Áž+ž<^W¬öîß¿nÃÆ¶ö6§ÃépÈ»÷îݵ{Orr’,Ëì‚W^ãÕ7ßJNJÊÊÊä0Þ´eË¡ŠÊì¬Lžç{=²S–_^°pƲ¥Î£GcüI(,¬:R½xéRI’RRR(P„P4 K–Àë¯Ã%—À3ÏÀe—Ó 7ºu–.h,_{öÀÀà÷ÃÇÃÍ7ÇÁÀæÍЧØl°n¼ótvB¿~°gìØK–€Ï))ÇìðË—ÃÒ¥œ IIpà¼õØí™ Áöí0w.Øí°y3<ôÈ2a@n.$'Ã’%°w/ôé†6À¦M°s' ü©ç½”ÂÀðýïC]lÞ o¼»wÃM7õ‘,,Î>(¥½íצ‹÷ùž¡Ìl¢(ÊÃþËî={ç/\øÄÓÿ…žÉÁ¿þýD}Cã¦-[Þz{n8ùÅoþ¯­­mÑG‹_}ý ´¾¡!>ü§¿ttvêº.IÒÒå+^{óMÙng*ö¿þýŸ†ÆÆÍ[·¾öæ[쮊ªÆbј;ZWÇq\(6 cí† ¯¾ñF]}ý²+gÏ}ç…—_Á×ÕÕ±$ápÄÐõŽÎÎ@ ¸ïÀßþá•Uõ -­­‘Hä/ûûÁòòßþááÖÖÖ‹>šóÎ;{÷ïÿíÃ`Œ::;gÏÛÞѪ©=j˜æü… 9òìó/|´dÉö;þü׿565ýê·¿kmk[´xÉK¯¾=BBhËÖmOÿïY„àÿgÿK>^úü‹/WW×üæw¿…6!Ê€IDATomkc‘`0DL³¦¶#ôÄÓÿ]¼déŽ;ÿð§?†Áê–=rÝÑ£ÄnÏ-+MÚ¶­ àÃ#GZ;;ÿõÄ‚ üçéÿV>Œ ‚MMpÏ=pÅ Š‘Ï<> Âm·Ag'üþ÷ðÖ[°z5|ç; ª`š ðØc°d TWÃÏ~PZ v;üýïðá‡ðôÓðÒKÐÚ ·ßJÏÎlÿ;<ú( P[ ?ûˆ"üâPS6ÀÏ¡44@WP `ðÖ[pð <ü0¼ù&¬Z÷ßuupï½PWo¾ >  iŸÜâ˜] !ø×¿àÍ7aôhX°n¸‚AÖ·Ît°°ø‚|³D?êÙteæM†aüâ§?þ¿_ýró–­MÍÍãú††-Û¶iºÞÞѱ}ÇNJHIIñ]wÜ~ݬ™‡±Ûl%ÅÅÄ$]~mmmaAÁM×_÷ûßüjÓæ­MM»Ëïß²u›¦iíÛwìÝ0d»}ÜØqÆ»úÊ+tÃÈÌȸûŽÛo˜5«¡± xžï[Rl“lš®èß!y¹9C† ¾êòËÇŒ¥ëú˜Ñ£|à{Ï?/?/—ÚÙå¯oh4pÀÝwÞqݬk©ÎÎÊÊÊÌlïèþFŒ€_ý «àÓüõ™Êí†[o…×^ƒ”xÿ}¨ªHðj²°ø¦ñÍý†a0Í4##£³««µ­í`ù!»ÝîõxÀáp8ξÅÅ?xàþßüâçÑXLQÐ4]vȫ֬ycöì)S& O(íììŒD¢ûKËDQt8-­m”P—ËÕ·¤øÜÿëŸÿØf#¦i465¥D‰ÅLÓÔ RJõü#† ûÓ~¿uÛö?ýõo`ªªÖÕ×€iš‘hæ-XøÆ[s¦Lž$‚¡ÑX L“¨ª–’œüç‡ÿ`æÿûéψIU ]~}CÄb1—Ë€ÊÊ565)Š’–šYmt/ç¢øÖd”äÛ¶};tù»dÙîq»÷—–†ÑÔÔœ—›Ëª‘RÒÖÖ …Ün7*+/ojnVT%#=]`šFSS“A)SÔ50 _mm¶®;œ®$Ÿ÷üñãÿûß'ž>kE”‚®ƒË² $Ã[¶€¦ÁáÃ0a„B°kÔÔ@$……ÐÞÑ(8PT=~¡Ü|3Á€ (` i@i÷ò,篾 +WÂý÷Cn.¸\pÉ%ðÞ{på•€lÞ  i€1´¶Â‘#ª II ª°cÔÔ@4 99 À±@® Žy„cP8fÍ€O³YXœí|3lýqBÕµ50zäÈô´4 ôÍ9sÊUÜ÷Ý{rsrLÓ”eÙív}¼lyéÁƒn·;;+kÿÒ‹/œÖØÔ '^pþÖm;ŽÖÕq3¦¼âÐÖí;6nÞ|ÿ½ßÿ–³ ØćCBüïàæv=¢ˆƒãîãÖcýØæ?6O›:ÍQåx·M#ºÃ0Œ¢i om‹ÕjµÊdÒÏÈ`4Ò%—ËÑŸF£‘ @f‹…‡ã|>ßb±X­¶6ÅQ$ ~SWk4B@"i%f€FÞíwÒæèöèt:šaš=éõ=؉¶Y‚ãøò•߈D¢×^~‰¢iŽ£÷ Ã^zýùsæŒ1üÆØ6gt㞯o ó°„lÀèݶn…ˆ½VK…"¡°å2‚ÕÚÜ–ËÁdjö¤&(`0€XÜ<Ä/•‚Ù &89Ù ààhO••àæÖ<Ä‚âAÙ¸Ltëê@,gg°X@(„êj@,>0 ª«A¡ø|0™šC€( D¢ëG7 €$Ç›GòÑfRé_=p6ðùð ðóÏ’½zqêw34MçååQÕ&¤ûvõúïZP Ç¡õôWša„BP(¸±Ã0±Å8¢í‘³F  Ãh† …§Ƅ<£=*¥²M5nl'n<º=¨=¸Åhúº›f—£Ï=ó´T"–ù{•‡ŽÕh›‚èß·´Ì$ i†Í5oFìí÷|}†Á , fÏföìèhØ»W6v,%AÞoï^8~T* ¨æ¨Jä¬q¼ÙÉÒt³“¤¨fŸ‹ã`³5ÇY²£:|>d;_OÙÐ4dóÔÀ  >(ª9ö’m?ÚÝ´Z˜8yäö<ù=Õ=âà¸÷°ë;_ܪY»¹q²›µ;·9¾¾½â·ù>ÔæÅê6~›{`½ö-J©léé8:ª¢¢"M&ó‹Ï=+“ÉØ&ÇÛßy›†¤íè‡L»vak×Â+¯À«¯Â•+àà ÃãaðÈ#ðÈ Z8÷ý½ººšÿ÷¶ëç@°ï ì«Ìð¡C¡µêÑ??P¼ü2”•Á²e°h|ó Û¾×'9¡·[†òò`×.<€èç¸wá\ÿ› 9ü+JGì1š=ÝÇÑ#°jLš“&¡Q’îâõz€>}@(lúçà¸7é&&Ûí°—|øw r9|ó ÀÿþeeÍ‚;ÿyÐ9nÝ  À úsÜÛp®ŸãN@Ž~üxøä(*‚çžkþäúßöþ(Ò¨±¶m‚hþ¬ÁÅöpÜË´ AéêúpÜõ íâO?…yóàøqx÷Ýf%Ëÿª÷Gç¥×ÛoBYx{ßF(ÇÝN+×âÛÝŽU|ìrÚ­DÇÕíî9ñ»4•éÇ¡W/øö[xæ0š‡ƒþ3׊a€$›ÿÃqøâ ؼàÀ‰:/×LWcŸv¢CHÜ)íZåÍjøO’güWiåúµZíͼ»£Æ]â±–»ÎÜK„i¡M Ñ–ö¥Øm†¡í¶o³J§×£iY|Žw;(PßÑvì€`Ã1’“[…èßÓ°2ÓhœçãaË€¯¾‚ž=oLS󃵦%Þ—ýÇQC£oî ®ïÍn›v±ÝRìŸm}£ÉÛװͮسèêK{Ñ*ŽûØñ#EE…öÞÍ=yúÌäûfT×Ô@AAá»|„–£©ªvA‘£?rìø·«ørɲü‚tGëëëýmI’†]•Ôjõç_-ùqÝúÍlÁqœnybPÜËõˆa -=cõ?±ŽZ­þøÓÏÞxûÝWÞx«°¨¸ç¦ Èû‡…Áùóð⋜ #G¯¿A4O²ºGA} £Žƒ³gaÁøê+ ixî9˜2¥ùÜÿ‹ ûZ¿a㵘Xd@Ee¥F£Á0ÌF’EEÅìDq{Û§iGBå >ÑëõÐÚXì“ëµ™Úr‹t{ö«ì³±²ÇÝðÛ¦ºº:û²¤] Û쪢²R£iêLgu÷Óê!Öéu{÷ﮬ¬hsH’,¯¨ø~ÍZ°‘¶ºú:´¼²²ª¸¤¤Ó®&:Ð¥+W‚kjkãsró@ øúx[,–ºúúÔ´´â’Rô@¤¤¥S¥P(’RSÓ32ЬijJHLÊËË ÃÊ+*’SS@§×'&&%§¤æåç€X,~ü‘G~^ûÃÀý×®[œë¿äýÅbøñGØ´ ž}ž}tºæY¼÷\€*Œ<ûÚµ0u*Lœ¿þ AApõ*üü3 Žÿh—=á…I))É)©:–,_±uÇN‹Å’žžñþ‚…)©if³Ùh4VVU#!EÈËÏ¿SYUÅÜ°Ã†ÆÆÄ¤d¦I«Õ555€ÍFÖ×74¯JNnll„vK%'746I’™YÙYÙ96› iVTTúúúðxü„T*eÑdzäÁùMMÚ=ûöÒ`mß¹ëÒ•«Á ô÷õå—:Ze’ª«¯¯¬ª7fÌî½ûâcbcÃBCg͸ÿìù €aßÿ°vØÐ!ñ ‰ï¿óÖÀþýOŸ=;bØ0«Õšsèè±¼üüoW|}åêµøÄÄÊÊÊ©“'ˤÒ{öøûÛl6¥ƒCaqñÉÓ§cãÞ|í•¡ÑÑAA<O­Ö <0í€>ù’$<þ8ôëO? ¿þ éé°y3„†^ïþßÍÝd6u$ÔÔÀ?À™3på ¸¸ÀoMÃÈ‘àçלòñ¿_À¿ríZEe•Þ î©§ò ªª«}}|ª«kÊ+*6nÞüÞÛoý¾åÏòŠ Ã\œ]>]ðцM›“RR”&³‰h¹DH$5=ý‡ ìÉã'N^¹lÉÁÇóò æÍ™½xéò°ÐP_ïùsç ííK…£U+V}WU]ííåùäã}¸à@ЯoŸÂ¢"‰XòÓ/¿øùåæ¼úÒÿróòÊËË7ýñÇK/¼L·$CÍË/ÈË˯­­uvrœûÀì{N¬¬ƒhe“$E E¢ÃG!¿o'&CÓ óÞ;oíÙ·?-=Cé ,¯¨8|ìØÂ>Xõõòø¤¤Ääd6mÚ¡„¤$ww©TÂð_|î™ïV®HJNIIM¥iÚj±†††|ðÎÛýúöIII€â’’èÁƒ4MMãÆŒþà·ûôêµá·MS'O3j”££ã…K—ÕMMƒaÈàÁƒljjŠŠŒx÷­7‡Ÿ˜|‚صw_JZêsÏ< ÷‚¬i×€réRDEÁ©SðØccÇÂÎÐÐÐ<ì®íþ#±f6acBL›_~ ©©Ð·/,[}}#F4Çwvƒg€¢¨ysX¼èÓúúz7W—‘Ç?ñè#Ó§N™4q|Èȯ¾øÜÛË«¡±qÚ”)?|»ª¾¡aÛÎ]‰IÉK>_ôÖ믩”Jö=a1[ÔjMDxØÈ#FY[[[WW—”’2vÌ(£É¤iÒ„‡…N™4ZÛ*üÀ¬™±ññ•UU߳⽷ßR©T 0o½þÚsO?¥Ñh,V‹H(útÁǽ÷î¦ßÿ;zTϨ¨¯>_ŒÆ÷Q[=hÐ>:÷Ùm´Ìº3­\?Ç›>õ¾Èˆmu>3›ÌŽ*Õƒóæ.]±‚B"_ mƒuÚl΋/Ž›$I HŠd@C“|‚¡P(—ËÓÒ3ä2¹B.7›Í6’«Í†áøÊï¾OKO 4 ÌœñŧŸüþçÖ5?­“H$èlDB!ŽápèèÑ}û,[ü¥X$âz ·‚ͤ.—ÃæÍ°d TUÁ¼y“'ÃåËÍÁ?!ŠßY E Vã Ãà·ß`òd˜8ƃ„èÑví‚ÄDxâ ÉVéÞ»‹Å €Él¶Z­@Ó´Ñ` )‚‰D  l6I‘4MS$IÚÝbd’ôÿqõwÉ©©o¾û¾P ˆ<è›ï°Z¬Q=zôˆˆøé‡ÕI))ï}´X-»RI)©ï¼€¦hik¹u Á#>à8a@,á8.‹€$)ƒÑHµtöíOÉd6[¬–®¾°w­rºN™4ÕÅŵ]7‡óp˜>uÊÙó ‹ ==<¦OòùWKø|bhôàÞ½zÝBÐøŸƒv^_ßPRVúÆ«/CÓ¿ýþ‡¦I3 _ÿžQ=Nœ:…áÝò¡Μ;7 __àóù II‹¾üª¸¤då²%ë7þVYY&—ËwïÝ—›+àÎNNlœEQ"‘¨®¾þÃ…ŸDõèñÍw«ý}}_þß 4Ãàœ÷¿hð‡¢àƒ`Àؾ.^„'àÂXº^ EëIwv&HÃÓ>};Øl_ {÷6¿¸xyÁÚµððÃ׫ÚS²\å¤)zäða?üôŸÏŸqßt//Ï·ÞéŸóxÄ–mÛÏ_¸(‰{ø!“ÉôöûzzxX-V£ÑøÕò¯Íf‹ÅbéÓ»WhHðù‹—,f‹»›+L™4qÖ¼_{é%±HtîÂ…s.Y,O“Éôé‹IÒf6Û•²Xä2yôàA‡Ž}éµ×CCB~p>†7.Ð - ŠŠK–,_QT\<{æŒÀw÷·Þ{ÿËÏ>=ñÒé3gårIRï½ýæø±£×®[cøÌûïãºqˆ¶zýí^“Éd#I…\6›M«Ó99:@Mm­ÍfóòôìèK‰FSRS¯\½ö¿žgF«ÕÖÕ7Ð4LÓ´^¯ …«ÕA¡0 4Mÿ²ñ·9³gùx{&M“¦¡¡ÑÏ×W¡Ûl¶´Œ •RåææjµZóòó EXHˆÕj5MJ¥ƒÞ`@¯ŠMMMV«eÈòpwïê;u€Ü+jöî…ÿýêê`ÊøäˆŽnÞ é,£Nw‡Ö©9ÛÑ ’‡ÁÖ­P\ 0l|û-øù@€äH›Ãö»¥ƒÐjµ@$©5…\Îãñ**+EB¡“““Ñdª©® ð_¸èso/ÏQ#Gøù …B†a ‹Š(Šruu•I¥eåå(4S*•*róò GHôà©ç_x÷Í7##ÂFc^~DõˆÄ0¬¤´´R‘AØH[^^AzN&“ñx<£ÉT[[ûÅ’¥O?þ¸·Ÿ¯/˜L¦šÚZo//µF£ÑhP‚ O‘HTQY)‰ãê&ÜZ¯¿•ë‡;Ѷ­íÂVôö~§'Èñ÷A‘ï迼˜8œÛÎŒýž½]ŒFÈÈ€ÌLHL„sç -­¹JJ%<öÜwŒ*\Oõ‚†ƒº7mºtíšù¬ûïð÷ƒ– _öÆr£áØ'âÁysìíYe›Rm¬’ñwrrzhþ<ôe¾}º±]â¬îrîá÷l|§Íii°s':éé H¥ÍnÁ00>̘ÑNÇ#iµpþ<œ> µµ7m!P[b±4ç_èÓ¢£aìX8°ÙãC×}{ààèxî`À‡sý›˜L&HO‡ƒaçNhllN¥Ðì¯[Oði©Š¿PŒP(šÝ}Ÿ>^^×ý{'|iøOCQÔßKÑ,ñ/]vôm€×í_ÔnÆ67/ǽòïÈçŠD0p Ÿ~}ÔU7`÷n(-m„° ÈÑÑàêzg éVy»Q°æ¿Ïßö¶Ø¿Ú»DsK»úbÜ«p®Ÿ£³@_}ÙPö;0»¤Rxüñçpl4'çî98ÚÐ]?7´ÕÅ´‰¶´µ ·ÉANü/ï`wÎäà¸ÚºþvÝ"Sc/i†éÂd¬ìÜ+{!@T½7¦hš­*+¿ŒaM3HåófG¹Ù9: ë–³¨î"™´ ˜¹ñw»Ø›['ÔóF å‚;oŸV×Îf³µ«kj?¦†a'ÛÐ.H͵ÍW¦›¹i¶ªlŽr ÃÌf À_< œÀ7G÷„íá¡?[ ºü•÷ìLÏЮÉ߬†œß¿‘Vzý§Îœhh¬·¿ñhÎôµ˜Ø·ßÿÀh4@yEÅw?¬AË[Ôº;K¯Ÿa &.~ó–?Ùø[Ii)Z®Ñh>Lµè‡0LsÅÌfóªÕ?Ô74 ³Ûº}G\|Âö»^yãÍw>ø°¨¸„=…6y$´:Ý[·Y¬ÖŽÖ¤ãà¸{@úÁÃGÒÒ3Ø'ßd2±>zƒ¡MgˆÕëµF³zí&“©Í­S']/u‹DO7&\º±ªVk4`g¼íÖÁžK«–³¼¬lïÞÝz½îz†fí솭;v®ßø45icââÐͦ(Š$I洛¡i8~ò$EQIÉ)Å%%èv2 C‘ªp“VkmÑiÊÎÍMIMuvr"IÒ`0$$%•WTL›:eõ·ß„†„ü²a#èõzNÞhšÖjµ`4=VWW§Õj¹aŽn²  —.gde&¤Á¹êûŽŸ: eåòÜŠ¢l69 Ç-KyEEL\œÍfƒÖ3.išÖêtÍ9õ°æ…h†¦iNG·7Ì€V±C»F£Ñ`0ØÚFÑÍ&o³‘hª²²Ê¾†ö'µêûNž>wYŽÉ®¥Õ¸ªH$ÊËÏÛ½w×¼¹ŠEb”¦H’zêñDz³s®ÆÄøzûˆEb‚ ®\»¶kÏ^’¤Æ}ÿôé­n†ôúõzCIIéK/<ñÒåÍ[þܺ}ÇÔÉ“‡ RTR÷ËÆMî®®5uµ½÷^pPà©3gÇcµZßûèc@šž1iÂx™TÊÐLQQqôàAÙ99k~ú™¦éÑ£FŒ9rõÚÍfËÀþý¦Lš¤V«W}ÿCm]íã<2aÜXn蟣› ‹÷îßñÒ%_ŸéS§ž8}úʵ«V‹¥¦¶öÊÕ«ï|øÑ‚÷ß?uæLVNŽ^o2xð“?zôø‰ý‡ñpÜf#ù|>Úrîåë7l4M#‡ EÉ)©ï½ýæ¹ó’SSô‘U߯¶Zm½{E=<¾ýT|TÊl¶ôîõðƒóÿøsÛ…K—<<Ü_zá…oW¯ÖëôááaV›Íß·dÉò¯ ‚hhhøè½÷Žž8qåêµ÷>^ðæk¯F„…!/ãxzfæ‰Ó§¯Åƪ5šGz÷G´rg4Ãà<ž¿_€P »2›Í¦P(^{ù¥uë­ª®‰„jõÏ¿lxü‘‡~øþö»óòóñNÑëOMK“ËeÎNN ÀÛ¯¿¶ôË/ö8˜ž™YZV¦Vkø|bÉ—Ÿ{º{œ¿p223G þó¯üý—µx`ÿ~F£ >þl‘X"™5ã~Ÿ—^x¾ß>¹z-&!1iÖŒû§Lžd2™‹}:gö¬ÃG7æÏÑM°Ù¬³fÌX½jU\B¢‹‹ó¨Ã}è¡fÍœ8~|ÈÈ/>Yèïï—ž•5 _¿¯—,>éâ¹ ÷8øÞ[o~òñGR©é6Ó4`³srcââ˜5s̨Q}ûôNJN¶Z­¯\‰ŒˆÈË/ˆ‰›=óþ)'BK,‰}©Y÷ß7kÆýYÙÙç.^X¾dñ{o¿¥tP”•—?ôà¼'{4=#C­ÑT×Ô¼õÚ«÷M›öík¦LšØ#2òóO†‡†Ú§˜ŠŒ2hУ?ôèCr©¶YZõúm6Ûˆá#GÝf#g4##‡ ôõªUþ¾~0 ‘H$b‰¤¾¾!$8¸ª{öü…ÁƒÁãá8O©T|B­V;(޹¹º€««‹T*-,*â|__Ÿâ’’±£G€X,æñp ˜>e \ºtùʵkþþþ$I5*$8ø—¯^»öø£H%R‘Häìè(‹à?›’ƒ£-PÈå8Ž9;;1 ƒ†¤ùù|‚F¡P€X$öððP(¾>>©ii|>ß×ÇGÓÔ$ Q/‰ýV<~ì77×M¿o9sîÜGï½Õ#ò—›ššš¢ T(+—-Ý´e‹³“Óï¼]‘*õÛæßã{DF:(J†aH’T(>ÞÞR©T&•†¹¸¸¸¸¸D´ÿà!«ÕŠã˜B.gù€áÁ@,¸aG+×?z䘀€@`0h‘î6[,èëͳO?uúÜù”´´À€€^QQ‹%—Ë=ÜÝ¢‚›‡ÙüsP2³Ù’_Pððƒó ¾¡a߃“ÑÅÙ%*ªÇ±“'QÞNhÒjU—¯^ëÓ¦Lþiý¯š&Ml\|Ÿ^½ 7/Ï:~¤gfê F”nâʵk ÎNÎyù4M«›4 ØÌf­ŽËçÉÑÐéõ&³ Ôj5MÓ¡!Ánß®R©† Dðˆ/—.ûà·1 ŽŸ Ãú÷ë+‘ˆƒ)Š žn®®¾>ÞúõsvvöpwséN¶Ì0LcccÛ”‹fµYëêïL¯¿ÝùÖŠ¢àö;Ò­ëi±XЋ*Ç¿Šwxãwï›6uܘ1mæýeÁä”ÔŸݰöûoÿa5X½þ/–,ýåǵAp}ùùôúÙ ö³y1 £h:2/cì>Mӌݨ"zQ%Ño{¿ßfcVw°9ଥ¿Ã† ßhرCOrpÜm°ÞœjC¾YÊËݧW/•R-3%ííÇqv†½Y!mì’²²Ñ£FÍ0XË@{öøÉSµµµh¹ÑhLLJn® M³Ý’¢:ŒD\Ñrh­•—ŸŸ–žÛ[áà¸;AV“”„2aP-vÄÚŠŽo¶ šF-^B§ÓÚg_²Ù-öJßXûU´]£ƒR•˜”l0ÐT«–¶}k±?‹®¾Æw­ZøÔ´”#ÇÛÇ¢·ªÜ¼ü7Þyw÷¾}PU]õÇÖmMÇãáx‡j5ÛƒîÜÞRÒÒ÷rl`ÿþr™\!—<¢¤´ôÏmÛÍfóÌûïïÛ§wG¿j¡Iz$IååçôÞ»‹—-ÿnÍ•Rùмy|>‘‘•µÿÀ!›Í¼þòKÎÎÎç.\1l˜H$ZóÓº²²ò ãÇ3:-=ýÀ¡ÃF“éí7^wT©9ZW_¯R*ß|ý5¡@À½0rtsD"Ñ®Ý{OŸ9=xàÀþý7ýñ‡R©Ôhž¬¨¬Ú¾sWYyùÛ¯½–ž™™ž‘Ù¨nœ2iÒè‘#RÓÓÿܶ]§Ó3 #h­×¯×¶ïÚ•“3qü8‘H\V^þðüyiééI)©Í›»é÷?ò † <óþûìõúQ©Ü¼¼èAƒf͸ÿâ¥Ë{tvr|þÙgvîÞS[Wçíå%‹wìÚ­ij"Iò7^ßµg+**^~ñ…à`v*~Nnî¦-[UªÊysçÌžÅÙ8¢q½¿ó˜L¦à  Ç~hŪïÌf3†áf³yé×+ÃBC'Oœ¸ò»ïªkjÚMêû/‚vž™•‰øùúZ-ÖÇ~xþÜ9?þ¼>¿ àÒ•«¥eeYYo¼ú²ºQ}ôÄ ˆ‹O3jäÖ;³sr&N¿|å7uõõë~Ý`0äa¥ƒƒÉl ð_øá‡©éñ Àiºrt{¬6ÛàAß~ãõ»÷ˆD¢¾}úŒ=jô¨‘ýûö |xþ½ûM›v†á¬Gÿ7™Íz½ÞxååÔô´”Ô´°ÐPg'ç~üiËÖmÁëß·t°*õËÌÊÞ¾>>>?$8ØQ¥‚n£åÍÁÑ 0 ãóù!ÁÁÎNN ,4´wÏž•ÕÕ±8,4ÔÛÛ«°¨¨oïÞ×bâò &Ó£?Ô»WÏ”´tƒÁ8røð À€KW®h4šÆFµH$tvv>zü8EQ¯üïggg/OÏýΞ930  ®¡þèñ4E½üâ‹J‡³çÏkššÚ”záÙg|}}"ÂB¯ÅÄêôú¨‘ ExX˜X$‹D'OÑj›œŸ~â ‰Dâãí]XTÔ»WÏ¢âÌìl“ÙܤՆEXQY)—Éüýü ÛØøéõßúºÜLÓ¿¾ñb¦ij2™Lîî¹=MÓåååžžžœ7Ç¿ÒL~÷æM™A\‹‰  …¨Í°WùgõìK±yØ|özý|>_©t°‘¤½^¿½wB ÑZö,ºúß-ÜKzý Üv%ïþÓáàènè ¡@p;‰ö8þ9wÐë¿ËÁ e¢ÁílÌù}Ž» ™TÚÕUàh†{ýáàààèvp®Ÿƒƒƒ£ÛÁ¹~ŽnG+׳Éöý]®qo¯ø—5g•ÿX•Á×rpp° ñƒ¿W¶3 Š›™õiÜÙn`Œ½F—kÜ·[›U ) Þ,¢‹‹ôâàhCS²Ü·¬l—Î4¨vMþf5¼ýù݇Vzý9¹Ùm”ëQÓZSS›˜”Œ–ŒÆôŒLV¯Ÿ¼e¬Ž Q­ÎÉÍÍÎÉiÒjQÅf³ÕÔÔ¢®=+Þ*Ÿ–ža±X ‹Š=–_PÐ\g’d†$É¢â›ÍöOÒqpüg@VPQYÕ¨VC‹üꢗf}ÏꬡßÐò"n4™223ÉR_ -íõ÷ÙQvÕ•±_Å0 I6Û5kã5µµÈxI’d5ãØÚ¯ŸEW_㻈V-äÅ‹ç/^:o¿„¢i¸;uÆÌ+×®@QQñâeËÐrGðx­Ùy½2;víÞµwßšŸÖ•—W –\­VïÚ»—¢)¤åÍÊt”•—¯øöÛü‚‚¯W}[RZzôø ’¢¨†aõ K–M’$×÷çà€–ášu¿ü-3cNž>“™•Íãñt:ýŽÝ{P÷YA¬íã8n0–¯\e0è¡õh ÚÒ^ŸE`WÝXûU†D³Ù²ö»{ï¾FµoIƒ­!»†ap;yúLVv;‹“ì5| -#-%5™ÇÃ}}üÐåC£%EÅÅ é™™Ç7›Í±q 3ï›n4švíÝïéá)“É:a rô›þØòðüyq ‰é™™Ù¹9¾>>R‰D«× ‚§NŸ=>+;'"<Œ ˆã'O‰„‚¢ôŒÌ>½{y¸»‡Ÿ=aמ}ŸðpsûsûŽªêêk1±s w-ÈØÏœ»ž™™’šJð‚O|´ðÓôŒLww·¸„Äï~X£Ñ4ä\¸tùâ¥ËNŽNŽ*U]}ý¦?¶œ>{V£iš1}zKªfræÜ¹]{ö E††ÆÜ¼ÏÌÌR(þþÝÇÌo­áÓª½Å1Œ¢¨ü‚|³ÙvM·^¯>lè¸Ñ£—¯ø†ÏçÓ4_.YZUUÍãñ>ýâ ƒÁÐÑ}Ԙ熨Q:½®oŸÞN*§e+V–UT8x8#3kó–-ýûõ=uúÌ‘ãÇàÒ•+C¢;;;»8;“$yàÐáã§N­ú~uÿ~}ùAÓŒÕjíÓ»·Î`øiý/À}õåà (ÊA¡пÿªÕ«F£»››››«£J¥R*U*OOwÅï[þÌÈÌ”H$Ÿ}¹X­Ñ|ýÍ·<oðÀ$E2Í“î$Ìpòôéo¾[Ý¿_?¡@`6›Zÿ+ì?x(¯  &6nÅ·ß èßOÐòy¹u©¾b±X¯7,Yþµ«‹K€¿°î— UÕ5J¥rû®Ý¹ùù?þ¼^!—ÇÆÅ¯]÷³—‡‡ÒÁÁËÓC$¶ì@"–8;9¹¹¹:9:võÕ½‹h­×o1{{ûÌ}`¾X,±o+x<^SSÓ£?TßP¿c÷WWלÜÜêÚš×_yù‰Ç%):!):å›ûÅËWzDFbˆÅâA<òÐ|£É”ãááŽãø€~ý†FG8@§Õ™L&¦iØ!žžþÓ§N‘ɤýûö1|Ø…K—D"EQnnnÆ8v¬Ñhn0‡=~ì•J%•Jƒƒƒ‡DG‡G„‡{zzκÿ~‰D"‰FùÄ£øoømIÚ^xö™¡C¢U*ФÀnH§¿~#†»xù2EÓôwP(bãJJK§M™Ü£Gä¨#Î_¼$5§PmSêÜ…‹J¥2&.ÎÙÙéáç5J*‘x¸»=4îÈáÔ ÃügÏœ±àÃâ=<<|}}gÞwŸ‹‹ à8Îãá4M;99øû ŽîÕ£ªAw¦•ë÷õñ{`ö\û¡äË­6«Á`€7_{uמ½…Eþ~~Á?|ôX\|‚Õb †vhçÉÉ)у@]]}Iii\|‚Åbõòò¬oh°Ú¬jµ´:_ÀKHðôôƒÞ ×ëM&S£ZM’äã>âîæ¶à³Ï)ŠÒj›(š6šŒ(¡(‡Á`D=!N0É))ZN(¨Õ1qñ@QTCccCccqIé˜Q£ôzÃÉÓgŠŠ‹kjkišÎÎÉMÏÈLMO/.)±ÙlÈâ>\ð L™4qÑ—‹¥‰¯AoxâÑGÜÝÜ~ö9MÑ™YÙiö¥<ÜÝÞÿhA ¿aQQJZZuMÕjÕ45Y,Ð451 £ÕjÏœ?ïâäìììT__o6›+*+“SRÓ32Ó32Çñ¤””†ÆFîÃK+½þ€€@©TzãØ¦I+z÷ìé¨R9ªT 0ãÆŒ‰?uæLfvöÓO<†2av¨^?Žã™YY§Îœ}é…çq/¯¬ÌÉ͉æÉ'C‚ƒëêêBCB0 ï×§O}}ƒ³³óÑã'ÆŽ¨Õêx<^DX¨N¯—J$?ÿú«V«{øÁùþ••Õ#† 5 $Iõëøl3w9†UVUz{y•••÷ëÛ',4ôôÙsÀ0úõchæôÙ³ ˆKH¸tåjZzúä Féåå¹kϾ¢ââ ÀÀ^=£~þuCbrR\|‚Áh „ëÝ Õéš?/8(ÐËÓcæÍÌššž™ñó¯u:Ý#=èíåùýÚµIÉ)ö¥t:ݜٳôï'‹¶íÜU\RÒ»WOµZÝ·Oo™LVQQtøÈ±ôÌ̆††ŸÖÃÝa˜SgÎ8ðÒÕ«»öîÍÎÉINI‰ïݻשÓgx<^xX7Öߎ^ÿÍâúí÷Õ%W ·¼¢¢¦¦¦¿~Y Š¢®ÆÄôíÝûÆ–Œƒƒãoƒ:a,ødâøqcGºS½þ¦&í .þìSGÇ$ŒÊ—”,]±ò»•+„gæ7rgÊí^>ö[9’ØfP6îcÞ)zýÞ^^Þ^^Ð"ÁÏV©x£v‹ý=|èPöÛz^í£¾Ð–E±'½ rp€Ýì'Цy-Zü¬í#Õ{Š"IŠDÑaŒ] ³ó'$Iòùüc'Oºº¸8::² -ÆØn){‹TûµV« ZvÒìš«Í0h;¼õYtõ¾[¸§ôúïÄGÓ4ÝñMGw¤Q­‹D("ü6a_ÜÅbñ¿iC’¤¦©ÉÉÑñ.w\]ÅH¯ÿN¦bs½xŽe±¾#Ø÷±A8;9uõŸWáü#Çñ·Ã¸ÿ‰6Ü¿[Ž{©×ÏÁÁq7ð·Xþõ‘n¨çoÃõú9888º·¥×ßfU—¿dÝþk#ÓÂ_žÔí¯âàøóOž|Îjî!Z¹þ[èðدêò—¬ÛÿÞ‹µp³µ7.dµj9IŽnÈzýöAÒwT¶ó¹Y 9aöiåúkjªÛõþf³Y­V£ûŠªÐrš¦)ª³¯©ÍfkjÒ6iµ«ÝQ¤ÄÍʈÛß~­N§Õj F#PÔõŒ]¨”ÑhBÛÛŸŽã‹E§Óq1BݳÙbµZéÓbƒâÙ©0ÈvX;‚½~›Í†ÄÚìÐÞâXý}ûôyí:f[nÙ?k׬îÿu“·KÀÖÐ~WögÑÕW÷.¢Uª–ã'¥¤&Û{$‘ú칑ã'ææå@~AÁ»|ˆ–#¤N«+ºs»öî[³nÝâ¥Ë‹ŠŠÐºººŸÖ¯')’ÕGõ¯®©Yôåâõ6þ²a#  Úðúú†Ï¾\lµÙXJååçoúcËÊï¾OMK³Z­]}ƒ88: dÔ?üøÓå«Wq†Á0,-=£²² Çq³Ù‡^ˆYÉ~h±Ç›´Ú~¢Ó·ÕëG[Ú¿£âö«n¬L³¿‚$[ýøiý/µuµÍÆŒa`±Xزûaس¨ªb=´ÑëOLJHJNtvvvqqE«QƒYXT—PRR2uòäFµúÒå«÷OŸÆ0L|bbaQ±»»;Ñ’¾±CAwqÓï[Æ›š–ÖÐРÓé|¼½1·Z­Je^~ABRR}Cƒ·†aç/]6>ÞÞjfØè+W¯¹º¸”–•=w^*• …Â?¶þIü¢"?__‚ ÐþcãâÖ¬[—š–Žóð±£Gwõ âàè$±:z¬º¦¦¾¾A*‘òü÷>ZPTRœœ’òåÒå …»›»Z£ÉÍÍËÍÍstt‰DV«õüÅ‹W¯]+(,ºoê@vÙ^óòóÏ_¸(‘H C}C£J¥Ôét…ÅÅ.ÎÎyùùç/^ä󎎪뒑l©‹—ø|ÂÑÑQ§Ó9w¾´´ÔÃݽ¨¸$¿  ¶®N¡P¸ººVUWgfe××7xzxœ»pñ«eË\]](ªF“VûáÂOKJJ½½½þ™€Ä½Åèõa2™Î_8×&ÕŽ^¯ŸyßtŸu¿lËåMá8¾æÇu;wï9söì—_-é„¶=—åõ õC£kššLf󵘸e+V644ì;p(.>þ½ÔÕׯüö»³çÏÀÙs燉æóù8ŽoØ´ùì… qñ ò™Þ`ÈÊÎæóùZ­®±Q}äøñŸÝ6’›trtR©T"¡ˆëõst70 +/¯¨¬®þôË/KKKÍfsyyEaQQmmÕfMIK³‘¶Öþ´yË–3çÎ-øt¬ZýÃé³çL&³ÙlfÝ7šDzù굟}®Õ銊Šssó–~½öì?pèÈÑ´ŒŒ>ùT¯7dçdCKD†})½^Ÿ“›_,YŸP\Zj0?ùüóí»vççìÚ³7+;ûýÆ'$|»ú‡}55i-KZzºV«»a%u£Ú`0”WVvõÕ½‹h×oµZ ‡û§ÏJ[¥¬Â0Ìh4-øðý§ž{ÁA!wqr.,*JHNúaÕ*™Lúì‹/]‹‰=ø/³6ÿP}bââø|¾X$š3kVhHð‹¯¼–’–æà  ¦ß>O>öhCCCQq1T×Ô ì?àȱã[¶n=xÍ·«róò ‹Å2hà‹ÕâáîþâsÏ\¸xiÿ¡C€RFŒ5R*•VVUÞ?m†qÃýÝŽû¦O6yòSϽà¨r8 TdäÈáÃËÊËÏ]¸øÎ¯K¥R’"§M™2qü¸,\÷˯•••+—-ÓéuY99(7/;¶ãâì¤R*m6[dd„‹³óæ-åää<úðÃr¹L¥RY,–ý°EA¥L&ó¨‘Ã/^¾Ì0ô'ˆ¹(”¯½ü??¿KW¯Ò4ãááþÆ«¯”—W,ZüÕGï¿öÖë¯I$h™ÏOÓ´¿¿_ŸÞ½ 0iüx$ÛÕÕø® •kSÈåÌžãééÕæå\Æ0ì/<÷ýÚÕM¥RÉ0LQIIc£Úl±8;wÒtêk×b†  :½Þh2©5£É¨ËÍf3EQ¨“NR”T*‹Oprt jõ¨#Ä"Ñé³gCCB–-þR¯7¼öÖÛ ÍXmVŠ¢ÐGÈÎÉ¡iZ!—9âáùóø|nÊG÷‚$m6› ÐK?f³¹¦¶­Ò4ijëꚷôZ·——Áh,-+3 zÆh4êtzNo4ý|}—/Y¬Óëÿ÷êë†=jñ²¯ÃÂBCÜ\]W,]¢Óë_}ëmÐë Zξ”^¯ùõ·rE]}½N¯G_zQpX-V†ahŠÆ0¬º¶V( BµF][WGÓ´ÙlnÒju:Ê:`1[ªkjà.ˆAº{¸îÚ†™2yz»)j%‰““# 8ð™322³Uª§Ÿxü— ˜¹Ì ¦;Rüö””–UVU¡T-®..›ÿØ¢Ö¨gLŸÞ#"âÜ…‹R‰T¥T€ƒƒƒH(:vòäÐ!Ñ  úôî5z䈥+V6ª5qñ 6Ò6vôh@àäèÄãñDB¡«‹KMMí—K—møyH(DŸŽºÏ˜ ‹R©”J¤à言û§M[þÍ7J‡9³gõï×–.[üŸ/ظé÷cÇOF„‡M›2ÙF’_.]êâì¬R©Lfó²ߘ-f‹ÅÒ¯OŸ¨ÈÈý‡cL7&Ž÷ÝkÞ~ý5wñò•ý‡á6qü8³Ù¼pÑ"›4[Ìö¥†Ü»WÏýû¿þö;ÁÏ=ý”«« A¨z‰¸´¬ì½ètÚ§ŸxÂË˳_ß¾ŸµdÉç‹NŸ;üä)…\NQÔ‡ï½óÀì™_³J!—Ï™=‹³kÄßÔëG?l6Ã0è«N‡‚†’²sr2³²gÏœŽ®×ë¹LvãöEmݱsò„ ÎÎN¬Þ'JûÙ¤ÕÒ4íâì 7¤àž ¦¹g6› 0ŒO ØÍf±Xüñ§‹úöé5eâD6†Á` hZ!—£mPqŽ ÂÆÆšaÅ‘$ùÒëo|üþ{~¾¾4M7ªÕ ø8;ߺhšš0 sP(P­ÐAKJK¿Z¶üƒwßqwsceD-‹@ °‘$i#‘5 …BÇÙ³èêëÚyÜrç_ú>¶mÀ0Œf>Ÿ4ÍàxÇzLô>-om2™ìfuæñx>ô û‰Uu`,{mήcoǽ2¦ÅÌB¡´Z­L*•J¥lÆ ©TÚ\ ÃÚˆ9;99I’A9v\&•!¿ã8ÒÝDÆØn)¶?ªtp°¯‚¤(Þàéé!цA5ðù»j·9 hó™÷v|ßõ)×3¥t’ÇlW¯ÿfu¶OéÐf3®wÏÁq›´kD/>÷ ›úþÊo IYè㪯¯ÏóÏ>ÍA«ÚOe·êÆ Ð7·wßzƒàYÎÞoä^zýù·ôú¹ç€ƒãïl§Gd¤ýŸQZ¦SôéÕ˾ ýª[”º‰¤oïÞ]}IîU¸àEŽ;ãoKâüëzýœ6Ãßæ^êõsppÜ üíX¾ý…›ÚúÛpŽƒƒƒ£Ûq»zýÝŠ_Kí—üë/­Ìíêõ³ê¬]]áökò7’±Üz³ã>íe-Ð…º®G—À0 Ý‘Ïÿ­3,q¦÷ÏiåúõýÞ© ±ýŒöÛtÚÍ`ã½ìÊN4kS“6¾±óÎÆþ£…è«Ql\üÕk1`÷9+7/ïÄ©ÓhICccEE%ÃE qüGaíÂÞXÚ¬Â0 ·óíZÖ_ºï[›ä-"5oÑIå¸MZéõ;~¤´¬¤ÍeÅ0ìƒ Ïž?aØÅËW.úœ•ÞfïÔ…]þm_>qêô÷kÖ.]±² °´¾¡aÓ$i_1Ðéõ,XØØ¨f[ ûµ†¡eµuu»öî=ñâ·«@_6nÞl±ZÀî–H$ÛwíÒ õ ËV¬üìËÅŸ}þeóüCî äøa?Û±µ±´Ze4+«ªÚ,·÷ÚmÌ­ íncïFvïÝ—’–¶xé²Êª*hý^®Öhêêë9ïÿiÕë×h4{ö½ž« yÛÓ§¯ß°±¾¡á×ß~›>u ”–•å†a4Måç”—Wtt]Q•.\ºäíåU^Q‘œšZRZ |>ßÝÍÝf³iµÚœÜ<ö‰LKÏÐéõJ¥Cm]]fV¶Ùb).)).)AÉ‹KJ2³2I’îªºbãâiš6dHCC#Ç£hº¦¶ÖÛË+80èБ#®..Ÿ-øxýkJËËâ€a¸ð2Žÿ†•––ÙHR­Ñ `4‘€cIi)2üÓgÏ-úò«šš›Í†aX~AAYy9†aE5iµ9¹y55µZ.=#‰ÁÙs³mSÓÓkkëÀÙÙY,—UTØGà·ÍüðãO:ž‹ìü'´JÕ’‘‘VQQ^UU)ÐÔYš¦ý|}«kj|úÙ³fNŸ2åôÙs;wíIÏ̬¬ªêõåÒe IIy¡!ÁR‰¤ƒæÊ¢Ê446î޳^Üwà@MMÍå+W+«ªüwïÝÇã.üD­QoþcKpP‡»û¯¿m3rdFfæòoV•WTlþcK]]Ýïnóñö’I¥«×þ˜–žqñò•à À‡ŽxzºWUW=jßÁƒJ¥røÐ¡Ï¿ü²ŸŸïá£Ç.\ºzïÝŸ.ÊÈÊzÿí·ÀÙÙðääæ­^ûãÇï¿Äª8¿Ïñß9çòРФfLŸ=hà¹óêëëuz]¿>}róóišž1}zdDÄÔIû÷ë·xÑg&“éÏí;üüüH’ܰi3 —Ë>[øqDXXHpð²Å_¤edŒFvh(ŠR(äöÛddf˜ÍæùsçŒ3Î]¸h4Pâû6ƒ$)•R9iâ„É&¼þÊË]}ÁîmÚFøL™<µWÏÞ­Çúáäè„îEÓr¹¬WϨE ?‹Å?|»ªGDÄ«o½“™•<¿îÂÅKC££€¢(š¦€fhI"A>‘H‰D!—gdfI%RG•Êb±¢åJ¥mã Pddf­ùiJ¥’Éd4MóùMÓ Í€ƒƒƒÙb…ƒÕfÃCÒ¤V‹½Ñ ýü3Ïøûq~Ÿã¿ãúôãš7÷³/>zlÚ”Éê&Í?­Ô¿?|ôÞ{Ï›·ðó/Μ;/‰ŒF#X­V‚àI$âÉ'¼ùÚ«&“ ½ K¥R‘H„á¸T&¹1ÙTó6&—ËõÃWË–W×Ô¸»»1 Ããñ0#IŠça?Øl6‹Å wGÀá½Ëu×Ï0̤‰Sú÷Ø®GcÆb± ÄÍsfÍ,,*JKÏP«5MMM«V¯.,*’K¥ÑQÚxè]¯Q­..)õdP` “££Á`ÐêtàÅW^[¹l©¯·Z£1 Þ^^]}ï88þ}ÊË+ò ü|}àâå+nÛöãêï ¬¼"ßnU}CƒZ­ €¬ìN¤T*ëÜ\]5 dRim]«‹KQq1úP,àó½½¼tz½«‹ »MMm­»››¦©)-=ÃÛËËÕÕÅl2ËdR½ÁPYUåîæV]SCðŠ¢<==UªòРТü|}»újÝÕÜZ¯¿•ë‡Û©¿«:þ^enV µ1ø“&L ( ãñðä”ÔøÄÄgŸz²CóspÜ= GýÃ…Ÿ 0`ÖŒûÛdµe˜ëšìî*ÿs7s©ZþBwÛN>}p·îïœÐ~û4ahÎ rÄöƒ‰7NébØÿIÓ @«Ôó¬Äÿô©SЖ( Ã0}z÷êÓ»ºp·ßFrpÜs°sYp')*4$dÄðaÐòä³–Ža`ŒO3 Ø9„víÎ~û[lco’-Ó†€ýß Ss8þ&w ÜÙ&B¨°AçT·ÕAẢ÷Ͳ²´)bÿ'Žc­sþ@»I`Øí™›'ŽààøÏ`oÎ÷Ôã±Ëáæ††cÜÄÐì'T¶){ëmZ–Ø«={çø{pcíÐîƒÅ=mÝ¿-ÍÏq—ÃéõsppÜîËÖî¾rpppt;8×ÏÁÁÁÑíhëúÛ×cÍŠB¿ÑtŒ®‰HS­‡ o6…øfU½ÅYpƒ›Ý™6Ï¿½%ü¥]t¦gh×äoªÝiÕºwh5ÖBwo ›Å0Œ xl\—}xoçÓn@ÑÍF$oVÕ[œ-Ê}×å膴yþímà/-¢3=C»&S‰ÿN«Ö½C+½þ3gO©5jûÐxÔ´ÆÅ',üìs³Å •UU?ý¼u ì…;VÁm뎛ÿØRV^Ž–75i8Áö8ØŠY,–µëÖ766Ú/DµÍÉÍÛ¸ùwh/»Ëî½ûjëêP˜ÞŽN=ðÇOžÊÌÊfŸ«ÕJ’$0 c6›Ù.öÖ„þÕhš~þåW“Éd¿Ïs:Ùÿ{ëD.vk»š¦8¡ij‚ÖY_ض= –V-gQqѾý{ŒFÃu½~†€šÚÚõ6lÜô;¨Õêó—.Ñ ÍN­ê´ô„9~\¯×_‹++/GK(šÒë ¨Â&“‰mróò¯ÅƨT*@Ú‹Ål¶@uMÍå+WÁ.™ÅbA{ÛðPyE…ÅbåzýÝ dA§ÎœÉÈÊ¢( ÙÑ÷kÖž>{*«ª.úI¶¡4GÐ2Ï ÇqŠ¢jjk.\¾ŒäõÛèµY,û?íÿµX,7újûR ŽcV«I±nG¯7ÐvãK†U×Ô°5lsR߯Y{æÜy ¸þ\ ­|Ä"Q^~Þž½»æ<0_$1 ƒœESO<öXRJJ|b¢»«›T"!xD|bâö»l6ròÄ “'Nèè4·Öh4—<ÿÌÓ×bbÙøÛï[¶Î¸oú ý«ª«ã~ûý•R©Vk>|ï?¿“§OO›<ù̹óÛvì”H%±X,—|ùÙ'‰ÄÙÙ¹¡¡á‹%Ëžyòñ«1±¹yù¾>^¯½ü2†cëÖÿBRÔ¨#äaN¹£[!KvíÙ{öÜùà I&:rôÜ… zƒ¡¦¦æìù MÓGï¿wáâÅ̬l­N;røð‡æÏ;}öÜî½{H’äó›5‘C¨®©ùõ·Mjõè#Ä"QZf曯¾réò•¤””Ç}äû5kµZ]¿¾}š7×^C •Òhšúöéýðüy;vï9}欻»ÛË/¼°fݺ&MSHHSV^¾ò»ï†Ñhš>~ÿ½ý‡Ÿ=A«Õ¾ùÚ«áaah‚1Žã™™‡Ž½pérm]Ý£=Èå"Z95Ô€{xx¢ûÇ^ «ÕæääøÊ‹/®ùéçºúz@ ijZóÓº9³f½óÆk›·l),*jžÌÝa Ö;5=]"»º¸Ð ýÆ«¯|¶àã»wgfeç444’$¹ôË/Uª3gÏ@ZFÆèÁEÅÅþ‹?û4!1é¥_èÛ§÷žýTJeNNÎÂE_ÌŸû€“£ÓÖ;ÆŒ9î\þ÷üóï½õÖÑãÇ;ó†ƒãnÀj³Þ?}êw+¿¾t媓“ãˆaÜ7÷™3ƱàÃ÷üý’RR£¢"-\xìä©ËW¯íصûµ—_Zðáûb±˜¤( i½4¤¦¥_¸xéÁ9sFÕ£GLL,IRç/^  ÌÊÊ>ñÒü9L7Øð »Ró˜}ÿ´©¹yyÇOœüâÓ…o½öšÂA‘—_0sÆý<4?!)©¾±±¸¤äå_3jÔ7߯žÁ nn®AÔÕ×;ª”Žyzz€‡§‡X".)-Å1Ü×LJ¢(w™Læçë+“ÊÜÝ\ëp7šLZÖÓÃÃÓÓãç5k¶îØqéÊ•Ï,H$ …B.—)¬V+çàè&¡R©ø|¾«‹3ðB.“€H$Äq ¥c’HÄ>>>®®.~~qññ 4$¤Q­‹ÅТÿƒ<ìÄñã·nßîååõÖk¯FF„ÿöûïjzht´ƒƒÃÒ/>ߺc§·×¯¾‚Â7PO •Ú²u[ȈÀ€GG•««+jTJ‡ À¥ƒƒ\.Ç0ÌÝÍÍËÓsÌè‘ÇNž°ÙH>A89:¢¯Í< ƒ–QbœÇ“ËdÀIüÛÑÊõ>28(ìUÒÀl6£´Ÿ{ö̹óÉ)©ÁAAaa¡_.Y¦P(œ£ „žø‡ã¸ÍfËÍ/˜3{ÔÖÕ:rlçž½*¥2ªG䱓'­V«ºQ M“£RyåjLdD8èt:¾Eõ õ4Méõ“ɬÓéBCCä‘÷>Zðò‹ÏWW×øûúîØ½Çh4jµZ›Íj³ÙÕšŽnÉ88î6´ZÑh€†ÆFš¦ýý¶íÜåââÜ¿o_``ù7«Þ~ý5†³çÎWTTVVU½ÿÎ[‹—-_¸èsoïÊÊ*“Ù¼eÛv³Åb³ÙBƒƒ=ÜÝKJK=ÜÝ“’`ÚÔ)ϾøÒ>âàà_\Zâáî–’šf±X~ÙøI’V»Rž—¯\}ô¡ÿغõëoV>\ÓÔ„2)56ªq/-+ß{ààÕk1ƒ !)rù7«^}éÉ)©q R‰„¤¨§{4$8hëŽJ¥ÃˆaøÄõܼ ø8»´Èòµ’fS©”áá®..<oøÐ!}zõòññ

