Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1482390 Details for
Bug 1627114
sbd is unable to list watchdogs with selinux enabled
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
avcs in permissive mode as a reply to comment #22
avc_permissive.txt (text/plain), 19.64 KB, created by
Klaus Wenninger
on 2018-09-11 14:53:48 UTC
(
hide
)
Description:
avcs in permissive mode as a reply to comment #22
Filename:
MIME Type:
Creator:
Klaus Wenninger
Created:
2018-09-11 14:53:48 UTC
Size:
19.64 KB
patch
obsolete
>---- >type=USER_AVC msg=audit(09/11/2018 16:50:31.646:215) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received setenforce notice (enforcing=0) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?' >---- >type=USER_AVC msg=audit(09/11/2018 16:50:31.646:216) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=5) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?' >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.811:217) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.811:217) : arch=x86_64 syscall=openat success=yes exit=4 a0=0xffffffffffffff9c a1=0x40f2b8 a2=O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC a3=0x0 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.811:217) : avc: denied { read } for pid=3227 comm=sbd name=watchdog dev="sysfs" ino=3103 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.811:218) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.811:218) : arch=x86_64 syscall=open success=yes exit=5 a0=0x7fff30f1f250 a1=O_RDONLY a2=0x1b6 a3=0x24 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.811:218) : avc: denied { open } for pid=3227 comm=sbd path=/sys/devices/virtual/watchdog/watchdog1/dev dev="sysfs" ino=14027 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file >type=AVC msg=audit(09/11/2018 16:50:31.811:218) : avc: denied { read } for pid=3227 comm=sbd name=dev dev="sysfs" ino=14027 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file >type=AVC msg=audit(09/11/2018 16:50:31.811:218) : avc: denied { read } for pid=3227 comm=sbd name=watchdog1 dev="sysfs" ino=14030 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.811:219) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.811:219) : arch=x86_64 syscall=fstat success=yes exit=0 a0=0x5 a1=0x7fff30f1e950 a2=0x7fff30f1e950 a3=0x7fff30f1e8a0 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.811:219) : avc: denied { getattr } for pid=3227 comm=sbd path=/sys/devices/virtual/watchdog/watchdog1/dev dev="sysfs" ino=14027 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.811:220) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.811:220) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.811:220) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/vcsa6 dev="devtmpfs" ino=16418 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.811:221) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.811:221) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.811:221) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/kvm dev="devtmpfs" ino=13490 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:kvm_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.811:222) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.811:222) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.811:222) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/fb0 dev="devtmpfs" ino=13481 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:framebuf_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.812:223) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.812:223) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.812:223) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/btrfs-control dev="devtmpfs" ino=11932 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.812:224) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.812:224) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.812:224) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/vhci dev="devtmpfs" ino=11931 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:vhost_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.812:225) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.812:225) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.812:225) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/ppp dev="devtmpfs" ino=11930 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:ppp_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.812:226) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.812:226) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.812:226) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/fuse dev="devtmpfs" ino=11929 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:fuse_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.812:227) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.812:227) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.812:227) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/uinput dev="devtmpfs" ino=11925 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:event_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.812:228) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.812:228) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.812:228) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/uhid dev="devtmpfs" ino=11921 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:uhid_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.812:229) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.812:229) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.812:229) : avc: denied { getattr } for pid=3227 comm=sbd path=/run/systemd/initctl/fifo dev="tmpfs" ino=11536 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:initctl_t:s0 tclass=fifo_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:230) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:230) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:230) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/hidraw0 dev="devtmpfs" ino=8727 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:231) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:231) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:231) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/rtc0 dev="devtmpfs" ino=5967 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:clock_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:232) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:232) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:232) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/loop-control dev="devtmpfs" ino=7460 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:loop_control_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:233) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:233) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:233) : avc: denied { getattr } for pid=3227 comm=sbd path=/proc/kcore dev="proc" ino=4026532033 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:proc_kcore_t:s0 tclass=file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:234) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:234) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:234) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/network_throughput dev="devtmpfs" ino=5972 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:netcontrol_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:235) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:235) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:235) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/mcelog dev="devtmpfs" ino=5968 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:kmsg_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:236) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:236) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:236) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/usbmon1 dev="devtmpfs" ino=6870 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:237) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:237) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:237) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/crash dev="devtmpfs" ino=6858 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:crash_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:238) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:238) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:238) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/nvram dev="devtmpfs" ino=6856 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:nvram_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:239) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:239) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:239) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/ptmx dev="devtmpfs" ino=6848 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:240) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:240) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:240) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/autofs dev="devtmpfs" ino=6845 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.813:241) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.813:241) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.813:241) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/snapshot dev="devtmpfs" ino=6825 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:apm_bios_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.814:242) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.814:242) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.814:242) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/oldmem dev="devtmpfs" ino=1035 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:50:31.814:243) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:50:31.814:243) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7fff30f1f250 a1=0x7fff30f1eeb0 a2=0x7fff30f1eeb0 a3=0x2 items=0 ppid=3224 pid=3227 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:50:31.814:243) : avc: denied { getattr } for pid=3227 comm=sbd path=/dev/vga_arbiter dev="devtmpfs" ino=1026 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1627114
:
1482348
|
1482349
| 1482390 |
1482391