Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1026709 Details for
Bug 1221929
[SELinux] Update SELinux policies for samba (connect and read access)in RHEL6.6
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
all denials caught in enforcing mode on the test machine
today-denials.txt (text/plain), 26.82 KB, created by
Milos Malik
on 2015-05-18 13:32:16 UTC
(
hide
)
Description:
all denials caught in enforcing mode on the test machine
Filename:
MIME Type:
Creator:
Milos Malik
Created:
2015-05-18 13:32:16 UTC
Size:
26.82 KB
patch
obsolete
>---- >type=SYSCALL msg=audit(05/18/2015 11:54:24.825:77) : arch=x86_64 syscall=connect success=no exit=-111(Connection refused) a0=0xc a1=0x7ffd30b66260 a2=0x6e a3=0x7ff47f546873 items=0 ppid=6244 pid=6245 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=glusterd exe=/usr/sbin/glusterfsd subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:24.825:77) : avc: denied { write } for pid=6245 comm=glusterd name=glusterd.socket dev=dm-0 ino=784323 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=sock_file >---- >type=SYSCALL msg=audit(05/18/2015 11:54:24.826:78) : arch=x86_64 syscall=unlink success=yes exit=0 a0=0x7ffd30b66262 a1=0x7ffd30b66260 a2=0x6f a3=0x7ff47f546873 items=0 ppid=6244 pid=6245 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=glusterd exe=/usr/sbin/glusterfsd subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:24.826:78) : avc: denied { unlink } for pid=6245 comm=glusterd name=glusterd.socket dev=dm-0 ino=784323 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=sock_file >---- >type=SYSCALL msg=audit(05/18/2015 11:54:37.989:80) : arch=x86_64 syscall=access success=yes exit=0 a0=0x13f9420 a1=X_OK a2=0x0 a3=0x7ffea9289200 items=0 ppid=6334 pid=6335 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=S29CTDBsetup.sh exe=/bin/bash subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:37.989:80) : avc: denied { execute } for pid=6335 comm=S29CTDBsetup.sh name=hostname dev=dm-0 ino=130329 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 11:54:37.989:81) : arch=x86_64 syscall=execve success=yes exit=0 a0=0x13f9420 a1=0x13f9700 a2=0x13fb300 a3=0x7ffea92892f0 items=0 ppid=6334 pid=6335 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=hostname exe=/bin/hostname subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:37.989:81) : avc: denied { execute_no_trans } for pid=6335 comm=S29CTDBsetup.sh path=/bin/hostname dev=dm-0 ino=130329 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=system_u:object_r:hostname_exec_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 11:54:37.984:79) : arch=x86_64 syscall=execve success=yes exit=0 a0=0x7ff464008d10 a1=0x7ff464008ac0 a2=0xf71060 a3=0x7ff47162e9c0 items=0 ppid=6245 pid=6334 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=S29CTDBsetup.sh exe=/bin/bash subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:37.984:79) : avc: denied { execute_no_trans } for pid=6334 comm=glusterd path=/var/lib/glusterd/hooks/1/start/post/S29CTDBsetup.sh dev=dm-0 ino=784303 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=system_u:object_r:glusterd_var_lib_t:s0 tclass=file >type=AVC msg=audit(05/18/2015 11:54:37.984:79) : avc: denied { execute } for pid=6334 comm=glusterd name=S29CTDBsetup.sh dev=dm-0 ino=784303 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=system_u:object_r:glusterd_var_lib_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 11:54:38.019:82) : arch=x86_64 syscall=access success=yes exit=0 a0=0x182bc20 a1=X_OK a2=0x0 a3=0x7ffe73283800 items=0 ppid=6352 pid=6353 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=S30samba-start. exe=/bin/bash subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:38.019:82) : avc: denied { execute } for pid=6353 comm=S30samba-start. name=smbd dev=dm-0 ino=925890 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=system_u:object_r:smbd_exec_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 11:54:38.019:83) : arch=x86_64 syscall=execve success=yes exit=0 a0=0x182bc20 a1=0x1825420 a2=0x182b320 a3=0x7ffe732838f0 items=0 ppid=6352 pid=6353 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:38.019:83) : avc: denied { execute_no_trans } for pid=6353 comm=S30samba-start. path=/usr/sbin/smbd dev=dm-0 ino=925890 scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=system_u:object_r:smbd_exec_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 11:54:38.187:84) : arch=x86_64 syscall=kill success=yes exit=0 a0=0x1727 a1=SIGHUP a2=0x0 a3=0x7ffe73284020 items=0 ppid=6245 pid=6338 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=S30samba-start. exe=/bin/bash subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 11:54:38.187:84) : avc: denied { signal } for pid=6338 comm=S30samba-start. scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=unconfined_u:system_r:smbd_t:s0 tclass=process >---- >type=SYSCALL msg=audit(05/18/2015 12:01:25.513:97) : arch=x86_64 syscall=stat success=no exit=-13(Permission denied) a0=0x7f950c39e965 a1=0x7ffdb6be6400 a2=0x7ffdb6be6400 a3=0x1 items=0 ppid=5927 pid=6458 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:01:25.513:97) : avc: denied { search } for pid=6458 comm=smbd name=glusterfs dev=dm-0 ino=269456 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:glusterd_conf_t:s0 tclass=dir >---- >type=SYSCALL msg=audit(05/18/2015 12:01:25.514:98) : arch=x86_64 syscall=stat success=no exit=-13(Permission denied) a0=0x7f950c39e965 a1=0x7ffdb6be6460 a2=0x7ffdb6be6460 a3=0x1 items=0 ppid=5927 pid=6458 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:01:25.514:98) : avc: denied { search } for pid=6458 comm=smbd name=glusterfs dev=dm-0 ino=269456 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:glusterd_conf_t:s0 tclass=dir >---- >type=SYSCALL msg=audit(05/18/2015 12:01:25.532:99) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7ffdb6be62e8 items=0 ppid=5927 pid=6458 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:01:25.532:99) : avc: denied { search } for pid=6458 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir >---- >type=SYSCALL msg=audit(05/18/2015 12:01:25.533:100) : arch=x86_64 syscall=bind success=no exit=-13(Permission denied) a0=0x20 a1=0x7f952477b6b0 a2=0x10 a3=0x726f702064657672 items=0 ppid=5927 pid=6458 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:01:25.533:100) : avc: denied { name_bind } for pid=6458 comm=smbd src=1023 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 12:01:25.534:101) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x20 a1=0x7f952477b1b8 a2=0x10 a3=0x0 items=0 ppid=5927 pid=6458 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:01:25.534:101) : avc: denied { name_connect } for pid=6458 comm=smbd dest=24007 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:gluster_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 12:43:15.508:150) : arch=x86_64 syscall=stat success=no exit=-13(Permission denied) a0=0x7f950c39e965 a1=0x7ffdb6be6400 a2=0x7ffdb6be6400 a3=0x1 items=0 ppid=5927 pid=30008 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:43:15.508:150) : avc: denied { search } for pid=30008 comm=smbd name=glusterfs dev=dm-0 ino=269456 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:glusterd_conf_t:s0 tclass=dir >---- >type=SYSCALL msg=audit(05/18/2015 12:43:15.509:151) : arch=x86_64 syscall=stat success=no exit=-13(Permission denied) a0=0x7f950c39e965 a1=0x7ffdb6be6460 a2=0x7ffdb6be6460 a3=0x1 items=0 ppid=5927 pid=30008 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:43:15.509:151) : avc: denied { search } for pid=30008 comm=smbd name=glusterfs dev=dm-0 ino=269456 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:glusterd_conf_t:s0 tclass=dir >---- >type=SYSCALL msg=audit(05/18/2015 12:43:15.528:152) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7ffdb6be62e8 items=0 ppid=5927 pid=30008 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:43:15.528:152) : avc: denied { search } for pid=30008 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir >---- >type=SYSCALL msg=audit(05/18/2015 12:43:15.529:153) : arch=x86_64 syscall=bind success=no exit=-13(Permission denied) a0=0x20 a1=0x7f952477b6b0 a2=0x10 a3=0x726f702064657672 items=0 ppid=5927 pid=30008 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:43:15.529:153) : avc: denied { name_bind } for pid=30008 comm=smbd src=1023 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 12:43:15.530:154) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x20 a1=0x7f952477b1b8 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30008 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 12:43:15.530:154) : avc: denied { name_connect } for pid=30008 comm=smbd dest=24007 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:gluster_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.964:193) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30269 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.964:193) : avc: denied { read } for pid=30269 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.939:192) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7ffdb6be62e8 items=0 ppid=5927 pid=30264 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.939:192) : avc: denied { read } for pid=30264 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.970:194) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30269 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.970:194) : avc: denied { read } for pid=30269 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.974:195) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f95056f2ac8 items=0 ppid=5927 pid=30270 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.974:195) : avc: denied { read } for pid=30270 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.974:196) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x26 a1=0x7f94f80d0d28 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30270 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.974:196) : avc: denied { name_connect } for pid=30270 comm=smbd dest=49152 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.979:197) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30269 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.979:197) : avc: denied { read } for pid=30269 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.983:198) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f95056f2ac8 items=0 ppid=5927 pid=30270 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.983:198) : avc: denied { read } for pid=30270 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.983:199) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x26 a1=0x7f94f80aa128 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30270 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.983:199) : avc: denied { name_connect } for pid=30270 comm=smbd dest=49153 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.988:200) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30269 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.988:200) : avc: denied { read } for pid=30269 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.993:201) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f95056f2ac8 