Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 861504 Details for
Bug 1063423
[abrt] tog-pegasus: g_malloc(): cimprovagt killed by SIGTRAP
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: var_log_messages
var_log_messages (text/plain), 50.67 KB, created by
Alois Mahdal
on 2014-02-10 17:10:42 UTC
(
hide
)
Description:
File: var_log_messages
Filename:
MIME Type:
Creator:
Alois Mahdal
Created:
2014-02-10 17:10:42 UTC
Size:
50.67 KB
patch
obsolete
>[System Logs]: >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1138): avc: denied { create } for pid=6875 comm="cimprovagt" name=".bash_logout" scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1138): avc: denied { write open } for pid=6875 comm="cimprovagt" path="/home/lmishell-userCD18LMEZO7ALI3RMWI/.bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1138): arch=c000003e syscall=257 success=yes exit=14 a0=b a1=7f79428088d3 a2=200c1 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1139): avc: denied { setattr } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1139): arch=c000003e syscall=93 success=yes exit=0 a0=e a1=3e9 a2=3e9 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1139): avc: denied { setattr } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1139): arch=c000003e syscall=93 success=yes exit=0 a0=e a1=3e9 a2=3e9 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file shadow-. For complete SELinux messages. run sealert -l 928d0cd8-d595-4aa1-8a70-1a620ebf105b >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1140): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="lmishell-userCD18LMEZO7ALI3RMWI" dev="dm-1" ino=21239350 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1140): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=3e9 a2=3e9 a3=c items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1140): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="lmishell-userCD18LMEZO7ALI3RMWI" dev="dm-1" ino=21239350 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1140): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=3e9 a2=3e9 a3=c items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file shadow-. > If you believe that cimprovagt should be allowed setattr access on the shadow- file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory lmishell-userCD18LMEZO7ALI3RMWI. For complete SELinux messages. run sealert -l 803dafe5-df81-49ed-ac20-ef685a998d66 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory lmishell-userCD18LMEZO7ALI3RMWI. > If you believe that cimprovagt should be allowed create access on the lmishell-userCD18LMEZO7ALI3RMWI directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory .mozilla. For complete SELinux messages. run sealert -l 4e3b3995-62db-40bd-99bf-f70ec2374800 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory .mozilla. > If you believe that cimprovagt should be allowed create access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1150): avc: denied { unlink } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1150): arch=c000003e syscall=263 success=yes exit=0 a0=a a1=7f79427f9693 a2=0 a3=100 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1150): avc: denied { unlink } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1150): arch=c000003e syscall=263 success=yes exit=0 a0=a a1=7f79427f9693 a2=0 a3=100 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from read access on the directory .mozilla. For complete SELinux messages. run sealert -l 77f8b9e0-f701-48a6-8146-ff4de82a28cb >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from read access on the directory .mozilla. > If you believe that cimprovagt should be allowed read access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. For complete SELinux messages. run sealert -l 0aa5fc60-066b-47b4-b264-dcc70291ecd6 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. > If you believe that cimprovagt should be allowed write access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. For complete SELinux messages. run sealert -l 0aa5fc60-066b-47b4-b264-dcc70291ecd6 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. > If you believe that cimprovagt should be allowed write access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory extensions. For complete SELinux messages. run sealert -l f515278b-7385-4dc9-9b9a-2335cd0f3bf3 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory extensions. > If you believe that cimprovagt should be allowed setattr access on the extensions directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. For complete SELinux messages. run sealert -l c1d306bd-5b7d-4bb5-a1c2-bdc33fa5413e >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. > If you believe that cimprovagt should be allowed create access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. For complete SELinux messages. run sealert -l c1d306bd-5b7d-4bb5-a1c2-bdc33fa5413e >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. > If you believe that cimprovagt should be allowed create access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file .bash_logout. For complete SELinux messages. run sealert -l 739ce6c4-1827-447b-8908-e46947ad2ea8 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file .bash_logout. > If you believe that cimprovagt should be allowed setattr access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory lmishell-userCD18LMEZO7ALI3RMWI. For complete SELinux messages. run sealert -l 7ff6779c-7027-4df9-8389-f6e21eabfc9f >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory lmishell-userCD18LMEZO7ALI3RMWI. > If you believe that cimprovagt should be allowed setattr access on the lmishell-userCD18LMEZO7ALI3RMWI directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. For complete SELinux messages. run sealert -l 847374d9-e0b2-4e1d-af8d-e6eec366df76 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. > If