Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 1482391 Details for
Bug 1627114
sbd is unable to list watchdogs with selinux enabled
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
ausearch output requested in comment 17
avc_comment17.txt (text/plain), 18.98 KB, created by
Tomas Jelinek
on 2018-09-11 14:56:30 UTC
(
hide
)
Description:
ausearch output requested in comment 17
Filename:
MIME Type:
Creator:
Tomas Jelinek
Created:
2018-09-11 14:56:30 UTC
Size:
18.98 KB
patch
obsolete
>---- >type=USER_AVC msg=audit(09/11/2018 16:45:57.710:108) : pid=503 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=2) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' >---- >type=USER_AVC msg=audit(09/11/2018 16:46:01.026:110) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=2) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?' >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.201:111) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.201:111) : arch=x86_64 syscall=openat success=yes exit=4 a0=0xffffffffffffff9c a1=0x40d244 a2=O_RDONLY|O_NONBLOCK|O_DIRECTORY|O_CLOEXEC a3=0x0 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.201:111) : avc: denied { read } for pid=1306 comm=sbd name=watchdog dev="sysfs" ino=2968 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.201:112) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.201:112) : arch=x86_64 syscall=open success=yes exit=5 a0=0x7ffe8a078060 a1=O_RDONLY a2=0x1b6 a3=0x24 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.201:112) : avc: denied { open } for pid=1306 comm=sbd path=/sys/devices/virtual/watchdog/watchdog1/dev dev="sysfs" ino=13709 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file >type=AVC msg=audit(09/11/2018 16:46:01.201:112) : avc: denied { read } for pid=1306 comm=sbd name=dev dev="sysfs" ino=13709 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file >type=AVC msg=audit(09/11/2018 16:46:01.201:112) : avc: denied { read } for pid=1306 comm=sbd name=watchdog1 dev="sysfs" ino=13712 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.202:113) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.202:113) : arch=x86_64 syscall=fstat success=yes exit=0 a0=0x5 a1=0x7ffe8a077860 a2=0x7ffe8a077860 a3=0x7ffe8a0777a0 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.202:113) : avc: denied { getattr } for pid=1306 comm=sbd path=/sys/devices/virtual/watchdog/watchdog1/dev dev="sysfs" ino=13709 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.202:114) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.202:114) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.202:114) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/sr0 dev="devtmpfs" ino=8009 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:removable_device_t:s0 tclass=blk_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.202:115) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.202:115) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.202:115) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/sg0 dev="devtmpfs" ino=11216 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.202:116) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.202:116) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.202:116) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/fuse dev="devtmpfs" ino=11340 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:fuse_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.202:117) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.202:117) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.202:117) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/uhid dev="devtmpfs" ino=11339 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:uhid_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.202:118) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.202:118) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.202:118) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/ppp dev="devtmpfs" ino=11337 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:ppp_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.202:119) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.202:119) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.202:119) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/vhost-net dev="devtmpfs" ino=11336 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:vhost_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:120) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:120) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:120) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/btrfs-control dev="devtmpfs" ino=11335 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:121) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:121) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:121) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/uinput dev="devtmpfs" ino=11332 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:event_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:122) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:122) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:122) : avc: denied { getattr } for pid=1306 comm=sbd path=/run/systemd/initctl/fifo dev="tmpfs" ino=10542 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:initctl_t:s0 tclass=fifo_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:123) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:123) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:123) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/fb0 dev="devtmpfs" ino=8854 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:framebuf_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:124) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:124) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:124) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/rtc0 dev="devtmpfs" ino=6896 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:clock_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:125) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:125) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:125) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/loop-control dev="devtmpfs" ino=7349 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:loop_control_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:126) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:126) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:126) : avc: denied { getattr } for pid=1306 comm=sbd path=/proc/kcore dev="proc" ino=4026532033 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:proc_kcore_t:s0 tclass=file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:127) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:127) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:127) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/network_throughput dev="devtmpfs" ino=6901 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:netcontrol_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:128) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:128) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:128) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/mcelog dev="devtmpfs" ino=6897 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:kmsg_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.203:129) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.203:129) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.203:129) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/usbmon4 dev="devtmpfs" ino=6884 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.204:130) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.204:130) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.204:130) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/crash dev="devtmpfs" ino=6845 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:crash_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.204:131) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.204:131) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.204:131) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/nvram dev="devtmpfs" ino=6843 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:nvram_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.204:132) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.204:132) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.204:132) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/ptmx dev="devtmpfs" ino=6835 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.204:133) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.204:133) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.204:133) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/autofs dev="devtmpfs" ino=6832 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.204:134) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.204:134) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.204:134) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/snapshot dev="devtmpfs" ino=6813 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:apm_bios_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.204:135) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.204:135) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.204:135) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/oldmem dev="devtmpfs" ino=1035 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file >---- >type=PROCTITLE msg=audit(09/11/2018 16:46:01.204:136) : proctitle=/usr/sbin/sbd query-watchdog >type=SYSCALL msg=audit(09/11/2018 16:46:01.204:136) : arch=x86_64 syscall=stat success=yes exit=0 a0=0x7ffe8a078060 a1=0x7ffe8a077dc0 a2=0x7ffe8a077dc0 a3=0x2 items=0 ppid=1303 pid=1306 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sbd exe=/usr/sbin/sbd subj=system_u:system_r:sbd_t:s0 key=(null) >type=AVC msg=audit(09/11/2018 16:46:01.204:136) : avc: denied { getattr } for pid=1306 comm=sbd path=/dev/vga_arbiter dev="devtmpfs" ino=1026 scontext=system_u:system_r:sbd_t:s0 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1627114
:
1482348
|
1482349
|
1482390
| 1482391