items=0 ppid=5927 pid=30270 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.993:201) : avc: denied { read } for pid=30270 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.993:202) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x23 a1=0x7f94f8083528 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30270 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.993:202) : avc: denied { name_connect } for pid=30270 comm=smbd dest=49154 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.997:203) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e24ac8 items=0 ppid=5927 pid=30269 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.997:203) : avc: denied { read } for pid=30269 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:06.998:204) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x23 a1=0x7f94f805c928 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30269 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:06.998:204) : avc: denied { name_connect } for pid=30269 comm=smbd dest=49155 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.044:206) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30314 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.044:206) : avc: denied { read } for pid=30314 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.049:207) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30314 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.049:207) : avc: denied { read } for pid=30314 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.054:208) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f95056f2ac8 items=0 ppid=5927 pid=30315 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.054:208) : avc: denied { read } for pid=30315 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.058:209) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x26 a1=0x7f94f80d0d28 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30315 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.058:209) : avc: denied { name_connect } for pid=30315 comm=smbd dest=49152 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.060:210) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30314 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.060:210) : avc: denied { read } for pid=30314 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.064:211) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f95056f2ac8 items=0 ppid=5927 pid=30315 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.064:211) : avc: denied { read } for pid=30315 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.064:212) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x26 a1=0x7f94f80aa128 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30315 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.064:212) : avc: denied { name_connect } for pid=30315 comm=smbd dest=49153 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.069:213) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e242b8 items=0 ppid=5927 pid=30314 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.069:213) : avc: denied { read } for pid=30314 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.074:214) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f95056f2ac8 items=0 ppid=5927 pid=30315 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.074:214) : avc: denied { read } for pid=30315 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.074:215) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x23 a1=0x7f94f8083528 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30315 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.074:215) : avc: denied { name_connect } for pid=30315 comm=smbd dest=49154 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.079:216) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7f9507e24ac8 items=0 ppid=5927 pid=30314 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.079:216) : avc: denied { read } for pid=30314 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.079:217) : arch=x86_64 syscall=connect success=no exit=-13(Permission denied) a0=0x23 a1=0x7f94f805c928 a2=0x10 a3=0x0 items=0 ppid=5927 pid=30314 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.079:217) : avc: denied { name_connect } for pid=30314 comm=smbd dest=49155 scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:virt_migration_port_t:s0 tclass=tcp_socket >---- >type=SYSCALL msg=audit(05/18/2015 13:04:53.021:205) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f950c3a1f48 a1=O_RDONLY a2=0x10 a3=0x7ffdb6be62e8 items=0 ppid=5927 pid=30309 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=smbd exe=/usr/sbin/smbd subj=unconfined_u:system_r:smbd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:04:53.021:205) : avc: denied { read } for pid=30309 comm=smbd scontext=unconfined_u:system_r:smbd_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=file >---- >type=SYSCALL msg=audit(05/18/2015 13:17:36.039:225) : arch=x86_64 syscall=read success=yes exit=155 a0=0x5 a1=0x34982118c0 a2=0x3ff a3=0x0 items=0 ppid=30635 pid=30641 auid=root uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=1 comm=ps exe=/bin/ps subj=unconfined_u:system_r:glusterd_t:s0 key=(null) >type=AVC msg=audit(05/18/2015 13:17:36.039:225) : avc: denied { sys_ptrace } for pid=30641 comm=ps capability=sys_ptrace scontext=unconfined_u:system_r:glusterd_t:s0 tcontext=unconfined_u:system_r:glusterd_t:s0 tclass=capability
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1221929
:
1026645
|
1026677
| 1026709 |
1027682
|
1027683
|
1028708