you believe that cimprovagt should be allowed remove_name access on the extensions directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. For complete SELinux messages. run sealert -l 847374d9-e0b2-4e1d-af8d-e6eec366df76 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. > If you believe that cimprovagt should be allowed remove_name access on the extensions directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from unlink access on the file .bash_logout. For complete SELinux messages. run sealert -l 9657d64d-664a-4a80-a48a-2d742e628183 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from unlink access on the file .bash_logout. > If you believe that cimprovagt should be allowed unlink access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1258): avc: denied { write } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1258): arch=c000003e syscall=2 success=yes exit=11 a0=7f79427f5600 a1=41 a2=81a4 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1258): avc: denied { write } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1258): arch=c000003e syscall=2 success=yes exit=11 a0=7f79427f5600 a1=41 a2=81a4 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1259): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1259): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=0 a2=0 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1259): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1259): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=0 a2=0 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the file passwd-. For complete SELinux messages. run sealert -l d6761cb1-10bd-49a0-999d-2de6a4120771 >Feb 10 11:51:41 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the file passwd-. > If you believe that cimprovagt should be allowed write access on the passwd- file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:41 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file passwd-. For complete SELinux messages. run sealert -l 35fa33d5-46fa-4e10-ad6e-ddf36edc6709 >Feb 10 11:51:41 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file passwd-. > If you believe that cimprovagt should be allowed setattr access on the passwd- file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >[User Logs]: >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1138): avc: denied { create } for pid=6875 comm="cimprovagt" name=".bash_logout" scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1138): avc: denied { write open } for pid=6875 comm="cimprovagt" path="/home/lmishell-userCD18LMEZO7ALI3RMWI/.bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1138): arch=c000003e syscall=257 success=yes exit=14 a0=b a1=7f79428088d3 a2=200c1 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1139): avc: denied { setattr } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1139): arch=c000003e syscall=93 success=yes exit=0 a0=e a1=3e9 a2=3e9 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1139): avc: denied { setattr } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1139): arch=c000003e syscall=93 success=yes exit=0 a0=e a1=3e9 a2=3e9 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file shadow-. For complete SELinux messages. run sealert -l 928d0cd8-d595-4aa1-8a70-1a620ebf105b >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1140): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="lmishell-userCD18LMEZO7ALI3RMWI" dev="dm-1" ino=21239350 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1140): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=3e9 a2=3e9 a3=c items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051089.896:1140): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="lmishell-userCD18LMEZO7ALI3RMWI" dev="dm-1" ino=21239350 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051089.896:1140): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=3e9 a2=3e9 a3=c items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file shadow-. > If you believe that cimprovagt should be allowed setattr access on the shadow- file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory lmishell-userCD18LMEZO7ALI3RMWI. For complete SELinux messages. run sealert -l 803dafe5-df81-49ed-ac20-ef685a998d66 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory lmishell-userCD18LMEZO7ALI3RMWI. > If you believe that cimprovagt should be allowed create access on the lmishell-userCD18LMEZO7ALI3RMWI directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { remove_name } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1149): avc: denied { rmdir } for pid=6875 comm="cimprovagt" name="extensions" dev="dm-1" ino=610059 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:mozilla_home_t:s0 tclass=dir >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1149): arch=c000003e syscall=263 success=yes exit=0 a0=b a1=7f79428016b3 a2=200 a3=0 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory .mozilla. For complete SELinux messages. run sealert -l 4e3b3995-62db-40bd-99bf-f70ec2374800 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the directory .mozilla. > If you believe that cimprovagt should be allowed create access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1150): avc: denied { unlink } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1150): arch=c000003e syscall=263 success=yes exit=0 a0=a a1=7f79427f9693 a2=0 a3=100 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051090.590:1150): avc: denied { unlink } for pid=6875 comm="cimprovagt" name=".bash_logout" dev="dm-1" ino=21239352 scontext=system_u:system_r:pegasus_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051090.590:1150): arch=c000003e syscall=263 success=yes exit=0 a0=a a1=7f79427f9693 a2=0 a3=100 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from read access on the directory .mozilla. For complete SELinux