Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 871181 Details for
Bug 1032695
libvirt: machines get killed when scopes are destroyed
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
The rc.local file in my host
rc.local (text/plain), 4.50 KB, created by
zhenfeng wang
on 2014-03-06 03:00:01 UTC
(
hide
)
Description:
The rc.local file in my host
Filename:
MIME Type:
Creator:
zhenfeng wang
Created:
2014-03-06 03:00:01 UTC
Size:
4.50 KB
patch
obsolete
>#!/bin/sh >ntpdate clock.redhat.com > >modprobe kvm >modprobe kvm-intel >modprobe kvm-amd > >service rpcbind start >chkconfig rpcbind on > >chmod 666 /dev/kvm > >service libvirtd restart >setsebool -P virt_use_nfs 1 >setenforce 1 >/usr/libexec/iptables/iptables.init stop >service firewalld stop >service libvirtd restart >arch=`uname -i` >mkdir -p /usr/local/ >DEFAULT="/usr/local/staf" >case "$arch" in > i386) > echo "i386" > if [ -d "$DEFAULT" ]; then > echo "STAF already installed" > else > echo "$DEFAULT existed STAF has installed" > echo "Installing STAF to $DEFAULT" > mkdir -p /mnt/tmp > mount 10.66.90.121:/vol/S4/tools /mnt/tmp > tar -xvzf /mnt/tmp/staf/STAF333-linux.tar.gz -C /usr/local/ > umount /mnt/tmp > rm -rf /mnt/tmp > echo "trust level 5 machine *" >> /usr/local/staf/bin/STAF.cfg > fi > ;; > x86_64) > echo "x86_64" > if [ -d "$DEFAULT" ]; then > echo "STAF already installed" > else > echo "$DEFAULT existed STAF has installed" > echo "Installing STAF to $DEFAULT" > mkdir -p /mnt/tmp > mount 10.66.90.121:/vol/S4/tools /mnt/tmp > tar -xvzf /mnt/tmp/staf/STAF333-linux-amd64.tar.gz -C /usr/local/ > umount /mnt/tmp > rm -rf /mnt/tmp > echo "trust level 5 machine *" >> /usr/local/staf/bin/STAF.cfg > fi > ;; > *) > echo "Pls install STAF mannually" >esac > > >export LD_LIBRARY_PATH=$DEFAULT/lib/:$LD_LIBRARY_PATH >export STAFCONVDIR=$DEFAULT/codepage/ >export PATH=$DEFAULT/bin/:$PATH > >nohup /usr/local/staf/bin/STAFProc >/tmp/STAFProc.out 2>&1 & >service iptables stop > >echo ' >module local 1.0; > >require { > type setfiles_t; > type dmesg_t; > type ifconfig_t; > type cert_t; > type setsebool_t; > type traceroute_t; > type rpcd_t; > type iptables_t; > type ping_t; > type xm_t; > type ssh_keygen_t; > type initrc_tmp_t; > type unconfined_t; > type virt_port_t; > type usr_t; > type svirt_image_t; > type virtd_t; > type initrc_t; > class process transition; > type random_device_t; > class tcp_socket name_connect; > class dir relabelto; > class chr_file read; > class file { open read write relabelto getattr }; > type abrt_dump_oops_t; > type svirt_t; > type inotifyfs_t; > type nfs_t; > class capability setpcap; > class dir read; > class filesystem getattr; >} >#============= unconfined_t ============== >allow unconfined_t xm_t:dir relabelto; >allow unconfined_t xm_t:file relabelto; > >#============= xm_t ============== >allow xm_t initrc_tmp_t:file { open read write getattr }; >allow xm_t cert_t:file { write read open getattr }; >allow xm_t random_device_t:chr_file read; >allow xm_t virt_port_t:tcp_socket name_connect; >allow xm_t usr_t:file write; >allow xm_t self:capability setpcap; > >#============= ssh_keygen_t ============== >allow ssh_keygen_t initrc_tmp_t:file { write read }; >allow ssh_keygen_t cert_t:file { open read }; >allow ssh_keygen_t usr_t:file write; > >#============= ifconfig_t ============== >allow ifconfig_t initrc_tmp_t:file { write read }; >allow ifconfig_t usr_t:file write; > >#============= iptables_t ============== >allow iptables_t usr_t:file write; > >#============= ping_t ============== >allow ping_t initrc_tmp_t:file { write read }; >allow ping_t usr_t:file write; > >#============= rpcd_t ============== >allow rpcd_t initrc_tmp_t:file { write read }; >allow rpcd_t usr_t:file write; > >#============= setsebool_t ============== >allow setsebool_t initrc_tmp_t:file { write read }; > >#============= traceroute_t ============== >allow traceroute_t initrc_tmp_t:file { write read }; >allow traceroute_t usr_t:file write; > >#============= dmesg_t ============== >allow dmesg_t initrc_tmp_t:file { write read }; > >#============= setfiles_t ============== >allow setfiles_t initrc_tmp_t:file { write read }; > >#============= abrt_dump_oops_t ============== >allow abrt_dump_oops_t inotifyfs_t:dir read; > >#============= svirt_t ============== >allow svirt_t nfs_t:filesystem getattr; > >#============= initrc_t ============== >#!!!! This avc is a constraint violation. You will need to add an attribute to either the source or target type to make it work. >#Contraint rule: >allow initrc_t svirt_image_t:file relabelto; > >#============= virtd_t ============== >allow virtd_t svirt_image_t:process transition; > >' > staf.te >checkmodule -M -m -o staf.mod staf.te >semodule_package -o staf.pp -m staf.mod >semodule -i staf.pp >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1032695
:
869905
|
870744
|
870745
|
871180
| 871181