Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 858434 Details for
Bug 1060648
[abrt] snapper: DBus::Connection::request_name(): snapperd killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: var_log_messages
var_log_messages (text/plain), 38.96 KB, created by
Will Tisdale
on 2014-02-03 07:33:25 UTC
(
hide
)
Description:
File: var_log_messages
Filename:
MIME Type:
Creator:
Will Tisdale
Created:
2014-02-03 07:33:25 UTC
Size:
38.96 KB
patch
obsolete
>[System Logs]: > If you want to allow snapperd to have read access on the Torrents directory > If you believe that snapperd should be allowed read access on the Torrents directory by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:15 Aeolus.local setroubleshoot[6414]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:15 Aeolus.local python[6414]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:16 Aeolus.local setroubleshoot[6414]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:16 Aeolus.local python[6414]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:16 Aeolus.local setroubleshoot[6414]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:16 Aeolus.local python[6414]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390593692.681:991): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:991): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390593692.681:991): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:991): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390593692.681:992): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:992): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390593692.681:992): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:992): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390593692.681:993): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:993): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390593692.681:993): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:993): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390593692.681:994): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:994): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390593692.681:994): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:994): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390593692.681:995): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:995): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390593692.681:995): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390593692.681:995): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:34 Aeolus.local python[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:34 Aeolus.local setroubleshoot[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:34 Aeolus.local python[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:35 Aeolus.local setroubleshoot[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:35 Aeolus.local python[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:35 Aeolus.local setroubleshoot[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:35 Aeolus.local python[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:01:35 Aeolus.local setroubleshoot[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:01:35 Aeolus.local python[7106]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:02:03 Aeolus.local setroubleshoot[7167]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390593721.711:996): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390593721.711:996): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:02:03 Aeolus.local setroubleshoot[7167]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390593721.711:996): avc: denied { open } for pid=6412 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:02:03 Aeolus.local setroubleshoot[7167]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390593721.711:996): arch=c000003e syscall=2 success=no exit=-13 a0=18531e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=6412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:02:03 Aeolus.local setroubleshoot[7167]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:02:03 Aeolus.local python[7167]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390596016.760:1045): avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390596016.760:1045): arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=8727 