ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Fedora 31 Server, podman and SELinux

    IT Discussion
    5
    52
    4.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W
      Woti
      last edited by

      Hello,
      I am following this tutorial https://github.com/dlueth/easyepg.minimal it is a Ubuntu based Docker image. I am running in trouble with plenty of SELinux errors and I do not know how to fix these.
      I googled around and come over a tool called "udica", but no way I do not know how to create new policies.
      Beside of that, they are using Docker. In Fedora I need to use Podman.
      I did install the Docker alias for Podman package and everything is working like a charm beside of the policies errors.

      dnf install podman-docker cockpit-podman
      

      Following the instruction in the tutorial:
      Download and run the script works fine.

      sh -c "$(curl -s -H 'Cache-Control: no-cache' https://raw.githubusercontent.com/dlueth/easyepg.minimal/master/init)"
      

      Running:

      podman start easyepg.admin
      

      Gives me:
      SELinux prevents git from having write access to the directory /usr/local/bin/telerising/easyepg
      SELinux prevents git from accessing the easyepg directory with write access.
      SELinux prevents git from accessing the easyepg directory with add_name access.
      There are much more such messages with different SELinux access-commands.
      I did not suspect that it would be so difficult.

      Are there some experts here who could give me some advice?
      Do you need more info og logs?

      Best regards,
      Woti

      1 Reply Last reply Reply Quote 0
      • DustinB3403D
        DustinB3403
        last edited by

        Test by disabling SELinux to see if everything works, if it does you'll need to create exclusions for this.

        W 1 Reply Last reply Reply Quote 0
        • W
          Woti @DustinB3403
          last edited by

          @DustinB3403 How do I create exclusions? Everything works fine with SELinux disabled.

          1 Reply Last reply Reply Quote 0
          • DustinB3403D
            DustinB3403
            last edited by

            Without knowing what was specifically allowed through with selinux disabled I can't say for certain. Here is documentation on Setenforce.

            1 Reply Last reply Reply Quote 0
            • black3dynamiteB
              black3dynamite
              last edited by

              Show us the audit logs.

              # this command will so anything that was denied.
              sudo tail -f /var/log/audit/audit.log | grep "denied"
              
              W 1 Reply Last reply Reply Quote 1
              • black3dynamiteB
                black3dynamite
                last edited by black3dynamite

                Don't disable SELinux, temporary set it to permissive.

                # temporary set SELinux to permissive
                sudo setenforce permissive
                
                # confirm SELinux is set to permissive
                getenforce
                
                # set it SELinux back to enforcing after you fix the permissive
                sudo setenforce enforcing
                
                1 Reply Last reply Reply Quote 1
                • black3dynamiteB
                  black3dynamite
                  last edited by

                  You can just use podman to install easyepg. I found five to choose from.
                  b7dc841d-1414-42d4-8482-e0be0a2e8fb9-image.png

                  W 1 Reply Last reply Reply Quote 0
                  • W
                    Woti @black3dynamite
                    last edited by

                    @black3dynamite said in Fedora 31 Server, podman and SELinux:

                    Show us the audit logs.

                    # this command will so anything that was denied.
                    sudo tail -f /var/log/audit/audit.log | grep "denied"
                    

                    This one gives no output at all. I'll try tomorrow again.

                    JaredBuschJ 1 Reply Last reply Reply Quote 0
                    • W
                      Woti @black3dynamite
                      last edited by

                      @black3dynamite said in Fedora 31 Server, podman and SELinux:

                      You can just use podman to install easyepg. I found five to choose from.
                      b7dc841d-1414-42d4-8482-e0be0a2e8fb9-image.png

                      Yes I know. Have not tried those and I just know about "takealug". I can try. Just to figure out if get the same SELinux errors.

                      1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch @Woti
                        last edited by

                        @Woti he got the command wrong.

                        tail -f will only get the last few lines of the log

                        This will look at the entire log.

                        sudo grep denied /var/log/audit/audit.log
                        
                        1 Reply Last reply Reply Quote 3
                        • stacksofplatesS
                          stacksofplates
                          last edited by

                          Are you running podman as root? A normal user can't modify /usr/local/bin normally even without SELinux.

