Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 585272 Details for
Bug 718273
Need policy for gridengine mpi jobs
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
sge denials
audit-sge.log (text/plain), 22.68 KB, created by
Orion Poplawski
on 2012-05-17 16:54:32 UTC
(
hide
)
Description:
sge denials
Filename:
MIME Type:
Creator:
Orion Poplawski
Created:
2012-05-17 16:54:32 UTC
Size:
22.68 KB
patch
obsolete
>type=AVC msg=audit(1337271736.510:54521): avc: denied { name_bind } for pid=30201 comm="sge_execd" src=6445 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337271736.612:54522): avc: denied { name_connect } for pid=30201 comm="sge_execd" dest=6444 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337271738.632:54523): avc: denied { sys_ptrace } for pid=30209 comm="ps" capability=19 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:system_r:sge_execd_t:s0 tclass=capability >type=AVC msg=audit(1337272284.010:54532): avc: denied { sys_ptrace } for pid=30201 comm="sge_execd" capability=19 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:system_r:sge_execd_t:s0 tclass=capability >type=AVC msg=audit(1337272284.962:54533): avc: denied { setpgid } for pid=30954 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272284.963:54534): avc: denied { setsched } for pid=30955 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272284.963:54535): avc: denied { setrlimit } for pid=30955 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272285.067:54536): avc: denied { getattr } for pid=30955 comm="sge_shepherd" path="/usr/sbin/sshd" dev=dm-0 ino=172848 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.068:54537): avc: denied { node_bind } for pid=30955 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337272285.069:54538): avc: denied { name_connect } for pid=30955 comm="sge_shepherd" dest=58160 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337272285.143:54539): avc: denied { execute } for pid=30955 comm="sge_shepherd" name="sshd" dev=dm-0 ino=172848 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.143:54539): avc: denied { read open } for pid=30955 comm="sge_shepherd" name="sshd" dev=dm-0 ino=172848 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.143:54539): avc: denied { execute_no_trans } for pid=30955 comm="sge_shepherd" path="/usr/sbin/sshd" dev=dm-0 ino=172848 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:sshd_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.147:54540): avc: denied { read } for pid=30955 comm="sshd" name="ssh_host_rsa_key" dev=dm-0 ino=1496 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=file >type=AVC msg=audit(1337272285.147:54540): avc: denied { open } for pid=30955 comm="sshd" name="ssh_host_rsa_key" dev=dm-0 ino=1496 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=file >type=AVC msg=audit(1337272285.147:54541): avc: denied { getattr } for pid=30955 comm="sshd" path="/etc/ssh/ssh_host_rsa_key" dev=dm-0 ino=1496 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:sshd_key_t:s0 tclass=file >type=AVC msg=audit(1337272285.215:54542): avc: denied { create } for pid=30960 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=netlink_audit_socket >type=AVC msg=audit(1337272285.215:54543): avc: denied { nlmsg_relay } for pid=30960 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=netlink_audit_socket >type=AVC msg=audit(1337272285.215:54543): avc: denied { audit_write } for pid=30960 comm="sshd" capability=29 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=capability >type=AVC msg=audit(1337272285.216:54546): avc: denied { sys_chroot } for pid=30960 comm="sshd" capability=18 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=capability >type=AVC msg=audit(1337272285.401:54552): avc: denied { execute } for pid=30965 comm="sshd" name="unix_chkpwd" dev=dm-0 ino=390516 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.401:54552): avc: denied { read open } for pid=30965 comm="sshd" name="unix_chkpwd" dev=dm-0 ino=390516 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.401:54552): avc: denied { execute_no_trans } for pid=30965 comm="sshd" path="/sbin/unix_chkpwd" dev=dm-0 ino=390516 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.405:54553): avc: denied { read } for pid=30965 comm="unix_chkpwd" name="shadow" dev=dm-0 ino=1492 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file >type=AVC msg=audit(1337272285.405:54553): avc: denied { open } for pid=30965 comm="unix_chkpwd" name="shadow" dev=dm-0 ino=1492 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file >type=AVC msg=audit(1337272285.406:54554): avc: denied { getattr } for pid=30965 comm="unix_chkpwd" path="/etc/shadow" dev=dm-0 