messages. run sealert -l 77f8b9e0-f701-48a6-8146-ff4de82a28cb >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from read access on the directory .mozilla. > If you believe that cimprovagt should be allowed read access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. For complete SELinux messages. run sealert -l 0aa5fc60-066b-47b4-b264-dcc70291ecd6 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. > If you believe that cimprovagt should be allowed write access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. For complete SELinux messages. run sealert -l 0aa5fc60-066b-47b4-b264-dcc70291ecd6 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the directory .mozilla. > If you believe that cimprovagt should be allowed write access on the .mozilla directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory extensions. For complete SELinux messages. run sealert -l f515278b-7385-4dc9-9b9a-2335cd0f3bf3 >Feb 10 11:51:30 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory extensions. > If you believe that cimprovagt should be allowed setattr access on the extensions directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. For complete SELinux messages. run sealert -l c1d306bd-5b7d-4bb5-a1c2-bdc33fa5413e >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. > If you believe that cimprovagt should be allowed create access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. For complete SELinux messages. run sealert -l c1d306bd-5b7d-4bb5-a1c2-bdc33fa5413e >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from create access on the file .bash_logout. > If you believe that cimprovagt should be allowed create access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file .bash_logout. For complete SELinux messages. run sealert -l 739ce6c4-1827-447b-8908-e46947ad2ea8 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file .bash_logout. > If you believe that cimprovagt should be allowed setattr access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory lmishell-userCD18LMEZO7ALI3RMWI. For complete SELinux messages. run sealert -l 7ff6779c-7027-4df9-8389-f6e21eabfc9f >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the directory lmishell-userCD18LMEZO7ALI3RMWI. > If you believe that cimprovagt should be allowed setattr access on the lmishell-userCD18LMEZO7ALI3RMWI directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. For complete SELinux messages. run sealert -l 847374d9-e0b2-4e1d-af8d-e6eec366df76 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. > If you believe that cimprovagt should be allowed remove_name access on the extensions directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. For complete SELinux messages. run sealert -l 847374d9-e0b2-4e1d-af8d-e6eec366df76 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from remove_name access on the directory extensions. > If you believe that cimprovagt should be allowed remove_name access on the extensions directory by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from unlink access on the file .bash_logout. For complete SELinux messages. run sealert -l 9657d64d-664a-4a80-a48a-2d742e628183 >Feb 10 11:51:31 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from unlink access on the file .bash_logout. > If you believe that cimprovagt should be allowed unlink access on the .bash_logout file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1258): avc: denied { write } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1258): arch=c000003e syscall=2 success=yes exit=11 a0=7f79427f5600 a1=41 a2=81a4 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1258): avc: denied { write } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1258): arch=c000003e syscall=2 success=yes exit=11 a0=7f79427f5600 a1=41 a2=81a4 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: dbus avc(node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1259): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file > node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1259): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=0 a2=0 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=AVC msg=audit(1392051100.896:1259): avc: denied { setattr } for pid=6875 comm="cimprovagt" name="passwd-" dev="dm-1" ino=9068843 scontext=system_u:system_r:pegasus_t:s0 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: AuditRecordReceiver.add_record_to_cache(): node=rhel7sx.amahdal.brq.redhat.com type=SYSCALL msg=audit(1392051100.896:1259): arch=c000003e syscall=93 success=yes exit=0 a0=b a1=0 a2=0 a3=fef284f03 items=0 ppid=1 pid=6875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="cimprovagt" exe="/usr/libexec/pegasus/cimprovagt" subj=system_u:system_r:pegasus_t:s0 key=(null) >Feb 10 11:51:40 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the file passwd-. For complete SELinux messages. run sealert -l d6761cb1-10bd-49a0-999d-2de6a4120771 >Feb 10 11:51:41 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from write access on the file passwd-. > If you believe that cimprovagt should be allowed write access on the passwd- file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol >Feb 10 11:51:41 rhel7sx.amahdal.brq.redhat.com setroubleshoot[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file passwd-. For complete SELinux messages. run sealert -l 35fa33d5-46fa-4e10-ad6e-ddf36edc6709 >Feb 10 11:51:41 rhel7sx.amahdal.brq.redhat.com python[8220]: SELinux is preventing /usr/libexec/pegasus/cimprovagt from setattr access on the file passwd-. > If you believe that cimprovagt should be allowed setattr access on the passwd- file by default. > # grep cimprovagt /var/log/audit/audit.log | audit2allow -M mypol
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1063423
:
861495
|
861496
|
861497
|
861498
|
861499
|
861500
|
861501
|
861502
|
861503
| 861504 |
861505