                          1 Reply Last reply Reply Quote 0
                          • stacksofplatesS
                            stacksofplates
                            last edited by

                            That unit script shows that it uses this as the default path:

                            DEFAULT_VOLUME=$(cd ~ && pwd -P)"/easyepg"
                            

                            How did that end up in /usr/local/bin?

                            1 Reply Last reply Reply Quote 0
                            • W
                              Woti
                              last edited by

                              @stacksofplates during installation of the script you can choose where to install easyepg. I tried both in /home/myuser/easyepg as podman with my user and in /usr/local/bin/easyepg as podman with root.

                              1 Reply Last reply Reply Quote 0
                              • W
                                Woti
                                last edited by Woti

                                Output 1 of 2 audit.log

                                type=AVC msg=audit(1583268530.225:308): avc:  denied  { write } for  pid=2673 comm="git" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583268657.393:313): avc:  denied  { write } for  pid=3024 comm="git" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583268949.079:371): avc:  denied  { add_name } for  pid=3682 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583269134.240:386): avc:  denied  { create } for  pid=3920 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583269242.611:406): avc:  denied  { create } for  pid=4143 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269242.611:407): avc:  denied  { write open } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=8739228 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269242.620:408): avc:  denied  { read } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269242.620:409): avc:  denied  { remove_name } for  pid=4143 comm="git" name="HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269242.620:410): avc:  denied  { rename } for  pid=4143 comm="git" name="HEAD.lock" dev="dm-0" ino=575190 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269242.621:411): avc:  denied  { setattr } for  pid=4143 comm="git" name="config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269242.621:412): avc:  denied  { map } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269242.621:413): avc:  denied  { unlink } for  pid=4143 comm="git" name="config" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269242.622:414): avc:  denied  { create } for  pid=4143 comm="git" name="tLxMhAM" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
                                type=AVC msg=audit(1583269242.622:415): avc:  denied  { unlink } for  pid=4143 comm="git" name="tLxMhAM" dev="dm-0" ino=575191 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
                                type=AVC msg=audit(1583269244.875:416): avc:  denied  { link } for  pid=4152 comm="git" name="tmp_pack_katKey" dev="dm-0" ino=575193 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269244.892:417): avc:  denied  { append } for  pid=4143 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=4240653 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269244.997:418): avc:  denied  { ioctl } for  pid=4160 comm="bash" path="/easyepg/easyepg/update.sh" dev="dm-0" ino=13460878 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269247.412:419): avc:  denied  { rmdir } for  pid=4699 comm="rm" name="branches" dev="dm-0" ino=4240646 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269247.420:420): avc:  denied  { remove_name } for  pid=4699 comm="rm" name="easyepg" dev="dm-0" ino=14560060 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269248.288:421): avc:  denied  { setattr } for  pid=4725 comm="chown" name="my-git.te" dev="dm-0" ino=9478378 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269248.288:422): avc:  denied  { setattr } for  pid=4725 comm="chown" name="hzn" dev="dm-0" ino=13298283 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269248.289:423): avc:  denied  { setattr } for  pid=4725 comm="chown" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269864.864:431): avc:  denied  { create } for  pid=5249 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269864.864:432): avc:  denied  { write open } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=13298582 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269864.869:433): avc:  denied  { read } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269864.871:434): avc:  denied  { remove_name } for  pid=5249 comm="git" name="HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269864.871:435): avc:  denied  { rename } for  pid=5249 comm="git" name="HEAD.lock" dev="dm-0" ino=4226140 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269864.871:436): avc:  denied  { setattr } for  pid=5249 comm="git" name="config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269864.871:437): avc:  denied  { map } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269864.871:438): avc:  denied  { unlink } for  pid=5249 comm="git" name="config" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269864.871:439): avc:  denied  { create } for  pid=5249 comm="git" name="tEzi3Yf" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
                                type=AVC msg=audit(1583269864.871:440): avc:  denied  { unlink } for  pid=5249 comm="git" name="tEzi3Yf" dev="dm-0" ino=4230336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
                                type=AVC msg=audit(1583269866.711:441): avc:  denied  { link } for  pid=5254 comm="git" name="tmp_pack_aKmh5l" dev="dm-0" ino=4230338 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269866.720:442): avc:  denied  { append } for  pid=5249 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=575213 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269866.766:443): avc:  denied  { ioctl } for  pid=5259 comm="bash" path="/easyepg/easyepg/update.sh" dev="dm-0" ino=512980 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269866.795:444): avc:  denied  { read } for  pid=5264 comm="cp" name="prog_combine.pl" dev="dm-0" ino=512968 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269866.795:445): avc:  denied  { open } for  pid=5264 comm="cp" path="/easyepg/easyepg/prog_combine.pl" dev="dm-0" ino=512968 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269866.795:446): avc:  denied  { write } for  pid=5264 comm="cp" name="prog_combine.pl" dev="dm-0" ino=9658138 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269868.852:447): avc:  denied  { remove_name } for  pid=5792 comm="rm" name="branches" dev="dm-0" ino=8739260 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269868.852:448): avc:  denied  { rmdir } for  pid=5792 comm="rm" name="branches" dev="dm-0" ino=8739260 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269868.852:449): avc:  denied  { unlink } for  pid=5792 comm="rm" name="exclude" dev="dm-0" ino=13298582 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269868.860:450): avc:  denied  { remove_name } for  pid=5792 comm="rm" name="easyepg" dev="dm-0" ino=575196 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269869.734:451): avc:  denied  { setattr } for  pid=5827 comm="chown" name="my-git.te" dev="dm-0" ino=9478378 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269869.735:452): avc:  denied  { setattr } for  pid=5827 comm="chown" name="epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269869.735:453): avc:  denied  { setattr } for  pid=5827 comm="chown" name="hzn" dev="dm-0" ino=13298283 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269869.737:454): avc:  denied  { setattr } for  pid=5827 comm="chown" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1
