Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 591114 Details for
Bug 831070
The default selinux policy in fedora 17 prevents staff_u from configuring printers
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
raw avc denials
avc.txt (text/plain), 19.93 KB, created by
bodhi.zazen
on 2012-06-12 06:49:18 UTC
(
hide
)
Description:
raw avc denials
Filename:
MIME Type:
Creator:
bodhi.zazen
Created:
2012-06-12 06:49:18 UTC
Size:
19.93 KB
patch
obsolete
>type=AVC msg=audit(1339482395.836:215): avc: denied { read write } for pid=1756 comm="xauth" path="socket:[38654]" dev="sockfs" ino=38654 scontext=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=unix_stream_socket >type=AVC msg=audit(1339482395.836:215): avc: denied { rlimitinh } for pid=1756 comm="xauth" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 tclass=process >type=AVC msg=audit(1339482395.836:215): avc: denied { siginh } for pid=1756 comm="xauth" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 tclass=process >type=AVC msg=audit(1339482395.836:215): avc: denied { noatsecure } for pid=1756 comm="xauth" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 tclass=process >type=SYSCALL msg=audit(1339482395.836:215): arch=c000003e syscall=59 success=yes exit=0 a0=7fff8615bf79 a1=8947e0 a2=88a590 a3=8 items=0 ppid=1754 pid=1756 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482395.839:216): avc: denied { read } for pid=1756 comm="xauth" name="8:21" dev="sysfs" ino=12936 scontext=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file >type=SYSCALL msg=audit(1339482395.839:216): arch=c000003e syscall=89 success=yes exit=83 a0=7fffa45bf050 a1=7fffa45bf5b0 a2=1000 a3=3ca9576eb1 items=0 ppid=1754 pid=1756 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482395.840:217): avc: denied { getattr } for pid=1754 comm="kdesu" path="/usr/bin/su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=SYSCALL msg=audit(1339482395.840:217): arch=c000003e syscall=4 success=yes exit=0 a0=896878 a1=7fff8615c150 a2=7fff8615c150 a3=41 items=0 ppid=1 pid=1754 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm="kdesu" exe="/usr/libexec/kde4/kdesu" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482395.840:218): avc: denied { execute } for pid=1754 comm="kdesu" name="su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=SYSCALL msg=audit(1339482395.840:218): arch=c000003e syscall=21 success=yes exit=0 a0=896878 a1=1 a2=100 a3=41 items=0 ppid=1 pid=1754 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm="kdesu" exe="/usr/libexec/kde4/kdesu" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482395.846:219): avc: denied { read open } for pid=1757 comm="kdesu" name="su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=AVC msg=audit(1339482395.846:219): avc: denied { execute_no_trans } for pid=1757 comm="kdesu" path="/usr/bin/su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=SYSCALL msg=audit(1339482395.846:219): arch=c000003e syscall=59 success=yes exit=0 a0=87c1d8 a1=892020 a2=88a590 a3=30 items=0 ppid=1754 pid=1757 auid=1000 uid=1000 gid=1000 euid=0 suid=0 fsuid=0 egid=1000 sgid=1000 fsgid=1000 tty=pts3 ses=1 comm="su" exe="/usr/bin/su" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482395.872:220): avc: denied { rlimitinh } for pid=1759 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process >type=AVC msg=audit(1339482395.872:220): avc: denied { siginh } for pid=1759 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process >type=AVC msg=audit(1339482395.872:220): avc: denied { noatsecure } for pid=1759 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process >type=SYSCALL msg=audit(1339482395.872:220): arch=c000003e syscall=59 success=yes exit=0 a0=212b850 a1=212b770 a2=212a010 a3=15 items=0 ppid=1758 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="fprintd" exe="/usr/libexec/fprintd" subj=system_u:system_r:fprintd_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482395.902:221): avc: denied { read write } for pid=1762 comm="unix_chkpwd" name="3" dev="devpts" ino=6 scontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:user_devpts_t:s0 tclass=chr_file >type=AVC msg=audit(1339482395.902:221): avc: denied { rlimitinh } for pid=1762 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process >type=AVC msg=audit(1339482395.902:221): avc: denied { siginh } for pid=1762 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process >type=AVC msg=audit(1339482395.902:221): avc: denied { noatsecure } for pid=1762 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process >type=SYSCALL msg=audit(1339482395.902:221): arch=c000003e syscall=59 success=yes exit=0 a0=7f24c7059bf8 a1=7fff508d5040 a2=7f24c7260368 a3=7 items=0 ppid=1757 pid=1762 auid=1000 uid=0 gid=1000 euid=0 suid=0 fsuid=0 egid=1000 sgid=1000 fsgid=1000 tty=pts3 ses=1 comm="unix_chkpwd" exe="/usr/sbin/unix_chkpwd" subj=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.121:222): avc: denied { getattr } for pid=1754 comm="kdesu" path="/usr/bin/su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.121:222): arch=c000003e syscall=4 success=yes exit=0 a0=8a77c8 a1=7fff8615b590 a2=7fff8615b590 a3=41 items=0 ppid=1 pid=1754 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm="kdesu" exe="/usr/libexec/kde4/kdesu" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.121:223): avc: denied { execute } for pid=1754 comm="kdesu" name="su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.121:223): arch=c000003e syscall=21 success=yes exit=0 a0=8a77c8 a1=1 a2=100 a3=41 items=0 ppid=1 pid=1754 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm="kdesu" exe="/usr/libexec/kde4/kdesu" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.124:224): avc: denied { read open } for pid=1786 comm="kdesu" name="su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=AVC msg=audit(1339482401.124:224): avc: denied { execute_no_trans } for pid=1786 comm="kdesu" path="/usr/bin/su" dev="sdb5" ino=16151 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:su_exec_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.124:224): arch=c000003e syscall=59 success=yes exit=0 a0=8a7758 a1=8a76e0 a2=88a590 a3=30 items=0 ppid=1754 pid=1786 auid=1000 uid=1000 gid=1000 euid=0 suid=0 fsuid=0 egid=1000 sgid=1000 fsgid=1000 tty=pts5 ses=1 comm="su" exe="/usr/bin/su" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=USER_AUTH msg=audit(1339482401.294:225): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:authentication acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=USER_ACCT msg=audit(1339482401.299:226): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:accounting acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=CRED_ACQ msg=audit(1339482401.300:227): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=AVC msg=audit(1339482401.307:228): avc: denied { write } for pid=1786 comm="su" path="/run/systemd/sessions/1.ref" dev="tmpfs" ino=16477 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >type=SYSCALL msg=audit(1339482401.307:228): arch=c000003e syscall=47 success=yes exit=168 a0=5 a1=7fff14d54e50 a2=40000000 a3=0 items=0 ppid=1754 pid=1786 auid=1000 uid=1000 gid=1000 euid=0 suid=0 fsuid=0 egid=1000 sgid=1000 fsgid=1000 tty=pts5 ses=1 comm="su" exe="/usr/bin/su" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.312:229): avc: denied { read } for pid=1794 comm="xauth" name="8:21" dev="sysfs" ino=12936 scontext=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file >type=SYSCALL msg=audit(1339482401.312:229): arch=c000003e syscall=89 success=yes exit=83 a0=7fff039fddc0 a1=7fff039fe320 a2=1000 a3=3ca9576eb1 items=0 ppid=1786 pid=1794 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=pts5 ses=1 comm="xauth" exe="/usr/bin/xauth" subj=staff_u:staff_r:xauth_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.349:230): avc: denied { dac_override } for pid=1786 comm="su" capability=1 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=capability >type=SYSCALL msg=audit(1339482401.349:230): arch=c000003e syscall=2 success=yes exit=7 a0=7eff49e3936b a1=c2 a2=180 a3=7b80cb7d2 items=0 ppid=1754 pid=1786 auid=1000 uid=1000 gid=1000 euid=0 suid=0 fsuid=0 egid=1000 sgid=1000 fsgid=1000 tty=pts5 ses=1 comm="su" exe="/usr/bin/su" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=USER_START msg=audit(1339482401.354:231): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_open acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=USER_END msg=audit(1339482401.362:232): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_close acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=CRED_DISP msg=audit(1339482401.363:233): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=USER_AUTH msg=audit(1339482401.573:234): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:authentication acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=USER_ACCT msg=audit(1339482401.579:235): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:accounting acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=CRED_ACQ msg=audit(1339482401.580:236): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=AVC msg=audit(1339482401.585:237): avc: denied { write } for pid=1800 comm="su" path="/run/systemd/sessions/1.ref" dev="tmpfs" ino=16477 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >type=SYSCALL msg=audit(1339482401.585:237): arch=c000003e syscall=47 success=yes exit=168 a0=5 a1=7fff5bdd0320 a2=40000000 a3=0 items=0 ppid=1754 pid=1800 auid=1000 uid=1000 gid=1000 euid=0 suid=0 fsuid=0 egid=1000 sgid=1000 fsgid=1000 tty=pts5 ses=1 comm="su" exe="/usr/bin/su" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=USER_START msg=audit(1339482401.631:238): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_open acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=AVC msg=audit(1339482401.668:239): avc: denied { read } for pid=1811 comm="kcmshell4" name="xauth.XXXX92C1yJ" dev="sdb5" ino=16144 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:xauth_tmp_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.668:239): arch=c000003e syscall=21 success=yes exit=0 a0=7fffbd364fcf a1=4 a2=3 a3=ffffffffffffffdb items=0 ppid=1808 pid=1811 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="kcmshell4" exe="/usr/bin/kcmshell4" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.668:240): avc: denied { open } for pid=1811 comm="kcmshell4" name="xauth.XXXX92C1yJ" dev="sdb5" ino=16144 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:xauth_tmp_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.668:240): arch=c000003e syscall=2 success=yes exit=7 a0=7fffbd364fcf a1=0 a2=1b6 a3=238 items=0 ppid=1808 pid=1811 