kæ Wçð°P•Jàãííââäííåëí= ??_‰X¢7´:ÝK/<çééáëã(•HB‚‚¼½<¹§„£›€ŒÝÛÛ+,$D.—øûûúx÷îÕS&“99:yyyöêÙ€‰Œˆ¸|õªÕjõpwê±ÇT*Uô AF“Q&•Ý7uª§‡G}}ƒ\.WÈåîn®>ÞÞyùùr¹âåž—J¥ž§Ïž3{–·7Í0yùù …âåž‹Å55µ …BnWJ¡P¼øÜ³C¢×Õ׉„¢°Ðà??@¨tp¸pñ’“³cßÞ½ç>0 Çñ>½z`a!!F£‰¢('GG…Ÿ¯ï $R‰«‹«››+t=®[çæ½3½~û½t~ãi±Xh†‹D·s΃A*•Þþépppü%(êáÍwß»oÚÔ±£G£>Ùí*˜ž‘±vÝúµßû«,· °èË¥Kׯ]CgË7ò/èõ£o&hüEôóx< ÃÐ7v\¯£±v§hÚ~T=‚¨’htO&“±ç6c'¬±±ìÆl³‡ã8EÓ8†aFÑ4ûÆËÑÍ`½9ûü#ߌ…¢(Ç#ÂÃår9´† /´€ò!·À ;bM Çñ¼ü‚aC‡°Gam“u&mJ¡Uìþq±ûN+•HzDD$ÉN%c½MÓ4Í  Ùý³ß8àÆ]]ŸÿØéppüàB¥;“[÷úÿ³·óûÄßÖ¹b“Üý‹5éê‹q¯ÂéõsppÜÿ¤çþïöɸwˆ¿ wá8888ºœëçàààèv´qý7Ò#©»L¯Ÿ¢nT¼‘6›ÝN¦Ÿƒþ™!t¦gà¬õÒf¬k70Ã0‚wWëõßlñö«Ê rpÀ †`?Ýç/£æ:Ó3´[“›Õðv&-u7ZéõÇ'Ä"Q~¶EE?òó víÙ‹.œZ­>qê+tûÝê:PIiéÅK—Ï]¸PW_–›L¦ôŒ Tû^E?yª©I vÝ´ «3Žþ€¸ø$ÿÍÅ ptO¤¥g”WT²#6¬ýFv„ ‡µô¯^¯?yú4’V¶‡Ý’ ÏgØïäf¥ÀÎNÑEQ$E¥gdFv ;_çFd]}ï"Zµð‰I‰ÇOµo9)Š€Ìììç_~eÿÁCPQYùëÆMMÇCs»:§®èÎíÞ·?&.~Ç®=Õ55h¹Þ`ˆ‰‹g'šñZÈŠKJ6lÚ$ ÀnÞÇÃqumpGÀ?¯¯iÙ!G7Ù×–­Û’RRð-Û¶ÇÆ'à8ÞÐØøýšµ$I¢‰QÈöQ°&²,ƒÑøÛï˜Ì­úŽÐâ%"[c°«n¬Œý*ÖNÑÇÃ1,6>Á`0 ]¡Uj†­!»¦å,âÙ)œ`¯á™é™™ƒ!00ˆÍÓ†ãx~A!Žãé™™ƒ "6.~æ}÷UVUýüë†3çÎ;9:¹º¸t‚^?ºs›·üùìSO]¼r9&.îjLŒ›««££ciY9Žá¿ýþû©3g/]¾Ò«g”X,Þwà §‡ÇÀþýÖü´îÀ¡ÃNŽŽ2™lñ²å‡3›Ía¡¡‡ŽÙôÇŸ%¥¥}ûôÞ{à`ZzƉS§D"Q€¿7#Œ£»LìÂå+11±/_6MB¡pÑ—‹“R’ E\|†ß6焇…ÅÆÅ8täÈÑcb‘ÈÇÇ;'7÷»5kOž>m2™fÝ?+Ùa˜ÉdÚ¾sןÛwà8^U]ž™•}ê̙Ȉð?¶nÛ¶s§Ùl ±×ëG¥¶îØe2ÃBCcââW¯]›˜”¾mçÎc'OˤR¥R¹oÿSgÎ^¾ru`ÿþÛvìܸù÷‚¢"$öÉjäæå±diJj Á'"ÃûißZçU{‹0 c4[&U77ÝF£1"<ü¡¹s¿^¹ eá±Z­_-[îéá1,:zÙŠ•uõõöi;è4 3;›¦éÀ³Ù2ï¦NžôýÚ Ï?_TRŸðÜÓO•WT9~bââF¹aÓæk±q<ø ‹³3GL™4iüØ1¿ÿ¹õ̹sßý°vİ¡Cb (jÒ„ñÓ¦LùeãFà†9º+6›­w¯ž/>÷ì[·òùüžQQC£££ Œêéïç{ÿôi¾>Þ‡c€ž0~ì?þTXTôÃë¢ zâÑG‘ Ðts0ÈÙó6oùóY3C‚ƒUJå®Ý{àè‰M]‹ÝôÇ–fÍ mV fõúQ©Ù3gôŒŠª©©ýéçõ÷OŸvß´iB‘ðèñã^žžƒ <|ôXiYÙ‘ãÇGŽÎ|½êÛýûûùúΘ> i´Ñ-’ý¾>Þá¡¡C££‡ œi·ÐÊõ›Ì¦ˆˆÈfÍAj9XK6c‚ tZÝäI¥Réú ]\œ‹Š‹M&óü¹sÆŒ% ³²²¡%›c‡rîüÅ~}ú€H$ôóõ>t(0PTTìîîÎÃy="#¼<={ôˆdh¦¡±Ñjµöˆˆ˜?wΰ¡C6ýñGm}=IÚbbãróòišvws[øÑ‡§Îœ½ÀH¥Òˆðð>½{ÉårsK>9ŽîAáaa!ÁÁn®®|>ßÅÅ9$8X©Tzx¸;(•úõÃ0L*‘ôëÛwäðá!!Á»÷î#øÄ´)“ýýýŠíæ`ñcÇ<õøcÛwîJMKóöò:zâdUUÕ„qã†òÌ“OlÛ±+7?ZFìKmݾ£´¬,-#ÝÃÃ}Ø!áa¡BÀÍÍmìèQH‹ÇqÿèAƒž{ê©‚ÂB‘XäääÔ¿o_$ÍÏÃq$æ#‰œœC‚ƒÝÜܺ6:ñ®¢•ëêÑëþé3x<âúg^0™Í:½Þx하¸ø´ôŒ°ÐP‡u¿lؽw`ЧOoÀ;²9EP™™(7@uuMBbÒÎÝ{ƒàà êêj‹ÕRßÐjµ0,6.>( ð¢ââÑ#G$µgßþKW®ÆÄÅŽ3Úf³––•©TÊÑ#GlÜü{}CƒN§³X,V«U­VsýŽn‹V«ÕëõÐÐÐÈ0Œ\&;uæLQq±B.×é´»÷î³Z­4Mçää&&'ÏŸ3‡´‘¿þ¶)6.®¼¢Òfµž<}æÈ±ã‰‹O(.)‰ˆ üñçõ0mÚ”ÅK—99:º¹ºæååE„‡¬ÿu£Íf;qêt›RÁA߯ù±WTϢ⇧¤¥M¦ÆÆF”ù½¾¡jjkÓ33·lÛèçã£V«wïÛ§ÓëÒ32öþXˆˆººúŒÌ¬aC‡ž:s¶ °ð©ÇïAÚl={DJÄb>Ÿß#2’‹õäè† c rqq¡:"<¼WTTAa‘P(ˆŒˆpuqÍÌÎîקϵظÌììÆÆÆ‡çÍ‹Œï«Ö4 <(4$øÄ©ÓÕ5Õ•UUA8ª÷î?`±Z_zþ9777oOÏÝ{÷=0kfP``eUõÞ¬VëË/<ïèèxèÈÑššûRV›õ¹§ž  8wþ¢Z­îÕC$EF„‹Åb ü½¼Nœ<][[+“Éž{úI¹\îææ–™•ݯwïìœÜ„„DM“¦¦®.48hÐÀù‰80 ºÍ˜ÏéõßúºÜ,<¶¾ñbÖØØ¨7|}|þr{𦠋Š|}|~G^[Žî’Þ|÷£§Mž7Ñáa•öšËti€”½VŸýÂöOÇoG¬õï…+ppü÷hc ö}¬¿´£Îô íìÍjÈ%bº‘Vzýùm®º^õ YYh‰ÉdÊËÏï½~D“V[XT\XX¤ÓéP…$ÉÆÆFVCœ­›—o2™Ø¨a¤îM¶¨{“…–kššêêë»<G‚̸¶®®©©É^£Ù ¨'I’ÕYC¿¡åEÜd2çåçßhAhKº´=Õ¢×VÝXûUÈT‘]³6ÞØØˆ6@« eº[+Úî,ºúßE´j¥Ï?såê%°{™BwèÊÕk§NKH€Â¢¢Ï¾XŒn «×ß9Þݹ»vÿ¹}û·?¬)+/G=”†ÆÆ?·ï@S±ªMEEÅâeËJËÊOž>ÃÎ÷ãñx‡ -Éö<´c×n®ïÏÑ¡) Ö®ûùZl«Ÿ|îÂÅœ¼<§7ö<„Ü(²2‚ XÛGÑâ‹—-× pƒ^?Ax €‚2[ôúѪ+c¿ ™js6Ž–[wì¬ohÀqœ×²[£ÑÈÖÝÃ08†»p17/ŸïÉmôúÓÒR’S’¡@sJ6Ç ‹Š+««33³§Lžd4cââïŸ>Íjµ<|$19ÙËÓS"‘tÂ*äš7ÿ±eÞœ’’rrs ‹Šü|}Äb±Ñh‰Dç/^:ñb~AaXHÇ;yú,Žcå¿nü Çñàà ÒFnݱóòÕ«¾¾>À0;wï¹Û§w¯ìœÜ —.UTTÖÔÖ†…†võMáà豟>s.;7'3+K |⃟dee{zzÄ'&}óÝ÷F“)Àϯ¤´ä굘k11ÎÎÎ …Z£Ùºcç™sçgLŸÖFìâå+{‰Djµº°°ÈÛË«ºº:!)ÙßÏ÷â¥ËûÂ0ðöòjã@.^¾²ÿàAo/¯ŠŠÊ-Û¶eeçøû_‹O(+/wqqqvtJJI¾›_P¶ïà¡oWÿ`6™¼½¼r9údcXeUÕÇŸ,ÊÎÉQ©”¾>>Ýg²çèõã8$É̬ £ÑvM·^¯3rä°¡C¾^¹J(R‰aØWË–çäæêõúO}a2›;ºï&étúÞ={é´ºÐà`·äë••{HMOÿiý/!ÁA:zâ\¼|)zÐ ™T*“ɤR)Ç—®XYSSãíåEðˆO¿Xœ‘•à¯×ëÑ{bŸÞ½6nþ=5- ºúS6GWAÑ4Ÿ/Z¾j•V«uR©d2™P(‹D ¹\*‘H¥’ ›~‰‹³X­ ?û\§×½r•^¯Œˆ@É< eˆN>³|å7á¡¡ M75iøiì=p0-==6>aÉŠáa¡¨;Ë– ehÆd2}±d©P pvr¢hjõÚsóòø|þ¶;sòrW}¿æÔ™³ë7ltR©dR©T*Eó¼†ah¡PÈårÙ¿5‹ø¿A+×o¶˜Ý=<æ<0O"‘Ú·<¯I«}ú‰ÇË+*öìßïêêš›—WV^ñö›o¼ðì3«5>>:å›û¥+W##Âq‹ÅÇ {æÉ'ôz}fV–»›Žáú÷;zôàAƒÔj«ÕÚØ¨9rxXXXP`à¬÷WTVUWW½ûÖ›Ó§Nqrrœ:y’Åb-¯¨T*•‹e@ÿþÇŒ¯ªæÒ4rt_x8>jÄðû¦NuP(d2YxXØè‘#zDDôêåãíýм¹2™L à;æ…gŸñóó]¿a£Él~íå—ÆŽåèèˆ>ž±C:={F è×/!1I$E$•H’RRŠ‹K¦M™<¨ÿ€ø„D$Ì…ÞéíKÅÆÇ{{y]‰U©”O?ùÄä‰dR©››Ûã>2~ì¹\Žax€¿ÿƒóç~þÉÂk1±>¾>þþÎãîæÍiqš¦]]]‚ƒ‚FÑ¿oß6ªÝ™V®ßÓÓkîó¬ßG¾Üf³ŒFxãµWþܾ½¤´ÔÇÛçágΞKMO·˜Í.…Švž˜˜=h446VVU¥¥g˜ÌwwµZmµÙššš@oÐ …ÂØ¸xwÆ®¬ª*.)Q©”f‹åìù MMMZ®GDį¾²ïÀÁ»÷ˆ„BTÖ`0pý}ŽîŒÑdD‚øFƒhšÊÈÌ4™Í|‚ߨnLiy'Öiuƒ±´´lXt´^¯¿xérEEE]]=MÓEÅÅyù¹yù••<寧wtT½ýþ‡0iâøE_~%‰üýI’|éÅçUª>^HÓtAaQ^~¾})'GÇ7ß{ßÇÛ»¸¤$'7¯Q­¶ÙlZ­Öjµ2Z­–aÞ ×._»¦R)Uªºúú”´4‹ÕZ[[—“›—_—_À0™™ZŽ“oci¥×à(—Ëíûûh°¬¡±‡óúöéíìä$•H­6Ûä‰B‚ƒ;–š–öØ#ttÆKôí>;'çøÉS/½øÇË/,ÌÌʺxåÊ“=V^YLRÔÀþý«ªªœœOœ:=zäˆà  W—’²²«11ÇóõñÙº}G\BBXhÈÉ3gvïÛçïç÷ðüyF$õŠŠ*.)  òòôì>‚,†•”–øúxçåçèß?$8èȱã4CÐßl¶=qbðÀñ ‰ç/^JHJ3zÔÄñã\\œ·îØ‘—_àãíÝ·OïÕk¼{ùê5VË#ˆŸ~þE«Õ>0kfXh¨—‡ÇÏ6Ìž9#"<,95õÇõ¿4iµsgÏöõñY±êÛ˜¸øËW¯²¥štÚÓ§‰Œcø–­Ûò {õìY]Sƒòp……„:z$55­¢¢âÅçžõöò2›ÍÇŽŸˆ4èÜÅ [¶mOKψïգǡ£Gq àró¶«×Ï~ֿžºäª¡ã––––WVŽþËjPuþÂÅú·iÉÚœIQ 8ÍÁñŸuÂ>\øÉØÑ£'Œ{;bº(H¿ëõúw?üøóOº8;3-´+ÁÆ–bšs†€]—”a0 +.)YºbåÊ¥K¤Ri÷qè·Ï)w¶{ùØÜöH¯Z¦J±ƒûý…jåëëëëë‹þD_}¡%,ýÙü›ap;f4û\Ò4 †·”b¿HvÁ^öûáž!Žn kÈË#3g— …«•fšó ‚hkŒ vMÚ‰ÍfãóùGŽŸprrtqvFEØ—8ŽÓ4ƒ˜íKµ¬¢Y“´×ëgÆl6-Áͼ“ýYtõ¾[¸Çôúѳu;sNœƒ£ƒ¨­­•J¥R©ôö‹°ýt±Xìæêú¯x›ÍV_ßàæîÖ¡YÁï]þSzý·ÿ¸pßs88:WW×;-‚,×ßÏÏþÏŸÏ÷ðpïê‹q¯ÂùGŽ;ãoK¼ýë:‰œ2Ïßæ^êõsppÜ üí>û¿>Ëèþm¸^?G·ã¶ôúÛ¬êò—¬Ûmìòªrpt8s»‡¸-½þ6«ºü%ëö¿÷vyU98îiîH¯¿ËÍÓë¿}Z¹þºúºv½¿ÕjÕ è¾Re0Ðò³euEŒF£Ñh³ÙìÎfﲿý£ÑÚ")…6fÅÇÙ…¬Ø·ÕjmSœƒ£»a³‘HŸ¥fZlÇqªe¹½í£?I’4 7zdbͥ춷_uc5ìW±‡ƒŸco¿öiØÚïÊþ,ºúêÞE´JÕrüø‘ŒÌt{ïÜâ©3gGŸXXTùo¿ÿ!ZÎ pwèÎíÙ¿õšµ_,YVXT„f™ÕÖÕ­]÷3I‘èO4ƒß|÷}³Ù -·¿Y"ŠÇcgy°Ù¾’SRW~÷=ÎMîåè® äk~úéòÕ«È@0 ËÎÉ­©®ÁqÜb±$%§°£XÛgíHÓÔôÁ‚Oôz=´ùAâþ˜Ý«:›õ]uceÚ¬bÇþøñçõ5µµ¬Q€ÕjekÈîçúYÔÔ°žÚôúm6ÛÁCòòs1 c ÕÍãóùßý°0«ÕŠš‡´ôŒ¸„¤Õ×iÄÅ' 0@¯×Ÿ:söÂ¥Ë$IŠE¢ðÐP½Î“›{úì¹Äädtï“’S ¹Z£1†•WTh4ššÚÚCGŽ^¾z$I ÃÒ32ŽŸŸiQ\ˆ‰ûjù׎*MQuuuë~ùuúÔ);v펋W9ª.úÜÅÙY«Õ†‡…!ܪ”£“N¯  ýô‹ÅÅÅ%&³98(èÝ?ÊÍËãÄé³ç\]œ¿\²ÔjµîÚ³W,7ªÕ—¯\Áq,,4L¥R²î«¬¼bïþ&“ÉÙÙ94$î‚ovCo!ßÖ*®ßfµÊdò©“§I¥2û†™ÍæÞyû™þ§ËœŠJJ®ÆÄ~÷Í …âÙ_º=h½¼FGœ†a±ñ þ¾¾B¡@$=<^hHÈ ¯¼š’š&•J)šîÛ§÷ Ï>£ÕéòòóG^^Q1|ØP‘Pxôĉ޽z‰E‘‘š¦&£ÑPV^‘˜”½•Jåïn---ËÊÊzpþ<±H$‰|þðaC¡%v³+ÅçÇ»|åªÅbùfùR”…[&“¾ñê+(]EQ..Îï¾õfqIÉâeË?~ÿ½s¼ûŽD"–ùü4Môï×wà€þÓ&OFi\»úß´òÔ©tÖÌÙ¾¾~7Ž—™Lf>Ÿÿü³O¯Z½Z§×Ëe2šajjj ƒÅbQ:8tNu¯\½:$:Ð÷[«Íh4šL&‰DlµZiŠfs¯Ëe²„Ä$gG'©D2p@‹ÕºbÕ*Tð“EŸW×Ôöê¥ÓëÆ½ä‹Ï8¹ôë‰Äb±¢ÓÅ1®³ÏÑMAùСÅušL¦ÆÆF`¦©©I­i çá`2›œM&s]}½Åb1€Íf3›Í«Õbµ††„|»âëÚººÿ½öŽã£F_²bÍ0áaa¾>>ß­üº¦®îµ·Þ‹ÅbjSª¶îÕ7ß‹ÅjÆb± ¯ÄÙœZ$I†in1šš´¾€àš&¦© ©Å™L&³ÙŒ>õ™ÍæÆFuW_Ú»‹ë½~†a¦Nž¦°ËÓÂ" r>tèÔI“3³³œœ{ø¡Õ?þˆvÿ}ÓÂÃÂèÛVû ·òŠŠŠŠÊèÁƒÀA¡Ø°i³Z£žÿ·Í¿?q*ÀÏoæý÷Ym¶Ÿ-ruq•J$F£ñ³/›Í‹ÅÒ¯oŸÈˆðÃG1 34z0L?þû5?¾õúk|‚8{þÂá£Ç˜aC¢Í&Ó ?%I›ÙܪT¯žQýúö‰êùÒko=óäJ¥ò32©T,•””~¸ðÓÆÆÆ'{ÔÇÇ»GdäÇŸ.ZúÅ¢3çÎ?uJ!—“$õÑ{ï̸oúÊo¿‹DsfϺûu*;‡ÛÒë·WÜFÁ‘èã»Él¦iZ*‘tt-ÑPRfVVjZúƒóæ¢`¯&­–a'GGT%$îŠ$dIŠúãÏ­Ó§Lquu€³ç/=~|ùW‹ÑxbYy…ƒBáà °Z­UÕÕ±ÄÅÅ…ˆ‚—¸·BŽî I’(І$Éf37™0 ‰D4Ãèt:…bÁg‹zDFN?N©T¢QFCR”J©Ä0L§×Ã0 ðù„H,®©©aÆÓÉ*¿ðÊ«¾ûN`@I’µµu 0(3’V§»Y)¨«« svrbGl0 +.)ýjÙò·^ÕÓÃC¡PÃ0zƒA*‘X,‹Å‚a8#•J ‚`Ï¢«/pçqÊ7kÛtçYl±H­´;´ÿȈˆÈˆ@™?ym\ûÚF(޾¾RWÁ´`¿ðfˆ·®êÍN¶ÝCpptÚ<ùöþ¥Et¦ÉÐ71ÞÛ9)hãú&c»Êv¬È*û'úÑ%Ô>žŒ=:ŽaÐ^«ÀnÆ.·ß ÍNÚìŸ þáè†Øk¶ùÓ~y»-ÄÍÂ4ÿ†G¾Y Äþh×äo&ÌÙæ¤8 ­^ÿ‰£•å7êõŸ»pá¡ÇŸhT« ¸¸ä³/¾DÒùè‚þ‹Ÿìo :è™sç×®ûyå·ß£G­¡±q˶mH„Ùþë †O>ÿB­ÖØG³>]£Ñ¬^û+@ÍE§×Ÿ8uú—¿ét:[çêQspt!Ⱦ¶lÛŸˆfÞ@Cc£^¯GócjjjÛmеZýÅWKQ'ûâf½¨Û_eÿg³Ï¡é-Û¶Õ74Ø›6EQö5´§¡±Q¯7p9{ZõúöìÝÝÐP߯¦¸ø„5?­“ÉTPTD34hµÚ†ÆF¼§tÀÙóçœŠŠ‹323kjj€àñU*Š¢L&SqI û@dddÖÖÕ „‚Ò²²†ÆF^Ä» ‹Šl$i±Z/_½’›—_\R‚¶GÏúÙsç¿]ýÃïn]½öÇN;5Ž.ÙWJjZjzzIi©Éd€e+¾Ù»ÿäæç¿ÿñ‚â’’$I’Ôju ¨ Žãµµµé™™yùm2aa¦7ŠŠŠ‘˜šÅbš¦ Cóªâb£Ñئ&7®ª¨¬¬¨¨¤(Êl±455©ÕG•#Žã$I544èt: Ãòòóß_°Õ°Í—¯üfßÁƒ$EuZ?õîçú¬h …%%Å»÷î|ä¡Ç¤RMÓ4Có€g±XžxìѺºú£ÇOôíÝ ‰ä=~âð±cÀÀÀýžxôÑŽV·§†Çã©5šòŠŠ·_ý艓ÇNœ8rüøð!C&NŸ˜$‰Ö®[šWPðÑûïõìÑãôÙ³cFŽŒOH<}ölbRr¯žQÏ?óôªïW;::FEFNš0A£iÚ²m{YyÙ³fΞ1ƒ¤(Žóx<ƒÑ¨Ñh»þ:Éõ8þÛ0ÀРËD'NNMO—J$Λ”œœ“›+‘Jkkksòò–®XùÑ{ïî;p0¿°Ðj±D„‡¿ùÚ«Ûwî:sîœD"µZ­¬ÒMÓ</'7wíºŸ•Jå ýqœwùêÕ/?ûôèñé™™<8ÙŠ•ÎÎÎa!!ΛËÊp±¥Ѫ5?ýœ–žîååùü3O¹t™ÍjëÕ3ªQ­vtTmÜô»J¥,++ÿ·¯ÆÄäää|ýͪ×^~9"<Œ¢(€àñÒ32“róò1€GziÚü·-šƒë£Ù ØeÞjùAØ÷î­V«D":d8Òëgó™Y,š¢|ðþ;~„ã8Aµµu7ÿþͲ¥ÞÞ^sz¤oŸ>½¢¢:TÌcˆ‰svtRœþ.IDAT*HùÚÛo††„<öô³îîîõ ƒÑÙÙéóO?ùdÑW¯ÅôìÑ#+;çÁysüýU~õÖk¯••—W×ÔκFï^Q«U&“-ýòó#ÇŽ>vlöŒ<€ˆððçŸ~º¶®vʤI·x'åàø/Fc4M¦¹Ì~`æŒYóôòôˆ<¸O¯^ÌœQRZvéÊÕ•Ë–Êe²‚¢¢ ãÆÎ˜>ý©ç^8pèð±'—/YŒcØ[ïÀ£Ýª5MÕ5µ3ï¿?ªG¤B.ßüÇŸuuõW®]›>uŠF£©®©›=sfDx´hg¡‚¨ÔŒûîЯoRrJbRÒ†ŸЦ?ùèÈð°'Ÿ{Þhª7Ö®þ...þÛÕ?,údÁ…‹—W,[*•H¦y‡4MGõˆìß·ïèÁ3￯›èõcÍ065&òø 0lzZBÀää刄" ä2y°ƒ Lbr"ûQE( E|//÷FMÈáÑÅ¥EôMMO=jX]C­F«ž8aLiY ÆÍ;èd†µõ5ôIÏL4¨oYEIÙF Ö45öêIÒ¶ýzgd¥‡† …ÂKW. ØO­iLM×&§¦ 2¨¶¾çÁÔ);d4ëG ŸݧwTrj2I‘À€T*õðvquÄyLjzjWßDŽN™XXhA`I)‰ãÇÊÌÉ ðå‘•ÑÐÐ0xPÿ̬ ±XÜ«g$‡åæçŽ3²¶¾fÈåe:½nà€¾é™é€õ‰pʤñ‡ŽÒé›üGz%æŠ'ô´)=¬7h}¼½Ñ·ºÖ¥[m&›><:-# Iö6¸A]—˜l4°ŸÑ¤>lpRr"Àúô‰ÊÎÍŽŽîŸž‘Æçóí?6ðùüÐ@ gÒ2R-–ôQw ÃhuZ†a0h%]c#mA`/^ 3[ÌÍŠ¦ ˜Íf;$`hF(O§×ËerÀÆbµŠE"^ò¢X­6«ÕŠáX‡N `F"Ó4c2›r¹Éd¶Ùlr¹œ$m<Iêõ‰D‚r5H$b½Þ€Dû03è ŽIıX¤ÓéI’”J%:½žOðÁhÀ Ð+'Žã6«›ÌÑÀ€¡©Tb³‘V«U&—™ŒF¡PDR¤Ål!B"ë †f¤R)ÊÇ"“IQ§Ro0à8.‘HŒc«È`š-N¯·X,r™Ìf³ñù|£ÉDS´DÒlŒV›ÕÞ=±¥´Z†a|>¡7p  ¤R©Ñh¤iZ&•Y­V€¯70Àd2™Éd‰D£¡•³cOŠ$- ŽãÝjòÒ¯8 Ä‚ÌÌLìÒ¥K}ûömt¡ÀnNŒfh†ax8¢›3p §Çq 0Ц0 Ã1œéà‹ŠAsÔŽãMáŽaÍGg“ ðx<Š¢1 Pª![š'( ©?š¢qŽFÄÐZÔ´L'œÇ]…½9Stóà;ŠíFÃ÷­LÇY 6â½%ÖâÐ>‘²Û³«ÚØ» ìÍ“=ª˜ý®X§t‹“êv}Ãé¢w»¤ä$ÂFÚ´:­Ífë>ïA݆aøV¾´‹Ä<œÇ¹~{ZÅÆt(Xó·ÙŽ>"ð!xaç±¹8888º9` 0¬ Ú9©aÑwo@ÁÝnü‹ƒƒƒãæ ¿O’dye¹ÅjÁ £»Å G¸»¹@UM5M‘ÐaGdÚÕÅ Çñn¡×ÏÁÁÁqG`VY])‹}¼¼hšî@çÏ4§J/¯,Ü\]ä2yŒ¢¨šºZµF͹~޶Ð4MÚlÞÁÁp,†f<Ý=**«/O³Ù‚áÒÔ0 CMÓ陜ëçàààh »Ž†aЦ‘EÓ4CctG¹~š¦`ã²tqppp´G§Ç½tæ1Îõsppp´Öö/6 òÖÒ^7®bn# êõ·ÙŽã(üòoã´w\ ë&iÙ9888îœVŽ˜¢i¤-˜¬À¥}j´¶Ù_·¸]¶«Sí´†µrÓEÙl64ÿÑCKö‚›ý`wÚœÐÇ‘ÈÍ­×ëçàààhÖ[2 #à *ª*3²2 ADAqa~aP äñx¾€õò|>_ $§¦hµZ@€\6A£A§×‰„"ä¦Ñòöw½ 9y¹—®^IÍH‰‹Õ4iPs"XAÈ¡£8† Ž#q ‚ „B¡´5ª…Bá çÆ¹~ŽöÁì24ÍÆ\"‰!‹Õ¢Ñhªjª,V+’G®«¯/*.2šL8Žk4š¢’â†Æ†arrs3²2ëê1 ³‘dIi©Z£þKuH’"üýÇŒíììœW/ŒFcQI‰Á`Àq\­Ñ ×ˆ&­–$I“ÙŒVa4Õum]mQqqJzZuM5EQììÔÆp®Ÿƒƒƒ£]Z’c°c8 ðùü’²Ò”ôÔÊꪸ„x«ÕZZ^–•›m4­V+Žã5uµz½>+'»¤´Äbµè †ºº:Š¢Ò2Òuz]n~~m]Ç»Å7 Ã5š¦ªêJ½^¯T8èõúôÌ ƒÑž•i2›ò Ê++0 KIOmhlÈÈÎ2 i™‹¥¼¢Ÿ¯Ö¨ë‚pwuØ¿¯¿J©з›D¡eÏ\¯Ÿƒƒƒ£=ìý0Ã0B°IÛd0ÌfsCcƒH$ p `(’äóù£ÑjµR4eµÙ’“x<žL*¥iš¦H³Ùl³š1 ã„\*ëÙ£G ½dòCMûùúŽ2Ìjµh´¾€Ïç ”úöS©U*MÓ™YY^ž^8Ž ¥ƒCÿ>}Ý\\­6†a4MR4eµZŒ&S«w €ûÌËÁÁÁÑ>lº ³Ùlî®n®.®ñI‰1 qb±ÄÛË‹¢¨ŠÊŠË×.[¬Ö €@_¿ü‚‚Ää$’$|¾D,®¯¯7[Ì<ÏÕÕU«×¥¤§9;9»ºº•–—UTVš-fï;eÌîË2ÏfµI¥R?_¿Œ¬L7©TZ\RR]SCÚlBÀQ¥b€qrttwu“JZV‘$Áãñx<Ф•*ç%¥&_òAII0À.^¼Ø»wïÍ­ÈÁÁÁqÏQZ^Äþ‰¢ìQžH@ àóÓ33-6KP@ H(Bá7V«Õj³ [b1õ½X$æñx<œg#m4M  à   Ù\4B¡05=€éÕÓb± oŒÒÑ è«Í†"yô=Ç „ö‘(ÄÈ`4 Ul…QÆ*I ø|´1Á#´zÝ…‹¹¸~ŽvhÓf†$I¤xLÑ4`#m<¡RªL&Jö‡‚;Ño Ô %JH34ŠæD«¤R)´Q‰À0`˜V‡äá8z# %fF.“Û—µŸ(Ðf´4 "€¾>àÓÜíç\?G»´aã÷‘¤³—§XíR½#ïÌnÏf´…Ö³jÛ‘jÞmóæe­Ö37-{‹Ý¢åíí“sýmA.»¹‚EQ*¥Zföþ£c]´û9ÀtR8Žçú9888nÇ0Ž›L&¹\޼«€¬Å“ò ‚ùÒk †af‹ ÃÁl± !£ýÓ+Ûž&@À¹~Žvpvr©®©©­«ëè¡á#gWÀ ¸¤„GÐA £HR*•9ª9×ÏÁÁÁцaD"‘—§wçHö³¢R‰´CÈ0ŒX,®¬¨ä\?G;4ótJÔ»½»ïÐ#2 CQÃ0œëçààà¸)÷ѵkÈÍæåàààèvp®Ÿƒƒƒ£ÛqÓvœ«ƒžØ¹)Z}§Ð Ó2?âŽ+Þ´nQˆMˆÃÁÁÁqïrS×/“Éx<žÕjµX,·(<øºo¤Y! iŠ2™Í4M³jm¶¤iúNw.‰ø|0[,öÂx·‡ÃÍ'Å!ÎùâÏÁÁÁÑq´ãúQ àK—¯4ªÕ!ÁA¾>>4Ãà-J@¬®Ú’ @ ×ë ‚`-·O_‰>W£æ•› EÅÅ™Y..ÎaaB¡P"‘˜Íf´vç8ŽK¥R½^r`¢¶¢(”߀=úã8ÇçÔÕÕc8àïïêâ‚ä–Ø  ô:ÐzN6úA„Á`ÀÄb›{‘ x<‹ÕjµZ%b1fw5X½Žýõ…ƒƒƒ£ƒà=ýôÓîîîöù‚…BáëÖ_5Œ™ÙÙƒtP((Š¢(J*•"O®tp‰ÅAT×ÔÄÆ'ôëÛÇl6ã8®T*EB¡ÅjÅq\!—K$Ÿ/dr?bF"‘Ä%&®^û#Aðcââ|¼½ƒƒ9âëããàà@Ó´R©‹DHïäé3½{õÄ0 „ŽÓ4-—ËI’$Béà ‰,‹T" …‹Ã@,°ð“ĤäªêêÃÇŽE„…9;;‹D"…\Žì¤R©T"‰D|‚J¥b±˜ÇãÉdRàóù§Ïž--+ï%‰¤R)ª°B¡J¥B¡09%åÒ•«#G ·Z­EÉe2ša„Bƒƒ’u寂888îrx<^MMM[×ú³ß¯ýñ‘|î™§ èOQÔÙóçJ¥26.Þjµ ¢=ûöÇÆÅ{xxlÛ±sû®]4EùùúX­Ö?·ïÈÉÍ 6™ÍgÎ?ábQiIMmí¾•.ÎÎ6›M¡Pì?xH§Ó-[üåø±c\]]®ÆÆ.ÿfUUuµ‹³³Õjýcë¶Øøxo/¯K—/¯^û“^¯÷ôðÈÊÎ!IR!—Ÿ=ÁÝÍ­¡±qçî=Ù¹¹á¡¡±ññEEÁAAV« ˆó/½øÜ³Ï<ùD\|BMmíè‘#=vôÄI¥ÒÁÃÝíZL\BRbvNnCcã¥+W®\½JQÔá£Ç***CƒƒÕš&…B!•Jöì?çéá!‹Ÿ{îä™3Aü¼a£ÅbYùÝw©ééNNNMMM@(Ò ß­Yk³Ùróò6oùÓd4}·fƒƒÃž}Nž>+‰V~·Új# ‚ÐëtÓ¦L€ÇŸyvçî=€&‰Ð½^ïàà`4W}¿ÚFR‰„¢(@°c÷l˜ ›6WVUöÅbÁ ðI’,**ÎÍËðù CãfµZ·ïÜõÓÏë‹KJF~èÈÑc'O99:~óÝ÷:~×Þ}ÇNž ›ÿü3;'Çh2}¹l¹›«ëŸÛ¶§¦g¤¤¥Å%$|÷Ú”´t•JEQä–­Ûöì?àéáa2›òò Î_¼tùʵc'NX,–Í[þLIMÛðÛf/OÏ_Û”–ž.‹¸/w?m]?Žcf³yöÌ?®þn@¿~Ÿµ$%5mþœ9©éé1±qÎNŽ}ûôпŸÕbÕh4~¾¾ýûö  zú‰'ÔMZzF“V[ßÐXRZF3t`@À#=Ø¿oß^={<ñè#E‚ ¬6›·—×êUß¼ü ç.^Zùí÷Çñöòzü‘Gz÷îå¨r†1›Íõõ Q‘~¾¾ÿ{þ9_‘H$•É|¾J¥”ˆÅ£G¨¨¨àó Ã<ñØ£/>÷¬¦©‰Çã1<.‰ ů¼Ü»W¯3çΙL¦ªêêšÚºú†F•JùÀŒ3î»O¥TN½{{{z-X´H¯7<üàüW_zñÛÖ|÷ÚñcÇÔÖÖöéÝû­Û×®[¿öÛU%e¥J‡áC‡ ‰ìáîf0¸½w?m]?ú\ŸXXT$ gϸèhدïÚŸ†‰¶X,‡Ž-,*Š пŸŸ¯oxXè/¿ýöþÛo=ýÄãû¼;vô¨ÈˆˆàÀ@ÀËÓÓÙɉ ˆàà œÇCÁ0åÛwíÞð·×민LÓÌì™3ö8èëã3aÜØ­;wž9w>",ÜÛËkÌèQnßáãíõÀ¬™¿lø-¯  8(6nþ½¡¡qÌÈQ½{õÚ¶s§Éd:$Úh4Ò4àïOQ”N§³X¬ØCsçþòÛ¦_6üæééàï§R)išðósP(Ä"QP` àëã£PȆæÄÞRSÓC‚CÆ}æÜ¹³çÎ E¢éS¦à8æçëÇ'ˆ‘ÇQàïãã•_P¸ñ÷ßU*ÕCóæªTª.ÞÍÁÁÁÑÑ´Ÿ›W"›MfœÇãóùƒA¡Pì?p0%=}á‡ïëõ>AŒF‰D‚ã8I’B¡¢(›Í& )’²Ú¬|>e¡´X,(¯ÚÌjµ¢PH¡Pˆa˜Åb‘H$‹­E!=|>ßd2ñp\,³ÒÕV«í P0šL ¹œ$I‡ö†NA(ØH’¢iTJ„€Ï× >Ÿ¢i@@Q[mTO³ÙŒþd£6-'HÓ´ÙlFy×Pd‘ÅbèÊà8.‰ ª7ÐÏÁÁq7ƒ §¤¤´?à£×p§Hj,ˉӧ˜9cÆF’"‘ˆ$IÀ0Ìh4"i2™Px; t1™Ì8ŽY­V´™ÉdBƒ!h‡è‡^¯GeÙ%‹M 08Ž£}Ú{vvPE,¡…¨£Í6]æ–]A‹¶Íf#‚¢i°?PsÅÌf¼åO†aö'ˆš‹ÅFY,¨‰²X,h¶ªO›Älw3í»þf †7ûôÇ}$48Øh4²)äYWËŽn³?Ð*”ìÆÍÚ]È.i³êÆ Ø%lÚÄSÞø§}γvÔÞNìOù…ŠAk‰npŸƒƒãžã¯Ý3é×§êüvu…98888þ)ÜE¾]ØQ®®0Çß„õöŽã:+ GW>óâ8N444$&&r¡)ÝÇþúŠˆçG7"æ%tEXtdate:create2013-09-04T17:04:16-04:00V¥%o%tEXtdate:modify2013-09-04T17:02:16-04:00*æí”tEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/transition_from_boolean_1.txt000066400000000000000000000003531330160122500266660ustar00rootroot00000000000000After selecting the arrow under Boolean Enabled column, the line will expand to show a link which you can click. This will take you to the booleans page and allow you to enable the boolean which will enable or disable the transition. selinux-python-2.8/sepolicy/sepolicy/help/transition_from_boolean_2.png000066400000000000000000000767331330160122500266530ustar00rootroot00000000000000‰PNG  IHDRþpÖ·ŽÚgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“|ÖIDATxÚíÝu˜EÚðªÖñ™u׬ÆÝ Áõp98ìàü¾Sî8— wßltw“ݬ»¶×÷Gív&9$Fæý=ÇŸêR3_x%cܯÎa¾BÆðÇ?rC‡ü !tô¿{m?¾`œBC?4ø€“†Æ\–eB„Zá #D2 ƒaú'„ýëË96ï]†aF¿0Í0 1 ¼ïpä›%¡ecýЂp‚Ѓ“ùô˜?Zí„™o8ÕÅg2Zg†å¸`0d" p؇ÆeUÓÞ7áÊ5’,-Ìø/X±n㓯¾iµZýàÀÜüõ÷wÿõþ?ÜyëˆÁ…áE[ç/^öÄ}E„aYEQB¢ Ȋ²,Ã`Œ0!DV‹(„¨ªÊ2Œ¤(¿ðÑÖö„PÁ€ì;®¿:#5cÌqœ¦ªþ`ðïÿ÷®®)­¨ÜW]ûßÞ …¬V !½á^‘e‚(Šº®Ë²l·ÛßýìËyß,zäÏ¿1dPSKëÿ=ôxANöŸù žåX–5t]QUžç1F Ãjªªé:ÏóæŸB‚À3˜!ˆhš®ëº(Š„Y–Y–E!Œ‘…^Ëø^ Ãà8®¶¡±Çç>°!T¼«4ÚãÎHIV5-<¶÷ý|À‰¤†Ýf[½qóܯ¿ý÷ÿý651á@mBÈDGy^|è_²¢0 V5(Iº®c„EÉÎH»âüYš¦5µ¶!B‚’”–œD©®«OKNêêî‘EÓužãÒSSöW×0 “’o‚êèêþ÷Ž4ð/<ùÑ— þñÛ{jêz¼Þéˆ$)(IcG ËLK5 !´»r˰dž‘–œ„1ÞWUít8<.'BHUÕn¯oÞ·‹G ôåâeUuõy² ÍÍm±QQ)‰ Í-Ä0üÁPBlŒÇíjhjnï슉ö$'$0×54%‰ç¸(·ÛãrîÙ»O„ìô´ÖöŽ{ÊUU‹Ž>°r€ïÄ0 Že_yï£;o¸cüœ÷ï¾ñÚìŒ4YQÂ÷ͺþÁZÿ©.<8Ãéš–œŸ™–úõ’å“ÇŽž:n4Bˆã8¯Ï?ç“Ï¡Ð衃§ŒÍ`LÑteÙŠýU_.Y>8?ç?Ï¿bÅ®žž!y³¦N~ô¥×^}äÁE«×V6aì_|uç ×¼0çý;®¿:#%YVƒ‹ ¬X¿©¤¼Òëó_tΌՋæ|ò9/ðÑn×/o¾Žã8žãÖoÙº¯ºvÂÈaO¿þö¾êÚ(·;9!¾xWéÃúÕ*Þ÷ijºû¶ØhB(’&Ž”¤WÞûh÷¾ýgM¯ë:Ë0ó-«kjîìê¾ùªËVm,ª®oàyŽeØÿüé·_-]QÓÐØÑÕý‹k® IÒÍ‹‹‰®kjþýí·44·®ÞTÄ0ø’sÏÎùß7ßÍJKMML(ÌÞºÀw„1†BãG óƒ/¿÷Bèç?»bÒè‘Á`èðd ÚúÁÉ€’d93-õ¹ï[¹aóÊ›ç/^öðŸÏs,BˆçyAÓY–¥¢ÀóÇ#„¦÷1Œë.½06:êÑ_Z˜åv o·ÙtØ5}J}sóŸ~ò··Ýæ´?<øhu]òuFÔÒÖñÉ×ßþåž;⢣ÿö«»RâÁ Ü:?Œa†alV‹¦ëˆ «UdÆ0H¿®ºGhë?Õ%g2Bˆ( {«ªË*÷M=Bà¹Ç_~£½³“â°Û®¹øEUèÝTŒPMC£ÃfcX&$Éà ! ÆÏñdz\Ww_umK[;!1t¯Ïo·YÛ:;E¦Mÿ!I’n¹ê²y¹º¦%Éjµ4µ¶55·C!·Ó IÍ­mÁ`H7 ›ÕªiZM}}W3Úíº|ö¹ï~6ßa³;uRø©áó'Žñ܃÷:øÃù_ó<_ßÔüÔ«oÍœ ÊÏ™:~´¬(º®+Ьª*œ†à‡1±Y,ë‹·¾üî‡?ÿÙå¡—ßý#4a䈠$1‡µõ÷føÐ”µS]xp&#„`„;ºº?Y°pÎ'_X,âÍW]–7 »º®¡Ûë»ã/ÿ ƒ…9ÙüþWn—óy_`ÌØ¬–³'Mp9œ„V‹cDb&3-eâèϼ1Ça·e¥¥.ZµvoUͳ÷ÿý‰WßLML8oÆEQ!v›ÍëóË’”$‡ÍvÛÕW¾ýéç·í6°àÊ f54·|µte|L´E‡æÏš6å¹·ßç8îê Ï›1qÜ' ¶¶wŒ>T’eZ~Q4]G6Dà9–eyžw92Ó÷UÕ„d)+*M’$–c ÝàX6:Ê“‘¶¯º&$É9鳦O~aÎ%å•í])É—Í:{᪵]Ý£† *ÈβXDŒ°Aà4?œ¦iqÑ1wßtýøC1ÂÏG{<º®÷»‹{0szíÚµ£GVU2|À EáXaì ­Ñ*в¢!è`N Ͳ?äPìÍÞì]Æ „aç%YæXÖ0 EUEAx^VUEQž§ï£?ÌM‹¢¨†¢¨v›EQTšn„1F1‰K0"± vØl÷?ó‚Ëéüý·ôx}4Í”ž=#Ã0pï+Dà8ƒÎ¯ÃfcY„pïG NôO˪ªj³Ykïúù?ÜñóQC‡´¶·‚¡(·‹cYƒ N>ðãBDAà8. "„l6«¦éŠ¢ôïÏHˆ Û¶mƒ pòhºŽ1vÚ¬†aC!šÿök”aŒÐÁqo'BX†!I˲´Y\BHP’8†±‚Þ×VΆu CI’Ä`̱L0¢ùót„‘AH0¤wDß^¶»xWécû?Y’ña øcD-¶¢i Ʊ·N7ãÞ2³ ¦ùÔ1·¦iQøìÛÅ›¶ïÄ:¤`@¶×ëuØln‡CÓ5ú‘ Î>ðcI²L$‰æóøA|¤ó‡ ämýà¤!„˜w2xàéúE½o1󯺮‡/€Ò½AÚoD{íÒ !‡- ë:!HÓtÌ0¿¸öªÌ”$YQú–EG; B”ÃnÌÒBšŸ4$I³¦O.Ì`³Xs3ÓUMC´·Ú1?2?ÀÁ¡PBGªÐ!¹|@„Ã)ªšŸ•9$?ϯ3Â0 ‡Í6rP¡n’$#èµ NC2|à6/&YQB’̲Ìq<)4Mó©*êYN7p ÌðÂÑþÇwý†ëà”8XëgY–I?BÏx§CôÁaY7gÞç: #;œ× Ü!¡_hë?ãaŒuM'ˆpw ‹¡ëºa´Âq׉:•Ÿ‹ M׆¡ãQŸVˆAtCÿñëg†ƒ·yÛ;ÚwìÚÝÇÏlcUSS’RBíí#Œ0A'¯ŠJ7‡1Ž‹‰s»ÜÍ­Í`À|ý‡¯“ŽãâB-m-½CÔžäÏEˆ(Љñ‰~¿¿½³Ý ÆIÞ·G-"a·Ëå‰: Ž€S‹ëêî3 Ú­:¶'8cBxžokoÛ»/˰­í­4(œä‰"ˆttt$Ä'ÄÆÆ¦¦¤Ò F?ð¨£×UUëêëBi©i<ÏÓnÃ'çCÑÈ`& ÔÔÕX­Öì¬l:2óI+Ãÿ(Ã465öx{¢K Žå~ÌÍa:41m7#&˲.—‹. Ë2=Fyž×4í'á—s†aØl6†Á~a,ò<ÇsÁ`èð÷~¯HJÍì6›¦ë²,›3¶Óš>Ý{æåGE—Õj¾WQ”P(ô½¶E÷€Ù KSW¿ï 9è¨f£nŠ"·u´È!™aÌ04¡B3t–e0f0ƒÑ‘ÎÙ#„~:§û‚o¿:xHllŒ¦iæÙEG74ëhV‹¥l÷n–å2ÒÓ**+332Ìဆ¡ÙÖôÀE‘®§«§§§Ç›‘ž¦iš¹dßOfŒ:øôX·/ÀA4!¤( Ý{´£Æ.Û¸¯Ö!Dà…ô´tŽãt]ojiÒTeîðƒi*ºát:-¢¥³«Ó\†^Ìe¿´–ð§æÕ#ŒŒÞ2Óo™cÙîîîù_­(ª,ËÆ ‰Ã557ÇÇÅ%'õŽ¡FóØÃ}•h³ÁaD|!QÜ\´EQ” ãÇéº^U]ÓÖÞ>jäEQèqEß+Šb(Ô;}=°uÃàúŽp:2¨a†¡³Aˆ!ÂÆÍE11Ñéii²¢˜ ÃÍÍÐuÝjµ–WTnܼÉétaŒ|>ÿ Â¡CkšF?]˜aY£o9óD Ã”bŒ÷¨JLˆ÷x<¡PˆeÙ†ÆFDHbb¢ªªæÏýHoÇ}'Nïî"½-làLÔ{ôмÀ‰–euYaX–·Ú$¿Oà:,ùõÿj†({÷Þû»?,_µÊfµ"„ÜnwTTTtTƘç8Çår8l6ÛÒ+׮ߠëúÚu4Ms:QÓáÀ{&ˆÐk }Laû0,C¯=4*éºÎó|m]ýëo¾-Ë­—íÞ½ïÀy_|Y¶§œãy«Åâr¹lV+mt:n·[zG—¢Ÿ>V5Íb±,ZºôŽ{îÝS^át:·lÛöñ¼yÇñ<ïr¹v;˲’$½õλ6›Íb±8Ú@åvëºÎ²¬ÓáÐuÝn³EGyl6›®ëv»Õétº\®Oæ}V´¥Øét:ìvºEÚÔ„F™¯È²¤ªÚ²å+>ÿâK]×dEv»]Ûj±Ðõ8bN§Óår:NQè5ÃãrÑt»5ëÖ)ªúþ‡ù|>·Û]RZV¶§œçy‡ÃíñXDQ×u×QÞnƒ}eg(Œ‘¡±)iNUo+ÝÝÒÙÕÔØ,-ËLÏv8]†¡íË?R­ŸeV¯Y{ãµ×”•íöùýþ@à³ù_öôô0 ¾éºëÛÛW­YÛÝÝ{ë-7Ùm6«EÄ ãö¸-¢¸tÅŠUkÖæ pÙŽøÊ5µµ£FŒ4°ðíwÞ‰‰¾îêŸe¤§;N†a¾\ðíîÝ»táù³çýu}}CsKË„qãfÏ:wë¶í+V­v8ì?»ò —Ó ùÈÇ`†ÝnûàãÅ}òÉk/¾0° `wyù÷Ü{Ë7ÞxÝ5>Ÿ¿ßå“eYl`³±" º=n‹ÅÒÝÕmè†Ë劋g¦½½½»§;:*:&:†RW_G bè"ÈåtÅÅÄé†ÞÒÚ¢ªjfv&Ïó¡P¨¹¥9#-c, bk{kOOO|B¼ÃîPT¥¹¥ÙlƒÒ‘Nÿ34’Ÿ—wÕå—†áp8Ö¬[g³ÚìvÏó,Ë,øvañÖm£FŽ8ïÜsZÛÚ-YÒØÔ|îYg1\’$Ö¦a6ø¨ª퉚0~ü«o¾ù\á6«Õn³ñ<·qÓæ¥+V¤§¥]wõÏ>›ÿå»|ØØØ8ëÜs***/»äâööŽ×,¸ãÖŸWUWoÝvåå—Í_° l÷žÁ^0û¼ù_/¨­­‹‰‰æy>>>nWIÉò•«n¼îZ³Á™µlŒ‚Á`A~ÞøqãÞyÿýææ–{ï¾»¶¶öÅW^õùü…ù Mûöïùlë¶Óþ~"è;ÕúiÓAssKUMÍÝwÞáöîÛ§(Êg_ÌXXØÞÑùæ;ïÖÕ×/Y¶|â„q›ŠŠ>ûb¾Åb1éêêZ¾rUQñÖ/¾üjö¬sˆ0.,È?ÿ¼Yó¿^p ª:??¯ /oØ!•{÷m**úfá¢å+Wž5sÆÂÅK–­X±isQ0:÷ì³ÞýàÃ†ÆÆÇŸ~:66füرpÔþOãPHºô¢ S’SîùÍï–­XyÏo~—’œ2{Ö¹¡„ç¿B!IJ,Çrô_Œ±'Êïq{,V‹ÝnÏÌȬ®®.--MMI‹‹KJL*))©©©=€ã8Ì`Ñ"fgeïÛ¿¯§§'/7!´gÏž-Å[\.WtT´ËåÚ·w_Ùî²´”4»Ýžž–^º»´¼¢œeYŽëÝ(Ã0Ã0tC7 CÓtŽcË++þöÏýá/-¯¨ØUZVT\Ì0 Ïs›Š¶|6þôiS?œûÉŽ]»¾üzÁÚõÏ;ç»Ý¦ªªA“–îa´ ¥ÇÛsÁy³ÒÓR_}óm›ÍŠ0®««ùµ×ÇS¼mÛÜOç <8!>~Ôˆ™é鋊JJKKÊÊ^xù•†¦¦%Ë–÷x½ËV¬\º|ÅÌiÓ-Y²tùòM›‹ZZ[‡ʲlQñÖ7ç¼SXϲ¬Ö÷ãƒþô1 ÃÐ „P($üþ@  †tMknmýê›oÓÓÒR’“dgÏ:çœo-Ú¸ióò•+ òrßyÿƒªªê§ž}nİaùyy²,Ïÿòk§Ãž–š2|èì¬Ìõ›6•”–¾óþÕ55Æ{kÎ;Ûwî\º|ERbBÿ·çæ*ªJTúQÓºÁc\S^1hÂ4wîŽ+*^£ÐfÃN{s} ŠG‹¢‡„~Ã0¬VkIYYEåÞ^~eUÕ–â­,˦§¥ž?ëÜßýêÞ½û÷wvv 4pÆ´i7ßxæ¢-š¦Ù¬V‹Å[T\tvÙ¶¶¶²=e+V­Ðu=59U–dI–– …B—Çï÷#ŒTM5 CE]×9–CÅDÇp,רØh±X223ÒRÓèè@RH²Ø,6»M7ô@ °qÓÆ‚ü‚ÜÜ\º9Ž£ÖL‚Ôu"ËJ^Nîý÷ýýáîÏËÍeÆa·ºa³Ú***%I*Û½Ûãvû|þË.¾x`Aþ‚o†B’afÑë:=Hzsê ƒ6 ùýþ»o¿}ûÎkÖ®‹öx**÷z}¾Ê½{Y†eX&#=-&:ꜳg¦¥¥M™8qÕÚuû¸öê«.^RßÐxÖŒéë6l¸pöyÓ§M=÷ì³6lÜäq»§O:jäH«Íúå× ’“’Î;÷ÜP(Dú>½mn ïWCïº!ƒdefžÞ¬ì¬Ìú†ú’ÒRŽã:»:““Æ3iâà ññq¿øùÍëÖoØàÃ0‡=+#3Êã™>uJrr²Õb1 c÷žò믹zÖ9çlÚ\”™‘>nÌèCÞ¾aÃþpßXIº¡›Ó‡3Æš$©‰ úäñÛguÑ-·eÝyWqNVôçwø|Ë-/ãÐÏ0Œ¢(_}óí-7\ÿ›{ïùí½÷¬^»®½½Ýëóï*-ýèÓOSSRbbbêTU}¹à›¡C†ˆ¢X¼}{UuuwwÏàAW¯[»zÍšŠÊ½e»÷|OwÏÞ}{Ýnwm}m0ôz½ªx¢<û÷í×u½¹¹¹­­M„Ö–VŒqMmMtL´Çã±Ùl>Ÿ¯¹¥9))©µ­Õð÷x{"†ntttèºÎs¼Ín+Û]&ð‚ a†e Ã9>6Þl£WU•eÙ¼œÃ00B`(1!!//gSÑ–sΚå‰Z²|yKKk^NNm]Ýü¯ÄÄDÿìŠ+ìv[_Ž×ÝÓò¸<4cRSR¢¢ÿôãÚ¬V†a¾üæ›M›‹ûÏCªªúý~Žãl6={ý~¿ÃngXF×P(dµZB<ÏAÃ0ÜnW(Ò4]Ÿßït:yžSÕçó¹\NEQEu:¡Pˆþ¶Å  ÊÿÝÑ:ïáñè-œöŽö’²’ìÌlóŽ«¢(ÍÍÍ!–eccc­V«ª©m­mº®Ç'Ä‹¢(…¤Ö¶Vžããâ‰Ah¾VCCƒnèQQQQž¨–––`0(Š¢ÛíQQQ„îîn·ÛÝÒÒ¢iZTT”'ÊCëžt£]=]óš!’çy«ÕêóùèS»ÍFñ­V«ßï·X,ÇB€ 4½]–ešYO±ˆ–êºj„PfZ¦$KôE‡Ý®Mr¹\ˆ¯×n·‹‚`"ËR($9Ñ"z½>EQ<ªª@ *Ê£(J0Â;žçEñù|.—KQI’\.—,Ë4˜öôôÐ.¢(–ï-މŠQTÅì•fµZY†ñùý<ÏÛm6¯Ï‡1¶Ûl!ŽçCÁ  `cl³ÙB¡Íf3t \N§?à8Îétx½>š …Ü.ò¡P( ¹Ý.¿?pÄ·Ó¯žVæ4]KNJVUBÿ™„ž#k×­9r$æÙ½þÇm¿õÒÖÖùÈã‰7Ý”=ûü-[6󂘛“+I’yX ‚°sçÎþ>„ή.†ahrOO®ëǃAEQœÏñ¡@  9ŽSUµ««ËLŽöú|f¶¾×çİ ƒjmm£QI’$–e½^/S Ãôôx韺»»i¯s…§z÷þ”ôŽÓp¬%z{fÐgV«5??!D;†!ðBff&BHUU¹räМÌâÜÜ\Ú——‡1¦ŽÒÒÒè!E£<ís”ššªiZnn.BÈ0 MÓ‹B f4V ÏŠÁËŠBS×éS¯ÏGç†eeY6;yÈŠ‚úºæšý?ú%wÒêK׋0¦÷Š:;;éžñù|Þ¾¼~†az¼^£‡p,‹1îèè Ë´·÷>0 £»»›Ì,ËvwwÓ£š>À·µµ™Ó†ÑÛE™10éM òˆ–eUUíè줟±»§õuÅôƒôìèììdY6$I463 C—§,–eia†aÚ;:è㎎Þuþvó0TöÏL Ã(Š tM³Y,ƒþóPþ}mUÕÃd=ýttb¢®iª¦)Ê‘ûE!¹Ó ôbjròƒÿüí4 …&Œ;vôhEQhý«_¸ og Ç´ùÜœIƒ.OO¿~[¤ ⟠´7¯ù” ¢©šù'z W×t„ƒÌ`B}zÈŸ†> ¯Ó„ºC7X†¥m>ýC}ÁŽÀlí1ûX™OÍ8Å0 ξ€Š1êªÞyHèƒ~+ Î¡ß ô)‹qø0æð;æeÉ\O¿ô-æ¬4Çbè1zo«š6‹ÞËšþËôAÿÊ„õÇ6—ï»("ÚÇJ ïˆÁØÂ3P«8mi:QtBïÛÛmöSXšðÃ0ŒÍj;.+4o‚p 'ž¤yÓ‹å”à`ÜfpD\¿d†€e°OÒwÖTŽZN#4¿6ÆÁgÇõö‹>µ“0Ó#ÆÊãµBúàÆ8óô9 '¸†vpD?ê¶AˆÅ((ëk+z9ö»Ÿ{§Ï}xÖÃßw˜ †~»ÝN£$R‘cYÝ0BŠ¢ð<^+4¯4y¹÷ìC#Lx¶Ý'=õÁžæòV©{§÷6ìôŒ˜8óýžÀí䘳¯0ÛlVs&):\;M á­£?VL×ušN÷?ëª4ßNQ”ï²ð™‡véÆ}7\T펎NOÏ0tƒÎÖͰL[[ëªýy¹ùæ»hW :á‰ÃáP…eŽçé5ãû¶9MÓèÇY,–P(tø÷Ká8ŽxÇɲLI†aèm!BPø–陆aÐ1)é  ¢(jšÊqœ¢¨ôKGaG¬ÍfSdY‡îè â±·Þzkrrr0ºï,\øõ7ß¶µµ[-ÖÒÝe¥»wWîÝ7|èЦ–Q9ŽÓueš A fží êA}`ŠC3BÈfá>^R¹~eE«¸åÆQ¿üå vZüõZVŒìlaz´¬è6›ííwßóz½ãÆŒ1m÷ú|N§“apwwBØjµÐÓžŽûfÖïìvû›sÞñú¼ùùôÜ6ëw4ZÑ%éèQ\³n}m}]Nv¶ªi‡.ÌÓ*-½êÐè@‡'¢Ã™× †ahθY—üia,©dk0Ýetvu6‚c9Ñ"R<ÏÇÅÅ×ÔTÛlv‹h¡gç«kkŸüï³ /ÙTT4fÔÈú††…K–Ž=ÊÌ£7w ûq`†Ts—êºþ›ÿûBhPa!XêÏ¿¯°  6&†ÎJßh†Ûå*)+ûrÁ7.—kãæÍ9¼úÆ›Ÿ~öEM]íAƒ0Æ‚À“¾ NŒ±Ûízû÷¼>_^nŽ,Ë¢(657¿ðÊk_-øf㦢””丸8:cÏó4ô¹—^ÎÊÌŒŠòh‡ D:^?ƒúFQojjºýÖŸ?pß}—^t!ÂÈn·744¶´¶J²üðãOì*)Õ4MI–ëë†aY†Våz¼^ŒÔ׿£²kw“ÒÝ1sfÎÙ3&;lÎóϘ“S[ÙXq ±¬AÃ0ííë6l¬®©imk³Z­ë7n|ìɧý~¿aç^|éÛÅ‹Í9üºº»F<Ï ‚ iZmm]iYYGG'ýt£,ËŠ¢ØÜÜÜÕÕÅ0ŒÕjíèìlmk# ¢ ð‚¹$e±Xš[Z;»º­V«$Iš¦YD‘VrA@×ÔÖÄà8Vày„Pm]?`ðO û‡¢ë𮩲R¹ï?I×U]×Ì™ü ðÚlo¼ýNJròŸxüܳ϶Ùl-­­›6U×Ô´wtðÇqœ9°0ÆX’e–eBº¡ÓÍI’DÇ’Ôt½¢rïko¾ÝÑÙi±XÞyÿƒM›‹‚bÞçóY,"ÆX„†ÆÆŠÊ½û`YÖãv¯\½fËÖ­W\vIJRý,µuuºaЩ%UU=PU]¶gOgg'­x}¾ûî0::ê®Ûoõ÷ûhnia&ÔÖÕÑ_Y¹7$IfA×uÅD¦Þ†a–ݾc§Ýf>l¨×ë-Û½GE›Í¶výú]%¥/y_»í–›iE !”’œ|×/n{êÙç[šê {ÊÅ×ÝMC+"ˆa90ãtØ­VKHÒ9»œÎ@@—¥ ½Œ²Ù¬T½úÆ›Õ5µüí¯W®^³©¨èé瞟6eÊæ-[vìÚŲlvV拯¼øÿõ÷¿éºþÐc{Üî=å³Î9…u¥!„¼ðò+ Mv»íž»î\µf͆›,Ëm·ÜÒØØ …&Mœ€úšm6Ûçó¿Ü¼e 1ÈÏ®ºÒa·=üøO=úèó/½\ŸwÕ—?õßgéÄ¿¹ç—^ŸïÉgþ+Iò„ñc¯¿újå')ÝK½¿`UÕtM×uŒ{Û[è=^UUͱ0Ɔ¡äç­ß°qÓ–¢‰ãÇÙm6ªjªßœóNMMí~÷›”äägž{! yÜ®k¯þÙ‹¯¼ö·?ý_Ssó?xpîûïnÜ\´fݺûþògMÓY6t!dÁÂEƒìêî¦ßÝò•«¾øò+„ȘQ£n¸öšÿ¾øRuuuw75%¥³«së¶míí>Ÿÿóù_Ùl¶ñcǾ9ç `³Zyç]]O?÷¼Ë鬨Ü{ÖŒº®[-–e+VZ­–{ïºC–•!ƒí./_³v]k{ûÞ}û0Æq±q¿ûõ½V«UøGžxòœ™3Ï9kæßþyÿôiS§M™ì÷ûáˆ( B‚Rµ¹¹¹¶®ÞçóÁ¦æf:ÅÏŒ©Sþúž_ž{öÙïøqwOϨ#>œûÉêêš6eò½wß%+2ÚubnpžÇ'K[w(µõ-<¯—•וW2!C”ƒÆ F)Š2 ;û‘?8tð m;v^}å£F ÿçßþzöÌcFºé†ë¯¾òŠÖÖ6ž|ôáA¾ÿÑÇŸ|öùAƒ}èßcF I »­§iÚ¦ÍE‰‰ñ7ßp}\lì¦ÍE¡›®¿.g@vccSgW—¹0Çq­mmï~ðaaA>Ã2O?ûlA~þìY³nøù­,Ë\wÍÕó¿^°}ÇÎiS&/]¶|æÍ_~½ /7÷å矽ä‹ô¾9°~JÌqù0"„hªª‰ªªfÃ0~ຫvÕ—Ïûü‹{÷û}û÷#Œ2Ò3žxäáÁƒmݺmÞç_ÄDG=ÿô“¢(®\½&5%y݆ •{;»ºJJË6oÙ2hàÀÞ!B1…BwÜúóõ6>òÄ¿¸åf‡ÃÙÐÔ4wÞ¼[o¾ñoþÓÚõÞûèãýû÷?þðn¹áz†Á===>Ÿoæô©Ã†¹ýÖ[¼^ï²+wìÚ5i„«×lÜ\ôÍÂEyyO>úÈÈÃC!‰a0¸§§'.6V× ŸÏ§ijrrR×ÛÓÓsÖôi<ø@yEE[[ÆØj± Þj±ÐŽ[c†Á†n\}Á˜ô~õ¦¦¿ÿ{óCmxàÑâÚvƒãªwoZ¨ë×;b;²Ù¬!·ÛÍs¼AˆA}”NâˆB„ÄÅÅbŒ´µwtvu%%&"„xž§7-­V«ÕjÁn·¿òÂs±1±ÿçýåO>úðY3f<ðÐÃ7ov»Ý,ËÑ…-‹ ´-B×Q#FÜrã ¡…µuõ‰‰ ¡ÎÎN›Í&ËÊ·Ý:xÐÀú††””d„ÝnC‡¶ý„Ð;½´½›zM£ÿiªªêº®iý“;E™=ëÜW_|ÁjµÎÿzÃn·ˆ""Äíra†éêîNIIf9.))©³³sæôiKW¬¬¨¬üý¯õñ§Ÿ¶··O?.Ð ¥¦iñññ×_{Í¥_4|Ø0Y–dIF¥¥¥¥&'[­Öú†›Ýît:ydz,+ˆB˜Îçc±ˆ=^¯Õb•eé–®XßÜÒ’””ˆâ8Žfiš6dÈà’Ò²êêš„øø¦æ–•«ÖŒ9’eY§ÓÅó|”Ç­iÍs6yrggç;ï0tðà„ø8hó¨/ÇŸßßãõÒ`ªiz (,ÈõÍ·†RXPðØ“Oÿþ7¿ºè‚ó?øhnWWM¥ð¡dÚt@# £êzBŒçÉû®xêõ%;vÔo/?‘…Õr!¸¯¢ÌöÖ›¯ß~Ç!]×ýBH’%MÓr²³ÛÚÚþóØãøío†2çý÷£¢<.·kûŽï~ðáò+ï½û.–e~ü‰–Ö¶-Å[Ç»pñ’å+W:v†agÏ:·xÛ6žãeEñùüÍý4$Iã€? (2BhɲeK–-w:ºaÜvËÍÓ¦L®­­ÍÎÊJMMinnyâ©g^}ñ¹×Þxk@vö%]¸mÇŽæ–A¬Ë%^øôsÏUVîXX8{Ö¹?½0AhrOoФ¢*¼ ° {0W††eUí`2 BH…§Ÿ{µ´¬,5%5 ެƦ¦`(„0…Bº®_yÙ¥?ýLmm]uMí/ï¼½ ?¿¶¶6>6öÊË.}ñ•צN™”ššÚÓÓ#Š!H’$ŸÏ7sÚTUÓYéñzÓÒRGùÐ#Úl¶øøØ_Þqû?xðoÿü—ßïgVÓ4)$iš I„îîž©“&•íÞÝÒÚ&ð‚(ŠçÏšõÂ+¯´¶¶íع‹Þ…Bƒ¼òòËzô±ì¬ÌêÚÚiS&Oœ0þƒ¹sUE!„ЋAèégŸ{è_ÿLOK›;ï³wß|=’ ©D ¼víÚáǃÁºúúÔÔTç1Æ]ÝÝ~¿?!>~ãæÍy¹¹ÑÑÑ;vìÌÌHOOK+ÛS^¹wobb°!Cê¢ÝMAþ@‡qÅødEÕ˜ÞyìÏsŠªí¯kö‚ 1«Ýÿ¯û׬Zž¼bÍ:MÓþúÞqÛ­¹99 †a¤¥¦îÛ¿¿­½}äðá ÃlÙº53#cï¾}o½óîå—\2 ;kð A¡òŠÊªªªø„øœìì¦æ–ú†úC¡° ¿ºº¦ª¦zİay¹¹%¥¥{Ê+²³²FYW_Ïs|·§®¾AàyƒaC;Îuë7x}¾áÆZ­ÖöŽŽÂüüššÚ*Èϯohغ}»Ûå1l˜Ûí®¨Ü»§¼¼ ?//77|ÖšŸBÇ¢Ž€þÕæú+FGoÞ²1Äjµ†O» ‰ŽÆŽ^ñoiiÝ_u@×Á S’“[Z[;»ºdg555醑™Y][{ ª:/7'1!AUÕú†«ÕWUUít:¢££iꎦ뵵µi©©4ˆeÙšÚÚ˜˜Û½³¤DU”¡C†ˆ¢ØÝÝ]¼u›ÍnKMN±Ùm~¿ßépx}þ¸Ø˜†ÆÆ¼ÜÜÆ¦¦í;vº\ΡƒGGEí)¯¨®­KKMõ¸Ýô{±X,û÷¨khHLHÈÏËÕ4­º¦Æív»œÎUUY™™MMûTsÖ̵ëÖ¿ÿñÜWžVQ”Sýpò˜Ó²ãµk×6LQ«ÕJ§À¦ âtJh»Ý.˲¦i»]’eY–­V«( š¦ƒAžŽ”ÔôÔö0—KR5÷å|†1Ãq½³ñaŒÀG~””|Á…ªªúè“Oýã¯Ñ4Îj¤ë:Í¡½ 0Æ Ã,X¸pùŠUÏ<ñ˜™æO—AGïÕESÍ™’hn>´W][¿œQUU͘ó†¡×·QÚ¹á§ú ÇàŽ >Sí•£cMß³§Ìëõâ°nPN§s`á žãû~À!„ ð‚ b„hJ ÏóÇI’$FH’eQ-1’è/!QtÃPUÕb±„gÎ`ŒEQ4gWG‰¢H[™ìvÆL  „p,k³Ûi’>=迪ªŠ‚’$çé+ išf³ZyAÐu]–eM×qß7kµXQP•Þ ²X,´Ëb±È²ÌqÍú}à¡ÿä pãu×vuwŸVójpB™¡ÿ`—®`0Hãmœ¥‰ÏfŒèñzi8…B´ Ã0’,1„Åfï˰¾>tUª¦¡¾n8V«õ·ßAóI– ƒtÜvë鳟'M$ÍHK3zê‹à¨/ø¢¾DòðÔ{ƒsoMÓÌÅèúQØØ5ôb@§*¦Ë„0 ž¢n–ŠÁØŒøG¼ØœæÌ†~Œ±A –aÆŒÛo6+C7$Y û!YV$IF}—azW€aZM¦è4tŸ„$‰>…Bá;ŠbZT($ÑùýóëÐt½§§õõ£ûèA …†QTUîÛ4Ã0ÁP…BèÐñƆ‘d™}ºE³-Íf%†ár¹Æ’ µD¨ƒ¡?ü?—Žö B½Ó:f¿|ŒÐ¡‘1|öB¬(cŽe BwÝ~;f‚f„1{ú#„b9N7ŒÁƒ ˆX?*ôcŒÕH¶Tuænh°‰œñ=¦j!‡Ö­Á‰‚îHƒRlcbw‚>ˆxÇ¡ÖÏ1xj¾³±[Õt‚0sªç£‡Âˆ28Éë`4Ý€ˆ@4ôÓ¬ž¼ Í £ìÂÊiKÓ‰¢jPÕ ™ўcYÖb±üøÜ¡ãYßÇÇumsÈrÜfåüTÑ¡ÎY–å舘<ÏC•Îl4OçùC&É:}À|œPǘ 锬œ»7ÑÿnU~ˆûœPÇëƒSõ§å`O—S]’#ë׳4ܼ)}”BµDƒÇå<:^ë'Yÿ{tt³ß&›Ï6|dGúº9É5Æ8|öó#N–¾Og"bðÑrè¶Jáð õ+gÿÕöÇþ¡0Æõ¾bŽ$qÄUn¿øáÈaÜÓz̳PØX[Ç>7ûÅ–S½k"ÂÁÐOãøÚuk6l\'Šb à=jììó.0£!e~‹{ŠŠ‹nºáútÝú5^¯÷ .6¯4ÎÒ§›‹6677_zÉåß±Xý¦€ïèhïƒwèãô´ŒéÓfÆÄÄôÛ:ôpø¤ªÊ{ï¿3mÚŒÙ9Œ{gñmïh÷y½YYÙmmmŸÏŸwÍÕ×¹]îÞOŠþ‰ãÀÄÀä8ØýÖ£ëú«¯¿”˜tùeW"„>ýì“ÔÔÔI&£C‡é·’~8ãN‚þµ~¯·'-5íª+¯öûý¢Å¢(Š$Iº®±,ër¹UUíììÄ Ž‹§Ó!µµµZ,V§Ó)Ë2*K×õööv»Ýf·;Bš¦J’ÜÕÝ%+òw/V¿]×%IºêÊ«EA\±rÙ—_qó?gY¶»»[×µè脦i]] ËFy¢è,»€ßårwwwuõt#ƒ$'§Œ?16&ŽUU»ÝaµZ·nÝràÀþ+.¿J„‰&YD BÈï÷‡¤PtT4˲>Ÿ!¬¨J”' Fyg†ãÕpj®‡Ö“èØ«e»K²²²G  è8‰Í-ÍÇÅDǨª*Ë’¦ë<Ç ¢àóùœN§(ˆš¦uvvšqœhýC¿ ]Ý]7mƒ£Giè®ÿæÛ¯ccãÚZ[/¿ü*ŒÑªU+UUÉΜœâ÷û¾þæK¿ßÉÅ— ‚H¯Õ‹—.jiiæXöÜs΋‰‰ýdÞÜ@  3Ò3¿{±ÂGå¤xžOMI³X,W^yõs/<ÓÙÙáõùV®\Ž1Ê/(œ0~â¼Ï?éîîáÊ+®nim^¼dË0YYÙ<ÏoÚ¼19)9?¿ ²²Â>ÍÞÐØ°ióF§Óš>}f}C](úfá‚¡ƒ‡nÛ±5;+»¶®fÙò%¡è¨˜ófÿé¼–õû}éé™—^|Ù©þÊ8ˆA>¡ß\mùÁˆÁÌäIS7nZŸŸ—O§Ö©««]¶b©¦ªÙrâ–.[ìq{Á€ÇíéèìHLHºâò«–,]ÔÔÔÈñüÙ3ÏIII…ºÿ‰v„ÆwMÓ@0P5•ÁX-7ÝpKAAáÎ]ÛäñxÊËwwuvÆÄÄÞzËíãÇM\¹r™ª*‹¥¾¾®¬¬$/7ßëóoݲk×E–ï¼ýîÃGÒ‹ÿwtx}äà Ìð/IÒºõkì{rJÊš5«¼==¡˜è˜‰'s<·rÕŠ±cÆÝuç=³ÎMÊÍÍ»åæÛF  1ƒ 1n¿í®øø„={ÊFÿó›oKKK—e9$Ik×®3zìÝwÞëø·nÛÂñü¤‰“¯¾êÚÚÚê®î.Y à§ïeø`„eE8pP΀ÜEKbkš–˜˜8°pÇãÙ³§ÌçõÚ펟ßò »Ý‘”œró·vuwmذ®¢²<77ßçónØ´þ8MÿЯ¨JrRòç_tþì S’SE¥Ó­Ølv„Њ•ËËv—&&%3 KÑuMQI’X–#„‚bV’BC4p°ªiºa膮ª*ù>Ýs‰ÑaÃ0:;;ÚÛÛ>Ÿ?/!>!!!Q×u]ÓÜN÷ôi3Y–›8~RJJê‚o¾*/ßc±XÁ€ªªŠ¢¾ Œ‚zKAoJ+ªÂ "ƒq0ôûýŠ¢ „ŒYŽ …BŠ¢èš&ð!„çy‹ÕÊó¼®i§ú+à88î >½0BˆH’tÎÙ³:;;ËË÷ˆ¢hÆ –é!dEQl6Ïqº¡³,'I¡¡C† 8Áø²'^ÿ›Í¾cǶ§žyÜçóMž<5;3Û¼Ï2lll\m]MssÇs,Ç*ŠòÁï*ªzÉÅ—…‚ÁO?››™‘5dè°††z†ecãâ&ŒŸX__7gΛ¡˜Ø¸ï^,ƒá— z|üɇ,˦¥¦Í˜~¶ ÆOܰq]Uõ¨èh‚Èê5+Á@|\|fFfllÜÂE èï–eY¦·žeY„Çr oÏy“eÙÙ³.Ð4­¨hÓ»ïÏ9b¤(Š‚ ž5óìÅ‹–”îÊHÏ=jÌîò2†a!fÞ?u?>ô÷6îšÜ‰bYŽclDøÄ¼‡¯¼ßÛ !#Œ0üg bšBý#êÃ×cž/èРáï ïäuxð³ìÄ1÷voè?Fo‹þ¯ýK9â{Ø·xx…䮼ßÇX>&&ö~ê#®ŽHpÆ0O±yT¾žïxîôûœ\'‡¹Ÿ9USUU•eŸ&Ó%IJl(xø‘ãýÅAD#ˆåØP(¤iÃ0†nüÀŽ×zÀID "Š¢ª©œ¦i`@Q”Ó*Úl6EUU9ÕàÌ$"Èï÷Ÿ&ë'M©Ò4³Z¬·Z±àŒGC½ÕbåÌ+Ou‘œXfz$>>ó©.Õ±˜ãt†—}Ï&{sYt¤|¤~ú $kBkþõÄí1³»MxiͧÑÉíðÒoôlôÝöùw,áIþ¹ùƒoóœÎ?‹v´ °tµÓ¶ðà”Àÿdæêî7p4úA'ðá+ùŸëé7tøå'üŒ ¿¨÷Ïô¿K™˜£}„¶Ýc,i‚úF?É!éoî$”S7 öû^@«DáÅ;üˆûàp?ÐoFKKKLLŒ ªªvtv&&$´µµÛí6›ÍfN/Ã0Œn Æcs¾:f!c´|ÕªI‰‰¡u6$'%q×ÙÙép8eYÖ ŽÎO‡²Z­QO[[»®ë‰‰ q±±ªªÖÔÖ…B!A2ÒÓ,‹ùûƒa:I)˲æÄ2áá[×uÔw2 c^9ÌŸáÃA+вsW‰ª©ùù1ÑÑãýÔÔÖf¤§gef†ÑÖÞž˜~á!}ãLöÁ Ý]¿ù”–Á, }E×uý à q, I=Þžø¸8B˲]ÝÝcÛÝ;´*Æ4Z†a„}dI’8Ž£ë§+?ø{!„1ÝV×ët8è¾êÝî¡—Ø~+7‡teYÖ|Üû0¬0ä°Q7è7ÒÓÓc¾¡þëA¨ß~Ó4vó¦¯í›í=ÝætW˜»×Üá½Bˆe˜ðïÎÜiô1 K_9Ã0ª«X†ÍÎÊôx< Ãttt쯪r:Y™™Çõ;Z@±wÜqGrr2:]«ôŒ­ª®>{ö™™ùùª«üÏ×\xáýÿùÍjÍÊ̤QÉ Áôf¥²ï‚1~ôñ'2ÒÓÓÓÒBϽø²Ífݽ»ü›E‹_{ó­ýìÛ`Ûö[Š‹_zíõúú†P(´tùŠwßÿ ¥µuî'ó òódE¹é¶Ûººº6mYðíB—i%kKñVUU£££Í ßï‡6ºÄ¬V›3Ž1}Â?ò¿~tgIIyEeSsóèQ#¿Y¸èÕ7Þô«Ö¬/Ý'æ+fÜAø¨%Y½vÇí¦½£ÍµmÚ\ôú[oÍž5‹~Ì7ÞžSQQ9jäº~¦ï3š!d‚1~ÿ£–MJL ÿ]¸rïÞºú†ä䤖ÖÖÿ<úøŒiÓèáë ßuákÿ8æ®ë}ñÐåûÒtù/¾üjõšµ“&L ió˜9d=a{’iWié²+G ^“ù^sUG[ ßG}Ác IëÖoHKO£W~Å/^¿š_óís/½ÔÒÒº©¨ˆã¸ü¼ÜÅK—>òÄ“mmí+V¯–e9))ñúËùç͂х1nllüiÔú—,_1jäˆâ­Û.½è"–aèAÌs<N§±©iËÖ­éé#‡߸yóàNçº F nµX61Â"Š!‹ÕjŽ#äpØuM¿å¦nºáº{÷û{îºsPa!B¨µµõ¯ÿü×#ÿ~Àív?öäÓ×_sõu×\ýþ‡}üɼ;o¿m`aácÿ#ôÎû<þôÓ¯½øÃ0íí?ýLVfÆõ×^3lÈ†ÆÆ¢â⌴ô‘#†Ó KÊʺ»»£¢¢^>lhSSsWwwrRâ®Ò²Æ¦¦è(Ï9gE¿•¶ööÍÅÅï½õF|\œ¢ª¡ÅK—7îŽÛ~®ª*Ïó=^¯( áë6m)¯¬uй7Ξ1#%%Ù\ɾýŠ·nݰis~^.B¨¢ròaC†ä PZ¶»¦¶Ö\ObbâŒiS[Z[—-_º`öy1Ñ1¹99uõ û¨­«+ÌÏ3z”ùÍ.Zº´§Û;yÒ„Üœœªêêu6fgfNš8~5†a¬Û°¡¦¶îì™3ÚÛ;<wZjjMm](,ÈÏ_½v]MmíìYçnݶýñ§žþùÍ7Í:çœø¸Ø…‹—x}¾Ùçžãr¹¶lÝZ_߀1“Ÿ—³©hËè‘#‡ DÒUUW¿ùÎ;Ï?