Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 298461 Details for
Bug 429281
SElinux preventing fail2ban from starting
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
audit log file
audit.log (text/plain), 3.12 KB, created by
JM
on 2008-03-18 23:12:25 UTC
(
hide
)
Description:
audit log file
Filename:
MIME Type:
Creator:
JM
Created:
2008-03-18 23:12:25 UTC
Size:
3.12 KB
patch
obsolete
>type=DAEMON_ROTATE msg=audit(1205881693.919:2359): auditd sending auid=0 pid=3585 subj=root:system_r:initrc_t:s0 >type=AVC msg=audit(1205881715.680:397): avc: denied { getattr } for pid=3631 comm="gam_server" name="mtab" dev=dm-0 ino=1665630 scontext=root:system_r:fail2ban_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file >type=SYSCALL msg=audit(1205881715.680:397): arch=c000003e syscall=4 success=yes exit=0 a0=413940 a1=7fff670ec500 a2=7fff670ec500 a3=7 items=0 ppid=1 pid=3631 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=root:system_r:fail2ban_t:s0 key=(null) >type=AVC_PATH msg=audit(1205881715.680:397): path="/etc/mtab" >type=AVC msg=audit(1205881715.682:398): avc: denied { read } for pid=3631 comm="gam_server" name="mtab" dev=dm-0 ino=1665630 scontext=root:system_r:fail2ban_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file >type=SYSCALL msg=audit(1205881715.682:398): arch=c000003e syscall=2 success=yes exit=3 a0=413940 a1=0 a2=61c090 a3=0 items=0 ppid=1 pid=3631 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="gam_server" exe="/usr/libexec/gam_server" subj=root:system_r:fail2ban_t:s0 key=(null) >type=AVC msg=audit(1205881715.730:399): avc: denied { connectto } for pid=3629 comm="fail2ban-server" path=002F746D702F66616D2D726F6F742D000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 scontext=root:system_r:fail2ban_t:s0 tcontext=root:system_r:fail2ban_t:s0 tclass=unix_stream_socket >type=SYSCALL msg=audit(1205881715.730:399): arch=c000003e syscall=42 success=yes exit=0 a0=6 a1=413febc0 a2=6e a3=0 items=0 ppid=1 pid=3629 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="fail2ban-server" exe="/usr/bin/python" subj=root:system_r:fail2ban_t:s0 key=(null) >type=AVC msg=audit(1205881715.789:400): avc: denied { read write } for pid=3664 comm="iptables" name="[15663]" dev=sockfs ino=15663 scontext=root:system_r:iptables_t:s0 tcontext=root:system_r:fail2ban_t:s0 tclass=unix_stream_socket >type=SYSCALL msg=audit(1205881715.789:400): arch=c000003e syscall=59 success=yes exit=0 a0=8c9eb0 a1=8ca3a0 a2=8c89e0 a3=32925529f0 items=0 ppid=3663 pid=3664 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="iptables" exe="/sbin/iptables" subj=root:system_r:iptables_t:s0 key=(null) >type=AVC_PATH msg=audit(1205881715.789:400): path="socket:[15663]" >type=AVC msg=audit(1205881715.814:401): avc: denied { read write } for pid=3669 comm="mail" name="[15663]" dev=sockfs ino=15663 scontext=root:system_r:system_mail_t:s0 tcontext=root:system_r:fail2ban_t:s0 tclass=unix_stream_socket >type=SYSCALL msg=audit(1205881715.814:401): arch=c000003e syscall=59 success=yes exit=0 a0=8c8f70 a1=8ca070 a2=8c89f0 a3=8 items=0 ppid=3667 pid=3669 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="mail" exe="/bin/mail" subj=root:system_r:system_mail_t:s0 key=(null) >type=AVC_PATH msg=audit(1205881715.814:401): path="socket:[15663]"
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 429281
:
293664
|
293665
|
293666
|
298458
| 298461