                                type=AVC msg=audit(1583269938.914:455): avc:  denied  { execute } for  pid=5931 comm="bash" name="epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269938.914:456): avc:  denied  { execute_no_trans } for  pid=5931 comm="bash" path="/easyepg/epg.sh" dev="dm-0" ino=9658134 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269938.919:457): avc:  denied  { ioctl } for  pid=5931 comm="epg.sh" path="/easyepg/epg.sh" dev="dm-0" ino=9658134 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269950.143:458): avc:  denied  { create } for  pid=6039 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269950.148:459): avc:  denied  { rename } for  pid=6039 comm="git" name="HEAD.lock" dev="dm-0" ino=575200 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269950.149:460): avc:  denied  { map } for  pid=6039 comm="git" path="/easyepg/easyepg/.git/config" dev="dm-0" ino=575201 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269950.149:461): avc:  denied  { create } for  pid=6039 comm="git" name="ti678m1" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
                                type=AVC msg=audit(1583269950.150:462): avc:  denied  { unlink } for  pid=6039 comm="git" name="ti678m1" dev="dm-0" ino=575201 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=lnk_file permissive=1
                                type=AVC msg=audit(1583269951.786:463): avc:  denied  { link } for  pid=6046 comm="git" name="tmp_pack_1QFH8x" dev="dm-0" ino=575203 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583269951.793:464): avc:  denied  { append } for  pid=6039 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=13298606 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583270122.384:529): avc:  denied  { unlink } for  pid=7005 comm="systemd-user-ru" name="hosts" dev="tmpfs" ino=68629 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=1
                                type=AVC msg=audit(1583270122.384:530): avc:  denied  { read } for  pid=7005 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=42446 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=1
                                type=AVC msg=audit(1583270122.385:531): avc:  denied  { rmdir } for  pid=7005 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=42446 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=1
                                type=AVC msg=audit(1583270122.385:532): avc:  denied  { unlink } for  pid=7005 comm="systemd-user-ru" name=".containerenv" dev="tmpfs" ino=42444 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=1
                                type=AVC msg=audit(1583350958.833:261): avc:  denied  { create } for  pid=1438 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583350958.833:262): avc:  denied  { remove_name } for  pid=1438 comm="git" name=".git" dev="dm-0" ino=8412886 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583350958.833:263): avc:  denied  { remove_name } for  pid=1438 comm="git" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583350958.890:264): avc:  denied  { remove_name } for  pid=1440 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583351702.774:309): avc:  denied  { remove_name } for  pid=1834 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583351702.793:310): avc:  denied  { remove_name } for  pid=1837 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352068.116:314): avc:  denied  { remove_name } for  pid=1986 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352068.136:315): avc:  denied  { remove_name } for  pid=1989 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352178.007:316): avc:  denied  { remove_name } for  pid=2082 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352178.023:317): avc:  denied  { remove_name } for  pid=2085 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352263.055:328): avc:  denied  { remove_name } for  pid=2191 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352263.072:329): avc:  denied  { remove_name } for  pid=2194 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352791.875:366): avc:  denied  { remove_name } for  pid=2429 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583352791.894:367): avc:  denied  { remove_name } for  pid=2432 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583353388.093:404): avc:  denied  { remove_name } for  pid=3027 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583353388.114:405): avc:  denied  { remove_name } for  pid=3030 comm="rm" name="easyepg" dev="dm-0" ino=4203731 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583354127.774:460): avc:  denied  { write } for  pid=3275 comm="rm" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_dir_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583354127.792:461): avc:  denied  { write } for  pid=3278 comm="rm" name="easyepg" dev="dm-0" ino=9478336 scontext=system_u:system_r:container_t:s0:c812,c831 tcontext=system_u:object_r:user_home_dir_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583354477.988:519): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name="hosts" dev="tmpfs" ino=50070 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583354477.989:520): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name="resolv.conf" dev="tmpfs" ino=50066 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583354477.989:521): avc:  denied  { read } for  pid=3570 comm="systemd-user-ru" name="secrets" dev="tmpfs" ino=37057 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=dir permissive=0
                                type=AVC msg=audit(1583354477.989:522): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name=".containerenv" dev="tmpfs" ino=37055 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=0
                                type=AVC msg=audit(1583354477.989:523): avc:  denied  { unlink } for  pid=3570 comm="systemd-user-ru" name="hostname" dev="tmpfs" ino=37054 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:container_file_t:s0:c812,c831 tclass=file permissive=0
