Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <3>[ 4.896353] init: Warning! Service patch_fstab needs a SELinux domain defined; please fix!
- <5>[ 4.898456] type=1400 audit(1416348520.730:4): avc: denied { remount } for pid=119 comm="busybox" scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=filesystem permissive=0
- <5>[ 4.899978] type=1400 audit(1416348520.735:5): avc: denied { rename } for pid=122 comm="busybox" name="fstab.manta" dev="rootfs" ino=2117 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0
- <5>[ 4.906490] type=1400 audit(1416348520.740:6): avc: denied { create } for pid=132 comm="busybox" name="fstab.tmpIzz132" scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0
- <5>[ 4.907557] type=1400 audit(1416348520.740:7): avc: denied { create } for pid=133 comm="busybox" name="fstab.tmpIZm133" scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0
- <5>[ 4.908552] type=1400 audit(1416348520.740:8): avc: denied { create } for pid=134 comm="busybox" name="fstab.tmpXyZ134" scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0
- <5>[ 4.909374] type=1400 audit(1416348520.745:9): avc: denied { write } for pid=135 comm="busybox" name="fstab.manta" dev="rootfs" ino=2117 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0
- <5>[ 4.909524] type=1400 audit(1416348520.745:10): avc: denied { rename } for pid=135 comm="busybox" name="fstab.tmp" dev="rootfs" ino=2120 scontext=u:r:kernel:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0
Advertisement
Add Comment
Please, Sign In to add comment