ino=1492 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file >type=AVC msg=audit(1337272285.434:54555): avc: denied { name_connect } for pid=30955 comm="sshd" dest=389 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:ldap_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337272285.471:54560): avc: denied { audit_control } for pid=30955 comm="sshd" capability=30 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=capability >type=AVC msg=audit(1337272285.475:54562): avc: denied { write } for pid=30955 comm="sshd" name="user" dev=selinuxfs ino=9 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=file >type=AVC msg=audit(1337272285.475:54563): avc: denied { compute_user } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security >type=AVC msg=audit(1337272285.528:54564): avc: denied { read } for pid=30955 comm="sshd" name="unconfined_u" dev=dm-0 ino=1462 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file >type=AVC msg=audit(1337272285.528:54564): avc: denied { open } for pid=30955 comm="sshd" name="unconfined_u" dev=dm-0 ino=1462 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file >type=AVC msg=audit(1337272285.528:54565): avc: denied { getattr } for pid=30955 comm="sshd" path="/etc/selinux/targeted/contexts/users/unconfined_u" dev=dm-0 ino=1462 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:default_context_t:s0 tclass=file >type=AVC msg=audit(1337272285.529:54566): avc: denied { write } for pid=30955 comm="sshd" name="context" dev=selinuxfs ino=5 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=file >type=AVC msg=audit(1337272285.529:54567): avc: denied { check_context } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security >type=AVC msg=audit(1337272285.530:54568): avc: denied { compute_av } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:security_t:s0 tclass=security >type=AVC msg=audit(1337272285.531:54569): avc: denied { create } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=netlink_audit_socket >type=AVC msg=audit(1337272285.532:54570): avc: denied { nlmsg_relay } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=netlink_audit_socket >type=AVC msg=audit(1337272285.532:54570): avc: denied { audit_write } for pid=30955 comm="sshd" capability=29 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=capability >type=AVC msg=audit(1337272285.543:54572): avc: denied { write } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=key >type=AVC msg=audit(1337272285.547:54573): avc: denied { setrlimit } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272285.547:54573): avc: denied { sys_resource } for pid=30955 comm="sshd" capability=24 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=capability >type=AVC msg=audit(1337272285.547:54574): avc: denied { setsched } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272285.547:54575): avc: denied { read } for pid=30955 comm="sshd" name="utmp" dev=dm-0 ino=390163 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file >type=AVC msg=audit(1337272285.547:54575): avc: denied { open } for pid=30955 comm="sshd" name="utmp" dev=dm-0 ino=390163 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file >type=AVC msg=audit(1337272285.547:54576): avc: denied { lock } for pid=30955 comm="sshd" path="/var/run/utmp" dev=dm-0 ino=390163 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file >type=AVC msg=audit(1337272285.608:54582): avc: denied { getattr } for pid=30966 comm="sshd" path="/usr/bin/xauth" dev=dm-0 ino=136411 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:xauth_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.609:54583): avc: denied { name_bind } for pid=30966 comm="sshd" src=6010 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:xserver_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337272285.609:54583): avc: denied { node_bind } for pid=30966 comm="sshd" saddr=::1 src=6010 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337272285.619:54586): avc: denied { read } for pid=30968 comm="xauth" path="pipe:[515779]" dev=pipefs ino=515779 scontext=unconfined_u:system_r:xauth_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=fifo_file >type=AVC msg=audit(1337272285.619:54586): avc: denied { write } for pid=30968 comm="xauth" path="pipe:[515771]" dev=pipefs ino=515771 scontext=unconfined_u:system_r:xauth_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=fifo_file >type=AVC msg=audit(1337272285.613:54587): avc: denied { sigchld } for pid=30967 comm="sshd" scontext=unconfined_u:system_r:xauth_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272285.630:54588): avc: denied { getattr } for pid=30968 