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390596016.760:1045): avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390596016.760:1045): arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=8727 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390596016.773:1046): avc: denied { read } for pid=8731 comm="snapperd" name=".snapshots" dev="sda4" ino=256 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=dir > node=Aeolus.local type=SYSCALL msg=audit(1390596016.773:1046): arch=c000003e syscall=257 success=yes exit=7 a0=6 a1=7fe5ac000eb8 a2=e0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390596016.773:1046): avc: denied { read } for pid=8731 comm="snapperd" name=".snapshots" dev="sda4" ino=256 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=dir >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390596016.773:1046): arch=c000003e syscall=257 success=yes exit=7 a0=6 a1=7fe5ac000eb8 a2=e0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390596016.775:1047): avc: denied { open } for pid=8731 comm="snapperd" path="/.snapshots/1/info.xml" dev="sda4" ino=259 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390596016.775:1047): arch=c000003e syscall=257 success=yes exit=8 a0=6 a1=7fe5ac000a68 a2=a0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390596016.775:1047): avc: denied { open } for pid=8731 comm="snapperd" path="/.snapshots/1/info.xml" dev="sda4" ino=259 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=file >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390596016.775:1047): arch=c000003e syscall=257 success=yes exit=8 a0=6 a1=7fe5ac000a68 a2=a0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:40:18 Aeolus.local setroubleshoot[8730]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:40:18 Aeolus.local python[8730]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:40:19 Aeolus.local setroubleshoot[8730]: SELinux is preventing /usr/sbin/snapperd from read access on the directory /.snapshots. For complete SELinux messages. run sealert -l 4990d297-5dc3-48ee-b928-76e65ce09616 >Jan 24 20:40:19 Aeolus.local python[8730]: SELinux is preventing /usr/sbin/snapperd from read access on the directory /.snapshots. > If you want to allow snapperd to have read access on the .snapshots directory > If you believe that snapperd should be allowed read access on the .snapshots directory by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:40:19 Aeolus.local setroubleshoot[8730]: SELinux is preventing /usr/sbin/snapperd from open access on the file /.snapshots/1/info.xml. For complete SELinux messages. run sealert -l 029e2368-d31a-4da6-a342-4fdec64bdf92 >Jan 24 20:40:19 Aeolus.local python[8730]: SELinux is preventing /usr/sbin/snapperd from open access on the file /.snapshots/1/info.xml. > If you want to allow snapperd to have open access on the info.xml file > where FILE_TYPE is one of the following: NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_unit_file_t, abrt_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_var_run_t, accountsd_exec_t, acct_initrc_exec_t, afs_initrc_exec_t, aiccu_initrc_exec_t, ajaxterm_initrc_exec_t, amtu_initrc_exec_t, anon_inodefs_t, antivirus_initrc_exec_t, apcupsd_initrc_exec_t, apmd_initrc_exec_t, arpwatch_initrc_exec_t, asterisk_initrc_exec_t, asterisk_t, auditd_initrc_exec_t, automount_initrc_exec_t, avahi_exec_t, avahi_initrc_exec_t, bcfg2_initrc_exec_t, bin_t, bitlbee_initrc_exec_t, blueman_exec_t, bluetooth_initrc_exec_t, boinc_initrc_exec_t, boot_t, callweaver_initrc_exec_t, canna_initrc_exec_t, ccs_initrc_exec_t, cert_t, certmaster_initrc_exec_t, certmonger_initrc_exec_t, cfengine_initrc_exec_t, cgconfig_initrc_exec_t, cgred_initrc_exec_t, cgroup_t, chronyd_initrc_exec_t, ciped_initrc_exec_t, cluster_initrc_exec_t, clvmd_initrc_exec_t, cmirrord_initrc_exec_t, cobblerd_initrc_exec_t, collectd_initrc_exec_t, colord_exec_t, condor_initrc_exec_t, consolekit_exec_t, couchdb_initrc_exec_t, cpu_online_t, cpufreqselector_exec_t, crond_initrc_exec_t, ctdbd_initrc_exec_t, cupsd_config_exec_t, cupsd_initrc_exec_t, cvs_initrc_exec_t, cyphesis_initrc_exec_t, cyrus_initrc_exec_t, dbusd_etc_t, dbusd_exec_t, ddclient_initrc_exec_t, debuginfo_exec_t, default_context_t, denyhosts_initrc_exec_t, devicekit_disk_exec_t, devicekit_exec_t, devicekit_power_exec_t, dhcpc_exec_t, dhcpc_helper_exec_t, dhcpd_initrc_exec_t, dictd_initrc_exec_t, dlm_controld_initrc_exec_t, dnsmasq_initrc_exec_t, dovecot_initrc_exec_t, drbd_initrc_exec_t, dspam_initrc_exec_t, entropyd_initrc_exec_t, etc_runtime_t, etc_t, exim_initrc_exec_t, fail2ban_initrc_exec_t, fcoemon_initrc_exec_t, fetchmail_initrc_exec_t, file_context_t, firewalld_exec_t, firewalld_initrc_exec_t, firewallgui_exec_t, foghorn_initrc_exec_t, fprintd_exec_t, fsdaemon_initrc_exec_t, ftpd_initrc_exec_t, gconfd_exec_t, gconfdefaultsm_exec_t, glance_api_initrc_exec_t, glance_registry_initrc_exec_t, glusterd_initrc_exec_t, gnomesystemmm_exec_t, gpm_initrc_exec_t, gpsd_initrc_exec_t, hddtemp_initrc_exec_t, hostname_etc_t, httpd_initrc_exec_t, hypervkvp_initrc_exec_t, icecast_initrc_exec_t, initrc_exec_t, innd_initrc_exec_t, iodined_initrc_exec_t, ipsec_initrc_exec_t, iptables_initrc_exec_t, irqbalance_initrc_exec_t, isnsd_initrc_exec_t, iwhd_initrc_exec_t, jabberd_initrc_exec_t, jockey_exec_t, kdump_initrc_exec_t, kdumpgui_exec_t, kerberos_initrc_exec_t, keystone_initrc_exec_t, kismet_initrc_exec_t, krb5_conf_t, ksmtuned_initrc_exec_t, l2tpd_initrc_exec_t, ld_so_cache_t, ld_so_t, lib_t, likewise_initrc_exec_t, lircd_initrc_exec_t, lldpad_initrc_exec_t, locale_t, machineid_t, man_cache_t, man_t, mandb_cache_t, mcelog_initrc_exec_t, mdadm_initrc_exec_t, memcached_initrc_exec_t, modemmanager_exec_t, mongod_initrc_exec_t, mpd_initrc_exec_t, mrtg_initrc_exec_t, mscan_initrc_exec_t, munin_initrc_exec_t, mysqld_initrc_exec_t, mysqlmanagerd_initrc_exec_t, nagios_initrc_exec_t, named_exec_t, named_initrc_exec_t, net_conf_t, neutron_initrc_exec_t, nfsd_initrc_exec_t, nis_initrc_exec_t, nscd_initrc_exec_t, nslcd_initrc_exec_t, ntop_initrc_exec_t, ntpd_initrc_exec_t, openct_initrc_exec_t, openhpid_initrc_exec_t, openvpn_initrc_exec_t, oracleasm_initrc_exec_t, pads_initrc_exec_t, pam_var_console_t, passwd_file_t, pcscd_initrc_exec_t, pingd_initrc_exec_t, piranha_pulse_initrc_exec_t, pki_ra_script_exec_t, pki_tps_script_exec_t, policykit_auth_exec_t, policykit_exec_t, polipo_initrc_exec_t, portmap_initrc_exec_t, portreserve_initrc_exec_t, postfix_initrc_exec_t, postfix_postdrop_t, postgresql_initrc_exec_t, postgrey_initrc_exec_t, pppd_exec_t, pppd_initrc_exec_t, prelink_exec_t, prelude_initrc_exec_t, privoxy_initrc_exec_t, proc_t, psad_initrc_exec_t, pulseaudio_exec_t, puppet_initrc_exec_t, puppetmaster_initrc_exec_t, qpidd_initrc_exec_t, rabbitmq_initrc_exec_t, radiusd_initrc_exec_t, radvd_initrc_exec_t, realmd_exec_t, redis_initrc_exec_t, rhsmcertd_initrc_exec_t, ricci_initrc_exec_t, rngd_initrc_exec_t, roundup_initrc_exec_t, rpcbind_initrc_exec_t, rpcd_initrc_exec_t, rpm_exec_t, rpm_script_tmp_t, rtkit_daemon_exec_t, rtkit_daemon_initrc_exec_t, rwho_initrc_exec_t, samba_etc_t, samba_initrc_exec_t, samba_var_t, sambagui_exec_t, sanlock_initrc_exec_t, saslauthd_initrc_exec_t, sblim_initrc_exec_t, sectoolm_exec_t, security_t, selinux_config_t, semanage_exec_t, sendmail_initrc_exec_t, sensord_initrc_exec_t, setrans_initrc_exec_t, setroubleshoot_fixit_exec_t, setroubleshootd_exec_t, shell_exec_t, shorewall_initrc_exec_t, slapd_initrc_exec_t, slpd_initrc_exec_t, smokeping_initrc_exec_t, smsd_initrc_exec_t, snapperd_exec_t, snmpd_initrc_exec_t, snort_initrc_exec_t, sosreport_tmp_t, soundd_initrc_exec_t, spamd_initrc_exec_t, squid_initrc_exec_t, src_t, sshd_initrc_exec_t, sssd_initrc_exec_t, sssd_public_t, sssd_var_lib_t, svnserve_initrc_exec_t, sysfs_t, syslogd_initrc_exec_t, sysstat_initrc_exec_t, system_conf_t, system_db_t, system_dbusd_tmp_t, system_dbusd_var_lib_t, system_dbusd_var_run_t, systemd_logind_var_run_t, systemd_passwd_agent_exec_t, systemd_passwd_var_run_t, systemd_systemctl_exec_t, tcsd_initrc_exec_t, textrel_shlib_t, tgtd_initrc_exec_t, tor_initrc_exec_t, tuned_initrc_exec_t, udev_var_run_t, ulogd_initrc_exec_t, usr_t, uucpd_initrc_exec_t, uuidd_initrc_exec_t, varnishd_initrc_exec_t, varnishlog_initrc_exec_t, vdagentd_initrc_exec_t, vhostmd_initrc_exec_t, virtd_initrc_exec_t, vnstatd_initrc_exec_t, watchdog_initrc_exec_t, wdmd_initrc_exec_t, ypbind_initrc_exec_t, zabbix_agent_initrc_exec_t, zabbix_initrc_exec_t, zebra_initrc_exec_t, zoneminder_initrc_exec_t. > If you believe that snapperd should be allowed open access on the info.xml file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:41:16 Aeolus.local setroubleshoot[8730]: dbus avc(node=Aeolus.local type=AVC