Hide Forgot
Description of problem: The messages turn up with rhel-atomic-cloud-7.2-10.x86_64.qcow2: type=1400 audit(1452520051.910:4): avc: granted { setsecparam } for pid=1021 comm="tuned" scontext=system_u:system_r:tuned_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security Version-Release number of selected component (if applicable): selinux-policy-targeted-3.13.1-60.el7.noarch How reproducible: Every boot I don't know whether these message indicate a problem or not. Is it maybe OK to ignore all 'granted' audit messages when looking for unexpected ones?
I believe this bug is a duplicate of BZ#1186202.
This issue was found by running the Cockpit integration tests.
It is "avc: granted". It means the access was granted by the policy. *** This bug has been marked as a duplicate of bug 1186202 ***