                                type=AVC msg=audit(1583437487.930:270): avc:  denied  { write } for  pid=1974 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583437489.150:271): avc:  denied  { setattr } for  pid=1995 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.150:272): avc:  denied  { setattr } for  pid=1995 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583437489.151:273): avc:  denied  { setattr } for  pid=1995 comm="chown" name="LICENSE" dev="dm-0" ino=13379704 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.151:274): avc:  denied  { setattr } for  pid=1995 comm="chown" name="README.md" dev="dm-0" ino=13508762 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.151:275): avc:  denied  { setattr } for  pid=1995 comm="chown" name="backup.sh" dev="dm-0" ino=13508763 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.151:276): avc:  denied  { setattr } for  pid=1995 comm="chown" name="branch-debaschdi.sh" dev="dm-0" ino=13726284 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.151:277): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_combine.pl" dev="dm-0" ino=13726285 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.151:278): avc:  denied  { setattr } for  pid=1995 comm="chown" name="combine.sh" dev="dm-0" ino=13726286 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.151:279): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.152:280): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_ext.pl" dev="dm-0" ino=4219926 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.152:281): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4219930 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.152:282): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_ext.pl" dev="dm-0" ino=4219932 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.152:283): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ext.sh" dev="dm-0" ino=4219933 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.152:284): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4219935 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.152:285): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ext" dev="dm-0" ino=4219912 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583437489.152:286): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=8635392 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.153:287): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=8635393 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.153:288): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=8635395 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.153:289): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=8635423 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.154:290): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=8635428 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.154:291): avc:  denied  { setattr } for  pid=1995 comm="chown" name="hzn.sh" dev="dm-0" ino=8667283 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.154:292): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=8693190 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.154:293): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=8701656 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.155:294): avc:  denied  { setattr } for  pid=1995 comm="chown" name="hzn" dev="dm-0" ino=8625290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583437489.155:295): avc:  denied  { setattr } for  pid=1995 comm="chown" name="prog_combine.pl" dev="dm-0" ino=13726291 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.155:296): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13726293 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.155:297): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13726346 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.155:298): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13726349 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.155:299): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=13777383 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.155:300): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13777384 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:301): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13777385 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:302): avc:  denied  { setattr } for  pid=1995 comm="chown" name="rdt.sh" dev="dm-0" ino=13777386 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:303): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13777387 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:304): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=13167104 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:305): avc:  denied  { setattr } for  pid=1995 comm="chown" name="rdt" dev="dm-0" ino=13726292 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                type=AVC msg=audit(1583437489.156:306): avc:  denied  { setattr } for  pid=1995 comm="chown" name="restore.sh" dev="dm-0" ino=13167105 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:307): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=226961 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:308): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=231429 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.156:309): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=231430 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:310): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=231434 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:311): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=231435 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:312): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=231436 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:313): avc:  denied  { setattr } for  pid=1995 comm="chown" name="swc.sh" dev="dm-0" ino=231437 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:314): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=360556 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:315): avc:  denied  { setattr } for  pid=1995 comm="chown" name="swc" dev="dm-0" ino=225110 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0type=AVC msg=audit(1583437489.158:316): avc:  denied  { setattr } for  pid=1995 comm="chown" name="testing.sh" dev="dm-0" ino=13167106 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:317): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=4219938 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:318): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=4219939 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:319): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=4219940 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:320): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4219941 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:321): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=4219942 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:322): avc:  denied  { setattr } for  pid=1995 comm="chown" name="proxy.sh" dev="dm-0" ino=4219944 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                type=AVC msg=audit(1583437489.158:323): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4563988 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                
                                1 Reply Last reply Reply Quote 0
                                • W
                                  Woti
                                  last edited by