msg=audit(1390596076.835:1050): avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file > node=Aeolus.local type=SYSCALL msg=audit(1390596076.835:1050): arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:41:16 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=AVC msg=audit(1390596076.835:1050): avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file >Jan 24 20:41:16 Aeolus.local setroubleshoot[8730]: AuditRecordReceiver.add_record_to_cache(): node=Aeolus.local type=SYSCALL msg=audit(1390596076.835:1050): arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) >Jan 24 20:41:16 Aeolus.local setroubleshoot[8730]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. For complete SELinux messages. run sealert -l d6e09805-7690-460f-912f-56547c670959 >Jan 24 20:41:17 Aeolus.local python[8730]: SELinux is preventing /usr/sbin/snapperd from open access on the file /var/log/snapper.log. > If you believe that snapperd should be allowed open access on the snapper.log file by default. > # grep snapperd /var/log/audit/audit.log | audit2allow -M mypol >Jan 24 20:41:46 Aeolus.local abrt-hook-ccpp[9006]: Saved core dump of pid 9005 (/usr/sbin/snapperd) to /var/tmp/abrt/ccpp-2014-01-24-20:41:46-9005 (786432 bytes) >[User Logs]: > <body_text>avc: denied { read } for pid=8731 comm="snapperd" name=".snapshots" dev="sda4" ino=256 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=dir</body_text> > <body_text>arch=c000003e syscall=257 success=yes exit=7 a0=6 a1=7fe5ac000eb8 a2=e0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { read } for pid=6421 comm="snapperd" name="Torrents" dev="sdc" ino=256 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <body_text>arch=c000003e syscall=2 success=no exit=-13 a0=7f684400acb8 a1=c0000 a2=1 a3=5 items=0 ppid=1 pid=6421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file</body_text> > <body_text>arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=8727 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { open } for pid=8731 comm="snapperd" path="/.snapshots/1/info.xml" dev="sda4" ino=259 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=file</body_text> > <body_text>arch=c000003e syscall=257 success=yes exit=8 a0=6 a1=7fe5ac000a68 a2=a0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <arg>snapperd_exec_t</arg> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { read } for pid=8731 comm="snapperd" name=".snapshots" dev="sda4" ino=256 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=dir</body_text> > <body_text>arch=c000003e syscall=257 success=yes exit=7 a0=6 a1=7fe5ac000eb8 a2=e0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { read } for pid=6421 comm="snapperd" name="Torrents" dev="sdc" ino=256 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir</body_text> > <body_text>arch=c000003e syscall=2 success=no exit=-13 a0=7f684400acb8 a1=c0000 a2=1 a3=5 items=0 ppid=1 pid=6421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file</body_text> > <body_text>arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=8727 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { open } for pid=8731 comm="snapperd" path="/.snapshots/1/info.xml" dev="sda4" ino=259 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:default_t:s0 tclass=file</body_text> > <body_text>arch=c000003e syscall=257 success=yes exit=8 a0=6 a1=7fe5ac000a68 a2=a0000 a3=0 items=0 ppid=1 pid=8731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <arg>snapperd_exec_t</arg> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file</body_text> > <body_text>arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file</body_text> > <body_text>arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath> > <body_text>avc: denied { open } for pid=8728 comm="snapperd" path="/var/log/snapper.log" dev="sda4" ino=4076 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_log_t:s0 tclass=file</body_text> > <body_text>arch=c000003e syscall=2 success=yes exit=6 a0=8ac1e8 a1=80441 a2=1b6 a3=0 items=0 ppid=1 pid=8728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="snapperd" exe="/usr/sbin/snapperd" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null)</body_text> > <source>snapperd</source> > <spath>/usr/sbin/snapperd</spath>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1060648
:
858419
|
858421
|
858423
|
858425
|
858427
|
858429
|
858431
|
858432
|
858433
| 858434