Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 907574 Details for
Bug 1108036
avc when installing openstack with foreman
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
audit2why
file_1108036.txt (text/plain), 19.82 KB, created by
Ofer Blaut
on 2014-06-11 10:52:37 UTC
(
hide
)
Description:
audit2why
Filename:
MIME Type:
Creator:
Ofer Blaut
Created:
2014-06-11 10:52:37 UTC
Size:
19.82 KB
patch
obsolete
>[root@puma33 yum.repos.d]# audit2why -i /var/log/messages >Jun 11 11:49:21 puma33 kernel: type=1400 audit(1402476561.560:7): avc: denied { name_connect } for pid=18105 comm="ruby" dest=9090 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:websm_port_t:s0 tclass=tcp_socket > > Was caused by: > The boolean passenger_can_connect_all was set incorrectly. > Description: > passenger_can_connect_all > > Allow access by executing: > # setsebool -P passenger_can_connect_all 1 >Jun 11 12:09:41 puma33 kernel: type=1400 audit(1402477781.921:8): avc: denied { relabelto } for pid=18739 comm="ruby" name="yaml" dev=dm-0 ino=29230658 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_var_lib_t:s0 tclass=dir > > Was caused by: > Policy constraint violation. > > May require adding a type attribute to the domain or type to satisfy the constraint. > > Constraints are defined in the policy sources in policy/constraints (general), policy/mcs (MCS), and policy/mls (MLS). > >Jun 11 12:09:41 puma33 kernel: type=1400 audit(1402477781.932:9): avc: denied { relabelto } for pid=18739 comm="ruby" name="masterhttp.log" dev=dm-0 ino=29102193 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_log_t:s0 tclass=file > > Was caused by: > Policy constraint violation. > > May require adding a type attribute to the domain or type to satisfy the constraint. > > Constraints are defined in the policy sources in policy/constraints (general), policy/mcs (MCS), and policy/mls (MLS). > >Jun 11 12:09:41 puma33 kernel: type=1400 audit(1402477781.940:10): avc: denied { relabelto } for pid=18739 comm="ruby" name="puma33.scl.lab.tlv.redhat.com.pem" dev=dm-0 ino=28967514 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_var_lib_t:s0 tclass=file > > Was caused by: > Policy constraint violation. > > May require adding a type attribute to the domain or type to satisfy the constraint. > > Constraints are defined in the policy sources in policy/constraints (general), policy/mcs (MCS), and policy/mls (MLS). > >Jun 11 12:09:42 puma33 kernel: type=1400 audit(1402477782.277:11): avc: denied { name_bind } for pid=18758 comm="ruby" src=2837 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=udp_socket > > Was caused by: > The boolean allow_ypbind was set incorrectly. > Description: > Allow system to run with NIS > > Allow access by executing: > # setsebool -P allow_ypbind 1 >Jun 11 12:09:42 puma33 kernel: type=1400 audit(1402477782.760:12): avc: denied { execute } for pid=18767 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:09:42 puma33 kernel: type=1400 audit(1402477782.760:13): avc: denied { execute_no_trans } for pid=18767 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:10:22 puma33 kernel: type=1400 audit(1402477822.963:14): avc: denied { execute } for pid=18807 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:10:22 puma33 kernel: type=1400 audit(1402477822.963:15): avc: denied { execute_no_trans } for pid=18807 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:25:17 puma33 kernel: type=1400 audit(1402478717.074:16): avc: denied { execute } for pid=6871 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:25:17 puma33 kernel: type=1400 audit(1402478717.075:17): avc: denied { execute_no_trans } for pid=6871 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.740:18): avc: denied { getattr } for pid=18758 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.740:19): avc: denied { execute } for pid=18758 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.743:20): avc: denied { read open } for pid=7071 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.743:21): avc: denied { execute_no_trans } for pid=7071 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:42:13 puma33 kernel: type=1400 audit(1402479733.348:23): avc: denied { execute } for pid=7545 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:42:13 puma33 kernel: type=1400 audit(1402479733.348:24): avc: denied { execute_no_trans } for pid=7545 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:42:17 puma33 kernel: type=1400 audit(1402479737.261:25): avc: denied { relabelto } for pid=7642 comm="ruby" name="serial" dev=dm-0 ino=29362838 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_var_lib_t:s0 tclass=file > > Was caused by: > Policy constraint violation. > > May require adding a type attribute to the domain or type to satisfy the constraint. > > Constraints are defined in the policy sources in policy/constraints (general), policy/mcs (MCS), and policy/mls (MLS). > >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.053:26): avc: denied { getattr } for pid=7851 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.053:27): avc: denied { execute } for pid=7851 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.055:28): avc: denied { read open } for pid=7914 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.055:29): avc: denied { execute_no_trans } for pid=7914 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 13:12:16 puma33 kernel: type=1400 audit(1402481536.691:30): avc: denied { execute } for pid=9390 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 13:12:16 puma33 kernel: type=1400 audit(1402481536.692:31): avc: denied { execute_no_trans } for pid=9390 