                                  Output 2 of 2 audit.log

                                  type=AVC msg=audit(1583437489.158:324): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tkm.sh" dev="dm-0" ino=4622383 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.158:325): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622384 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.158:326): avc:  denied  { setattr } for  pid=1995 comm="chown" name="web_magentatv_de.php" dev="dm-0" ino=4622385 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.158:327): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tkm" dev="dm-0" ino=4219936 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.159:328): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=8832681 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.159:329): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=8832819 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.159:330): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=8903342 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.159:331): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=8903498 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:332): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=8913684 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:333): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096147 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:334): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096148 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:335): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvp.sh" dev="dm-0" ino=9096149 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:336): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvp" dev="dm-0" ino=8785984 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.171:337): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167108 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:338): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167109 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:339): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167110 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:340): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167111 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:341): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167112 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:342): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167113 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:343): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvs.sh" dev="dm-0" ino=13167114 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:344): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=13167115 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.171:345): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvs" dev="dm-0" ino=13167107 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.171:346): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=499341 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:347): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=499347 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:348): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=499358 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:349): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=1125864 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:350): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=1125865 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:351): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=1125866 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:352): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=1125867 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:353): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvtv.sh" dev="dm-0" ino=1125868 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:354): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=1125869 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:355): avc:  denied  { setattr } for  pid=1995 comm="chown" name="tvtv" dev="dm-0" ino=499338 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.173:356): avc:  denied  { setattr } for  pid=1995 comm="chown" name="update.sh" dev="dm-0" ino=13167116 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:357): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=4622387 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.173:358): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=4622388 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:359): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=4622389 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:360): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=4622390 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:361): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=4622391 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:362): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=4622392 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:363): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=4622393 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:364): avc:  denied  { setattr } for  pid=1995 comm="chown" name="url_printer.pl" dev="dm-0" ino=4622394 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:365): avc:  denied  { setattr } for  pid=1995 comm="chown" name="vdf.sh" dev="dm-0" ino=4622395 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:366): avc:  denied  { setattr } for  pid=1995 comm="chown" name="vdf" dev="dm-0" ino=4622386 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.174:367): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=9096151 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:368): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=9096152 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:369): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=9096153 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:370): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=9096154 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.174:371): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=9096155 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:372): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=9096156 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:373): avc:  denied  { setattr } for  pid=1995 comm="chown" name="wpu.sh" dev="dm-0" ino=9096157 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:374): avc:  denied  { setattr } for  pid=1995 comm="chown" name="wpu" dev="dm-0" ino=9096150 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.175:375): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ch_json2xml.pl" dev="dm-0" ino=13167118 