Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 923966 Details for
Bug 1126538
SELinux blocks Munin plugin 'yum' from executing yum
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
content of .te file, which was created with audit2allow fed with the log messages
file_1126538.txt (text/plain), 1.36 KB, created by
Gabriele Pohl
on 2014-08-04 17:01:57 UTC
(
hide
)
Description:
content of .te file, which was created with audit2allow fed with the log messages
Filename:
MIME Type:
Creator:
Gabriele Pohl
Created:
2014-08-04 17:01:57 UTC
Size:
1.36 KB
patch
obsolete
>module munin-yum_pol 1.0; > >require { > type devlog_t; > type boot_t; > type rpm_script_tmp_t; > type syslogd_t; > type rpm_exec_t; > type munin_system_plugin_t; > type http_port_t; > type rpm_var_lib_t; > class sock_file { write getattr }; > class tcp_socket name_connect; > class unix_dgram_socket { create connect sendto }; > class file { rename ioctl setattr getattr read create unlink open execute execute_no_trans }; > class dir { read write add_name remove_name }; >} > >#============= munin_system_plugin_t ============== >allow munin_system_plugin_t boot_t:dir read; >allow munin_system_plugin_t devlog_t:sock_file { write getattr }; > >#!!!! This avc can be allowed using the boolean 'allow_ypbind' >allow munin_system_plugin_t http_port_t:tcp_socket name_connect; >allow munin_system_plugin_t rpm_exec_t:file { ioctl execute read open getattr execute_no_trans }; >#!!!! The source type 'munin_system_plugin_t' can write to a 'dir' of the following types: ># munin_system_plugin_tmp_t, tmp_t, munin_plugin_state_t > >allow munin_system_plugin_t rpm_script_tmp_t:dir { write remove_name read add_name }; >allow munin_system_plugin_t rpm_script_tmp_t:file { rename create unlink setattr }; >allow munin_system_plugin_t rpm_var_lib_t:file open; >allow munin_system_plugin_t self:unix_dgram_socket { create connect }; >allow munin_system_plugin_t syslogd_t:unix_dgram_socket sendto;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1126538
: 923966