ýTZj*}¥±©éÅW^{üáÿäçiºÎ±lCc£(ŠÇi2Fpæø±#‘íéñJ¢ãÇ•——?tÿýííuõõV«ÕÐ „aèÏwvuýó·µµ¿öÆ[ /ùf᢫V÷x½×ÝüóÝ»÷”íÞýú[o[ú~ª+²üäŸýã_þúÇ¿üuýÆ6»U×u³À!úÁ´fýúo.\³ný¸±c4M#!†ºâ²K;;»êëB¡PâBÁPSS3-Ïo¿ýÙói­­½ã¾=°{Où¾ýžüﳡEE~?Bè–oX½víŸþv_IY:tÌEŒñŠU«>þtÏó=ö˜¢¨E[ŠŸ}áÅ·ßygùÊUÇ=òø“míí[¶nóÞû¡ûúO}CCH …BÒSÏ>×ÞÑÑÔÜòô³Ïƒ!–aººº$IîèèÐu½¾¡ñáÇ×u]–å˜èèw?ø`ͺuæˆI=úÏós?ýl݆Å[·ýëß9ìöƦ&ó«ÿ⫯w——?ñÔ3e{ö¨ªúÏcÓ7*ªJÛOÚÚÚY–õû<ÏoÞ²eÎûï··w<õßg.×s/¾T±w/­×ÖÕýöÿGiïè „Ô74Dy<ï}øá²+ç¼÷Þšuëëëëÿð§¿‚ðÜ‹/í./ßTTôáܹ<Ï?òÄ>Ÿ®¤ªºúß<"Š¢¦i‹¥´¬ì‰§Ÿééîù÷#VTV¾}èz^xù•’²²`0¨jj]}ÃSÏ>WZVºlÅŠÅK—¼ôêk¢ <ôècªªè7ëóû»»{ Cô‰§vìÜõÇ¿üÍ0ŒöŽ:Ü!BèÍ9ïÌyï}›ÍÖÓÓ³eëÖ7ÞžƒzéÕWTU2ï³·ÞyÇa·755ɲ̰lKk+Ïsï¾ÿAQqqGG=TþýÈ£ «Ö¬yôɧDAxðáGÚÚÚèOºâ­Û†š–šªª*=Â7nÚœ——[Ÿ·mûö?ùdsÑ–PHbðQ`ìdž~­dJéý?mÆýñ…£Gó¶í;¶ïعàÛ…{÷íÛ´¹ˆeY†íý-ìp8|ûí …wÜvë/n½å›…‹¦OºcçÎå+Vž5}ú®’’•«×œ5cº¹*Žã/½è¢;oÿŽwßU—'Ë 2€÷U‹0ÂŒùÛœa4Móz}×üìª ÏŸí÷xž£Õ^Ú ŽA•––:hÐÀógÍ?nìgóç4ðŽÛn½ýÖ[¿Zð =á!99~÷ë_M™8Ñép „ì6›Ëå$ˆŒ=êŠK/4aBuM-ê[øž»î|ò±GTUûõþÐÝÝ=rÄð×_záܳg>òø“K–-w:„ód^¾r•ÏçëììÜ·oumÍŸþðû=åß.^òðƒ÷746nÙº5 µ¶µíÝ·oãæÍV‹å¿ýÍÏ®¸Òårº]NADQ´Ûm£G0`ÀM×_Ÿ›3 %9Ùív†ÞÔÜÜÖÞ>xР‹.8ÿŽÛn]ðíBEQœNç®ÒÒÊ}{½~_KkËö;rssÒÓÒê òóÌïÎfµ²,›˜˜xÝÕ?»õ¦›z¼^ú-X-–1£G3æ‚Ù穚–”˜xÃu×^~é%]ËW­jmkíê«Û·o?êÒ+zØÐ¡55µÙY™ãÁI’D[Ün÷e—\tÕW$'%]qÙ¥ƒ ¬ªª^»~ƒ×ëëìì¬Ü»¯©¹…fáâ¥cG¾â²K§N™lú_~ué%ßzËÍçž}öÜyŸÅFG÷[ÏÞ}û²23§aè `Ðápð<ÖŒéW_ueVf½ä†—žš*ÉrGg§,Ë£G¬®®ÉÊʤmq¡!ƒÙmv¯×›–šzþ¬Yõõ µuu>Ÿÿœ³gfff8ίw@vö¸±c²33ï½ëNÛ½tù Y’Û;:JËvû|¾Ô䔯»öœ³fffd\wÍÕn·«¥µ•~.—ÛÕÔÜŒâyžaY„Ã0tžT‚ßxîÅ—š[ZDQ;xÐÀ¸¸XzNQ»332öíÛ/Ëò®’Ò¤¤DÜ»¯Œ`0¨ë:ÇsÍ--ÁP¨¹¥9 ºBJ_%‘a˜$­\½F„óÏ;·³³+$I»÷ì)¯¬œ9}zbBBm]˲!I2÷Ç㉻`öyÿ}ò‰¼œœÊ½ûDQ´Ùl;w•ÄDÇ8Žü¼¼ßÜsÏû[—ÓÕØØÔÒÚ Y–íîéikkoooïêêf&à÷ï¯:€zwìÜ5}ÚTMÓ!­­­¡m;vÆÅÅ1 ÓØØ(ð‚Ûå9løÿ¸ïê+¯xþÁýƒaØßüáÿP_ »$Iš¦CAMÓT]3ïU"„ èohÐuF0ÔuCUT]×£=Qgê¤IO>ú(Ýác–a~ÿë_1ü·üó¾}ûÿùÀƒ™™™Y™™²¢H’$I!†ª©ôËeY&ªoo<ûÔ“éit¯&'%î)¯@577뺑ššºs×.BHyEEvVV0 _¬(6›í•×ß ;A×tUÕhÕ& !„TU£×0 3ÿ«¯>˜;÷œ³fÒ;ÌøÍ¯GŽþ«ßý¡µµÞõXXpÿ?þ¾c箿ÿëþÄĄܜýÇ?🗓óÀ?ïÛ¾cç¿yÔépttv¨ª&„x<ž´´Ô¯½ö‰‡ÿ#Š¢×çS5Í0 MÓBZØdAS'MCÏ¿ôrCcciYYUuõyçžÓÚÚöÆÛs òò/¹èB›Ý†1–d©· rô³L7ˆnÐ)v‘¦?ø¼íwÅÌb8|ÊÕÃßxzÞnt覢¢A……•{÷VTV2äý?ºöª«tC÷ýdYþåw8ꆻÍ~ÉEîÝ·?6&fö¬sÍ[‘;vî4°01!!TRZ–žž–•EÙ±sר#¢££B’,ï.ß3mÊQÊ++£<žÂ‚|Ú*IÒâe˶nÛ±zÍš´ÔÔ_ÿònz×cõÙüù†a\zñE ÍýD’¥{ï¾Ëáp „‚ÁàÞ}û§Lšäq»kjjæÎ›×ÒÚZ——‘žÞÒÚ:yâĽûö{Üî……ãή®g_xqÁÂE›ŠŠîºýCž;ï³w?øpÑ’%ù¹¹÷ÜugwOOeåÞéÓ¦Ò!¦órrŠ·nݰiS{Gǰ¡Cßœ3çÒ‹/œ6yò»~xáù³£££¿]´¨´¬L„‰Æ÷x{Þ~÷½Ý{Ê'Œ‹z÷ý«kk¢<ž³gÎ`æãO?ÍÎÊLOKÛ´¹¨±±)..vPaáÎÒ’uë7466ýñ·¿q8ìo½óî˜Ñ£3ÓÓ¿\° ¢¢2gÀ€Æ¦¦gž{Áç÷5cúÐ!ƒé áÒÝ»³3³º{zÆŒÅ0LåÞ}3§O§û*!!~ÙòµõõÇ-ÛS~ÎYgutv´´¶ÞxݵûX¹zMuMmaaËåBÕÖÕ?õì³Õ55£G<÷쳚wìÜå÷† ¢ëz΀§rï¾™Ó§í./ONJ¾pöyk×oظ¹¨½½}ø°¡ôÖ΀ìì²Ý{æ}þy[[ûÀ‚k®ºjSÑ–y_ÌOLH¸ó·mß±£ ?ßãv÷®gÏžô´´ì¬¬õ7555ÇÇÇÓT‚èè(Q‡¼³¤d`A~rRBˆãù]%%ûTÙíöÔÔäwÞÿ`ï¾ýãÆŒž>u ½%ûÕ7ß¾÷Á‡Ç]0{vvV–Õf}ùõ7þôû߯ÇÅ}¹à›÷?üˆã¸Ùçž›Ÿ—×ÖÞ6ÿë¯ÇŽ5bÄðÅK—nÛ±CUÕ!ƒoß¹sêäÉÝ=Ý@`ܘ1[·o=rdtt´®‚ÀO7vãæ¢%K—oÜ´9Êã4pà˜Ñ£—¯\ùå× 6lÞ|åe—äç—•í™>u*ÇqÇ8ÃŒÜ;W/ËüÀ¬(ŠßïÞ‚¦_wxFþá)U!Ý0BíÄ ý¦ô 3Í|¬(Š9Û×16Ó·h1Ì-Z†ð§…ÞæE[¶l1wÙ÷åóùÖoXK¡¯Óÿ!dý†µ>Ÿï¬óˆèœ0f!UU¥m©²,÷+¹ùì‡}¢ïXœcõ»ì7zwáú}4ó#m£@€®“ÓáU ƒf¹C¡,ËôtZÊÃWè÷û%I6Ÿ†B!³À´AÒWé&„@0è÷ûËÎ ƒŠrÈ'•e¹Çë¥u]ïñz½“Ã÷F8óS|Çc£ßN8šP(/ªÉëó™;jßþý¿üõo̲…ÿ)œ®ë@à–ÓüŠñÊÿDïl}]TýÁ꽄¿¤>ñùΖî !DÓ Ã ºn†¡½ÿy%ºNÙT´åmnn^»~] ¨¸˜þ¦ /}L~è‘G?Ÿÿ¥ùô¨¥ÕuBÈ7 }³p‘YøÃw‹¹ðá{Ã0 ƒœ¸àpº£;dË–-?6ÃGUUU• CCÓ,Ã0TUþ^“°ék A}ÙfZ­#ÐË;945©»/9´cê‡?=Æúu€:¸$ÆýÊsø:ýÌ,ÆÃî÷ÑhßÜ(9¬‡­y–þÕ\¡a<Çñ‡Â†aΞA±Ûí(¬w´YÂ~¯Ó tfÁÌ©6B6«õˆ»4|GØW‡íj‚9'IAÌw¹œÎðØo[ýö†¹E‚ýáÅ3h'ƒ£¬§ßN߽ៅNëF_4‹~Ìл;š¦q÷ég_ <˜fô³,KÿtÄ}e~„~¯“CÓ^I_õ6üC‘¾WÌãçX=ì °xÎ’òòúîë¦æ<þÙŽ·–VÜvN>BˆÁã¾”4Aö˜udb•{÷~ðÑLJ㒋.üøÓÏ–,[ö›{ïÉÏË{ò™gÓÓÒ~~Ó)ÉÉå•­­mii©Ã‡EoÝV±·²¼²rÔÈýN´ŽÎÎ+W9ösÎ:K×õe+VƒÁ‹.8?-5UÓ5Ô—·D…B .´ÛlçŸw^}Cc}}ýøqcË+*ƒÁàÈÃ+*÷nØ´iܘÑ B;KJ¶mß1lÈ‘#†ÿÏtFú±·yUUÕu:AºN37t]7tãûÎÃ~ áÖü‰Â¥™ž7ŽÔzþôhßc ‡w˜4Ï~å9|ý yŒ…û姇§·qÿ„¿bfއÿéý™û==|o‡o舳fþ_ç¿PóÅcD–ðô+Ì1ö¤¹s¤e˜c®çðïë;ÿ‡E/Þçœ=óª+.G‡öà;|‹Ç>rú´¾ïÂüP‡÷n9Ú^%q,”µ˜(Ûðܸ}´µ¶=pՔ쀤Ýûêúû>(>ÐìýÛ{Eÿü°xCyË_ß+zxÞvU3ߎ ~­÷,Çuuw;޹ó>ûfá"žç Ãhko üˆ¿ß’B;KJþýÈ£míí<þä–­ÛŠŠ‹_xå•(·‡æ\ ¾vŒ±¢¨¿ýãÿÕ76úAY–ÿýÈ£kÖ¯Gùýþ ›6­Y»õµÑ óãO=ÓÖÖ¾eë¶·æ¼åqÿ÷ù¾]´øÉgþ+ËrcSÓ3Ï=çt8žyþ…ú††­Û¶?÷ÂKˆ®î.©#˜ý¨ÐOQûrõô>š¦iº¦ª*¤“ÐϨ#b¢£Ou)¢õ³ª_œÛrɸÌ=u]—OÈòØÅ‡>Ùö·Ÿ°aüÚ·e!EÿóåÃïÿ¨¸Ë§lÛßÞÜ¢ïÅõ»¦(ŠRXPpÉEN<©µ­uê”I…×_sÍÀ‚ fÏ5b„$…† tëÍ7Ý}Çíó>ÿbÁ· ¯¿æš /8Äðafƽb ?vôèæææø¸X»Ý>|ذP(Äqí "ZDÖ=¾7™M’Ú;:6Ûíöüí/¿ýãÿM,¯¨èèè¸÷®»†¼pñâe+Vöx½gŸ5sý†¯¼ñƦ-[Ö­ßœœôñÜO7nÞœ—›{þ¬YïôÑ‚…‹bcb¯ºü²––Vǽ{Où˯¿^´¥xŪUãÆŽÉóõ7ß””–ÅÆD3 óå×ß¼ôì3[·oomk¿ü’‹÷îÛ¿jÍšêšÚ‚ü¼±cF/\¼xþW_ë†AûŸV_ÊIøÒñ–-[Fý><}˾}{·l+Ò45ü>Çq£†ÉËË?.ûÔ¼#Šúî[šë¤#±øüþ²²ÝcF:¼UÔLð:b;) 9tÀzN¯“†žŒ+V­Z¼tÙý÷ýçyZ5$„H’lµZСÍî´9Áç÷»].zCÛëõÚív³BÙ¯cLÛŸ­Vkø-qà ƒB´½ˆþ!„ƒ!«Õi­tŸÿðZ9 £99¹ ‰²,‡§Fˆ¢èt:Ñq µýiú [ˆRUußþý£GdY– D c¼«¤dùªÕ¿ûÕ½ýÞè‡D¡)!a„ˆA‚Ô›8Dz/a‚zëwŽ-³Ë¼«(ª$ËV«5¼“—ÕÚ;n¿µ±,ëq»ÍÊŸ;ìñáÕJÃ0xž7»Ú¾I¨¦÷±™F}#‡N&|è,càT9­gé¢òMÍÍ+W¯ÉÊ̼ù†ëS’“32Ò·nßn³Z óóâããs `X&593xÝú º®=êâ /p»Ý±±±ÝÝ݃*)-ÝYRrõ•—O?®©¹Ùa·gef"hñDž›Üyú Ic‹—.[µfÍ#ÿ~ðtë5§‰ãÜyÒ˜I`æÌÝtÔ-š°oŽ…âr:£¢¢B†¡ÓÌ_snëð©ÏÍ!dOõÇ€Sæ'ú€Ì|ÎöÍL„š0~Ü„ñãPß8Y(l„¬ð¡² èÀ!k¾‹3*ôCû>|gTèð]@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"„~ˆ8ú â@耈¡"Noè'„œê’8±ÌPßú1ƧºHN,3Ôsô"`Ã@ãœÉ Ã`Y–ÂɲìóùEŠ?œÙ!‚ ȲÌá0§ºTN,í9USý¿ªªúàÌFQTEÕTŽc9«ÅÊ2,„~GA''ù#ŒðIØ"!DŽå8Œ1˰ Ã@è„F˜ ‚1fYö¤mT×u„ЉÞ"!„çyD3|NÖu ~hÜ×4­¾±^VdZ?¡dY.1!!ÔÔÒlè:a[$ĈK`†;Á ~z0ÆÍ6«5-%Å0Œü bÆð×7Ö#‚âãœç Ú"FX×õ–¶Ö®î.ýПašª¦æäœ„mƒ$'&546!DR’’%IÆÌ ¹ÔB8Ž3 £¬t7„~8Œ Ã8 Û!„è†1Bë†a'*ô†AA†o€#9éy/'sƒB? îÿÌLƒ¿¯rß¾Ö¶6:~òÑ61ÓÝÝÓÔÜè÷û=.·ßï/Ý]J÷ìI¡}ö×76`Œw–îêèì(+ßJv—ɲ\ßP¿uÇöƦ¦îžnEQšš›u]?x!#!¡ŽèöqBÓ7ì Ã0ˆ C7bcc'Œµwÿ¾æ––! 2Ôép躞’”l·Û ƒH²œ”˜œœ˜4tȰήΎÎžç@SKÓ¡Ã6ôoÇCÁ%»UT8¨¶®6 ð<ßÙÕÙÕÕ••žÑÖÞÞÔÒìr8%Yîééæy¾«»«½³ƒã¸Äø„1£Æf¦gFy¢F)Bø5C­Ž(<BDAìñö‚I’::;, ˆÁ BD×4žç1F`PQÝÐUݺc;˲»Ý0 C×$IR cÌsœÓî2hЀÌìð!“OÒ ##=}Ê„IŠ"w{»yçyÁãv12**:**Ê0ŒÝ{ö¤$§0 #‚Çí5|DB\¼¢ªcÃÐtCW9 òÛ#·yàÈú‚1ÆXUÕÄø„ø¸øâíÛ6oÝbµÚRSRt]ohlX¿i½¬(²²3Ó3öíß¿mÇvMÓž·Y­ííí’,±,ïõûv––ÄÆÄÆÇ'ÔÖ×546J²Ä`æ`PÆaw–Bq«*ªÝnÏHÏ(Û³;)!Én·W×Ô4·´hª* BtTA$&::1>Ánëû“¦q,˲¬®éÑž(†a·ïÚq0ɇ ÞaB×®];lØ0˜¥ ÂÕÖ׿`>¥Yö²,ÓôçKwï–Uy@V¶E´ÐôEQUûr1ý¿ÕbeY–eXUS ÃcBQ¤wz !¢(î*-Eˆ }%½]M/æp¢ TUW—íÞ[˜Ÿ/Š¢Íf“$‰®ß\9Ã0v»Ýï÷Ó90éµA×u:¿¹-ú€aBË2ûöïokkÇ ÎÊÌŒ‹£Ã-™ Óë CûdÓÇ„°Õj1çÞ¤[$q,++Š¢(6«‡í s¼ŽãþóNöÖ[oMLL Ÿ/XÅ—_}}cQQ0Ü]^>n̷˥뺮ëv»FrÛm±Z9Žkni)*Þ:rÄpI’†ñx<Q”…a—Ói³ÙžÁátÐÁ!6›m˶mÏ¿ô2Çñ›·lIKMͽàÛoÓÓÒÜn·aÇj±Ðað–._1l茑(ˆ˜a Ãp:š¦qçq»-‹,Ëv›MEY–1FV«õ/ÿøç¶í;šš›¿Y´¨0??66Öb±¸œN:‚Ýn·Ûl‹…ç8»ÝnµZY–u8ì,Ëñ<¿|åÊÚºú!ƒ[-»ÝN ìr¹ìv»(Š;vî\·aãÔ)“EÑuÝép„ˆ¢àv»é°®Ð8ͱ,ÛÒÒÒ?ôÓúìs/½|ý5×Ü~ÛÏÇŽ¥ëúÊÕ«Ý.·Çã)ÚR¬(Š(X>Ÿÿeі⤤¤?ùtî¼y†®g¤§)ŠòáÜO**+ssrB’´bÕêÕkÖVÕÖ´´¶ÎÿêkÛ«ªªËåúòë>Ÿï±ÿþdÆ8-5õà ØpZ¢¡¿…a–eo¾áú·æ¼óÇ¿üµl÷ǽ|媥+Vp÷Ú[o˲üÔ³Ïî*-‰‰éééADƒ¡g_|IUÕʽ{ßýàÃP0ôì‹/ºÝîÏçµtùJ‹ÅòÔ³Ï+ªÆqœßç»`öy¡›nûŧŸ}ŽÂ[,úÀï÷»Ýî`0øÌsÏ«šn³Ùt]á“Ï>Û³§œ òÖ;ï665ßÿïÿøQà5M«ªª®Ü»OàyB cEQæ~:ï•×^¯®©™6eò‚o.Zº,&:úégŸóùü󾘿hé2QÞýðÃòŠŠ`(ôÐc'ÄÇøñÜ]¥e;KJ¶lÝúì /î,)ŠŠÒuíƒ>þü˯’“’BRhï¾ý«×®[¿aÓ¢%KdY~÷ƒwî*ykλ)ÉÉoÎy§¤´ÔjµÀÀé¯èg,IÒå—^òòóÏŽ9òÁ‡Ù¹«äê+¯ÜUZº¹hKlLôˆáÃF©ÈJwwwFzú¨Ãs ¸õæ›»º»KJËz¼ÞöŽÎšÚ:ƒÙYY×_{ͨ#†tó ×ëº 8ŽST55%åùgž¾çÎ;W­]÷ÔŸ›¿Ïãñ 64ÊUW_Ÿ””„1¶Ûí]0»¢rïÂ%K†âóùZ;:;›hyNõw ÿÑ3|>ÿòËøØ¸áÆ~òÙgMMÍgÍœñá'Ÿü÷…®ûÙÏdY6dÈàÿ|ß?BC®ohس§Ü"ZlØûÍ}éÕ×_úï35uµ·{òÄ ÆKJLp³púëúéíÊââmªª,ñòK.ž8aíùŸ¤¥¦\qÙ¥o¼5gïþý9²Bo¿û^GG猩ӆ úñ§Ÿ†B¡‰ÆƒAÃ0²23u]÷ù|²¬ „¯½êª7æ¼óÆ[s’““rdgefDEy ÃÈÊÈp»\V‹e@v6A(=-Íårbð÷ÅW_íÚUš›“{Öôé+V­Z¹jµh±\8{6ÃàŒô žã¦Nž¤ëZVVfZZʾýÞ~ィ¨¨kvUTTÔ¼N´#ÏÍk³Y¥Ä°,Ïó@Àår}ùÕ×;KKÿñ×?ûýžãÁ ÍfcFÓ4Qu]WUUE]ÓUáyžÎB)Ë2WŒ.¦( M…Ec,˲Íf“e™þ•¦ôð< …X†±Z­æÐÕŠ¢Ðµ!„è[BÁPÈåtjšÆ²,]ý¢ ¨š¦M*å8Này ð¼n‚ èºn›–S’$úÔÌÚ ö}@Ã0$I¢ó®ÑÌ"Y–A {†a‹Åh ¡p:£ ïܹóÈ >~€a]Sé%A–å%Ë—_qé¥aBˆªi‹EÓ4„Æ8 Òˆ …hz;Mt …$†ÁŠ¢ÐÅB¡m ¡+¤ü~?}¯ùŠ,Ë´[@ d†®3<²›*V‹…¾H+Úæ¥Kê[ê[UUŽãtÃ@…o¨·`’Äô=¥0Æá^~dYFë²L/Q²,ÓÞ´<ý&f€ÓÙ‘CoŒF3½1ý¦®ÏËÉ ƒæòf¨5[·ÍôOt°Ã;â‹æ+ýþtøæ+fúåSþ4|γ#lèH+ ÿ€fÏ/ú6tèиøÉùßa‹¶™Œ>œV~OuüX:lù#2[uNuü@f´ç†¬Éhœ*ô6/Ã0\GGǶmÛ 5"Ã0ÿÎ /%,7µ%tEXtdate:create2013-09-04T17:02:50-04:00¼!nè%tEXtdate:modify2013-09-04T17:01:29-04:00¹!tEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/transition_from_boolean_2.txt000066400000000000000000000002041330160122500266620ustar00rootroot00000000000000This screen shows you the boolean page with the boolean selected. Enable or disable the boolean to turn on or off the transition. selinux-python-2.8/sepolicy/sepolicy/help/transition_to.png000066400000000000000000001630351330160122500244020ustar00rootroot00000000000000‰PNG  IHDRþjû˜8pgAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìýWtI–`‹ns÷ÐZƒ *Pk¦d2™ZWeVWUW«éž®™îwfÝu?ÞW¯÷ñô}wî¼éîééž%3³R‹ªTɤ֚ A¡E „Žpñ>BA‘‚*i› ‹ææÇÜÝÎ1;vÌLüâ¿pƒÁß+//ÿv»}‰eYv$‰D"‘|'Bd2™Ìé‘‘‘ÿbšæZyyùçÍ›÷¯­­­t8wZ>‰D"‘H$ß.öT*µª»»ûÿ}áÂU;vìDkkë2MÓ°,ëN '‘H$‰ä[FA*•âäÉ“'4`‘¦i˜¦y§å’H$‰Dr °, ‡ÃÝn_¬™¦i3MSöö%‰D"ùŽcš¦M³,‹ÂŸD"‘H$’ï6 ¾D"‘H$ßq ¶^+|Æ_"ùz!ŠŸ õhê±Âq!ÄUõl¶c߆Se™-]N€¯~ýÂu¦ž7Û1‰DrwQ¨û ]ýÉ×@A6›%O`š&N§·ÓE&›!žH–6›†×í&‹ãv»°Ûl¤ÓR™4>E¾n B`š&Ѧi „Àépàr:§5,`X±x—Én蘦‰ÇíþJ׊Åã¤3Yü>/šªbZÑÉ(Š"ðzÛÎá“§Ñu…óæòg?|•çNó³·ÞÇnÓ0M‹ysøƒï¿ÄùŸÿÂ_|Že‹`Y'ε±çÐQþü÷€×ã!WmE±!®( ¦i"„@@þW0ó¿MÏ™ŒÅøýí?™˜À¦iÔVUòÊÓO° yNQA`YLLLò¿þ O<ò }ƒC„Ç"üäû/¡¢(ù’å®TP S¯%|ðù¾Øw?ûÑk¬[¹”îž~þúŸAc]ú{ßÇårä$µ,̼§cªwÁ*»’&w‘/!X¦‰•¿6X˜æ•Æ Ò» ‘Ð?4Ldb’ùs›8{á"¥¡ 5•׿Íi`Çžý\î ¢¬Ã4é"21‰Çí¦ª¢ŒÑ±Ù¬N:“!ðSVbpd”ñ|ššÊ Ð?8D:“AQÊKKpØíô ¢©¹†L4çä¹6 ä¬$ÄâùóÐTõN¿ ÉmGÁàh˜¶îàÁ5+Á®‡xá‰Ç¨©¬¸®M·,K~‰äë`™&å%%T–•râì9,Ódå’Å¡€LFclݵEUX² …Å-ó Õb}ëêécç¾ÔUWñ?_ UUH¥ÓÔVU±~ÅRÞÿ|;ù‡?æà‰S\êîaùâ…|±ÿ W¯dÏ᣼üäãT”–æóËåyìôY.]î!•NS_SÍ®ý‡øâÀ!4UÅåtòôc#eÁÉsmŒ„#4Õ×òë÷?fh$Œ×ã¦$àBgÿê÷¾Ãfãßx›¿ô<¡@˲0M“…óšˆ%¼ùñ't÷ö±tÑ¡`˜;ö «§h<Îãnäô…v†GÇÐ4MUùÓ¾ÊûÑÕÓËd,Î3=L:“aÇÞƒ¸œF#¾÷ô“ ‡Ãœj»À#ëÖ0§¾–×?ø-Õ4ÖÕ0·±ÍåúÚC$ɽŠeY,n™ËÐè(ï~²€ç¶lbÉ‚ù×uõbqŠcü‰äæ1,‹ÆºþýŸü'Îçè©3ì=rŒ?ûÑkrnk·Û…ªª8ìv †Yä]ê¹·‰nÅÏ?ô >‡ß|ô Ãá1°®TTÓ²X»|)—ûûùÅ»ðâ›YѺˆ+Á¹yÁ„Àïóñ{/xÝ0xxÝjV-måïõ&½ƒ=}–úšj‰${¥¢¬¿×Ëï¿ò<µ5ˆ¼,Éýˆ€bŒ ùÏ‚›³ç²Ç/‘| !èêíãÂ¥Nj*+™7§m»÷1aY·›5Ë–`·Ùp:˜fnœº«·‡ÝŽ¢ÉëŸÀn³áv¹PMÓH¦Ót\îat,‚e™¤3¹ A—ÃÁÄd”d*…Ë霜ûô¦‡Y½d1†i0ápØ G"ô ‘ÉdñzܺÁÐÈh11'ŸÉÀð0†iôûxhíjÞýäs;›Ø€ÃnËõ$ q¦ÉÆU+¨,/¥¡¦†­_îrãŽ|¾æ†ÊB!t]GQl6 ·Ó‰Ãnçrß'ÛÎÓT_OYIÃ0°ÙlD&& “ÉfÑ4 ›¦ÐÜXOI0PŒAÐÔœçÀÈÇH$÷Šœj»ÀîƒGx~Ë&vÇÆUË‹r¥Á Šd²Ù\´¾Ëų=Ê'_|IÇï>gÁÜ&6?°x"Éñ³m|^ü^/ šç°qõ >Ùù%v›-odQK3¿Ûé O°p^s±qaZ>›¦átØYº`>–iâr9ñ{=ø¼^ª+*Á°,JKBùðù(+ ]I“%XѺˆÏ¿ÜKG÷eFÇ"ÔT–òoàÀñ$S)Ü.'.§ƒPÀ_ô:H½%¹_1вR^zj óÁ}e¡e¡ÐMÕ ±wï^kÉ’%WÍ–H$×Ç´,2Ù,©T»ÝŽÛ™ âËê:™¬žO•‹ÀwØl¤3Ù|K<Õ®©*¦ia³id³:š¦"Èo³i`Y¤³YTE¡/8ìvRé pä§Z–E:“ÅfÓòésˆ|C@7 œv;Š¢ÕutÝ(6ì¶\Ï:™N¹ Eàše«lÓ4qدüN‡ýªŠoY¶¼Û¼˜Wp•OM¯%„ ½³›þ¡ažyì‘â: …©×±i* æÊb³$×*§Ýf+6,Ëbç¾ã;sÓ4Y² …ƺZ¬¼wÁïqcî¡Ý~Cå&‘ÜX–ÅÔ0>Ã0nú¼¢«ÿÛ\AL"¹_˜­ÎX¹n*íl¿Mسn˜þFùÏ<~£tBœN/=µ…ƺfnâu£kßL9g¦Y¿r9M uØmvj*ËóÞóº×‘H$_¹ID"™†eYÔWWÑX{µÑ¿Uø½‚>oqå1©$’oŸ«ð‘M"‘Låf]‡ß3Ý–‰äÖ ×ê—H$‰ä>¡¸€ªªr|_"‘H$’û€b_"¹›Ðïߥ©ÂòÝ”|ÐÂca.\¼0eg.‰äÎ`˜%ÁTU%‘LÜiq®‹……"••÷¢½¹Þ_x,Lß@••TUVÝ:™d³Yúú¨®ªÆn·ßÕ÷'™L208@dÍ#?Ä¥Î.&&'1 ƒÏ¶m'J¡j[6?F2™dϾýdÒiB¡[ߌ:cL/›É°ýÐ!ε§®¶–‡|€­;v208H]M ÍMM¼ÿÑGø}>FÃaª««ˆ'ìÛ€¾þ~êjky`ã¾Ü³—¡¡!&£Q´´°éÑG8~ü'OŸ&à÷óä–ÇåšwBö8ÀÇŸ|Ê_üù¿fù²¥œ8yŠ¿ýû¿çå^àé'Ÿ¸áö°Åí¢±ðù|44ÔFJ¥BÐÙÕ;ûÉf³¬^¹Š… æsö\ÇNœÀf³ñðƒædQÀâ\ÛyöìÛ‡Ífcó£RZZÂG¿ûƒƒCTWW³éá‡ÙþÅ$ &£Q6¬[ÇÒ%­ìÞ³—ή.êjkÙ¼iŽü¾÷Bˆâ8¶i™((Ó¶¸…‚,[º·ÛM0à䩉\Å! •J±s×—\êꢱ¾žÇ}„pxŒ/vI"™bÃÚµ´.^4mø p_fºúóš›ùô³­Ìih@(ù!ÃàБ#œ8y*W?ÛÄŽ/vñÁG384ÄÃ>@w÷eÛô(“““ìØùß{ùe††‡¹p±ë×sàà!ú¨­©á ëÙ½o£#£8].RÉܳ8qò$—ººxòñÇq8Óž¢(hª6íž™–I2•DQLËÄítS_Wa$ š¦aš&á±0åeåX–…ªªDcQ¢Ñ(¡P›f#“Í0Ç0 þU•Ux\FFGH§Ó¸]nB¡Š¢J¥˜œœ¤²²òÚyf2DÆ#¹F~Âàîž>)ùn£i6'Ùl†H´žþJKR$“YJÊ—’Θ8NTíÆ3hÔW_{õ¯jjjp¹\ŃB†‡‡Ù¹ëKžyêIN>KuUŠªðî°qÃzÆÆ"œ9{UU9xè<ü gΞ%<6†nèhšP(Äg[·¡iGgóc›¨¯«# `Y&åe¥ìÜõ%¥%%Ä š››x`ý:zzû8qò$c‘q:»ºØ°~&söì9ü~?KZ[ùôó­47Íá·ß¡¡¾ŽE RZZ’[ØDrGBPRR¹¶6¶nßA:“áWo¼IMu5/¿ðÆÇÇ™ÛÜÌ/~ý:µ55LNNrþ–/[Ša”––²ëË/q88tˆ%‹Ø»?U••¼ùÖÛ¬Z¹‚úº:B%¡iq+Y=K$¡¬´ì*™?ù|+ýœ;ž²²2ÚÎ_ #™LRWWËàÐÛv|ÁÊåËØ½w/Á`€S§OÓÞÑÁC7 …ðû|Óò˜œ à]ÚBŽ?Á¼¹s±;ì´_ìÀít1‰P^QΛo½Ã’ÖVεµO$h¨¯§³³‹'·L,çÌÙsØl6V¯\IGg'ƒƒ\¼t‰µkVSQQSä ‡Ã˜¦‰Íf+öÀ5MÃétâñxp:†Ëé¢$TÂù ç‰ÅbD"FãÔT× „ àp±ã"Ô×Õ“Íf)+-£½£ññq\NMsšèèÇawp©óÑh”úúz\.@€ÑÑQzzz¨©©AQ‚þàuót8EoBÁcéõxñx~ûɧ  rôøq à °bÙ2lƒCCDcqªª*Y·f Ö¯ãRg™L¶8 ( ]ÝÝÔÕÕ±bÙ2æ67¡ë:.´sæì9âñ8Š¢PZRBc} ¨ª‚iYtuu³tÉ6¬[Ç¢E ¹ÔÕ…¦©Ì›ÛÌ¢óq8Ømvž{úi†Øwà ‰ä­]6UrsX–EEy9ùo~JcC=ÿüó_ÐØPÏ_þ›ŸR^^~]ÌLwºa˜4Ô×ó‡¿ÿcþÓø÷`Yìܵ‹D"ÁÆukÙ°nŠªpôØ1\N'ë×®aúµŒOŒ3>>Ž‚H$ÂÀÀ —/_&‹átºH$\hoçì¹sÄ &''ñ¸ÜÌ›;—–¹Í†Iii ?¶‰SgÎpâÔ)2éôUòÆ©gÊ<§±?ùÃ?àÏþøhž3kJ°«iZôôö1ãB{;N§lX¿Žšêjvîú’Á ØՅ>ÛP€¢*<ýÄôõõsøèQ¥££»ÍFEY€ŸùóæQ^^ÎâE 9tø(—ººxø¡Ùð —{{Y¼h!]ÝÝ´.ZÄÚÕ«Y°`>—ººPU•E °pþ|Epòôi<óš›±fqõOs³OùËé¥Ífq:‚©®ª.ŽU†ËíÂív£…x"Î…ö ÔÕÔ1·y.6» Ó2qºœ˜–I ÀëóŸM³aš&¯Ã0°i¶æi·Û¯’Y"¹“Øí|^?ÑX ÓÒ±Û5’©8#áaçMwz¯2üB@2•âø‰“|ï¥ùÓ?úCþè÷ŸŽK„ÇÆˆÅbœoogϾýÔTWãóyåôÙ³Í÷:Û¶ E6®_G*fëölݱ“ŠŠ ***èíë#£¶¶†Æ†6=ü0mÜ@_ÿ'OfÑÂü~ Ã@7 CÏ\ƒh4JYY) çÏçБ#DÆÇ¯2¸…²N3üf®7ît8q:y·{n<rñ3^‡Êò –-]ÂSOl¡¾®–h,Æ’Å‹QU•C‡\eø§ÞÛé ]×)--aËæÇ8yú Éd’ÊŠJª«*Y0¿…'6ofé’VTM%›ÕÙ½o?###,Y¼˜ó.H$xjËŽ?@Óœ9ÌÛÌñ'Ùº}gΜcáüù`Y躎näö xæ©'I&“|¶mÙl¶hü ò\ýSÿ¦Ž›kª†ª¨h6­hˆ}>“““躎"ç%È+6EUðy}x½^ÆÇÇñy}Øm¹8 UQÁ‚ÊŠJ|^š’.ˆŒG¨«­£±¡§ÃI$¹¹<ócþ_u‰äV „@ Èd2TVTaã.÷t×¹®rõ ‘Ë4™J²aÝZÊËË)¯ÈõÐlš#G‘L¥ðºÝ<óôSLLL²ïÀAÒé4u55l~lÁ@ÁÁAJJJ¨©®fÝšÕ8.εÇ4M/\€eYôöõÓP_OëâEÌŸ×Âhx —ËEee®Ònܰ!}}},]²„õk×`YPW[KÀïGAmm mç/ÐÕÝÍŠeËX½j%6›íN?I˲p»]ÌilÄét^³§?ÕÕ_QV1í|Ó2‰ÇD£1LËâá`áüù4Ö708†"vG.î ÿ§**Ñh”X,†Ýn'›Í‡Q5•t*M8Æét2>>N2™d|b Ó0‰ŒEÐ Ó0Š``` w­È¦i2ËÍ0-âñ8‰T‚‰É‰\^‰Üþ6»ññëäÙ?€ª©Ø4BÉy.-ÓÂåráqKW¿äÎP˜m7ÐßOsÓ\ C'‰ SS]‹Çãåzx\ýâõ7^·Ö¬YCI¨dšRVUuZÆf³q±£ƒŸÿê×ü»óSJKKB°k÷nŽ=Æ¿ù׆Óéœ6¥©ð¿išÓ¢ú§@M½NáóÌó i Ø5}á÷¯;?Zrç)(î‹—.²xÁâ«~+LÚÛž:W¾p¬0 L¿’W.ЯO!máÝ™:ýPUŒ)ïn!Xnª\™L†ž¾šç4_%³ª(èSÒÏì1§èå™9Seæ¢@ª¢20<@ueõôßTuZú©.ò© èÒ\í…hMS1óÃ… º©y)ŠÀ4¯ÔÁ©ùÜúªªN›= ( —;QÛ3½^æƒMÓÄívcèÉd²8~FÉd2Øl6NzV/vN’É$‡ƒh4Ša¸]n\n‰x—Ë…aÄãqÜnwñš‡ƒX,†®ëx<l6ñxüºyNËBΤñûüÅ@C‰äv#„ÂðÈ;.°~ÝFÂáa:»:bãú)/¯ÄºÎzBÚÚÚ®Õ?s]×QU•P08Íà:NüùÞ÷ÔsfVŒ™ù~ŸºµèlÛŒÎ7#ÛWyg…äÖ½±®jÌÌûz¿Ív,“1§|Î\7íµòžµ,Ö•é|3uBayQ˲Ї£øÜKJJ®yÀ´€d,°¯ŒozÜžékX …r å ƒ7̳G®!'Çø%wš\g!™HòégŸ0>1Žaè|'âæ¤7½d¯eYÔTWó§òÇ8ìöb+ùÒ¥´.^|Ïï¼%¹{(L‘»Û™j|oõºùS§Ç®wׯ՟§0þ^GŽñKî4¦ibÓlTTTqôØq††G¨ª¬ ©qZ>€õftÂW²ÖŠ¢àÌ·Œ ÈhWɷͽ°N?\½Vÿ­vÿ^k‘»•¢Ë_UP5õ®–õFDnõÁ»³%¹OBà÷ûY¼h1 ,œ6¼)wç“ܳhš–[B½û_ÍBßaw ëú-÷zÆÔ±(F»ßÍ躞‹˜¹ÕÄ„rwË{#âžx/%ß} †þën­Yäv ÛPHîŠP0 ¿Ï®ë$ï‘õµ5µLNN’LÝZ™…„‚!°rÁo_w]ûÛ…¢(T–W’Τ‰Çã÷|oÙf³áõzïiÏ…ä»Å×}5§ÓÉhx”ÈDäfã$’ozV§¼¬œ²Ò²Y=ïF +»¹]î[\:uvý`€ A}^Ë››ów‹{C 3!$’{­²¼’ùóçß²J)+Šäf˜¹ý½²ÃÔåto‡Ì…ût¯Ó§k÷Æó¼™²H$÷:ä÷¿–?™J2ÄÐ{ÞÍ'¹µ8Nþ@1Pô^T²·Sæ{íþÜkòJ$ßenY·!“É0<<,{ü’›b<5N6›¥²âæ÷¨—H$ÉWç–~!étMÓ¦m´!‘\‹t:ÍÀÐÀ´Õô$‰DòísËzü–eáp8®¹>»”üô ‹{dê¶äñUç¡J$‰äëqë"„ÓÖŸö“€hR§g$E"mpkÔ•»pÙäPàý‰B I$Émà–‡ϦÌÏ÷Lòéþ!"£I¡S^楤ÜÍ#KK©*q}«Hîu ÛMJ$‰äÖR4ü–e‘Íf1Ìܞ᪪§'MߥK¹é¥B ½¸+»u º‡¢üüÃvÛûÑ“ø\i/¸˜»h¿%xõ±9<|Ÿ!„3?$‰ä6P4üÑh”ÿú7›ß¢ScÁü–,ne4<Êäd‡ÃÁ¦G¦··ÒÒ’âØýTã>õ»"LaNsáZ|q¨‡î¶~‚¶A^ûýu,]²Sg/òÆ[‡(O,åX›Íkä˜ÿ}†eY²Ç/‘H$· r½­¬®“H$ø½×^¥¦º»ÍÎÄä6›±H—ËÅððÿø/?cÓ£°bù2¼£££Dc1ÊËËñ¸ÝŒ“Éf™œœ¤´4·µfÁðë†Éù‹Cdc1Öm©cÍê%ø|V.SØwà—û"\ìöòøÚFäpïý…ìñK$Éí¡ØãBL¥8|ä(Á`ÖE ‰Çœ:}‡Ã¢(´µ_àÜ… d²\.'>Ÿû š¦âõzùþ+/óË×ß ‰PYQÎkß{EQŠCŠ"04¦ia³;q:š¦bÓ\$:–‘Í-($d—ÿ~â^ßÀE"‘Hî¦÷ !p8¸\.4ÍF&›!ãpØÁ²X±lóçÍã{/¿Èâ… ù§ŸýœÉè$ó[Zسw7¬G×uÖ¯YÃÊËŠk[züš¦Ò:¯”SÇ9v*ÉÒÖêjK8s®—öN“¤ž¢¾Â‰PÂ’†à~BX2¸O"‘HnÓ‚ûü>›7=JC]0<2 B`YÉæzâŠ"ÀÊ¥×u—ËEyY/¿øåee€Àçóâv»1MÁïÁS,æè©^Μ óüí1ÊK¼ôމÅp9»¹pl”È깃Aàw!]ý‰Dr{(®˜"„@³åÚf>POQlš²ÒR9Âùö 464ðÁÇs®í<7¬Ç0 .÷ô‹ÅP„‚¦©‘‹üGbJt?PSâ?ÿëÍlz¬†¤5É™®nì¾,åeC¨ÉvÚÛNòæë¿š((ÿî“?iù%‰ä–#öîÝk-\¸¬®3::JiIIq_<'™Lár»¸|¹‡ÊÊ ìv;ÃÃÔ––â÷ùb4&ðS]UÅøÄ·Ã4BP[S{UÏ]A2apd‚T:‹ÏãÄÌÄùçü¾Ø¹•ººþáŸ~vÏì@&ù昦ÉÅK©(«+øI$É-@A[[ÛÃ_èá›SæÑM]|gê|ü©Ó÷¦*iÓ4Q„!˜˜œ@Q”Y Â’½X€Œ³ÿ>ü~?ë×o+¹ÝG˜¦ÉÅŽ‹”—•KÃ/‘H$·€‚áŸÖ¥6gLžŸj°¯õyæ9¦e¶7Z†uj{À2MÏ<óì¬ùJ¾ÛÈ1~‰D"¹=ÜR_úWYýÊ"?Ö´ï’û¹V¿D"‘Ün™áWU]׋AzÉõÈd2Óf€H$‰äÖpK ¿eY8N¢Ñ(Ý—»QUõN—Sr—“Édðx<ÒðK$É-æ–õøE!`†œ/¹!.§ UUå»"‘H$·˜[>_NNÉ“ÜÒèK$Émà–[e©Ì%‰D"¹{ÝqÉ]¹#£ä[Å”}‰dV¤á—ܤ ‹pÜ$‘‘ë7H¾9.›B…OÁ¦ä– —H$W¸¡á—QÖ’[‰ÎZ¼s"Á‰A‹XV®Ú'ùfX€Çfòè•§¹Ð¤ñ¿oCË7Çu ¿aÄqÒéô–SòE‚±Œ a…Í­¥8mŠTÒ’oL2mp¢3Ì’ò 5‹)ýþßyv^¯W.ù}\×ð Ífq»Ýrç4É-!kê\êŸdumß_âÀ”-vÉ·€¢Ø±èan¥!¤1ø.cZ&á±0ÉT’ÊŠÊ;-Î]Ï5 ¿®ë$ j«k±ÛíwZNÉwØÃQJ}ò“|»Túí¸œe”†<Ò‹tr¥’}ݳ~!éL›Í†ªªrÃÉ-CÈ e^¤gIò­ €2¯T*ƒi™HGÒwMÓ°, Ã0¤á¿×¼;™LMÕdpßw EQîh¥Påªw*‘Ñ yä“{™»á½R¦¼WPâÕä,‘[ÈluùN^_M³‘Éfdâ\SÛf2™ÜûX³8Ê ÃÀ4Ml6ÛM_̲,t]Ÿ¶šßͼ8Š¢½_g÷>]×Ig2¹àÈmlÓlØí7/ûµÊ#„@Q,Ë*þ}UùfÃ0 2™Lq›c»Ýþ­¬‚x®í<étšÅ‹e/0s‡Ä©åºî}ôlUUgUþ…| Ãàȱc„‚!š›æ`YÝB<•\?Íš&ašèÙ,v»!Ä e)¤ÉN‘çf6Š*Ü Ó4¿ÖsB`Édò; 𦉦ª8Λ’ýš÷wÊ{L« ßä=+ȘÕuì6ÛU2μ'×Ëçô™3$SiV,[zÕ{5Ugá9jšV|޳Éfû¢¬´„–yór÷A‰ÇÆé´žžeÈd2¹ë6› [¾^é†zƒL&“!«ë("?SÀ²¾•º9õ]7º®“Éf‹×p:߸‘fšf±.76ÔO{Î…ÏSëÑÔrÝè>lÄlå.ä›J¥9rì-óæRQ^>í:™L< Çw®ú§ú§UVV6í ‚ÈDUUq8ÓŒZáô»Oøð£ß²xáœNç´sg !À² óúoÞ¢ªª’K] QYQ~ÕyS P:¡¯¿ǃeYìÙ·Ó4 Åü§+êÜ1Ó¼’×ÉS§y㭷ؾc';¿ü’ÓgÎ`Z& õõÓ”Ý첋« AîÅKñÅ—»ñz½ŒE"Ø4 ›ÍƉ“§¦¢¼|ZÙo&ÏŸ¢(8xˆ¿ÿ§æÌÙ³>zŒ€ßOeEEñœ©åš¡ªX³ä °k÷nºº»I¥Òtvu3§±¡ø[8âø‰“Œ†Ã,\° Wþ|¹¦Ê:UöÙÊcš&;¾Ø…eA*Â0 <;:8qò$ ÓÊq3yž£¢(ôõ÷ó/?ÿ­‹ár¹¦7õž8Žiùò-<«Ï¶mçÒ¥K¤Ò)Ú;:˜?oŠ’ûmtt”Éh”€ßaÓòœíyæž½J"‘àŸ~ösJJJ(-)™v½¢lN'ª¢ðë7~À¢… ‹õB7,.ŒS´åˆtvuóþõßpâÔ)9 D"†Ù½g/¦ÔÝï:°mç|øñoùôó­ì?xÓ§ÏâÏ×M¬\I丞^*äáp„½ûP 1<2‚ÇíþZºîZõó½?ä7o¿Ë©3g8uæ 5Õ5üþ«tÉÕù‹kæ«ë:ïø1–eqñRéTšªÊÊâè†Óé$•Nuøô:XætYGFGyëwijl¼Êöl×ã!‘HðÆ[oQWSKyyY1M*^÷+ÃûB}œÕð›¦ÉøÄ8v›MÕ¦Ëb"åãO>a`pˆºº:jª«ˆF£ŒE"ŒE"X€Ýfc|b‚Èø8‘Èš–Û¦÷‹/w³pþ Ã@( ¡`¡áaQÃ0èéí#<6†Ýn§£óo¼õ6¥%%¸Ýn"ã|>.—‹áá&&'°Ûl¦ÉÈè(##£„Ç"¸\΢âôú¼,œ?ŸÉh›ÍÆ_}•ªŠ ¢±ãããd2"ããô bv»Ñp˜pxŒ¡á¡b‹~|b‚þþ~²™,6›ÆèhÃ0xóíwPU•`ÀO,GQJB¡bJ^1_/ÏL&ƒ3¯\…œ=×F*•âÇ?øË–.¡¢¢œèä$ãLF£8Æ"‘«òa,ÉîÞ>LÓ,ækåSEy9=}}\êìÄår’Éd°Ùl|üÉ'œ<}šêê*Æ'&øÅ¯_GUU™Löªç«ë:ýtvusðð´´PZR2í}äç¿úu>?‡ƒšê*X“É, ]a~MU™ÞÂÏf³¼ÿáG\¸x‘` À’Å‹I&“ŒŽ† ‡ÑõÜŒ“X,F8<Æh8ŒPì6ŸoÛNMu5¡PD"A]m-á±1º/_Æ2-4M¥§·—ÁA4M#<áoþîï°Ùl”””ÅÐ4ò²2FFFÅfÓPU•ááaFFGÀåtb·Û±, —ËEëâÅ8v‡†ø‹?ÿs.X@"‘`|bœD"I,çòåRɇ±H„ÑÑ0}}}¨ªŠËå"s¹§‡x,ŽËåbdtUQøÍ;ï0<2Bueº¡“L¦¨¯«ebb‚Á¡!,Àét»fž±XÛ]4´##£ìØõÖ¯'‹Ëåv¹)Þ“Ò’Nã‘ñi×*¼¯5ÕÕtu_æB{;‡l6‹ÃnçÍ·ßáÈÑc44Ô‰Œó·ÿãóÌfõ+ÏNœN'†ap¹§—ö‹|¹w/Ë–,¡²²bšêëïŸö¼\. õ”•–æÒ†iqyx‚—‚MÍÉØ?0À…‹íüè?`ͪUÔÕÕ‹Å@ÚÚÎS^VFMu5‘H„Þ¾þüN£9dZ¥¥¥,œ?ŸîžË´Ì›ËóÏ<ƒÏçer2Jd|]×ahx‘oÐÌÔKå;84T,Óøø8㓼ýîû_K×ÍÌÓa·;¼û¢¦ªšW^zÅ‹ðû‰DÆŸ˜ ™L¢ÙlŒŒŒó7M3W†¡!¢±8©dоþ>4MÃn³M1ÔPS]Å‘clj'Eã­ë:¯¿ùáp˜ò²2:»ºyóí·)- áq»‰ÇãSìB®N¥Ói.÷ôÐqé'OŸaÕŠå8Îi ‘¶óçyã­·) •àq{p:Ô×Õâv¹Šé2Ù †að\Má=™Õ?eš&º®#ȹ/§¢( ]ÝÝxÜnyðNœ<Éò¥Kص{'NÂãñ …W^|϶m#¥¥¥<ñØcù–£ÉÅŽ„LNN²gß~¼^/ëV¯Æf³ñåž½Äâ1*+*QAÇ¥N¶nßÎ3O=Éé3g1 ƒ³çÚh;! ººšåK—ð/¿øuµ5Œ†Ã¬_»–ÇÛT4|n— ¿Ï‡®ëTV”Ó}¹‡¿ÿ§¦¢¼œE 008Èäd”X<ÎóÏ<ÍœkY&“Ô×ÖòئGyóíwpØíTUV²qÃzŽž8A0 ãR'ºnàv¹è@‚X,ÎÞýûÑ4 —ÓÉ–ÍñË×߸fž•••<ñøf\y# Ð×ßÏÎ/¿Äét°~íZÞýàC"‘qê©®ªâä©Ó¨šZÌÿ¿~ŸÏËÄÄ$v» Ÿ×G<ç~òû”„BX–EËܹ(ŠÂ¥ÎNÚ/^D£á1ž~r gÛÚŸ à÷û¹Øq©X®Á¡¡âóBðÚ+/ÓÑÙÅþñxÜ„ÇÆkÚnŒŠ¢p±ãR1§ÓÉÊåË\¯\Êè¸íNlª2­‡QP˜á±1~øÚk>z”çŸMpúô~õÆ›TUUÇùÑïý€¶ó8pà >¿Eþà÷\ì÷÷pìÄI~?ï¾ÿN§‹¥KZY¼h!ï}ð!±x›¦1oî\Î_hÇ4Mü>?]—»Q…X,ζí;°Ùl¸\.^~ñyþú¿ÿü~ñD‚9 üëõ'!p8ÔÖÔpùr^¯—ººZ‰ÿ×ÿÛÿ—ËIëâE¤Óå•—^`ï¾ýDÆÇqäݯ?ýÓůß|‹X,JyyÏ?û4ÇOžÀawpæì9º»/ ñù|œ„ü«?úCÚΟgÇ»ðù|ŒŽŽ^å–BpþB{Q6¯×Ã7Sz¯B`×Üv•d:‹+?ªga1‰°{ï^\.'kV®âRgº®»ÐƒCC¼ûÁ‡(Š‚¡¼üâóEo›×ãÁãvãq»s=ýÊ ö8Èû}Lmm ‹,àbGñDMÕxä¡yóí·©­Éé¥ ëÖQ__Ç}L0 ¹©‰¹MM>z·Ûͥί®ëfæÙ4g>üP±>™¦É…Ž‹¨ªB àgùÒeüÃ?ÿ3‡£¨::;LÉÿ—¿¢¶º†Á¡AJòy¯ÇÃïÅY^…º¬g³œ\ncc‘¼ßÁ3O=Åž}û®Ø…’^záy¾ør7—:;Q„B"‘ÀÌË=ÕqæÜ9:.uòùöí<ÿì3<°a}Ñ«Xx/E!›É‡•$³3ë@OÑðç]jSÿt]çØñ¤R)Ré4팎†‰'4Ô×ó‡?þ.·‹ƒGŽO$X¾l)?ùáï122BÛ… @Á…Ÿf,a߃<òЃü䇿ǂù-TUV°lé*+*8ás››hnjâÕï½B]m-ñD‚¾þŽ?ÎÓOnáµï‹—h¿ØÛíâÅçžcíêÕ´wtÕõâ ®ëf..A7 2ùqãž{–õëÖ²rù2æ67%›7mâé'Ÿ »§—Éh”h4FI(ÄÂó‹Faáüù475ñ³ϰtI+©TŠðØ»÷ìaíêUü䇿G"™äȱã×ÍsÑ‚ù9Ç”{m·Ùñy½xÜ ×^½roÚÄ‘£ÇX³zå´üEðÄæÍ¬Z±¯ÇÃ÷_~‰t:ÍÈÈHQÿ,‹¥­­üð¯áñ¸I§Ò,_º”U+–óÜ3O³bù2š›æË‹Ç‹Ï×ãvóÅî=Ÿ={÷å^n!Èê:ÑÉI¶ïü‚%K–ðŸþÿãñÍQQ^Î72Þ<Ú/vPUYÉâE ùÉ~ĺµkH§3ŒŽ†ù|Û66=ú0ÿþ/ÿ-ÉT’}û ª¹†íï}ÿû\êì"NOS2V.0¦xÏðò Ïóò /°qýz–-Y‚eY?q’l6Ë#?ÄŸýñ366ÆhxŒ‰É ¼^/«W®ÀïóÆ˜ÓØÈŠeËxþ¹gxæ©'1Mƒ‰ÉI>Û¶¦¦&þã_þu55|¾m;™ëä¹jå ~QÖ©ÃjBˆb¹:.]¢uq+‹,à'?þ«W­ä³mÛiž3‡ÿø—Amm [·ï(žWøÁÚ5kø‹óSü>?™L†ë×ñÐðû?ü=z`# Ì/ÞçX,Ƽy¹gðûùôó­ìÚ½‡çŸ}†Ÿþé¿¢±¡aÚøwÎS«W­ÌÉö£²aÝÚi2ÊdÓÜtVÇ4Ìb\’¦jx½^¼/ŠªL¥H¥SÅ^ã‰S§¸|¹‡ÒPˆ®ËÝœ¿ÐùgiF> Ó0óãçJJB¼öÊˬX¶”Ë–ÑX_O÷åËôö÷ãr]ÑK/]"‹“H&©©®fnssÎ{“J±|éRšæ4~e]wužMÓê™8¹Åm\.†™kœ?¾iK/æÄ©S<ýÄôü=n7/¿ø<õuuÔ×Õñü3ÏÐ?0H,›a UåÁxõ{/‹Åñy½,\0ŸM<Ìc<ª•+¦”«†X<^´ £á0»÷ì¥íüy^yñ^|þYü~_ñYþV._FÓœF^ûÞ+Ô×Ö^•Æ0 =«_Õa•LgVïzñf^ôÂMŽDÆéº|9ïÊË`™&çΟr2N§‡ÝN6›rAi.— MUÉêYLÃ$•JaäT6›Å2­b#c߃;qÛÈOï², =«£ç{“WZ‚ù1A, ÓDU5l6­86dèú4Ù ãI¹ï6›†Çs£ýî³ÏÉêY\N'™lEQ°Ûmù 2ƒ¼ö½—Ñõœk?V~²z]׋ÊÃ4­¼ì9)MÓ¼qžcc¹—8/o]]-›y˜7n(Žû¹\Nìv³ä/lš†ÝnÇn·£ª š¦¡çó›v/,3çfË»Æs÷OA×u²ùFˆiå*<_»ÝN:F×uLËÌ?—\åK¥R$IÉd.Ð-ÿ„²Ùì´wÉ0 Ý køœÚ´\!©tšã'NP^VžØðV>˜*§¸=èù ît:ñù|8NtC/6.MÓÀ2™,Xªª¢©*ÇOžâ·Ÿ|‚Ãé(*Š‚‘?·@.æBÍ}åº îs·Û…ªN:› MUñûý¤ÓÞ|ûmÆ"~_±qív¹p¹œÅûû'øÔÕÖòO?ûí/¢(JNn-×ÓέB—7ئueü^ÍÇ \7ÏŸsáâÅY{CÓÊ¥¨¨ªRìõZ–•»–z%VàZåvØíØó×-¼7†a`˜&šfCSî³8Wž]&“™V®Œï¦Iæß©T*¦ª(BÉ¿Û׺ï .»B&›½b ƒÒÒ~ðyèAÊJK‹^ªÜû›&“Îàp8ðûý<±y3Md§ècÊû^øsäõÜ…ö‹ìüòË\lŒM˽^ÑK¦a0gN#/=ÿ—{{yÿ£H¦RXVîþ]wUž~œÓ±yY° ¥…Í>šU«ŠÞ0·Û•‹ß±¸*EQÑÔ\þ6›VŒ1fèÃ0Á²Š.{MS‹qJÝ¡æß•©¹` nþ©ùš¦U ”M$“$IR©TñËf³è3uI¡¬"§³ Sþëq•«_ Ȥ3³ÎßW…K]~ôÚ«8v”îÊé¹Ýœik#‹111ÁsÏ<ÍÇ¿û„]»wsöÜ9œN­ qæì9>ß¶¯×CÀ罹ºšÏ·oçäéÓ,_¶Ó4‰EcŒ¨*v»ŸÏ‡ßçã½?âÉ-£iåeØí6>þÝ'¨ªBcc#M œ¿p!gpEnNçLwOAÊ¥iZ¾‡mNgÉÍTдâœPòŠk``#ÇŽ‘L¦p:sñZÞÈÖÖÔðùÖí`å®áózinšÃÞ8rü8v›eKZéêî¾vž'J¾ñS”UQŠÆÁ0 45WIëÖ¬¾fþ…à(Ó4‹y…Š•{ÆWò7MUÓêjë8vüŸ~ö9>ò0uµWÊUè¡Æb1Æ'&xñ¹çèìʹïJJJŸ˜À0 >þäS‡@@0`ó¦GsùlÛŽiY,^¸ ø<,+×`ñ¹í¹7O\yNƒ$’IþÃ_üUU•>z”÷?üˆ²²Rεµñßÿþáå_àÔé3ìÞ»Ÿ‰‰IÆ"þø~Âg[·ñÛO?eé’V¼7¬ç÷Þ§ûrË—-ÅápH$éëëÇf³áõzinjâíwßGQTlšF(bIëb¶íØÁž}ûp:<°a=ÚÛ‹ÆÏaw ÄôiEªªbwä"ŸF ˆ\„õÐЉD’ªªª¼bT‹ãÛ“““=~œ‰‰‰\#ÚáÀn³c·ÛX0>ŸoÛŽÇãÁá°ãq»yü±M¼ÿáÇü׿þt]çû¯¼ÂG¿ûݵót8qæƒê ÷ÚnwËR(—ÝaÇírÑÜÔÄ[ヌ¢(<ñøfÞzçþë_ÿ Y]燯¾zUÀfË$!6» USi™7—=ûöóÖÛïòâóÏÑÜ|å> {öígròʳ;×vž÷>øŠòr"‘q,Ëâ×oþ†Ë==!(+-áå_dîÜfÞ~÷}‚Õ«V^¥Ü„x6†'sEÉË©©ZÑP¨Š‚P4~?»vïæ‘‡"ðÓÙÕ…Ïç+ö §éS a®¾åt‰aš$“I‡‡ÑTUͽKSõR.0óÉd2?4*Ð4ŸÏ‹ßçÿZºnjžn—‹+³?T5÷.èÅPN/˜†IIIˆÖÅ‹fÏß2óÓ$,ËÄfÓf4F(êQ!–ibÓr³Cëë9p軃%‹M+W6›½bN6®_O&›å­wßÃív“Íf™ŒFùí'Ÿ‘ÈÇÔÕÕ²nÍjü~?ïøÏ<õ$uµµ³6> ɵ{÷îµ.\8-pf`h€èdŸ×wÕ ñxœL6K( •JOÄÙ³o?ccÖ¯[CUE~¿ŸþÅ/)+)aÑ¢…ÔTUãõz ‡‰Åbøý~l6[~üx˜D2AeE»Þ¾~TUÁëñ H$LFc”•–L¥p:Øl6FÃaLÓ,F{ONF ¤ÓÒ™4Á@`šBŽÅb†I àϽ\ùôŠ¢084D,ÃçóáõxHg2ø}>,Ë"‹áv»"ÎPQQŽßçc|b¿ÏGV׋ \‰”-n¥R9×´Óá 2>~Ý<§Ê'ÈêY~q¬n||§ÓËåÂ4ÍkæŸÍfÉd³ø}>"ããx½^3V_ŒÆbX¦‰/_§#×ó #AYi)©t𱱡`€»¾dt4Ìúuk¨¬¨ $B7Œ¢ü.—‹P(H$2^ÜÛÁfÓ¨(/Ÿv¼Þ+Ѷ¦iÑ7žbUk eAß´JœJ¥Ÿ˜ ¢<· —®ëŒ†Ãœ>s–Ï·mç•—^ ®¦–ººZ~öË_108Èo¦¾¶Žòò2ÆÇ'è ¬¬EÉ[ 1:ÎÉ_¢«»›L6K0 ¬´4g”‡G(+-).ðû&‘LRYQ^ ¶ ƒX䂲ÊËʦC'“I¢±åe¹hãBz‡ÃÁÐЃC~~?ºaàv»q:ŒŽ†ñû}  1>>NEyUU•D"\n7š¦100€×ãÁår‘L&)--e,a||‚’PˆP(ÈÈèèu󬮮*Ê›ÉdˆDÆ •„ˆD"ÓÊUQ^N<‘`xx„ÒÒ~?á±±iךÉÄÄD.=$Ãårât:DQªª«Häó,/+åÝ>¼êÙéºNOo/ÉT ¯ÇCyY9#£#$“) ×[¬­­!›É04E¶™(BÐ90ÊÅÎnj‚®ÜÂdé ±xŒP0X¼Ñh´8=fdd”êê*2™,#££8v*òz©€eYLLNb³Ùð¸Ý9/D:§o à¯]×ñù¼xÜîâo½d³ÙĪ«ªpØíE]Ç¿–®›™§×ã™öLTU-Ö=Ó4‰ŒãóùŠAº³ç$¡**N§ƒñ‰ BÁ`nš÷•›Adb‡ÝŽÃéd|ŠŽ ãr9 ƒLF£Äb1‚Á ¯ÿæ­«ìB:.&ºóñ£#£EžË夬´tÚý™:›lÚ;89Aee%¡@hÖ©è÷3BÚÚÚf7ü]—»Èf²¸œ®YO„ésLEáý>FQ^xö™œ;F×ùÙ/Åò¥KX·z5F¾•Xƒ+*yËBä+àlóV ½öÙæA_% ¹9ú3Ï–~êœ~˜>õªó¸2=®ð»eYWæòÂUòÜ]×L<¯U¶ÙŽÍžÿ7ð”kÞè^Ì”yê}øàãߟo¡Å/ øìfæu­ç7UÓ´ЦyhÍ2œ3ÖT˜:mkê÷í;w²ïÀAþ·ÿüŸŠkHüã¿ü UQø£?øÉ¬²Ž)בu¶)L×|ŽSz¹Se¼–ìSç4Ï&ÃÌ|g“{ZÝ(LË_CQrÃ23ó¹^ž3e*ËÔrÍ|v3ïÅLf¾K3Ï›ùlnæÙÍö^]o îTYÂãQŽŸ=O…Ï1-ßÙêÕÌç­ºy½úSxÞ3åœY†ë鮯£ë®'ïležªf»/³éRE³nv4-Í,:qê5t]ç_®c®÷̯§K¦KÄ‚TUVÝpî~£`ø¯rõ[–E&“A7·àäȼ¹ÍˆüXn>#–çƒô²º~ýp, üu–%¾Ñ3óü¶Ky3ùÕkÎv„W?ß+'|mù³ºM8l³/Ö1[åoš3M›¾ØÌÊË‹± y çO-ÃÌwp¶wr6…{½|f“qæñk5*®õÛ®7ó¹Cמ{=[ž³Ép­r]KþëEM_KŽ™yÞ̳»Ö³š)Ûl¸aa…Ò­ç^XâüëHx3źQë«Ø…¯‰‚B*•úÖóý.QìñÐuŽÎÔ|pÇMg4[«ò&W~“Üý\K!Ò™ ªÝÉêåKozêÍÍxB$÷·úÙ™¦ÉñØÔé.jÉãVÛ…L6æÏ›§‹zWÒÖÖ†–Íf‰Æ¢Å‡ÉdH$Ø´ÜJkrˆDrK9Ã_ ]åæ»©ÓgI/çí޻ܪg§( ‹‰ñÈ”vÉw‘ d¶°/Ît¹Ÿ¸î>"7-\Äãóàv»‹¿UVVÊM$·õµµÒ`Kn…aªË=—¥Ñ¿O(ô¥2÷Ÿ»ß4MÆÇǯ9Ü”Éf„Ñ,Ë¢±¡‘²Ò²¯x ‰D"¹ûñz¼,^¸øN‹!‘Ür à³³3·å ‚h<ÊÈðH.¸ïn½V•D"¹7¸QžD"ùæ½2-¢ñcc4M¥¼¬¬¸Ñ\g[Þ» ©4$’{Ùx—Hn¹•OSt\ê$J§iž3§˜æžˆ|¸Û=‰äÆÈz,‘Ü2™,‰D¢ø}bb²¸píÝù&&ÆsË\* .——Ëuã«åI$âù]³|7}Îõ C"¹·‘=~‰äÎaL]fy¶DÉd’wß›t:¦j”””°éÑÍ”Þdà±ãLjÇc<±å©o¥²Ëe%’{›Â¦R‰äÎs1~ ]×Y»f=^¯—mÛ·Ò?ÐOiiñxŒ¡á!4U£ªª»ÝÎøx„Ñð(n—›ŠŠÊâ6¸Bb±ÃÃC¸Ýn*+«Èf3ô÷÷£:%%¥¸].FFF0ó»]UVTM›Z˜G"‘ÜËX²/‘Ü-\3¸Ï² íü9TU%›Íø¶[I§Sd³Yêjë˜;w{öîFUURÉ­‹[±¬ÜšÊÑh”í;·‘L$0 µk×SZZÆÉÓ'IÄã(Š`ñ¢VöØG0"ÒØ8‡GÞ4m•-éê—Hîm¤«_"¹{¸¦ášæ4QZZÆùóm´µ`rrœçŸ{‰‰ñq¶ïÜÆøÄ86›çžy3gOsæÜ*Ê+B¡¿¿¾¾^æRç%*Ê+(-)Á²LúúzÃf·óЃ088Àù m¤R)p:”KH&’ôöö02:‚ÏëEÓ4&&ÇI$âÅ=©››çÒÔØÄù ç¹pá<¡`›Í†a€UÜÛÞ2M,ëîßäB"‘Üÿ‘‘&&Çq9]TW×0$<:ЦiÔÔÔ•“i™¨ªÊ3O?‡Óáäø‰cìÙ·›ÒÒR</ƒƒ$SIÊJËñzsßMÓ$«ëø|>‰8ª¢R]]C4:Éèè(6»ªÊ*ªªj¥Ó$“IFF†±,+7Û¢²·ÛƒDòu°r–ÿª£º¡óðƒPW߀ì]]”””¢iƒýÔÖÔ!„˜V_l6Û´: ‰Çã”––bYccc>ÎääÍÍsèç\ÛYq9]œ>{š¡¡A!ðx¼¬Y½Ž‡ö‘J¥p:œÌŸ¿€œA¶Læ·, ±¡‘O>ûšªQZZŠÓåbçÎíÄqþ>¿ŸÒ’Òb9E! †Xïpðú›¿&‰pñb;çΟÃaw`Z&kV­eï¾Ýhšt&ž7þÑè$=ø©TŠK—:˜œœ`Μ&LÓ$™Lâv»ùô³ßQRRB4¥¡a>²Iîi.ùz\c´Î²,Nœ¯5«×Ò~ñ©t »ÍN*¢¼¬œÃG188X¬/‹.fûŽ­¤Ò)œN'5Õµ\h?σÂ0 öÜǼ¹-¤RI†G†ñùü¤Ò)ÚÚÎF ƒTUU“HÄ9×v–xFõ,ž‰ävsO,Ù;ªªbÙLvÚq›f#*Áår ç*¢¢äF„Qp;Z(B°bùJyèQbñmmg‰Çâ<ýô³¬ZµæjCgÇ㡲²Š6>ĺµëQT•ººzžyú9ÊÊÊéé¹ÌƒâÉ'žal,̡ÈF£<±å)^xþ%‚Áí8].lšÆ¥K1-‹€?@  ººMÓðùüøý~ª««‹½ý©4¹…–TÒ™4í/к¸•çŸ{àbG;Š¢°rå*Ö¬ZƒMÓxâñ'©®ª¡¯¯Ÿ×‡ßçGQUzz.“Íf‹:Z³ÙxèÁGX¹b##äR÷ß6—’o‡Ù¼vkˆ—–•QW[Geen‡µkÖ3:2Â¥ÎKl\ÿ©TšŽŽ‹SêK¹Æê[žâ…ç^bnó<°,„¢ ”œ‹¾©©™²² –-YÎC>L $àpØéè#‹QZRʳO?ÇÒ%Ëhk;K:¾2#©¿ŸÏG6›¥³ëÒô­N-òu³¦èÁË Iæ÷!7”‰DLLŒÓ××{§ƒDÜ#=þÙz 5Õ58NvìÜÆÂ…‹À§ÓÉðÈííç™;·…ᑜ0“M322ŒžÍ26Fp%nÀ"׈°å «ÃáÀ0 úûˆŒcΘa`Z&óš[X·výñ, ùå]EåÄÄAiic‘1úúz‰E£†Ýá@UeÕµø|>lšFCC##ÃC¿?Àãmáð‘Cì?°,X°ˆÊŠJ<Þn"‘1 ••$ úûû¨ªª¡¯¯‡ÃAI¨MÓC8Žœ§ ¢±± »ÝAÛù6bñX.h/_ß…„‚¡iûX–…×ëÍ)-Ë"²nízΜ9…a¬\±Šóàr¹r ")*Ë–-gõª5œk;Ëðð .— ]×é¾ÜE:f~ËÁ ÇŽ!‰ÐPß@mM]ñš6»¿ÏÏÉS'p8ÔÕÖ±|Ù üþëÖnàØÑÃ?yŒyóZX0!c‘1ö\ƒ&*AQ¼^n·!=½=Ø-;%¥¥ø}~ ÓÀf³Q*ESUœ×˜m!‘Ü,³õöE¡¤¤”ööóEÏÔ#=Ê¥ÎZ[—âv¹¹x±šêZV¯^;­¾4Ô7²|ÙÊ)ujE®×~þN‡“Ò’R'‹.æäÉã´?GEe%±XŒh4JiI)>¯·ËÍñÇpØlÜø©TŠ‘‘,,Z—,¥¿/7#©¢¢²hø¯è+±K6M£$T‚ÓédΜ&ÚÚÎR_ß@só\ÂáQlv;óæµÜéÇ ‘ ^óukóc›)/+/Ìd2œ8y¬¸»‚¥K— †®›™a\¸p×KC}éLš¶¶sÔÕÕO£žI&“æü…óTVTRQQ9í·h4ŠÛížu|Ù4ÍÜ´Àn·#„ “IcY¹Ca–Aaê›aÅ \.P!D1 g|bEä¦(Æb1ž}æ¹|ô.ùÙ bš,œ7U>]×±°°iW‚³Ùܰ„¦i¹­S)t=‹3?ÛÁ0ŒâÚ YMÓ,Ζ(`Y¹%• ÏFUÕi½‘Ây…ëf\î—ªªE·¥‚t:…ªjÅû¯_¸…óä"J’¯C"‘@ÕTö+³h,,ô¬ÎW€(ÖUSQ„B6›)¾›SëK!ضP§TME Šy«g–• U!N£UUBÉ{²˜6#É0t„¢ …d*‰ešÅ:Z`¦ÈgÓ躞ÿl‘L¦ŠÀépÞö©¿’û ]×éêê"ãôÙ³ÅN³ÝngŲ¥d².v\œ½ÇŸÉf8|äP1¨L 0ò†æz˜¦™kYWT &áÔ©¸Ýîëþt&Ãé3§B\eø¯5>¹ ëtNŸ%à¸jÖÀôôS)(Âçx<Æþý{‰ÆrîÃÕ+×þÌôfkÌ–nælˆœÜÎkžSh¸ÌäF³.fž75ßBù§þ~­5 ç]k¶…Dr³Ì +˜ý=žú®MÓ?³¾ä~·]÷»bZãÛ圹˨zUzmJz÷ êÆôó®›*ÇÔUH%’»Ù§ó‘3 ‹µRW[‡ªåVí;xè±X”T*EEyK—-çôéS àõxX¼¨5íÚÑÎÄÄ8uuõÔ×Õç{’¹ÖóñãÇÐÜ4—––ùLLŒsâÔ &&Æ™œœD³L糬۶QËåæá‡).ümm-,‘ÜÏÈ z$’»‡ëlÒc±{Ï—ØlÁ@Ç7?A/¦iQ]U͉S'¨¨¬Âåtáq{èè¸H6“ÁÂÂçóQ^^Á±ãGó«Ü)X¦ÉÉ“'¸pá<•••ìÚýn·›3gO“J§¨­©%U=ÜÎ¥>EÉGÿÞ‰Ç!‘|w‘Æ_"¹;¸Î&=‚GÙD}]ªª`·;BPS[ÃÒÖet_îbtt„±±0ñxUÓˆÆbEPS]˪•«éé¹Ìèè……:FF†ÉêYt]ÇïóE‰ŒGXºds›çq©óR>š\"‘|—¸^;‰Dr}f5ü`&'OçRgBÖ®^‡e‘Ÿî• ˆ‰Å¢ôõõRZZ–Û`Ç2±Œ+®þD2Á’%K9ztœóçÛðûýØl6ìv;n·›ÊŠJjªk8}úCCƒD£ÑY…”›{H$÷8² K$w ³~‡ÝΆuH$“@®÷ïtºh]¼·ÇÝî`ù²”•—SUUÍèèÕÕ5Å-¢±(–e±¤u)ÕÕ58ìÆ"c444Ó{<^Üë×mäÒ¥R©$¥«Ë¨¬¬¼Jiø%’{ ¹;ŸDr·0«á·Ùì¬\¹úªã%%%ÅÏ‹·PQ^Áü–×½HcãçÌÙ_ÈëzÈñA‰äFV_‰ä®áž˜£%Ç%’{›ëMÉ•H$·—{ÇðK$’{Ùx—HîÈí[s7#°Pîr%ɵÉí%-¿Dr+¹Y[®YœîÂ1˜Ä"WA ÿ3åóÍüv«Ò§3il¶8ŠPî ydz™^¦ÿjéõl‘_÷nG¦—é¿‹éaáSŒ+®fZ¿8œÆtèTø4ú"Jí OfqÚœ6…áÉ, ¥.‡ÓTøm¤²&©¬I…߯åðíHï̧·îydz™^¦ÿjéN8mÖ]"L/Ó—ÒëL¦ ܚɿ]kÝÈî#~ñë_[»¢ ˆ‹ ‹hÊÀmWHéªU¤²&‡BL j6~¸¾”G›µZÜÙŠiÝà;ä*¥S„<êÍd9­\³Ÿ;µÜ·øh©tb^çF%›*îzE&‘ÜjL êKì<¶Ð_Zœ­®Ü*n›2½10#/‹\ýzb±Ÿ¥µ®ká›ÕUÖM+ðUu‹Dr+&’ƒ“Ù›ê¬çñ À0-ºÂi™ï£¥ÂÁ–ÅÒY“‰„ŽÇ¡PêÑŠÆKp©\*êmždoN›B¹WÃmϵpš Ô£á°å¦üÙUÛ®às*,¯wóÚš‚n‡&pÚrçhʔϪÀ¡åþʼA—Š"`iÝ•s‘»W§Z¼­5.Z*Ôm¸ìʬ²]?ÞPÆ‚*'võ»àC‘H¾>–eQîÕXÝè¦&h£Ä«!€eSêšË¦ðòŠæzqÚª"pÙüN‡¦±Ç®P°± ÊI©W›ÕH+Bn•€37•Цæê½5å3\­CfÓ3ÓÊ1CæÛ­%’¦•~sË×í„Ð,ÀeS0ì*ÃQÁùÇ{üù£\ËðîÑÕA;Ï- `ÓãY~wz‚õÍ^–Õ¹ˆ¥L¶·Mri$}[Ù±,¨ Úx~y§Mp¦?É‰Ë ž]ÀïT‰¥MÞ;a]³‡õ“RJ]ÈŽeÁ‰ÞËêÜür˜æyY^çæ¯·±y‘Ÿ¬a‘Êš¬žãÁ¡ w%XV碵ƅÞ>aA¥“µM^’Y“ÏÏL (ðÀ< ª\ÄÒ¿Ø&‘1¯Ìµ´`i‹U nJ<*¿=5Á‘®ø|E$’;iAS™ƒ—W†ðØ>93Á†¹Þb¯ýl’µMոМÔy²ÕO*kbZðþ±B^ZD‚–J'{“W]GóÊ-­scañå…±”ÁÓKüîTîš½‘ '{¼¸"„ß©uˆË®ðB^ÏœíO²ó|#¯U zóyÞiúa4vãñU‰äÛF08‘%Ͳ¥áæÒ3žÔœÈ"D®Bî¹ô,öwĈ¦ ïÃïR¹ΰa®—ú¹åtÃâPWŒpL¿éƒ¾qxd¾‘h–Ü=ÊÞ‹1–Ö¹h©tÒ1’fA•“Å5.Š'ßã~ëp„áÉ,[Ø´ÀÇÀD–Ú3ÂÙþÔU:Ȳ Ô«±y‘Ÿ¡É,¦ ›ù¹ÉÐ3–áßnª àR9ÚgEƒ›–JGQ‡,­uñм+zf_G¬hô!W¯““ÃÝ Î¥yóp„ñ„!¾äŽ`ZPâÕ¨Ïwpo„b¥ú’ü 2Y“±¸Ád*7îïu*ˆ|­ÚÓ#×ùàx„®Ñ /.±¨ÚyÛû!ð»TÆ“IDÆÄãPBàÐuÅéÏ €HÜ`$ªM™è†EVÔ»Q„@ÖMtÓ"š6qhMŒÆt&S:Yò –2‰¦LRY ›""×¢*ü¥õÜõ“´.Gù%€dÖ$–6˜L™©¬‰n˜ÄÓ¹J2z®¾$3&K› NdédŠÃŒã ƒx:W¿ g õNˆœ«Þ¡ ìš <Ë‘î8Y=W×K¼ ƒxÆÄ;C‡ Nf ¸¯è™xƦ×k He 2ÓÉíD«?Ñ”ySé5Da={¥ÅTEMÅñ8»–3r.»rÛfè†Å‰ž›ù)ñ¨tަiL²°Ú‰]ÄÒ‰|%TÂ1¿K奕!>9=ÁÙþ$Ï- ðщ Ú“<¾ÈÏûÇ"$³&•~º™ÛḬ`4¦ãsª¼²*ÄζI'²üp])Ýá4G»ã¹y’âÊÔ M<½$@…ßÀdÒ`w{”јÎÓKœL݆;%‘ÜÝLU7‚\]ó;sõô³3ôgÙÐì)Ꜧ2/,2·ÂÁ¾Ž¦[ù)õjÌ)sÐ>œây^Z*dt‹—bœéOá¶+L& &UµxyóP˜õV6¸9ÛŸdÑ2‘48Ñ“`Ëâ+zf$ª³i¡?çú“WÉ<‘”½~É@älcÆ0oêýS_yõÕ¿ ‹ ÍUŒì7-è‹dœÌ¢04©34™#Ñ,#QÓ²PÁÉÞ'{“·­µ+Dn¼op" Àð¤Nw8Íåp!`,n08‘e8ªÓ3–!‘Éõò{Æ2Œ' F¢Y&“mƒ)Î $‹éœHqv E"mÒ3–Á²,ºF3íŽsy,C÷X†‰„ÁÀD– CiRºI2“ë}\ËÐ7ž%ž6é‹dšÌb!˜LŒFuFbY't.