Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 893767 Details for
Bug 1095905
openstack-neutron does not function with selinux in enforcing mode
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
output of "audit2allow -a"
audit2allow.txt (text/plain), 7.77 KB, created by
Lars Kellogg-Stedman
on 2014-05-08 19:29:37 UTC
(
hide
)
Description:
output of "audit2allow -a"
Filename:
MIME Type:
Creator:
Lars Kellogg-Stedman
Created:
2014-05-08 19:29:37 UTC
Size:
7.77 KB
patch
obsolete
> > >#============= chkpwd_t ============== >allow chkpwd_t file_t:file { read getattr open }; > >#============= chronyd_t ============== >allow chronyd_t file_t:file read; > >#============= dhcpc_t ============== >allow dhcpc_t file_t:file { read getattr open }; > >#============= dnsmasq_t ============== >allow dnsmasq_t file_t:file { read getattr open }; > >#============= getty_t ============== >allow getty_t file_t:file read; > >#============= glance_api_t ============== >allow glance_api_t file_t:file { read getattr open }; > >#============= glance_registry_t ============== >allow glance_registry_t file_t:file { read getattr open }; > >#============= groupadd_t ============== >allow groupadd_t file_t:file { read getattr open }; > >#============= iptables_t ============== >allow iptables_t file_t:file { read getattr open }; > >#============= keystone_t ============== >allow keystone_t file_t:file { read getattr open }; > >#============= local_login_t ============== >allow local_login_t file_t:file read; > >#============= logrotate_t ============== >allow logrotate_t file_t:file read; > >#============= mysqld_safe_t ============== >allow mysqld_safe_t file_t:file { read getattr open }; > >#============= mysqld_t ============== >allow mysqld_t file_t:file { read getattr open }; > >#============= neutron_t ============== >allow neutron_t auditd_t:dir { getattr search }; >allow neutron_t auditd_t:file { read open }; >allow neutron_t chronyd_t:dir { getattr search }; >allow neutron_t chronyd_t:file { read open }; >allow neutron_t crond_t:dir { getattr search }; >allow neutron_t crond_t:file { read open }; >allow neutron_t dhcpc_t:dir { getattr search }; >allow neutron_t dhcpc_t:file { read open }; >allow neutron_t file_t:file { read getattr open }; >allow neutron_t getty_t:dir { getattr search }; >allow neutron_t getty_t:file { read open }; >allow neutron_t glance_api_t:dir { getattr search }; >allow neutron_t glance_api_t:file { read open }; >allow neutron_t glance_registry_t:dir { getattr search }; >allow neutron_t glance_registry_t:file { read open }; >allow neutron_t httpd_t:dir { getattr search }; >allow neutron_t httpd_t:file { read open }; >allow neutron_t inetd_t:dir { getattr search }; >allow neutron_t inetd_t:file { read open }; >allow neutron_t init_t:file { read open }; >allow neutron_t init_t:unix_stream_socket connectto; >allow neutron_t kernel_t:dir { getattr search }; >allow neutron_t kernel_t:file { read open }; >allow neutron_t keystone_t:dir { getattr search }; >allow neutron_t keystone_t:file { read open }; >allow neutron_t memcached_t:dir { getattr search }; >allow neutron_t memcached_t:file { read open }; >allow neutron_t mongod_t:dir { getattr search }; >allow neutron_t mongod_t:file { read open }; >allow neutron_t mysqld_safe_t:dir { getattr search }; >allow neutron_t mysqld_safe_t:file { read open }; >allow neutron_t mysqld_t:dir { getattr search }; >allow neutron_t mysqld_t:file { read open }; >allow neutron_t netutils_exec_t:file { read execute open execute_no_trans }; >allow neutron_t neutron_var_lib_t:sock_file write; >allow neutron_t nova_api_t:dir { getattr search }; >allow neutron_t nova_api_t:file { read open }; >allow neutron_t nova_cert_t:dir { getattr search }; >allow neutron_t nova_cert_t:file { read open }; >allow neutron_t nova_console_t:dir { getattr search }; >allow neutron_t nova_console_t:file { read open }; >allow neutron_t nova_scheduler_t:dir { getattr search }; >allow neutron_t nova_scheduler_t:file { read open }; >allow neutron_t openvswitch_t:dir { getattr search }; >allow neutron_t openvswitch_t:file { read open }; >allow neutron_t osapi_compute_port_t:tcp_socket name_connect; >allow neutron_t policykit_t:dir { getattr search }; >allow neutron_t policykit_t:file { read open }; >allow neutron_t postfix_master_t:dir { getattr search }; >allow neutron_t