Bug 1298157 - Unexpected messages related to "tuned" on Atomic Host
Unexpected messages related to "tuned" on Atomic Host
Status: CLOSED DUPLICATE of bug 1186202
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: selinux-policy (Show other bugs)
7.2
Unspecified Unspecified
unspecified Severity unspecified
: rc
: ---
Assigned To: Miroslav Grepl
BaseOS QE Security Team
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2016-01-13 06:17 EST by Marius Vollmer
Modified: 2016-01-18 04:07 EST (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-01-18 04:07:51 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Marius Vollmer 2016-01-13 06:17:00 EST
Description of problem:

The messages turn up with rhel-atomic-cloud-7.2-10.x86_64.qcow2:

type=1400 audit(1452520051.910:4): avc:  granted  { setsecparam } for  pid=1021 comm="tuned" scontext=system_u:system_r:tuned_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security

Version-Release number of selected component (if applicable):
selinux-policy-targeted-3.13.1-60.el7.noarch

How reproducible:
Every boot


I don't know whether these message indicate a problem or not.  Is it maybe OK to ignore all 'granted' audit messages when looking for unexpected ones?
Comment 1 Milos Malik 2016-01-13 06:20:50 EST
I believe this bug is a duplicate of BZ#1186202.
Comment 3 Stef Walter 2016-01-13 07:50:23 EST
This issue was found by running the Cockpit integration tests.
Comment 4 Miroslav Grepl 2016-01-18 04:07:51 EST
It is "avc:  granted". It means the access was granted by the policy.

*** This bug has been marked as a duplicate of bug 1186202 ***

Note You need to log in before you can comment on or make changes to this bug.