ޤ‰$ †&³Å†‰Dr?"„ ‘6égOèŒ%rõsp"KO$WO‡£YzÆ2ŒÄ †'s ÷¦Òœ+þØå§ûS Nds:ÊÌuÚ‡Ód ‹DÚd4ª3ÍÒ7žå\ªè=èÏÌšôD2íNÐÎ鈞± —Ç®è¡ÉÜõ'u §£)3ßê E³ôFr:  [ Yµ%wË‚rŸš Fs ‹b¦)þ®ª*U••¦ÁXd,·rß±Ìb& Ð;v%@Ï´®Dû¾VR Sp¦|¿Ý­Ü‚B0MkÚ KJÞ/hZW®#‘ÜϦðêS>ëùºdÁC->V6ºù»Ãd+õxZ½Ï×Çbý̓éuZpýkÃ6UÏÀ˜2€ªÌ¢$’;…ªBNø‹u"}+÷¥²&Qݘ¶ àÔ¨t(Œi]1ŽyƒV8¯X£¸²šÐÔ% ¿}ƒô7’§pþLù eRò…´,¦Í%Î¥ÓäÈö+sð é0u§Ñ‚ËR™ºÌ’uEìBથoÁý‘éeú»=}ñs>y!‰2¥~)B`b1Ëæ†ÈòÇŠõoFza:¥þþ/Ô÷‚bšá·,‹Ï·mçÈÑcŒñÎûï3‰Üi9¯KÇ¥KìÜõ%¦ysËfe2t]ÿÚ×Ëf³d2™;]l‰äže``}bFñ˜a¤Óéâ÷›­§–e±k÷ÚÎ_¸íå˜)³Dr/0Íð !p8ì¼þ›ßÐ?0ÀÇŸ|Boon—Ó4¯2vºn|#úM°,‹t:iš\îéáà¡C˜¦‰5ecêçl6‹iš˜¦É[ï¾ÇÁÃGŠ ˲Èd2Åô–eaY†aLË£ðÛŽ/vññ'ŸNSZ‰äæé¾|™Ï>ßÊÄädÑpž>{–_¾þ™LÃ0f­§3ëœišD£Qö8À¥ÎÎk^/›ÍuU¡~OÍ£p|ª(K§Ó׬ëSe¶d°”äA›y`ãúõœ=ׯÿþ_þOüè·<|˜Éh”K—òÁGáõz 2·©‰Ï¶nÃ0 ü~?ßåå\#þw s®­åË–]u 8tè0;w}‰¦©<ÿì3€`ûμòÒ‹|¹g/¡@€ ÖóÁ‡åô@]¯¼üéTšwÞŸÁ¡!V._ÎSO>¦^Y-‘HòþqøèQÆÇÇùƒÿ˜òò²;}g%’rÕ¿ÍfãÅçŸchx˜G~ˆªª*~÷ɧôö÷±hÁ>üíoé¸ÔÉö;1-‹‡|@ pÛ¶,‹O?ûœt:ÍüèG¬^¹5_u]§íüy‰ñxŒó.ÐÓÛÇö;Y´hK—,¡iÎæ·´ðÐðà† >z”ý±lÙRö8ÈÑcÇé Éðô“O §]¿$bIëbV,[ÆSOlÁn—Ó %’¯ŒeQ]UÉO~ü#œ.''OŸbÅòå´Ì›Ç‹Ï=ËÒ%­´Ì›ÇC<Àë×3<2Jo?O=ñ‰D‚>ú˜ß}ò)¦iñ§üG,Z¸˺z¨/‰ðÆ[oSS]…¼õî{ÔÕÕbš&ÿÏÿÏÿ—Ó§O³dI+‡¹¢äÈÑ£|¾m[QϬY½ U™®.N+–/£eÞ<^záÿ¾«ÉM1kpŸß磮¶–êªj,Ë¢`€‰‰I.÷ô0·©ŸÏËk¯~¯×Ë;ï¿OOOïmØ0 zûúX¸`> ”——_)ŒˆüŸ¢(!hl¨ç‡¯½Æ©S§ùô󭨊BÀ狀ªŠ²²2‡ˆF£t\꤮¶ŸÏ‹" ,˜ß‚Ëåšv}»ÝN(¢¤$DmMM±Ñ!‘Hn CÔ×ÕR]U‰®””„ðû}4Í™CII þ)õTAEy9K—´²võj:»ºè¾ÜC˼yÔÖÔà÷ùf½ÎÄÄ$áp˜Þþ~,Ó¤¡®·Ëź5k8sî,s©¬¨````šp¹\ôLÑ3•!¦å­( ¥¥%øý>š›æ`·Ûïôm•Hn m¶ƒ–¦abZ&B–´¶’J§Y¸`>.— §ÓIgW7s›šho¿È¥ÎNV,_öU¯ýµPU•Å‹±}ç†I}]-N‡“Kœm;M³±ã‹]ñx‚ð؆aÐÔ4‡]_î&SZbïþýTT”3¿e'O¢yÎ<µ5µ;q’Bo¿ØÁ‰“'s!X¹|e¥¥>r”»vñÀ†²×/‘|E,ËÂÌÇÐbo‚áðþö·lzäJKJØ»?•åX–Eoo»vïaï¾ý¬]½EQØõånLÓ ³«‹ó[8zì8(B`³Ùh]¼˜ó[(+-¥iΪ*+ óÙÖ­¼ü œ9wŽÓgβpÁNõ€›¦ÆF†‡GŠz¦®¶†’Pˆ½bY&–-sçâ÷ù‹2?öÈ#ø®Ñ‘Hî&ÔW_{õ¯šššð¸=ŃB¼^Ísæàv»i¨¯GUUúúp»\Ô×Õ14B~‰D"‘Hî#¤á—H$‰ä>B~‰D"‘Hî#¦~˲8zì8]Ý$ ö8@4½Ór~e:»º¸ÐÞ>íØé3gèëï/~Ïd³=vœh,vÓùf³YŽ?Áøøø¬¿Ë­9%’çÂÅ‹Å-q |úcYgÏ›V·o'²ÎKî5®êñ÷ ðÿò/LLL°uÇŽüº÷÷Þ²ûödÇ»¦)–~÷ 'Nž*VÔd2ÉoÞy‡‘‘Ñ›Î7žHðÖ»ïÒÛ×wÕoétš·ß}ÁÁ;]|‰ä®¦½ý"o¿ûéô•}ì;.]âƒ>.¦ùä³Ï9}æì óÒuO>ßÊÉS§n{9fÊ,‘Ü L›Ç/„àñÇ6qöÜ9þûßÿ“““üÉý!BÞyï}‡Xµjk׬¡££ƒ/÷ìEQžx|3uµµ·MèD"ÉÖíÛéêîfé’%<¸qGçÌÙs”––ðø¦ÇPÁþI$´Ì›Ç–Í›1 ƒß}öí/²fÕ*/ZTÜÅ/óéç[‹e\³jÛvìdxd§ÃÁêU«ørÏéééu^ñƒ‡øåëopòôi^záyV¯\y§Ÿ¯DrWbš¹^úßüÝßáõzyê‰-¼ûþ8xˆðØ‹.äWo¼I(à…瞣¹©‰‡‘H$(/+cËæÍ˜–É'Ÿ}Nww7'OŸ¦uÑÂY¯Õ~±ƒ_|Ýnç©'¶L¦8~òOnÙÂÑ£ÇÐ4µkVóÅ—»i;ž–ysÙ¼iY]gë¶‚ži呇š¶€P2•âí÷ÞçСÌŒŽòÊK/RZRr§o­DrC®²^.—‹W^~‰ÃG±fõjæ67óéÖmœ<}šÊªJÞøÍÛtuuñÖ»ï1Ó2wîm]M˲,¶íØÁ¹¶ó¬_·–úºZNž:Í~ÌœÆFº»/óÎ{ï¡ë <òÐC:|„} **­‹±fõj>üíoi¿x1·/ðù¶íSÊø=½}8tˆááaêëêxïƒÈd2lzäaüÿ¬î½ŠŠrJKJX¸`>U••wôÁJ$w7n·›x€Á¡!>B]m-ååe´.^DUU%åee4Í™CÓœFº/_fï¾}4Ö×süäI>ùì3>ߺ‹lÞô(ÕUUÌæqÆbüâ׿Æáp066Æ[ï¼K(äü…vþú¿ÿŸmÝFEE9ÇOžäÓÏ?§¡¡žO?߯‰“§Ø±ó‹¢ž©«­½ª±oÓ4j«k(//cÉâÅ·m£2‰ä›2kp_ue%ÍMs˜ßÒÀù æB{;Š’sûoÙü†n°ÿÐ!’ÉämØ0 εµ±vÍjÖ¯]˼¹s¹p±9syü±M<öè#\h¿H2•¤®®–Õ«V²hÑBεµ¡(‚æ¦&ܸ’’Ú;:BÕuη·O)£J6›Åa·³vÍjZ[34<£?”ÛÍ/œUÉת•+©­©¹ýOS"¹G°€êª*V¯ZÉÜæfR© TUU³~íZæ46R]UÅâE‹˜ÛÜŒ‚ÚÚZ¶<¾™Í›6qüäINŸ9ËšU«X¹bÕUUù\§3:¦³«‹®®.ÆÆ"†I(äÉÇgûŽ´´ÌcÞܹ´_ì`hh˜smçˆÇã´?_Ô3-óæ]5ä©isæ4RUUņõëp»Ýwú¶J$7ŬKöæöȶ0-!s0M“-=†Í¦QZRB*•æñÍ›øõ¿áÐá#475ÝUU¥¾®ŽýRQ^F(bnS3ïô»÷îãä©SÌÛŒ¦ªttvqìÄ NŸ9ÃC<ÀÑcǹÔÙɾâáäø‰“œ¿pÊòr ]gËc¡Ù4ªª*Éê:†aàt8(//cç®/Y±|ccc†Áé³g™œŒ"ÈyJêëëÐ4C‡à÷ù¨©®¾ÓÏW"¹+±L Ã0°LË21M—ËÅØX˜ý²lÉ\.'§ÎœaÞÜf,Ë"‰Ð~ñ"ÇOœ`~K ª¢pððaÊËJé eÞ<.uv284Œ ©åeeÔ×Õ±hÑBæ67ðû‰ÆbìÞ»— ë×qöÜ9º/÷ÐP_Guum܈Ó天qƒƒE= ñx<œ¿p!×è·,ª««p:sž„‚ÌÒøKîÔW_{õ¯šššð¸=Ń–e‘H$˜ß2¿ÏG}]-#££œ>s]×ihhàä©Ó>z”ºÚ¶l~ ¿ß[BP_WËàÐ0'NžÄn·³nÍjgΞ¥¼¼œž{!ÆÆÂtt\bAK [ßL*•"ÓÙÝÍÃ<ÀÆ ëI¥Rôööòä–ljÆbù2f™ÛÜœ/k=•Ô×Õq¡½®îËÔÔT³tI+Gã̹sôöö219ÁÂù󩨨àâ¥*ËË©¬¨¸ÓÏW"¹+Éd³hšÆ‚ù-¤SiB¡ K[[‰' 1~ ÕÕÕtuuár¹‹_|ÁX$ByY/<û,ó[æ184Ä™³ç†B¬X¶ŒîË=>r„¾¾~††‡YÐÒ‚ùó9uæ ÝÝ—)-)AQ&£Q~òÃ"„ “I³võj²Yã§N199IsS‹.`phˆ'Oâp8q8ìlÛ±“žžzz{q:,[º„T2ÅÐÐ--ópJw¿äbš&ããã$“I†GFŠÇUU¥ª²Ã4‹Œ!^óukóc›)/+¿©L§Žs麎v÷Æž)Ϭi, e†‹Î²¬in»©ßo”çÌs%É­gç®]ìÝ€ÿåßýåU½ê›­“7“n¶47£g$’»]×éêê"ãôÙ³ÅX4»ÝΊeKÉd3\ì¸øÕð™ùòßI£?›<³¦™¥¢Ï¬ØS¿ß(Oiô%’ÛÝnÇëõb·Û¯úífëäͤ›-4ú’ïr[^‰Dr׳zåJ–´¶ÞÖDÉwiø%É]ÃáÀápÜi1$’ïÒ‡%‘H$É}„4ü‰D"‘ÜGHÃ/‘H$É}„4ü‰D"‘ÜGHÃ/‘H$É}Ä4ÃoYÝÝ—r{Ïw\ê$™JÝi9¿U ÃàrO‰DâN‹rWÊ#‘Üj‰ÜÊb߯^ö–e100Èøøø.–DrOpUßÁƒüÃ?ý3©TŠ}ðó_ýŠÔwÌð§R)þñ_~FgW×7ÎK×u¾Øõ%‘›P:±XŒí;¿ ›ÍÞ´<_%‰ä^áÜùóüòõ70 £x¬`€={÷¿<|˜®îî›Êï­wßåÀ¡Ã·½3e–Hî¦ÍãBðÔ–-üÿõ¿òæ[oÓÞÑÁË/<×ãaïþý ±léæÍËÐð0GDz,Ö­]CYiémZ×uŽ?AWW-óæ²léRºº»¹ÐÞNII +—/§»§‡®®n"‘55Õ¬_·Žt*ÅÞýèéí¥¯¯!&&'9vü8™L–Ë–ár»8vì8ÉTІúz-\0íÚétšc'NÐß?À‚óI¥Rüý?ý3Ö­å©'¶àõxÙð ¦i²fõ*mmçI¦’ óù¶íô ðøc›ðù|ìÝ·¿(³¬vòÔébþO<þ8 æ·Ü™7E"ùÉf2œ;ׯ¯Þx“P0ÈÆõëøè·¿cߌOL0§±‘ùù/©¨(ç¹§Ÿ¦¾>·WF4£¼¬Œ•+–cYæRg'çÚÚ˜ß2oÖk Œpàà!ìv;7¬'‹qùrkV¯¢ýâE Ãdñ¢…œ>s–ö‹innbùÒ¥˜¦YÔ3óæÍeŲeÓVñK§3|øñoÙð c‘Èÿ¿½ÿŽŽãÊ|ÏoDzƒDfÂ{o ‚žI‰II”÷¦TFå«»Ú̼7ýÞΞ³ûGïÙ³3ïuëiSÝS¾ä(ÊP"e(QôÞ Â{o3‘Ò›ˆý#A@Uª’RäýœC ™ˆ¸È{7nÜwßu6[Ò>´‚ð-šÀÇá°óäóÿýOÿ™'}”5«Wsøè1Nž:Mqq¿yéeþìG?â·Þ"²²f^¯wYÿÉÓg8vüµµ5(ŠB{G¯¼ö:ÕU•Ô7\bxx„)‡æ–6mØÀk¯¿Óá¤áÒ¥D/$‰`(ÈK¯¼Š¢¨˜ÍF.Ö×sßÎüú¥—ؼi™™‹æî®«oàÕ×_gÛ]w1==N«CQ”Ä•‹×ç#‰02:JSK kW¯æýû¹gÛ6‚¡±¹e•˜ÂÞw÷1::š(ÏRE¹fý_¼[Tn ’D(–”ÄÉ3gˆ)ñú£Äæê‡¢Sb(±HÐÚÚÆî7Þdë–;8qê4333 I?y’ë×#k4K¦Êƒüî•W±Z,LÏÌ06>Î};wðþ´wtÐÑÙÅ“?Fk[»÷¼AÍŠjö¼ù½I—‹#GQ[[³ gâš]ˆ×ÏX¼¬ª¨ŸÂ×Ä’ƒûÊJJ(.*fíšÕH’D]}cã 32:Š×祪²’P(„Çã™Ëžµ<¢Ñ(ëêØºe3O>öëÖ®åÒ•Frr²ùæ7žç¡àB]Á`Uµµ<ùøc¤§§ÑÛ×Gsk>ü»î¿¬ÌL†††éä›Ï?Ë÷¾ó|>]dffòÌSO²jåÊEswgff‘‘Áàà ½ŠŠr òóÙuß}”•–b±˜‰D"ø|>‡†ðú¼”–”ðÂóÏñÀý÷‘—›Ë=ŠÍ–DSsK¢<™¨Êâ†#¾þýÇOœâ•Ý»ùþŸÿ ÒÝÓCFF:|x€™ÙYÖ®YÃÐð0Š¢Ä0©*†P(ïN,,Äb6'ÊãõzQ…‘‘ÑÄ`J½^‡Åbº{zÈÌÌÀžœ|£¿3‚ð…©ªŠ‹÷fÅ_+huZ¦g¦éêî&/7VCÿÀ““¨ªJ0Â3åa``€Œôt4²†ŽÎNjª«™òxPT•I—‹™™Y$éÓä:©))Ô®¬¡° «ÕB(¢¥µÂÂúúûq¹Ý8232Ùv×Ü»cyy¹ &ڣрN¯gllPQU°'ÛÐj5‰2ççå-™DHn6šgž}æo‹ŠŠ°˜-‰7çG™WVVâpØÉÌÈ £³“¦æfùœ8yгçÏ“”deûÝÛHMM]–K’DFF—ïŒ-eIDAT®4ræÜ9EáŽM›˜ž™áÌÙ³<õÄã„B!,V %EEô P^VFUe%ÇOŠ[­–{¶ÝEQA!gΞ¥³»›Û怜´”ñ‰ Ö¬^E0àåW_ãüÅ‹\º|ÇC,ãÀÁƒx<6lX?w/0~¯1-5•Ô”šš[pM¹IOK£¨°­VCÍŠ˜L&<Ó.]¾ByY)¥%%œ˜/NÇšÕ«8tä(ÇNœàò•Fú¨ª¬Äh4rþâERSRÈÎʺÑßAøÂ¦gfðù|¬ª­ebr³ÉÌêÚZzûúèì¢’d›ó/¢ÓiÑj5|øÑÇôõSb<ýÄT”—Ópå ëêˆDâctZ[ÛøàÀG\i¼Jk[•åäæäpþâEzzz'έmmüèûßÃåv Ù´qããã4\¾ŒË墬¤„ò²R®\á̹s€ŠF–yõõ×¹tù —._ ¶fýtvwSY^±¬½Ÿ‚p=EQðx<ñ§fæi4232ˆ)1ÜSn¤Ý{v«;¶ï -5mÑ $IJtuÇb1‚Á :½VK4%`01–ÿ,7‹ 1 èæÒG"4 ²,'®$æžß—p8L4à×#Ë2’$FOÓ ÏçßVU•H4ÊüÍCY–‘e™@ €ª‚ÅbNŸk·íóùey.©ˆ¨‰«UU‰F£hµÚ%ËF8I’”XîÚõ Âתª¨ªºd]Åb‰ï}4E’$Nœ:͉S§øóý»ÝŽN§â½ráp½^F£IŒ˜§Õé%‰P(D,Ã`0$êì|WFƒªª4 z½>¾ý¹vÆh4$êçà_¿¼$Iè—ØÇkÃRÛ^üù§$I –½¾<ŸuLo䱄/Ûµ××Õk_Ï×MI’ÐëõØvtZ݂ϯ­¿××åyŸ•ÙO’¤Dª_I’0›Í >¿¾Yª+ÿú2 ÂÍN¤åᦷºv%ÅE…h5¢É„/JÔ"AnzÉÉÉ$‹­‚ð¥ýS‚ ‚p_An#"ð ‚ ÂmD~AA¸ˆÀ/‚ ·‘Eß3=HÃ;? е“VÜjTUeff–HäÖÝGA¸ÙD£Qüþ@b‚‘/Êëõ …nôn ÂׂÀ¯ª*ï}ð!/½ú±XŒÆ¦&þégÿŠgzúF—ó+ ù·_ü‚îžîEŸÅ…¦æ|>ß.¦ ÜRZZÛxõõ×̲75塵­=ñº³«‹‰‰Éϵ¾Ýo¼‘˜²{9]_fAø:X0W¿$I¤¤8ùàÀG€Ê‘cǸcÓFª*+éîé¡£³ ƒÞ€ÅbÆëõÒÜÚÊÈè(IVë²&§PU•¾¾~š[ZçÒaBÿCÃÃôzü~?]’m6&&&èíï§£³“P(„Ãn'‰ÐÜÒÊåÆF.ÖÕ±nÍÒÓN[ÜÕÕÅ?þË¿Fq8$Y­7úï%·„îž^9‚^oÀ=5…Ífãミ°wß>ÒÓÒˆÆbüüW¿fpxˆ§FKÿÀƒƒCƒ!’“m¨ªJgW7—/_áìùóäçåQZR²h[^ŸÆ¦&&']ØíÉÌz½ŒŒŒ`·ÛÇã™Æf³184DsK+Šªœœ¼ ‰Æb$Ûl ¦äF£|pà{÷í#-5Ç5S Âðyçê_4ONv6?øÿóŸÿ…í÷ÜÍÝwÝE}Ã%Þ?p§ÓÉÑãÇùÁw_äýï184DA~>V‹•²Òå Š —/óλûÉÊÌ ðÊk¯±²¦†êª*Î_¸€ÕjÅ=5Åö»·Ñ?0ÈźzÊËJiïèàÿ뿦©¥… uudfd03;»äÛÃ## Œp¹±‘¢¢B²23oÄßRn9’$16>AgWmííìºï>ú¢áò%ª+«Ä륢¬”¡áa^{}åeeŒŒŽñìSO°wß> p¹ÜKÖáH$Âî=oÄÃ`U+WR»²†Ÿÿê×l¿ûnοÀÝwÝI4ã·/½Ljj >>È÷^ü‡·ßy—¬Ì Áùy¹ ÖFééíehpˆúK ˆ$=Â×Â’3÷­YµŠÜœ\îܼ­VËñS§pOMát:hljfl|£Ñˆªªdee’–¶<™ù ž,èÄÉSlÚ¸‡ØÀ±')(Èç'?üï}ð!Ö¤$þòÏ~Âù‹ùð£ÉÎÊbÍêU¼ðܳü§¿û{Ú;;9ñ"O?ñ¥¥%sésßk\³jee|ãÙgXQ]}ƒþD‚pëQU•²ÒR¾ÿâwxõõ=LLLpÇÆx}>¾ûíoÇóœ>ÍÊ+ع};GŸ ;+‹?ÿÉ9|ä(:„V«eó¦M<òЃx½Þ%Ç ŒŽsúÌYªª*ñûýœ»pG~ˆûwîäüÓ?óÀý÷±uËfÞÙ·ŸÞ¾>ÒÒÓèíµ…®îžD;£òiªòyF£‘ÍwÜA äû/¾ø™yáf³ä7U’eLF#Ú¹n+½NGFZkW­fýšµäææž–FqQ{Þ|‹p(Ìã>²l…Öh4Ly<ƒÁ¹*Z­½^ÅbÆï÷3=3ƒÇ3ÉhB–e´Z N—ÈÕížrãóe‡QU•Y¯71Q#kPðxâFãþ{ ­AU‘e)‘+¦Ä³Ûƒ!<Év;YfffŸß¨ IHįâ sÙø¦<¼^/ÁPU @(B"Þ« (1Ìf…ùùlÞ´‰d› EQ˜žÁb13;;K(F§Óáp8¨®¬¤¶fÅEEt÷ô&ÚY£A–ä¹ñ>**`4Ðj4ƒA<‡#‘ðGnf îñÏ‹F"\¾ÒHMu©©©Ø““iljfhx˜p$BA^‡åJc#1%ÆÆõëÉÉÉ^–˲Lr²#ÇŽq¡®žH$ŒÁ`Äãñ°~ÝZÒÓÓiïìäÄ©SŒOLðäcâõùÑëuT”—s¥ñ*•åæçóáGÓÔÜÂôô4ë×­åÃ>æÃ>æìÙó´wtPY^N àø©S¤8SÈÉ^ž}„[ÝøÄ$£££lܸÞÞ>4-«jWRéíTUT ËGŽŸ;i×òÁèë`hd˜§œò²2Ž;F}C££cÔ®¬¡¹¥…7ÞÞËÙóh¸t‰ò²2’’¬\nldbr§ÝŽ¢*=~‚|÷»tvwFX·v-]ÝÝôöö2;를¬”ü¼\·3ñ‹…_üú7œ>{ŽÓgÎF©¨(çÒ•+´wvRQVŽÙ,ºú…çóÞã—vïÙ­îØ¾ƒ´ÔO¶©ªŠ×ëÃd2&º¯fff˜žŽŸ%Û’“ñÎÎâžòdµ’’â\ö´”ÓÓÓLOÏ`·'c0‰F"˜Íf¤¹ÜÛ³³^ŒFV«•@ Ä»æ|>?ƒ­V‹Ëí& a6›±Z,Ìz½D‘øÒjpØíÄb1ffg±˜-˜LâŠ_¾ ‘H„P(„Åb‰?†§ª˜L¦¹:N$äñLOcÐë¹XßÀ'‡óí¾AFz:‡ˆ·³^/&“ «ÅJ(Œ×÷¹´¿öäd4 .—‹p$‚Ãá@«Ñ‡IJJÂï÷£( V«¿ß{j ½NÃé@§Õ.lg †OŸpRÁl6aµZñú|‰2‹+~áFŠF£ôööâr¹¹ÚÜœ¸ý¥×ëY]»’p$LgWçgtõKII ëÙl6l6[âµÝnÇn·ß°¼>[—áš§ ÂüÛ׸¹6·vjJÊ‚u:ç“ki4šEË ‚ðÅètºÄxÓ5·Ð®r&Åéâ#f³™Ò’’÷Òµý‚vj^zzú‚×óíƒÙlN¼g6›¼^jý×­g©2 ÂÍNŒFá¦WYQŽÓáXöžEA¸‰À/ÂM/+3Swã3>>Áìììr2A¸)ttvñö;ï‹Åïùü~FFG¯?oQU•7ß~›ó..û~\_fAø:Xð¿,K¬YUË¿ýü—äçqôø rssp:¸Ýnf½^ÒÒÒ0›LD"&']¨ªJjj úkfÎ[.·›ññqš[Z±Z¬s³k©LyåeelÛv'ÿõþ'µ55<üÀtvuóÖÞ½H’„Ãáà›Ï?ÇLJq¥ñ*)N'ò²²e+t[{;¯íy£Á@Gg›6¬§ñêU?GŸ@£ÑPR\œ˜g;--•Ç}„Ý{Þ`bb’d{2³³³üàÅÑh5¼º{›ïØÈ™³ç˜õRVZÂý÷ÞË˯½†¢(tõô°qýzÞûðCΞ»@r²©©)rsrã¹§žB’%¯6Ñ×ßO]}N‡¯ÏÇ¿ûË¿ ;+kAù{z{¹XWOk{;:­–G~HÌñ-ÜV$Y¦»§‡}ûßgÒ5É=ƹó¨«oÀ–”ÄêÚZêêëimoàדžžÎo½…Óá Žðío¾€ªª¼úúësí@'[îØ´h;Š¢°ÿý÷innEQbl¿çn2Ò3xe÷nžzüqŽ;FuU«WÕòÒ+¯‰DÐh´|÷;ßÂëõòêî=H²Äª•5<¸kׂz …8}ö,uõ X,^üÖ7IOKûcƒ Ü‹²óI’Dzz:'OŸæÉÇ£¨°Ý{Þ`l|œ’âbŽŸz”´´T¶ÜqÙY™?uŠ5kVñÜSOÓ?0ÀØøøÜm •í÷ÜÕb!r±¾ŸßO,ã¯ÿâ§„Ãa‘Š¢’âtòÜÓOqìÄI~ðÝ ‡# ãp8èìêB§Õát:øÁw_äÔ™³def’›“³`;Ý=½Ü¹e =°K\%·Á!&']üÍ¿ÿwŒŒá÷ûYY³ À_ÿåO),( §·;·láÁ]÷ÓÓÛËÐð0õÓ?gfv–ú†º{z(,(˜kIOK£´¤dÁvFÇÆøÕo~Gqq>¿ŸöŽžzâqfffù_¿ü%™™<óäœ8uŠ3gϳª¶– uIq:¹tù 9ÙY|ï;ߦ¤¤ýuõT§Ó¡* `€ÿ—=9YôÜ 7ÔçÍηä¨~½N‡#ÙŽÕbEUUB¡ƒädO?ùY™Y<÷ÌÓ¬]½š×ßx‹sËxoMUU‚¡ }<Þ$Ç+Ú|…Óé´8vÒÓÒøñ¾Óéä—¿ù-]ÝÝhµZv;6[wnÙÌ¥+W8uú ›6¬çÌÙs;y>^¹}>?Zm<‘ȧۈ'ü±X,X­ŒF#V‹UU‘$æþIX-, f³™X,F,#2w‹!‰ Ë2:I’ÄÜãÂmË`Ðc4±Z̨ªŠÁ G´Í\mâÄë^ŠÓIjJ ~¿Ÿ@ €Á`ˆ·sõÿúº …Q½^OmM »î»o.µw2>Ÿ£Ñ€N§# ¡Óë0<òàƒ”–ãõù0 F z=ªª.Xw,Ã`0 !-(ƒ Üì>s®þùÊ&IwmÝÊ»ï½Çèè)N'‘H˜“gÎ2114—þrÙ ¬Õr×Ö-¼ñÖ^††‡éè袺² ,#Ë2I’˜òx8zü^¯Y–‘$­FÄËZR\ŒA¯' RQ^Nk[;^¯Ïô ƒMÖ³ïýøÇùƒCCTWU"ËdYõšã#KsÛŒo[–edINCI’øäðaê/]F–e ?ò¥%%>v “ÉÈÎíÛÅ €p[‘纪"Ë2ª¢’•…Ïïã7/½Ì7ž}†’¹:b±Xe™–ÖV~þ«_308È#>ˆ$Kìyóm‡†èèìbeM ¦ár¼® ¼ÿ~6nXÏðÈŠ¢žžFÿÀGç¯ÿâÏ9zì§Ïžeúµ4^½ÊàÐv»“ÉÄ›7³ç­·¢fE5¹99ì}w_ü)UeýÚµ&Êüü3Ïàt:¾øÁ„¯˜´{ÏnuÇö¤¥~zo*‹1<2BjJ &“ EQdl|‡ÝA^^.£££ àpØ)-.^ÖÁ}Š¢Ð×ßËåÆjµ™™IÀÀh2âõúHKKE#ËtuwãrO‘•™A~^ãX­VlIñA@cãã(1…¬¬L|>­míhµZìöd²²²p¹\ c6›HKMC’€¹ß##£dd¤ãõùˆF£˜Œñmkµ$Y&Åédxd›Í†ÇãÁårÏ]½È ÕjéëëÇfK"+3S\-·¯×ËôÌ ÙYY¸ÝnTU%%%…Á¡!……ÄbQúúHN¶ÑÖÞÁ¾÷Þçч"?/—¢ÂB€í@Vf&3³³‹êšFÖÐÕÓM("?7£ÉÈ´gšÜÜÆÆÇãt33cpp“ÉDQQ!Fƒ¾þÆÇÇÉÉÉÆ–”Do_ª **i)©dee24< ¼·¦gf˜™™!‹ …˜ž™!‹¡( ““.&Ýn~ñ«_ÓÞÑA4M$î…B¨ªJ4evv–p8¼hݪªrùò~óÒ+ø|>E½AA¸u säØ &&'ñz½×Õ;?áp˜Ýo¼É©3g ‡ã‰v¢Ñ(ÁPháÉB8̤ËEý¥K }æöü~?Á`ˆOI>Q ( ‘H$ñ¾÷º ÑV·¢Eø¬]»†æÖþî¿ýw2ÒÒøËŸþ9“.o¾½—ÙÙYÊËÊxäá‡8{î<§ÏœÅd6ñØÃ-ëä““¨ŠÊo~÷#££„B! òóyú‰Çbdt”CGŽÒÛ×ÇóÏ>ÔÇÃźz’¬Iܳí.NŸ=‹ÛífÍêÕ<¸kZí§S€Þ?p€ºú?ßýηEŽmAø’I’Dk[ÿúó_Fyê‰Çùðã¹p±ŽP(ÈšÕ«øøà'X,ffg(Ì/à½?D#˘L&¾ñܳ(ŠÂî=o0ëõÒÒÚÊÚÕ«mGUUŽŸ<É©Óge ?¸ ½ÞÀû>ä™'ŸäØñdddpǦ¼ùÖÛ Ž’‘žÎóÏ{–¶¶$YB¯×³qý:jª«Ñétäæä—›ËèØü„o}ã9®46Qßp‰Úš\¹Òˆ-9™$«•¬ÌLV×ÖrðÐaÑV·Í3Ï>ó·EEEXÌ–Ä›²F&=-‚‚|ŒF#ùy¹$''333‹Ãa'''¿ßËíbÍêÕlݲÃ2æ¡¶Ù’(Èϧ´¸˜‚ü|l6™æç“›“Mqa!åeèu:²²2ÉËÍ¥ ?‡ÃN~^v{2³³³¤§¥“dKbzz³Ù„Ùl&-=ò²R²³²0ôä忢ÓénôßIn)&£‘¼Ü\233°ÙläåçQ\XHVF&ƒžü¼\Š‹‹0›M¤¥¦âóùilj"##ƒukÖ°uóñ.{{2@Õ«jY¹¢šh4J$Áb6cµZ).,dõªU„Ba¢Ñ(99ÙF232¸wÇvòóòÐëõTV”““=טÉËË¥¬¬T´Â׊¢(x<ã‰÷5 ™Ä”î)7Òî=»ÕÛw–*¥‚ps:rì8gÎã?þÍ@£Ñ|ñ Â-(ÒÛÛ‹Ëåæjs3ªÒD¯×³ºv%áH˜Î®N1 7¿§“’¢¢DC&ŸNŒFá¦W»²†•5+$éFE¾öÄ¿ _ "è —C~AA¸ˆÀ/‚ ·øAá6"¿ ‚ ÜFDàA„ÛÈ‚À¯ª*'OŸ¡¥µ€™ÙY:ŒgzúF—s‘‘FFG½FéìêÂï÷‹Å~ï3¿Š¢,{:aAâ&&'¹Üظ ƧÖþ4åî|ªí?DUU.Ö×ÓÓÛ»ìûq}™áë`Ñ àçw/¿Ê¤ËÅGréÊôsÓP.U oÄ„ݽ½ *ù|þìH$Ê¥ËWŸ˜àÕÝ{ø=ù¹Ož>ÃÇŸZö² ‚ÝÝ=ìïƒÄI:@k[;o¼õvbÿ}ïÀ¥ËWþຂÁ GŸ ¥µí3—ù¼íÔRmÜï ì­íŸ–Y¾.Là#IÛæ–Vþç?ý3Š¢ð“ýp$Â[¯¾Æøø8kV¯fÛ[iniáØ‰“hµZz`ùùËVèø•€ÊÞw÷14<ÂÌì ÕU•ì¸ûb±§Îœåͽ{¹ÚÜÄSO<Φ üþØøx<϶gЉÉIž}êIŒFãþ[ÂmCš[[øŸÿò3Œ<ôïìÛÏù‹qOM±²¦†7Þz›-‰Ç~˜’âbŽŸ&]“ttvât8Ðëõ<öÈÃh42<„Ëå^ÞBË2ò\ÚÍò²2V¬¨Æd2 …e™Œôtìöd*+*HKK]ôûñì\édeeRZR"’~Â2S´Ô4*ÊË(ÈË#Ž™™AJJ +ª«ÉÌÌ$%ÅIqQ!¹99H’DVf&›7mâ®­[hmk£££ƒÚ•5”—•’’âœ[ëBî)ÃÃ#ôôõáõzI²ZIJJâîmwqîÂJKKÈÏË¥·¿—ÛEKkIIVTU¥«§‡Uµ+YQ]E~^Þ¢™5 YYY¤8S¨Y±Bô _KÎÕ¯ª*1EAQ$I¢¼´Œh$ÂæM›ÐôØl6&]nÖ¯[ÇÞw÷qµ©‰ªÊŠe+ôüÀ<%CQb‰òª*Äb £ÁÀñ“'1›M¨ªJ[{ñz+QUQAr²†Ë—9á"kV¯Wý‚°Œâƒâ¢¨ªŠ¢Æës’ÕŠËåâðÑclÚ°[RëÈËÍEUUÆÆ'h¸t™sç/°²¦,sêôYLFƒ”—–ÑÜÒÊÀà ’$¡Ój),( ¸¨¢‚JŠ‹q:x<9ʽ;¶sµ©™ŽÎNJ‹‹¹œ‘ÁšU«0›M”—–1:>Æñ“§0›Ì¤¥¥‘lKâÒ•+¨ªŠªBA~³—{®Ì7`µˆ«~áæ§yæÙgþ¶¨¨‹yáVJ‹K°Z-äççøiïìD–e òòéêîâjs3¥%Åì¼ç,Ëø…W•ŒŒt232(ÈÏÇžlG–eJKK0™ŒT–—“Ÿ—ÇèØ™~._iÄ3=Í”ÇCFz+ªªðû(ŠBqQ‘¸ê„e¤ª*IV+ÅEE¨@zZUU•H’ÄôÌ4¥%%äååâr¹±Z­Äb1Nž>M(¢° €î¿Ò’b¼~?Ý==äfg³ªv%ccã´wvâñxðz½”••R³¢š®žnFFGIKMC«Õ¢Ï>õ‹™X4ÆšÕ«Ðëõ´¶µ †(,, ª²¿ÏOk{;IV+&“‰‹uõLMyp»§°Z-ÔÔ¬@#k˜ž™¦¤¨ƒÁp£­pSÇC `|b"ñ¾F£!3#ƒ˜Ã=åFÚ½g·ºcûÒRÓþ訪*g‚ð•;zü8gΞã?üû'‚« |†h4Joo/.—›«Í͉§Yôz=«kWŽ„éìêübøˆ /Âr0™Ì8NÑ3'_í_… ÂWkÝšÕ¬ZYƒV+š,Aø¢D-ᦧÕjEЄ/‰˜«_An#"ð ‚ ÂmD~AA¸ˆÀ/‚ ·øAá6² ð«ªJk[["×}0¢ñj>ŸïF—sááú–üldtô3?û2E£QZÛÚñûý7úpÂ×Î쬗ÁÁ/%­·ªªôôö2qÍLe‚ |¶EWüÍ-­üâ׿ÁçóqüÄIÞÙ·èïÉG}#;q’\ò³ÓgÎ~æg_TÿÀÀïð»W^el||Ée/_iäìù 7úP ÂM©µ½Ý{Þ$‰$Þëïÿ´~A¼ž·wtþÁu)ŠÂ¾÷Þ§®¡aÙ÷ãú2 Â×Á‚c%Iâ¾;hjnæ7/½ÌðÈ/<÷½?9ÄÈè(kV¯båŠ röÜy¶Ýu'™ËZpI’˜t¹8á"7¬§³«‹ÆÆ«4µ´P]UÅ•«W‘%‰ªÊJΜ;OA^ýƒ á÷ûÉËÍatt ›ÍÆý÷î¤`€ŽÎ.f½^ÊJJX»f5^¯—c'N2ér±ªv%'NžâÜ…‹Lº\l¹cŸ5q¡ËíæÕ×_Çã™frr’ûvîÄ`Ðߘ¿° Ü„bÑ(Í­-üò7¿%Ùfãž»·ñÎþ÷8{þ%%%¤§¥#IPWß@]Ã%bŠÂ¡#GèîíáðÑcŒ£ª*»ßx“ôô4ŽŸ<É¥+W¸PWÏé³gÑëtìyëmê.±wß~º{z(,ÈÇb¶””„Ùl"-5õ÷N&¢×é°Z¬X­VRRœÈ²˜ÚX®'K2e¥¥4·¶ræÜ9’m6Ìf©©©X-Ìf3v»‡ÃNgW|x½AÏácÇ8xè0‡ãüÅ‹¬¨ªÂf³±Ô]¿ßÏK¯¼J  §·—·Þy“ÉÄé³gùåo~ËÛïîÃh4rµ©‰½ûö“””Ä»ï½ÇÕ¦fŽŸ<Å©³g)ÈÏ'Éj]2-oR’³é· ‚p3Yò›Z—GIQ5+VÐxµ‰±±1ôz=³³^Âá07làØñtvu-kJ^$‰s.°¢ºš?ûñØÿþ²ãž»ñx<¸Ün$IB–edIB#k$ ½^Ϻ5«Iq:éêêæÎ-[hjnajj I‚ªÊ ž~ò ü~?'Nbbr’ï¿øÊJK˜t¹æÞÛ™™™™+Êâ ž””Dii ^¯—Í›6-ﱄ¯ÈËËåžmw1:6ŠÏç§¼¼”þvn¿€ü¼¤‚ð¹-øUUEåÓì{Y¨ŠÂ®ûïC«Ñ’‘žŽF£á‘‡äw¯¼ŠÃáàÏ>³l…VbJ¼«]–ùàÃ8¯6ÑÖÞÁðÈz½£ÑHOo/]ÝÝLLNÄó~+ 1EAQT”¹×*ñŸQÁ3=ÃàЃCÔÔT‡9wá"ƒääd =nÏW›ÈÊÌ  ÓÝÓ‹AoÀåv'Ê—…Á §µmˆÎ®nŠ DrA¸†ªªÄb±xœ«‹z½ž)ÏW¯RZZŠ^¯££³“ÕU¨ªÊ¬×ÇÐð0­íäçå¡‘e.7^¥° €‰‰IÊJKIœøk42f“™ÌŒ jWÖPRT„ÕjÅp±¾žÕÕ´wtÄÓw§§“••É=Û¶a0ÈÏËexx˜†ËW(*,Âjµ`4é’’’‚^§K”¹¬´£Ñx£­ üAšgž}æo‹ŠŠ°˜-‰7Eabr’ŠòrìÉÉädgÑ70À•«W ƒäsîüΞ?OZJ ;·ßƒÃáX¶BOMM‘‘‘Á½;¶séÊÖ¬^…‹qúÜ9"Ñ(ÕU•¬^YËÕæfÚÚÚIJJbÍêU¨ªJ~^6[~¿ŸšÕLy¿ŸÎÎ.TTŽ=J{Gm¤8TUVÐÝÝÃìì,åeåhµ"ð Â<ŸÏO,¥fE5ÓÓ3$%%±jåJÆ&âõ«²¼‚ÔÔT®65¡×e‰?9ÄðÈ&£‘'{ŒŠòr::;i¸|^ÇêUµttvqäøqÚ;:èéí¥¢¢œâ¢".Ö7ÐÝÓƒÝî@’`ph˜ï¿øÁ`M6033K}C.·›’’b*+*èèìäüÅ‹h4´Z ïìÛOk[-míè4ZjW®dÒ5I_ÿeå˜L"ð 7Ž¢(x<ã×<å¢ÑhÈÌÈ ¦ÄpO¹‘vïÙ­îØ¾ƒ´Ô´?¸Òp8‚V«A–eE!£Óénš«ÙH$‚F/Ĺ‹) ýX÷Û—_!‹ñÂsÏb2™Èh4ŠN§KtëÏ÷„(ŠB,C«Õ.èd”`Ѳ‚ |>××UU9vâ$§Îœá¯þüÏHJJJÔqUU‰F£hµZ$IJôVÂÂz8ß»0þúõÏ¿ŽD"ȲœhÓTU%‰ Õj‘eù3×/ê¹p3ˆF£ôööâr¹¹ÚÜœx\V¯×³ºv%áH˜Î®Î?.;Ÿ^¯Kü,ËòM×­¥Óé¼ÖjµŸ{µZ-z½nAПßOýu'ó\–åDôYU^4‚ðǹ¾ÎÄ»í5ÌK¢ÎÍvm½—$iɺ¨Ñh>óåÚí]ß†Ì úCëõ\ø:ÃPç<üÀ®]A>ÃÚÕ«¨¬(G{“ô. Â×™üsìâù[A¸iY,,Ë_‘ b®~AA¸ˆÀ/‚ ·øAá6"¿ ‚ ÜFDàA„ÛÈ‚À¯ª*cããÌz½Dc1FFG ‡Ã7ºœ LOO'æÊáë' 1==˜`ä‹r»§ðú|7z·ákaÑÿ'‡óëßþŽH$B}Cÿë¿LœÜ,Þ?ð‰9°{z{ikoÿÌÏ›šùR×)·³–Ö6^~íuEI¼719Iåˉ×L½{ýÍ79{îܲïÇõe„¯ƒsõK’DfFÆëõròôîݱÒâb®65ÑØÔ„^¯Çf³15å¡®¡ž¾þ~’““—u¿úK—$‰•+Vàžšâò•FÆ&ÆqØíèt:zz{¹p±Žá‘x£1;;Kgg½}ýØl6†††hjn!‹!kd~ý»—8{þ<ɶd—®\áJc#¡PˆH4Ê¿üÛÏéíë'9ÙFjJ ]ÝÝÔÕ7ÆHq:ÍÚ5;;˯®YgzZÚM3­± Ü zûúøäÈa¢ÑccãØív>øðïì›-‰H$Ê/~õë¹z—ŒV£¡­½Îîn¼>)N'Š¢Ðxµ‰³çÏSW_OqQ1¥%%‹¶åñx8wþÃ##¤¤¤àñLÓÝÛCjj*ýýýLºÜ8öEõZUUZZ[©k¸D$]T×ÑïìÛÏ»ûßÃjµ’ššºh–OAXNŸw®þEø¤§¥ñø£ðwÿõ¿ñà®]lÞ´‰ÓgÏqèð²³³8}ö?þÁ÷ykï;¸§¦(+-%'+{rò²î $Ix<Óüü—¿Âb±àóùil¼Ê›6±û7().âjS e¥%ètZêêذn.—‹‹õõäåäpð“CÜuçV<ži¦¦ÜŒŽQRRLgW7>Ÿ?9ÄÝÛîbff­Vƒ{ÊC{G'¯ìÞMaAÇNžäÅo}“ò²²e‹D"LMMáñxU# ILOÏÌ]`œÆëõ♞Æ3=ÍÐÐ0f³gFÔg —ËÅk{ö°zÕ*º{zyôá‡8ðñÇÔTWYjÖÜP8Ì˯íFQ¼>ƒƒCl¾c¯½¾‡õëÖrùJ#Þ?ªªò»W^IÔëï~ûÛ¸§¦xÿÃ)-)Áb±PÁÂz®* n·;^æá!V­\ bŽ!ák`É™ûVTUQXPÀ¦ e™³çÎ1ášÄjµÐÙÕ…{jŠÌÌLÆÆÇÑëuØíËô!>O~[{;>ŸŸÿW‰{jŠÿòßÿ.·›Üœ¾óÍo²çÍ·˜$Ö®Yà Ï?Çÿø§fýÚµ<úðC¼ñö^ZÚÚ¨]YƒÏçãч"‰—›C[{n÷YCuU%+ª«¹këö¼ù}ý¤8 ÓÛ׿(ð;NV¯Z…×ëM4P‚ |JUUJKŠùƳÏÄèÔëÖ®eÊãáùgŸA’$*++¨­©áÎ-[8zü¹¹¹üð{ßåèñã9z­NÇÖ-›yðþû¼ÀØØëê)/+Å3=McSÏ=ó4?ðÿéïþž'{”7ðæÛoZ¯‡‡éìꢣ³“­›7³ë¾{—܃ÁÀ†u똙å…çž[C@nfŸ1e¯„N«›û"KX­Vr³³ÙvçÜs÷6rsrp:äçåñÊk»A…§Ÿ|bÙ -OÍ[TX@0¢p—Ë…Ñh$-5•îÞ^Æ'&ðù|¨ÄYŽ'ú°''3<2ÊðÈccc¤8èt:¦¦¦˜t¹cï»ûxøÁiniAQdYf|b‚ééiÌf3éiil\¿ž­›7STX€ßïgfv6Q¾d› ­F_çä$N§S4 ‚p-UgºSUdY&¦(h5|>##£¤¥¥¢¹¦ÞJ,# ávOa³ÙÐh´ ãv»ñú|¨ªÊÌÌ ~$%U…äd••äåæ’dM"‰084Dzzcããx½^,f éi©‰z]ŸG_?ƒCCLOO'²Ny<‰]°˜Íh4|Þx™ÓÓÓ%ù„›Ñ‚{üó¢±(mííTWU‘’â$5%…¦–V:ºº‚äçsäè1.ÔÕ¡Óê¸sËf232–­Ð>ŸŸc'NP^ZJZZG§`‡ØÅ–;6ÑÚÖÎÉS§¹ÚÒBnN)N'&“‰Êòr²23ilºÊ¹ °XÌ<öÈ#8ìvÎ_¼ÈÔÔ¥¥¥ttv2<2B,£våJòór9qê̦ ¢©¥%¾|I ]¼üÚn.ÖÕs¡®{r2EEEœ¿x·{ŠªÊÊD:PAâ£ðÝn7ë×®ehxƒ^ÏêUµ4·¶ÒÞÑAUU%F£‘“§Ndzlj´¼à#zûz™žžá™'Ÿ ¢¢ŒÓgÏrábÓ33¬ZYKSs {÷íãb]=W®^¥¢¼œ´ÔT.ÖÕ388„ÃnGQU.ÔÕñ£ï¡¡aB¡7¬§p€æ–V¦æna–sêìYΞ?O4C’à7¿{™ó.rîÂEaEu­íí´wtPYQùºìž‚°œ>ï=~i÷žÝêŽí;HKMK,¤ª*ápN—¸R †Bø¼>ŒF&“‰`0Ĭw³É„Õj]Ö´”±XŒ™™Ì z €,˘æ†Âa|^¿{åÒÓÓxö©§€OSnF"B¡F£1Á ¨*&“ ¯ÏG Àj± ×ë‘e™@ €F£Á`0‰D˜E«ÓaµXˆF£C¡DºNƒÁˆ^¯K¬Óh4Š´‚pX,F,C¯×‰FAUÑét„Âa¢Ñ(&“ õî̹ó=~œ|÷ERSR0›Í@¼Þü~ F#ƒh$B8‰×EIÂl2!Ë2³^/ÑH«5žÖ7‹%ê²¢(‹êõüÕ|0Äëõa±XÐé´T@¯Óa4?-³Ñ(zö„*ÒÛÛ‹Ëåæjssâö—^¯guíJ‘0]KwõK’„Á`XðžÑ`ÀxÍ{f³ ³ùÆœÝj4Gâµe®˜™™áȱã¸Ün&&'¹ÿ¾{u¿étºEï™®y*Áj±`½.˜ùšmèt:œNgâµ^¯_r4¯iŸt„¯F“xÒEwMo˜A¯ÇpM]º¶Þ ²²²,o2Ô3­F³äF¶¤¤¯çOø¯m®¯×F£qÁú’®[ÏRe„›Ý-×ÿl0(,(Àf³±ýîmÜè" ‚ðÕ¬¨&;; ¸¢„/ì– ü«jWÞèb‚ð%JMI!5%åFCn âôYAn#"ð ‚ ÂmD~AA¸ˆÀ/‚ ·øAá6²(ð¢Ñ(ŸÈ'‹Ånt9—ªª„#‘ó~«ªšH´‡™õzÿà1¹öw®§(ŠHÜ#ÜÖE!‰|ië ÏM¢#¶ ð+ªÊÛïîãõ7ÞDQÚÚÛùŸÿò3¦¦¦nt9—Í䤋ßüî%f½ÞÄ{]Ý>z”‰ÉIþù_ÿ?ÿÕ¯i¸|™¾¾þÏ\Ëåbÿ$fúºÖ…º:ꘘ˜dddôO*§¢(t÷ô.¹~A¸Ùµµ·óúo-8ž™¥÷š:508ÈÔ”çs­o÷oræÜ¹eßëË,_ æê—$‰$«•wß{«ÅÂÁC‡©®ª¢ve #££ ¢×0 ƒAzûúq¹Ý˜M¦eONár¹â³w¹¦¦˜œt1éraÐÐëuƒ!ºº{˜™ž!))‰h,ÆðÈ(£££LLL’””„F£atlŒÁA$I" ñÖÞwp:ÌÌÌb³% ‡ðú|´´¶q±®ž]÷ÞKo_?ïøh.ñ‡uÑ\ü¡P÷”§ÓÁ¤ËÅàÐ0³³^l6ÓÑXŒÃGq¾®Žœì =ã¸\.”˜‚ªÆû”g «Å²hýýƒüÓÏ~†F£Åápˆ9Â…¯•øÉôv^¯«ÕÂácÇygß>òór‰) ¿øõo##-&ž°gbb‚h$‚ÅbAUU†GFhkkçäéÓdefRVZ²h[×·>¿·ÛÕOýëõz±XÌLº\ôôö`™›¹sllœžÞ^EÁj±,˜z;‹ñɡü³oßg¶‚°œ>ï\ý‹’ô8ìv@å_þ òóùƳÏÒÚÖÆk¯ï¡§¯+”——ñÎþ÷8rìãã㤦¤²Œ“k´¶µñÛ—^¡£³ƒ3çΑ™™Á[{ßáäéÓ\il¤¥­Šòrö¿÷>gÏ£áòeb±(zŽÿßÿý399ɱ'ˆF£Äb ÿö‹_26>N("#=}ï¿O8æÜ… ñL_ÀÉÓ§§¯¿½AOGg'mííÄb1ÊËÊL 0:6Æ ñ‹_ÿ†)Ïò ™étvuÓÒÚJKk=½½èõ:Lf3ÿ_ÿ}ý¨ªÊ‘cÇi¸t‰‰IEE…‹Ö±®ž?ú˜™Ù222ÈÍɹ1ß4Aø óÑÁƒ(ŠÊá£G0™L4\ºÌåÆ+¨ªŠFÖpààAÆ'ÆINNfÊ3Í¿þüç qìÄI222Ÿà7/½ŒË墵½Uµ+)-Yøc±o¼õgÏŸ§áòe¢Ñ(zžÿõË_b2™Øûî»h´ZŒ¿üÍoéíëçü… ”—084̯_z™ÁE¡¸¨hÁ\ü¡Pˆ½ûöÓxõêg¶‚°œ>oà_rpߦ IOKçî»îÂ`ÐsøØ1<ÓÓ$ÛlÔÕ70<¶nÞÌÿö×…Ëíæ“Ã‡9vâ‹…X,Ʊ' ‡Ã$Y“øî·¿Åö»ï¦­£ƒ`0H(&'+‹êÊJ2ÒÓùþ‹/²ë¾{éìê É2ë×®eeM ?ýñyðþû©]YÃO~øƒ%g‹) þ@€p$Bnn6þ“S^VFgWÁP‡ÃÁ›6rç–-¼ðÜsèuzÌ ßñ;¤8ŒOLð×ñS¾÷âw–\ÿúµk©¬¨àÛß|ë×-Ûñ„/ƒªª”•–ñÓŸüˆ•55 ŒrçÖ-Ô®¬åGßÿ›ïØÄª•+yôá‡Øuß½D"aRSSùËŸþ7¬çƒ>âà¡Ã¬[³†¿þ‹Ÿ²fÕªãræŽqôøµíÀ Š‹ ¹sËþÛ?ü#&“‰»¶náüÅ‹t÷ôàt:èìîærc#ÇNœ`ͪZþ·¿þ+îÛ¹#‘[`^üw·R»råg¶‚p3Z²_J«Õ`µZ>MN¡ª$'Û(*, ¸¨ˆœìlžxìQ¯6±÷Ý}øý>zàe+´$IsäTTEA£Ñ K£“ÙŒV£%¡ÕjIII¡ª²‡Ã$ÉhuZ †x†AUQ¨¬(ç‡ßý.rˆ–Ö6¾ùçÐh4ètñ«$PU e Y’ÑjµèõzbÑápN—Èò Ë2jbðžŠ^Oâa2™â˨*’$¡Ój‰D"D¢QÔ¹ìdV‹Y#Ç{#%ѵ ë—dY–‘$‰p(L,YÁ„¯N‹V«Åh4‹)è´ZbÑ(áp‹Å‚F£!  Óé0›L †xý—bD"‘¹ž»ªzÝ ?I".l쎹âõj¾N)ªŠÕj!+3“ž{ŽÊŠr::;‰D#‰åc±¡PèšòëÐé´sí@½^/²p _ ŸyCÊh4"Ë’$±ýž»yóí½\mj&=-`0ı'A«Õ’dMúc¶ù…h4î¿w'{Þ|›ü—Až}ú)^ym7ï½ÿ!/Öc³Ù¸ÿ¾{‰)1:::p»Ý¬®­ÅépÄ3yIÒ\ƒc¤©¥…“§N33;ƒÓéD§ÕašK£«Ñh1Œhµ: FCüÿªª’——K4å7/½Ä³O?Ň}LÿÀii©lX·ÓÜØ‡ùL‡:½^ŸhÈ*ÊJ9sîoï}‡µkÖ`2QÊŠ œN'ÿðÿL~~îºÁúSSSxúÉ'¨(/åͽï Ië×­½¡_$Aøch5šD¶ON‡,Åuê×/½Ìw^xÕU|tð,s鱯65ñO?ûWÜî)ž~òq$Iæ•ݻ頧·—µkVóÑÁO¸X߀,KFžxôQîܺeA;Ð×ßϹ ø›ÿíßqð“Ü<}šMÖÓÔÜLãÕ«8ìVTU±ýîm¼üÚnzûúY³ª–ü¼|ö¼õŠ¢ **›6n ª²"Qæo¿ð R®Ëî'7#i÷žÝêŽí;HKMK¼©( .·›Í†A¯GUU&&&q¹]Øl6ÒÒÒp»ÝŒOLl³‘“½ìƒZ¦<fff°'Û±Z-ü_ÿ_ÈÉÉaúuäçaµZ …à ‡ÉHOÇb±à™ž&Åé$  …Ðët ¡ª*ù¹¹F¦¦¦p:„Ãa`|0c(„Á`  ât:QU•I—‹P(DzZ““ƒA ž¦×ét0 „Ã;3³³È’D¼GRÅb±0>>$K8ìñÏŸÏÇàÐ0:Žœì,&]®Äúu:=Y™D"&].vû’éBáfñû|8Nf½^TU%Ùfcbr’P(DfFŠ¢06>ŽÅlæÊÕ&>üè#ž}ê)²³³ÈÊÌ`l|g‹ÅŒÓéÄïó13; HȲLfF:†¡kÚ½^Ïï'-5•)UQp:x<FÇÆ1 def¢×ëÇåv“––†Ålftl,Q“““Iq:í@fF†Ü'ÜPÑh”ÞÞ^\.7W››·¿ôz=«kWŽ„éìê\:ðÝDc1þ¯¿ÿ/ܹe3÷lÛv£‹#—ìȱãœ9w–ÿø7³è^» qŸ7ðß§§²$±ãž»ÉÉξÑEá+PR\¿e&î¡ Âvk~YfËwÜèb‚ðÉÏË#?/ïFCn b(¸ ‚ ÜFDàA„[ˆ$}úÈjüQqí‚GMEàA„[ˆÑhÄép Í=ºžž–¾à‰“[â¿ ‚ $&ƒ+**$#=Y–°Z­ ®øEàA„[Œ^§Ãà°,šÎzQWÿõ ,5ÿµ ‚ 77UU—Œá ¿¢ª¼ýî»|t𠪪288Äÿú寘t¹ntù/EQ8sîýÔï…#öîÛÏÈèèWR®CGŽpìÄÉ?ù÷£Ñ(“.Wb>qA¸Ut÷ôòþ‡ˆÍM_ ñ|î©©ÄkǃßïÿƒëRU•w÷¿G]}òïÇõe„¯ƒ_–$JKJ8ðñAZÛÚyç½ýFìÉÉø|>&']D"ñ¤Š¢à™žfÊãYPy—C$Áçó3==C$A’$B¡0‘H”@ À¬×‹ÏçÃçó1>>ÎÌì,ªª ™™ellŒP(D,ãô™³tvu'¦ôTU5¾Ìøøg6:Š¢˜™™Å7·L4ML© ‡ ‡Ã 244”xÏårãóùëpOM1==ý™½*ݽ½üóÏþþÄq„[ÁØØ8§Îœ¡`€I—‹X,ÆÅºz~ùëßàv»ñûý¼üÚnŽ;ŽÏç#â÷û™ž™IÔ3ŸÏÇÀà W¯261¾ä¶®¯káH„@ žn;>-wüçP(´`êm žÞt|ŸÏ·doè…¹2»ÜîeoáOµèÿÊ+Ø´aÿßÿ;ÅEE|ç…â·ö ‡ÈÏÍåé'Ÿà؉“\¸XG’-‰Gz²ÒÒe+ôLJqîü4²ŒÓ™Â Ï=KgWªªðê믣ÄÊÊJ‰D"ôôö‰Dxþ™§9qê4ccãÄ”éii¼øíoáóùxwÿ~´Z-Õ••<ùÄã¼ôÊ«ŒO Óiùá÷¿—˜|ÞÈè(ÿö‹_b4 C<ùøc„#a.]æ‡ßû.ûßÿ£Á€V«EÖh˜òxøÝ+¯0;ë¥ /gžz’c'Nr±®$¸çN6nX¿`ªªrüÄIΜ;G8æÅo}“Šòòô5„/—$K´wtòÒ+¯áõyyê‰Ç9|ì.Ö!Ë2«W­âÄÉSÔ7\"›“ÃÞw÷a2™ÐÈ2ßzáTUá•ݯ‹ÅhjnaÃúõ‹¶£ª*r(Q×vÝw/¶$o½óÏ<õ$GŽ£° €ë×ñêë{ðx<Øl6¾ýÂ7ðùý¼öú «W×òР½fºà@ È¡ÃG¨kh@¾÷ío“žþõú\¸},ºÇ/Ë2÷îÜ,Ël¿{ÉÉÉøø î©)J‹‹9rì8=}}´´µ¡Ó騶u+éiéËZ艉 ÒRSùñ€ÏçãøÉ“LLN233‹gzšÛïæáv±uóì¸ç"‘(§ÎœejjеkWóƒ_¤³«—ËÅbæ™§žäùgŸáÊÕ&bÑ÷l»‹»¶na`p+Wm? ♞æ™'ŸdËæ;Ø÷Þ{ŒOàžšB¦§§‰B$IÂ㙦­­ƒò²26mÜÈ”ÇÃþ> ++¬á½?\Ô/I[îØDEy?üÞw).*ZÖc,_%UU).*â/ÿü'ÐÙÕÅÖÍ›YYSÃ÷^üwlÚÈÊ•5<ôà.îß¹“ÙY/?xñ;dee±ï½÷øàÀGäæäð¿ÿõ_±fU-ªºø–ØÄÄûß¿¦®½ÿ!ÅE…ðŸÿîò°åŽMœ½p¦æ*++h¼ÚÄÅú:Lff&ÿþ¯þ‚wß³ è˜LF¶n‰—ù‡ß}‘”‘™OøzXò9~£Á@ZJ*v»=Þõ=3‹ª*Ä”;wl'=-o>ÿ¥¥%¼úú.7^YÖBK’ŒÃá ;+‹ÌÌ ¦<$ z=ÙYYèt:ÞÿðÍ--ȲD8FÖhp:œ8œŒFc"Ww²-{r2:–¡áaÞÙÿCƒÈ²†p8„ªªñüߊ27XÌ&YY™”•–âG"ñ®¾¹e% PUbѹ¹9üø‡ßghh˜—_{‘‘QB¡¡PˆÜœl¶nÞ €¢,ÜŽÙlާ=NJY¿„[ŽÙlÂf³aO¶¡(*f“ N‹-) “шÁ`Àd4a2™$‰¤¤$²³³),(Àåv355EŠÓ‰ÕjE§×,¨«Š¢â†‚‰º¶eóèt:òóóŸÀét`±X˜™žAU wnÝBnN6î©)RRœ$''cµZ®Y·2·æx™m6‘>ø ªOE©ª*ëê ƒ(Š’¸o½\TU¥®¾,ÓÕÕÍóÏ>Ãû~¸àóP8ÌðÈ(¥%ÅH’”¨”ªª‚ª‚´p}Ìí«×çebb’¼Ü\dL4cï»ûIÂépPY^ÎèØ8{ßÙÇðèkW¯¦ª¢œÃGŽð»W^åJc#wnÙ‚Õnåà'‡±Ù¬x¦g0ôÌÌÌ’–šÊêÚZü~?N‡#‘²wï;ïâóûQU•‚ü|Ö¯]‹Á`äåW_ãé'Ÿs• ·œÄ}sU%==ééi^~m7O>ö(ù¹¹9v ›- UUéèèd÷oÒÚÚÆŽ{îF–eö½ÿ>ãtttR]YÉÑcÇilnF–$ ÷ÜukV­JÔ5§ÃÁÐÐ0rˆ}ÿ{œ»ps.²fõj®46‡I¶ÙpØl\¿ž}ï½ÏÄÄeådffðÁæN.TV×®$=ãÓ2?ñØ£8ìö}HáZ2-o4£«»›œì,¬V+±XŒ¶ö†GFHKM¥¬´„Þ¾~úúIq¦P³¢“É´l…þí˯ÐÑÙÉÖ-›)+)¥¸¨Þ¾>¬ žéirrr°˜ÍtvuÑÓÛ‡Ãn'##p8‚Ãa'Éj¥»§‡Üœ††‡ÉÎÊFÖÈ ’Ÿ—G[{“®Iœ'ÙYYŒŽ2=3H˜Í&Œÿô³cÇö{(ÈË£¶v%:ަ¦&ÆÆÇIq:ÉÉÎÁh2rùJ#éi©¸§¦ðú|”•”PTXÈÌì,MÍ-„B!JKŠIMMåÊ•FBá0 â°;¨¬(gdt”ÑÑ1*ÊËHNN¾ÑßAøRx<ÓLº&).*šËq¯’•™IGg'>¿ŸUU„#ZÛÚHMI¥¯¿Ÿ·öîå¾{wR˜_@uuÐÒÖÆÄøÖ$+E…¸§¦ŸìkµTWV Ë2W¯©k‹…ñ‰ ÊKKéï òóéëï§»§‹ÅBuUf“‰Ö¶6†GF)*,ÀépÐÜÚšxD*';›‚ü|ºº»ñùýTWVb4oô¡ncÑh”žž¢Ñè¢Ïæ/l;»:—ü7»_ÿî%4 /~ë›7dû]ÝüÛ/Éÿë?þ?°‹`,_¹#ÇŽqæÜyþãÿñÐÈ¢K]–òyÿ×òÆqIqñ MË”deíêÕâ¾» ,“ÌŒ jª«ã÷ AøB¾–‘kÛ[oèö3ÒÓyá¹goôa„ÛFUe%U••7º‚pKÙùAá6"¿ ‚ ÜFDàA„Ûˆü‚ ‚p_An#"ð ‚ ÂmdAàWU•ƒ‡'òZ»ÝSì}wŸÈ7ý{D"Âa‘2Wþ#££œ=w~A*ÛX,F(J¼‡ÃKNDr=UU9qòmíí˾×—Y¾~I’0ôì~ã FFFyÿÀ1›L(ŠB8^ð˱XìsU̯‚¢(D"‘Äô™×š‰DË,åúä;×ÿ¾ªª„B¡ÏÜGUU9zü8 rq ¡¯¿Ÿ~ÂÌÌL"p657óÊî× ¯ÞÚû.Ö%⨪Jìº,–Š¢0;;Ë™óçèêîùÌíE"¢suôú6ãÚõ‡ÃáEmA(úÌúÝÔÜ/sø³ÛA¸Ù,šÀgó¦M4·´ò_ÿá0›LüôÏ~¬×¿òw»©©YÁý;wÒpé2ÇOžB¯×óèÃ.kÚØöŽN>üè#‘Û·ÝÅøÄ$&£‘{îÞÆ;û÷“™žA0â̹sØ““yö©§HKK]°Ž‘ÑQ^ym7²,“ÏçãÏ>C{G']ÝÝ”—•ñÞ‡"Ë2ªªò­o<¿(IÎØø8o¿ó.SSS¸§¦xá¹ç0™Ä\Ý‚ð‡I4·¶ò?ûWdYæ‰Geß{pþâEffgY½r%ï¾÷>V«… —‹’¢B>þä±X ›ÍÆÓO>ª(¼ñö^&&'iimcÕÊÚ%·tþâEŽ?V«å‘àðÑ£<ùøcœþ¡Pˆ·ßÙÇèØ(kV­b×ý÷-HÍë÷xgÿ~.ÖÕãñxøÎ7¿¹¨„›Ñ¢{ü:ŽG~˜ÑÑ1îºóN²23ù𣦲¢‚ýï@WO‡ŽAQîÚºeÙ“Çœ9{–¡áa¶mÝJVVÉÉ6Žž8Áààuõ Ly<|rø0?°‹G~ˆädÛ¢uøü~:ºº¸cãF òimk#2ᚤ«§‡I— —ËÅÓO1ÉàлßϾ÷Þ烡( ?üîw©ª¨@U•E›qOM±çÍ·ÈÎÌDUUÞÚ»—ÜÜEáïþëãÊÕ«ÔT¯àÂÅ:Ξ»@mm gϧ®¾ƒ‡ ùö ß`ýºµhä…Í¥Ñh`um¼Ì?úÈ’íŒ ÜŒdˆwñ_Ëžl#7'‡œìlFFFñx<ôöõQ\XH’ÕÊ3O?…Ùdæ­wÞapphY }ÿ½÷RUQÉ;û÷ÓÜÒJÍŠ¼ý¦¦b6›1¬¨®&/7ý\®îkI€Ýn§¦f™€OCŒ„,ÉÈ’DZZ*%ÅÅdef\â>ž^¯Çétâp8ÈÉÉù¸áà°ÛÉÏË#++“h4FJJ ¶¤$ ò HMI!Ù–LFz:i©©È²Djj*+kjX¿n-½}}ô RVZBNN6IIÖ%·133äËÅÀà ±h”ÜÜ\Ì&Ö¯£©¥•‚22Òefv†ŽÎ.²³³0›L  QQ^_&=}Q;)Ë2©©©$%%QXX¸d;#ËI’¤Ä÷tþçÄ¿krÑkUUÅ3íYð¥öûý˜LF¼¾Y\n99Ùh´î»wJL!‹âóyÙ~÷]ìÝ·ŸËWÈÍÍ^–S… ×6¬% QßPÏšÕµðÑÁƒ|÷Ûß&5ÅÉÌì §Îœ!++“$«•ññ Á ½žh,ŠÉdÄív …QQhmk¥ Y#Š„ÐétLLN É ÒÝÓÃøÄD"APzZ:–‰ÉIêÈËÁ_>`(ˆÁ gÒ59wo\EQ¢ÃAΞ?GaA>&“îžnšZ𠆂(JŒ®žn®46RZRŒ,K4\ºLff>¿H4BK[+ÓÓÓ€„F#cµX)ÈÏcÅŠ*ÊJK‘€á‘NŸ=ÃÝwm¥³«“¶ŽvÒÒRÉÍÉæî;·¢Ói±Ùldf¤s±¾žìì, zŽá‘Q@EUã'.±X„P8ÈÙsç(*,À`0ÜèC{Û»6ÀÝ Ô¹ÌRËQ®h,Š×ç]rLŠ„D0¤P3³2¯ C£‘‘$ UQ‰D£hµñ 6ÿž$I(ª‚$IÈòò=¨\3ÀGUU´ 1E!¢×éAŠæ‘eY’‘diÁ> I–ˆÅ”Ä>E"Q4²ßâû£¨ %¦€ßïk·=ÿ?‹!Ë4ñt¤ |ªX«ÑÎÕ/@’%¢Ñ²,¡‘ãuZQ”¹z%¡(14 Ñh4‘3‰&Ö!Ï-wm—¿FÖÅçηQ²,‰DÐiuD¢´-’$ŽDâ÷ð%$T•h4¾þø…Q¼ ódI‰e¾ÉbÎmEB"0å™" ß™µZ-öd;žiϲ †_z©Š$ÅO„ý>?Úd[2y·ÄˆT )qv%‚ Ü^Æ&ÆpØ“±Ù’oŠs0ÀϔǃªBey³ù†•%‹ášr3Œwõ/õHÜבú‚ ·'EQ‡Bdgf&z„n4£ÑÈÄä$ª )Nç¢q"Ë-‰àóû¸9ŽŽ ‚ | $Iºi.d?hwãË%I’,ƒ*¦ìAn7øŠzÉ"Ý7H~AAøÊH‰ÿÜ4DW¿ ‚pKX*¼Î?Ñ5ÿ¨õü£nèÑëh4ŠF£Yt_~þõÓm¿TGĵSÞk4š/u\Âï»­ !‰À/‚ Ü"–ÒããÌz½”•”042Œªªæ,X6ñ¸·$Fiïì 7;gÑÌ´~¿EU±Z, ~çÚu,(Ò¢aç’$ÑÓ×ËÄä$F£Y’),( Ù–¼àDCUÕA|þçEË %ÎzBá0¡`›Í¶¨<ó¿%¿ ‚pËŠFcD"‘k^GQ…P8D8&‹a41 (Š‚×ëÅç÷ãõyQTŸÏ‡?@¯Óc6™èè'‰PXP€Õb%‰àõùÐëtX,–Å#÷ãó¿-Q®(é©iäåæÒ?8ÀÐÈ0ɶdü¿“É„ÑhÄç÷c4Ðh4øü>ô:=‘h”€ßÑdÂl2  G"(JŒ)—ËEqQ1¶¤¤Å=’ü‚ ­l‰nvI’aÒ5‰Ñ`$‹RVRŠÇ3ÍÄäF£!žV… ×$~¿ŸßGzj³³³„Â!&].tZݽñ¬áH„¼œRSR?÷m€`(Ȭ×K(Âd2áóûéêîB§Ó‰D(*,dphˆd[2©))´wv™žÁÄä$Z­–H$BIq ãããL¸&°Z¬‚f}^Æ'Æ1›L‹¿Õ/‚ ÜÒ®‰Á×^+±öd;Õ•U˜Œ&††‡™˜œ ?/ÒâR,–xþ‡ÝÅbAUT‚¡)))¤§¦S\X„ÏïÃ=åF£Ñ …p¹ÝKa©±ªª23;Kgw'¡pˆ¼œ\\n^ŸFˬ׋×ë#ÅéÄåvãr»Ñiu‚ñ“…ùeff¦‡ÝAUE%¹Ù98’픕”.=…´Õ/‚ Ü*– °:–@0€?à'àóù0èõpM`.' D¢Qb±ª¢‡ééíAUT Fªª"K2ÑX”h4ŠJ|Z^«ÅLA~>™™K\íKŸÙë•EUE%¨‘$ ½NOR’•’âbìÉÉ8ì¢Ñ}ý¤8SÐjµèuºO—±;âåÒhÐh4Ȳen ûEe‘âcDàAn ×XUUq:œ$Y“hëh§¥½FCZjªª26>Fs[ áH„ܬ233¢£«3‘§A£Ñ0ë%‰¢ÓjIN¶áøéëï#ÉbÅawàr»ñx<Äb‹çâ—>ãq>­V‹,Ë$Û’IOKchx{²£ÑȤËÅÌÌ Šª ×ëçª8RSR0\³Œª(h4Z4s¹c¬ H]=ÝñÛK éôéÓjeeåM3Ó‘ ‚ ü±Eat|”‚¼¼EI㔹«wUUÑëõhµZ:»»…Bädç`2™Ðët¨ªJ0L$pÓëôD£Q‚¡x¶VV‹F£ITƒÁ@,›»Z£Á¸àžº$IttuPVRº ÎF"$IB«Õ¢( ‘Hý\æØ`0„F£Áh0 Ë2±XŒX,–Hý‰D†>]f>yÜü#ápEQ0 ÒôNÏÌpþü1¸OA¸5|Ö49²,c2áÚçÛUƒÁ€=9yÁãr&£iÁ#tz½>~¯\ý4̵÷Î5 IVëÜ*?ßã|:nAùæ×©ÓêÐ'élO3×íïêõŸ.sý‰Îü Âg$øA„[ÃW˜ ̪ª’ššJ<óâ°|ý{¨Gü÷~.ôGv¨žø?¥—>ž\ZLà#‚ ÜJ>çì¸öd;ð§ЯªLËUøA„¯=I’ÐÈBÁæ?"ïýW™*7#KrâçßÛÿSU…P(ŒN§_Aøú“$ ›Í†Ë=Å”Çs£‹€¢¨ØlÉHÀØø²|ã.ýãù ´$Y“DàAn &£ £ÁxÓ<¥ví<‹õ†—K–eÆÇÆEàAn ×'͹\ìo–r‰ |Aá6"¿ ‚ ÜFDàA„Ûˆü‚ ‚pù½ƒû$IB–â™…T•Ä|ÀËI–åødL*(ªºl£"ãÛýt F,ûìc$Ë(ŠòG—íÚi!Aa9üÞÀïóûéîîÆëó‘•™EnNö‚ù‚?Kü†ø3Œ_„¢(ô 0<<‚5ÉJQAV‹I–QU…ÏŠ™óøO¥ª*=½}ñÌG¨  ⩯ãr¹Ÿ'--§óso#‡±X¬Ü$=A„ÛÀg~EQxûw&Åé ³«›gž|½^Ÿ¸º•çÒÂÂ$ÃÃ#ô pÇÆ ‹>ŸȉåU5>¿ò\²k?¿Òx•½ûö‘“M Äpß}”qöì9VTUât:QeÁ¶§§§¹t¥‘M7$µ:×S ÑÄóÏ÷d¨Ä¯ä¯/›¢(üöå—‰F£¤§¥a·ÛÉÈÈÀb6Ç÷g®¬ÓÓÓüî•W0lݲ™´ÔÔÄ1™_¯$IH@ln»óÿÚ::èîîáûïC«Õ%Ê8_†kO°þ”ÞAAXÊgþp$B{G'ÛïÞÆ¶;ï$‹"Iêê(*,Äa·ÓÜÒ‚ÝnG«Õr¥±U…•+ªùøÐ!.Ö×ã™ö°åŽ;…BÔÕ7 ×ëY¿v H—._aff£Ñ€Åbetl”šêjJŠ‹x¯AOo/f³™ž.‘±±©‰W^ÛÍÚ5kعýnL&u (ŠÂª•+ikïàͽ{cë–͸ÝnRSRI¶'ÓÜÜByY.·›–ÖV,3ëÖ¬¥¯¿XL¡fEu"ëõzîÛ¹“µ«Wáp˜c'NâóùˆÆbܱa —/ÑÜÚÊÎíÛÉHK§§·—ήn;+W¬`phˆá‘Q"‘µ5+è¤`€ââ"¬ N‡ƒ®în†GF™òxÈÌÈ`ÝšÕD£Q.Ö7033ƒÅbaͪZ’¯É %‚ *ÍøÃ¿g)ZH«Õ¢ª 'N¢«§‡$k‡>ú˜™™²³²xùµ×ÉÉÉæ£ƒŸ084ŒÓé )ÉF_?ƒCÔ–“ž–Æoï% 104ÈèØ{2¿üíoÉËÉáÔ™3¸ÝSèõzN>ÃÚ5«1 ¨ªŠÅb¡©¹…‹uõD£2ÒÓq¹Üœ¯«#3#¢¢""á##£ŒŽSW߀Ùl¦³«›Â‚òrsØÿÁ‡˜LFìÉÉüöåWÈËÍáõ7ßDUUÌf™´µw0åñP^Všü‡Ž¡±©‰«W›Ÿœ 9ÙÆ¯~ó[²²2hïè`|b‚$k­mí¬¨ª"‰°ÿƒ°XÌ46^ezz†®îΜ;Gzz:ƒƒƒœ¯«###$k““ÔÕ_bÒ墾¡ìÌL:LaagÏ_ «« [R>>HeE9©))7ú»"‚ |I’ÄäääïÕßÎüÅŸý„ìÌL~õ»ßÑÕÕÆukiim£ñjFƒž’¢bЋЇÃÌÌÌb·'S]UIQaíÚE(¢¹¹…I— ·{ŠAb1…Ô”îݱƒÒ’RJJŠÙ¾mÁPP(Ä»ç òóùwñSvÜs7§ÏžçͽïPR\D^N;î¹›Š²2,f3Ñh”€ßÏèèùyäåæðàý÷“••ØÙùAxƒÒ’bÜSSD"Q´Z-÷îØÎƒ»îOt³«€Áhàžmwñü³O³íέHH¤¦¦pßÎlX¿Ž©©) ÈÊÎäž»·12:JfFÏ?ó ;·o§áòe‚Á +kjxh×ýô ²qýzäÖ®Y¿½ Å˶¢ªŠ‡ØEjj ƒ4·´pß½;Ù¹ýÒÒRú‚ —å3»ú#‘ë0äçå¡Õhñù|¬¨®âãOñö¾}Ü¿s'ƒžêªJ2ÒÓÙóÖ[˜M&rss˜¥§·ƒ^Ãá ºª’¼Ü\¬V ÊܽlUUæFì«ÄïšÏåLžÓÙÝÍÄÄ$©©)d¤§1ëõ‚$¡¢Ò×?@zz:fÖëeeM Ã##È’L8¦§·—²ÒdYfll§Ã×çCUaËw084Äëo¼EVf&))N"‘(¥%ʼnîtUQ‘%F‹ªªD£%Þ/²Š¢*Äb ª¢–’B{G]]ttu’’’‚V«…¹±6[]ÝÝTWUb2÷óç{æ·«Óé0\mjB«Ñ Åà?AáK³dW¿$I9Âé³géééaÆuܱq#f³™ñ‰q._iä[ßx^Ï‘cÇ©«¯Çb±°uóäææÒ?0@o_+kjp8ì4\ºDßÀ6[i©©Lº\Ô¬XË办KOgtlŒ•+V`4hnnᣃijjÁb±ðèÑât‹Åh¸t§ÓÓá ­½ÇCŠÓɆõë‡Ã465QXÃîàìùóôb6™(/+ãø©S´¶µ“•™Éæ;6qùJ#£ccTUT$p[G;­m´´µ244Lvv~¿Ÿšêj|~?ÑhŒÂ‚|\îø~ädg㙞æÂÅ:Páá  c6›)).&55…«MÍ\¬¯GQT’mÉD£QN¶¤$ ò󢤸˜ÊŠrοHSK3CCÃlÞ|ÇõÄ€ ‚ \o¾«_:}ú´ZYY¹äÀ1EQ…B‰.òù.ó?ù„®î~ôýï¡ÑhˆD¢ƒ C"ß°¢((Š‚F«A–d‚¡±X ƒ^Ÿù>ÿØÝüz¯¡¯ª*‘H„h,†Ñ`@£Ñ$ÊF‘eY–ñûýȲŒþšuG£1´Z ’$áóû‘%)ñy8! a2™Ðjµ‹Ÿ4 >ÚþŠ\’¤¹1Ÿ>É0ÿþü{ó?G"4 &ñìÿüçÑh”`0ˆáº} Y–Çb~=CÃÃüúw/óÓÿˆœœl1¸OAø“I’DkkëïŽ_–eL&S⵪ª„ÃaZZÛØ´azŽ˜¢ ÓiÑé’ýî| UUuÑ3ðó“ã\l¯ýy~½^þšíÏÓj?-ºÙl^ô{:ݧŸ[®ûÜ ×/(ÏõÛÁ{©2_›jqþÿ×vÕÏ¿¾þ$F£Ñ`±X­ïÚrH’DKku õLLº(+‰÷ˆ /‚ |þ¤´¼÷íÜA~^±0“ß­NUU²²2Y[…,Ëä'žrA„/êü:ŽªÊJŒ¾"öädœ &ïA¾\Ò¿D_­ù™ÿAáË–ü’xfLAnyZ·ÛMkkë.‡ ‚ _1·ÛÍÿ‡°Û.SŠ£o%tEXtdate:create2013-08-30T12:28:19-04:00¯Û(%tEXtdate:modify2013-08-30T12:05:05-04:00xȦtEXtSoftwaregnome-screenshotï¿>IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/transition_to.txt000066400000000000000000000011351330160122500244250ustar00rootroot00000000000000This screen shows the SELinux process 'types' which will transition to the '%(APP)s' type when executing the 'Commands File Paths'. Under SELinux, when a process running with a 'type' attempts to execute an executable, one of three things can happen. 