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.735:32): avc: denied { getattr } for pid=9543 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.735:33): avc: denied { execute } for pid=9543 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.738:34): avc: denied { read open } for pid=9692 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.738:35): avc: denied { execute_no_trans } for pid=9692 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file > > Was caused by: > Missing type enforcement (TE) allow rule. > > You can use audit2allow to generate a loadable module to allow this access. > > > > > > >[root@puma33 yum.repos.d]# grep avc /var/log/messages >Jun 11 11:04:06 puma33 dbus: avc: received policyload notice (seqno=2) >Jun 11 11:45:30 puma33 dbus: avc: received policyload notice (seqno=3) >Jun 11 11:45:32 puma33 dbus: avc: received policyload notice (seqno=4) >Jun 11 11:49:21 puma33 kernel: type=1400 audit(1402476561.560:7): avc: denied { name_connect } for pid=18105 comm="ruby" dest=9090 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:websm_port_t:s0 tclass=tcp_socket >Jun 11 12:09:41 puma33 kernel: type=1400 audit(1402477781.921:8): avc: denied { relabelto } for pid=18739 comm="ruby" name="yaml" dev=dm-0 ino=29230658 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_var_lib_t:s0 tclass=dir >Jun 11 12:09:41 puma33 kernel: type=1400 audit(1402477781.932:9): avc: denied { relabelto } for pid=18739 comm="ruby" name="masterhttp.log" dev=dm-0 ino=29102193 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_log_t:s0 tclass=file >Jun 11 12:09:41 puma33 kernel: type=1400 audit(1402477781.940:10): avc: denied { relabelto } for pid=18739 comm="ruby" name="puma33.scl.lab.tlv.redhat.com.pem" dev=dm-0 ino=28967514 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_var_lib_t:s0 tclass=file >Jun 11 12:09:42 puma33 kernel: type=1400 audit(1402477782.277:11): avc: denied { name_bind } for pid=18758 comm="ruby" src=2837 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:port_t:s0 tclass=udp_socket >Jun 11 12:09:42 puma33 kernel: type=1400 audit(1402477782.760:12): avc: denied { execute } for pid=18767 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:09:42 puma33 kernel: type=1400 audit(1402477782.760:13): avc: denied { execute_no_trans } for pid=18767 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:10:22 puma33 kernel: type=1400 audit(1402477822.963:14): avc: denied { execute } for pid=18807 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:10:22 puma33 kernel: type=1400 audit(1402477822.963:15): avc: denied { execute_no_trans } for pid=18807 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:25:17 puma33 kernel: type=1400 audit(1402478717.074:16): avc: denied { execute } for pid=6871 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:25:17 puma33 kernel: type=1400 audit(1402478717.075:17): avc: denied { execute_no_trans } for pid=6871 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.740:18): avc: denied { getattr } for pid=18758 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.740:19): avc: denied { execute } for pid=18758 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.743:20): avc: denied { read open } for pid=7071 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 12:25:27 puma33 kernel: type=1400 audit(1402478727.743:21): avc: denied { execute_no_trans } for pid=7071 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 12:30:10 puma33 dbus: avc: received setenforce notice (enforcing=0) >Jun 11 12:42:13 puma33 kernel: type=1400 audit(1402479733.348:23): avc: denied { execute } for pid=7545 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:42:13 puma33 kernel: type=1400 audit(1402479733.348:24): avc: denied { execute_no_trans } for pid=7545 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 12:42:17 puma33 kernel: type=1400 audit(1402479737.261:25): avc: denied { relabelto } for pid=7642 comm="ruby" name="serial" dev=dm-0 ino=29362838 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_var_lib_t:s0 tclass=file >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.053:26): avc: denied { getattr } for pid=7851 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.053:27): avc: denied { execute } for pid=7851 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.055:28): avc: denied { read open } for pid=7914 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 12:42:28 puma33 kernel: type=1400 audit(1402479748.055:29): avc: denied { execute_no_trans } for pid=7914 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 13:12:16 puma33 kernel: type=1400 audit(1402481536.691:30): avc: denied { execute } for pid=9390 comm="ruby" name="node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 13:12:16 puma33 kernel: type=1400 audit(1402481536.692:31): avc: denied { execute_no_trans } for pid=9390 comm="ruby" path="/etc/puppet/node.rb" dev=dm-0 ino=1836556 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:puppet_etc_t:s0 tclass=file >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.735:32): avc: denied { getattr } for pid=9543 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.735:33): avc: denied { execute } for pid=9543 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.738:34): avc: denied { read open } for pid=9692 comm="ruby" name="iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >Jun 11 13:12:25 puma33 kernel: type=1400 audit(1402481545.738:35): avc: denied { execute_no_trans } for pid=9692 comm="ruby" path="/sbin/iptables-multi-1.4.7" dev=dm-0 ino=28181312 scontext=unconfined_u:system_r:passenger_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1108036
: 907574 |
907714