Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 883060 Details for
Bug 1084691
[abrt] nmap-ncat: get_evmask(): ncat killed by SIGABRT
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: var_log_messages
var_log_messages (text/plain), 17.52 KB, created by
Jacek Wielemborek
on 2014-04-05 15:06:29 UTC
(
hide
)
Description:
File: var_log_messages
Filename:
MIME Type:
Creator:
Jacek Wielemborek
Created:
2014-04-05 15:06:29 UTC
Size:
17.52 KB
patch
obsolete
>[System Logs]: >kwi 05 16:44:10 d-laptop setroubleshoot[17859]: dbus avc(node=d-laptop type=AVC msg=audit(1396709048.750:2382): avc: denied { name_connect } for pid=17857 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket > node=d-laptop type=SYSCALL msg=audit(1396709048.750:2382): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=1c a3=c3d items=0 ppid=16378 pid=17857 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:44:10 d-laptop setroubleshoot[17859]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709048.750:2382): avc: denied { name_connect } for pid=17857 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >kwi 05 16:44:10 d-laptop setroubleshoot[17859]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709048.750:2382): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=1c a3=c3d items=0 ppid=16378 pid=17857 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:44:11 d-laptop setroubleshoot[17859]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . For complete SELinux messages. run sealert -l 8075ab42-269d-4905-b2d3-4ce800abcae6 >kwi 05 16:44:11 d-laptop python[17859]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . > If you want to allow /usr/bin/ncat to connect to network port 3133 > If you believe that ncat should be allowed name_connect access on the tcp_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:45:31 d-laptop setroubleshoot[17956]: dbus avc(node=d-laptop type=AVC msg=audit(1396709129.874:2383): avc: denied { name_connect } for pid=17954 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket > node=d-laptop type=SYSCALL msg=audit(1396709129.874:2383): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=1c a3=c3d items=0 ppid=16378 pid=17954 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:31 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709129.874:2383): avc: denied { name_connect } for pid=17954 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >kwi 05 16:45:31 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709129.874:2383): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=1c a3=c3d items=0 ppid=16378 pid=17954 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:31 d-laptop setroubleshoot[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . For complete SELinux messages. run sealert -l 8075ab42-269d-4905-b2d3-4ce800abcae6 >kwi 05 16:45:31 d-laptop python[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . > If you want to allow /usr/bin/ncat to connect to network port 3133 > If you believe that ncat should be allowed name_connect access on the tcp_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:45:34 d-laptop setroubleshoot[17956]: dbus avc(node=d-laptop type=AVC msg=audit(1396709134.735:2384): avc: denied { name_connect } for pid=17970 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket > node=d-laptop type=SYSCALL msg=audit(1396709134.735:2384): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=c3d items=0 ppid=16378 pid=17970 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:34 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709134.735:2384): avc: denied { name_connect } for pid=17970 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >kwi 05 16:45:34 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709134.735:2384): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=c3d items=0 ppid=16378 pid=17970 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:34 d-laptop setroubleshoot[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . For complete SELinux messages. run sealert -l 8075ab42-269d-4905-b2d3-4ce800abcae6 >kwi 05 16:45:34 d-laptop python[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . > If you want to allow /usr/bin/ncat to connect to network port 3133 > If you believe that ncat should be allowed name_connect access on the tcp_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:45:37 d-laptop setroubleshoot[17956]: dbus avc(node=d-laptop type=AVC msg=audit(1396709137.883:2385): avc: denied { name_connect } for pid=17977 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket > node=d-laptop type=SYSCALL msg=audit(1396709137.883:2385): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=c3d items=0 ppid=16378 pid=17977 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:37 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709137.883:2385): avc: denied { name_connect } for pid=17977 comm="ncat" dest=3133 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >kwi 05 16:45:37 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709137.883:2385): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=c3d items=0 ppid=16378 pid=17977 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:38 d-laptop setroubleshoot[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . For complete SELinux messages. run sealert -l 8075ab42-269d-4905-b2d3-4ce800abcae6 >kwi 05 16:45:38 d-laptop python[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . > If you want to allow /usr/bin/ncat to connect to network port 3133 > If you believe that ncat should be allowed name_connect access on the tcp_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:45:41 d-laptop setroubleshoot[17956]: dbus avc(node=d-laptop type=AVC msg=audit(1396709141.214:2386): avc: denied { name_connect } for pid=17984 comm="ncat" dest=80 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket > node=d-laptop type=SYSCALL msg=audit(1396709141.214:2386): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=50 items=0 ppid=16378 pid=17984 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:41 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709141.214:2386): avc: denied { name_connect } for pid=17984 comm="ncat" dest=80 