Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 326638 Details for
Bug 438068
[selinux] shorewall fails to start in restricted mode
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
avc logs
avc.log (text/plain), 8.47 KB, created by
Reuben Martin
on 2012-10-15 19:40:22 UTC
(
hide
)
Description:
avc logs
Filename:
MIME Type:
Creator:
Reuben Martin
Created:
2012-10-15 19:40:22 UTC
Size:
8.47 KB
patch
obsolete
>Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328240.900:3): avc: denied { rlimitinh } for pid=1 comm="init" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:init_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328240.900:4): avc: denied { siginh } for pid=1 comm="init" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:init_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328240.900:5): avc: denied { noatsecure } for pid=1 comm="init" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:init_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328240.900:6): avc: denied { getattr } for pid=1 comm="init" name="/" dev="selinuxfs" ino=1 scontext=system_u:system_r:init_t tcontext=system_u:object_r:security_t tclass=filesystem >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328240.900:7): avc: denied { getattr } for pid=1 comm="init" name="/" dev="selinuxfs" ino=1 scontext=system_u:system_r:init_t tcontext=system_u:object_r:security_t tclass=filesystem >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328241.030:8): avc: denied { rlimitinh } for pid=1174 comm="rc" scontext=system_u:system_r:init_t tcontext=system_u:system_r:initrc_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328241.030:9): avc: denied { siginh } for pid=1174 comm="rc" scontext=system_u:system_r:init_t tcontext=system_u:system_r:initrc_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328241.030:10): avc: denied { noatsecure } for pid=1174 comm="rc" scontext=system_u:system_r:init_t tcontext=system_u:system_r:initrc_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328245.900:11): avc: denied { read write } for pid=1204 comm="mount" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328245.900:12): avc: denied { read write } for pid=1204 comm="mount" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328245.900:13): avc: denied { read write } for pid=1204 comm="mount" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328245.900:14): avc: denied { read write } for pid=1204 comm="mount" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328245.900:15): avc: denied { rlimitinh } for pid=1204 comm="mount" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:mount_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328245.900:16): avc: denied { siginh } for pid=1204 comm="mount" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:mount_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328245.900:17): avc: denied { noatsecure } for pid=1204 comm="mount" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:mount_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328246.180:18): avc: denied { write } for pid=1204 comm="mount" name="/" dev="tmpfs" ino=3250 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:cgroup_t tclass=dir >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328246.180:19): avc: denied { setattr } for pid=1204 comm="mount" name="/" dev="tmpfs" ino=3250 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:cgroup_t tclass=dir >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328246.310:20): avc: denied { read write } for pid=1208 comm="mount" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:mount_t tcontext=system_u:object_r:device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328250.960:212): avc: denied { read } for pid=1359 comm="hwclock" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:hwclock_t tcontext=system_u:object_r:console_device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328250.960:213): avc: denied { read } for pid=1359 comm="hwclock" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:hwclock_t tcontext=system_u:object_r:console_device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328250.960:214): avc: denied { rlimitinh } for pid=1359 comm="hwclock" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:hwclock_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328250.960:215): avc: denied { siginh } for pid=1359 comm="hwclock" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:hwclock_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328250.960:216): avc: denied { noatsecure } for pid=1359 comm="hwclock" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:hwclock_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328251.270:217): avc: denied { rlimitinh } for pid=1391 comm="lvm" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:lvm_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328251.270:218): avc: denied { siginh } for pid=1391 comm="lvm" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:lvm_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328251.270:219): avc: denied { noatsecure } for pid=1391 comm="lvm" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:lvm_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328251.270:220): avc: denied { getattr } for pid=1391 comm="lvm" path="/run/udev/queue.bin" dev="tmpfs" ino=2468 scontext=system_u:system_r:lvm_t tcontext=system_u:object_r:tmpfs_t tclass=file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328251.270:221): avc: denied { getattr } for pid=1391 comm="lvm" path="/run/udev/data/b253:0" dev="tmpfs" ino=2429 scontext=system_u:system_r:lvm_t tcontext=system_u:object_r:tmpfs_t tclass=file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.100:340): avc: denied { read } for pid=1635 comm="ip" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:console_device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.100:341): avc: denied { read } for pid=1635 comm="ip" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:console_device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.100:342): avc: denied { read } for pid=1635 comm="ip" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:console_device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.100:343): avc: denied { rlimitinh } for pid=1635 comm="ip" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:ifconfig_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.100:344): avc: denied { siginh } for pid=1635 comm="ip" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:ifconfig_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.100:345): avc: denied { noatsecure } for pid=1635 comm="ip" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:ifconfig_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.240:346): avc: denied { read } for pid=1701 comm="ip" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:console_device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.240:347): avc: denied { read } for pid=1701 comm="ip" path="/dev/console" dev="devtmpfs" ino=2058 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:console_device_t tclass=chr_file >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.240:348): avc: denied { rlimitinh } for pid=1701 comm="ip" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:ifconfig_t tclass=process >Oct 15 14:10:59 paragon kernel: type=1400 audit(1350328256.240:349): avc: denied { siginh } for pid=1701 comm="ip" scontext=system_u:system_r:initrc_t tcontext=system_u:system_r:ifconfig_t tclass=process
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 438068
:
326352
| 326638