Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 620239 Details for
Bug 862229
cannot run kgpg probably due to selinux restrictions
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
avcs in permissive mode
kgpg.avc.log (text/plain), 15.75 KB, created by
Petr Lautrbach
on 2012-10-02 11:04:11 UTC
(
hide
)
Description:
avcs in permissive mode
Filename:
MIME Type:
Creator:
Petr Lautrbach
Created:
2012-10-02 11:04:11 UTC
Size:
15.75 KB
patch
obsolete
>---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.532:1717): arch=c000003e syscall=42 success=yes exit=0 a0=5 a1=7fff90fef960 a2=17 a3=0 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.532:1717): avc: denied { connectto } for pid=6118 comm="kgpg" path=002F746D702F646275732D73447035434A6F4D354C scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_dbusd_t:s0-s0:c0.c1023 tclass=unix_stream_socket >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.542:1718): arch=c000003e syscall=42 success=yes exit=0 a0=3 a1=7fff90fefbc0 a2=14 a3=7fff90fefbc3 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.542:1718): avc: denied { connectto } for pid=6118 comm="kgpg" path=002F746D702F2E5831312D756E69782F5830 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=unix_stream_socket >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.619:1719): arch=c000003e syscall=21 success=yes exit=0 a0=18d94c8 a1=2 a2=18d9401 a3=2 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.619:1719): avc: denied { write } for pid=6118 comm="kgpg" name="kgpgrc" dev="dm-4" ino=7341579 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.645:1720): arch=c000003e syscall=2 success=yes exit=7 a0=18eb0e0 a1=0 a2=7fff90fef530 a3=10 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.645:1720): avc: denied { read } for pid=6118 comm="kgpg" name="fonts" dev="dm-1" ino=131083 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dir >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.645:1721): arch=c000003e syscall=2 success=yes exit=7 a0=18e7aa0 a1=0 a2=31e0b474f2 a3=44 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.645:1721): avc: denied { open } for pid=6118 comm="kgpg" path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="dm-1" ino=787530 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >type=AVC msg=audit(1349174991.645:1721): avc: denied { read } for pid=6118 comm="kgpg" name="3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="dm-1" ino=787530 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.646:1722): arch=c000003e syscall=5 success=yes exit=0 a0=7 a1=7fff90fef4a0 a2=7fff90fef4a0 a3=44 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.646:1722): avc: denied { getattr } for pid=6118 comm="kgpg" path="/var/cache/fontconfig/3830d5c3ddfd5cd38a049b759396e72e-le64.cache-3" dev="dm-1" ino=787530 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_cache_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.705:1723): arch=c000003e syscall=21 success=yes exit=0 a0=1969638 a1=2 a2=1969601 a3=2 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.705:1723): avc: denied { write } for pid=6118 comm="kgpg" name="config" dev="dm-4" ino=7340382 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=dir >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.708:1724): arch=c000003e syscall=4 success=yes exit=0 a0=198f618 a1=7fff90fee680 a2=7fff90fee680 a3=2 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.708:1724): avc: denied { getattr } for pid=6118 comm="kgpg" path="/usr/share/config/kdebugrc" dev="dm-1" ino=539622 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.709:1725): arch=c000003e syscall=2 success=yes exit=8 a0=1966bf8 a1=80000 a2=1b6 a3=2 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.709:1725): avc: denied { open } for pid=6118 comm="kgpg" path="/usr/share/config/kdebugrc" dev="dm-1" ino=539622 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >type=AVC msg=audit(1349174991.709:1725): avc: denied { read } for pid=6118 comm="kgpg" name="kdebugrc" dev="dm-1" ino=539622 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:config_usr_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.731:1726): arch=c000003e syscall=21 success=yes exit=0 a0=1955890 a1=4 a2=797469726f6874 a3=19 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.731:1726): avc: denied { read } for pid=6118 comm="kgpg" name=".ICEauthority" dev="dm-4" ino=7340167 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.732:1727): arch=c000003e syscall=2 success=yes exit=9 a0=1955890 a1=0 a2=1b6 a3=238 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.732:1727): avc: denied { open } for pid=6118 comm="kgpg" path="/home/bach/.ICEauthority" dev="dm-4" ino=7340167 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.732:1728): arch=c000003e syscall=5 success=yes exit=0 a0=9 a1=7fff90fef6d0 a2=7fff90fef6d0 a3=238 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.732:1728): avc: denied { getattr } for pid=6118 comm="kgpg" path="/home/bach/.ICEauthority" dev="dm-4" ino=7340167 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:iceauth_home_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:51 2012 >type=SYSCALL msg=audit(1349174991.903:1729): arch=c000003e syscall=59 success=yes exit=0 a0=7fff90fee9d2 a1=1a114a0 a2=19f3340 a3=8 items=0 ppid=6118 pid=6133 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="gpg" exe="/usr/bin/gpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174991.903:1729): avc: denied { execute_no_trans } for pid=6133 comm="kgpg" path="/usr/bin/gpg" dev="dm-1" ino=200605 