Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1039539 Details for
Bug 1224879
[SELinux] RHEL7:SMB:Update SELinux policies for samba in RHEL7.2
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
ctdb service related2
audit.log.CtdbDenialsAfterPermissive (text/plain), 6.15 KB, created by
Raghavendra Talur
on 2015-06-16 15:28:04 UTC
(
hide
)
Description:
ctdb service related2
Filename:
MIME Type:
Creator:
Raghavendra Talur
Created:
2015-06-16 15:28:04 UTC
Size:
6.15 KB
patch
obsolete
>type=SERVICE_START msg=audit(1434465756.604:1580): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="smb" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >type=SERVICE_STOP msg=audit(1434465756.604:1581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="smb" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >type=AVC msg=audit(1434465760.240:1582): avc: denied { getattr } for pid=19974 comm="stat" path="/gluster/lock/lockfile" dev="fuse" ino=11902173533042449254 scontext=system_u:system_r:ctdbd_t:s0 tcontext=system_u:object_r:fusefs_t:s0 tclass=file >type=SYSCALL msg=audit(1434465760.240:1582): arch=c000003e syscall=6 success=yes exit=0 a0=7fff90a0df33 a1=7fff90a0c130 a2=7fff90a0c130 a3=7fff90a0be80 items=0 ppid=19971 pid=19974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="stat" exe="/usr/bin/stat" subj=system_u:system_r:ctdbd_t:s0 key=(null) >type=AVC msg=audit(1434465784.530:1583): avc: denied { read } for pid=20389 comm="iptables" path="/var/lib/ctdb/iptables-ctdb.flock" dev="dm-3" ino=33597623 scontext=system_u:system_r:iptables_t:s0 tcontext=system_u:object_r:ctdbd_var_lib_t:s0 tclass=file >type=SYSCALL msg=audit(1434465784.530:1583): arch=c000003e syscall=59 success=yes exit=0 a0=7fff6ff28e38 a1=7fff6ff291f8 a2=7fff6ff29248 a3=7fff6ff28c70 items=0 ppid=20388 pid=20389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-multi" subj=system_u:system_r:iptables_t:s0 key=(null) >type=NETFILTER_CFG msg=audit(1434465784.533:1584): table=filter family=2 entries=79 >type=SYSCALL msg=audit(1434465784.533:1584): arch=c000003e syscall=54 success=yes exit=0 a0=6 a1=0 a2=40 a3=1be49d0 items=0 ppid=20390 pid=20391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-multi" subj=system_u:system_r:iptables_t:s0 key=(null) >type=NETFILTER_CFG msg=audit(1434465784.540:1585): table=filter family=2 entries=80 >type=SYSCALL msg=audit(1434465784.540:1585): arch=c000003e syscall=54 success=yes exit=0 a0=6 a1=0 a2=40 a3=23eca70 items=0 ppid=20397 pid=20398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-multi" subj=system_u:system_r:iptables_t:s0 key=(null) >type=NETFILTER_CFG msg=audit(1434465784.644:1586): table=filter family=2 entries=79 >type=SYSCALL msg=audit(1434465784.644:1586): arch=c000003e syscall=54 success=yes exit=0 a0=6 a1=0 a2=40 a3=da79d0 items=0 ppid=20464 pid=20465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-multi" subj=system_u:system_r:iptables_t:s0 key=(null) >type=NETFILTER_CFG msg=audit(1434465784.650:1587): table=filter family=2 entries=80 >type=SYSCALL msg=audit(1434465784.650:1587): arch=c000003e syscall=54 success=yes exit=0 a0=6 a1=0 a2=40 a3=952a70 items=0 ppid=20471 pid=20472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-multi" subj=system_u:system_r:iptables_t:s0 key=(null) >type=SERVICE_START msg=audit(1434465785.537:1588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="ctdb" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >type=SERVICE_STOP msg=audit(1434465785.537:1589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="ctdb" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >type=SERVICE_START msg=audit(1434465786.629:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="ctdb" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >type=AVC msg=audit(1434465789.010:1591): avc: denied { read write } for pid=20787 comm="ctdb_recovered" name="lockfile" dev="fuse" ino=11902173533042449254 scontext=system_u:system_r:ctdbd_t:s0 tcontext=system_u:object_r:fusefs_t:s0 tclass=file >type=AVC msg=audit(1434465789.010:1591): avc: denied { open } for pid=20787 comm="ctdb_recovered" path="/gluster/lock/lockfile" dev="fuse" ino=11902173533042449254 scontext=system_u:system_r:ctdbd_t:s0 tcontext=system_u:object_r:fusefs_t:s0 tclass=file >type=SYSCALL msg=audit(1434465789.010:1591): arch=c000003e syscall=2 success=yes exit=11 a0=7fd227d1b740 a1=42 a2=180 a3=636f6c2f6b636f6c items=0 ppid=20605 pid=20787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ctdb_recovered" exe="/usr/sbin/ctdbd" subj=system_u:system_r:ctdbd_t:s0 key=(null) >type=AVC msg=audit(1434465789.015:1592): avc: denied { lock } for pid=20787 comm="ctdb_recovered" path="/gluster/lock/lockfile" dev="fuse" ino=11902173533042449254 scontext=system_u:system_r:ctdbd_t:s0 tcontext=system_u:object_r:fusefs_t:s0 tclass=file >type=SYSCALL msg=audit(1434465789.015:1592): arch=c000003e syscall=72 success=yes exit=0 a0=b a1=6 a2=7fff7c9cf4d0 a3=636f6c2f6b636f6c items=0 ppid=20605 pid=20787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ctdb_recovered" exe="/usr/sbin/ctdbd" subj=system_u:system_r:ctdbd_t:s0 key=(null) >type=SERVICE_START msg=audit(1434465805.725:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="smb" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >type=AVC msg=audit(1434465807.913:1594): avc: denied { getattr } for pid=21223 comm="stat" path="/gluster/lock/lockfile" dev="fuse" ino=11902173533042449254 scontext=system_u:system_r:ctdbd_t:s0 tcontext=system_u:object_r:fusefs_t:s0 tclass=file >type=SYSCALL msg=audit(1434465807.913:1594): arch=c000003e syscall=6 success=yes exit=0 a0=7fff62a88f33 a1=7fff62a87e40 a2=7fff62a87e40 a3=7fff62a87b90 items=0 ppid=21220 pid=21223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="stat" exe="/usr/bin/stat" subj=system_u:system_r:ctdbd_t:s0 key=(null)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1224879
:
1037555
|
1039536
|
1039537
|
1039538
| 1039539 |
1039540
|
1052256