1. The process can be prevented from running the executable. 2. The executable executes with the same label as parent. 3. The executable 'transitions' to a new 'type' based on policy. This screen shows the executables that transition to another domain when '%(APP)s' executes them, and the 'SELinux Application Type' of the newly created process. selinux-python-2.8/sepolicy/sepolicy/help/users.png000066400000000000000000001604261330160122500226500ustar00rootroot00000000000000‰PNG  IHDRþšah¶>gAMA± üa cHRMz&€„ú€èu0ê`:˜pœºQ<bKGDÿÿÿ ½§“€IDATxÚìuxW×Àï[ÏÆÝ]ñàîPZê¥P¡F[úÖûÖ¾z©»RJ§¸»C!@ÜÝm³¾3;öýqɲ$òJÌïáá™ìܹsõÌ•sÏ¥¥¥…B!ð€@BBBBâÆBh2™ ƒ‡‡ÑÜÜìéé ¡$õ%$$$ndA(**2„L&‹‰‰çùžN•„„„„Ä¿ŽãQQQ'Ož$Að?ú†ˆ"†aÎm]E«`ÊdA,Ë¢¥MÀf£I’AE×Y‚ã-B»å^!—£cgQQ” Š ã+…âŽï„Ó-pÉyC§[ÿ+¨aÃ0™L&ÇqæÖަNˆHÍNâßÉe–ã–­ß¼óÐQ†aúÄÅ|üúËSN|¹èw…Ba¶Xã£">y㥧Þxï•'íŸ<˜ž±yÏþ/ÞzU&£DAÄpÜn·dÅØí8Žc„Š¢ÈØír™LE–eq £íö—>ø´¹µ >oÎ}!þB‚ 8–5[­ÿ÷ù·O=p_nQIieõÛ/0ëÇ%+æÍ¹/$ÀŸ±ÛQ”SÔÁãi9EF“ùÖI㎜H_²v#I‘îZ—ùÏ&‚$ˆãé¥UÕÃôýzñŸ¥•ÕnZ­¿÷éìÜ^}A©¿ýÅw¯>ý˜§»+Àj£‡êo¥é_–¯Î/-›0rÏó8†mÞ³¿¦¡Q×®øž;ŸH¯¬­#IÇð^}a뾃UuõmíúÇfÝMÓôo«×{y¸×44¾ôÄÜºÆæ#iégNžöíïË‚}}â¢"œW·$$.¡ÕfÚ¿¯Ùj]¸|5à‘{ï1h€ÕjëªLÖú%®šaBƒ¿ÿà­C©'8¹yÏþ_{‰$pE’ÅŽ"E’A{¢ ̾}†§»Û§?ýÚ'.ÆM«¥(R¥Tò‚0eì¨ÚÆÆ×>þò…Ç7|¨Él& íØhšåøùÏîóâ{ß}Ë”[&Ž{îÛ÷Ö¨”8Ž2ÙÉ3Ù…eß¿ÿ–«V!|á½OgåjÔ*?¯I‰“IëB²,ëçå9"yàÞúàõùó Og刢8|Ѐ¼âÒƒ©i'2ÎBF tÿí3æ½övAIÙ¸áCÒÏæK?½ûð1£É<çÎÛ¦óòŸVÖÔíOI”ÐÔÒ¶vۮן™çåîþæ³Oøx[¬ViëXâŸ!"†aJ…œãy …\†a˜ ˆŽêv³ÖßÓ)—¸‘EQ&£J**óŠK‡ìO‘Äç kÕéDQT«”³n»…±Û1ívPUW¯R*q ÚhQDA1)’ ‚ĉvƒ¡´²º©¥UQà&³J©hÑéì ƒ–þ6šž{ÏñÑQ<ÇYiZ¡74·Ô76Ym6WÕF76·X­6^” Çq•5µZƒÆMërçÔÉË6lV+•“Gpî&³uøÀþßðö > +7o#I²¶¡ñ«EŒ9,ÈÏ×α¼ bbh5šÊšºýÇO Ð/ÐÏWE6µ´Ô542v;Nà$IZ¬¶„˜ÈÑC1v;Ïóv;ò¬Ô %þ‚(*åòã§3.[õȽw._ !6 ¿•¦±.kýç4|ÊZO'^âFFE`[»~íö]KÖn’ËeßsGtDxeMÁhš÷ú;«5.2üý—žÕº¸,]¿B¨TÈ'Žæ¢Öˆ¢ Ë!¢0 >hÀ7¿-Q«”aAA»+©¨úî½ÿûbÑï¾>SDzÛY Šj¥Òh234m¥iµRùØ}wÿ¹nã‰Ì³}ãcïš>¥¶¡ië¾CÞžrŠJŠ‹™2fÔKVqߌ©ã†Y»}WskÛà~}h†Aé—É(ŽçÉ})’ p‚$I:"4¸´¢ÊÆÐanA4Cã.ðãîî®!Á¥•U6š‰ ž2fäKVæ–´êÚCüï˜2q×ácmíúI ±áar¹ (ˆR7”øçpçåî1ÿ¡9Cú÷R$éîêÊó|§]ÜóšÓÇŽ4h˲’†Ä¿Š(ŠŽMV«B&SÈdŒÝ.¢Îë´ -û šâ9íÍsaQÄ0Œ"IšaÁβ2Š¢H’aY»ÝN‘$zM¯FºnŒU)åv;‹Ô „@2¹Üj³‰"À1¨V*ßûæGæ¥ys FR3E½B <÷‹H„ Š:ƒQ­Râój”´è¤3ÕJ%ã,Ë*•Šªºú÷¾þáåy ì“ÔÜÚj±ÚÜ´.Ž "À¤Î'qeˆ¢(£(‚ ,V+@©Tpo·Û;ŸgEŠ¢233% ‰kÇóBB!‚ÕfCúïN³QQDƒœÙžâ"¢(â¦iÇѲ¸Œ¢DQ´Ò4arŠâ;ÖÊq§£aš¦1 ³ZmH¢hµZqEAF‘gòòOgç~öæš]ð!„@Q²í‡AèéªåæÍ(‘ÇA<\µÇÉeÔ†{ÒΜ…Kî›n4ÕJ¥V­æxeY¤Þ'q¥Ð #Ò4Òç1[¬°»órÖú%®¢(:v2»mx<ßMSä;‚9îv²1à/Ü íj„\E€~E±KžçEp1ìñûï ðcìöްàbýGE{—Y”HQ‚Àl4=eìȸèH¥B̲@§Õ.™e ‰ÀyS(€îôÝ(wJ >79;ËÆ„…&ÅD›-–«Õ#AP+•by^ iH§v%zŽ 4|¤m^ ŒÝn£Ç®b§à8ÎIJ Ã²ÔÝ$zó>Ò‚„„3è<ÁÕ³“¹ ‰áü¨Çqd’Pš„ÞðôvéÓÛÓ¤¥‰žæÑOQ”´ÖÃ!D›½·¢‘ùe'`ïÔ…E‘çù^ýé’èíœßæmmk=›}V:>~c!d9Öß×`0@ô„’ŠAÌÓÝS©TÖÖך-fЫ„?PE¹LæëãK‘”$ý%z¢]ßáîêÎñì]ýIâòHdKkKiyiߤ¾>>>èlmO§ëH?:ìÚÐØP×P×ÜÒl2›z:Qÿsú8†Y¬–ب؞N‘„ 0 S«ÔjµÚIÏXâFƒ m£iÚÓÃ)tõ"ÑDA.— †Üü\ \&7™Í<Ï«Õ*½Þàêª5›-A$a6[\]µz½A­V±,ÇqÜõÆ`0Êd2JAéÚu‚ à8. ü%®Èí]WЀéb+:€ï ÷®K\Q1ˆ ‚ ‘ã¸Þ¸¸'ŠçRŽa˜(ˆzƒÑÓÃeÄÛË àîF¡ ¹àåé PÈÏ=Þãa<=<Útí$A*¢§ËRâ†Bh0Aèf,'Š2¹\!WtÛåÏ5ÄÞ5”øŸè¿Þª!ƒ6xQŠpss…Ä!~Å_+ ðñöê]‰ëd'//W§oS)Uýú¼Y€ÙlNLìãæêÆ]è« 8D§}û'׽؅˩\g;6]o¡ ô§ ¢pürÌ%bîLÎ¥h³Ñîn®¼ ÀŽ& œ=§:¾;g🩱9—Òe¦¶k A´ét$A*ÊÞøé•¸AͲM×6dȈ‰,ËaÖážò<ïíå}úô©vÎËÓ»ëz>Ñ5:EáaµZ …@Ó´´t=ÓI$]BB9†ÏÇår¹ÅbùÛø ‚tj=HÎÊd2¹\f4šÐ{r9A’f³ù2SÞmÌÝfÙ4†8!£(ÃÑ$F¥T.Š€¦i^à5j ŽcB–åìv;I’4C@ 8ÁqÜåë5!Óÿ$I`Ž\]S ´Ûíþ/ÚQ"À ¦Q©¡4„’¸ª Q…Ýδ´516Ã1ˆa Nàqƒƒà"^ºœ#’QTyee»^ß¿Oa^~(Šñ±16š†¢¯Ê¹}B1 s@×èBúN\KDQ$I`·ÛQ- ƒ]§xH–Óê%ˆÖ¶¶’’ÒäAñ8× ªYy]]=¢··7ŠÓQõE••——Œ; “Éróó›š[†â8C€¢B¯pžJ(Šª­«ƒtŠÙyj‚æç| $HB¡P Dâž›—_ZV¡Õºô들֨ÒN¦›ÍŽç¼¼¼BC‚ëêêc¢£0 2Œ½©©ÅÇÇ vìpcëhº4E€BÏm*‘"©††F³Ù ¨©©E1$8ˆ±Û!€ƒB4A6HÑ5¢óÀ"€D!qÇ0¬—žH¸^¢(â8.#e„LŽã8ÏØ1'JÚl¢H ^|rèA©RžÎÈÌÊÉ’œŒAxèÈ–e‡ D$I’ MÛhZ­RÁñ¼ÅbQ*”L m6Š¢p§išfIú_3poÓé „žV«U©T¶¶µ\µÚ®‹ËHª ‚ T(ªkj~_ºtÐÀAd¥P(D Z,V–eU*ã‚$: !ˆŽŽfívˆj¬R­þbú?|A”Ëåµ ^ …\.okÓ­úkMcSóäI†¼}ç®S§3è7sÆŒCGåä³,7qܸÓU55S'Mп#Iÿk‚ *•rå_{V¯]»è§bcó Ÿ|æ?s|ðÁÙ³L&s§¥|$÷ѱRõ..èoEïÝ@!—Ïœ1ÃßßoÏÞ}ér™|Äð¡®®ZQ7nÞ\ZVÑÔÜ<|è‰ãDZ,ËñT¼ÀŸ[‡Åv½A!—Ó43~옰ÐÐ>ýò—_ÿ0šLJ¥B§Ó-_ù×÷?ý’z"M©Pð|èÐÁɃ~pN\lÌö»îL%®È2V«ùþë¯B‚ƒ˜ûhHpð÷_å¢ÑtsPžóÃ,t þI’”Ëånnn…EÅnn®÷ÜuçÜçètí›·m4p`ò ‰ E¨”J¥B¡Q«'9l¨‡»»ÉlFÚ5Äl6Ûƒ³ï/,*5bDpP0Ú-)-++/Ç0L¯7„†„Lš0þÙ§Ÿ*-+Óét‰qñÆ{`ö¬´ôt¹L¦VªPÌ#†ñõõÍÍË7[,÷ß{ÏÀþý|}¼‘ÄwLV „”ŒruÓB ƒ8ÔhÔO?ùØ‚÷߬^»^&“¹»»?ûÌÓ¾û֔ɓì¬]&“i4F£T*µZ‚$""Ââã"#Âm4-“É4.¥Jéîæ&üm3¦1v{uMí½wÝÁòNà8 ¢È ¼ÖU«uuÐ =cú´¨ÈÈ}ûÚY{UM-ËÚ‹KKµZW Çe2Yß> I qwÜ~[dDÄþi†!HBÀËËC«uDiT$qU£iÖLJ9ôÌ” ·Î},ì©§OG…¹ß2­Íd"pübz Ø…‘@š¦ããbËÊËV¬Z½qÓæÔ´“‰ ­­­3¦O¥iæÏeË“T*å°!ƒŸ;7)!¡­­Í`0Øív]{û-Ó¦ÙhzÙŠ• …Br8wÍ€Ò4£TÈ?þà½o¿üìãÞS*äÛnqÈPQ^¨¬®:|ôèÖ;T*¥Þ`X»~ßËVxx¸O›2iïþýÇRRŠKJ €&³Ùjµ™Læöv½Él6 |Çþ>Í0ƒQ¥R-úñûÉ'èt:Q>yêÔ¸1£iš¡]ßž“ó׺õîîî5uµÛvìì“”H3ŒÙbA1›-––ÖÖÀ Š¿þö{Æ™³F“èø\!Ñc8Žá*…*óÌÙ~Zt6+›a/O/ÃÛÚt§Ng;žZXXVWWwêtƉ´ôººz›•fYV¯7p,g2™yŽS©TEÅ%yy¥eår¹bÛŽÝjµÚßÏï¯u” %<ÇÇDEÕÖÖoÛ¾kï¾99y±ÑÑ­­­£GçyaûŽÝq±1 …²ß¾wÝq[lt´Ñ`4™ÌV+Ý®kGavìÜ­R* œ`;Ïñ.é’¸Ê@Vš`9Òhª),l.*R»» íí†_B ãwÞugpP°R¡D³iŽã|}}#ÂÃ2Ïž­oh¼õ–écGµZ%+Ð×äd\&“õï×OE;ËvZâÇqÜj³¶´¶ø MJAZZ[›šJJË"Â#Æu<5$‰ûï½'6:š$É´ôS5µµþ~~ñ±±ZW­»‡[P` »›MÓ±ÑQE Ò6ZëêÄó¼(ÏAÇŒÙÒÒšWPØ'11$$øÈ±”†ÆFáãsnnnÙèPcS³¿Ÿß}wße4™|¼½ÜÝÝQÌV«µoRRÿ~}ÓNªª®6ÇEnx1 ³Ñ6“Ù¤T(-f‹F£ ÆòÊÊššÚȈˆ™·Ý"ð‚ÅbmÓµ76·ÂÃÃL&s›®½±©ÉÕÕ588ÐßßÏÅÅ%4$„eíîîú÷«­«¯¨¬Šˆ‹ŠŒ¬««›2iâ JJË"#ÂHŠäyÁÛÛ+<,¬¨´´½Ý0qü¸ú9šâîî6mÊ䨨H ÃRO¦ëtí!ÁA”Œòp÷ (-+?|䘛›Ûm3¦+ ÇÆN$„ÀÝÍýb;o—(ŠAVWUFDÚrrðß–ÄÆ'pv…2¶º®tÙ²øGmjj„zxx:ëûá8ÞÔÔ—¯\>bø7–cöÐår¹R¡24m±ZU*%v»fæœç_³™¢(¡ÅbQ«ÕŽ0Òo€†Æ]•k‘‚fk[k^A^ò€d–eA‡F°V«EàÙlA­V ‚h6›†‘ËåÞ^^o¾û^`@ÀS?Ö¦ÓQ‰”å]\\Ìf3†Ëår‚ Ìf3RŽD+H6›M¡PQT*•Y99 ýí“ß—Ëå‚»÷œÎ<óá;o3v»ÉdR*•H;eÙs1›L,Çøû9–²låÊÏ?Z`g9D’$õ}m}­¯·/Çq8‹‚¨T(J%šÊF›Öb„Àn·[­6W­YOcìŒ(ŽcI’2jµZ†a4 EœÀÍf³B®°Úl¢(ºh4í=š(‹¢(—Ë”J„Àf£QS' B€¦m4͸¸¸!ˆ¢Éd’É(¡Ù|>Œ¶Ù;Ä Ï È|[DXIJ+þWŠ  …âXÊÑ@/ùð#¹»»êѹbK‹î“Ï}z(|ÚôS§N’”,*2Êq6 ÎÊÊêfú !´Ñ´ÕjE€aÃ0tB©ÖaFÔpqG'¿:…‘ä~!üÛᤳ‚<˲Hd£­V«E’ Ã,]±²¶®^ëâ2iüøú†Al6R½okkCá!„V«=޼ý0 CÓ4†ah{Öl±ð<ã¸Éd²Z­jµš  ƒÁ`¥iÇM&€Ðqø¶µµU¡P=~<íä)«Õz÷wwìR Ãg­mº ÀŽãh†±Ñ´ì8 kow”†aHÏtœ00Œ¢(«Õ!À f4(f£É„†/ºv=Aœ/I–åtºvD´cl³Ù¬gYH’´X,‚ BpG®w;…Áqœ"ÉÚúz¥BI„$ô%® †Ùí¬Õjá8N%—',XPWZÚRQIbXØ×_»ùú¢][»íöñnFý7Σþþ}ú³ìeU4M3Œñôð¡ëé°ÿéí‚(bC\ŽõžçÍ‹J¥R)•h´"Š"Iz£¾¹µ9À7€eYŠ¢@ljbÇ‘&ãt!úÞ8>rÎaQÄ1œçyÇЦT—0@ Ãx^¸xx^¸Ä»a@½I"™ì—¸*ˆ¢XP_[WƒALR&Ã1Ñn·s, 1Œ$É„ø$___‡ÒÇ¥Fý70hQèrä¸B.S*4MðýÇ/Å EÁóùÞîÃc˜›«« ‹ tçm^‚$ôFN<Ïq¯PÈ F£Z¥²Ú¬†n¶XÔ*•Ñd’Ëe‚ tÆb±ªU*£É|‰0æË Cÿí»ÌZ¥T667ûx{aÖKäHô „qqñÑÑ1èOt€9b‚Š@D+Ývy è-›$®Ç9Ž»Ì=FÑÉ.ÛÒÙ¤Äß}{зYøéxˆ¢Hà1JC‘#ˆ@ä)’IR4Í`#pR¬E‰&3“œÈ]al$Iy{zÉer‹Å"Ùr¸Š@‘—‹q±A\º|騑£<Ý=¥Ÿ´àÓØÔØªkÕj´6›­—=!‚ ÑhrEKk ERH… ƒÇ9´À"Apç9'p×EžÇ0ŒµÛ]´Zw7wiµG¢§8¿à£T(kjkêê®PH­ùziFùùú™-f ö2’È7¯Œ’A ÊòsÛöÉÏYc¾ðÏnìÙ0NP%u—¸ üýü“’’®PBxÁÜ\â:)ö £¿*¥ª§“óáy^äD’ )’êé´üœ-’JHô,„C3á‹~¤&ØÜÚ,¹x¼>A–g\µ®hfÖ{0ŸwÆÒ;§˜Rï¸~¸Ò¡:„㸪š*—†3×)Âööv†aü|ý.S½ç:çÈ‚„DÏrE¢-_ê-z â#£» pîBêª=2ÍTYUéëãÛÓi‘¸.¸âzAP)U2™Œ±3ŽýCA! ŽcçEËCi°ÖCˆ¢¨T*‰Žs¤Ý®–HU#!qSqöfá¹5XˆÁs&A”“8/Š%  #häx˜RË ˜$b®9çÄ:ˆbD‡ zÈ ~/]@—øœý[>¯»v à9ù!Q!#jZ-k5¶5³<Ïj]Üô3’½\”Çßkͽ GõAˆqWSSM3´s™LîïçO\h^ÆÙå2jÈ&Á?H€ tø‹¾¤!ç ]G»ºDxgôÎÚ–ÝzªÁ$ßè΢_¥R!mäP›Àq^v»$IçQá_ ˈŠÄ[MôW+ šŠši}–’2Öe¹ö>~…ÁòÄ-‘x‡¡‰kì@ÅòŠ2ww÷Þá÷Ú[šË+Ê¢¢b sÈ*ŸZ­¶Ûí8†$é°ëð?%@­Vó‡\L{vë7˜Àqœ A ‚a•J)"¡¦A§†€(Š2™L¤æN®Éd2ŽeŽsvKÐ…R©`û±×-!q%Y€cÙw^ƒaì,Ç0`èà䦦f“Å Dp×í3kjë\]µA°,K2±‹º†cA‚Ða5È(|û±Š²ìz±dÞ£CFŽ~øhÚÊ•BûNÍUMI1Ó¬´ìsíÁ1ÜjµrílÁMŨÈèã©)V‹E£Öð/Š"E’•UU¿/Yj2™]]]_~þÙÆ¦æS?0‡a¤Šä8ºFÓà4]à8î©gŸ›>eÊ­Ó§±W]]óÙW_¿ôüsáaèŒ+ÇqBQ´..™gÏž8™>fԨ⒒)“&þ¸pQeUuLtÔœY÷A)Šâ8Î¡Ž¬ÕjýýÐqcF›Íf¹\^ßаbõ_m:‹Fsÿ½÷D„‡£†ãDZ,ûå·‹fÝ}·¿¿:Èâø0ôtåHH\k0„Ðn·745Í{ì‘÷ß~ëöÛnªÔªººú¦æfša>þü‹¬œŽãdEÓtMm-2EËq‰kªo–eùî`YÖaÄ Ã0³Å2ç¾{ï½ûÎõ›7?ûÂK%ee‚ÐàÏ?ù811!#3sý¦M?|ý¥\.;täh`@`Jꉢâ}»>;7÷ä©S ññ2™ ­ Úl¶'{<õÄÇ_|ùØÜ¹jµ¦®¾a͆ >üÐÿ½öê±ã©+V¯.+¯øüã?8àÁh0™ÌãÇŽîÛ'é‰GçM¦eeg6ìà‘£'N¦ïص;6&æ‹O?пŸÍFc F/OOžL&DZþ~~£Ñ`4N;ö“Þ/,*nii…*äò>‰‰GSRêêë“âŒ$$n0€7Wí¼Çy㿯 <˜ãX…\ÁóEQr™ÜÎÚ5j5Ä0£É¤PÈqæÉyîîBooo¹B:T<1 <ß-ÉÁ‘ä‘´†ÿûðä‚ÏRßûôtu«@•ùi;‘_‹žƒ7)¢(p‡=Çû‡>ÇwÒ®aìö©“'/úñ¥R±eÛvµJ%“É€(j]\ †éõú?'üü|u:Ýø±cöI‰9¹y••>ÞÞ ‡Ž4`Žã(Z7W-ÇqȨÚèQ#u:Ý’+û$&z{{Ik>7!>¢h2[ F£B¡P(Ç[¬–¸Ø˜E¿ÿÞ7)).6ö³/¿~é¹go»eúŠÕkÚÛÛ‘*…Åj¥m6éKthù°<ïãáúå[w}µxoÖÙÚ3…å!an-¤¬%Eyª?~ÿõ‰yO1 #ͯ¯1@ ËÚIŠÂ1üükQÄpœåÎ+Ã(Šüaá/9¹yAV›múÔ)õ 6› @h³Ùxž¿ëŽÛ?ÿú›ªêšªêêùO>S]]ãíåu×í3üeј‘# ƒLF‰" iÚd23šå8;c7AAÉ|øég*…ÒÛÛûé'ç½ýÞo¾ý®Él"p‚ãxÚFsg³Ñ¢(êõ†Ñ#Gäå455S)“QÓ§Nùqá/Í--g³²“ „6›-!>þî;ïøèÓÏÃÂB«ªªÇŒ5|ØÐUkÖ°v»(ŠèãøêÛï?zïàà 5ë6,ûý7›–š¢ÄM<_]]€4Áp¯ª®ñôp×jµÙ99v;Û')Q&“é †Ó™J¥"0 @©TZ̵Ze2™=½<ëê꣣"šÎdei4š>‰ înnEEUÕÕÞ^ÞAZ­–ç\./+/¯­«óõö‰ŽŽâ8¶²ªÆUë¢ÑhÊ++ÃBBËÊË'4åøÊ¿Ö,üá;»ÝÞÓ5#!qípØë‡ÇŽëÛ·¯ÝnWÈåŒÝŽÅ848U*RæC Ã( ™Œâ8ÞjµR!ljnÂp,48”eY‡@B ù¶F ¾‹å¯Õ«üüü¦ß2ùìéB¸Y@åŸWÄó|~AžÑhDŽ!„‚ h4.ñqñ$AN¢Ÿ"IJFA‘J I’AÐ4œâ2 #“Éä2™¦Ñ'_FQ¼ °,+—Ë5gÐ-Ô´PÌ2™ ­2©”Jˆa‹yEGZüèro‚¡Œ¢l4M’¤R¡àÁf³q§P((ŠâyŽaìÏ£)Œ r¹\FQv–EGärÇñ<ÏËår†a‚ Ið÷|ñàìûÛõú«å‰LBâú§ß¼V伩Ã'òÄm4QF†Ùl6›ÍÀ0Œ¦i’$!€t>r‰¢b9ˆç– Åc?ôI$¹-q¬õ£A÷ ƒ‘"¦h†.TogìvšaÐãHû}ÚÑ0]8kÇÛh]Ûl6ÇQM a£i¤`¶XPTBžç #èhEè¸j„èq–eõ¯vn‡ÎïÂ0Œa$ôÑiú\¬V+†aŒÝn·ÛAÐj]† l£¥Õ‰›”ó¢ß¹8÷¥‹ý€„ÈùoÇùþNÛeø…g/ív;„Ç%§.×d8}žEQ´Z-]Ãt•€Î"ÕùOÇ8bèU§_°nÛÒ…±u}üb¯ûÛd;‡G¯Æ0lþ¼y<Ï;ŽûJHÜl\‘†Š¢ˆc8Ïñ¤ºs‰ðÒ̺§`YtÈAiœ !DsIîKÜ´\éœçyFÓÚÖZYUIQ”t&þ:Bh6›]\\q…žNÎu$ô%nrÐaïðG!ôôð´Ùl<Ç©C]‡ˆ@뢥( 擸iqH{BˆÎÑ\É8¨T(%¹Ý" "/Hr_Bâf)pä–½±©Q×®Ãq\Ájx%Küû@éË,!q“Ïó©1848À?@Z–¸±AŠÚ-m-„¶©Ujw¿wÅ%!!!!ÑkAB¾M×f2™ç£7=0‰k r–"}ò%®QÑÁžNÈ¿:XÞÓ©¸ 8ùj…çÝê:D€cñé€;¯aÿ³]bçx:Å)qmèÖ‡í¥k¿Suÿco·¢í6€t¡ÑÕ}¦c4y1ùàs‰ŠEÁá ¤WÒöþ§»Íš#SwÓ]…˜#ƒÎ·ÿmÉü« 7v£×ßÕkv§?;¥õ÷ÏnO]J\Kºê]ºö/ýçåó·Jrÿúypsh t»8Ü©-uv]¹Á!v±—^­¶çs·éÄ öA;L wßìv\u™¹¾º~¨º}]÷¢¿²²¢]¯S*UÁÁ! …¢¸¨ˆ¦iDŽç’tº6;k ‚_¤Õºò‡óØ]8¾ŠŽ a]]-ÏóÁÁ!€šÚÃüv›‡œè=%íI\EQèTžv»½¢¢ÌbµjµÚÐ0ŽãJJ‹yžÇð¤¤>åe..Z/O/€Íf+)-މ‰•Q2‡Ë\TéEñ|•9N“9z]ee…Á`DA«Õ†‡â8î<¤iººº*,,œ$Iç˜/gœ(qÕéh!"ðbrß!Q€ÆÆ†¦æ& ŠJ•*8(X&“ƒ.Ã|š¶•••âID')ÆæUU•J¥ÒËËÛQûÏÒåeÑQ1HU -g±ÓÑ/$ÎMË‘»KËQ³f0è+«*ÃÃ"4  ¶¶Æl1ÇÆÄÕÕ×ñâúõõuM2Š ruuu<^U]%A!Á!‹óä8}D;M»9—ü~\ŽÜç\µ\È‘£‡¶lÛt:ãÔÎ]ÛÛZ[!€7¯?tä@úéô”ãGYŽ=u:ýè±# Ã·_~~žÞ``ç\k` Ã&—ãÂ!îB–~âhÊôÒÔ)§N§ƒcaÎaœÒüàªâ(U¤›ËqÜö[÷ìÛ}2ýÄî=;YŽ3 kÖ®J=‘r2ýÄÉS' „»÷ìÌÏÏEOÙlÖܼ;sÎ(‚s¥ƒs®{Î×~§ªÜw`ïÎÝÛONß°q]ꉡ#½¾}ëö-‹¥SÌš‡ÄµÁb±°, À9‘jµZ8ŽíÆY>NgžÚ¸i]úé“;wm_¶b©Þ Gw«o÷ž]'ÒRëjkìöóvRýèð‚Â|À¦ÍÚÛuŽ1D{»nÝú5 C;Þˆä³Øš–rjZ›QÓÐ4Ü´¡¬Ñ4âtÆù«¨ª®úcÉoGX,æ•«—ïØ¹ ~* ýˆR˜}v݆µ§3NíÚ³³¬¼€ÎTVT”¯Y»êÔé“ûöïÙ°i½ÅjAyÇ:übÖU:çèÒûsf³%‰\³ÅÜ­öfçQ¿(Š™g2âã¦M½…ã8‚ ÁÛ»ï¼700mwà8®T(É Ójµ•U V›ÕÕÕ­_ßþ™g2¼½}üýüO¦§—”– 2L§k+)-3z,š8ÊerÐ!zä2¹L&VUWj4.ǰX,é§Òd2ùÐ!ÃL&ãþƒûX–õôðœ0~’ô¸*œo"ÆœÜì™·Ýѯo;k§HÊ ŠnnnÎ}\&“£Àr¹‚¢dè!™LAQT^^®Ùl2šŒ¡!a¡¡a'ÓÓú$õáx¾¤¤ÈË˧¦¦jÌèq9¹Ù´Í–œ<¤cÇ›0dð°í;¶Ž9ÆjµfdžbìöÁƒ“$©T*qE1íä ›Í–<(Y£q©©©.*.Ä0lèáJ¥RšþÛ ÞpŸÁ ¿ÿ¾9$IVVUlÜ´þž»ï v.ÿN«"€~ýÜ1ó.š¦ÿZ»êàÁýwÞqwsssVÖŸ¾}ûŸLO+*. ‹ðöñmim9rô°ÆÅeЀäêš*»Ýž”Ø'õDJdD´Z­‘ËäÙ9YùyŒ‰‹ïÛ§ÃqµZíXääd×Õט¬uÑO=֯ߵZ}<5¥ßE¥¥¥Êä²aCG¡Rª°‹“YYgÒOŸ|ð¹®ZW½A¿|Å’áÃF0肬](:1 óóõ++/kmmÉÉÍEiÊËerçóg³Ïj4šGç>.Š‚ \0U ~â±§jëj—¯Xb4X»=íä Š¢úõíÏó|iY ˲†8H.WdeŸmnn–ËdA¡¡açºCò`ZÓµý ‚°fÝj?_¿éÓf@ON?‘–úØ#«TêN+rݬy͸嶆ƆŸù!ýTÇqÈ–úŠUË>ûâãŸù ßxžCá9–M9~´]§«©®NM;ŽaØÁƒûŠKŠóóójkkX–MI=FD{»nûŽ­{öîBÖÒÑApŒ@oimk]¿q­^¯g9–eÙÍ[7677åïØµ P\Rìééåîî!A¸ZˆÂ3M7w·éÓf¤<ñÛï‹ Ðï4ÍüðÓwúáÊÕËÁ9]ŽsíÛh49vˆa˜ìܬœ¼žçwìÚVW_—yæ´Á`ÐëÛO¤¥ºi]KKK¶nÛ|,娋Vëxµ\&?xhÿ·ßUQQ>zôXÀÆÍë¬Ëúë Blÿ½y­­-ë7®5[Ì6­«©©áyYu–¸6Œ1º­­uã¦uåe«×¬Œ‰Ž NSpQz3úéœÑ@¹\ž”ا±©a˜›×Ó }4åHúé“Z­Ç Š’á8ngìAäæfï?°·¤¤¸¨¨pêtzss#†a<ÏS%—ËrERñ‹‚ ¤VFæécDz,»ú¯4C—W”eggµ´´œ:•NQÔ¦-š[š ‹ ¶ïÜF’$ÏóBGjû÷ Ñ¸¬\µ¼¦¦zåªåKRbŸNÙï”5»ñòôJJLZ½fUeUŰ¡Ã¹y(ðèøTLš0Y!—ÿðÓ·{÷ïAÆÑÜš Éæææï~øzÍÚU}ûôóóõ·X-8Ž×ÖÖlß±µªºòè±#‚ œÎHÏ<›™}öÐáŽÊH¯©­9tø`~A^[[ËÚu«»Ê}$œÇŸy&ãà¡ýYÙgwîÞ>lè0$÷;ï”8ÿîÅDÇ>:÷ñ{îžu:ãÔþ{ ‚à8îÖ3Ÿ™ÿ܃sF¦ÕÑÊš›¨Õ‚$p‚ ;f|hhxKK“R©Éd8kÔjŠ¢n™~kaQIQ#GŒ:ÿ:˜eYA<=<ÇŽ¯Ñh” e]}]ss“R¥Òº¸Ú¬Vš¦Ý\]“ Р4ß¿ZtÞš0yÐà§æÍ7nÂŽÛrórd”Œ$‰9³|æéçî˜y' †j@¸‹ÆÇ1Š¢âã¦N™®Õº¶µµj4.AP”L¡Pº¹»Ož<5åø±è¨è˜èXG´ÛíɃ†ÄÅ%¢ÓØÔØÞ®›0~ÒÌÛî`Y¶¢²\¥RY¬–ªê*…BáâⲜÀóãÇMôññ!Rúü_Ð ¸»»û܇mÓµýñçâýÞ2ýÖ®!»ª È:f‡µµ5¾¾~Õ5U&“Q¥Ri]´úööð°íàACâãìv†çyW­+ZÒQ*UÆ… HD â"£U*õða#âââUã¸L&GÍ©¤¤˜$IµZã¸Íj2xXmm͉ÇG A3t}}ªC’Øl6œ k%›=ë77·…‹~rss›=ë䌨ӊù…e‚ñ?jähÃâbã‚‚BrŒ’Q ÃD±ŸŸÿý³xô‘'š›šÖo\ :NÔó<çáá1eò4»Ý`Y–ã8­Õjµ3v__¿±cÆ÷ï7°¹¹© ° oŸþÆMŒ‰ŽµZ-•U …B£qáyÁd2uJª¬ð°ˆ9³<}:}ó– 3¦ßš,ˮ߸–¢(WW7Q]µ®š¦ ‹ ÚÛuf³yÂøI†æ:|Àjµ…°v;Çrv;ƒ–ÏÐÒ•R©:s6Ójµ ARŽ ²Z-™g2ôˆÒ¹mû–Í[6â8VQY~ï=³tº6›Íj·3ûöíž5kŽ»›»Åböóõsw÷„3™L¼4Ö»ªtÚšÓéÚ6oÝäãíƒá¸L&Ó¨5<Ï™ÍæœÜlФDQ7v‚( ™™§Fƒµûzû2 Ãó‚Íj£iÀl6Ëår ÃRÓŽËerš¶Y,–ÔÇ’JJK¢"£CBBÑ¢ªÙbV©TÆŽ(,,X·aÍ]wÜã¢qII9ªT*1 ‹|äÁ 3zœÖE«Õj-V‹¯¯››‡B¡ÐëÛó ò†:¼VÝ1óÎĸč¨hd~øÒYã9Îl6ùøcO¢ÕNäHbIIñ¡ÃÌfs|\ByEySSC``Õfõõñ£~»µÛí±1qÆß¼u£¿@ú©“ííºØØøÊª ;k7[Ìä;$$4#ã”Z­®®©î“ÔÇ‹ónjj NLHR*• ËÞ'„P…°ÐðûïÐf³FGÅ\lQ¿ãÎ;¢£¢ …£Ž-‹N×f2 48yÏó CÛl6“Ùd2›"""I‚¤išfh«ÕêîææîîîˆVЃl6›·—WbB® æ¢qihl˜4q²ŸŸuuUxXú*zyz¹»y´´4 ?jԘȈ(Æn¯ªªäaĈQÑQ1>>¾­­-ƒÞÃÃÃ××—a˜ˆðH´//­ð^l6EQ_(ßõ˜e×ӼΪ–ޤ8´qõO» Ó)}ÀIMµ«·CåK:ÞyÕé¼5‡Ê‡~4èî4¯ãOg}g}jp¡2îy½~°• Ç#Χ=œƒ£%tjŽ”ôtáÝt\ú,R§¶Ôí™ÕN ÓÎmÀq×¹9žr¾èVñÆÑžDñü‘ ®­èò'v›5Gø® \DC¿SøK÷”`“Ù|ðÐ~ ¡C†EFDƒËVsÿÛƒc„#®ncìöhr§_×Dü%ÂtJb·1wý³ë³W:ÒºÖ>à"µßuþØm¥wª}ç0ί趺;EÕéÔeOžÄ9PõuR~—Ü) tçðݶ±Nº¿KÛ€v¸ë{ÿAºJ­®û« »•÷n³ß5|·ýEÅð°ð°Ð'?Š"¸’.à,E»·á#qêßÑ]¥ª—¸Bnà¶Ô³«XÝ~®•‘aµZÇŒ…þt¸[bñ¾â8›ÐQ(ÃÎÙp~EW/ ×ÎÇ^¿8F÷Hùð»vçæåOš0þÌÙ,m{zÞÎC¹¿õ#!q3à, „‡ŽÝð`RB¬{ïéé¤]yÖòs½#'/oã¦-žžs|@¥Rõ¢ÃÌÝ;*ËÊÎI9žz>P‡Ã B ÇI3àð« ^àH Yc™uõ¢ q=;\d@ÛÚÚ|ú™Ý~Î :ƒaØ™¬¬«Wß~Û­»÷í+¯¬¸eÚÔΖ`ÿ΄ÄÍjHìÙ·ɲåÆÝwðàO¿,]¬¡õ.0 bߢâ’O>ûbà€þ ï|ðaO'í£ó¨ÿ÷%K ‹ŠJJËî¾óŽýŒÆ»nŸùÝO?O›<éTFfVv¶ÝÎF„‡Õ74@ˆ}ôþ»{÷ïßwà ð~~~vÆÞÐØðî[ÿ·{ï>oïÉ'lݾC„Ûo» ðÑÿ¿,þmpò ýú}òÅ—ó}ÄÃã}*oHPùWVUýµn}kkëìûîÍ<“µyë¶úú†7_{µ¨¤xó–mr¹ü±¹­ß¸©½]¿mçÎã©'|}}òò ÂBCQ$¨rÿXº¬¬¼ÜE£yñ¹g)ŠE UìMjK»÷î=šr\©Tþ÷Å:üðsÆúÖ{ï=üÀµZÝ»Þ>GSŽ;~<óÌYˆíz½Ùbá8¾¥¥ÐÞÞngí«¥]¯´´´ ‡¹÷î»róó_²ôÝÄÇÇ……†ö¢¬wÕ"‚¯OXHÈ™¬¬Ø˜˜!ƒ“‡$'[¬ÖÚººñcÇôMêãííæîæŠ.\\4‘>>>!ÁÁ¾>>®®®Q‘‘j•*44$ÀßßÃÃ}ïÿyò)McSSiY†a4Ãøûù3º¢²’eí“ÆOˆ‰!I²·Ö ê±ÍÍ-GŽ  }ä¡•JeTddsKKBBüÁÉg³²]]]'Oœ„jßÍÕµ©©ù\åÒtpPPDxxdx¸«V zÏðGâª!•“—7ëÞ{†ìëã–›Ÿ?i„ÛfÜzsÃÀ0¬´¬<5íäØQ£n¿íV•R9°¿¼‚ÂøØ˜¹=HàøõŸ»ÑU Ú娻ÿÀÑ””ï½Û[6=$$$þ :™S¾Î%ãÿš5‡¨ïY»”«t8MƒÃ0dÎSwRèáePHô#’õÙ¹¹£FŒpÄéìI8iwÝx§ûz/Î%¢Zs®¯s§1D¿Ð7‹smvr¦!qsâ0Œãø¹F"Šð†èïé§O ‚àáîþ׺uáaaºööE‹ËÎɉ¦(*%5uÙÊUz½^.“½óÁ‚ìÜ\¥JêÕò©ŒŒ½ûO=¦T*{ÝŒXâ€j¹ °péòÙ¹¹Éþ¸ð—qcF?òðC¡¡!.]6cút‚ zcc@i®ohX¾jõá#Gûõë»eÛvŠ$_{ååáÆ.þýäAÝÜÜ®ó¬9Dÿù ò²s–,_1cú´ŠªÊ“é§ÎfgO;ؼm{ccÓ/‹koo÷ññùðãOh†yãíw´.Ú¾}’HŠ Š"´4TZ^¶s÷nÀ±ãÇO΢ØÓy—è šÀnÚ²õhÊñ™·Î8z,¥¤´ôàá#%¥e€u6µ··öåW¾>>m:Ý÷?/lljzë½÷ûõé¨Ñ¨ƒ¢"#ÂCCÁ…µ"íä‘£ÇâãI’@2Þãã°×ÿê›oiµÚA´··›ÌæÄ„x@LT€°M×ÖÓÉü§¹ðÁÇŸÔ74Œ3Ún·×Õ×÷IJxyzº{¸×ÖÕƒŽ €ëŸ ß=6$yPߤ¤AýÈe2¹\îªuøúøXmÖÜüüv½¾ªºš$IÇŸ{f~YYYvN®«VÙ¯oà4ÍéîîpsuU«T ÃæµÄu¤;~üΙ·ÅÇÆöí“!Ôh4*• à_[W_YU]SW§×ë9–óõñylîÜcÇ×ÔÖzxxøûûìß?*2í 9j_.—5rܘѵHUà°×ÿŸùO•–•åäæ¹ººB«ªkF“ 5†ÞjÀO>öÁ±”ãJ¥R­R•WTA°Ùlîn®=Æÿ veû÷ëóÃO §LœXVQ*—ÉRÓÒšš›óòóï¸mFHP°\.›yë A† ðŸ3{Öüg_4`€‡»Û±””²Š _ßÜü|A8– T«TÅ%%Í--9¹y}’AÇ—S⺠ÖâãâVýµ6:2²ªªzüØ1‚ dž=ëåéYRRêããíãíqçÌ™J…¢]¯’œìãíýî‡ &Œ§TÈO¤8 ¿B.ÏÍÏ'‚¡™¤ÄD›ÍvÎü_/I\9B‹Õ4çþYóŸ}a@¿~3¦O[¾ju€¿ÿŸË– ìß_­V÷Rk¾È^¿B¡x쑹/½úš§‡ç·Ï|ñ¿¯&x"=ÝU«‹sV¹Î¹`­?4$°kïÞòŠŠÿûî¹;=ýÔéÌÌàaC†Œ9"5--%õ†aQQQ«×¬M9ž:iüøIÆ—–êtmñqqK–¯((,Ì+(4 S&MliiݽwŸ··×àäAÁAA@Ò½þ@5’”˜PS[{$%¥¢²rð AãÇŽÙµ{OUMMTDÄø±câãb÷ìÛŸy欗§§›«Ûâ?þ,-+»÷®»úöI :yê”J©Òj]þ\º¬²²:+'G¥TúùùzxxD†‡K›ü7 h ÁÚí«×¬M9~bÒ„ñãÇŽ‰ŽŠâ9nãæ-1ÑÑO>þ²åÙÓ)ý‡`¶}×®­Ûw$&&Ü9s¦¿¿Ÿ¯Ï†Í›I’|ñ¹g•J%¸îå[÷öúA‡î}òМÙH±¯§S+q-plOÍ{æ?Ï;8yP/IHHtK÷öú!„f³yÑoÔÔÖ’$yëôièw¤D€C?ë°ØîÐææy:™ø‹þŽ`7äY¾Ô jjkÿ\¶¼¹¥%<,lÐÀH%Õ¾C¯ya‚ð܎у³ù~§cì#UúMH'á€ZjH=´«•5©@;²Ö딘ϋ~QU*ÕÃÎ1›ÍèpV§ªrþuiÇ/]/º &q‚šl€¿ÿ¼Çåy> 5aüB%ýn7tº%U´èÒëo¤ÏGÖzýÈæ‚m^¡§‡‡§‡:ÐÛ»>bWŽã~¾¾ç½î—,%$$®„Ά$k<73RíKHÜ$týR·¿™‘j_Bâ&¡·.TIHHHHüc${ýÿÎû@"˜4Qø;mæÆ›V^~Ö.Çzñe…Eè4AnÿÝДD¿D÷t«Ôß©•ßhýXâ_ “$º‘¤?’ªçßEñà ‡~ü%Jàr€ [޲u–øÎEíügçx:½›çyžç‘¹mžçQŒÝU¤åþÙbC ¨ÑSŽÎ· H|‡¸Äu‚£¾P+t\;~‡¶··gž=k2™kjë²sr»V. ÜÓY‘èI:µ‹År:3³¥¥ ©žNÝÕÌÏóYÙÙUÕÕX—¬9K?aaQqaQ‘ãVWÙ)Œç0¢(ÖÔÖ¶ét C¸·¶¶ÎÌ´X,èAccSFæ™ú†$ñ-kn^~VN˲¢í¬Üy ½lÇÄÙŒ;èNÙ\èš§çìµ*±7*-V›-ýÔéÇ!Õ~ÇïÍ--ï-ø¨ß¾g³²323‡ë쟧÷ª9K\E$9g帾aÁ§ŸÙÜÒüÒsÏõöSâÎY£iúÃO>Õë mº¶»î¸ýž;ïä8ÎáîÂY0þ°ð—ìœ;cï“”øò Ï£0„d§0èÎÇi6oþiá¢I'¼ùê!„™g~üåµJe2™>ýhR¡üê»ïxžonnyò‰ÇF±gß¾#ÇRDQôôôxëõל_wÞ†„°µ­ítFæñ´4ša***Ž?]U]ÓÔÔìåé©ko/+¯Àp¬´¬ÜÇÇ»¤´Ôh4¹¹º;~üxê WWW­‹KqIÉö»(Šôöòª¬ªÊ/,ÌÉÍóõñ‘Édޝ_Nn„P¥RÎÈtwwëäØK¢§Eñø‰Çާúûû¥Lÿøó/(’nhlܼu[uMMTdÄŸË–çäæÝ~ë­6oñòòœyë Çã‚¢‚¢’ÒÒààÞÛ½%þ1çLèt;ví®ª®ŠŠŒüþ§ŸÃBCß~óu…B±låªÛo$Z/]ù¡izßg²²âã6oÝVS[ûí—Ÿ÷IJúîÇŸÆsÎH-„¨7MI ,-+_¿iÓâ…?ß2mê ‰ŠŠ¬¯o°Ùhww·¬ìœ]{ö(Šººú›·,þù§[¦Mýé—E!!!þþè™›»{ï^Qý|}£"#ÕMkkÛèQ#ï/øxö¬ûžyêÉòŠÊ”Ô´©“'2ø¶·¢°s÷žéS¦„†„ÜzËôøØØ¿Ö­›8nrÉÕÙ^?àlVöÇŸ‰aØ[ï¾—™u6+'÷Ç…‹ZZ[>ÿêkÀ¦Í[:T\RòÓ¢E€¿Ö­?zìØÆÍ[~ûc %“µµµÕÕ×ýÝJ¥ò›ïlniÙwàà—ß|WW_O3 prl¶è·ßÏœ= øô˯ÚÚÚ€dÙ±§Aõòû’¥,]&—Ëêêêl6aCc#ÇrµuuEMIYøëb B‚Àkë놱¡±tl%ñ¼øeñâ«V7·´rÒšÏÍÇ9óm,ûÂ_­©­µÚl­­­­mmãÆŒŒ9Ân·765õt2ÿ!h}û½9vPßÐPV^>fÔH@tT¤¯OÚÉô‡¯Z³¶®®~銕¿/Y*—É›› ‹Šú÷ë‹c˜L&KLL(*.ÙèP]}]n^þw?þÄq¼Á`Ì/(è߯/Žã2™,)117/€aXjÚÉ~ZÈq¼N× IR!—s<@«:C’&N_S[Ðh4€'ÓGP([·ï˜=÷‘A¸¹¹9¯Ä^ ú1 8°ß¬{7z̃³ï/-+’œŒaXQqIIiÉí·Ý*ŠÀÃÝ Õj)ŠŠ‹Q(f³91!áÀ¡ÃMÍÍ“±ªºº¸¸D£ÑLš0þ‰GAá6.\\4 …àîî& ¯âãâ” ¥ÅbŠŒ:dpDxø3O>éééM°¶®>1!!6&æÞ»îЉž>mʈaÃÖ{0 Ôjõ¬{ï™}ß½¤4™»ù@œ$É465ùx{{zz²,§ÓéËAdÕÓÉü§¹0°?«ÍJQ”¿ŸŸ(‚Ö6ºË 1>^¡P˜-–èè(Ç‘àF… Âk/¿4zäÈ«W?8çþ'}dpò ‚$uíçÂØív¹\Ž®·nß>{Ö½Í}xüØ1Hp;–’ä2ÍУ`gìŽå“/¿ùN&“Ýw÷ÝhH=lÈ/>þ(/¿ ¨¸ø‚Åyç¼qgµXÇó<ÇñÃÚÆýð“O1  æ8®¾¡ÐÔÔd4ãbc?xûíŒÌ3~òi ¿¿‹‹fÔðá_}öÉÈÃu:Ú[°Z­MÍÍ-­­MMÍša›ÍfsKK«ä¹ézÃ0Q“âßç­Ó™g>üøSZÝÚÖVUSxçýí,; ?»Ýβ¬ÅbX,“É °Úlç*·ù\åÚY{OgH¢'aYvîƒÜß½o¾ý^~AÁðaC×nØÄóü²•«‚ƒƒÜÜÜz©—V´©;yÒÄÿ¾øÂK—­Y·~ڔɻ÷îÓ Ûvîbhfò„ sfÝ÷ÒóÏÅÇÅÅDG}øî;gμýþÆËÍË/,*ÎËÏÏ/,7zt~AÉdööòÎÈ<#Š"˲Æ ÎË/pSPXh6›½½¼22Ϭ6ÚÈÕétƒÑbµ¸»»ûúølܼ…㸫ÿ’œ øøó/2Îd>ÿÌ3f³PßÐàêê:|ØP;kw|Z¸eojni×ëG –yölÿ¾ýH’¬ª®7f´Ÿ¯ï÷?ÿ|çí3âã]µ.'OÞ³¿^¯:dpYyÅâ?ÿ$IròĉãÇ---;|4¥²²²_¿¾MMMIôMJ:v<õ«ï¾;u:c÷Þ½þþñ±1ËW­ÎÎÍ%p|ÒÄ Êð=]³7/hž¾uûŽå«W8>eÒ¤Ø˜è¦ææ-[· 8'ðôS§ÛÚtááaÁAAz½~ø°¡¹ùù¡!Á!ÁÁç+wÏÞ?“ÙÔ{s%þ1¨ÒÍfË7?üp:#3*2bâ¸qC’“³rr~_²TÄ—ž¹~ëumCìõÿöÇŸ»öìõòôœ‰‰÷Þ}/b¯ÿbõÁØíÏ¿ôòÛo¾àï–ì-V«‹FƒîF’¢rù9å«• HŠ"„c5-Øl6úÞH\?8ª²Óï£Q¥Tv»!ßµr{:=Çq&³YëââXÑeF&“õtº®¢( •JuÎã4v»$É®-¿“`dYÃ0‡v#6‹ÅªT*PAým‡²ŒCK M(Šr< è0"-ˆB]]„ 0 \Ì^¿ã5ÎûïÏ8¾c×nÆí8#³û.#Œ‹‹ èØªE¹ªq¦“DE }i`x½á¨Jç6 Š¢¶Ë]+WªS ‚ Ü\]‡Î:~=º+BèÚ‘5$‚‘ØíÚò{“ èSá¬ØŠ D­V¡?/'L'7è.EQèˆ/úÅYiƒXPày¡Au͘ó P,±ÑÑý;\®Ÿ?ÉyaD—_£‹Aâ:¡SètÑén·ÏJH€+×?Dð%²Ö锳bK§§.'ÌE“qq¡z±/îߨa âãb/'×Ú—¥[é}agvä„D–Q:EÒm„ÝÑÅÊçßkH C#Üh4ò<cì ¢èôÍf3Ã0]íõ;†a6›Íjµ¢cYˆÙ‹„¹Xa:‹etb™ñqˆeƒÁÈqç‹Úb±˜L¦¿WîtëX‡ó—ŽLžKPKk«ÝÎøûIçwn0ç6X–­ª® uü(vØñÿ싯‹;–šôìü§Où^Bßßù|€è乩Ó-爾@ßÿôsLtÔ”I“G]þ×SûvôKKK«=×°Ó©goGçb"ì⣬۷_úT„ØÅƒ¼Ð¦#m6o>zì8E‘ó{4*2R¼ÐÔ»sR‘!Í[·557?ùøcÎ烮You”*Àf³}ùÍ·%eåj•êõÿ¾|ùpö“õëï¿?q0ÿÉyƒ“ñ<ïh¢Î…°}ç® ›7³,{çí3ïœ9Óq.8ÉÕK‡AÇiwïÝûó¢Å“'NøÏÓOêêë¿úö»–ÖÖàÀÀ·ß|ƒa˜O¿ü²¹¥•À‰W^|>*2rëŽÛ¶ïày~ô¨s|ð‚\8×–Ífkni).)5[,,Ë·¶µ¡ ˜L¦‚Â"“ÉøíÏ%ßÿôsss³ ¹ÙºQ@-¬º¦ætF&˲9yy¯¿õvæÙ3 ÃŒÆ“é§ [·oÏ/,˜sÿ¬#ÇRÜ]]œ3»“u‡v½¾®¾¾¬¼¼Óˆã¸¬ììÒ²2†aÏ™ímmmeìvä稸¤ ×ëOž:…A›šš32ϱ,Ëq\Ii陳Y‹%óÌ™ªêÐeêùÏÞ~6;»¤´ðûÒ¥ßÿô3²CÇ0Ì©ŒŒÚÚ:¡¦ëêëOÎhni©ª®Î8sF:œQßAN,œ7hPÖÚÚÊ0ŒÁ`¨ª®9yê´ÉlFé/)-ËWŽã²²s ‹‹¿-YÊqü²ß'&ÄùÍwÿê{¯ EÅÅg³²{÷H?•ñû/?ϹÖWß}gµÙœMcV×ÔœÎÈày¾¢²rÅªÕ Þ{÷ý·ßZ¶|eYy…N§Ó ȱAZzz»^_^Qq>ÌŠ•%¥eè+!Ôµ·§Ÿ: ¤'ÄÇO?Îaˆí«o¿ïÛ§Ïò?~§æ×ßÿÐjµs|ð÷_:ø—Å¿öï÷Ówß¼ÿÎ[›·nGÂÜ‘¼ Ì·¥¦¥½þo755i4š?—.?“•µ}Ç® À@AÞù`AiYÙž}û·íØYQQÁñü $«Ë7h`¸uûŽ?—/7M$ç>z´M§ë߯ßéÌÌ”Ô6[,eeeå•• cÏÊÎE Ëc¢£ÅWs†½¿à£-[·ë †ýûᇾýþÅ%¥ þ~~ï.ø¨_ß¾2Šzåõ7‡üÕwßÕÔÔ"K©'Nì=p€eY…BñÖ{ïÛl¶ŒÌ3S&MZ²|Åþ‡ ŠŠÖ¬[oµÚ–­\Õ·Ow‡7Ðþö¦æfw7·›·TTVòß¿o߯¿û¾º¶öÀ¡C‘‘å导ö† ð¿üö{[[ÛÞýššš À Px ÃRÓÒÞxëÚºº€€_AQ’~ÿsIVvÎàäA¯¼ñþ~+V¯Ù¾sWeUåŽ]»n™6mùÊÕë6l¬¯¯‰)((üæû‹Š‹K2xð^|©¼¢òhJJeU•J¥Úºc§J¥Ü±kORbâÇŸQRZr,5µ°¨xäðáŸ}õu]]ÝC‡ƒÔ*Õ«o¼ÙÜÒš››:8y(“/ݖϿќP×××GEDnÛ¾cö¬û|¼½££¢ÖmÜ8zÔH•JÕþ(Í?ü¼ðàá#Í--A‡œ<(!>."ÞÞ[wì˜9c†»›„pßC^^žƒ“¹h4©i'?øø“áC†Lœ0MJù¶ †lÏGD„/xÿÝ¥ËW`üøÝ÷¦¤,Y¾ÂÍÍuØÐ!ξÑo¿ï?xèÖ[¦WUUÏržä‚õF‚f‹Åšùà¥Rá¢QkTê»wgž93}Ê«ÕöòóÏ †ñcÇŒ=ºÓ"Œ(гî½gÚ”ÉÇ9[˜2™Í>ÞÞS&M Iˆ‹=zìXTT¤ŸŸ¯ŸŸok[›ŸïÌ[g(•ÊQ#Fh4š]{ö¤ž8™—WpËÔ©÷Þ}—Ùl¶Ñ6 ÃfϺ/(0àí÷>øïK/¾þÖÛY99Q‘b‡¥ª+yûä‰##"ÆŽ­Ó·ÏŸ7ïä©SGŽ¥<6÷á´“é[·ï3zdttÔëÿ}å±'Ÿž>mª(ˆ?ÿúë“à1 BÃÚUTdħ >DžTqG}Ãq4ò&IB @p×·Ož0á¡Ç?›z2í³jµZQ?øø“Ç™;$9ù·ßݸy‹—§çSO<ÎÚÙ?ùô©'‰~nþÓßÿ¼Ðh4ªUÊùOΣiæ‹o¾É<{6åxê£s>q2}ïþƒáa¡~¾~oü÷•«W77·§•çòq8ƒý7*po/ï[o™îááN34Ïsè!èµ[„¢ V«ÍβÇ ²X­\GÖH‚hmm=‘Q[W7gÖ,Lfó PTRê•8†[,–ÞðÞ‚¦O|ÇÌ™€•­á¸sQ9×ËÊ¿ÖL™4ñŽ™·9Ú•ón0Çóçž‚­@b¶fý†ÜüüE?ý€‚¹¹ºŽ52'/¯±©É×ÇÇó…nÙYÜÄpœåx€ÝÎ’$AšZ²,KQ¤a¬6+vzoÐjã½wݹà½wVýµæëïP(&£‘åXÀç_}WPäxµu–e¦{»üE¡8½7ýÙgC’“Ÿù¿…EÅwÝ~{Ú©Së7n?f à«Ï>28ù?/¼”_PðÃÂ…¹yyáaaAà†Ð ƒ,æB0ˆ!«¿r¹¼[ßÎÿìíϾôreUN`³Àó¼J¥ôôôxî™ùsî¿Ïh4’$P*•ÄpïêoDD²ãGçY?ÏqÈñ£ÝtW©Pò6÷á÷?úxïþÆ Ùð 7/_§kŸ:yÒ_zñÛ/¿H4ð¶·|üÁ{«Ö¬ýæûG–qæ¬Åj5™Íù……ô·ÛíAC@¿¾}Îfe; 0€¦éŽ0´s2EçããC‘Ô±ÔTÀž½û£"#[¶oߺ}ûg}(—ÉAà8.1!þ?O?ÅÐLaQ±s<ݲ£xï¸íÖO¿üêÕ7ÿÏbµ>7ÿiWWן~öÚÿ½ÅqÜ»ÿ÷f}cã†Í[~\øË3O=ÙÓÕ!q@]qíú E%%$Ezº»»jµ!!Á¯¼öÆûï¼¥uu­ª®@T*•žÛQÄ1I–#ÇŽ­úk­V«5™MO=þ¸\.G¢çàáà ¹bÄða€övýÏ¿þŠã¸Ÿ¯/I!!Á€ü‚Â/?ý¤½½ýçE‹q÷õñÑh4r™¬¦¶(£dsîŸõþGWVWÝ2mªcGÔ±¾¤T*²²s¾ûñ'ww÷+|»¿¯/I’CÞ¼uûO¿,zú‰'’.î™ç_œyëŒùOÎ{åõ7Îfeœ|çÌ™'Œw ûŸ^¼mFG˜³Ùƹý¶[^ôëþƒ‡l6Û[﾿àýwŸÿÏ3Ÿýõî=û0 ûüã••ï~° >.¿ ùÏÓO}öÕ×F£‰¦m®®ZäÊÑÁy{ý»ÝÎ0vF `9®±±Qëâ‚LÚl¶–ÖV///d̽M§ã8ÎÇÛ»§kDâªa4™ÊÊÊ5MdD8€¦éÖÖ6oÇsòòÜ\]½½¼ „v–Õ¨Õ&³™"I™Lf4™Z[ÛçyÞËÓ “ËžŸýðÜ×_y%yÐ@A †ÕÖÖ665E†‡»ººBÿñ§Áh|å…çyž¯oh@·ÜÜÜ8ŽË/(puuóôpW*•íz}cc£§§§«VË0 EÉp3[,Z“Ù,“Éì ÓÜÒBÄUy;pjØÇ••W‚‚ã8MÓÆh4)• €ÕfS«TµuuHñN©Tºjµ4MkµÚ¯¿û^×Þ¾à½w®+«kjL&s€¿ŸZ­¦iš¢(Š¢ ƒF£Á0¬ªªÚj³†‡…Éd2ƒÁ`4™ü|} ‚0ŒZE³Åâ¢ÑM&ZmµZ)Š¢F¥RQ4›-Z­ Jª( !ÁÁ …ÂjµUUWiµZOÆnoii!p‚x/OO$•þm»ù"áææ `¦²ª: À_Ý;Wùiim­¬ª ðó÷÷÷‚P^QéêªõôðpÎZ§Þ¨®©Á0 ÙÍ×µ·Ëe2¥R©7ª«küýý<=<.'LCc#ÏñAØY{`@†aF£±±©)4$”¢H›Íf±ZíŒÝFÛÔjµ·wSss~A!†aC’É;< {ýÝ»jqŒMœçŒÎöêÊ“¸®¤‹Z­ÖòŠŠ„øøN1ˆ>+žxú™7^}%&:º“iòN¦ÿÁ?jiÿìíð³_XTìååéáî~91tûFQÿ§|wÛsÿAÊÿ%:º®ÒvͲæ\¹«¬Ë s‰hÁ%ëÝYt_ÊUK×è þ—ù&‰^G×ïz§†œÔÌ»¶Nç»J¥21!¡Ó±ǵÁhœ6uJTd$pRj]Ž B§c%ðB×1þ¼Zow n:]wûÒnFÂØ˜è®]ºSàÔÑ.ýÆN¯î6]#éÚU;½ýZ¶¥®IêÕtʸˆ0ìÔª»­ÜN%s9a:5¹®Ãñ®m²küˆît]úÜU(щKTq×ë¿m'ÔÎa<=<î»û®öÞ® ¸–o¿Xœìêsü¹ø_ó{±¼_fW½fÝö]óÒmî.¬ÛŠ»œ0ûö®^¬ð%­|‰…Køø·öàÛš¦×3’è—èzö$ tQBBê7’藸鸔ƒÆ‹é8N;8”¸Á¸tíÁµª}‡‚ü5È2¸^÷$û—YHµã:雨µo.³^œ·—.V)—#‡ûF^uÝ©¨;™^vŽêR¢ÿ¢[Ã×ܬĵçok\+5Á UïÿÅ×^º=;^}åi¸|%KGÈ®²à‘\oBöÒ¦¶{5—ùq½œ`´sº-,¡³™G-CÑ#ŠúÍàËŽÐèÂd6ãîœ ôIÙºcçâ?þE°{ïÞM[·ö퓤R*o°Ã7!Î5(‚Ùl¦(ª«rúâ?—lÞº °rõš´ôô!ƒ“/§Yÿ­œêú#èû+Wÿe±XY ƒ—ç?{;MÓv;K’d'5êŽÞuî¯ôhÒ%ŽGœ{iǯ°ÃroZzú 9~"-"ýâK£É˜˜°Ñô?/ücÉÒÖÖÖýúÆþ²bõ_§33û&%*ŠÃGŽ~ûãOÛvîTÈa¡¡(d¹ó‚N !äy¾]¯EÑn·¿ýÞ…(“F£±]¯Ç0¬ªºfɲåÜ?«¾¡!;7÷éyóÜ\]Á úI¿©€Ò4­×ëµuuo¼óžN×E±½½Ýl6CK9pðà“?vðða^àû°óÁóçÌ®uŠÜh4Ú:,R¡‘ï¡s·l6€ ííí‹Vxž7šL™YY 𦑥r]{;Ã0Ý6¹övdÚ~Íú ¿ýù'èè®íz=2 ¡­MÇóÿF[2f‹°zͺãiio½ñšN§ûòÛïº&©w!´X,£Bx*#ãÏeËŸÿTHpл,Nª½B†¦õz=†aÍ--þåm3fL›:åƒ?iniqˆ{Ô® „Îa>ìãþºövd-Q¢L&sbûêÛïÌËÿ½þÚ¡#G׬[ïââ’ÿòóÏQùýÏ nînOÏ{üñ¹s¿ÿéç6Îy”v~Ô!¬©­ýú»ï=j³Ùêêë—®X™“›d0¾øæÛý2 “_üDÇóÇSSm6ZŤÄdû£YºbeVvN¿>}ÞýpR© è‘q‡Äåƒ*ètFæO‹¥¤¦ªÕªÔi[¶mÏÍËëß·ïñi¿-Y²wßF½oÿÁòÊÊööö“é§XŽ“Q²ø¸8çH>ÿú›•«ÿÊÍË2x0AàŽ!Òoü¹iëö¬ìì¿>ûbà€þ2™ìÍwÞMLHظyˆM[Ned œ¼gßþ?–.Ûµg¯›««‹‹Ë›o¿s"í䙬ìÓ¦mÞ¶}åê5‡Ž9šrüDZÚ¦-Û'rX~¿’·¯ß¸9'/ÏÇÛû×ßþÈ<{¶¹¥eİaËV®Ú²m{jÚÉýûååç¿úæÿeçälÚº5¯ `ùªÕ$IÆDE9ä5„ðä©Sï~ðáÑ”T?_ä"ѹ;¼ýþ^žk7l\±jõþƒ‡²rrFyà࡯¿û!5--:*Ê`4~òù—»öì­¬ªØ¿ÿ ¯¼zìxêÚ E êÚtë6l$2óìÙþ}û~õíw‡Žݰi³Élî×§ÏŸË–oݾóÄÉ“q±±J…âÃO>ݽwßéÌ3 qqɃŠ`W>Wßþøsó¶í™™gôë·zíº9³îKˆ‹ë›”´ò¯5ãÇU*½qàÒ¼mÇÎe+W¥žH‹‹Ùwà`ŸÄ„ ãÆ 8p˶íþ>ÞÞƒA¡PddfþôË¢”ÔT7Wײò †aæ>ø@TdDVv6Žá+VÿEÓthHțWc÷. bµuuÏ=üÀœ¨Èˆ¬œ\«Í–˜!lmm[ðéç;wí²ÚlI‰ þþ,Ë5575Ro0¬Ý°áÕ—^ ðóóÛ¸yË­·L õð𨨬2è cFòõñ1 kÖoð÷Ÿ6yòEGýÅ%¥§32ï˜9sܘÑcGê“”ôÚ+/œúô¼Çõï¿aóæA&Äžóæ“'N=jä¼Ç%Òá1`6›&# ­MÇÐÿúøBâÊAƒ°ôÓ§kjë~àAL™4)1!á“ß 6tÈ“=êíåµs÷ž ãÇöMJ|ëõ×úöésßÝwßuÇí<Ï ›šFŽþæk¯" ·¨{ÛíöÝûö>4gvxX˜J©<–r¹£òõñÙ¶cGpPà¼Ç¥(jäðáó{ÄÇÇ{ëŽK–­ˆŠŒüì£É0 ÓÒÒ2óÖÏÍŸ_\RòɇÈåòã©'È4ÿ•¼=$8èÁÙ÷GEFŽ7nâ„ñÿ}ñ…Üüüµë7Œ;¶¤´tÙŠ•@…BùùÇéõúIÆÏrÞ–mÛòÑÚñj³ÙŒáøGï¿›˜ï|–ع;ØílKK˸±£¿ýòó¬ìì²òòu7¾ôüsŸ}´ 4$ä›ï>tÈ÷_™›—·}×.š¦yè×^~ió–mÇ ‰yþ™ùZmCS£^oxtîC¯¼ðüá#G‹KK×oÜ4~ì˜â’’µë7M9®×ë¿üô“ÛfÜâ°úë\>£F óµÿþ…™:Σ |â±Ge2™¶©U*€L.Ã0ìÌ9þ%ÐTåÀ¡Ã¢ž|ü±ÿööv º«V«‹ŠK>üäÓ—_{#5íäÙ윪ꚇ˜3hà€–ÖZí¦koæ©'Çóó¢_ÃBC~ýéÇÓ§éõzTJµJ‰&Á€¥+V†-üáû™3nA•Ȳ,šYZ, bÈ~¸J©äùæL;™¾eÛöy?Šb¨ª®ihhÔëõV›Í¹Æ/XÇŸ0nìWŸºqó–YDQ” ðr™pèÈÑÕk×A “Ëä‚ $ ‚"I€¬¨wέÏâ™L†á×…‚Ä¥Áq 0ÿÉyÏ<õä7?ü°qËZÅsœR¥¬ß¸iϾý*•Ç I’ÀI Õ>t®}…\€aÇqÇR EQ¿/Z¨P(ÿï÷šššo¿íÖ´ôô-Û¶3BøëÏ?)Š7Þ~·¾¡aëöí»öìU«TÀ¦¦&äX!—‹@TÈåZ­‹R©D===ûŸWüvåo¿«ko—É(ävµ­MG’d»^?yâÄIÆÛh›§§ÀÏ×O¥Tºh4J¥€;½@èëã£R©H‚èdî|wÀ \.÷ôðËå>Þ>MÍÍ¢BC‚I’Ád2EGE|¼}šššÝÜ\µZ­Vëâ⢤H’$U*%ŽáÚU«Õh]\Ý\››H’l×·Ož8qòĉåþ™Œ‚ì”H…\ðï7F«¨À•JÅko¾e4™¼½¼Nž: ÈË˧(²÷šûEmãóŒ1ü­÷>ÈÊɉ‰9q2ÐÐØÔÒÚ:~Ìè÷Þú¿_~ü~ÈàAÍ}øÙùOóý7oé“”t6;ER^^îãí­P(jëê#ÂÏÙõŒŠŒÌÎÍC×eå1ÑQ躱©)<,  P(З•$I%øûÛY6¿°y欷7†ayù¿,þíýwÞòõñAáÇýëÏ?¶ëõ'ÓO9g缆†a'ÓO帻»•—W‚¿üö»·^µ²ªÊd2aµZyŽ7šLš¦Ñ iuMÍò•«å ¹Édž:yR\lÌÂ_k]4g³²îœy[O×—Ä߃È;ví6 J…²¼¼Âýnw’"?üø“—ž{¶°¨ÈßÏ熡í¬9•5[¬6« pêtÆŽÝ»5jµÙb™}ß}4ØÍf@Qq „06&­D¯ß´I£R·ëõMú÷ûñ—_²rr_yñƒÁ°aÓfµZÝÞÞn0ò ===9Ž£ú¾»ïþöÇŸÚtmé§3FŽn4™hšæy®½½`0 KËÊÿXºÌÍU{%oרÕz½¾µµ5>.væÍkÖ¯¿eÊÔð°PNçêêêêêZWß`4zƒÞngE Z,A¾üö;´tÞ¿__’ õÀl±äæå <‰×¨ÈÈßþüu‡‡˜c2™Ð€®±©)*""4$äÕ7ßJJL˜yëŒ;fÞöÃÏ £"#ZumO=ñØK¯½Îó<Ërȵ¯ÑhâÞl6ÛívƒÑȲ,ÏqÍMÍô ÕéÚÝ\]å2Ù´)“_|åÕ_ÿãø‰ƒ (**^¶jµ«ÖÅQ>¨Ïþ« ɹÀ[ZZ}ø¡7Þz§±±)'/ïñ¹Ão‘=Ýêÿ Ç­Û°‘¤(çËÊÊï¾óŽý‡½óÁ‚ÚÚÚ cÇúùù¡‘±£7©”ʂ¢;oŸôÒ«¯óïçç;|èÐWßø¿Ó§=pÿ¬>û¼´¬,&:z¸±;÷ìqóÚÿ½5cš#LylLÔø±c×nظuû޶¶6µZõìü§œ}ÿÂE‹9š›—÷é‚›[Zîèá˜è¨}feeϹÖÏ‹~%mA%&Ä;çå Š¢šš›½¼<ç=þ˜\.пŸ§‡{€ŸÿèQ#yžW«ÔwÝqGHHpߤ>^žž~þqq±È·œ(Šþ~¾þ~¾ƒ““}|¼EA¼ç®;cb¢å26¯{ „×ÖÕ÷ëÛçþûî%p|E’E……†ôí“¢Qk˜uŸ‡‡GLtTP` Z£NJLðñöNˆ ˆŽŠŠŠï×·O`@€Z£IŒ ð÷GI%I24$Ø××wð AF“iäðácF"pœ$‰ À@??T>ý"ÃÔJå¿Ô!Q¬$I¢øÙq±±Z—¡CÛíö»ï¸cpò Л¥†a‚(Ô74LŸ:eâøñ†5’ã¹±cFϘ6ÍYÕÒÑ›æÌºÇñQ#†Ë岸˜˜9³î#ÂÃÃ#(00**2>.Öl±D„‡yyy~aw÷óaÌæˆˆp/OO‹Å;vô(OÏ ÀÀȈðøø8 ƒs| 8(ÈFÓCœœ¬V©BCCüýü„ A<õÄã~¾¾hË­õwo¯_BâŸZ‘Á`<|ôÈ-Ó¦D÷GþóÂK?8'yàÀK ÿúüU|û?ÎûþƒC‚ƒ£"#ÿ×uù¶×{WÅ ÂõÉefíbfý;)ïwo¯ÿ" þ]—l3ÎzÀÝØëwlÕžó ס´J„°c9:GÊާ@Çʯ ¢Øõt®DâÒtª}´qãø¹ß/¬}Ç [çÚw˜¿×j]fÞz«³Rà8ÞÜÜØ'1t(5£‰wèƒu4$Ñ3z#j“Ž`WñíŽØ)gdœsíøÓ¡Çé( áÄñã;õCçîÐ)Ë\Ä/óÎ]½Ú‘磛‹Ä‘òNåsmŽz9—ª£‘8 ¹Ws™Yë*Ky^à‚3·]›ß߆qT.mhuÜÅjCWQ _˜iÔ/qõAM°«Ê¿ãî¿ÚÒzöí<Ïß2NâÆÃyÔ/5P‰«O§ãæ]ïþ«‡zzöí8ŽKr_âúGj£=@ÏÎ/¥Ù­„„$ú%$$$n:$Ñ/!!!qÓA\yxž¿Ä«Ä Ì¥wV%nr%‰KïÁôR1øw>™;)ü\IžçÏŸ!€çy¤ñÕ¡#Ä#­hTÔÂ9õ2€uQ=¸š¢ÿÆ«W‰Ëä†ìÕWgÁtƒ!Š"!vy-ÿr:È߆AgàxèÃ%ʽ³½~g¯.ŽSãˆÎ¦Ð÷Üd2íÚ»7,4½ÛOW]:±C=YÒ(½~;p\;*8Uh§ÚGcêššÔ´“Q‘HµñRµ¡êqOgZâ_É GƒIMKûcé²öv]\llO'íJÀ0¬¨¸xñÇÅÅ’á|ÆÊ²ÉüÇ’¥©iiáaaj•Šãy‡Î>èè&Â8¢rSU]½zͫՌŠwûέ]‡aXhp°Åjݺmû¦-[kjjcc¢qÏÉÍ[±ú¯£))^ž^ž—²×¾Ï(Y‡/èÂq tLIœ=ÂX,–u6ÒVÔ»~uœ]ÉÜc^Šsí;†iÎáµ_S[»yÛ6ç[­}‘ú£$÷o`íBxàÐá…¿þ6hÀ€-ÛvüúûïàBO„½gyXV^þÁÇŸDFD•”¼¿à#à$ñg¾0 ³X,o¿÷r|ôß×ß´Ñ4Ñ16wDÕ5 tò€ëè,yùù‡¦8t¥ä÷?—îÙ·@ÿþß|ÿÑc)I¶¶µöé“”~úôâ?—ZÛZÃBB"ÂÃßÿè#£ÑäÜ ç,™L¦Õk×—”Nž8^.WTUW?8ûþ¬ìœ3YY³ï»÷Ï¥ËJË+F zûm·~úåW áaÏ=3?'/oùÊU‹Çq£ÑøÝ?Ñ4Md`€ÿÙ¬¬iS§Þ:}šó1â¦ææÕkÖ¾ðìNgfæäæ=òЃ½×œÓª—Úºº5ëÖ757Ͼï¾âÒR÷ cÇîܽB8tÈàßþø³¥µõ޻Žúäó/l6zÈàäûï½gïûllj .)-ýcérAàÝÜÜTJeAaáã<2 ?Çðܼ¼[¶Úû=wÝÙ·O’4í»Á@zððჇ¨”Ê—_x~ïþ;ÒÄ ÑQQï~øáœY³TNCÚ^JsvNΖí;l6ÛËÏ?wàà¡áC‡Þsç3¦M}üég ‹ŠbcbЖ'êMMM?0§M§Ój]žzâqÀ³/¾|<õD^AARBüø±cøù—‚‚™·ÞJห«…yþåWö8pÛ-·Æþû’%ùcÇŒ¾ûŽ;¦O*pælÀf³8yòÍ×^#p|í† cF|ü‘G‚ mtúé ÀØÑ£i†Ùµ{¿¯ŸB©pÎÎ÷ØñÔu7Ýß=}“’üýü¶ïÜØ»¿R¡8•‘±vÃÆûï»g@ÿ~‚(N›<ùÁÙ÷MIÙ¹{Ïo,™>uêü'Ÿ”ÉdF£ñtæ™gžzJ§ÓM¦§Ÿœ·tù ä?vX,ÖôÓ§uõ Ù9¹ —{í¹@õò׺õg²²yè¡Èˆp­‹ËÆM[Ûwî ð÷_³n}æÙ¬Çæ>(£¨{ïºë–©SÖoÜxøèѵë7<óÔ“wßy; ¾¡¡ªºêÕ—_:žz"*2bâ„ ‹ÿøà°éhljÊËÏŸuï=!ÁA@Zó¹±@‘f˜/¿ù.4$dÖ½÷0ŒÝj³|¼½0 Gv{#HHý¸pMÓ>üZ­njn ( O÷Œ3g?ûò«ç^zùtFææ­Û2Μ}ôá‡CCC«kjP$~¾¾ û÷‹ŽŒZ½fmKKË›¯¾:dpr]Cƒ#Œ¯OkK+B¸jÍš¦ææ7_}uÈ d$'Y;Ëq µ­$ /O@`` m£yž'¢º¦fí†Í™bسwßÏ¿.Vª”h=Ê‘ Dÿ”IŸ›ÿôÊÕ>v,2"<,$dÓÖmMÍÍãÆŽ1lØóÿyfùªÕé§Ns—r<5ýôi—ÂâbÀ¸1£}}}4 ˆ!Aþ~‘á!ÁÁÑ‘‘Z­‹ÝnÌF£ Óç=]¡çfO=þø¤ ýö{VvÎÄñãwîÞ£T*ú$%>pÿ¬©“&-üõ·òò ‹Åºwÿ¢’—ŒÌ3Aa¡¡~¾¾Eaîáî…lú£žŽ¹-›˜¯Õj{:ßW4³—Ëd_}öiCCã’å+I’TÈ……€ú†F Bw7·žNæ?Í€÷ßyËÛËk᯿é _ŸœÜ<€Åbmo×÷ëÓçûïvþü¨ÈˆG~xòÄ /.)) FrÐØÔèíå9røðÀÀ€S™™S&O pÕjýýüŠ:Â446ø£ëœ¼¼É'øûûø£ÁEQ2™ àíímµÙªªk•UUÇqƒÑøñg_<þèܤÄþöÛnÝ¿s{MmmJjj÷®ZEÅ%îînáá«þZ ˜q˴ϾüÊÛËËËÓ37?ßÃÃ=<,lÓÖ­ÅÅÅ;÷ì>l(m£ýýU*åw?þtä豚šZAš[Z£Ñd2ñ<ߦӡõ¾¿Ö®[»~ÃÎÝ{ryKKëî½û=Ú®×÷t…JœzçäÇÇžnãFÇ øÎû:“—!ܳoúéÓYÙÙ#† kmmë×·Om]݆M›Sާ"÷°-­­9hcšf™û ›6¯Ý°qÕšµ§33m6 #Mõn<¾ŽëêëÇs4%¥°¸hÖ=w¯Ý°qóÖm_|ýͤ‰d2Y/õØ !ä8®¨¸xäðáUÕÕ{÷í¿÷î;Ïde¯ükÍžççç­ÕjsòrâãI‚Xµfͨ‘#8–ûþ§…ß|ÿM3S&MúîÇŸ²²s&O¿ø÷?9’›—7zÔHŽãÃüðóÂìÜÜIãÇ/þãÏÃGŽææåa––ž¾ÿСŒÌ3;wï‘QÔÄñã\øË¦­Û–¯Z5û¾{†¹ýž{ÛÚuË>rðÍÛ¶9vìàá#V«ÕÏ×Ï9;høè ú=ûˆ¢øŸ§Ÿôððð÷ߺ}Ƿߎ|AìÛqÞcÅÅÆª”ÊS§3“>lè¸1crrsiš=rd\lŒ‡‡GtT”\&  õñöV©Tq±±™™MM6›Ín·'’zâDxxØÈáî5A‰‹zlMmÝÞýûƒƒ‚žxôµJåáî¾sÏÞgç?åââRSS»ïÀà  ¹>k2›KJKG9jĈýû¥Lwqq=jTxh¨¯OxX˜B¡ˆ‰‰vÑh¼¼<ƒƒ‚ŽŸ8a2™Œ&“Œ’ÅÅÆúûù!÷[R¥ßx@EÒNž<“•uï]wŽ6Ôßß/0 àTfæØÑ£ï¾óЛëðܼü#Çþ¿½ûŒoâH>³»ê’-¹÷˜bL³Mï%ôÞ.¹Ô«¹Ë].勒K!%@èz·iÆp·±qïM’Õ·ÌûalEØ!$l=ÿþÉÒj‹föÙ6óLú¤ñãož{“N§KNvòÔ©ø¸¸Çù¢¼ÛÞôÈÃi5š´Ô”â’Žãþüô“¦¢²2(0pÂøqã¬ìSþþñqqi)cŠ<¦)¯¨ œH§9™},3“eØ ËðáI£F$3 “_XxÏwŒMK­­¯çXnpbbmm­Z­N40¯ 0=ãpiYÙ#=D¯~&_?}]QY9ÿ½>üß|¹\~¥sðû¡Ïc÷8¸wßþ7_{ƒ_òõÿT¾þó¦Aõ–¯ÿ7YnÓ_(_¿DˆŒãŽŸÈ2d°\.