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:376): avc:  denied  { setattr } for  pid=1995 comm="chown" name="chlist_printer.pl" dev="dm-0" ino=13167119 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:377): avc:  denied  { setattr } for  pid=1995 comm="chown" name="cid_json.pl" dev="dm-0" ino=13167120 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:378): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_crid.pl" dev="dm-0" ino=13167121 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:379): avc:  denied  { setattr } for  pid=1995 comm="chown" name="compare_menu.pl" dev="dm-0" ino=13167122 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:380): avc:  denied  { setattr } for  pid=1995 comm="chown" name="epg_json2xml.pl" dev="dm-0" ino=13167123 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:381): avc:  denied  { setattr } for  pid=1995 comm="chown" name="save_page.js" dev="dm-0" ino=13167124 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:382): avc:  denied  { setattr } for  pid=1995 comm="chown" name="settings.sh" dev="dm-0" ino=13167125 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:383): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ztt.sh" dev="dm-0" ino=13167126 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=0
                                  type=AVC msg=audit(1583437489.175:384): avc:  denied  { setattr } for  pid=1995 comm="chown" name="ztt" dev="dm-0" ino=13167117 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.176:385): avc:  denied  { setattr } for  pid=1995 comm="chown" name="xml" dev="dm-0" ino=9241691 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.176:386): avc:  denied  { setattr } for  pid=1995 comm="chown" name="combine" dev="dm-0" ino=13726283 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437489.176:387): avc:  denied  { setattr } for  pid=1995 comm="chown" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=0
                                  type=AVC msg=audit(1583437629.934:392): avc:  denied  { write } for  pid=2651 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437629.934:393): avc:  denied  { add_name } for  pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437629.935:394): avc:  denied  { create } for  pid=2651 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437629.937:395): avc:  denied  { write } for  pid=2651 comm="git" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437629.937:396): avc:  denied  { add_name } for  pid=2651 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437629.952:397): avc:  denied  { create } for  pid=2651 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437629.954:398): avc:  denied  { write } for  pid=2651 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=9108398 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437629.962:399): avc:  denied  { remove_name } for  pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437629.962:400): avc:  denied  { rename } for  pid=2651 comm="git" name="HEAD.lock" dev="dm-0" ino=1693069 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437629.963:401): avc:  denied  { setattr } for  pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437629.964:402): avc:  denied  { unlink } for  pid=2651 comm="git" name="config" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437629.965:403): avc:  denied  { create } for  pid=2651 comm="git" name="tfdZp8t" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583437629.965:404): avc:  denied  { unlink } for  pid=2651 comm="git" name="tfdZp8t" dev="dm-0" ino=1693070 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583437632.018:405): avc:  denied  { link } for  pid=2660 comm="git" name="tmp_pack_1aum5K" dev="dm-0" ino=4878847 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437632.032:406): avc:  denied  { append } for  pid=2651 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=5189445 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437632.220:407): avc:  denied  { write } for  pid=2667 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437634.202:408): avc:  denied  { rmdir } for  pid=3204 comm="rm" name="branches" dev="dm-0" ino=4878843 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437634.212:409): avc:  denied  { remove_name } for  pid=3204 comm="rm" name="easyepg" dev="dm-0" ino=12658816 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583437635.115:410): avc:  denied  { setattr } for  pid=3232 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583437635.116:411): avc:  denied  { setattr } for  pid=3232 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438005.400:426): avc:  denied  { write } for  pid=3454 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438005.400:427): avc:  denied  { add_name } for  pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438005.400:428): avc:  denied  { create } for  pid=3454 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438005.402:429): avc:  denied  { write } for  pid=3454 comm="git" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438005.402:430): avc:  denied  { add_name } for  pid=3454 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438005.405:431): avc:  denied  { create } for  pid=3454 comm="git" name="exclude" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438005.405:432): avc:  denied  { write } for  pid=3454 comm="git" path="/easyepg/easyepg/.git/info/exclude" dev="dm-0" ino=4878846 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438005.410:433): avc:  denied  { remove_name } for  pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438005.410:434): avc:  denied  { rename } for  pid=3454 comm="git" name="HEAD.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438005.411:435): avc:  denied  { setattr } for  pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438005.411:436): avc:  denied  { unlink } for  pid=3454 comm="git" name="config" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438005.413:437): avc:  denied  { create } for  pid=3454 comm="git" name="tAU8v6D" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583438005.413:438): avc:  denied  { unlink } for  pid=3454 comm="git" name="tAU8v6D" dev="dm-0" ino=15145096 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583438007.166:439): avc:  denied  { link } for  pid=3463 comm="git" name="tmp_pack_OWZZAV" dev="dm-0" ino=15145098 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438007.185:440): avc:  denied  { create } for  pid=3454 comm="git" name="packed-refs.lock" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438007.186:441): avc:  denied  { write } for  pid=3454 comm="git" path="/easyepg/easyepg/.git/packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438007.188:442): avc:  denied  { rename } for  pid=3454 comm="git" name="packed-refs.new" dev="dm-0" ino=15145102 