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:gpg_exec_t:s0 tclass=file >---- >time->Tue Oct 2 12:49:52 2012 >type=SYSCALL msg=audit(1349174992.045:1730): arch=c000003e syscall=6 success=yes exit=0 a0=1a85688 a1=7fff90fed690 a2=7fff90fed690 a3=7d items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174992.045:1730): avc: denied { getattr } for pid=6118 comm="kgpg" path="/usr/share/fonts/DejaVuSans.ttf" dev="dm-1" ino=144874 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=lnk_file >---- >time->Tue Oct 2 12:49:52 2012 >type=SYSCALL msg=audit(1349174992.045:1731): arch=c000003e syscall=4 success=yes exit=0 a0=1a85688 a1=7fff90fed690 a2=7fff90fed690 a3=7d items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174992.045:1731): avc: denied { getattr } for pid=6118 comm="kgpg" path="/usr/share/fonts/dejavu/DejaVuSans.ttf" dev="dm-1" ino=201534 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=file >type=AVC msg=audit(1349174992.045:1731): avc: denied { read } for pid=6118 comm="kgpg" name="DejaVuSans.ttf" dev="dm-1" ino=144874 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=lnk_file >---- >time->Tue Oct 2 12:49:52 2012 >type=SYSCALL msg=audit(1349174992.046:1732): arch=c000003e syscall=2 success=yes exit=9 a0=1a84038 a1=0 a2=0 a3=50 items=0 ppid=6117 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349174992.046:1732): avc: denied { open } for pid=6118 comm="kgpg" path="/usr/share/fonts/dejavu/DejaVuSans.ttf" dev="dm-1" ino=201534 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=file >type=AVC msg=audit(1349174992.046:1732): avc: denied { read } for pid=6118 comm="kgpg" name="DejaVuSans.ttf" dev="dm-1" ino=201534 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=file >---- >time->Tue Oct 2 12:51:49 2012 >type=SYSCALL msg=audit(1349175109.686:1734): arch=c000003e syscall=30 success=yes exit=140301178658816 a0=778062 a1=0 a2=0 a3=88 items=0 ppid=1 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349175109.686:1734): avc: denied { read write } for pid=6118 comm="kgpg" path=2F535953563030303030303030202864656C6574656429 dev="tmpfs" ino=7831650 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:tmpfs_t:s0 tclass=file >type=AVC msg=audit(1349175109.686:1734): avc: denied { read write } for pid=6118 comm="kgpg" key=0 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tclass=shm >type=AVC msg=audit(1349175109.686:1734): avc: denied { unix_read unix_write } for pid=6118 comm="kgpg" key=0 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tclass=shm >---- >time->Tue Oct 2 12:51:49 2012 >type=SYSCALL msg=audit(1349175109.692:1735): arch=c000003e syscall=31 success=yes exit=0 a0=778062 a1=0 a2=0 a3=0 items=0 ppid=1 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349175109.692:1735): avc: denied { destroy } for pid=6118 comm="kgpg" key=0 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tclass=shm >---- >time->Tue Oct 2 12:51:50 2012 >type=SYSCALL msg=audit(1349175110.321:1736): arch=c000003e syscall=2 success=yes exit=10 a0=1d83268 a1=c1 a2=1a4 a3=98 items=0 ppid=1 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349175110.321:1736): avc: denied { write } for pid=6118 comm="kgpg" path="/home/bach/.kde/share/config/kgpgrc.lock" dev="dm-4" ino=7342586 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1349175110.321:1736): avc: denied { create } for pid=6118 comm="kgpg" name="kgpgrc.lock" scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1349175110.321:1736): avc: denied { add_name } for pid=6118 comm="kgpg" name="kgpgrc.lock" scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=dir >type=AVC msg=audit(1349175110.321:1736): avc: denied { write } for pid=6118 comm="kgpg" name="config" dev="dm-4" ino=7340382 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=dir >---- >time->Tue Oct 2 12:51:50 2012 >type=SYSCALL msg=audit(1349175110.325:1737): arch=c000003e syscall=93 success=yes exit=0 a0=c a1=1f4 a2=1f5 a3=89 items=0 ppid=1 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349175110.325:1737): avc: denied { setattr } for pid=6118 comm="kgpg" name="kgpgrcTT6118.new" dev="dm-4" ino=7342850 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=file >---- >time->Tue Oct 2 12:51:50 2012 >type=SYSCALL msg=audit(1349175110.327:1738): arch=c000003e syscall=82 success=yes exit=0 a0=1d81d38 a1=1d7f8e8 a2=1d81d38 a3=a7 items=0 ppid=1 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349175110.327:1738): avc: denied { unlink } for pid=6118 comm="kgpg" name="kgpgrc" dev="dm-4" ino=7341579 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1349175110.327:1738): avc: denied { rename } for pid=6118 comm="kgpg" name="kgpgrcTT6118.new" dev="dm-4" ino=7342850 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=file >type=AVC msg=audit(1349175110.327:1738): avc: denied { remove_name } for pid=6118 comm="kgpg" name="kgpgrcTT6118.new" dev="dm-4" ino=7342850 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:config_home_t:s0 tclass=dir >---- >time->Tue Oct 2 12:51:49 2012 >type=SYSCALL msg=audit(1349175109.682:1733): arch=c000003e syscall=29 success=yes exit=7831650 a0=0 a1=3c1b88 a2=3ff a3=88 items=0 ppid=1 pid=6118 auid=500 uid=500 gid=501 euid=500 suid=500 fsuid=500 egid=501 sgid=501 fsgid=501 tty=(none) ses=10 comm="kgpg" exe="/usr/bin/kgpg" subj=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 key=(null) >type=AVC msg=audit(1349175109.682:1733): avc: denied { create } for pid=6118 comm="kgpg" key=0 scontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:gpg_t:s0-s0:c0.c1023 tclass=shm
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 862229
: 620239