§Ç úm®äÎTÞÙ…L’p׿´W§»[}ÞM»œ!„ÆËzv€°r•ðLŽÊÊÎ?~l·h;3ÏÒ'4±xWÎzZú´±?ý"˲ô©òÈ!ý¿ú7w qç”—Áý¢×§gå÷ìíÔmÓºí2´.rÌ®ÌÞ¢(’®®¶¤kæ˜æÇ@ŠÇqtg$1LçpžcHÐ=Ñ}<¸Po^wŸLº7^w-=ß§ßñܶnÛÉõøÈ½˜Îöècv¥Ktwþ`âèOO¥}ÎE†²nïwëîÞm¹øizî;ÝæpñûÚ…9¨ÕêßïWŒ‘F£¹Òk¸\úÍÁüÆ ý„~л~ô4Є~ð:¿eÒf®8Ú²ââÓÃAÓÕßDMÖÛÿ~êÎV‘³Ü´ß0_¿tþ/I+¼ûnÿ^`ž—úéâûS]pñ®ÚpIƒþ/úÊÕ¹!ý Mjºr¹÷§ áÙ¬ógÛõ»'»äiPV@î ï™.Ôý Ñ?5Ïózóz&YsÏ‹7h“R÷G´uv·¯t52=OÏ]KìÊUíný ®´ ¥ó‡RpŸDÐR¦1 #‚»¥®JÖ­ôQoý6ÝӜߖ´³Ž¹¿(v%|w·qv×1I’Ü#I’Ô9eWŠ•“§NeŸ:­Ñh|t:AºÏ¤kUéûv»½ ¨(Àß¿çÊÀÉͯá.#úÖÔÖîØµ[¥àà+½j¿!D¤C_aÌ`l6›·ïÚÝÚÚáY[ܵ!Ä0 /ð{öï/--—Éd´§K×nÕYE»Mã>–ˆ¢$IÞbµ?qÂårùûùIa\PX¸ïà!­VcÐë]<&77ãÈQ›ÕŠ1®oh8˜ž^XT¨V©<óõwýžùúé‚{æëǯY·>( P§Óº‡àñLÓï©çoç9ñ•.Gð£n¥Oã¶»¸ßï°XÖoÚ\«Õ.YºÌf³mݶ 481qÿƒ¹yùMÍÍ[·mŸ>mªL&Cuýô|j÷Þ½kÖ®W(ä-­­EÅ%1ÑÑÕÕ5Ç23âãvîÞ½fÝz¥BYWWÿê›óªkjƒ‚CCB6nÞ²iËV½^¸wÿ=ûö8tÈétnܼåܹrºÒm {×î½{†1èõ7o  £YèÀDËÅf³mØ´ù‡í;‚ƒƒsòò,VKpPÐé3g*«ªÃBCW¯]»mûŽðаCé }ÜÖÞ­Õj–­øæPFFLt´V«Ý¸yËÞýNd´X¬+W¯q:ñqqž¢(nÛ±óðÑcUÕ5‰º¯ ŒFãÎÝ{ ,9[š_X P(6lÞ²ÿà¡üšQŽÛ±k÷ª5ß»\®ø¸ØÜüü5k×566%xúLÎî½{·ïÚÕn4ÆDG¿>ïm†ab££Hho7îܳgÇ®]--­‰ƒÙŽoW®:˜ž¥Ói›š¾^¾bÏÞý&³iî7Ð]‚®LeUÕÎ]»3Žñõõñ÷;/Á øYôç*-+[±rU^AÁ¨‘#~òéÄñãŸøã£‘‘K–­¸é†ëY–í‹¿ª{,­Uk¾?”ž1"9yã–-‘Ÿÿϸ´´Ï¿ü*-5Å`0г®½i{TDdIiéá#Ǽ÷îµsf¯\½:(((ûÔi›Í²mÇÎUkÖ(•ŠšÚÚcÇ3?üß»×Ι½jÍ_ߨ˜hzŒ¤•_„¸ØØ¡ƒûüšš›'Oœ(IÒ;ï½÷×§Ÿ¾ã¶[çö]»o¸öš‰ãÇMš8A”ăé×Ι?eÒDƒ^Ÿ~äðœ™3hÝ^FéÚ½w߇ ?›–ªQ«yžÿrñ„ÐÆ­[Ë+*Žef¾ÿÑÂqii …Ü××70 *2"*"bÓ–­ûJ6ì·Þ¶;›¶lmo7¼ýî{ãÇݺ}Ç¡ŒÃ!Aè5 Bhã–­Å%gB+V®4™Í’8^iô²ô‹ÅK~رc¸q …¼¡±qù7ß"„¾^þÃéXºâ›­ÛvLœ0A"R```€¿lt´¿¿ß‚EŸ465ëõúWßœ'Šâ’å˃‚‚šš›—®X1eÒÄO>ÿ²¦¶Ö}³ˆBY²lYkk[hH0ò¸ÔÖÞþíw«Byùù;wï©®®ùfÕª cÇîÛ0=##ýð‘M[¶Ž›FÛ¾ûÞâ:´zíºÙ'÷ìß?eÒÄÅ_/;W^ÖÐØ¸gïþc™™{÷ïŸ2iÒâ¥Ë*«ª/]VßШ×ë_›7!ôö»ï©Õê‰Æ‹¢äK’Öϳ¥¥Ë¿]¨T*¯tÉô148:Î>÷¼R©’˜ØÖÖÖÑÑ1bxBhèàÁš·µ/¢Aê•7Þ¬¨¬LMc³ÙjjjF Î<‘µü›oßþß{EÅ%KW|³eÛö‰ãÇc—–2¸sdÊñ ••íF#Ãàmݶ}¸qþ~~ežÓ$$”—W „†ÙºmûÖmÛ'ާ7èé§’$ÑûEuõõr™l@BùÔ€„­VëNó€º5îLM3}êÔý:œÎ1£Féõúc™'ª«ª¯¿fÎðaÃfN›¾ÿàAAH ™=s†ŸŸß‘cÇl6[ñÙ„Ùd ˜6uòÔÉ“ããbÓRR† NlimEÑ!Žö dèÓåÑr¹ñúëc¢c>Œ¾vö,“Ét:'—iʤI´@ed¨”ª!ƒC‚ƒo™{“\.Ï>uÊh2UVUI¢h³Û£""æÌœ165u@BÂÄñッƒŒFò¸ø% »óö[SÇŒñ<ÞcŒýýýBZ­V¯×cŒG•2ftZjJSSó¡ôô{ïºsÆ´iC‡ ÞµgojjÊ5³gßwÏÝé‡%Iš2i⸴´¸Øžçããc œ1}šZ­R)•Ç›–:xР³¥eùùíÆöŠÊJŽãò ­6ë£?”–šâgÐÓýÁãÆ&;fô¨[ožK‡Îès'§W}ˆ¢P(}ø¡Ò²s••~~~„ šÚZ„ÅjEiûl/qZ¼ï^AN>£÷õU©T•UU!úÜ(888::zð A*•òúk¯‹‰9˜‘¡R©ô¾¾55µt&–¥Bñð÷HNÞº}ûý÷Þ=sú´ >>>Õ]Ó˜Íf½¾s4‹‡Ý{÷Ó¦N™œL+*˲ô"Õ×ÇÇfëLn4• ýý_yc^ê˜Ñ3§OëÌ×ã?lX_T\œ}ú´ç#âóB¿Ãá¸ûÎÛÃBÃ^xùU„е×Ì~õ75ZMdd¤Él¾ç®;ÂBC_~í „ÏóGŽE1.&Ö`Ðß|ã/>ÿ|ppPss³ÍnE‘žÎwX,ˆA²NfŸÉÍ=™}ŠçyDPn^^Ù¹s••Uv««nÇ>ñÇGZZZçÍ×××wèСÏý÷…‘#F „0FOüñÑææ–ÿ}¸@ïëÛÚÖ–~øˆ$I‘áa¡Þ{ï¿ÿù…\ÞÒÚêr¹\.—ÅbAutt`·´¶žÌ>u:'çLn®Åb5™L‡!$Š"}VŒÒj4uuõå……f³™ø¶¶6„PG‡E’¤„øøM[·ÖÖÕM¦Ñ#Gž<™]vîÜî½û†Œjk7"„Ì’D¬V›Õfëèè°X­6»VÂv“Q­V…‡‡…‡…=xß}ÿË_âãbN׎]»ËÊÎ546Š’”WPp:''ûÔ鯯&§ÓI‡‘€‹ÑK€1¶ÙíC‡ yðþ{?þü‹399×Ì™õíw«ËΕ/üäÓä¤$N×GïõÓ|ýO?ñøž}û¿]õÝ-soÚ»ÿÀ™œÜϾüJ©TNš0~ʤ‰·Ì½):* !òÄc¶´´Î{gþ¬3*ªªvîÞóÃŽ••U×ÌžµmÇŽšÚÚ¡C†lØ´¥®¾¾¹¹yÒ„ Õ5ÕîiæÌžµc×îÚº::M}CCCc#Ƹ¡¡±¸¤¤²ªêli©N§28qɲå¥eç/[>gÖ,„ÐcOý©¢²bêäIeçʆÉ>}º¹¹… bw8|^´?ï1oqÉÙ//é°Z¸çî¸ØØð°°¥+¾¹í–› PPXôÕ’¥˽wÝëïï¿gÿþÐàë®™SPT´gß¾v£1eôèæ–Ö z½ÑdJKIiljL4¨©©iɲåçÊ˳²O…†„ŒMKÙºm[Ù¹ò˜è¨ ãÆÑËê¾Xú zžqøÈò•+}tºï»'88XïëóÍÊUÿ|æo~CúáÃ+V®òÑéî½ë®ð°0–e:4"yø„ñãe>|ä(!dØÐ¡õ ©cFó<Ïq\Ò°a5µui))‡ݰyóÙÒÒܼüÄAEQJž¤Õjÿñïç"ÂÃ%IÒjµ¼ËµnÃ&Œñ¨#¢¢"EA ×°þþ~7Ýpý™Ü¼¶ogfÖŒÇmÞòƒ€ßÓ?ÞÒÚêïç7p@B}CcÒС!¿à  3a¡!z½ïÀ‡$&N<é`zúá£GQ5bD\lì†M›**«4lè’¥ËÏääœ:}ÚbµÆÇŲ,;bøpÕòêºáãZ¶bEÆ‘#S'Oš1mêÄD‹Å²zíº˜è¨§Ÿxœæ›¼Òkz‰0Æ6nÚ´ekbâ ›oº1*2ÒÏϰjõ÷‘þñ·¿jµZzg›aº7ùê|î½ëΰÐÐÄA×oÚ\QQù—§ŸŒÿ~ýnî7œÉÍùaÛ–cGŽH4`€ç4kÖ­÷ÑvN³uÛv¥R9xР+W-+S*%gK'NŸ–šš_X¸uÛö)“&ÞyûmgKK?yìx¦¥£cô¨‘k×oø~ý†]{ö\7gάÓ/6_¿Ñh|þ¥—ç½úªÁ ï‹eÀ¥¡e}&7wÙŠoߟÿ6!¿eRºcääæ®X¹êÝ·æ]Úºõ| è•ÃáÄÑÖ4Ê×O_‚ “ÉvîÞl0èÝ º‘G£~wŸI‘^¾u½O›J¢H³öÓ“ÞuB]·•iû'ÈÛ~Uq—²$IÇmýaûÈÉ!‰H˜ ® €¦³±?m§A[ÊÓÒ§c3¸›ÒÓ~„ B~,}ZÃ’† ›?ïÍžKw·¦÷ì;Â0Œ(ILWËË®FÕÈs*JW‡¸—øc%ôXUw…¤"Jêjnä^ú•.>̳ êÚýiÒù¾~´voš{€ ú~·^ ž1Ó³¾!úLƒ§gž˜itúiMmmEe%Øs&î=—h·;ŒFc·-”‘ºOîòuÿ椫Ä®ÜmöÉùNËÚ³Úô\DÏÜÕƒ.ZìšQÏoÑO»U'÷¸ÍÍÍ¥eeN§!Ô­öz®*]Ïó4é•çšÐÜS‚Kà.#Z(§3¯ Àh4ölÔÛ縫œ{@‹¢ââú††ž›æY‹0Æç**Ê+*ÜýœzFQÏiHù¸«qcS“ÉÔ™õ’v¼Í+(p8œteZÛÚòò š[Zè‚ÇÙÒÒâ’ÏÄmT÷vý¸·æùîm>˜Îÿ<ß—$ 3ÌÖmÛwïÝ«V«gL›6sú4|þÀlžƒÚÐï®\½ú½wÞö<41ý±QðUγÁ¾»ÊvvÂ`z]iw8N>:f †í$]\Iýl;hÏ>T·Š‡Î¯Bô5í®•“›ûÅ’¯õ¾¾ xð¾{=sîw[UºÄ¶öö^~uþ¼7|||<Ï’úÓ™éAË…þ¤MMo¼ýŽ &“é_Ïü}äˆWíUã/Ý4—Ë5oþ»õõ &³éž;ïœ{ã ‚(ºG;a<êÛç_-Î<‘år¹RSÆüå駺õìuωºÎÖmÜøñ§ŸÏž5ó?Ïþcœ“›·àãeœLø·ßx].—¿5ÿ]§Ëel7þéÉ'Ʀ¥nÛ±sïþ„¨Èˆçžý§gÅ>/_KkkUuu@@À¹Š ‡Ãa³Ùòó Ž?.ŠbpPÆ83+ëð‘£ZV¯×ÓLÎ …\ïë[r¶´ølÉá£Gýýý1Æ/¿þfbâ ±©©±11EÅGóÑé|}}NçŽ]»jjë¢"#è¾·wßþÃÇŽÙíö9³f¢® ƒ1®¬ª6™Ìz_ß‚¢"–eU]CÌ\é¢ïÏ2³²ŽÏ ¨©­å^§ÕÖ×7457ù ÇOœ8z<3,44óDÖo¿£ÕjƒƒƒÔjõþƒ‡róó"ÃÃåryn~þ©ÓgÊΕ3 Þ¹g¯\.ó÷÷÷,5I’ ‹ŠJΖ657‡…þØkÄn·557×74r2.'/?+ûdssstTƸ¨¸xïþ‘B‚ƒ›[Z2Žu:AAA5µµEÅ%GŽ#„½ùÎ|Œ™9³fFGE!Œ ŠŠ¼kÏÞùï`±X^yí’³g%‰ Œ¶ü°mïþÛwî|÷ý;kokë÷ëÖï?p¨¼¢òƒ"„þ÷Á‡GŽH’äp8Ü7CéïpêÌ™ÿ¼ðÒ©3gŒ&ã•.™>†tžçÿþ¯—”457·´´457Íš1!4}ÚT‡ÃÑØØt¥WóÑ;Ÿ¯Ï{kמ½–ÚººÒ²²éS§ „†t<33ãÈ‘õ7544~³rÕg_~år¹ª«« ‹ŠF!—Ë5MRRRaqñæ­?œ+¯(.)™ÿþ‡­­­MMùù£G¤Ó žt&'!Ä0̉¬“ÿû`Ak[[m]=BH¥Ré´ZABõ „HÆE]{ÍœòÊ „Á`@eÌNKIAiµÚ­Û·ßÿ‡GSǤøùùyÞö9ï†L&Óûú"„|t:•JÉ âŒéÓ~ðSgrròr¤§?ûÌßâbcBÏý÷…¹7Ü0÷ƾ]õÝÊïÖøùéÓRS§O™òÀ5èõC‡¾ñúkcb¢\<¯ÓéfNŸ>}ê”GŸ|*+;;óDÖÄ ã[Z[ÌfóÀå2Ù_ž~*+;û»5k‘Çø|!•RI¯åõ¾z÷ Jàò‰9vâÃ0â ýK¯¾^W_o4¶Ïž5ãDÖI…B‰fÈàÁ¡¡¡;wïyöïS*•?lßaîèÈRÆŒyã•WŽ;ö/½ûÂ˯8P!WŒHN~óÕW9úú¼·µM[{[m}=!D§ÕF„‡ß}ûíï½ý¶\¡°Ú¬‚ Òy!‘μií´\ÍfçN—;çš{d2YSs³ Šm­­v‡C’$‡Ã‰Dcì£ÓåwU¼Ðªê„PqII`@BˆN) !äp:§Åbuñ¼‹ç]NBHE™\¦Ñh"ÂÃï¾ãöùo½ào³ÙΕ—[,³¹!Òa±M&š¦_—Ë…à*óR ‚ðô“ßqÛ­ÿzþ¿…EÅi))k7lB­Z³&<<ÌÏÏO’úäÝcI’n™{Ó³ÿÛ§_~µvý†Ù3glßµÛn·ïÚ³×f³Í™5ó>ðü¿ÿ•4thròð7_{õðÑc/¾úÚôiSsróÊË+Ζ–åNž8¡ìÜ9›Ýn0ò B’$MMÍÍÏ/¯øqšsååviœN'F!d6›­V›‹çýýýýýý7mý!ôÝšïG‰úࣅÇ2ÿçÙ:BHsKK``ÀÌéÓxžojjöÜœóòõ †C‡ïÝ¿¿±±1-5•N129ùx扑ÉÃSSS¾úzé¾ýôzß믽öPzƆM›}|tyúÉÌY ññQ‘‘GŽLŸ:¥ °hÈàDK‡E£V»\®è¨È訨ƒé7Ýp]``Àö;‹KJärù„qãššš¿^¾¼´ô\ttTxXè /¿zøØÑ­Û¶B&Ž¿nãÆÌ¬,³Ùÿ×3ϭ߸iÕ÷ß3˜™6uòÐ!Cªkk×oÜ”:fÌð¤a;wïÎ+(p¹\Ç ;š™9uòäÖ¶6“É4nlÚá#G'Oš¸s×îEŸ}~äè±} HH¨¬ª=j¤^¯_°èc­V$I’¯OqIÉšµëªjªâ㣣¢jjk¦LšTPT¤Õjn¿å–5ëÖoÙ¶ÍápÜ2÷¦Ò²²•ß­nkoö™¿WÕTË8nÄðáÇ3³F&'›L&µZíïïg4š Ë2#†§µ7-5uûÎù…6»}\ZšB¡øbñ’¼‚¥R96-õ·ÞÙ½gÏö»C‚ƒ[ÛÛ&Žà”ÿê¼ÑßÑñÞ‡ NçäDFDÌœ>uljjfVÖ×Ë–Ûìöþí¯:õÁÖýÐõó/¿Ú½oŸÞ×gÆ´i#G$·¶¶~öÅWÅgÏþõé§ÃÃÂxž§ ‰éÞÄ`fʤ‰ÉIIZ­öÓ/¿J?|øž;î3zôëóÞRÈ·ßróêµë¶nÛn³ÙÆ«Õj?ýâÇi^›÷–¼kš-Û¶ ‚0tè.Ú³ÿ@[{Û©Ó§é lÚ²eåêƒþù·¿•”–¾·à£Ðàƒé••cÓR,úxõ÷ëÖmÜ8hÀ€{þì½çëçyÞl6ûùùõZ6.ž·Z¬>>:z©Îó¼ûùØÅ³;N‡ÃÇLJž÷uX,r™L¡PH’Äó͸˲,Çq6›Ýétº¥—!¤µµM¡Ó³¢²òíwß[ôáûÇI’ÔÖÖîþ!Ä Dz´ÂtX,>:Çõ~!/‚(Š]q!†aò æÍ÷ËO>Q«UîFrmííz_ß^ç#I’ÉdÒjµôÖŸ‹çe¿|Än«j·Û%‰h4jZ“B„ †Ápwñ×s:F“ÉßÏÏ]šV«U¥Rõ݆=n‚ ´¶µùúø(•JZumv»\&ã8®Û`î½É=d1BH¡PtkøàY±vžçé Ahì•$ÉîphÔjÔÕá†çyzkH&“ ‚PYU…1ƒÎÏ×^è§KúÙÈ£/ïìµ{á}ðä ?ã¸ùï Q«ÿôä´ÑÜç>Ó÷ä¬6›Ëå2èõîw~®&œ×Yñ²V<ð[é6ürzvâމ悛æ>³q·ÑìÖRÙ#ĆÁžæ§Vãg[ÏðÞËP-ÞŸ»%†îùæÅè6ýEvZ¿Bêj)?iÂxúHßÝôØýþ’KßM£VÓó· 4øû+øMô,Í~ó›÷ì~t ß­§TϱOÜhÜ¿ð4Ý\ÌîÐó̉â.0;àm°Ç`&ãÒÒ<ßüÍkE? õëÒ¼ÈM»J~KÉ×¼ÙåΟq•ìx§¾ÝÆ\>ýà‰à§Àî ^B?xý€ËÈ©©_Žõí™lüJ¯Ë/Ó=ôw+$ÏÒ"]º½îùuàû ÏÂíöºèÒï—»7¸îš@8Úíö~ӗ³’3 ãp:EQ¤ÙP®ôªýÝóþÔÀ.ž}.P„¿¾Å7¸Rº•!¨×ÒG?]¸PèÀÍ]œ.ׇ-Ì/,ôÓþýì?ÂBCûô1À½_ЭXºâ›qû§'Ÿ9"¹mÚy}œN'ͱg±X¬V+Ƹ®¾>¿ Àf³aŒ;::Îää˜;:0ÆV›­­­­²²Šö€w3™Ì´/r{{{ÏqaÀÕÌbµZ¬V„Ñdrº\£såå%gÏÒ¾ãMÍÍ9yy4¯YGGGssKuuçi!Äd6×74Ô74\éMW˜(ŠEÅÅeçÊBK–.3™ÍËýîû^éUûµ0FçÊ+ ‹Š0Æ{÷8˜žññGÞ2÷¦ùï½ïp:ûÐ0dç¥o;˜ž¾dÙòÙ3g,üäÓÚº:«Õ¶àãOšššXŽ  ~ówkkk÷îß?eÒ¤ÕßÿÁ‚…U5ÕC‡ Ñiµ’Dh‡æ—^{]¡PÄÆÄ<õ׿MMq篸қ .„^®.^ºìLNNʘÑÿþï ÁA¥oܲ¥²º:"<ÂlîX°èãššÚã'NL?þõ·Þ^»~CcssÊèQîÔ%¢$ýéoÏd>b³ÙFåîµ$Izý­·ÏäæVTVÒñLî¿çîàààÁ‰ƒV¯]7eÒDFÓ«]çÏ¿Z¼s÷š˜¨È}¥Ž<.vÅÊ•æs\\̺ kjkY–½íÖ›ÿýg8™ìÇsB0FÏüõÏ>ü$IWsí—!¤¾¡A­Rßqë­~~~4{0BaÌ`,õ‘“âÞ¶ !„:÷‹ë¯‹ŒŒ´X,îO†é[¹å» ËŽl6BˆH’Åb¹vΜW_|aéòŸ~ñ¥Œ“i5Z?ƒáÅÿ{~\ZªÕjÓjµ!|þø*.—‹Þr'k}…(Šv‡!$J¢Óéüû_þ|ÿ½÷¼üú»vïQ*>:]TdäÛo¾&‚F­A¥"„È8Ž1EïÍX–]ôÁûÉÓžþÛß«ª«ããâ÷ìÛJÏ8¬Óé‚ê“ç†4ÇÎ ÿyî{ïyéµ×÷8˜–’²ïÀA„PqÉY³¹#qÐ@Ôw*ÿyy‡ Nüêë¯ç½3?+ûÔí·Ü¼{ïÞ̬“ …B¡P\3{ö¡ŒŒÃÇŽ©”ʉãÇI’DoûÊÈøîûµ¾>¾O=þÇñcÓ–®Xq2;»­­…î }­¬cFú߇ ‚pî\9fðòo¿mljÖé´*µúö[oy÷ýŽgžÐiµÓ§NE‘ç]¡•ß­>rì¸F£Aˆ<úðà à ð€Ç‹Ñ{íííŸ/^"—Éü QýÃCÏý÷…??ó³Éü¿ýŸ™²¯è¼«)ŠŸµØîpøúúJ’4gÖÌCéOýåo˽wÝIßì+›öcÒfºÒ UUÕ‘‘z__—ËUPXä«÷’˜ˆêèè(9[ªV«$$8NI’||tíFcCC#DZ¢(…„ë}}sòòX† Òëõîd¿à*GkvÙ¹s&³9"<\ïëÛÖÖ~¶¬,*2":* !ÔÜÜR^Qàc2™ …J¥ªoh0šL,Ë"‚"ÂÃNç÷/A)/¯¨«¯4h IÍn·Ÿ--ŠŒÔëõWù­ðŸU___V^ѹ_ˆ¢XT\âg0„††\ý›ö“ùú/2ó'ð6WW­nmÄûSEê–ùêß4ÏÐÏõü¬gQQ´Çšû5r7óGȽÅtP‚Ë”æ\nîÒôìÀá.q÷¿žCµ¸¿{„ûÀÛ\ ò\éUû7 !$‚û`¸ë¥KW¯#ctûÈóE·-î+·º@Ož¥Ù³&ôZúݾ~¥·\.PyúºžÛÂôÍMƒ0 ^B?xýàu ô€×¹,M°¡¥‡7ƒÒݸsÙ÷§ç½ž›FbúÚ¦]–Ðß·~ðÛ‚ÒÝôãV}wÓzi×O_ülrvzrGGîèÖ¦Ûáp°,+“É®ôÖ_æ—þùíúé »Ý.—Ë¡#·7ëvå·fݺý 0àÉÇþ¨T*¯ôÚý6›F_LO_·a“A¯ú‰Ç‚ƒƒûÐ%ïy‡,w-Ô•b±ZQ„tt ív»Óápwà²Ùl‚ „>\ôñžýÇ…¸Ê‚<ûëÑׂ Ðt~=&&c‹Õ*‚û+V«!$ÂK¯½q¶´ õ6R!Fqð488„Ð÷ëÖïÙ·ÿ™¿ü¹ªºúý¡>è¸&t“ìÓ§?ûrñ|ÀÏÏðâk¯£>uÉûc¾~Œñ¶;—óí´)SžýÏóþþþ~/¿þæC‡V¬\õýú ‚ DEF>ûüÿMI9‘uò˯¿N?|$,,ÔÏ`øpá¢ÍÛ¶UWWËd²EŸ~v&7W’¤äáIî´G Ã|»ê»œ¼¼áIÃ^ëmµZÙ}¯´Œ>ùü‹39¹ ññÏüëßãÆ¦5µ´¼úæ¼#ÇŽ­Z³6iè.’8Øh2Í›ÿî¬ÓW®^³fíúÌYÓ†u˜;Þ[ðÑÎÝ{guMí’eËróòü ~q±1´|éß÷?Z¸ò»ïNŸÉIKMå8¶_jù·+׬]"ëäèQ#W®^}ïwŽHžœ4|ŪU3¦OS©T}±ôé:ïܽgɲ‡22† ¼kÏÞ¡C_3{ÖØÔÔu7ÅÄÄ„_å1­—|ý„ëfÏV)•·ßs_lL̘ѣ>þìó°ÐwÞ|Ã××·½ÝØÖÖf±X!MMMMŸ~ùUòðá,Ë~øÑ¢¶öö­Û¶O™4iî7 O––’rßÝwßÏÝ¢(ÒSHzœo7ÛÚÛB ½žN‚+èÞ»îÌ/(xì©§¯»æšÿ?Zxýµ×¼ñÊ˼ËeµZ›šš¼Ëáp´µ·—”¬Z½föÌÅ%%ß®ú®º¦&ýðá;o»mòÄ “&N>lØ3ýËô©Sh¡»K¿º¦fÌèÑÿþç3Ç¢>u~.½Îs¹\6mމŽzüÑGd2™Ýn÷ññA©Ô*†aé¥@_D¯a·nÛNyêñÇÂBCÛÚÚ =ýT¥TÚ¬Ö+½Ž¿À¡_”$Ì0III'OJKMAÕÔÔÆÆÄ „üücŒ9™ c¬ÓéŒ&Ïóf³9.6öÆë¯ Xüù§99¹ï¼÷BˆåXµJÕ¹€.!„±Œ“!„T*Ü ¾zÐsƒÁRX\2iÂx"‘¶öö„¸8Žã AˆaŽå8ŽÕiµMÍ Ë465M™::gÏÒW«T±1Ñr¹‚~EoýÉåò¯>û„a˜^}Õf³ûûûgeg#„Š‹Kd2®3_D6Ìë͔ѣ_zí‚¢ ñÇ3³BMÍÍ&“)&:õsšór,{:'gãæÍŸ,øð­ùÿûâ“E·ßvËü÷>0™Í§sræÌž²æûuÕÕÕE…q11£F$›ÍæAFEFVU×LO;–™ét:$$|ûÝêÀ€€˜èè¥+¾Q©T‹eÖÌãã¿üzi@€ÿ©Ó§o¾ñ†+½í Í×½~ã¦æææÿû÷³ýÇ?W,Y´içÍÛÑÑ1aܸqi©±±1r¹±i?™¯_"Â0Œ ÇÙíöoV­jjiyèþûiÜw7ÎcY–>¿E1 CÛð „0Æ Ãxfö÷ìÈÇ0Œ»mýÖ•þ)Àh‘¹K¿¥¥å»5kyQxöïS*•î‚ó,bÔեų&Ð<ß§õ›Œíàg‰’D»ûÐ*ACý÷J¯Ú¯E·!IJ,­í¢$!ŒûÜx´;J€>íB£tuãyÖv¥Wü®èhD¨?æ]üLè‡ˆïµ âÐAd¯¡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀë@诡¼„~ð:úÀëpWzಠ„\ú—1Âÿó¹Ú–ÕµŽò;, ~„Œ1Bˆþýõ³úõó¹J–EC=] XQYQ\RŒŒàèã0Æ‚(˜Ì&I’0ÂäÆ5úŒ±N«S)UV›Õj³^îÖiuJ…ÒbµXmVzðKWûb¶ !$)8(848”óõñ4`Óéü}Žlpù`ŒEQlji  ï<½„ÀFÂÈáp° ËqlXhèe ’(ÚNVçãã£Rª!—²Î·]Q­VN’$¸áè!ǵÛ ElL¬$J—² " ô¶¶fžÌL“âëã#IÒe‹ÆˆeØÚúºÂâ¢)§(J‰HøòÄ~º]mím§²OÁc^@¿"IÃ0¢ Úv†¹”FŒô‚0’$I!—;ÎËw~L—%—ËEQDÙì¶Ë÷Ëtn}qù¿?Œ1AD"Ò%·a!]0Æ’$ÑpyyW˜.‹\Þ{0„ú« ;ý!D’$I’PWËI’$BX†ñ¼$Š"ÆØ}e Š"Ã04K¢D¤^šÜ¸›!3?µžŸ^xbú.‘½O×AEúÜÅsèÖu»¬ùÙU±HÁCèôC4†Òø(I’R©”Ëd‹û´š¢V«EQt7rÑjµ‡C„ÄH=ÛØ`Œr¹‹çéLX–å8Îårõ\ºç­Œ°(‰r¹!$ÂO×wrºV˜ã8BFˆ«ÕêÐ%IR©T„‡ÃÑ-Ð3]G…^׊ÁLg»þ+]@ð[ÂÓÓgI’èÙ±V«Ý»n^þcüazTÐh4k×oˆ=j¤ÓédYvñÒe“'ŒŒŒt¹\î³o:OB˲6›-ûô©j5ú¸º¶fHâ`–e;'C#D‘Éduõõ’$©Õ*Qõ¾†¼‚|I’âbã” E¯Ñ¿óÒD’!r¹¼¾¾á«¥KY†aXvôÈ‘3§O£‡ †aAÐjµ;wïáXvÚÔ)V›cY÷<“ãëãóØ#ؼuÛ¡ô £±ýOO>Éqì·ß­qæ´©Æu8œô"€†~8ëô#!„$"I¢$Š¢(Š,Ëf9ªÕh ˜•}Êáp®Y·^§Ó¼õÚ+Æ ±Ú¬K¿ùf|ZÚ‹ÿ÷Ÿàà ‡Ãî>;î~Ç#B$™L6hÀ Ó¹9••‰ƒ1 Ón4–W”'L -.=[^Ui±ZSǤ„…†DLf³(ŠÁAAþ~þIC‡ <ßÜÒÒaé°ÛìjµºÛ"$IEQ’$I%IrºœF“©¡¡Áß`Ðju·l=z<óÚÙ³·ïܵÿÀ!•J….,*Z½vÝŒiSKËÊ–»òÆë¯‹ùóSOFEF|úÅ—:nÐÀ„-êè°ÐÎntþÎúý Æ$I""Èápäæå;œ£ÉÜÚÚš“›×ÞÞž–’¢Vk|}|¬«Ñh‘<Üàë«V©%‰xÞéöc,BhHHsK³V£ñõñE„Øl6…\¤Õh*ª*[ÛZ ¾¾*•F¡PЉŒ“)Šˆðð†ÆFs‡9$$DÆÉœ.§ç̼-C$BˆB®ðÑjU*Õö]»9–•D‰©ª¦fú´©áÅ%%~þ~ííF„HMm]Ò°aÓ’0BœŒ‹‰Žæy¾­Ý ðÂM×_ïÞ"Ú¸cháèwhQ§Õ>zÌj³~ðî|î£?Ù´uë”I“–._a·Û³²³‡ :"9ùƒNž4ñli)!D’D÷½þn³•$Âó¼ IC‡a„¬v»ÝáhikÍ:uÒátô†ˆ°°“§²åŠüú††I’h> Až :WQÞÚÞ6yüD^àÝ·_ºæïy¿‡äæçúåW.:'瑇 ÈÉÏÓjÔZm´ŸÁ Ñh6nÞúôãÅDGc„bc¢ƒ”J%!dþû<òàãÒRkëêBCCä29˲¢(z¶ eyä‘Ú¾õJ—ü* Ã8žçUJ• c^àG èt:ãbcµMZʘàà¦ææñãÆ80eôh–åìvÇ´É“cccX†•Á ¢ÐÖÞNÉBX†ÑiuµšÆfcZ­÷Õ:]._ߨ¨(•Jíããk±Xüüü襀N«Ójµ>:L&SÈå ÆL|lœ 4ê2 ãt:›š›lªP„……Êer½^ÛÍs‡$Òiu±11ÅgKY– ‰‹%ÅÅÆNž8¡´ìœÃé 0 ’2z´Ë媮© ð÷ vc$Iª«¯ÃéééÉÉÉ.— B? Osçð±Z­~?žç !J¥’e«Í†1æ8N¥TvX,ZF&—K¢h³Ûyž÷ññaFE«ÍFŸ»²,ër¹Ê*ÊÒÆ¤°]M'1Æ,ËÒ†ÿÇq4‚Ëd2Úœ†®˲ˆ A0ƈÆ\ŒA`Y6ódVTDdXh(Ïwžõsg2™ròó†&¥K§mIu:-m†oµÙœN'BH¥R©U*I’:,„Ng³ÙDIÒét¨k2•R©R«;::AðñÑq,çt¹l6-Ã0‚(œÌ> 7|ýE×ékWÃN cL£Ã0„—Ëåp8X–5šLtJÚ}·­­Íó_Ú‹~Ýó¦ îžgÉîðMC3mB#‚çáÁö àXÖßϯûÜ™sÔýà—çùææ÷<镇Õjí°XpWÛЦ–†a0BMÍ͸kå­6[‡ÅBŸ1´µµ„˜®¯ÓÍe ¡Я`„‰DhkwxíjCÙýuÏ66Ý^ã®æöî÷»uȺÀGÝH’$—Ë““†ãó;ÜÒ# êjáóã†xt(s¿»­›$‘óßD]OŒÝÓ{~>éEÐÂÐoЊ,‰Þœ¹äY1 #‰výUüDÿÛß½·#JƒI’X†ýÍi9ï'ÂXÌÀY? EQ£Ö˜Íæ–Ö–K£a‰H,ËÆDÅÔÕ×ëtÚKðå"—…DI´Zm±1±F£ñÒ²L_üv‰’¨T*õ¾zý€~…a˜°Ð0‹ÕB¤_5Ü•Z¥V(6›Íî°_¾ÐÁø* µJmwØ/÷𼽡½­B? _¡gõ¾ú_CAày^©Tj4šË½ÎtY …‚&º|ˆD–‘$‰Ã.÷æÀåFCY¯ml~é|†!á%þwXçßgY„«Às¼À[¬–n-–ô?„^àyç8–S)U,ÃBèO]Öæ6ç¡ø²ÐHç/WÈ9–ã0Æ,Ã2 Ã@î~@!Dù•ÍC)w/âË»]„Èd2„G¡ÇµßïèW7Ú)·¦®ÆérâËØ¼§˲!Á!¡†ÆÏ^]¿9B¤ À`†a …t‡1®k¨S«T‘áá’$]ζˆa‹ÕRSWƒ  Ôiu—i‰aQ››Úиz$Iàùˆ„„ßaY„0]hm]=B$<4ÌÑ5LüåXÇq’$åç@è€ÞœŸiçò!„ˆ’„1B‹]Yç.Ó‚$I"ˆ 4@o~÷&¿ç¡UôªG(vŸŒ_¸lÏÈE´Ú¤gýÝæÃ0LgéKm†ÓÛr1†ÌðÎ Ätd.Úø’6¡c ó³+ÓOÝyÿéûîoy6Þïq„è6:E‘Žý"—+8Ž¥wŸÜ#÷úÂ=Sº†aèØ2=FpÖ½pGKBˆ\&¯­¯Ë/,àXŽã¸²ŠòÒse ¹‚eY¹LîŽò2™L.—ŸÎ9c6›år¹\.ç8Žc9«ÍÖaéP*4LÓ÷{[܇¹\^|¶$ãØ‘œüÜã'ŽMFz8QÈå4»'Çq4 Ó Æ ¹œe:Çq …‚ø¶ö6…BÑcÛ ô@ïÎE‹üEß“$‘ât9Fc}c½Ó墣b5·´”W”ÛìvÌ0F£±¼²¢µ­• R|¶8¿°°¹µcÌ BeuU»±ýgó3 ¢3mò´€€€³e¥r¹Üf³•WUZmV†aÚFza2›A°;å••V«•ã8›ÝÖnlojn*¯¨<“—Kû ¸{'Ðc „~èÕùwÉ1Fî{8Éd²Êêª3y9u õ'Nf¹\®ªšêÂ’"«Íær¹X†iln²X,…ÅE•U•N§Óbµ457‹¢˜›Ÿgîè()-mjnvúÛ+Œ£ÉTßPg±X|}|-K^a¾ÕjÍ+(°;¥çÊjêj1ÆgòrZÛZ Š -6k^a¾Ó鬩©9yúT]}½ÑÔîr¹êDQüñ@FBB?ôê¼ûㄆ¦½Á Ã0ˆ I”Æ¥Ž7 gËJ“† MN®ÓjEQ  Óh4’DNghHXXphrRr[{[k[«\&³Z­õõç§mè~C#d³ÙNçæ¸x~Øà¡UÕUV«U&“µµ·µ··ÅFE7·´Ô76øhu§Óh2Êe²¶öö–¶VŽãB‚‚SF§ÆDÅô†1#GÉårÏc †³~è•g&„(ä “ÙdµYNGk[«R©D1˜Aˆˆ‚ “É0Fô”_”DÏŸ<}ŠeY­F#I’$ §ƒw90Æ2ŽÓi´IC†ÆÇÄy¦LîÙ`H”¤è¨¨Iã&¸\N£Ù$“Ëd2¹Þ×wÌÈQƒŸÁ`$© °0<,œa¹\®÷õ=bdp`‹ç1Æ’$ˆ’èr9mvûy×!xÌ ½ë Æcžçƒƒ‚ƒ‚²Ne?yB¥RE„‡‹¢X[W{øØa§Ë]ZV–}ú” r™L­Rµ´´8œ–eƒ‚‚Ì–Ž3y¹þAÁU5Õµõu§ƒÁÌA{,ÉÙ•Èv륭w\<ÏqFØb³°,«+<[vÒ&FV›•eXÚž‡ Ä`Œ1–$‰¹LF'æXÎlé8”žíú ÝN† !‚ Ќǒ$„xgYÎÏ` wT!r™L!—Ó×c½^"!D"mÍI?¢#>vË1"ä¼Eº‡•—‘Éd4˲N«óü®gGÏÜ­û1ÆJ¹B"îeužöCè€^u¿òc/-ŒA G9.Ï.]žwÕEéÇôËžï÷’¨³“Wç‹Î÷<š¹¿~´B?õ‘GÜÿqŽú ;"ñOgpEÑ ×£®ž½¿jY?Þ´Až}€/ÓF1 Fú 'c†aìv»N§“$©×¡4’ʸ_E Bc‡Ó‰Æ r8´!æoþèµó`†Íf—Ëåú þ MÍÍ—{AtD°À€ „QEe%Çq—ëÄcQ4­ŸÁB?tGQ*•áa¿OÊ~wRZsY—HQ©Tuµuú Me~—Vïžáþ².‘"Š"!B?ü¤Ë÷ÐõÊ.zó€×Ð^ç'oø¸ïs]¾‚ÝãÈü¶s–qw‹è9swG»‹Ù.÷ð7Пüdè×jµ,˸\¼Óé¼À÷i$ý¥á›æ¬P(’(Ú©kúžqV’¤_:s•R)ã8„1‘¤n)ë!Ç©”J§ËårñŽê4eÇïó|~O½„~:pÆá#mííâ£"#%BÜ™€Üy…è”ÇÉår‹ÅBÛ¢Ò÷=‡¯¤«éáÁnB!——WTä 4H¡P¨Õj‡ÃAçïž9Ã0Æb±Ð10é±AE:¾{YôÃ0„ –eJËÊš[Z$IRȉƒºC kk2›ežˆ‰Š äyžŽz,I„÷LˆDË0.—‹çyµZí¹>È£óž{‹ oayä‘Ïñ‚ ŧŸyôx¦Íf+(*JKIñõñEQEFC#¹Þ×W©Rq×ÐØ˜™urÔȇƒa½^¯T(œ.Ã0>:Z­–Ëdr¹\«ÓÒäG„µZ•ýÑ'Ÿrœìø‰‘ ñq[·m‹ŠŒôõõ•$I¯×«”JŒ±ËåÚ½w_òð$Œ‘B®À #I’N§ã8½¯¯R©t:µZ¡P8NŒ‘J¥úÏ‹/:}¦µ­­¦®nDòðÀ€¥R©R*%B!oÿï½æææÀÿèèhŽ“ÉœN§J¥Ô¨5†çy•Jå£Õj4êS§Ï:|dÜØ4•R©Öh8Ž£ùM}}|ÔB¡ ›s¥K~–e{ ŒEQþìóêšš®»¶¶®.0 0,4d÷ž½)cF›Ìæ½ûhÔ꯿îð±c<ÏOž8ÑjµIÒiµÜwïø±cNgssË–mÛZÛÚǷݶkÏžÓgrïºã¶ø¸øòŠŠŒ#G#ÃçN™”WPX]]m2›gϘ‘}útÖÉìÔ1cüü ñ±±ùgKËjëê&$Lœ0^’¤u›6µµµøûMMñññ;B€>§ûmtI",Ë>tÿ}K–.{ö?Ïçêõ¾{÷ؽwŸŒã¾XòµÓé|oÁ‚œ¼<“É$—Ër9  >þ„wñÅgÏ.ÿv¥Ýf_ðñǾ¾>ë6nÞ½w¿R©|ÁB/pgéè¸þÚkB=úÇïׯG!„• %]‹Åâëëk³ÙÞÿh!/jµZE¹\¾fíºÂÂB‚ÈâeËëê^yýÍ‹E.— ‚P^^Qr¶T.“B0ƒ].×ÿ>XðÈO.øø‹ÕòÁG‹dw&'gÅÊ•~~™ŒS*”Å%%óßû€²~Ó¦-?l?ž™¹ì›• ¹bïþ«V¯ñ÷ócæliÙCéé‡|¿~}hHÈÇŸQ[W·n㦣ǎû _,^ÒÐØH3©^éB€_¦{ègìp8n½yî§ Œ5êµyoÉɽëöÛsòòŽežð÷9"y̨QN§Ëh2FGE9"!>þ‘‡j7sóòMæÖֶʪj‰Hq±±÷ÝsÏè‘#‡' }èþûQ°Ù¬ǹx>"<|áï?ýÄãe¼÷áGÇ‹ˆð¾ûF$'ûü!‡£¥¥uØÁÑQQO=þXTd¤R©Ôhµr™Ì`ЫUª©S&ÕÖÖÊärBÈCÜÿäc4šLô¶>'“Ý}çí/<÷Ü]·ßÆó€„øî»÷†ë®mjnN6,,,ôáïÏ+(H4ð‰?>úÄÝ»¿ ˆ³fL¿÷î»Nž:uû-·<ú‡‡'OšÈ0X£QËe²)'Þ}ç ñq%%g³NžüóSOÞ}ç € è£zoá³~Ó¦ €ÀÉÃ׬[W_ß0cú´•kÖ|¸hÑ=wÞétº’‡' :ä¹^D% VS[[XX¤T(õ¾¾â㯟3G«ÕÚív«Õf³Zmv›Íf7›Í¼‹GI’¤P(ÎääÖÖÕ¥¦Œ‰‹‰nljDÁn³gž8´xé2A¦O’WPÀó¼Ñh¢3éõ+îuè|»ýËàÞW£ó8tþ†{ŽqÜm>,Ë ‚C/h† ·z}ÔÏ'm¦ÉFAo×\é¾’$IÒûúN?Žb³Ù®ôêÀ%âPQä{徫s¥Wø ãyÞ} ~ @ßâŽöÃ0r¹ý^ƒÑ¸Rèc^†a¸ÖÖÖììlÈFÞ€a˜ÖÖÖÿQ¨«Z ™âá%tEXtdate:create2013-09-27T11:09:27-04:00Ö²Y`%tEXtdate:modify2013-09-27T11:09:27-04:00§ïáÜtEXtSoftwareShutterc‚Ð IEND®B`‚selinux-python-2.8/sepolicy/sepolicy/help/users.txt000066400000000000000000000014561330160122500227000ustar00rootroot00000000000000By Default on a SELinux Targeted Policy system, all users login using the unconfined_t user. SELinux has a very powerful concept called confined users. You can setup individual users on your system to login with different SELinux user types. This SELinux User Screen allows you to create/modify SELinux Users and map them to SELinux Roles and MLS/MCS Ranges Default SELinux Users: * Terminal user/ssh - guest_u - No Network, No setuid, no exec in homedir * Browser user/kiosk - xguest_u - Web access ports only. No setuid, no exec in homedir * Full Desktop user - User_u - Full Network, No SETUID. * Confined Admin/Desktop User - Staff_u - Full Network, sudo to admin only, no root password. Usually a confined admin * Unconfined user - unconfined_u (Default) - SELinux does not block access. selinux-python-2.8/sepolicy/sepolicy/interface.py000066400000000000000000000200301330160122500223450ustar00rootroot00000000000000#!/usr/bin/python -Es # # Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import re import sys import sepolicy ADMIN_TRANSITION_INTERFACE = "_admin$" USER_TRANSITION_INTERFACE = "_role$" __all__ = ['get_all_interfaces', 'get_interfaces_from_xml', 'get_admin', 'get_user', 'get_interface_dict', 'get_interface_format_text', 'get_interface_compile_format_text', 'get_xml_file', 'interface_compile_test'] ## ## I18N ## PROGNAME = "policycoreutils" try: import gettext kwargs = {} if sys.version_info < (3,): kwargs['unicode'] = True gettext.install(PROGNAME, localedir="/usr/share/locale", codeset='utf-8', **kwargs) except: try: import builtins builtins.__dict__['_'] = str except ImportError: import __builtin__ __builtin__.__dict__['_'] = unicode def get_interfaces_from_xml(path): """ Get all interfaces from given xml file""" interfaces_list = [] idict = get_interface_dict(path) for k in idict.keys(): interfaces_list.append(k) return interfaces_list def get_all_interfaces(path=""): from sepolicy import get_methods all_interfaces = [] if not path: all_interfaces = get_methods() else: xml_path = get_xml_file(path) all_interfaces = get_interfaces_from_xml(xml_path) return all_interfaces def get_admin(path=""): """ Get all domains with an admin interface from installed policy.""" """ If xml_path is specified, func returns an admin interface from specified xml file""" admin_list = [] if path: try: xml_path = get_xml_file(path) idict = get_interface_dict(xml_path) for k in idict.keys(): if k.endswith("_admin"): admin_list.append(k) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) else: for i in sepolicy.get_methods(): if i.endswith("_admin"): admin_list.append(i.split("_admin")[0]) return admin_list def get_user(path=""): """ Get all domains with SELinux user role interface""" """ If xml_path is specified, func returns an user role interface from specified xml file""" trans_list = [] if path: try: xml_path = get_xml_file(path) idict = get_interface_dict(xml_path) for k in idict.keys(): if k.endswith("_role"): if (("%s_exec_t" % k[:-5]) in sepolicy.get_all_types()): trans_list.append(k) except IOError as e: sys.stderr.write("%s: %s\n" % (e.__class__.__name__, str(e))) sys.exit(1) else: for i in sepolicy.get_methods(): m = re.findall("(.*)%s" % USER_TRANSITION_INTERFACE, i) if len(m) > 0: if "%s_exec_t" % m[0] in sepolicy.get_all_types(): trans_list.append(m[0]) return trans_list interface_dict = None def get_interface_dict(path="/usr/share/selinux/devel/policy.xml"): global interface_dict import os import xml.etree.ElementTree if interface_dict: return interface_dict interface_dict = {} param_list = [] xml_path = """ """ xml_path += path xml_path += """ """ try: if os.path.isfile(path): tree = xml.etree.ElementTree.parse(path) else: tree = xml.etree.ElementTree.fromstring(xml_path) for l in tree.findall("layer"): for m in l.findall("module"): for i in m.getiterator('interface'): for e in i.findall("param"): param_list.append(e.get('name')) interface_dict[(i.get("name"))] = [param_list, (i.find('summary').text), "interface"] param_list = [] for i in m.getiterator('template'): for e in i.findall("param"): param_list.append(e.get('name')) interface_dict[(i.get("name"))] = [param_list, (i.find('summary').text), "template"] param_list = [] except IOError: pass return interface_dict def get_interface_format_text(interface, path="/usr/share/selinux/devel/policy.xml"): idict = get_interface_dict(path) interface_text = "%s(%s) %s" % (interface, ", ".join(idict[interface][0]), " ".join(idict[interface][1].split("\n"))) return interface_text def get_interface_compile_format_text(interfaces_dict, interface): from .templates import test_module param_tmp = [] for i in interfaces_dict[interface][0]: param_tmp.append(test_module.dict_values[i]) interface_text = "%s(%s)\n" % (interface, ", ".join(param_tmp)) return interface_text def generate_compile_te(interface, idict, name="compiletest"): from .templates import test_module te = "" te += re.sub("TEMPLATETYPE", name, test_module.te_test_module) te += get_interface_compile_format_text(idict, interface) return te def get_xml_file(if_file): """ Returns xml format of interfaces for given .if policy file""" import os try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput basedir = os.path.dirname(if_file) + "/" filename = os.path.basename(if_file).split(".")[0] rc, output = getstatusoutput("python /usr/share/selinux/devel/include/support/segenxml.py -w -m %s" % basedir + filename) if rc != 0: sys.stderr.write("\n Could not proceed selected interface file.\n") sys.stderr.write("\n%s" % output) sys.exit(1) else: return output def interface_compile_test(interface, path="/usr/share/selinux/devel/policy.xml"): exclude_interfaces = ["userdom", "kernel", "corenet", "files", "dev"] exclude_interface_type = ["template"] try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput import os policy_files = {'pp': "compiletest.pp", 'te': "compiletest.te", 'fc': "compiletest.fc", 'if': "compiletest.if"} idict = get_interface_dict(path) if not (interface.split("_")[0] in exclude_interfaces or idict[interface][2] in exclude_interface_type): print(_("Compiling %s interface") % interface) try: fd = open(policy_files['te'], "w") fd.write(generate_compile_te(interface, idict)) fd.close() rc, output = getstatusoutput("make -f /usr/share/selinux/devel/Makefile %s" % policy_files['pp']) if rc != 0: sys.stderr.write(output) sys.stderr.write(_("\nCompile test for %s failed.\n") % interface) except EnvironmentError as e: sys.stderr.write(_("\nCompile test for %s has not run. %s\n") % (interface, e)) for v in policy_files.values(): if os.path.exists(v): os.remove(v) else: sys.stderr.write(_("\nCompiling of %s interface is not supported.") % interface) selinux-python-2.8/sepolicy/sepolicy/manpage.py000077500000000000000000001211001330160122500220200ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2012-2013 Red Hat # AUTHOR: Dan Walsh # AUTHOR: Miroslav Grepl # see file 'COPYING' for use and warranty information # # semanage is a tool for managing SELinux configuration files # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # __all__ = ['ManPage', 'HTMLManPages', 'manpage_domains', 'manpage_roles', 'gen_domains'] import string import selinux import sepolicy import os import time typealias_types = { "antivirus_t":("amavis_t", "clamd_t", "clamscan_t", "freshclam_t"), "cluster_t":("rgmanager_t", "corosync_t", "aisexec_t", "pacemaker_t"), "svirt_t":("qemu_t"), "httpd_t":("phpfpm_t"), } equiv_dict = {"smbd": ["samba"], "httpd": ["apache"], "virtd": ["virt", "libvirt"], "named": ["bind"], "fsdaemon": ["smartmon"], "mdadm": ["raid"]} equiv_dirs = ["/var"] modules_dict = None def gen_modules_dict(path="/usr/share/selinux/devel/policy.xml"): global modules_dict if modules_dict: return modules_dict import xml.etree.ElementTree modules_dict = {} try: tree = xml.etree.ElementTree.fromstring(sepolicy.policy_xml(path)) for l in tree.findall("layer"): for m in l.findall("module"): name = m.get("name") if name == "user" or name == "unconfined": continue if name == "unprivuser": name = "user" if name == "unconfineduser": name = "unconfined" for b in m.findall("summary"): modules_dict[name] = b.text except IOError: pass return modules_dict users = None users_range = None def get_all_users_info(): global users global users_range if users and users_range: return users, users_range users = [] users_range = {} allusers = [] allusers_info = sepolicy.info(sepolicy.USER) for d in allusers_info: allusers.append(d['name']) if 'range' in d: users_range[d['name'].split("_")[0]] = d['range'] for u in allusers: if u not in ["system_u", "root", "unconfined_u"]: users.append(u.replace("_u", "")) users.sort() return users, users_range all_entrypoints = None def get_entrypoints(): global all_entrypoints if not all_entrypoints: all_entrypoints = next(sepolicy.info(sepolicy.ATTRIBUTE, "entry_type"))["types"] return all_entrypoints domains = None def gen_domains(): global domains if domains: return domains domains = [] for d in sepolicy.get_all_domains(): found = False domain = d[:-2] # if domain + "_exec_t" not in get_entrypoints(): # continue if domain in domains: continue domains.append(domain) for role in sepolicy.get_all_roles(): if role[:-2] in domains or role == "system_r": continue domains.append(role[:-2]) domains.sort() return domains types = None def _gen_types(): global types if types: return types all_types = sepolicy.info(sepolicy.TYPE) types = {} for rec in all_types: try: types[rec["name"]] = rec["attributes"] except: types[rec["name"]] = [] return types def prettyprint(f, trim): return " ".join(f[:-len(trim)].split("_")) # for HTML man pages manpage_domains = [] manpage_roles = [] fedora_releases = ["Fedora17", "Fedora18"] rhel_releases = ["RHEL6", "RHEL7"] def get_alphabet_manpages(manpage_list): alphabet_manpages = dict.fromkeys(string.ascii_letters, []) for i in string.ascii_letters: temp = [] for j in manpage_list: if j.split("/")[-1][0] == i: temp.append(j.split("/")[-1]) alphabet_manpages[i] = temp return alphabet_manpages def convert_manpage_to_html(html_manpage, manpage): try: from commands import getstatusoutput except ImportError: from subprocess import getstatusoutput rc, output = getstatusoutput("/usr/bin/groff -man -Thtml %s 2>/dev/null" % manpage) if rc == 0: print(html_manpage, "has been created") fd = open(html_manpage, 'w') fd.write(output) fd.close() class HTMLManPages: """ Generate a HHTML Manpages on an given SELinux domains """ def __init__(self, manpage_roles, manpage_domains, path, os_version): self.manpage_roles = get_alphabet_manpages(manpage_roles) self.manpage_domains = get_alphabet_manpages(manpage_domains) self.os_version = os_version self.old_path = path + "/" self.new_path = self.old_path + self.os_version + "/" if self.os_version in fedora_releases or self.os_version in rhel_releases: self.__gen_html_manpages() else: print("SELinux HTML man pages can not be generated for this %s" % os_version) exit(1) def __gen_html_manpages(self): self._write_html_manpage() self._gen_index() self._gen_body() self._gen_css() def _write_html_manpage(self): if not os.path.isdir(self.new_path): os.mkdir(self.new_path) for domain in self.manpage_domains.values(): if len(domain): for d in domain: convert_manpage_to_html((self.new_path + d.rsplit("_selinux", 1)[0] + ".html"), self.old_path + d) for role in self.manpage_roles.values(): if len(role): for r in role: convert_manpage_to_html((self.new_path + r.rsplit("_selinux", 1)[0] + ".html"), self.old_path + r) def _gen_index(self): index = self.old_path + "index.html" fd = open(index, 'w') fd.write(""" SELinux man pages online

