Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 159712 Details for
Bug 174855
Need SELinux policy for Admin Server
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Output of: grep avc /var/log/audit/audit.log |grep -v 'dmidecode\|ping\|netstat'
audit.grep (text/plain), 12.76 KB, created by
David Keegel
on 2007-07-20 23:13:24 UTC
(
hide
)
Description:
Output of: grep avc /var/log/audit/audit.log |grep -v 'dmidecode\|ping\|netstat'
Filename:
MIME Type:
Creator:
David Keegel
Created:
2007-07-20 23:13:24 UTC
Size:
12.76 KB
patch
obsolete
>type=AVC msg=audit(1184651881.690:2956): avc: denied { write } for pid=11137 comm="httpd.worker" name="ds.conf" dev=dm-2 ino=460102 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184651881.690:2956): avc: denied { read write } for pid=11137 comm="httpd.worker" name="[438010]" dev=sockfs ino=438010 scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=tcp_socket >type=AVC msg=audit(1184651881.698:2957): avc: denied { write } for pid=11139 comm="httpd.worker" name="fileMwDViI" dev=dm-3 ino=6161 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184651881.698:2957): avc: denied { write } for pid=11139 comm="httpd.worker" name="fileMwDViI" dev=dm-3 ino=6161 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184651881.698:2957): avc: denied { write } for pid=11139 comm="httpd.worker" name="ds.conf" dev=dm-2 ino=460102 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184651881.698:2957): avc: denied { read write } for pid=11139 comm="httpd.worker" name="[438010]" dev=sockfs ino=438010 scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=tcp_socket >type=AVC msg=audit(1184651881.734:2958): avc: denied { execstack } for pid=11139 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184651923.971:2959): avc: denied { write } for pid=11182 comm="httpd.worker" name="fileMwDViI" dev=dm-3 ino=6161 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184651923.971:2959): avc: denied { write } for pid=11182 comm="httpd.worker" name="fileMwDViI" dev=dm-3 ino=6161 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184651923.999:2960): avc: denied { execstack } for pid=11182 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184655262.970:2986): avc: denied { execstack } for pid=11893 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184655401.532:2987): avc: denied { execstack } for pid=11939 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184655483.563:2988): avc: denied { execstack } for pid=11977 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184655785.095:3006): avc: denied { execstack } for pid=12091 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184655789.763:3007): avc: denied { execstack } for pid=12105 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184655814.317:3008): avc: denied { execstack } for pid=12120 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184656232.977:3009): avc: denied { execstack } for pid=12304 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184656390.547:3010): avc: denied { execstack } for pid=12340 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184656441.539:3011): avc: denied { execstack } for pid=12350 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184659021.256:3096): avc: denied { execstack } for pid=13038 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184737604.108:3339): avc: denied { write } for pid=20470 comm="httpd.worker" name="ds.conf" dev=dm-2 ino=296262 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184737604.108:3339): avc: denied { read write } for pid=20470 comm="httpd.worker" name="[501352]" dev=sockfs ino=501352 scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=tcp_socket >type=AVC msg=audit(1184737604.116:3340): avc: denied { write } for pid=20472 comm="httpd.worker" name="fileSqPoQK" dev=dm-3 ino=6163 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184737604.116:3340): avc: denied { write } for pid=20472 comm="httpd.worker" name="fileSqPoQK" dev=dm-3 ino=6163 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184737604.116:3340): avc: denied { write } for pid=20472 comm="httpd.worker" name="ds.conf" dev=dm-2 ino=296262 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184737604.116:3340): avc: denied { read write } for pid=20472 comm="httpd.worker" name="[501352]" dev=sockfs ino=501352 scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=tcp_socket >type=AVC msg=audit(1184737604.240:3341): avc: denied { execstack } for pid=20472 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184817337.309:3652): avc: denied { execstack } for pid=26727 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184818038.910:3659): avc: denied { execstack } for pid=26834 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184818061.309:3660): avc: denied { execstack } for pid=26839 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184897833.986:4009): avc: denied { write } for pid=1013 comm="httpd.worker" name="ds.conf" dev=dm-2 ino=98908 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184897833.986:4009): avc: denied { read write } for pid=1013 comm="httpd.worker" name="[597649]" dev=sockfs ino=597649 scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=tcp_socket >type=AVC msg=audit(1184897833.994:4010): avc: denied { write } for pid=1015 comm="httpd.worker" name="fileuB8HbR" dev=dm-3 ino=6165 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184897833.994:4010): avc: denied { write } for pid=1015 comm="httpd.worker" name="fileuB8HbR" dev=dm-3 ino=6165 scontext=root:system_r:httpd_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184897833.994:4010): avc: denied { write } for pid=1015 comm="httpd.worker" name="ds.conf" dev=dm-2 ino=98908 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184897833.994:4010): avc: denied { read write } for pid=1015 comm="httpd.worker" name="[597649]" dev=sockfs ino=597649 scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=tcp_socket >type=AVC msg=audit(1184897834.130:4011): avc: denied { execstack } for pid=1015 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184908382.000:4030): avc: denied { execstack } for pid=2538 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184909091.205:4031): avc: denied { execstack } for pid=2719 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184909426.095:4032): avc: denied { append } for pid=2901 comm="restorecon" name="fedora-ds.fix.check" dev=dm-3 ino=6164 scontext=root:system_r:restorecon_t tcontext=root:object_r:tmp_t tclass=file >type=AVC msg=audit(1184909527.252:4033): avc: denied { execstack } for pid=2945 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184909571.809:4034): avc: granted { setenforce } for pid=2957 comm="setenforce" scontext=root:system_r:unconfined_t tcontext=system_u:object_r:security_t tclass=security >type=AVC msg=audit(1184909582.756:4035): avc: denied { execstack } for pid=2969 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184909582.876:4036): avc: denied { sys_nice } for pid=2969 comm="httpd.worker" capability=23 scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=capability >type=AVC msg=audit(1184909582.900:4037): avc: denied { write } for pid=2969 comm="httpd.worker" name="logs" dev=dm-2 ino=65546 scontext=root:system_r:httpd_t tcontext=system_u:object_r:usr_t tclass=dir >type=AVC msg=audit(1184909582.900:4037): avc: denied { add_name } for pid=2969 comm="httpd.worker" name="error" scontext=root:system_r:httpd_t tcontext=system_u:object_r:usr_t tclass=dir >type=AVC msg=audit(1184909582.900:4037): avc: denied { create } for pid=2969 comm="httpd.worker" name="error" scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184909583.052:4038): avc: denied { signal } for pid=2968 comm="strace" scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=process >type=AVC msg=audit(1184909583.056:4039): avc: denied { search } for pid=2969 comm="httpd.worker" name="alias" dev=dm-2 ino=65547 scontext=root:system_r:httpd_t tcontext=system_u:object_r:slapd_cert_t tclass=dir >type=AVC msg=audit(1184909583.056:4040): avc: denied { getattr } for pid=2969 comm="httpd.worker" name="secmod.db" dev=dm-2 ino=66267 scontext=root:system_r:httpd_t tcontext=root:object_r:slapd_cert_t tclass=file >type=AVC msg=audit(1184909583.056:4041): avc: denied { read } for pid=2969 comm="httpd.worker" name="secmod.db" dev=dm-2 ino=66267 scontext=root:system_r:httpd_t tcontext=root:object_r:slapd_cert_t tclass=file >type=AVC msg=audit(1184909583.240:4046): avc: denied { lock } for pid=2969 comm="httpd.worker" name="local.conf" dev=dm-2 ino=66291 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184909583.252:4047): avc: denied { append } for pid=2969 comm="httpd.worker" name="error" dev=dm-2 ino=66292 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184909584.012:4048): avc: denied { create } for pid=2973 comm="httpd.worker" name="cgisock" scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=sock_file >type=AVC msg=audit(1184909584.012:4049): avc: denied { setattr } for pid=2973 comm="httpd.worker" name="cgisock" dev=dm-2 ino=66295 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=sock_file >type=AVC msg=audit(1184909584.200:4050): avc: denied { write } for pid=2972 comm="httpd.worker" name="pid" dev=dm-2 ino=66296 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184909647.400:4051): avc: denied { signal } for pid=2968 comm="strace" scontext=root:system_r:httpd_t tcontext=root:system_r:unconfined_t tclass=process >type=AVC msg=audit(1184909713.024:4052): avc: denied { execstack } for pid=3105 comm="httpd.worker" scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=process >type=AVC msg=audit(1184909713.116:4053): avc: denied { sys_nice } for pid=3105 comm="httpd.worker" capability=23 scontext=root:system_r:httpd_t tcontext=root:system_r:httpd_t tclass=capability >type=AVC msg=audit(1184909716.640:4054): avc: denied { write } for pid=2972 comm="httpd.worker" name="logs" dev=dm-2 ino=65546 scontext=root:system_r:httpd_t tcontext=system_u:object_r:usr_t tclass=dir >type=AVC msg=audit(1184909716.640:4054): avc: denied { remove_name } for pid=2972 comm="httpd.worker" name="pid" dev=dm-2 ino=66296 scontext=root:system_r:httpd_t tcontext=system_u:object_r:usr_t tclass=dir >type=AVC msg=audit(1184909716.640:4054): avc: denied { unlink } for pid=2972 comm="httpd.worker" name="pid" dev=dm-2 ino=66296 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=file >type=AVC msg=audit(1184909729.003:4059): avc: denied { unlink } for pid=3134 comm="httpd.worker" name="cgisock" dev=dm-2 ino=66295 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=sock_file >type=AVC msg=audit(1184909729.003:4060): avc: denied { add_name } for pid=3134 comm="httpd.worker" name="cgisock" scontext=root:system_r:httpd_t tcontext=system_u:object_r:usr_t tclass=dir >type=AVC msg=audit(1184909729.003:4060): avc: denied { create } for pid=3134 comm="httpd.worker" name="cgisock" scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=sock_file >type=AVC msg=audit(1184909729.003:4061): avc: denied { setattr } for pid=3134 comm="httpd.worker" name="cgisock" dev=dm-2 ino=66295 scontext=root:system_r:httpd_t tcontext=root:object_r:usr_t tclass=sock_file
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 174855
:
121782
|
121783
| 159712