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438007.189:443): avc:  denied  { unlink } for  pid=3454 comm="git" name="packed-refs.lock" dev="dm-0" ino=15145101 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438007.191:444): avc:  denied  { append } for  pid=3454 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=1693072 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438007.194:445): avc:  denied  { setattr } for  pid=3454 comm="git" name="config.lock" dev="dm-0" ino=15145095 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438007.284:446): avc:  denied  { write } for  pid=3470 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438009.167:447): avc:  denied  { rmdir } for  pid=4007 comm="rm" name="branches" dev="dm-0" ino=1693060 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438009.175:448): avc:  denied  { remove_name } for  pid=4007 comm="rm" name="easyepg" dev="dm-0" ino=8667266 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438009.931:449): avc:  denied  { setattr } for  pid=4042 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438009.931:450): avc:  denied  { setattr } for  pid=4042 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438083.683:452): avc:  denied  { create } for  pid=4211 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438083.684:453): avc:  denied  { write } for  pid=4211 comm="git" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438083.684:454): avc:  denied  { add_name } for  pid=4211 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438083.690:455): avc:  denied  { remove_name } for  pid=4211 comm="git" name="HEAD.lock" dev="dm-0" ino=5189568 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438083.692:456): avc:  denied  { create } for  pid=4211 comm="git" name="tONRGVi" scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583438083.692:457): avc:  denied  { unlink } for  pid=4211 comm="git" name="tONRGVi" dev="dm-0" ino=5189569 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583438085.463:458): avc:  denied  { link } for  pid=4217 comm="git" name="tmp_pack_GtRffg" dev="dm-0" ino=5189571 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438085.539:459): avc:  denied  { write } for  pid=4225 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438087.491:460): avc:  denied  { rmdir } for  pid=4743 comm="rm" name="branches" dev="dm-0" ino=9108396 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438087.500:461): avc:  denied  { write } for  pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438087.500:462): avc:  denied  { remove_name } for  pid=4743 comm="rm" name="easyepg" dev="dm-0" ino=1693058 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438088.387:463): avc:  denied  { setattr } for  pid=4769 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438088.388:464): avc:  denied  { setattr } for  pid=4769 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c35,c445 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438413.905:492): avc:  denied  { write } for  pid=5567 comm="git" name="easyepg" dev="dm-0" ino=13351237 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438413.905:493): avc:  denied  { add_name } for  pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438413.906:494): avc:  denied  { create } for  pid=5567 comm="git" name="easyepg" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438413.906:495): avc:  denied  { write } for  pid=5567 comm="git" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438413.906:496): avc:  denied  { add_name } for  pid=5567 comm="git" name=".git" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438413.916:497): avc:  denied  { create } for  pid=5567 comm="git" name="description" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438413.917:498): avc:  denied  { write } for  pid=5567 comm="git" path="/easyepg/easyepg/.git/description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438413.924:499): avc:  denied  { remove_name } for  pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438413.924:500): avc:  denied  { rename } for  pid=5567 comm="git" name="HEAD.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438413.924:501): avc:  denied  { setattr } for  pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438413.925:502): avc:  denied  { unlink } for  pid=5567 comm="git" name="config" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1type=AVC msg=audit(1583438413.926:503): avc:  denied  { create } for  pid=5567 comm="git" name="tgjDNkv" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583438413.926:504): avc:  denied  { unlink } for  pid=5567 comm="git" name="tgjDNkv" dev="dm-0" ino=14897480 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=lnk_file permissive=1
                                  type=AVC msg=audit(1583438415.493:505): avc:  denied  { link } for  pid=5572 comm="git" name="tmp_pack_uWSQHj" dev="dm-0" ino=14897482 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438415.499:506): avc:  denied  { append } for  pid=5567 comm="git" path="/easyepg/easyepg/.git/logs/refs/remotes/origin/HEAD" dev="dm-0" ino=9140793 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438415.524:507): avc:  denied  { create } for  pid=5567 comm="git" name="ch_json2xml.pl" scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438415.525:508): avc:  denied  { write } for  pid=5567 comm="git" path="/easyepg/easyepg/rdt/ch_json2xml.pl" dev="dm-0" ino=14897492 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438415.542:509): avc:  denied  { rename } for  pid=5567 comm="git" name="index.lock" dev="dm-0" ino=14897479 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438415.715:510): avc:  denied  { write } for  pid=5582 comm="cp" name="epg.sh" dev="dm-0" ino=13726290 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438417.261:511): avc:  denied  { rmdir } for  pid=6119 comm="rm" name="branches" dev="dm-0" ino=1680193 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438417.261:512): avc:  denied  { unlink } for  pid=6119 comm="rm" name="description" dev="dm-0" ino=14897477 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=system_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438417.277:513): avc:  denied  { remove_name } for  pid=6119 comm="rm" name="easyepg" dev="dm-0" ino=9140785 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  type=AVC msg=audit(1583438418.143:514): avc:  denied  { setattr } for  pid=6154 comm="chown" name="FUNDING.yml" dev="dm-0" ino=219726 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=file permissive=1
                                  type=AVC msg=audit(1583438418.143:515): avc:  denied  { setattr } for  pid=6154 comm="chown" name=".github" dev="dm-0" ino=66995 scontext=system_u:system_r:container_t:s0:c415,c791 tcontext=unconfined_u:object_r:bin_t:s0 tclass=dir permissive=1
                                  