SELinux man pages



Fedora or Red Hat Enterprise Linux Man Pages.


Fedora

""")
        for f in fedora_releases:
            fd.write("""
%s - SELinux man pages for %s """ % (f, f, f, f))

        fd.write("""

RHEL

""")
        for r in rhel_releases:
            fd.write("""
%s - SELinux man pages for %s """ % (r, r, r, r))

        fd.write("""
""") fd.close() print("%s has been created" % index) def _gen_body(self): html = self.new_path + self.os_version + ".html" fd = open(html, 'w') fd.write(""" Linux man-pages online for Fedora18

SELinux man pages for Fedora18


SELinux roles

""") for letter in self.manpage_roles: if len(self.manpage_roles[letter]): fd.write(""" %s""" % (letter, letter)) fd.write("""
""")
        rolename_body = ""
        for letter in self.manpage_roles:
            if len(self.manpage_roles[letter]):
                rolename_body += "

" for r in self.manpage_roles[letter]: rolename = r.rsplit("_selinux", 1)[0] rolename_body += "%s_selinux(8) - Security Enhanced Linux Policy for the %s SELinux user\n" % (letter, rolename, rolename, rolename) fd.write("""%s


SELinux domains

""" % rolename_body) for letter in self.manpage_domains: if len(self.manpage_domains[letter]): fd.write(""" %s """ % (letter, letter)) fd.write("""
""")
        domainname_body = ""
        for letter in self.manpage_domains:
            if len(self.manpage_domains[letter]):
                domainname_body += "

" for r in self.manpage_domains[letter]: domainname = r.rsplit("_selinux", 1)[0] domainname_body += "%s_selinux(8) - Security Enhanced Linux Policy for the %s SELinux processes\n" % (letter, domainname, domainname, domainname) fd.write("""%s

""" % domainname_body) fd.close() print("%s has been created" % html) def _gen_css(self): style_css = self.old_path + "style.css" fd = open(style_css, 'w') fd.write(""" html, body { background-color: #fcfcfc; font-family: arial, sans-serif; font-size: 110%; color: #333; } h1, h2, h3, h4, h5, h5 { color: #2d7c0b; font-family: arial, sans-serif; margin-top: 25px; } a { color: #336699; text-decoration: none; } a:visited { color: #4488bb; } a:hover, a:focus, a:active { color: #07488A; text-decoration: none; } a.func { color: red; text-decoration: none; } a.file { color: red; text-decoration: none; } pre.code { background-color: #f4f0f4; // font-family: monospace, courier; font-size: 110%; margin-left: 0px; margin-right: 60px; padding-top: 5px; padding-bottom: 5px; padding-left: 8px; padding-right: 8px; border: 1px solid #AADDAA; } .url { font-family: serif; font-style: italic; color: #440064; } """) fd.close() print("%s has been created" % style_css) class ManPage: """ Generate a Manpage on an SELinux domain in the specified path """ modules_dict = None enabled_str = ["Disabled", "Enabled"] def __init__(self, domainname, path="/tmp", root="/", source_files=False, html=False): self.html = html self.source_files = source_files self.root = root self.portrecs = sepolicy.gen_port_dict()[0] self.domains = gen_domains() self.all_domains = sepolicy.get_all_domains() self.all_attributes = sepolicy.get_all_attributes() self.all_bools = sepolicy.get_all_bools() self.all_port_types = sepolicy.get_all_port_types() self.all_roles = sepolicy.get_all_roles() self.all_users = get_all_users_info()[0] self.all_users_range = get_all_users_info()[1] self.all_file_types = sepolicy.get_all_file_types() self.role_allows = sepolicy.get_all_role_allows() self.types = _gen_types() if self.source_files: self.fcpath = self.root + "file_contexts" else: self.fcpath = self.root + selinux.selinux_file_context_path() self.fcdict = sepolicy.get_fcdict(self.fcpath) if not os.path.exists(path): os.makedirs(path) self.path = path if self.source_files: self.xmlpath = self.root + "policy.xml" else: self.xmlpath = self.root + "/usr/share/selinux/devel/policy.xml" self.booleans_dict = sepolicy.gen_bool_dict(self.xmlpath) self.domainname, self.short_name = sepolicy.gen_short_name(domainname) self.type = self.domainname + "_t" self._gen_bools() self.man_page_path = "%s/%s_selinux.8" % (path, self.domainname) self.fd = open(self.man_page_path, 'w') if self.domainname + "_r" in self.all_roles: self.__gen_user_man_page() if self.html: manpage_roles.append(self.man_page_path) else: if self.html: manpage_domains.append(self.man_page_path) self.__gen_man_page() self.fd.close() for k in equiv_dict.keys(): if k == self.domainname: for alias in equiv_dict[k]: self.__gen_man_page_link(alias) def _gen_bools(self): self.bools = [] self.domainbools = [] types = [self.type] if self.domainname in equiv_dict: for t in equiv_dict[self.domainname]: if t + "_t" in self.all_domains: types.append(t + "_t") for t in types: domainbools, bools = sepolicy.get_bools(t) self.bools += bools self.domainbools += domainbools self.bools.sort() self.domainbools.sort() def get_man_page_path(self): return self.man_page_path def __gen_user_man_page(self): self.role = self.domainname + "_r" if not self.modules_dict: self.modules_dict = gen_modules_dict(self.xmlpath) try: self.desc = self.modules_dict[self.domainname] except: self.desc = "%s user role" % self.domainname if self.domainname in self.all_users: self.attributes = next(sepolicy.info(sepolicy.TYPE, (self.type)))["attributes"] self._user_header() self._user_attribute() self._can_sudo() self._xwindows_login() # until a new policy build with login_userdomain attribute #self.terminal_login() self._network() self._booleans() self._home_exec() self._transitions() else: self._role_header() self._booleans() self._port_types() self._mcs_types() self._writes() self._footer() def __gen_man_page_link(self, alias): path = "%s/%s_selinux.8" % (self.path, alias) self.fd = open("%s/%s_selinux.8" % (self.path, alias), 'w') self.fd.write(".so man8/%s_selinux.8" % self.domainname) self.fd.close() print(path) def __gen_man_page(self): self.anon_list = [] self.attributes = {} self.ptypes = [] self._get_ptypes() for domain_type in self.ptypes: try: if typealias_types[domain_type]: fd = self.fd man_page_path = self.man_page_path for t in typealias_types[domain_type]: self._typealias_gen_man(t) self.fd = fd self.man_page_path = man_page_path except KeyError: continue; self.attributes[domain_type] = next(sepolicy.info(sepolicy.TYPE, ("%s") % domain_type))["attributes"] self._header() self._entrypoints() self._process_types() self._mcs_types() self._booleans() self._nsswitch_domain() self._port_types() self._writes() self._file_context() self._public_content() self._footer() def _get_ptypes(self): for f in self.all_domains: if f.startswith(self.short_name) or f.startswith(self.domainname): self.ptypes.append(f) def _typealias_gen_man(self, t): self.man_page_path = "%s/%s_selinux.8" % (self.path, t[:-2]) self.ports = [] self.booltext = "" self.fd = open(self.man_page_path, 'w') self._typealias(t[:-2]) self._footer() self.fd.close() def _typealias(self,typealias): self.fd.write('.TH "%(typealias)s_selinux" "8" "%(date)s" "%(typealias)s" "SELinux Policy %(typealias)s"' % {'typealias':typealias, 'date': time.strftime("%y-%m-%d")}) self.fd.write(r""" .SH "NAME" %(typealias)s_selinux \- Security Enhanced Linux Policy for the %(typealias)s processes .SH "DESCRIPTION" %(typealias)s_t SELinux domain type is now associated with %(domainname)s domain type (%(domainname)s_t). """ % {'typealias':typealias, 'domainname':self.domainname}) self.fd.write(r""" Please see .B %(domainname)s_selinux man page for more details. """ % {'domainname':self.domainname}) def _header(self): self.fd.write('.TH "%(domainname)s_selinux" "8" "%(date)s" "%(domainname)s" "SELinux Policy %(domainname)s"' % {'domainname': self.domainname, 'date': time.strftime("%y-%m-%d")}) self.fd.write(r""" .SH "NAME" %(domainname)s_selinux \- Security Enhanced Linux Policy for the %(domainname)s processes .SH "DESCRIPTION" Security-Enhanced Linux secures the %(domainname)s processes via flexible mandatory access control. The %(domainname)s processes execute with the %(domainname)s_t SELinux type. You can check if you have these processes running by executing the \fBps\fP command with the \fB\-Z\fP qualifier. For example: .B ps -eZ | grep %(domainname)s_t """ % {'domainname': self.domainname}) def _format_boolean_desc(self, b): desc = self.booleans_dict[b][2][0].lower() + self.booleans_dict[b][2][1:] if desc[-1] == ".": desc = desc[:-1] return desc def _gen_bool_text(self): booltext = "" for b, enabled in self.domainbools + self.bools: if b.endswith("anon_write") and b not in self.anon_list: self.anon_list.append(b) else: if b not in self.booleans_dict: continue booltext += """ .PP If you want to %s, you must turn on the %s boolean. %s by default. .EX .B setsebool -P %s 1 .EE """ % (self._format_boolean_desc(b), b, self.enabled_str[enabled], b) return booltext def _booleans(self): self.booltext = self._gen_bool_text() if self.booltext != "": self.fd.write(""" .SH BOOLEANS SELinux policy is customizable based on least access required. %s policy is extremely flexible and has several booleans that allow you to manipulate the policy and run %s with the tightest access possible. """ % (self.domainname, self.domainname)) self.fd.write(self.booltext) def _nsswitch_domain(self): nsswitch_types = [] nsswitch_booleans = ['authlogin_nsswitch_use_ldap', 'kerberos_enabled'] nsswitchbooltext = "" for k in self.attributes.keys(): if "nsswitch_domain" in self.attributes[k]: nsswitch_types.append(k) if len(nsswitch_types): self.fd.write(""" .SH NSSWITCH DOMAIN """) for b in nsswitch_booleans: nsswitchbooltext += """ .PP If you want to %s for the %s, you must turn on the %s boolean. .EX .B setsebool -P %s 1 .EE """ % (self._format_boolean_desc(b), (", ".join(nsswitch_types)), b, b) self.fd.write(nsswitchbooltext) def _process_types(self): if len(self.ptypes) == 0: return self.fd.write(r""" .SH PROCESS TYPES SELinux defines process types (domains) for each process running on the system .PP You can see the context of a process using the \fB\-Z\fP option to \fBps\bP .PP Policy governs the access confined processes have to files. SELinux %(domainname)s policy is very flexible allowing users to setup their %(domainname)s processes in as secure a method as possible. .PP The following process types are defined for %(domainname)s: """ % {'domainname': self.domainname}) self.fd.write(""" .EX .B %s .EE""" % ", ".join(self.ptypes)) self.fd.write(""" .PP Note: .B semanage permissive -a %(domainname)s_t can be used to make the process type %(domainname)s_t permissive. SELinux does not deny access to permissive process types, but the AVC (SELinux denials) messages are still generated. """ % {'domainname': self.domainname}) def _port_types(self): self.ports = [] for f in self.all_port_types: if f.startswith(self.short_name) or f.startswith(self.domainname): self.ports.append(f) if len(self.ports) == 0: return self.fd.write(""" .SH PORT TYPES SELinux defines port types to represent TCP and UDP ports. .PP You can see the types associated with a port by using the following command: .B semanage port -l .PP Policy governs the access confined processes have to these ports. SELinux %(domainname)s policy is very flexible allowing users to setup their %(domainname)s processes in as secure a method as possible. .PP The following port types are defined for %(domainname)s:""" % {'domainname': self.domainname}) for p in self.ports: self.fd.write(""" .EX .TP 5 .B %s .TP 10 .EE """ % p) once = True for prot in ("tcp", "udp"): if (p, prot) in self.portrecs: if once: self.fd.write(""" Default Defined Ports:""") once = False self.fd.write(r""" %s %s .EE""" % (prot, ",".join(self.portrecs[(p, prot)]))) def _file_context(self): flist = [] mpaths = [] for f in self.all_file_types: if f.startswith(self.domainname): flist.append(f) if f in self.fcdict: mpaths = mpaths + self.fcdict[f]["regex"] if len(mpaths) == 0: return mpaths.sort() mdirs = {} for mp in mpaths: found = False for md in mdirs: if mp.startswith(md): mdirs[md].append(mp) found = True break if not found: for e in equiv_dirs: if mp.startswith(e) and mp.endswith('(/.*)?'): mdirs[mp[:-6]] = [] break equiv = [] for m in mdirs: if len(mdirs[m]) > 0: equiv.append(m) self.fd.write(r""" .SH FILE CONTEXTS SELinux requires files to have an extended attribute to define the file type. .PP You can see the context of a file using the \fB\-Z\fP option to \fBls\bP .PP Policy governs the access confined processes have to these files. SELinux %(domainname)s policy is very flexible allowing users to setup their %(domainname)s processes in as secure a method as possible. .PP """ % {'domainname': self.domainname}) if len(equiv) > 0: self.fd.write(r""" .PP .B EQUIVALENCE DIRECTORIES """) for e in equiv: self.fd.write(r""" .PP %(domainname)s policy stores data with multiple different file context types under the %(equiv)s directory. If you would like to store the data in a different directory you can use the semanage command to create an equivalence mapping. If you wanted to store this data under the /srv dirctory you would execute the following command: .PP .B semanage fcontext -a -e %(equiv)s /srv/%(alt)s .br .B restorecon -R -v /srv/%(alt)s .PP """ % {'domainname': self.domainname, 'equiv': e, 'alt': e.split('/')[-1]}) self.fd.write(r""" .PP .B STANDARD FILE CONTEXT SELinux defines the file context types for the %(domainname)s, if you wanted to store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. .B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?' .br .B restorecon -R -v /srv/my%(domainname)s_content Note: SELinux often uses regular expressions to specify labels that match multiple files. """ % {'domainname': self.domainname, "type": flist[0]}) self.fd.write(r""" .I The following file types are defined for %(domainname)s: """ % {'domainname': self.domainname}) flist.sort() for f in flist: self.fd.write(""" .EX .PP .B %s .EE - %s """ % (f, sepolicy.get_description(f))) if f in self.fcdict: plural = "" if len(self.fcdict[f]["regex"]) > 1: plural = "s" self.fd.write(""" .br .TP 5 Path%s: %s""" % (plural, self.fcdict[f]["regex"][0])) for x in self.fcdict[f]["regex"][1:]: self.fd.write(", %s" % x) self.fd.write(""" .PP Note: File context can be temporarily modified with the chcon command. If you want to permanently change the file context you need to use the .B semanage fcontext command. This will modify the SELinux labeling database. You will need to use .B restorecon to apply the labels. """) def _see_also(self): ret = "" for d in self.domains: if d == self.domainname: continue if d.startswith(self.short_name): ret += ", %s_selinux(8)" % d if d.startswith(self.domainname + "_"): ret += ", %s_selinux(8)" % d self.fd.write(ret) def _public_content(self): if len(self.anon_list) > 0: self.fd.write(""" .SH SHARING FILES If you want to share files with multiple domains (Apache, FTP, rsync, Samba), you can set a file context of public_content_t and public_content_rw_t. These context allow any of the above domains to read the content. If you want a particular domain to write to the public_content_rw_t domain, you must set the appropriate boolean. .TP Allow %(domainname)s servers to read the /var/%(domainname)s directory by adding the public_content_t file type to the directory and by restoring the file type. .PP .B semanage fcontext -a -t public_content_t "/var/%(domainname)s(/.*)?" .br .B restorecon -F -R -v /var/%(domainname)s .pp .TP Allow %(domainname)s servers to read and write /var/%(domainname)s/incoming by adding the public_content_rw_t type to the directory and by restoring the file type. You also need to turn on the %(domainname)s_anon_write boolean. .PP .B semanage fcontext -a -t public_content_rw_t "/var/%(domainname)s/incoming(/.*)?" .br .B restorecon -F -R -v /var/%(domainname)s/incoming .br .B setsebool -P %(domainname)s_anon_write 1 """ % {'domainname': self.domainname}) for b in self.anon_list: desc = self.booleans_dict[b][2][0].lower() + self.booleans_dict[b][2][1:] self.fd.write(""" .PP If you want to %s, you must turn on the %s boolean. .EX .B setsebool -P %s 1 .EE """ % (desc, b, b)) def _footer(self): self.fd.write(""" .SH "COMMANDS" .B semanage fcontext can also be used to manipulate default file context mappings. .PP .B semanage permissive can also be used to manipulate whether or not a process type is permissive. .PP .B semanage module can also be used to enable/disable/install/remove policy modules. """) if len(self.ports) > 0: self.fd.write(""" .B semanage port can also be used to manipulate the port definitions """) if self.booltext != "": self.fd.write(""" .B semanage boolean can also be used to manipulate the booleans """) self.fd.write(""" .PP .B system-config-selinux is a GUI tool available to customize SELinux policy settings. .SH AUTHOR This manual page was auto-generated using .B "sepolicy manpage". .SH "SEE ALSO" selinux(8), %s(8), semanage(8), restorecon(8), chcon(1), sepolicy(8)""" % (self.domainname)) if self.booltext != "": self.fd.write(", setsebool(8)") self._see_also() def _valid_write(self, check, attributes): if check in [self.type, "domain"]: return False if check.endswith("_t"): for a in attributes: if a in self.types[check]: return False return True def _entrypoints(self): entrypoints = [x['target'] for x in filter(lambda y: y['source'] == self.type and y['class'] == 'file' and 'entrypoint' in y['permlist'], sepolicy.get_all_allow_rules() )] if len(entrypoints) == 0: return self.fd.write(""" .SH "ENTRYPOINTS" """) if len(entrypoints) > 1: entrypoints_str = "\\fB%s\\fP file types" % ", ".join(entrypoints) else: entrypoints_str = "\\fB%s\\fP file type" % entrypoints[0] self.fd.write(""" The %s_t SELinux type can be entered via the %s. The default entrypoint paths for the %s_t domain are the following: """ % (self.domainname, entrypoints_str, self.domainname)) if "bin_t" in entrypoints: entrypoints.remove("bin_t") self.fd.write(""" All executeables with the default executable label, usually stored in /usr/bin and /usr/sbin.""") paths = [] for entrypoint in entrypoints: if entrypoint in self.fcdict: paths += self.fcdict[entrypoint]["regex"] self.fd.write(""" %s""" % ", ".join(paths)) def _mcs_types(self): try: mcs_constrained_type = next(sepolicy.info(sepolicy.ATTRIBUTE, "mcs_constrained_type")) except StopIteration: return if self.type not in mcs_constrained_type['types']: return self.fd.write (""" .SH "MCS Constrained" The SELinux process type %(type)s_t is an MCS (Multi Category Security) constrained type. Sometimes this separation is referred to as sVirt. These types are usually used for securing multi-tenant environments, such as virtualization, containers or separation of users. The tools used to launch MCS types, pick out a different MCS label for each process group. For example one process might be launched with %(type)s_t:s0:c1,c2, and another process launched with %(type)s_t:s0:c3,c4. The SELinux kernel only allows these processes can only write to content with a matching MCS label, or a MCS Label of s0. A process running with the MCS level of s0:c1,c2 is not allowed to write to content with the MCS label of s0:c3,c4 """ % {'type': self.domainname}) def _writes(self): # add assigned attributes src_list = [self.type] try: src_list += list(filter(lambda x: x['name'] == self.type, sepolicy.get_all_types_info()))[0]['attributes'] except: pass permlist = list(filter(lambda x: x['source'] in src_list and set(['open', 'write']).issubset(x['permlist']) and x['class'] == 'file', sepolicy.get_all_allow_rules())) if permlist is None or len(permlist) == 0: return all_writes = [] attributes = ["proc_type", "sysctl_type"] for i in permlist: if self._valid_write(i['target'], attributes): if i['target'] not in all_writes: all_writes.append(i['target']) if len(all_writes) == 0: return self.fd.write(""" .SH "MANAGED FILES" """) self.fd.write(""" The SELinux process type %s_t can manage files labeled with the following file types. The paths listed are the default paths for these file types. Note the processes UID still need to have DAC permissions. """ % self.domainname) all_writes.sort() if "file_type" in all_writes: all_writes = ["file_type"] for f in all_writes: self.fd.write(""" .br .B %s """ % f) if f in self.fcdict: for path in self.fcdict[f]["regex"]: self.fd.write("""\t%s .br """ % path) def _get_users_range(self): if self.domainname in self.all_users_range: return self.all_users_range[self.domainname] return "s0" def _user_header(self): self.fd.write('.TH "%(type)s_selinux" "8" "%(type)s" "mgrepl@redhat.com" "%(type)s SELinux Policy documentation"' % {'type': self.domainname}) self.fd.write(r""" .SH "NAME" %(user)s_u \- \fB%(desc)s\fP - Security Enhanced Linux Policy .SH DESCRIPTION \fB%(user)s_u\fP is an SELinux User defined in the SELinux policy. SELinux users have default roles, \fB%(user)s_r\fP. The default role has a default type, \fB%(user)s_t\fP, associated with it. The SELinux user will usually login to a system with a context that looks like: .B %(user)s_u:%(user)s_r:%(user)s_t:%(range)s Linux users are automatically assigned an SELinux users at login. Login programs use the SELinux User to assign initial context to the user's shell. SELinux policy uses the context to control the user's access. By default all users are assigned to the SELinux user via the \fB__default__\fP flag On Targeted policy systems the \fB__default__\fP user is assigned to the \fBunconfined_u\fP SELinux user. You can list all Linux User to SELinux user mapping using: .B semanage login -l If you wanted to change the default user mapping to use the %(user)s_u user, you would execute: .B semanage login -m -s %(user)s_u __default__ """ % {'desc': self.desc, 'type': self.type, 'user': self.domainname, 'range': self._get_users_range()}) if "login_userdomain" in self.attributes and "login_userdomain" in self.all_attributes: self.fd.write(""" If you want to map the one Linux user (joe) to the SELinux user %(user)s, you would execute: .B $ semanage login -a -s %(user)s_u joe """ % {'user': self.domainname}) def _can_sudo(self): sudotype = "%s_sudo_t" % self.domainname self.fd.write(""" .SH SUDO """) if sudotype in self.types: role = self.domainname + "_r" self.fd.write(""" The SELinux user %(user)s can execute sudo. You can set up sudo to allow %(user)s to transition to an administrative domain: Add one or more of the following record to sudoers using visudo. """ % {'user': self.domainname}) for adminrole in self.role_allows[role]: self.fd.write(""" USERNAME ALL=(ALL) ROLE=%(admin)s_r TYPE=%(admin)s_t COMMAND .br sudo will run COMMAND as %(user)s_u:%(admin)s_r:%(admin)s_t:LEVEL """ % {'admin': adminrole[:-2], 'user': self.domainname}) self.fd.write(""" You might also need to add one or more of these new roles to your SELinux user record. List the SELinux roles your SELinux user can reach by executing: .B $ semanage user -l |grep selinux_name Modify the roles list and add %(user)s_r to this list. .B $ semanage user -m -R '%(roles)s' %(user)s_u For more details you can see semanage man page. """ % {'user': self.domainname, "roles": " ".join([role] + self.role_allows[role])}) else: self.fd.write(""" The SELinux type %s_t is not allowed to execute sudo. """ % self.domainname) def _user_attribute(self): self.fd.write(""" .SH USER DESCRIPTION """) if "unconfined_usertype" in self.attributes: self.fd.write(""" The SELinux user %s_u is an unconfined user. It means that a mapped Linux user to this SELinux user is supposed to be allow all actions. """ % self.domainname) if "unpriv_userdomain" in self.attributes: self.fd.write(""" The SELinux user %s_u is defined in policy as a unprivileged user. SELinux prevents unprivileged users from doing administration tasks without transitioning to a different role. """ % self.domainname) if "admindomain" in self.attributes: self.fd.write(""" The SELinux user %s_u is an admin user. It means that a mapped Linux user to this SELinux user is intended for administrative actions. Usually this is assigned to a root Linux user. """ % self.domainname) def _xwindows_login(self): if "x_domain" in self.all_attributes: self.fd.write(""" .SH X WINDOWS LOGIN """) if "x_domain" in self.attributes: self.fd.write(""" The SELinux user %s_u is able to X Windows login. """ % self.domainname) else: self.fd.write(""" The SELinux user %s_u is not able to X Windows login. """ % self.domainname) def _terminal_login(self): if "login_userdomain" in self.all_attributes: self.fd.write(""" .SH TERMINAL LOGIN """) if "login_userdomain" in self.attributes: self.fd.write(""" The SELinux user %s_u is able to terminal login. """ % self.domainname) else: self.fd.write(""" The SELinux user %s_u is not able to terminal login. """ % self.domainname) def _network(self): from sepolicy import network self.fd.write(""" .SH NETWORK """) for net in ("tcp", "udp"): portdict = network.get_network_connect(self.type, net, "name_bind") if len(portdict) > 0: self.fd.write(""" .TP The SELinux user %s_u is able to listen on the following %s ports. """ % (self.domainname, net)) for p in portdict: for t, ports in portdict[p]: self.fd.write(""" .B %s """ % ",".join(ports)) portdict = network.get_network_connect(self.type, "tcp", "name_connect") if len(portdict) > 0: self.fd.write(""" .TP The SELinux user %s_u is able to connect to the following tcp ports. """ % (self.domainname)) for p in portdict: for t, ports in portdict[p]: self.fd.write(""" .B %s """ % ",".join(ports)) def _home_exec(self): permlist = list(filter(lambda x: x['source'] == self.type and x['target'] == 'user_home_type' and x['class'] == 'file' and set(['ioctl', 'read', 'getattr', 'execute', 'execute_no_trans', 'open']).issubset(set(x['permlist'])), sepolicy.get_all_allow_rules())) self.fd.write(""" .SH HOME_EXEC """) if permlist is not None: self.fd.write(""" The SELinux user %s_u is able execute home content files. """ % self.domainname) else: self.fd.write(""" The SELinux user %s_u is not able execute home content files. """ % self.domainname) def _transitions(self): self.fd.write(r""" .SH TRANSITIONS Three things can happen when %(type)s attempts to execute a program. \fB1.\fP SELinux Policy can deny %(type)s from executing the program. .TP \fB2.\fP SELinux Policy can allow %(type)s to execute the program in the current user type. Execute the following to see the types that the SELinux user %(type)s can execute without transitioning: .B sesearch -A -s %(type)s -c file -p execute_no_trans .TP \fB3.\fP SELinux can allow %(type)s to execute the program and transition to a new type. Execute the following to see the types that the SELinux user %(type)s can execute and transition: .B $ sesearch -A -s %(type)s -c process -p transition """ % {'user': self.domainname, 'type': self.type}) def _role_header(self): self.fd.write('.TH "%(user)s_selinux" "8" "%(user)s" "mgrepl@redhat.com" "%(user)s SELinux Policy documentation"' % {'user': self.domainname}) self.fd.write(r""" .SH "NAME" %(user)s_r \- \fB%(desc)s\fP - Security Enhanced Linux Policy .SH DESCRIPTION SELinux supports Roles Based Access Control (RBAC), some Linux roles are login roles, while other roles need to be transition into. .I Note: Examples in this man page will use the .B staff_u SELinux user. Non login roles are usually used for administrative tasks. For example, tasks that require root privileges. Roles control which types a user can run processes with. Roles often have default types assigned to them. The default type for the %(user)s_r role is %(user)s_t. The .B newrole program to transition directly to this role. .B newrole -r %(user)s_r -t %(user)s_t .B sudo is the preferred method to do transition from one role to another. You setup sudo to transition to %(user)s_r by adding a similar line to the /etc/sudoers file. USERNAME ALL=(ALL) ROLE=%(user)s_r TYPE=%(user)s_t COMMAND .br sudo will run COMMAND as staff_u:%(user)s_r:%(user)s_t:LEVEL When using a a non login role, you need to setup SELinux so that your SELinux user can reach %(user)s_r role. Execute the following to see all of the assigned SELinux roles: .B semanage user -l You need to add %(user)s_r to the staff_u user. You could setup the staff_u user to be able to use the %(user)s_r role with a command like: .B $ semanage user -m -R 'staff_r system_r %(user)s_r' staff_u """ % {'desc': self.desc, 'user': self.domainname}) troles = [] for i in self.role_allows: if self.domainname + "_r" in self.role_allows[i]: troles.append(i) if len(troles) > 0: plural = "" if len(troles) > 1: plural = "s" self.fd.write(""" SELinux policy also controls which roles can transition to a different role. You can list these rules using the following command. .B search --role_allow SELinux policy allows the %s role%s can transition to the %s_r role. """ % (", ".join(troles), plural, self.domainname)) selinux-python-2.8/sepolicy/sepolicy/network.py000077500000000000000000000054221330160122500221110ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transistions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy def get_types(src, tclass, perm, check_bools=False): allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) nlist = [] if allows: for i in map(lambda y: y[sepolicy.TARGET], filter(lambda x: set(perm).issubset(x[sepolicy.PERMS]) and (not check_bools or x["enabled"]), allows)): if i not in nlist: nlist.append(i) return nlist def get_network_connect(src, protocol, perm, check_bools=False): portrecs, portrecsbynum = sepolicy.gen_port_dict() d = {} tlist = get_types(src, "%s_socket" % protocol, [perm], check_bools) if len(tlist) > 0: d[(src, protocol, perm)] = [] for i in tlist: if i == "ephemeral_port_type": if "unreserved_port_type" in tlist: continue i = "ephemeral_port_t" if i == "unreserved_port_t": if "unreserved_port_type" in tlist: continue if "port_t" in tlist: continue if i == "port_t": d[(src, protocol, perm)].append((i, ["all ports with out defined types"])) if i == "port_type": d[(src, protocol, perm)].append((i, ["all ports"])) elif i == "unreserved_port_type": d[(src, protocol, perm)].append((i, ["all ports > 1024"])) elif i == "reserved_port_type": d[(src, protocol, perm)].append((i, ["all ports < 1024"])) elif i == "rpc_port_type": d[(src, protocol, perm)].append((i, ["all ports > 500 and < 1024"])) else: try: d[(src, protocol, perm)].append((i, portrecs[(i, protocol)])) except KeyError: pass return d selinux-python-2.8/sepolicy/sepolicy/sedbus.py000066400000000000000000000033241330160122500217010ustar00rootroot00000000000000import sys import dbus import dbus.service import dbus.mainloop.glib from slip.dbus import polkit class SELinuxDBus (object): def __init__(self): self.bus = dbus.SystemBus() self.dbus_object = self.bus.get_object("org.selinux", "/org/selinux/object") @polkit.enable_proxy def semanage(self, buf): ret = self.dbus_object.semanage(buf, dbus_interface="org.selinux") return ret @polkit.enable_proxy def restorecon(self, path): ret = self.dbus_object.restorecon(path, dbus_interface="org.selinux") return ret @polkit.enable_proxy def setenforce(self, value): ret = self.dbus_object.setenforce(value, dbus_interface="org.selinux") return ret @polkit.enable_proxy def customized(self): ret = self.dbus_object.customized(dbus_interface="org.selinux") return ret @polkit.enable_proxy def semodule_list(self): ret = self.dbus_object.semodule_list(dbus_interface="org.selinux") return ret @polkit.enable_proxy def relabel_on_boot(self, value): ret = self.dbus_object.relabel_on_boot(value, dbus_interface="org.selinux") return ret @polkit.enable_proxy def change_default_mode(self, value): ret = self.dbus_object.change_default_mode(value, dbus_interface="org.selinux") return ret @polkit.enable_proxy def change_default_policy(self, value): ret = self.dbus_object.change_default_policy(value, dbus_interface="org.selinux") return ret if __name__ == "__main__": try: dbus_proxy = SELinuxDBus() resp = dbus_proxy.setenforce(int(sys.argv[1])) print(resp) except dbus.DBusException as e: print(e) selinux-python-2.8/sepolicy/sepolicy/sepolicy.glade000066400000000000000000011513311330160122500226720ustar00rootroot00000000000000 False 265 100 False True False vertical Applications True False False False none False 0 False False 0 True False 10 210 True True â— Select domain gtk-find False False False True 10 0 True True 1 True False 10 0 10 Advanced Search >> True True True 2 File Equivalence True True True none False 0 True True 3 Users True True True none False 0 True True 4 System True True True none False 0 True True 5 False 5 GtkFileChooserDialog True normal save False vertical False False True end 0 True False Select True True True False True end 0 Cancel True True True False True end 1 False True 2 application_liststore advanced_filter application_files_treestore application_files_filter boolean_liststore boolean_filter False popup False True center-on-parent 440 250 SELinux_window True False vertical True False The entry that was entered is incorrect. Please try again in the ex:/.../... format. True True True 0 True False True False True True 0 Retry True True True False False 1 True False True True 2 False False 1 executable_files_treestore executable_files_filter file_equiv_liststore False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 Add file Equivalence Mapping. Mapping will be created when Update is applied. fill True True True 0 True False 3 2 True False 0 10 Path True True Specify a new SELinux user name. By convention SELinux User names usually end in an _u. â— False False Enter the path to which you want to setup an equivalence label. 1 2 True False 0 10 Equivalence Path 1 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 2 3 True True Specify the mapping between the new path and the equivalence path. Everything under this new path will be labeled as if they were under the equivalence path. â— False False 1 2 1 2 True True 1 file_equiv_filter file_transitions_liststore file_transitions_filter False Add a file False True center-on-parent SELinux_window True False vertical True False 0 10 <operation> File Labeling for <selected domain>. File labels will be created when update is applied. fill True True True 0 True False 7 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 6 7 40 False 0 10 MLS 5 6 GTK_FILL True False 0 10 Advanced >> True 4 5 GTK_FILL 40 True False 0 10 Class 3 4 GTK_FILL 40 True False 0 10 Type 2 3 GTK_FILL 360 True False Select the file class to which this label will be applied. Defaults to all classes. files_class_combo_store 0 1 2 3 4 True False vertical True False Make Path Recursive True True False Select Make Path Recursive if you want to apply this label to all children of the specified directory path. objects under the directory to have this label. 0.5 True True True 0 Browse True True True Browse to select the file/directory for labeling. True True 1 True True 0 True False True True 1 1 2 1 2 True False 0 10 Path GTK_FILL True True Specify the path using regular expressions that you would like to modify the labeling. â— False False 1 2 True False vertical 360 True False Select the SELinux file type to assign to this path. files_type_combo_store 0 True True 0 1 2 2 3 True Enter the MLS Label to assign to this file path. â— False False SELinux MLS Label you wish to assign to this path. 1 2 5 6 True True 1 False False 200 500 normal False vertical 2 False end True True True True False left False True 0 True True True True False False True 1 False True end 0 True False vertical 250 True True in True True False word False False True 0 True False help/booleans.png False True 1 False True 1 300 25 True False Analyzing Policy... False mouse True False 0.050000000223517416 True login_liststore False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 Add Login Mapping. Login Mapping will be created when update is applied. fill True True True 0 True False 4 2 True False 0 10 Login Name True True Enter the login user name of the user to which you wish to add SELinux User confinement. â— False False 1 2 True False 0 10 SELinux User 1 2 360 True False Select the SELinux User to assign to this login user. Login users by default get assigned by the __default__ user. login_seuser_liststore 0 1 2 1 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 3 4 True False Enter MLS/MCS Range for this login User. Defaults to the range for the Selected SELinux User. 0 10 MLS Range 2 3 True True Specify the MLS Range for this user to login in with. Defaults to the selected SELinux Users MLS Range. â— False False 1 2 2 3 True True 1 login_filter network_in_liststore network_in_filter network_out_liststore network_out_filter False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 <operation> Network Port for <selected domain>. Ports will be created when update is applied. fill True True True 0 True False 6 2 True False 0 10 Port Number True True Enter the port number or range to which you want to add a port type. â— False False 1 2 True False 0 10 Protocol 1 2 True False 0 10 Port Type 2 3 True False 0 10 Advanced >> True 3 4 False 0 10 MLS 4 5 360 True False Select the port type you want to assign to the specified port number. network_type_combo_store 0 1 2 2 3 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 5 6 True False tcp True True False Select <b>tcp</b> if the port type should be assigned to tcp port numbers. 0.5 True True True True 0 udp True True False Select <b>udp</b> if the port type should be assigned to udp port numbers. 0.5 True tcp_button True True 1 1 2 1 2 True Enter the MLS Label to assign to this port. â— False False 1 2 4 5 True True 1 transitions_from_treestore transitions_from_filter transitions_into_liststore transitions_into_filter False SELinux Configuration center-always 650 420 True False vertical True False True False vertical True False True False 0 True False Select... 240 True False True none False 0 bottom True True 0 True False True none True False down True True 1 False True 0 Booleans True True False Display boolean information that can be used to modify the policy for the 'selected domain'. 0.5 True False False True 1 Files True True False Display file type information that can be used by the 'selected domain'. 0.5 False Booleans_button False True 2 Network True True False Display network ports to which the 'selected domain' can connect or listen to. 0.5 False Booleans_button False True 3 Transitions True True False Display applications that can transition into or out of the 'selected domain'. 0.5 False Booleans_button False True 4 Login Mapping True False Manage the SELinux configuration 0 False Booleans_button False True 5 SELinux Users True False Manage the SELinux configuration 0 False Booleans_button False True 6 System True False Manage the SELinux configuration 0.5 False Booleans_button False True 7 Lockdown True False Lockdown the SELinux System. This screen can be used to turn up the SELinux Protections. 0 False Booleans_button False True 8 radiobutton False False 0 False Booleans_button False True 9 True False True False 10 gtk-help False False end 11 False False 0 True False vertical True False 3 vertical True False True False Filter False True 0 170 True True â— 25 none gtk-find False False True 1 Show Modified Only True True False 0 True True True 2 False True 0 True False False gtk-dialog-warning False True 0 False Mislabeled files exist False True 1 False True 1 Show mislabeled files only True False 0 True False False 2 False False 0 465 True True False True False vertical True True True True True If-Then-Else rules written in policy that can allow alternative access control. boolean_sort False True Enabled True 0 0 True fixed 240 Description True True 1 word 360 1 fixed 40 True 3 Italic 8 #00004e4e9999 3 fixed Name True True True True 2 2 True True 2 True False Booleans False True False vertical True True True True True True True executable_files_sort False 0 True True fixed 355 File Path True True True 0 0 0 70 70 #00004e4e9999 Fix Label single 3 0 True fixed 175 SELinux File Type True True 1 1 1 True fixed 75 Class True True 2 2 2 True False True False File path used to enter the 'selected domain'. Executable Files False True True True True True writable_files_sort False True True fixed 377 File Path True True True 0 0 0 70 70 #00004e4e9999 Fix Label single 3 True fixed 163 SELinux File Type True True True 1 1 1 True fixed 92 Class True True True 2 2 2 1 True False True False Files to which the 'selected domain' can write. Writable files 1 False True True True True True application_files_sort False 0 True True fixed 215 File Path True True True 0 0 0 70 70 #00004e4e9999 Fix Label single 3 True fixed 315 Description True True True 1 word-char 305 1 1 True fixed 75 Class True True True 2 0 2 2 True False True False File Types defined for the 'selected domain'. Application File Types 2 False True True 2 1 True False Files 1 False True False vertical True True True True True True True network_out_sort False 0 True 0 True True fixed Port True True True True 0 0 0 True fixed Protocol True True True 1 1 1 True fixed SELinux Port Type True True True True 2 2 2 True False True False Network Ports to which the 'selected domain' is allowed to connect. Outbound False True True True True True network_in_sort False 0 True 0 True True fixed Port True True True 0 0 0 True fixed Protocol True True True 1 1 1 True fixed SELinux Port Type True True True 2 2 2 1 True False True False Network Ports to which the 'selected domain' is allowed to listen. Inbound 1 False True True 2 2 True False Network 2 False True False vertical True True True True True True transitions_from_sort True False True True Boolean Enabled True True 0 0 1 True Boolean name True True True 1 2 2 True SELinux Application Type True True True 2 3 True False Executables which will transition to a different domain, when the 'selected domain' executes them. 1 1 Application Transitions From 'select domain' 1 False True True True True transitions_into_sort False True Boolean Enabled True True 0 0 True Calling Process Domain True True True 1 1 True Executable File True True True 2 2 1 True False Executables which will transition to the 'selected domain', when executing a selected domains entrypoint. Application Transitions Into 'select domain' 1 False True True True True File Transitions define what happens when the current domain creates the content of a particular class in a directory of the destination type. Optionally a file name could be specified for the transition. file_transitions_sort False SELinux Directory Type True 0 0 Destination Class True descending 1 1 SELinux Destination Type True 2 2 File Name True 3 3 2 True False File Transitions From 'select domain' 2 False True True 1 3 True False Transitions 3 False True False vertical True True in True True True login_sort False 0 True True fixed Login Name True True True 0 0 0 True fixed SELinux User True True True True 1 1 1 True MLS Range True 2 2 2 True True 1 4 True False Login Mapping 4 False True False vertical True True in True True True If-Then-Else rules written in policy that can allow alternative access control. user_sort True False 0 True True 240 SELinux User True True True 0 word 360 0 0 True SELinux Roles True True True True 1 1 1 Default Level True True 2 2 2 True MLS Range True True 3 3 3 True True 1 5 True False SELinux Users 5 False True False start False False vertical True False center 10 0 out True False start True False center center True False 0.05000000074505806 Select the system mode when the system first boots up 15 True False Enforcing True True False 50 0 True True False False 0 Permissive True True False 0 True Enforcing_button_default False False 1 Disabled True True False 0 True Enforcing_button_default False False 2 1 True False 0.0099999997764825821 Select the system mode for the current session 2 15 True False Enforcing True True False 50 0 True True False True 0 Permissive True True False 0 True Enforcing_button False True 1 3 True False 0 Advanced >> True end 4 15 True False vertical False 0 System Policy Type: 15 False False 0 200 False 10 system_policy_type_liststore 0 False True 1 5 15 False True 0 True False True True False True 1 True False <b>System Mode</b> True False False 10 0 True False center 10 0 out True False start True False center center 4 2 True False 0 Import system settings from another machine 15 Import 65 True True True 1 10 True False 0 Export system settings to a file middle 1 15 Export 65 True True True 1 1 10 True False Relabel all files back to system defaults on reboot 3 15 True False 2 3 5 True False 1 2 2 3 5 True False Yes True True False 0 True True False True 0 No True True False 0 True Relabel_button False True 1 1 2 3 4 10 False True 0 True False <b>System Configuration</b> True False False 1 6 True False System 6 False True False True False 0 none True False Yes True True False An unconfined domain is a process label that allows the process to do what it wants, without SELinux interfering. Applications started at boot by the init system that SELinux do not have defined SELinux policy will run as unconfined if this module is enabled. Disabling it means all daemons will now be confined. To disable the unconfined_t user you must first remove unconfined_t from the users/login screens. 0 True True enable_unconfined False True 0 No True True False An unconfined domain is a process label that allows the process to do what it wants, without SELinux interfering. Applications started at boot by the init system that SELinux do not have defined SELinux policy will run as unconfined if this module is enabled. Disabling it means all daemons will now be confined. To disable the unconfined_t user you must first remove unconfined_t from the users/login screens. 0 True True False True 1 True False <b>Disable ability to run unconfined system processes?</b> True 0 0 1 1 True False 0 none True False Yes True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True enable_permissive False True 0 No True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True True False True 1 True False <b>Disable all permissive processes?</b> True 0 1 1 1 True False 0 none True False Yes True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True False True 0 No True True False A permissive domain is a process label that allows the process to do what it wants, with SELinux only logging the denials, but not enforcing them. Usually permissive domains indicate experimental policy, disabling the module could cause SELinux to deny access to a domain, that should be allowed. 0 True True disable_ptrace False True 1 True False <b>Deny all processes from ptracing or debugging other processes?</b> True 0 2 1 1 6 True False Lockdown 7 False True True in True True File equivalence cause the system to label content under the new path as if it were under the equivalence path. file_equiv_sort True False 0 True True Path True True True 0 0 0 True Equivalence Path True True True 1 1 1 8 True False Files Equivalence 8 False True False 0.20999999344348907 0.11999999731779099 <b>...SELECT TO VIEW DATA...</b> True 9 True False 0 9 False True True 1 True False Delete True False True True False True end 0 Modify True True True False True end 1 Add True False True True False True end 2 False False 2 True True 1 True False True True 4 2 True False Revert True False True True Revert button will launch a dialog window which allows you to revert changes within the current transaction. False True end 0 Update True False True True Commit all changes in your current transaction to the server. False True end 1 False False 3 True True 0 True True 0 True False 2 False False 1 False Applications - Advanced Search center-on-parent 600 620 SELinux_window True False vertical True False 0 vertical 210 True True â— gtk-find False False True 10 0 True True True True False Applications True True 0 0 Process Types True True 1 1 True True 1 Select True True True False False end 2 False More Details center-on-parent 650 420 SELinux_window True True in True True booleans_more_detail_liststore 0 False Delete Modified File Labeling True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select file labeling to delete. File labeling will be deleted when update is applied. fill True False False 0 True True files_delete_liststore 20 Select True 0 275 File Path True 1 75 SELinux File Label True True 2 25 Class True True 3 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified Ports True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select ports to delete. Ports will be deleted when update is applied. fill True False False 0 True True network_delete_liststore False 0 20 Select True 0 275 Port True 1 1 75 Protocol True True 2 2 25 SELinux Port Type True True True 3 3 3 True True 1 True False Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified File Labeling True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select file equivalence labeling to delete. File equivalence labeling will be deleted when update is applied. fill True False False 0 True True file_equiv_delete_liststore 0 20 Select True 0 275 File Path True 1 75 Equivalence Path True True 2 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified Users Mapping. True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select login user mapping to delete. Login user mapping will be deleted when update is applied. fill True False False 0 True True login_delete_liststore 0 20 Select True 0 275 Login name True 2 75 SELinux User True True 1 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False More Types True center-on-parent 440 250 SELinux_window True False vertical True True True True more_types_file_liststore Types 0 True True 0 Select True True True False False 1 False True center-on-parent 650 450 SELinux_window True False vertical True False vertical True False 0 10 Review the updates you have made before committing them to the system. To reset an item, uncheck the checkbox. All items checked will be updated in the system when you select update. fill True False True 0 False True 0 True True 380 True True Update_treestore 0 20 Select True 3 0 275 Description True word 1 25 Action True True 2 True True 1 True False Apply True True True False False end 0 Cancel True True True False False end 1 False True 2 False Delete Modified Users Mapping. True center-on-parent 450 320 SELinux_window True False vertical True False 0 10 Select users mapping to delete.Users mapping will be deleted when update is applied. fill True False False 0 True True user_delete_liststore 0 20 Select True 0 275 SELinux Roles True 2 75 SELinux Username True True 1 True True 1 True False vertical Save to Update True True True False False end 0 Cancel True True True False False end 1 False True 2 False Network Port Definitions False True center-on-parent SELinux_window True False vertical True False 0 10 Add User Roles. SELinux User Roles will be created when Update is applied. fill True True True 0 True False 5 2 True False 0 10 SELinux User Name True True Specify a new SELinux user name. By convention SELinux User names usually end in an _u. â— False False 1 2 True False 0 10 SELinux Roles 1 2 True False 0 10 MLS Range 3 4 360 True False user_roles_liststore 0 1 2 1 2 True False Save to update True True True False True end 0 Cancel True True True False True end 1 1 2 4 5 True True Enter MLS/MCS Range for this SELinux User. s0-s0:c1023 â— False False 1 2 3 4 True False 0 10 Default Level 2 3 True True Specify the default level that you would like this SELinux user to login with. Defaults to s0. â— False False Enter Default Level for SELinux User to login with. Default s0 1 2 2 3 True True 1 user_liststore user_filter writable_files_treestore writable_files_filter selinux-python-2.8/sepolicy/sepolicy/templates/000077500000000000000000000000001330160122500220365ustar00rootroot00000000000000selinux-python-2.8/sepolicy/sepolicy/templates/__init__.py000066400000000000000000000013241330160122500241470ustar00rootroot00000000000000# # Copyright (C) 2007-2012 Red Hat # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. # selinux-python-2.8/sepolicy/sepolicy/templates/boolean.py000066400000000000000000000022361330160122500240320ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### boolean Template File ########################### te_boolean=""" ## ##

