Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 855466 Details for
Bug 1057895
[abrt] ekiga: PAssertAction(): ekiga killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: var_log_messages
var_log_messages (text/plain), 8.87 KB, created by
Michael S.
on 2014-01-25 20:24:12 UTC
(
hide
)
Description:
File: var_log_messages
Filename:
MIME Type:
Creator:
Michael S.
Created:
2014-01-25 20:24:12 UTC
Size:
8.87 KB
patch
obsolete
>[System Logs]: >janv. 25 18:34:25 liliana.cdg.redhat.com setroubleshoot[19110]: dbus avc(node=liliana.cdg.redhat.com type=AVC msg=audit(1390671261.189:5705): avc: denied { name_bind } for pid=19099 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket > node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390671261.189:5705): arch=c000003e syscall=49 success=yes exit=0 a0=25 a1=7fff65b61770 a2=10 a3=7fff65b6172c items=0 ppid=19083 pid=19099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 18:34:25 liliana.cdg.redhat.com setroubleshoot[19110]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=AVC msg=audit(1390671261.189:5705): avc: denied { name_bind } for pid=19099 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket >janv. 25 18:34:25 liliana.cdg.redhat.com setroubleshoot[19110]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390671261.189:5705): arch=c000003e syscall=49 success=yes exit=0 a0=25 a1=7fff65b61770 a2=10 a3=7fff65b6172c items=0 ppid=19083 pid=19099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 18:34:25 liliana.cdg.redhat.com setroubleshoot[19110]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . For complete SELinux messages. run sealert -l 7162f53e-8fc1-4c62-bf0b-257618ff63fa >janv. 25 18:34:25 liliana.cdg.redhat.com python[19110]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . > If you believe that ekiga should be allowed name_bind access on the tcp_socket by default. > # grep ekiga /var/log/audit/audit.log | audit2allow -M mypol >janv. 25 18:34:29 liliana.cdg.redhat.com setroubleshoot[19110]: dbus avc(node=liliana.cdg.redhat.com type=AVC msg=audit(1390671269.556:5706): avc: denied { name_bind } for pid=19099 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket > node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390671269.556:5706): arch=c000003e syscall=49 success=yes exit=0 a0=25 a1=7fff65b61f10 a2=10 a3=7fff65b61ecc items=0 ppid=19083 pid=19099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 18:34:29 liliana.cdg.redhat.com setroubleshoot[19110]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=AVC msg=audit(1390671269.556:5706): avc: denied { name_bind } for pid=19099 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket >janv. 25 18:34:29 liliana.cdg.redhat.com setroubleshoot[19110]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390671269.556:5706): arch=c000003e syscall=49 success=yes exit=0 a0=25 a1=7fff65b61f10 a2=10 a3=7fff65b61ecc items=0 ppid=19083 pid=19099 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 18:34:29 liliana.cdg.redhat.com setroubleshoot[19110]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . For complete SELinux messages. run sealert -l 7162f53e-8fc1-4c62-bf0b-257618ff63fa >janv. 25 18:34:29 liliana.cdg.redhat.com python[19110]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . > If you believe that ekiga should be allowed name_bind access on the tcp_socket by default. > # grep ekiga /var/log/audit/audit.log | audit2allow -M mypol >janv. 25 21:00:34 liliana.cdg.redhat.com setroubleshoot[20225]: dbus avc(node=liliana.cdg.redhat.com type=AVC msg=audit(1390680030.303:5744): avc: denied { name_bind } for pid=20214 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket > node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390680030.303:5744): arch=c000003e syscall=49 success=yes exit=0 a0=24 a1=7fff19acc3e0 a2=10 a3=7fff19acc39c items=0 ppid=20198 pid=20214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 21:00:34 liliana.cdg.redhat.com setroubleshoot[20225]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=AVC msg=audit(1390680030.303:5744): avc: denied { name_bind } for pid=20214 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket >janv. 25 21:00:34 liliana.cdg.redhat.com setroubleshoot[20225]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390680030.303:5744): arch=c000003e syscall=49 success=yes exit=0 a0=24 a1=7fff19acc3e0 a2=10 a3=7fff19acc39c items=0 ppid=20198 pid=20214 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 21:00:35 liliana.cdg.redhat.com setroubleshoot[20225]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . For complete SELinux messages. run sealert -l 7162f53e-8fc1-4c62-bf0b-257618ff63fa >janv. 25 21:00:35 liliana.cdg.redhat.com python[20225]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . > If you believe that ekiga should be allowed name_bind access on the tcp_socket by default. > # grep ekiga /var/log/audit/audit.log | audit2allow -M mypol >janv. 25 21:01:36 liliana.cdg.redhat.com abrt-hook-ccpp[20445]: Saved core dump of pid 20214 (/usr/bin/ekiga) to /var/tmp/abrt/ccpp-2014-01-25-21:01:34-20214 (158019584 bytes) >janv. 25 21:01:44 liliana.cdg.redhat.com setroubleshoot[20491]: dbus avc(node=liliana.cdg.redhat.com type=AVC msg=audit(1390680099.718:5753): avc: denied { name_bind } for pid=20469 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket > node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390680099.718:5753): arch=c000003e syscall=49 success=yes exit=0 a0=24 a1=7fff24b10c30 a2=10 a3=7fff24b10bec items=0 ppid=20198 pid=20469 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 21:01:44 liliana.cdg.redhat.com setroubleshoot[20491]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=AVC msg=audit(1390680099.718:5753): avc: denied { name_bind } for pid=20469 comm="ekiga" src=1720 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:asterisk_port_t:s0 tclass=tcp_socket >janv. 25 21:01:44 liliana.cdg.redhat.com setroubleshoot[20491]: AuditRecordReceiver.add_record_to_cache(): node=liliana.cdg.redhat.com type=SYSCALL msg=audit(1390680099.718:5753): arch=c000003e syscall=49 success=yes exit=0 a0=24 a1=7fff24b10c30 a2=10 a3=7fff24b10bec items=0 ppid=20198 pid=20469 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 ses=1 tty=pts4 comm="ekiga" exe="/usr/bin/ekiga" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) >janv. 25 21:01:45 liliana.cdg.redhat.com setroubleshoot[20491]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . For complete SELinux messages. run sealert -l 7162f53e-8fc1-4c62-bf0b-257618ff63fa >janv. 25 21:01:45 liliana.cdg.redhat.com python[20491]: SELinux is preventing /usr/bin/ekiga from name_bind access on the tcp_socket . > If you believe that ekiga should be allowed name_bind access on the tcp_socket by default. > # grep ekiga /var/log/audit/audit.log | audit2allow -M mypol >[User Logs]:
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1057895
:
855457
|
855458
|
855459
|
855460
|
855461
|
855462
|
855463
|
855464
|
855465
| 855466