postfix_master_t:file { read open }; >allow neutron_t postfix_pickup_t:dir { getattr search }; >allow neutron_t postfix_pickup_t:file { read open }; >allow neutron_t postfix_qmgr_t:dir { getattr search }; >allow neutron_t postfix_qmgr_t:file { read open }; >allow neutron_t rabbitmq_beam_t:dir { getattr search }; >allow neutron_t rabbitmq_beam_t:file { read open }; >allow neutron_t rhsmcertd_t:dir { getattr search }; >allow neutron_t rhsmcertd_t:file { read open }; >allow neutron_t rpcbind_t:dir { getattr search }; >allow neutron_t rpcbind_t:file { read open }; >allow neutron_t rpcd_t:dir { getattr search }; >allow neutron_t rpcd_t:file { read open }; >allow neutron_t self:capability dac_override; >allow neutron_t self:capability2 block_suspend; >allow neutron_t self:packet_socket { bind create getattr }; >allow neutron_t self:process { signal setcap }; >allow neutron_t sshd_t:dir { getattr search }; >allow neutron_t sshd_t:file { read open }; >allow neutron_t svirt_tcg_t:dir { getattr search }; >allow neutron_t svirt_tcg_t:file { read open }; >allow neutron_t swift_t:dir { getattr search }; >allow neutron_t swift_t:file { read open }; >allow neutron_t sysctl_net_t:dir search; >allow neutron_t sysctl_net_t:file { write getattr open }; >allow neutron_t syslogd_t:dir { getattr search }; >allow neutron_t syslogd_t:file { read open }; >allow neutron_t system_dbusd_t:dir { getattr search }; >allow neutron_t system_dbusd_t:file { read open }; >allow neutron_t systemd_logind_t:dir { getattr search }; >allow neutron_t systemd_logind_t:file { read open }; >allow neutron_t tuned_t:dir { getattr search }; >allow neutron_t tuned_t:file { read open }; >allow neutron_t udev_t:dir { getattr search }; >allow neutron_t udev_t:file { read open }; >allow neutron_t unconfined_t:dir { getattr search }; >allow neutron_t unconfined_t:file { read open }; > >#!!!! This avc can be allowed using the boolean 'nis_enabled' >allow neutron_t unreserved_port_t:tcp_socket name_bind; >allow neutron_t var_run_t:file { read create open }; >allow neutron_t virtd_t:dir { getattr search }; >allow neutron_t virtd_t:file { read open }; > >#============= nova_api_t ============== >allow nova_api_t file_t:file { read getattr open }; > >#============= passwd_t ============== >allow passwd_t file_t:file read; > >#============= postfix_master_t ============== >allow postfix_master_t file_t:file read; > >#============= postfix_pickup_t ============== >allow postfix_pickup_t file_t:file read; > >#============= postfix_qmgr_t ============== >allow postfix_qmgr_t file_t:file read; > >#============= rabbitmq_beam_t ============== >allow rabbitmq_beam_t file_t:file { read getattr open }; > >#============= rhsmcertd_t ============== >allow rhsmcertd_t file_t:file { read getattr open }; > >#============= sendmail_t ============== >allow sendmail_t file_t:file read; > >#============= ssh_keygen_t ============== >allow ssh_keygen_t file_t:file read; > >#============= sshd_keygen_t ============== >allow sshd_keygen_t file_t:file { read getattr open }; > >#============= sshd_t ============== >allow sshd_t file_t:file { read getattr open }; > >#============= svirt_tcg_t ============== >allow svirt_tcg_t file_t:file { read getattr open }; > >#============= swift_t ============== >allow swift_t file_t:dir { read getattr open search }; > >#============= syslogd_t ============== >allow syslogd_t file_t:file { read getattr open }; > >#============= system_dbusd_t ============== >allow system_dbusd_t file_t:file { getattr open }; > >#============= system_mail_t ============== >allow system_mail_t file_t:file { read getattr open }; > >#============= systemd_logind_t ============== >allow systemd_logind_t file_t:file { read getattr open }; > >#============= systemd_sysctl_t ============== >allow systemd_sysctl_t proc_t:file write; > >#============= systemd_tmpfiles_t ============== > >#!!!! This avc is allowed in the current policy >allow systemd_tmpfiles_t file_t:file read; > >#============= tuned_t ============== > >#!!!! This avc is allowed in the current policy >allow tuned_t file_t:file read; > >#============= updpwd_t ============== >allow updpwd_t file_t:file { read getattr }; > >#============= useradd_t ============== >allow useradd_t file_t:file { read getattr open };
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1095905
: 893767