## DESCRIPTION ##

##
gen_tunable(BOOLEAN, false) """ te_rules=""" tunable_policy(`BOOLEAN',` #TRUE ',` #FALSE ') """ selinux-python-2.8/sepolicy/sepolicy/templates/etc_rw.py000066400000000000000000000074141330160122500237010ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### etc_rw Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_etc_rw_t; files_type(TEMPLATETYPE_etc_rw_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_etc_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, { dir file lnk_file }) """ te_stream_rules=""" manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_etc_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE conf directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_conf',` gen_require(` type TEMPLATETYPE_etc_rw_t; ') allow $1 TEMPLATETYPE_etc_rw_t:dir search_dir_perms; files_search_etc($1) ') ######################################## ## ## Read TEMPLATETYPE conf files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_conf_files',` gen_require(` type TEMPLATETYPE_etc_rw_t; ') allow $1 TEMPLATETYPE_etc_rw_t:dir list_dir_perms; read_files_pattern($1, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_search_etc($1) ') ######################################## ## ## Manage TEMPLATETYPE conf files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_conf_files',` gen_require(` type TEMPLATETYPE_etc_rw_t; ') manage_files_pattern($1, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t) files_search_etc($1) ') """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_etc_rw_t; ') files_search_etc($1) stream_connect_pattern($1, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_etc_rw_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_etc_rw_t;""" if_admin_rules=""" files_search_etc($1) admin_pattern($1, TEMPLATETYPE_etc_rw_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_etc_rw_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_etc_rw_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/templates/executable.py000066400000000000000000000232431330160122500245350ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### Type Enforcement File ############################# te_daemon_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; init_daemon_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) permissive TEMPLATETYPE_t; """ te_initscript_types=""" type TEMPLATETYPE_initrc_exec_t; init_script_file(TEMPLATETYPE_initrc_exec_t) """ te_dbusd_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; domain_type(TEMPLATETYPE_t) domain_entry_file(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) role system_r types TEMPLATETYPE_t; permissive TEMPLATETYPE_t; """ te_inetd_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; inetd_service_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) permissive TEMPLATETYPE_t; """ te_userapp_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # attribute_role TEMPLATETYPE_roles; roleattribute system_r TEMPLATETYPE_roles; type TEMPLATETYPE_t; type TEMPLATETYPE_exec_t; application_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) role TEMPLATETYPE_roles types TEMPLATETYPE_t; permissive TEMPLATETYPE_t; """ te_sandbox_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # sandbox_x_domain_template(TEMPLATETYPE) permissive TEMPLATETYPE_t; permissive TEMPLATETYPE_client_t; """ te_cgi_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # apache_content_template(TEMPLATETYPE) permissive httpd_TEMPLATETYPE_script_t; """ te_daemon_rules="""\ allow TEMPLATETYPE_t self:fifo_file rw_fifo_file_perms; allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms; """ te_inetd_rules=""" """ te_dbusd_rules=""" optional_policy(` dbus_system_domain(TEMPLATETYPE_t, TEMPLATETYPE_exec_t) ') """ te_userapp_rules=""" allow TEMPLATETYPE_t self:fifo_file manage_fifo_file_perms; allow TEMPLATETYPE_t self:unix_stream_socket create_stream_socket_perms; """ te_cgi_rules=""" """ te_sandbox_rules=""" """ te_uid_rules=""" auth_use_nsswitch(TEMPLATETYPE_t) """ te_syslog_rules=""" logging_send_syslog_msg(TEMPLATETYPE_t) """ te_resolve_rules=""" sysnet_dns_name_resolve(TEMPLATETYPE_t) """ te_pam_rules=""" auth_domtrans_chk_passwd(TEMPLATETYPE_t) """ te_mail_rules=""" mta_send_mail(TEMPLATETYPE_t) """ te_dbus_rules=""" optional_policy(` dbus_system_bus_client(TEMPLATETYPE_t) dbus_connect_system_bus(TEMPLATETYPE_t) ') """ te_kerberos_rules=""" optional_policy(` kerberos_use(TEMPLATETYPE_t) ') """ te_manage_krb5_rcache_rules=""" optional_policy(` kerberos_keytab_template(TEMPLATETYPE, TEMPLATETYPE_t) kerberos_manage_host_rcache(TEMPLATETYPE_t) ') """ te_audit_rules=""" logging_send_audit_msgs(TEMPLATETYPE_t) """ te_run_rules=""" optional_policy(` gen_require(` type USER_t; role USER_r; ') TEMPLATETYPE_run(USER_t, USER_r) ') """ te_fd_rules=""" domain_use_interactive_fds(TEMPLATETYPE_t) """ te_etc_rules=""" files_read_etc_files(TEMPLATETYPE_t) """ te_localization_rules=""" miscfiles_read_localization(TEMPLATETYPE_t) """ ########################### Interface File ############################# if_heading_rules=""" ## policy for TEMPLATETYPE""" if_program_rules=""" ######################################## ## ## Execute TEMPLATETYPE_exec_t in the TEMPLATETYPE domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`TEMPLATETYPE_domtrans',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, TEMPLATETYPE_exec_t, TEMPLATETYPE_t) ') ###################################### ## ## Execute TEMPLATETYPE in the caller domain. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_exec',` gen_require(` type TEMPLATETYPE_exec_t; ') corecmd_search_bin($1) can_exec($1, TEMPLATETYPE_exec_t) ') """ if_user_program_rules=""" ######################################## ## ## Execute TEMPLATETYPE in the TEMPLATETYPE domain, and ## allow the specified role the TEMPLATETYPE domain. ## ## ## ## Domain allowed to transition ## ## ## ## ## The role to be allowed the TEMPLATETYPE domain. ## ## # interface(`TEMPLATETYPE_run',` gen_require(` type TEMPLATETYPE_t; attribute_role TEMPLATETYPE_roles; ') TEMPLATETYPE_domtrans($1) roleattribute $2 TEMPLATETYPE_roles; ') ######################################## ## ## Role access for TEMPLATETYPE ## ## ## ## Role allowed access ## ## ## ## ## User domain for the role ## ## # interface(`TEMPLATETYPE_role',` gen_require(` type TEMPLATETYPE_t; attribute_role TEMPLATETYPE_roles; ') roleattribute $1 TEMPLATETYPE_roles; TEMPLATETYPE_domtrans($2) ps_process_pattern($2, TEMPLATETYPE_t) allow $2 TEMPLATETYPE_t:process { signull signal sigkill }; ') """ if_sandbox_rules=""" ######################################## ## ## Execute sandbox in the TEMPLATETYPE_t domain, and ## allow the specified role the TEMPLATETYPE_t domain. ## ## ## ## Domain allowed to transition. ## ## ## ## ## The role to be allowed the TEMPLATETYPE_t domain. ## ## # interface(`TEMPLATETYPE_transition',` gen_require(` type TEMPLATETYPE_t; type TEMPLATETYPE_client_t; ') allow $1 TEMPLATETYPE_t:process { signal_perms transition }; dontaudit $1 TEMPLATETYPE_t:process { noatsecure siginh rlimitinh }; role $2 types TEMPLATETYPE_t; role $2 types TEMPLATETYPE_client_t; allow TEMPLATETYPE_t $1:process { sigchld signull }; allow TEMPLATETYPE_t $1:fifo_file rw_inherited_fifo_file_perms; allow TEMPLATETYPE_client_t $1:process { sigchld signull }; allow TEMPLATETYPE_client_t $1:fifo_file rw_inherited_fifo_file_perms; ') """ if_role_change_rules=""" ######################################## ## ## Change to the TEMPLATETYPE role. ## ## ## ## Role allowed access. ## ## ## # interface(`TEMPLATETYPE_role_change',` gen_require(` role TEMPLATETYPE_r; ') allow $1 TEMPLATETYPE_r; ') """ if_initscript_rules=""" ######################################## ## ## Execute TEMPLATETYPE server in the TEMPLATETYPE domain. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_initrc_domtrans',` gen_require(` type TEMPLATETYPE_initrc_exec_t; ') init_labeled_script_domtrans($1, TEMPLATETYPE_initrc_exec_t) ') """ if_dbus_rules=""" ######################################## ## ## Send and receive messages from ## TEMPLATETYPE over dbus. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_dbus_chat',` gen_require(` type TEMPLATETYPE_t; class dbus send_msg; ') allow $1 TEMPLATETYPE_t:dbus send_msg; allow TEMPLATETYPE_t $1:dbus send_msg; ') """ if_begin_admin=""" ######################################## ## ## All of the rules required to administrate ## an TEMPLATETYPE environment ## ## ## ## Domain allowed access. ## ## ## ## ## Role allowed access. ## ## ## # interface(`TEMPLATETYPE_admin',` gen_require(` type TEMPLATETYPE_t;""" if_middle_admin=""" ') allow $1 TEMPLATETYPE_t:process { signal_perms }; ps_process_pattern($1, TEMPLATETYPE_t) tunable_policy(`deny_ptrace',`',` allow $1 TEMPLATETYPE_t:process ptrace; ') """ if_initscript_admin_types=""" type TEMPLATETYPE_initrc_exec_t;""" if_initscript_admin=""" TEMPLATETYPE_initrc_domtrans($1) domain_system_change_exemption($1) role_transition $2 TEMPLATETYPE_initrc_exec_t system_r; allow $2 system_r; """ if_end_admin="""\ optional_policy(` systemd_passwd_agent_exec($1) systemd_read_fifo_file_passwd_run($1) ') ') """ ########################### File Context ################################## fc_program="""\ EXECUTABLE -- gen_context(system_u:object_r:TEMPLATETYPE_exec_t,s0) """ fc_user="""\ # No file context, leave blank """ fc_initscript="""\ EXECUTABLE -- gen_context(system_u:object_r:TEMPLATETYPE_initrc_exec_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/templates/network.py000066400000000000000000000324431330160122500241070ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_port_t; corenet_port(TEMPLATETYPE_port_t) """ te_network="""\ sysnet_dns_name_resolve(TEMPLATETYPE_t) corenet_all_recvfrom_unlabeled(TEMPLATETYPE_t) """ te_tcp="""\ allow TEMPLATETYPE_t self:tcp_socket create_stream_socket_perms; corenet_tcp_sendrecv_generic_if(TEMPLATETYPE_t) corenet_tcp_sendrecv_generic_node(TEMPLATETYPE_t) corenet_tcp_sendrecv_all_ports(TEMPLATETYPE_t) """ te_in_tcp="""\ corenet_tcp_bind_generic_node(TEMPLATETYPE_t) """ te_in_need_port_tcp="""\ allow TEMPLATETYPE_t TEMPLATETYPE_port_t:tcp_socket name_bind; """ te_out_need_port_tcp="""\ allow TEMPLATETYPE_t TEMPLATETYPE_port_t:tcp_socket name_connect; """ te_udp="""\ allow TEMPLATETYPE_t self:udp_socket { create_socket_perms listen }; corenet_udp_sendrecv_generic_if(TEMPLATETYPE_t) corenet_udp_sendrecv_generic_node(TEMPLATETYPE_t) corenet_udp_sendrecv_all_ports(TEMPLATETYPE_t) """ te_in_udp="""\ corenet_udp_bind_generic_node(TEMPLATETYPE_t) """ te_in_need_port_udp="""\ allow TEMPLATETYPE_t TEMPLATETYPE_port_t:udp_socket name_bind; """ te_out_all_ports_tcp="""\ corenet_tcp_connect_all_ports(TEMPLATETYPE_t) """ te_out_reserved_ports_tcp="""\ corenet_tcp_connect_all_rpc_ports(TEMPLATETYPE_t) """ te_out_unreserved_ports_tcp="""\ corenet_tcp_connect_all_unreserved_ports(TEMPLATETYPE_t) """ te_in_all_ports_tcp="""\ corenet_tcp_bind_all_ports(TEMPLATETYPE_t) """ te_in_reserved_ports_tcp="""\ corenet_tcp_bind_all_rpc_ports(TEMPLATETYPE_t) """ te_in_unreserved_ports_tcp="""\ corenet_tcp_bind_all_unreserved_ports(TEMPLATETYPE_t) """ te_in_all_ports_udp="""\ corenet_udp_bind_all_ports(TEMPLATETYPE_t) """ te_in_reserved_ports_udp="""\ corenet_udp_bind_all_rpc_ports(TEMPLATETYPE_t) """ te_in_unreserved_ports_udp="""\ corenet_udp_bind_all_unreserved_ports(TEMPLATETYPE_t) """ if_rules="""\ ######################################## ## ## Send and receive TCP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_tcp_sendrecv_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:tcp_socket { send_msg recv_msg }; ') ######################################## ## ## Send UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_send_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:udp_socket send_msg; ') ######################################## ## ## Do not audit attempts to send UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_send_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:udp_socket send_msg; ') ######################################## ## ## Receive UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_receive_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:udp_socket recv_msg; ') ######################################## ## ## Do not audit attempts to receive UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_receive_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:udp_socket recv_msg; ') ######################################## ## ## Send and receive UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_sendrecv_TEMPLATETYPE_port',` corenet_udp_send_TEMPLATETYPE_port($1) corenet_udp_receive_TEMPLATETYPE_port($1) ') ######################################## ## ## Do not audit attempts to send and receive ## UDP traffic on the TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_sendrecv_TEMPLATETYPE_port',` corenet_dontaudit_udp_send_TEMPLATETYPE_port($1) corenet_dontaudit_udp_receive_TEMPLATETYPE_port($1) ') ######################################## ## ## Bind TCP sockets to the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_tcp_bind_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:tcp_socket name_bind; ') ######################################## ## ## Bind UDP sockets to the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_udp_bind_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:udp_socket name_bind; ') ######################################## ## ## Do not audit attempts to sbind to TEMPLATETYPE port. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_udp_bind_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:udp_socket name_bind; ') ######################################## ## ## Make a TCP connection to the TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_tcp_connect_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') allow $1 TEMPLATETYPE_port_t:tcp_socket name_connect; ') ######################################## ## ## Do not audit attempts to make a TCP connection to TEMPLATETYPE port. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_dontaudit_tcp_connect_TEMPLATETYPE_port',` gen_require(` type TEMPLATETYPE_port_t; ') dontaudit $1 TEMPLATETYPE_port_t:tcp_socket name_connect; ') ######################################## ## ## Send TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_send_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') allow $1 TEMPLATETYPE_client_packet_t:packet send; ') ######################################## ## ## Do not audit attempts to send TEMPLATETYPE_client packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_send_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') dontaudit $1 TEMPLATETYPE_client_packet_t:packet send; ') ######################################## ## ## Receive TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_receive_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') allow $1 TEMPLATETYPE_client_packet_t:packet recv; ') ######################################## ## ## Do not audit attempts to receive TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_dontaudit_receive_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') dontaudit $1 TEMPLATETYPE_client_packet_t:packet recv; ') ######################################## ## ## Send and receive TEMPLATETYPE_client packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_sendrecv_TEMPLATETYPE_client_packets',` corenet_send_TEMPLATETYPE_client_packets($1) corenet_receive_TEMPLATETYPE_client_packets($1) ') ######################################## ## ## Do not audit attempts to send and receive TEMPLATETYPE_client packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_sendrecv_TEMPLATETYPE_client_packets',` corenet_dontaudit_send_TEMPLATETYPE_client_packets($1) corenet_dontaudit_receive_TEMPLATETYPE_client_packets($1) ') ######################################## ## ## Relabel packets to TEMPLATETYPE_client the packet type. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_relabelto_TEMPLATETYPE_client_packets',` gen_require(` type TEMPLATETYPE_client_packet_t; ') allow $1 TEMPLATETYPE_client_packet_t:packet relabelto; ') ######################################## ## ## Send TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_send_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') allow $1 TEMPLATETYPE_server_packet_t:packet send; ') ######################################## ## ## Do not audit attempts to send TEMPLATETYPE_server packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_send_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') dontaudit $1 TEMPLATETYPE_server_packet_t:packet send; ') ######################################## ## ## Receive TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_receive_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') allow $1 TEMPLATETYPE_server_packet_t:packet recv; ') ######################################## ## ## Do not audit attempts to receive TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_dontaudit_receive_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') dontaudit $1 TEMPLATETYPE_server_packet_t:packet recv; ') ######################################## ## ## Send and receive TEMPLATETYPE_server packets. ## ## ## ## Domain allowed access. ## ## ## # interface(`corenet_sendrecv_TEMPLATETYPE_server_packets',` corenet_send_TEMPLATETYPE_server_packets($1) corenet_receive_TEMPLATETYPE_server_packets($1) ') ######################################## ## ## Do not audit attempts to send and receive TEMPLATETYPE_server packets. ## ## ## ## Domain to not audit. ## ## ## # interface(`corenet_dontaudit_sendrecv_TEMPLATETYPE_server_packets',` corenet_dontaudit_send_TEMPLATETYPE_server_packets($1) corenet_dontaudit_receive_TEMPLATETYPE_server_packets($1) ') ######################################## ## ## Relabel packets to TEMPLATETYPE_server the packet type. ## ## ## ## Domain allowed access. ## ## # interface(`corenet_relabelto_TEMPLATETYPE_server_packets',` gen_require(` type TEMPLATETYPE_server_packet_t; ') allow $1 TEMPLATETYPE_server_packet_t:packet relabelto; ') """ te_rules=""" """ selinux-python-2.8/sepolicy/sepolicy/templates/rw.py000066400000000000000000000075341330160122500230510ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# te_types=""" type TEMPLATETYPE_rw_t; files_type(TEMPLATETYPE_rw_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE rw directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_rw_dir',` gen_require(` type TEMPLATETYPE_rw_t; ') allow $1 TEMPLATETYPE_rw_t:dir search_dir_perms; files_search_rw($1) ') ######################################## ## ## Read TEMPLATETYPE rw files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_rw_files',` gen_require(` type TEMPLATETYPE_rw_t; ') read_files_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) allow $1 TEMPLATETYPE_rw_t:dir list_dir_perms; files_search_rw($1) ') ######################################## ## ## Manage TEMPLATETYPE rw files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_rw_files',` gen_require(` type TEMPLATETYPE_rw_t; ') manage_files_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) ') ######################################## ## ## Create, read, write, and delete ## TEMPLATETYPE rw dirs. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_rw_dirs',` gen_require(` type TEMPLATETYPE_rw_t; ') manage_dirs_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) ') """ te_stream_rules=""" manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t) """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_rw_t; ') stream_connect_pattern($1, TEMPLATETYPE_rw_t, TEMPLATETYPE_rw_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_rw_t;""" if_admin_rules=""" files_search_etc($1) admin_pattern($1, TEMPLATETYPE_rw_t) """ ########################### File Context ################################## fc_file=""" FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_rw_t,s0) """ fc_sock_file="""\ FILENAME -s gen_context(system_u:object_r:TEMPLATETYPE_etc_rw_t,s0) """ fc_dir=""" FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_rw_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/templates/script.py000066400000000000000000000102451330160122500237160ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# compile="""\ #!/bin/sh -e DIRNAME=`dirname $0` cd $DIRNAME USAGE="$0 [ --update ]" if [ `id -u` != 0 ]; then echo 'You must be root to run this script' exit 1 fi if [ $# -eq 1 ]; then if [ "$1" = "--update" ] ; then time=`ls -l --time-style="+%x %X" TEMPLATEFILE.te | awk '{ printf "%s %s", $6, $7 }'` rules=`ausearch --start $time -m avc --raw -se TEMPLATETYPE` if [ x"$rules" != "x" ] ; then echo "Found avc's to update policy with" echo -e "$rules" | audit2allow -R echo "Do you want these changes added to policy [y/n]?" read ANS if [ "$ANS" = "y" -o "$ANS" = "Y" ] ; then echo "Updating policy" echo -e "$rules" | audit2allow -R >> TEMPLATEFILE.te # Fall though and rebuild policy else exit 0 fi else echo "No new avcs found" exit 0 fi else echo -e $USAGE exit 1 fi elif [ $# -ge 2 ] ; then echo -e $USAGE exit 1 fi echo "Building and Loading Policy" set -x make -f /usr/share/selinux/devel/Makefile TEMPLATEFILE.pp || exit /usr/sbin/semodule -i TEMPLATEFILE.pp """ rpm="""\ # Generate a rpm package for the newly generated policy pwd=$(pwd) rpmbuild --define "_sourcedir ${pwd}" --define "_specdir ${pwd}" --define "_builddir ${pwd}" --define "_srcrpmdir ${pwd}" --define "_rpmdir ${pwd}" --define "_buildrootdir ${pwd}/.build" -ba TEMPLATEFILE_selinux.spec """ manpage="""\ # Generate a man page off the installed module sepolicy manpage -p . -d DOMAINTYPE_t """ restorecon="""\ # Fixing the file context on FILENAME /sbin/restorecon -F -R -v FILENAME """ tcp_ports="""\ # Adding SELinux tcp port to port PORTNUM /usr/sbin/semanage port -a -t TEMPLATETYPE_port_t -p tcp PORTNUM """ udp_ports="""\ # Adding SELinux udp port to port PORTNUM /usr/sbin/semanage port -a -t TEMPLATETYPE_port_t -p udp PORTNUM """ users="""\ # Adding SELinux user TEMPLATETYPE_u /usr/sbin/semanage user -a -R "TEMPLATETYPE_rROLES" TEMPLATETYPE_u """ eusers="""\ # Adding roles to SELinux user TEMPLATETYPE_u /usr/sbin/semanage user -m -R "TEMPLATETYPE_rROLES" TEMPLATETYPE_u """ admin_trans="""\ # Adding roles to SELinux user USER /usr/sbin/semanage user -m -R +TEMPLATETYPE_r USER """ min_login_user_default_context="""\ cat > TEMPLATETYPE_u << _EOF TEMPLATETYPE_r:TEMPLATETYPE_t:s0 TEMPLATETYPE_r:TEMPLATETYPE_t system_r:crond_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:initrc_su_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:local_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:remote_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:sshd_t TEMPLATETYPE_r:TEMPLATETYPE_t _EOF if [ ! -f /etc/selinux/targeted/contexts/users/TEMPLATETYPE_u ]; then cp TEMPLATETYPE_u /etc/selinux/targeted/contexts/users/ fi """ x_login_user_default_context="""\ cat > TEMPLATETYPE_u << _EOF TEMPLATETYPE_r:TEMPLATETYPE_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:crond_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:initrc_su_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:local_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:remote_login_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:sshd_t TEMPLATETYPE_r:TEMPLATETYPE_t system_r:xdm_t TEMPLATETYPE_r:TEMPLATETYPE_t _EOF if [ ! -f /etc/selinux/targeted/contexts/users/TEMPLATETYPE_u ]; then cp TEMPLATETYPE_u /etc/selinux/targeted/contexts/users/ fi """ selinux-python-2.8/sepolicy/sepolicy/templates/semodule.py000066400000000000000000000024351330160122500242310ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# compile=""" #!/bin/sh make -f /usr/share/selinux/devel/Makefile semodule -i TEMPLATETYPE.pp """ restorecon=""" restorecon -R -v FILENAME """ tcp_ports=""" semanage ports -a -t TEMPLATETYPE_port_t -p tcp PORTNUM """ udp_ports=""" semanage ports -a -t TEMPLATETYPE_port_t -p udp PORTNUM """ selinux-python-2.8/sepolicy/sepolicy/templates/spec.py000066400000000000000000000041261330160122500233450ustar00rootroot00000000000000header_comment_section="""\ # vim: sw=4:ts=4:et """ base_section="""\ %define selinux_policyver VERSION Name: MODULENAME_selinux Version: 1.0 Release: 1%{?dist} Summary: SELinux policy module for MODULENAME Group: System Environment/Base License: GPLv2+ # This is an example. You will need to change it. URL: http://HOSTNAME Source0: MODULENAME.pp Source1: MODULENAME.if Source2: DOMAINNAME_selinux.8 Source3: DOMAINNAME_u Requires: policycoreutils, libselinux-utils Requires(post): selinux-policy-base >= %{selinux_policyver}, policycoreutils Requires(postun): policycoreutils """ mid_section="""\ BuildArch: noarch %description This package installs and sets up the SELinux policy security module for MODULENAME. %install install -d %{buildroot}%{_datadir}/selinux/packages install -m 644 %{SOURCE0} %{buildroot}%{_datadir}/selinux/packages install -d %{buildroot}%{_datadir}/selinux/devel/include/contrib install -m 644 %{SOURCE1} %{buildroot}%{_datadir}/selinux/devel/include/contrib/ install -d %{buildroot}%{_mandir}/man8/ install -m 644 %{SOURCE2} %{buildroot}%{_mandir}/man8/DOMAINNAME_selinux.8 install -d %{buildroot}/etc/selinux/targeted/contexts/users/ install -m 644 %{SOURCE3} %{buildroot}/etc/selinux/targeted/contexts/users/DOMAINNAME_u %post semodule -n -i %{_datadir}/selinux/packages/MODULENAME.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy %relabel_files /usr/sbin/semanage user -a -R DOMAINNAME_r DOMAINNAME_u fi; exit 0 %postun if [ $1 -eq 0 ]; then semodule -n -r MODULENAME if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy %relabel_files /usr/sbin/semanage user -d DOMAINNAME_u fi; fi; exit 0 %files %attr(0600,root,root) %{_datadir}/selinux/packages/MODULENAME.pp %{_datadir}/selinux/devel/include/contrib/MODULENAME.if %{_mandir}/man8/DOMAINNAME_selinux.8.* /etc/selinux/targeted/contexts/users/DOMAINNAME_u %changelog * TODAYSDATE YOUR NAME 1.0-1 - Initial version """ define_relabel_files_begin ="""\ \n %define relabel_files() \\ """ define_relabel_files_end ="""\ restorecon -R FILENAME; \\ """ selinux-python-2.8/sepolicy/sepolicy/templates/test_module.py000066400000000000000000000105411330160122500247350ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # #['domain', 'role', 'role_prefix', 'object_class', 'name', 'private_type', 'prefix', 'entrypoint', 'target_domain', 'terminal', 'range', 'domains', 'entry_point', 'entry_file', 'domain_prefix', 'private type', 'user_prefix', 'user_role', 'user_domain', 'object', 'type', 'source_domain', 'file_type', 'file', 'class', 'peer_domain', 'objectclass(es)', 'exception_types', 'home_type', 'object_type', 'directory_type', 'boolean', 'pty_type', 'userdomain', 'tty_type', 'tmpfs_type', 'script_file', 'filetype', 'filename', 'init_script_file', 'source_role', 'userdomain_prefix'] dict_values={} dict_values['domain'] = 'sepolicy_domain_t' dict_values['domains'] = 'sepolicy_domain_t' dict_values['target_domain'] = 'sepolicy_target_t' dict_values['source_domain'] = 'sepolicy_source_t' dict_values['peer_domain'] = 'sepolicy_peer_t' dict_values['exception_types'] = 'sepolicy_exception_types_t' dict_values['user_domain'] = 'sepolicy_userdomain_t' dict_values['userdomain'] = 'sepolicy_userdomain_t' dict_values['bool_domain'] = 'sepolicy_bool_domain_t' dict_values['type'] = 'sepolicy_file_t' dict_values['file_type'] = 'sepolicy_file_t' dict_values['private type'] = 'sepolicy_private_file_t' dict_values['private_type'] = 'sepolicy_private_file_t' dict_values['pty_type'] = 'sepolicy_devpts_t' dict_values['tmpfs_type'] = 'sepolicy_tmpfs_t' dict_values['home_type'] = 'sepolicy_home_file_t' dict_values['tty_type'] = 'sepolicy_t' dict_values['directory_type'] = 'sepolicy_file_t' dict_values['object_type'] = 'sepolicy_object_t' dict_values['script_file'] = 'sepolicy_exec_t' dict_values['entry_point'] = 'sepolicy_exec_t' dict_values['file'] = 'sepolicy_file_t' dict_values['entry_file'] = 'sepolicy_exec_t' dict_values['init_script_file'] = 'sepolicy_exec_t' dict_values['entrypoint'] = 'sepolicy_exec_t' dict_values['role'] = 'sepolicy_r' dict_values['role_prefix'] = 'sepolicy' dict_values['user_role'] = 'sepolicy_r' dict_values['source_role'] = 'sepolicy_source_r' dict_values['prefix'] = 'sepolicy_domain' dict_values['domain_prefix'] = 'sepolicy_domain' dict_values['userdomain_prefix'] = 'sepolicy_userdomain' dict_values['user_prefix'] = 'sepolicy_userdomain' dict_values['object_class'] = 'file' dict_values['object'] = 'file' dict_values['class'] = 'file' dict_values['objectclass(es)'] = 'file' dict_values['object_name'] = 'sepolicy_object' dict_values['name'] = '"sepolicy_name"' dict_values['terminal'] = 'sepolicy_tty_t' dict_values['boolean'] = 'sepolicy_bool_t' dict_values['range'] = 's0 - mcs_systemhigh' te_test_module="""\ policy_module(TEMPLATETYPE, 1.0.0) type sepolicy_t; domain_type(sepolicy_t) type sepolicy_domain_t; domain_type(sepolicy_domain_t) type sepolicy_target_t; domain_type(sepolicy_target_t) type sepolicy_source_t; domain_type(sepolicy_source_t) type sepolicy_peer_t; domain_type(sepolicy_peer_t) type sepolicy_exception_types_t; domain_type(sepolicy_exception_types_t) type sepolicy_userdomain_t; domain_type(sepolicy_userdomain_t) type sepolicy_file_t; files_type(sepolicy_file_t) type sepolicy_private_file_t; files_type(sepolicy_private_file_t) type sepolicy_home_file_t; files_type(sepolicy_home_file_t) type sepolicy_tty_t; term_tty(sepolicy_tty_t) type sepolicy_object_t; type sepolicy_devpts_t; term_pty(sepolicy_devpts_t) type sepolicy_tmpfs_t; files_type(sepolicy_tmpfs_t) type sepolicy_exec_t; files_type(sepolicy_exec_t) role sepolicy_r; role sepolicy_source_r; role sepolicy_target_r; ################################# # # Local policy # """ selinux-python-2.8/sepolicy/sepolicy/templates/tmp.py000066400000000000000000000066011330160122500232130ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### tmp Template File ############################# te_types=""" type TEMPLATETYPE_tmp_t; files_tmp_file(TEMPLATETYPE_tmp_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) files_tmp_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, { dir file lnk_file }) """ te_stream_rules=""" manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) files_tmp_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_tmp_t, sock_file) """ if_rules=""" ######################################## ## ## Do not audit attempts to read, ## TEMPLATETYPE tmp files ## ## ## ## Domain to not audit. ## ## # interface(`TEMPLATETYPE_dontaudit_read_tmp_files',` gen_require(` type TEMPLATETYPE_tmp_t; ') dontaudit $1 TEMPLATETYPE_tmp_t:file read_file_perms; ') ######################################## ## ## Read TEMPLATETYPE tmp files ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_tmp_files',` gen_require(` type TEMPLATETYPE_tmp_t; ') files_search_tmp($1) read_files_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) ') ######################################## ## ## Manage TEMPLATETYPE tmp files ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_tmp',` gen_require(` type TEMPLATETYPE_tmp_t; ') files_search_tmp($1) manage_dirs_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_files_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) manage_lnk_files_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t) ') """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_tmp_t; ') files_search_pids($1) stream_connect_pattern($1, TEMPLATETYPE_tmp_t, TEMPLATETYPE_tmp_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_tmp_t;""" if_admin_rules=""" files_search_tmp($1) admin_pattern($1, TEMPLATETYPE_tmp_t) """ selinux-python-2.8/sepolicy/sepolicy/templates/unit_file.py000066400000000000000000000043251330160122500243720ustar00rootroot00000000000000# Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### unit Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_unit_file_t; systemd_unit_file(TEMPLATETYPE_unit_file_t) """ te_rules="" ########################### Interface File ############################# if_rules="""\ ######################################## ## ## Execute TEMPLATETYPE server in the TEMPLATETYPE domain. ## ## ## ## Domain allowed to transition. ## ## # interface(`TEMPLATETYPE_systemctl',` gen_require(` type TEMPLATETYPE_t; type TEMPLATETYPE_unit_file_t; ') systemd_exec_systemctl($1) systemd_read_fifo_file_passwd_run($1) allow $1 TEMPLATETYPE_unit_file_t:file read_file_perms; allow $1 TEMPLATETYPE_unit_file_t:service manage_service_perms; ps_process_pattern($1, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_unit_file_t;""" if_admin_rules=""" TEMPLATETYPE_systemctl($1) admin_pattern($1, TEMPLATETYPE_unit_file_t) allow $1 TEMPLATETYPE_unit_file_t:service all_service_perms; """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_unit_file_t,s0) """ fc_dir="" selinux-python-2.8/sepolicy/sepolicy/templates/user.py000066400000000000000000000103311330160122500233640ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### Type Enforcement File ############################# te_login_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_unpriv_user_template(TEMPLATETYPE) """ te_admin_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_admin_user_template(TEMPLATETYPE) """ te_min_login_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_restricted_user_template(TEMPLATETYPE) """ te_x_login_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ######################################## # # Declarations # userdom_restricted_xwindows_user_template(TEMPLATETYPE) """ te_existing_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) """ te_root_user_types="""\ policy_module(TEMPLATETYPE, 1.0.0) ## ##

## Allow TEMPLATETYPE to read files in the user home directory ##

##
gen_tunable(TEMPLATETYPE_read_user_files, false) ## ##

## Allow TEMPLATETYPE to manage files in the user home directory ##

##
gen_tunable(TEMPLATETYPE_manage_user_files, false) ######################################## # # Declarations # userdom_base_user_template(TEMPLATETYPE) """ te_login_user_rules="""\ """ te_existing_user_rules="""\ ######################################## # # TEMPLATETYPE customized policy # """ te_x_login_user_rules="""\ """ te_root_user_rules="""\ """ te_transition_rules=""" optional_policy(` APPLICATION_role(TEMPLATETYPE_r, TEMPLATETYPE_t) ') """ te_user_trans_rules=""" optional_policy(` gen_require(` role USER_r; ') TEMPLATETYPE_role_change(USER_r) ') """ te_admin_rules=""" allow TEMPLATETYPE_t self:capability { dac_override dac_read_search kill sys_ptrace sys_nice }; files_dontaudit_search_all_dirs(TEMPLATETYPE_t) selinux_get_enforce_mode(TEMPLATETYPE_t) seutil_domtrans_setfiles(TEMPLATETYPE_t) seutil_search_default_contexts(TEMPLATETYPE_t) logging_send_syslog_msg(TEMPLATETYPE_t) kernel_read_system_state(TEMPLATETYPE_t) domain_dontaudit_search_all_domains_state(TEMPLATETYPE_t) domain_dontaudit_ptrace_all_domains(TEMPLATETYPE_t) userdom_dontaudit_search_admin_dir(TEMPLATETYPE_t) userdom_dontaudit_search_user_home_dirs(TEMPLATETYPE_t) tunable_policy(`TEMPLATETYPE_read_user_files',` userdom_read_user_home_content_files(TEMPLATETYPE_t) userdom_read_user_tmp_files(TEMPLATETYPE_t) ') tunable_policy(`TEMPLATETYPE_manage_user_files',` userdom_manage_user_home_content_dirs(TEMPLATETYPE_t) userdom_manage_user_home_content_files(TEMPLATETYPE_t) userdom_manage_user_home_content_symlinks(TEMPLATETYPE_t) userdom_manage_user_tmp_files(TEMPLATETYPE_t) ') """ te_admin_trans_rules=""" gen_require(` role USER_r; ') allow USER_r TEMPLATETYPE_r; """ te_admin_domain_rules=""" optional_policy(` APPLICATION_admin(TEMPLATETYPE_t, TEMPLATETYPE_r) ') """ te_roles_rules=""" optional_policy(` gen_require(` role ROLE_r; ') allow TEMPLATETYPE_r ROLE_r; ') """ te_sudo_rules=""" optional_policy(` sudo_role_template(TEMPLATETYPE, TEMPLATETYPE_r, TEMPLATETYPE_t) ') """ te_newrole_rules=""" seutil_run_newrole(TEMPLATETYPE_t, TEMPLATETYPE_r) """ selinux-python-2.8/sepolicy/sepolicy/templates/var_cache.py000066400000000000000000000100701330160122500243210ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### cache Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_cache_t; files_type(TEMPLATETYPE_cache_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) files_var_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, { dir file lnk_file }) """ te_stream_rules="""\ manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) files_var_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_cache_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE cache directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_cache',` gen_require(` type TEMPLATETYPE_cache_t; ') allow $1 TEMPLATETYPE_cache_t:dir search_dir_perms; files_search_var($1) ') ######################################## ## ## Read TEMPLATETYPE cache files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_cache_files',` gen_require(` type TEMPLATETYPE_cache_t; ') files_search_var($1) read_files_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') ######################################## ## ## Create, read, write, and delete ## TEMPLATETYPE cache files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_cache_files',` gen_require(` type TEMPLATETYPE_cache_t; ') files_search_var($1) manage_files_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') ######################################## ## ## Manage TEMPLATETYPE cache dirs. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_cache_dirs',` gen_require(` type TEMPLATETYPE_cache_t; ') files_search_var($1) manage_dirs_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') """ if_stream_rules=""" ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_cache_t; ') stream_connect_pattern($1, TEMPLATETYPE_cache_t, TEMPLATETYPE_cache_t) ') """ if_admin_types=""" type TEMPLATETYPE_cache_t;""" if_admin_rules=""" files_search_var($1) admin_pattern($1, TEMPLATETYPE_cache_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_cache_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_cache_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/templates/var_lib.py000066400000000000000000000103131330160122500240240ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_lib Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_var_lib_t; files_type(TEMPLATETYPE_var_lib_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) files_var_lib_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, { dir file lnk_file }) """ te_stream_rules="""\ manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) files_var_lib_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_lib',` gen_require(` type TEMPLATETYPE_var_lib_t; ') allow $1 TEMPLATETYPE_var_lib_t:dir search_dir_perms; files_search_var_lib($1) ') ######################################## ## ## Read TEMPLATETYPE lib files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_lib_files',` gen_require(` type TEMPLATETYPE_var_lib_t; ') files_search_var_lib($1) read_files_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') ######################################## ## ## Manage TEMPLATETYPE lib files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_lib_files',` gen_require(` type TEMPLATETYPE_var_lib_t; ') files_search_var_lib($1) manage_files_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') ######################################## ## ## Manage TEMPLATETYPE lib directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_lib_dirs',` gen_require(` type TEMPLATETYPE_var_lib_t; ') files_search_var_lib($1) manage_dirs_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') """ if_stream_rules=""" ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_var_lib_t; ') stream_connect_pattern($1, TEMPLATETYPE_var_lib_t, TEMPLATETYPE_var_lib_t) ') """ if_admin_types=""" type TEMPLATETYPE_var_lib_t;""" if_admin_rules=""" files_search_var_lib($1) admin_pattern($1, TEMPLATETYPE_var_lib_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_var_lib_t,s0) """ fc_sock_file="""\ FILENAME -s gen_context(system_u:object_r:TEMPLATETYPE_var_lib_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_var_lib_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/templates/var_log.py000066400000000000000000000062711330160122500240470ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_log Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_log_t; logging_log_file(TEMPLATETYPE_log_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) logging_log_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_log_t, { dir file lnk_file }) """ ########################### Interface File ############################# if_rules="""\ ######################################## ## ## Read TEMPLATETYPE's log files. ## ## ## ## Domain allowed access. ## ## ## # interface(`TEMPLATETYPE_read_log',` gen_require(` type TEMPLATETYPE_log_t; ') logging_search_logs($1) read_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) ') ######################################## ## ## Append to TEMPLATETYPE log files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_append_log',` gen_require(` type TEMPLATETYPE_log_t; ') logging_search_logs($1) append_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) ') ######################################## ## ## Manage TEMPLATETYPE log files ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_log',` gen_require(` type TEMPLATETYPE_log_t; ') logging_search_logs($1) manage_dirs_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) manage_lnk_files_pattern($1, TEMPLATETYPE_log_t, TEMPLATETYPE_log_t) ') """ if_admin_types=""" type TEMPLATETYPE_log_t;""" if_admin_rules=""" logging_search_logs($1) admin_pattern($1, TEMPLATETYPE_log_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_log_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_log_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/templates/var_run.py000066400000000000000000000055631330160122500240750ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_run Template File ############################# te_types=""" type TEMPLATETYPE_var_run_t; files_pid_file(TEMPLATETYPE_var_run_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) files_pid_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, { dir file lnk_file }) """ te_stream_rules=""" manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) files_pid_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_var_run_t, sock_file) """ if_rules="""\ ######################################## ## ## Read TEMPLATETYPE PID files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_pid_files',` gen_require(` type TEMPLATETYPE_var_run_t; ') files_search_pids($1) read_files_pattern($1, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t) ') """ if_stream_rules="""\ ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_var_run_t; ') files_search_pids($1) stream_connect_pattern($1, TEMPLATETYPE_var_run_t, TEMPLATETYPE_var_run_t, TEMPLATETYPE_t) ') """ if_admin_types=""" type TEMPLATETYPE_var_run_t;""" if_admin_rules=""" files_search_pids($1) admin_pattern($1, TEMPLATETYPE_var_run_t) """ fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_var_run_t,s0) """ fc_sock_file="""\ FILENAME -s gen_context(system_u:object_r:TEMPLATETYPE_var_run_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_var_run_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/templates/var_spool.py000066400000000000000000000100561330160122500244160ustar00rootroot00000000000000# Copyright (C) 2007-2012 Red Hat # see file 'COPYING' for use and warranty information # # policygentool is a tool for the initial generation of SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # ########################### var_spool Template File ############################# ########################### Type Enforcement File ############################# te_types=""" type TEMPLATETYPE_spool_t; files_type(TEMPLATETYPE_spool_t) """ te_rules=""" manage_dirs_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) manage_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) manage_lnk_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) files_spool_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, { dir file lnk_file }) """ te_stream_rules="""\ manage_sock_files_pattern(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) files_spool_filetrans(TEMPLATETYPE_t, TEMPLATETYPE_spool_t, sock_file) """ ########################### Interface File ############################# if_rules=""" ######################################## ## ## Search TEMPLATETYPE spool directories. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_search_spool',` gen_require(` type TEMPLATETYPE_spool_t; ') allow $1 TEMPLATETYPE_spool_t:dir search_dir_perms; files_search_spool($1) ') ######################################## ## ## Read TEMPLATETYPE spool files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_read_spool_files',` gen_require(` type TEMPLATETYPE_spool_t; ') files_search_spool($1) read_files_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') ######################################## ## ## Manage TEMPLATETYPE spool files. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_spool_files',` gen_require(` type TEMPLATETYPE_spool_t; ') files_search_spool($1) manage_files_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') ######################################## ## ## Manage TEMPLATETYPE spool dirs. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_manage_spool_dirs',` gen_require(` type TEMPLATETYPE_spool_t; ') files_search_spool($1) manage_dirs_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') """ if_stream_rules=""" ######################################## ## ## Connect to TEMPLATETYPE over a unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`TEMPLATETYPE_stream_connect',` gen_require(` type TEMPLATETYPE_t, TEMPLATETYPE_spool_t; ') stream_connect_pattern($1, TEMPLATETYPE_spool_t, TEMPLATETYPE_spool_t) ') """ if_admin_types=""" type TEMPLATETYPE_spool_t;""" if_admin_rules=""" files_search_spool($1) admin_pattern($1, TEMPLATETYPE_spool_t) """ ########################### File Context ################################## fc_file="""\ FILENAME -- gen_context(system_u:object_r:TEMPLATETYPE_spool_t,s0) """ fc_dir="""\ FILENAME(/.*)? gen_context(system_u:object_r:TEMPLATETYPE_spool_t,s0) """ selinux-python-2.8/sepolicy/sepolicy/transition.py000077500000000000000000000062551330160122500226170ustar00rootroot00000000000000#! /usr/bin/python -Es # Copyright (C) 2011 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transistions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy __all__ = ['setrans'] def _entrypoint(src): trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src}) return map(lambda y: y[sepolicy.TARGET], filter(lambda x: "entrypoint" in x[sepolicy.PERMS], trans)) def _get_trans(src): src_list = [src] + list(filter(lambda x: x['name'] == src, sepolicy.get_all_types_info()))[0]['attributes'] trans_list = list(filter(lambda x: x['source'] in src_list and x['class'] == 'process', sepolicy.get_all_transitions())) return trans_list class setrans: def __init__(self, source, dest=None): self.seen = [] self.sdict = {} self.source = source self.dest = dest self._process(self.source) def _process(self, source): if source in self.sdict: return self.sdict[source] self.sdict[source] = {} trans = _get_trans(source) if not trans: return self.sdict[source]["name"] = source if not self.dest: self.sdict[source]["map"] = trans else: self.sdict[source]["map"] = list(map(lambda y: y, filter(lambda x: x["transtype"] == self.dest, trans))) self.sdict[source]["child"] = list(map(lambda y: y["transtype"], filter(lambda x: x["transtype"] not in [self.dest, source], trans))) for s in self.sdict[source]["child"]: self._process(s) def out(self, name, header=""): buf = "" if name in self.seen: return buf self.seen.append(name) if "map" in self.sdict[name]: for t in self.sdict[name]["map"]: cond = sepolicy.get_conditionals(t["source"], t["transtype"], "process", ["transition"]) if cond: buf += "%s%s @ %s --> %s %s\n" % (header, t["source"], t["target"], t["transtype"], sepolicy.get_conditionals_format_text(cond)) else: buf += "%s%s @ %s --> %s\n" % (header, t["source"], t["target"], t["transtype"]) if "child" in self.sdict[name]: for x in self.sdict[name]["child"]: buf += self.out(x, "%s%s ... " % (header, name)) return buf def output(self): self.seen = [] print(self.out(self.source)) selinux-python-2.8/sepolicy/setup.py000066400000000000000000000007731330160122500177320ustar00rootroot00000000000000#!/usr/bin/env python # Author: Thomas Liu # Author: Dan Walsh from distutils.core import setup setup( name="sepolicy", version="1.1", description="Python SELinux Policy Analyses bindings", author="Daniel Walsh", author_email="dwalsh@redhat.com", packages=[ "sepolicy", "sepolicy.templates", "sepolicy.help" ], package_data={ 'sepolicy': ['*.glade'], 'sepolicy.help': ['*.txt', '*.png'] } ) selinux-python-2.8/sepolicy/test_sepolicy.py000066400000000000000000000104601330160122500214520ustar00rootroot00000000000000import unittest import os import shutil from tempfile import mkdtemp from subprocess import Popen, PIPE class SepolicyTests(unittest.TestCase): def assertDenied(self, err): self.assert_('Permission denied' in err, '"Permission denied" not found in %r' % err) def assertNotFound(self, err): self.assert_('not found' in err, '"not found" not found in %r' % err) def assertFailure(self, status): self.assertNotEqual(status, 0, 'Succeeded when it should have failed') def assertSuccess(self, status, err): self.assertEqual(status, 0, 'sepolicy should have succeeded for this test %r' % err) def test_man_domain(self): "Verify sepolicy manpage -d works" p = Popen(['sepolicy', 'manpage', '-d', 'httpd_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_man_all(self): "Verify sepolicy manpage -a works" p = Popen(['sepolicy', 'manpage', '-a'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_l(self): "Verify sepolicy network -l works" p = Popen(['sepolicy', 'network', '-l'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_t(self): "Verify sepolicy network -t works" p = Popen(['sepolicy', 'network', '-t', 'http_port_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_p(self): "Verify sepolicy network -p works" p = Popen(['sepolicy', 'network', '-p', '80'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_network_d(self): "Verify sepolicy network -d works" p = Popen(['sepolicy', 'network', '-d', 'httpd_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_transition_s(self): "Verify sepolicy transition -s works" p = Popen(['sepolicy', 'transition', '-s', 'httpd_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_transition_t(self): "Verify sepolicy transition -t works" p = Popen(['sepolicy', 'transition', '-s', 'httpd_t', '-t', 'sendmail_t'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_booleans_a(self): "Verify sepolicy booleans -a works" p = Popen(['sepolicy', 'booleans', '-a'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_booleans_b_alias(self): "Verify sepolicy booleans -b works" p = Popen(['sepolicy', 'booleans', '-b', 'allow_ypbind'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_booleans_b(self): "Verify sepolicy booleans -b works" p = Popen(['sepolicy', 'booleans', '-b', 'nis_enabled'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_l(self): "Verify sepolicy interface -l works" p = Popen(['sepolicy', 'interface', '-l'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_a(self): "Verify sepolicy interface -a works" p = Popen(['sepolicy', 'interface', '-a'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_p(self): "Verify sepolicy interface -u works" p = Popen(['sepolicy', 'interface', '-u'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) def test_interface_ci(self): "Verify sepolicy interface -c -i works" p = Popen(['sepolicy', 'interface', '-c', '-i', 'apache_admin'], stdout=PIPE) out, err = p.communicate() self.assertSuccess(p.returncode, err) if __name__ == "__main__": import selinux if selinux.is_selinux_enabled() and selinux.security_getenforce() == 1: unittest.main() else: print("SELinux must be in enforcing mode for this test")