Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1016244 Details for
Bug 1198436
[SELinux] [Nagios] Selinux blocks gluster-nagios plugins in the nagios server - RHEL-6.7
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
avc from gluster server (nagios client) permissive
avc_gluster_server_permissive.txt (text/plain), 14.23 KB, created by
Stanislav Graf
on 2015-04-20 07:28:37 UTC
(
hide
)
Description:
avc from gluster server (nagios client) permissive
Filename:
MIME Type:
Creator:
Stanislav Graf
Created:
2015-04-20 07:28:37 UTC
Size:
14.23 KB
patch
obsolete
>---- >type=SYSCALL msg=audit(04/20/2015 01:32:03.140:114828) : arch=x86_64 syscall=socket success=no exit=-97(Address family not supported by protocol) a0=inet6 a1=SOCK_STREAM a2=ip a3=0x7fffcbe29b30 items=0 ppid=1836 pid=2830 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=pickup exe=/usr/libexec/postfix/pickup subj=system_u:system_r:postfix_pickup_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 01:32:03.140:114828) : avc: denied { module_request } for pid=2830 comm=pickup kmod="net-pf-10" scontext=system_u:system_r:postfix_pickup_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system >---- >type=SYSCALL msg=audit(04/20/2015 03:12:08.789:115543) : arch=x86_64 syscall=socket success=no exit=-97(Address family not supported by protocol) a0=inet6 a1=SOCK_STREAM a2=ip a3=0x7fff692494a0 items=0 ppid=1836 pid=8463 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=pickup exe=/usr/libexec/postfix/pickup subj=system_u:system_r:postfix_pickup_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 03:12:08.789:115543) : avc: denied { module_request } for pid=8463 comm=pickup kmod="net-pf-10" scontext=system_u:system_r:postfix_pickup_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system >---- >type=SYSCALL msg=audit(04/20/2015 04:52:14.636:116246) : arch=x86_64 syscall=socket success=no exit=-97(Address family not supported by protocol) a0=inet6 a1=SOCK_STREAM a2=ip a3=0x7fffb909c4a0 items=0 ppid=1836 pid=14242 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=pickup exe=/usr/libexec/postfix/pickup subj=system_u:system_r:postfix_pickup_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 04:52:14.636:116246) : avc: denied { module_request } for pid=14242 comm=pickup kmod="net-pf-10" scontext=system_u:system_r:postfix_pickup_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system >---- >type=SYSCALL msg=audit(04/20/2015 06:32:20.302:116961) : arch=x86_64 syscall=socket success=no exit=-97(Address family not supported by protocol) a0=inet6 a1=SOCK_STREAM a2=ip a3=0x7ffffc8e7ac0 items=0 ppid=1836 pid=19870 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=pickup exe=/usr/libexec/postfix/pickup subj=system_u:system_r:postfix_pickup_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 06:32:20.302:116961) : avc: denied { module_request } for pid=19870 comm=pickup kmod="net-pf-10" scontext=system_u:system_r:postfix_pickup_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system >---- >type=SYSCALL msg=audit(04/20/2015 08:12:26.109:117676) : arch=x86_64 syscall=socket success=no exit=-97(Address family not supported by protocol) a0=inet6 a1=SOCK_STREAM a2=ip a3=0x7fffad415150 items=0 ppid=1836 pid=25432 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=pickup exe=/usr/libexec/postfix/pickup subj=system_u:system_r:postfix_pickup_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 08:12:26.109:117676) : avc: denied { module_request } for pid=25432 comm=pickup kmod="net-pf-10" scontext=system_u:system_r:postfix_pickup_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=system >---- >type=SYSCALL msg=audit(04/20/2015 09:01:08.088:118027) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f2cf3ec0ee8 items=0 ppid=29155 pid=29156 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:08.088:118027) : avc: denied { write } for pid=29156 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:01:08.366:118029) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x3 a1=0x29acb8eb a2=0x7f2ceb73a675 a3=0xca items=0 ppid=29155 pid=29156 auid=unset uid=root gid=nrpe euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:08.366:118029) : avc: denied { setattr } for pid=29156 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >type=AVC msg=audit(04/20/2015 09:01:08.366:118029) : avc: denied { write } for pid=29156 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:01:08.400:118034) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f8e03e5dee8 items=0 ppid=29169 pid=29170 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:08.400:118034) : avc: denied { write } for pid=29170 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:01:08.619:118036) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x3 a1=0xdb3546c a2=0x7f8dfb6d7675 a3=0xca items=0 ppid=29169 pid=29170 auid=unset uid=root gid=nrpe euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:08.619:118036) : avc: denied { setattr } for pid=29170 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >type=AVC msg=audit(04/20/2015 09:01:08.619:118036) : avc: denied { write } for pid=29170 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:01:08.671:118041) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f618b829ee8 items=0 ppid=29183 pid=29184 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:08.671:118041) : avc: denied { write } for pid=29184 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:01:09.468:118043) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x3 a1=0x164c6507 a2=0x7f61830a3675 a3=0xca items=0 ppid=29183 pid=29184 auid=unset uid=root gid=nrpe euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:09.468:118043) : avc: denied { setattr } for pid=29184 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >type=AVC msg=audit(04/20/2015 09:01:09.468:118043) : avc: denied { write } for pid=29184 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:01:09.495:118048) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f41d8da6ee8 items=0 ppid=29233 pid=29234 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:09.495:118048) : avc: denied { write } for pid=29234 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:01:09.557:118050) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x3 a1=0x1a3ac236 a2=0x7f41d0620675 a3=0xca items=0 ppid=29233 pid=29234 auid=unset uid=root gid=nrpe euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:01:09.557:118050) : avc: denied { setattr } for pid=29234 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >type=AVC msg=audit(04/20/2015 09:01:09.557:118050) : avc: denied { write } for pid=29234 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:02:53.821:118061) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f4b28b0dee8 items=0 ppid=29844 pid=29845 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:02:53.821:118061) : avc: denied { write } for pid=29845 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:02:53.974:118063) : arch=x86_64 syscall=keyctl success=no exit=-13(Permission denied) a0=0x3 a1=0x3136f660 a2=0x7f4b20387675 a3=0xca items=0 ppid=29844 pid=29845 auid=unset uid=root gid=nrpe euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:02:53.974:118063) : avc: denied { setattr } for pid=29845 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >type=AVC msg=audit(04/20/2015 09:02:53.974:118063) : avc: denied { write } for pid=29845 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:09:57.757:118129) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f2e94a9dee8 items=0 ppid=32405 pid=32406 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:09:57.757:118129) : avc: denied { write } for pid=32406 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:15:14.842:118183) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f999de05ee8 items=0 ppid=1998 pid=2000 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:15:14.842:118183) : avc: denied { write } for pid=2000 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:17:00.614:118205) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f4a99a2bee8 items=0 ppid=2700 pid=2701 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:17:00.614:118205) : avc: denied { write } for pid=2701 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:18:46.676:118223) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f810e7deee8 items=0 ppid=3437 pid=3438 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:18:46.676:118223) : avc: denied { write } for pid=3438 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:20:32.765:118247) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f766e298ee8 items=0 ppid=4123 pid=4124 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:20:32.765:118247) : avc: denied { write } for pid=4124 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:22:18.744:118265) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f8ff31bbee8 items=0 ppid=4754 pid=4755 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:22:18.744:118265) : avc: denied { write } for pid=4755 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:24:04.804:118283) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f1e4e029ee8 items=0 ppid=5458 pid=5459 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:24:04.804:118283) : avc: denied { write } for pid=5459 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key >---- >type=SYSCALL msg=audit(04/20/2015 09:25:18.710:118301) : arch=x86_64 syscall=keyctl success=yes exit=0 a0=0x8 a1=0xfffffffc a2=0xfffffffd a3=0x7f16d3ccdee8 items=0 ppid=5951 pid=5953 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=nrpe sgid=nrpe fsgid=nrpe tty=(none) ses=unset comm=sudo exe=/usr/bin/sudo subj=system_u:system_r:nrpe_t:s0 key=(null) >type=AVC msg=audit(04/20/2015 09:25:18.710:118301) : avc: denied { write } for pid=5953 comm=sudo scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=key
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1198436
:
1010595
|
1010596
| 1016244 |
1016245