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket >kwi 05 16:45:41 d-laptop setroubleshoot[17956]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709141.214:2386): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=50 items=0 ppid=16378 pid=17984 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:45:41 d-laptop setroubleshoot[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . For complete SELinux messages. run sealert -l c39a8479-2774-4aa9-83f8-a4d9e1e6e19d >kwi 05 16:45:41 d-laptop python[17956]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . > If you believe that ncat should be allowed name_connect access on the tcp_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:46:11 d-laptop setroubleshoot[18002]: dbus avc(node=d-laptop type=AVC msg=audit(1396709169.740:2389): avc: denied { name_connect } for pid=18000 comm="ncat" dest=80 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket > node=d-laptop type=SYSCALL msg=audit(1396709169.740:2389): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=50 items=0 ppid=16378 pid=18000 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:46:11 d-laptop setroubleshoot[18002]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709169.740:2389): avc: denied { name_connect } for pid=18000 comm="ncat" dest=80 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket >kwi 05 16:46:11 d-laptop setroubleshoot[18002]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709169.740:2389): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=50 items=0 ppid=16378 pid=18000 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:46:11 d-laptop setroubleshoot[18002]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . For complete SELinux messages. run sealert -l c39a8479-2774-4aa9-83f8-a4d9e1e6e19d >kwi 05 16:46:11 d-laptop python[18002]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . > If you believe that ncat should be allowed name_connect access on the tcp_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:46:17 d-laptop sudo[17993]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -l 80 >kwi 05 16:46:20 d-laptop setroubleshoot[18002]: dbus avc(node=d-laptop type=AVC msg=audit(1396709180.057:2394): avc: denied { name_connect } for pid=18019 comm="ncat" dest=80 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket > node=d-laptop type=SYSCALL msg=audit(1396709180.057:2394): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=50 items=0 ppid=16378 pid=18019 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:46:20 d-laptop setroubleshoot[18002]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709180.57:2394): avc: denied { name_connect } for pid=18019 comm="ncat" dest=80 scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:object_r:http_port_t:s0 tclass=tcp_socket >kwi 05 16:46:20 d-laptop setroubleshoot[18002]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709180.57:2394): arch=c000003e syscall=42 success=no exit=-13 a0=3a a1=62d820 a2=10 a3=50 items=0 ppid=16378 pid=18019 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:46:20 d-laptop setroubleshoot[18002]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . For complete SELinux messages. run sealert -l c39a8479-2774-4aa9-83f8-a4d9e1e6e19d >kwi 05 16:46:20 d-laptop python[18002]: SELinux is preventing /usr/bin/ncat from name_connect access on the tcp_socket . > If you believe that ncat should be allowed name_connect access on the tcp_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:47:43 d-laptop sudo[18062]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -lu 80 >kwi 05 16:48:25 d-laptop sudo[18079]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -lu 80 >kwi 05 16:48:28 d-laptop sudo[18082]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -lku 80 >kwi 05 16:48:30 d-laptop sudo[18086]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -lu 80 >kwi 05 16:48:55 d-laptop sudo[18098]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -lu 80 >kwi 05 16:49:27 d-laptop sudo[18112]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -lu 80 >kwi 05 16:49:52 d-laptop sudo[18120]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -lu 80 >kwi 05 16:51:38 d-laptop sudo[18207]: d : TTY=pts/9 ; PWD=/tmp/Twisted-13.2.0 ; USER=root ; COMMAND=/bin/ncat -l --sctp 80 >kwi 05 16:51:42 d-laptop setroubleshoot[18038]: dbus avc(node=d-laptop type=AVC msg=audit(1396709502.643:2434): avc: denied { create } for pid=18222 comm="ncat" scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:system_r:postgresql_t:s0 tclass=rawip_socket > node=d-laptop type=SYSCALL msg=audit(1396709502.643:2434): arch=c000003e syscall=41 success=no exit=-13 a0=2 a1=1 a2=84 a3=50 items=0 ppid=1 pid=18222 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:51:42 d-laptop setroubleshoot[18038]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=AVC msg=audit(1396709502.643:2434): avc: denied { create } for pid=18222 comm="ncat" scontext=system_u:system_r:postgresql_t:s0 tcontext=system_u:system_r:postgresql_t:s0 tclass=rawip_socket >kwi 05 16:51:42 d-laptop setroubleshoot[18038]: AuditRecordReceiver.add_record_to_cache(): node=d-laptop type=SYSCALL msg=audit(1396709502.643:2434): arch=c000003e syscall=41 success=no exit=-13 a0=2 a1=1 a2=84 a3=50 items=0 ppid=1 pid=18222 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 ses=4294967295 tty=(none) comm="ncat" exe="/usr/bin/ncat" subj=system_u:system_r:postgresql_t:s0 key=(null) >kwi 05 16:51:42 d-laptop setroubleshoot[18038]: SELinux is preventing /usr/bin/ncat from create access on the rawip_socket . For complete SELinux messages. run sealert -l 62cd4a18-253e-4034-8d37-6d1ac469e80a >kwi 05 16:51:42 d-laptop python[18038]: SELinux is preventing /usr/bin/ncat from create access on the rawip_socket . > If you believe that ncat should be allowed create access on the rawip_socket by default. > # grep ncat /var/log/audit/audit.log | audit2allow -M mypol >kwi 05 16:51:43 d-laptop abrt-hook-ccpp[18223]: Saved core dump of pid 18222 (/usr/bin/ncat) to /var/tmp/abrt/ccpp-2014-04-05-16:51:42-18222 (950272 bytes) >[User Logs]:
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1084691
:
883051
|
883052
|
883053
|
883054
|
883055
|
883056
|
883057
|
883058
|
883059
| 883060