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="kcmshell4" exe="/usr/bin/kcmshell4" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.669:241): avc: denied { getattr } for pid=1811 comm="kcmshell4" path="/tmp/xauth.XXXX92C1yJ" dev="sdb5" ino=16144 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:xauth_tmp_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.669:241): arch=c000003e syscall=5 success=yes exit=0 a0=7 a1=7fffbd362920 a2=7fffbd362920 a3=238 items=0 ppid=1808 pid=1811 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="kcmshell4" exe="/usr/bin/kcmshell4" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.908:242): avc: denied { write } for pid=1811 comm="kcmshell4" name="index.theme" dev="sdb5" ino=15465 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.908:242): arch=c000003e syscall=21 success=yes exit=0 a0=20029d8 a1=2 a2=2002901 a3=2 items=0 ppid=1808 pid=1811 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="kcmshell4" exe="/usr/bin/kcmshell4" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482401.987:243): avc: denied { write } for pid=1811 comm="kcmshell4" name="entry.desktop" dev="sdb5" ino=155300 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:locale_t:s0 tclass=file >type=SYSCALL msg=audit(1339482401.987:243): arch=c000003e syscall=21 success=yes exit=0 a0=207b6c8 a1=2 a2=207b601 a3=2 items=0 ppid=1808 pid=1811 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="kcmshell4" exe="/usr/bin/kcmshell4" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482405.927:244): avc: denied { unlink } for pid=1808 comm="kdesu_stub" name="xauth.XXXX92C1yJ" dev="sdb5" ino=16144 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:xauth_tmp_t:s0 tclass=file >type=SYSCALL msg=audit(1339482405.927:244): arch=c000003e syscall=87 success=yes exit=0 a0=7fff2389bb70 a1=7fff2389bb6c a2=ffffffffffffff80 a3=0 items=0 ppid=1800 pid=1808 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts5 ses=1 comm="kdesu_stub" exe="/usr/libexec/kde4/kdesu_stub" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=USER_END msg=audit(1339482405.934:245): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_close acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=CRED_DISP msg=audit(1339482405.934:246): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/5 res=success' >type=USER_AUTH msg=audit(1339482954.267:283): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:authentication acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=USER_ACCT msg=audit(1339482954.272:284): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:accounting acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=CRED_ACQ msg=audit(1339482954.273:285): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=USER_START msg=audit(1339482954.318:286): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_open acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=USER_END msg=audit(1339482954.324:287): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_close acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=CRED_DISP msg=audit(1339482954.325:288): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=USER_AUTH msg=audit(1339482954.533:289): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:authentication acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=USER_ACCT msg=audit(1339482954.539:290): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:accounting acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=CRED_ACQ msg=audit(1339482954.540:291): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=USER_START msg=audit(1339482954.587:292): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_open acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=AVC msg=audit(1339482958.379:293): avc: denied { read } for pid=2170 comm="kcmshell4" name="0" dev="tmpfs" ino=100908 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file >type=AVC msg=audit(1339482958.379:293): avc: denied { open } for pid=2170 comm="kcmshell4" name="0" dev="tmpfs" ino=100908 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file >type=SYSCALL msg=audit(1339482958.379:293): arch=c000003e syscall=2 success=yes exit=14 a0=7fff92d377d0 a1=0 a2=1b6 a3=238 items=0 ppid=2167 pid=2170 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="kcmshell4" exe="/usr/bin/kcmshell4" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1339482958.379:294): avc: denied { getattr } for pid=2170 comm="kcmshell4" path="/run/cups/certs/0" dev="tmpfs" ino=100908 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_var_run_t:s0 tclass=file >type=SYSCALL msg=audit(1339482958.379:294): arch=c000003e syscall=5 success=yes exit=0 a0=e a1=7fff92d37000 a2=7fff92d37000 a3=0 items=0 ppid=2167 pid=2170 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="kcmshell4" exe="/usr/bin/kcmshell4" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >type=USER_END msg=audit(1339482986.766:295): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:session_close acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >type=CRED_DISP msg=audit(1339482986.768:296): pid=0 uid=0 auid=1000 ses=1 subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="root" exe="/usr/bin/su" hostname=? addr=? terminal=pts/6 res=success' >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 831070
: 591114