                                  1 Reply Last reply Reply Quote 0
                                  • W
                                    Woti
                                    last edited by

                                    By the way: The image from "qoopido" is the one I'm trying to use. It's the same as in the linked tutorial.

                                    podman search easyepg
                                    INDEX       NAME                                DESCRIPTION                                       STARS   OFFICIAL   AUTOMATED
                                    docker.io   docker.io/mod242/easyepg            Docker Image for easyepg                          0
                                    docker.io   docker.io/qoopido/easyepg.minimal   Minimal docker container to run easyepg           1
                                    docker.io   docker.io/takealug/easyepg          A docker container for running easyepg with ...   1
                                    docker.io   docker.io/xuvin/easyepg             easyEPG with Helper Script - Debian Base Ima...   0
                                    docker.io   docker.io/strowi/easyepg            easyepg in a container                            0
                                    
                                    1 Reply Last reply Reply Quote 0
                                    • stacksofplatesS
                                      stacksofplates
                                      last edited by

                                      You can just tell podman to relabel the directory with :Z. For example:

                                      podman run --rm -ti $PWD/mydirectory:/var/lib/something:Z fedora:31 bash
                                      

                                      Now the $PWD/mydirectory has the container_file_t label.

                                      1 Reply Last reply Reply Quote 1
                                      • W
                                        Woti
                                        last edited by

                                        This is the initial setup:

                                        docker start easyepg.admin
                                        docker exec -ti -u easyepg -w /easyepg easyepg.admin /bin/bash ./epg.sh
                                        

                                        How to use the :Z option here? I read about it a lot but didn't get it to work.
                                        After starting "docker/podman start easyepg.admin" I get those SELinux errors.

                                        The one and only reason why I want to try easyepg with docker / podman is because I overwrote my entire filesystem (there's a thread about this) after following this tutorial https://github.com/sunsettrack4/easyepg

                                        # Setup to run the script daily at 3 AM
                                        0 3 * * * cd ~/easyepg && bash epg.sh
                                        

                                        This crontab entry is not working for me.
                                        When I move manually to the easyepg directory and issue ./epg.sh the script is working fine.

                                        1 Reply Last reply Reply Quote 0
                                        • stacksofplatesS
                                          stacksofplates
                                          last edited by

                                          You would have to use it with the qoopido image.

                                          Just start that image like a normal container and don't use that install script.

                                          If you use that install script you have to manually set the SELinux context for the data directory.

                                          W 1 Reply Last reply Reply Quote 0
                                          • W
                                            Woti @stacksofplates
                                            last edited by

                                            @stacksofplates Okay. I'll try that way. I didn't tried that way yet.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post