comm="xauth" path="pipe:[515779]" dev=pipefs ino=515779 scontext=unconfined_u:system_r:xauth_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=fifo_file >type=AVC msg=audit(1337272285.955:54589): avc: denied { sys_ptrace } for pid=30201 comm="sge_execd" capability=19 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:system_r:sge_execd_t:s0 tclass=capability >type=AVC msg=audit(1337272299.007:54590): avc: denied { sys_ptrace } for pid=30201 comm="sge_execd" capability=19 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:system_r:sge_execd_t:s0 tclass=capability >type=AVC msg=audit(1337272689.800:54592): avc: denied { setexec } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272689.800:54593): avc: denied { write } for pid=30955 comm="sshd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=key >type=AVC msg=audit(1337272689.806:54600): avc: denied { name_connect } for pid=30954 comm="sge_shepherd" dest=58160 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337271515.629:1671): avc: denied { name_bind } for pid=24363 comm="sge_execd" src=6445 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337271515.931:1672): avc: denied { name_connect } for pid=24363 comm="sge_execd" dest=6444 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337271517.963:1673): avc: denied { sys_ptrace } for pid=24371 comm="ps" capability=19 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:system_r:sge_execd_t:s0 tclass=capability >type=AVC msg=audit(1337272033.927:1680): avc: denied { sys_ptrace } for pid=24363 comm="sge_execd" capability=19 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:system_r:sge_execd_t:s0 tclass=capability >type=AVC msg=audit(1337272284.034:1689): avc: denied { setpgid } for pid=25216 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272284.038:1690): avc: denied { setsched } for pid=25217 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272284.038:1691): avc: denied { setrlimit } for pid=25217 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272284.154:1692): avc: denied { open } for pid=25217 comm="sge_shepherd" name="runwrf.po25590" dev=0:1b ino=241434648 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=file >type=AVC msg=audit(1337272285.086:1693): avc: denied { read } for pid=25261 comm="ssh" name="libso" dev=0:1c ino=1819087 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=lnk_file >type=AVC msg=audit(1337272285.128:1694): avc: denied { open } for pid=25261 comm="ssh" name="config" dev=0:1d ino=12313099 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=file >type=AVC msg=audit(1337272285.142:1695): avc: denied { name_connect } for pid=25261 comm="ssh" dest=36402 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337272285.288:1696): avc: denied { getattr } for pid=25261 comm="ssh" path="/usr/libexec/openssh/ssh-keysign" dev=dm-0 ino=402176 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.294:1697): avc: denied { execute } for pid=25262 comm="ssh" name="ssh-keysign" dev=dm-0 ino=402176 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.294:1697): avc: denied { read open } for pid=25262 comm="ssh" name="ssh-keysign" dev=dm-0 ino=402176 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.294:1697): avc: denied { execute_no_trans } for pid=25262 comm="ssh" path="/usr/libexec/openssh/ssh-keysign" dev=dm-0 ino=402176 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:ssh_keysign_exec_t:s0 tclass=file >type=AVC msg=audit(1337272285.574:1698): avc: denied { write } for pid=25265 comm="xauth" name="orion" dev=0:1d ino=12308737 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=dir >type=AVC msg=audit(1337272285.574:1698): avc: denied { add_name } for pid=25265 comm="xauth" name=".Xauthority-c" scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=dir >type=AVC msg=audit(1337272285.574:1698): avc: denied { create } for pid=25265 comm="xauth" name=".Xauthority-c" scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=unconfined_u:object_r:nfs_t:s0 tclass=file >type=AVC msg=audit(1337272285.577:1699): avc: denied { link } for pid=25265 comm="xauth" name=".Xauthority-c" dev=0:1d ino=12311817 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=file >type=AVC msg=audit(1337272285.607:1700): avc: denied { remove_name } for pid=25265 comm="xauth" name=".Xauthority-c" dev=0:1d ino=12311817 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=dir >type=AVC msg=audit(1337272285.607:1700): avc: denied { unlink } for pid=25265 comm="xauth" name=".Xauthority-c" dev=0:1d ino=12311817 scontext=unconfined_u:system_r:sge_job_ssh_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=file >type=AVC msg=audit(1337272297.076:1701): avc: denied { sys_ptrace } for pid=25296 comm="ps" capability=19 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:system_r:sge_execd_t:s0 tclass=capability >type=AVC msg=audit(1337272689.797:1702): avc: denied { sigkill } for pid=25216 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_job_ssh_t:s0 tclass=process >type=AVC msg=audit(1337272689.809:1703): avc: denied { setsched } for pid=25450 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272689.809:1704): avc: denied { setrlimit } for pid=25450 comm="sge_shepherd" scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=unconfined_u:system_r:sge_shepherd_t:s0 tclass=process >type=AVC msg=audit(1337272689.826:1705): avc: denied { open } for pid=25450 comm="sge_shepherd" name="runwrf.po25590" dev=0:1b ino=241434648 scontext=unconfined_u:system_r:sge_shepherd_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=file >type=AVC msg=audit(1337272717.402:1706): avc: denied { execute } for pid=25457 comm="sge_execd" name="mailx" dev=dm-0 ino=131046 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file >type=AVC msg=audit(1337272717.402:1706): avc: denied { read open } for pid=25457 comm="sge_execd" name="mailx" dev=dm-0 ino=131046 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file >type=AVC msg=audit(1337272717.402:1706): avc: denied { execute_no_trans } for pid=25457 comm="sge_execd" path="/bin/mailx" dev=dm-0 ino=131046 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file >type=AVC msg=audit(1337272717.451:1707): avc: denied { search } for pid=25466 comm="sendmail" name="clientmqueue" dev=dm-0 ino=131497 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir >type=AVC msg=audit(1337272717.451:1708): avc: denied { getattr } for pid=25466 comm="sendmail" path="/var/spool/clientmqueue" dev=dm-0 ino=131497 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir >type=AVC msg=audit(1337272717.454:1709): avc: denied { getattr } for pid=25466 comm="sendmail" name="/" dev=dm-0 ino=2 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem >type=AVC msg=audit(1337272717.454:1710): avc: denied { write } for pid=25466 comm="sendmail" name="clientmqueue" dev=dm-0 ino=131497 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir >type=AVC msg=audit(1337272717.454:1710): avc: denied { add_name } for pid=25466 comm="sendmail" name="dfq4HGcbFO025466" scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir >type=AVC msg=audit(1337272717.454:1710): avc: denied { create } for pid=25466 comm="sendmail" name="dfq4HGcbFO025466" scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:object_r:mqueue_spool_t:s0 tclass=file >type=AVC msg=audit(1337272717.454:1710): avc: denied { read write open } for pid=25466 comm="sendmail" name="dfq4HGcbFO025466" dev=dm-0 ino=130925 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:object_r:mqueue_spool_t:s0 tclass=file >type=AVC msg=audit(1337272717.454:1711): avc: denied { getattr } for pid=25466 comm="sendmail" path="/var/spool/clientmqueue/dfq4HGcbFO025466" dev=dm-0 ino=130925 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:object_r:mqueue_spool_t:s0 tclass=file >type=AVC msg=audit(1337272717.454:1712): avc: denied { lock } for pid=25466 comm="sendmail" path="/var/spool/clientmqueue/dfq4HGcbFO025466" dev=dm-0 ino=130925 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:object_r:mqueue_spool_t:s0 tclass=file >type=AVC msg=audit(1337272717.533:1713): avc: denied { name_connect } for pid=25466 comm="sendmail" dest=25 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:smtp_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1337272717.878:1714): avc: denied { remove_name } for pid=25466 comm="sendmail" name="dfq4HGcbFO025466" dev=dm-0 ino=130925 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir >type=AVC msg=audit(1337272717.878:1714): avc: denied { unlink } for pid=25466 comm="sendmail" name="dfq4HGcbFO025466" dev=dm-0 ino=130925 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=unconfined_u:object_r:mqueue_spool_t:s0 tclass=file >type=AVC msg=audit(1337272717.878:1715): avc: denied { read } for pid=25466 comm="sendmail" name="clientmqueue" dev=dm-0 ino=131497 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir >type=AVC msg=audit(1337272717.878:1715): avc: denied { open } for pid=25466 comm="sendmail" name="clientmqueue" dev=dm-0 ino=131497 scontext=unconfined_u:system_r:sge_execd_t:s0 tcontext=system_u:object_r:mqueue_spool_t:s0 tclass=dir
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 718273
:
515036
|
515332
|
515340
|
515700
|
515752
|
515863
|
516220
|
516857
|
517666
|
519573
|
519703
|
521650
|
521702
|
522118
|
522197
|
522902
|
523012
|
542622
|
544698
| 585272