Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 936551 Details for
Bug 1135510
RHEL7 icehouse cluster with ceph/ssl SELinux errors
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
AVCs
audit.log (text/plain), 15.75 KB, created by
Stefan Walter
on 2014-09-11 13:32:51 UTC
(
hide
)
Description:
AVCs
Filename:
MIME Type:
Creator:
Stefan Walter
Created:
2014-09-11 13:32:51 UTC
Size:
15.75 KB
patch
obsolete
>type=USER_AVC msg=audit(1410435867.750:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=2) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435867.750:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=3) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435867.750:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=4) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435867.750:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=5) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435867.750:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=6) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435867.750:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=7) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435867.750:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=8) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435900.374:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=9) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=USER_AVC msg=audit(1410435900.374:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=10) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=AVC msg=audit(1410436016.349:475): avc: denied { name_bind } for pid=7780 comm="httpd" src=8777 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1410436021.615:482): avc: denied { read } for pid=7768 comm="nova-scheduler" name="os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410436021.615:482): avc: denied { open } for pid=7768 comm="nova-scheduler" path="/etc/pki/tls/certs/os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410436021.615:483): avc: denied { getattr } for pid=7768 comm="nova-scheduler" path="/etc/pki/tls/certs/os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410436022.299:484): avc: denied { write } for pid=7892 comm="sudo" name="nss" dev="dm-5" ino=16955592 scontext=system_u:system_r:nova_api_t:s0 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=sock_file >type=USER_AVC msg=audit(1410436126.643:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=11) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' >type=AVC msg=audit(1410436178.295:806): avc: denied { name_connect } for pid=9079 comm="glance-api" dest=6800 scontext=system_u:system_r:glance_api_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1410436183.080:970): avc: denied { execute } for pid=9285 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436183.085:971): avc: denied { read open } for pid=9288 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436183.085:971): avc: denied { execute_no_trans } for pid=9288 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436183.087:972): avc: denied { ioctl } for pid=9288 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436183.087:973): avc: denied { getattr } for pid=9288 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436237.037:1436): avc: denied { execute } for pid=10183 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436237.079:1437): avc: denied { read open } for pid=10185 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436237.079:1437): avc: denied { execute_no_trans } for pid=10185 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436237.092:1438): avc: denied { ioctl } for pid=10185 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436237.092:1439): avc: denied { getattr } for pid=10185 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436273.596:1854): avc: denied { execute } for pid=11175 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436273.618:1855): avc: denied { execute } for pid=11176 comm="ip" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436273.618:1855): avc: denied { read open } for pid=11176 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436273.618:1855): avc: denied { execute_no_trans } for pid=11176 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436273.621:1856): avc: denied { ioctl } for pid=11176 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436273.621:1857): avc: denied { getattr } for pid=11176 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436305.918:2271): avc: denied { execute } for pid=11854 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436305.991:2275): avc: denied { read open } for pid=11856 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436305.991:2275): avc: denied { execute_no_trans } for pid=11856 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436305.993:2276): avc: denied { ioctl } for pid=11856 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436305.993:2277): avc: denied { getattr } for pid=11856 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436336.449:2659): avc: denied { execute } for pid=12512 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436336.472:2662): avc: denied { read open } for pid=12515 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436336.472:2662): avc: denied { execute_no_trans } for pid=12515 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436336.474:2663): avc: denied { ioctl } for pid=12515 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436336.474:2664): avc: denied { getattr } for pid=12515 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436367.583:3046): avc: denied { execute } for pid=13282 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436367.596:3047): avc: denied { read open } for pid=13284 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436367.596:3047): avc: denied { execute_no_trans } for pid=13284 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436367.598:3048): avc: denied { ioctl } for pid=13284 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436367.598:3049): avc: denied { getattr } for pid=13284 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436399.046:3479): avc: denied { execute } for pid=13963 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436399.060:3480): avc: denied { read open } for pid=13966 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436399.060:3480): avc: denied { execute_no_trans } for pid=13966 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436399.062:3481): avc: denied { ioctl } for pid=13966 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410436399.062:3482): avc: denied { getattr } for pid=13966 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410439630.088:11838): avc: denied { read } for pid=7768 comm="nova-scheduler" name="os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410439630.088:11838): avc: denied { open } for pid=7768 comm="nova-scheduler" path="/etc/pki/tls/certs/os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410439630.088:11839): avc: denied { getattr } for pid=7768 comm="nova-scheduler" path="/etc/pki/tls/certs/os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410441877.902:17525): avc: denied { read } for pid=7768 comm="nova-scheduler" name="os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410441877.902:17525): avc: denied { open } for pid=7768 comm="nova-scheduler" path="/etc/pki/tls/certs/os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410441877.902:17526): avc: denied { getattr } for pid=7768 comm="nova-scheduler" path="/etc/pki/tls/certs/os_ca.crt" dev="dm-2" ino=2112188 scontext=system_u:system_r:nova_scheduler_t:s0 tcontext=system_u:object_r:cert_t:s0 tclass=file >type=AVC msg=audit(1410441879.667:17532): avc: denied { name_connect } for pid=8942 comm="glance-api" dest=6800 scontext=system_u:system_r:glance_api_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1410441954.965:18032): avc: denied { name_connect } for pid=8709 comm="neutron-metadat" dest=5000 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:commplex_main_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1410441955.156:18033): avc: denied { name_connect } for pid=8709 comm="neutron-metadat" dest=9696 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:neutron_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1410441955.552:18034): avc: denied { name_connect } for pid=8709 comm="neutron-metadat" dest=8775 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:unreserved_port_t:s0 tclass=tcp_socket >type=AVC msg=audit(1410442029.501:18395): avc: denied { execute } for pid=9928 comm="neutron-rootwra" name="ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410442029.513:18396): avc: denied { read open } for pid=9929 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410442029.513:18396): avc: denied { execute_no_trans } for pid=9929 comm="ip" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410442029.517:18397): avc: denied { ioctl } for pid=9929 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file >type=AVC msg=audit(1410442029.517:18398): avc: denied { getattr } for pid=9929 comm="ipsec" path="/usr/sbin/ipsec" dev="dm-0" ino=36196395 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:ipsec_mgmt_exec_t:s0 tclass=file
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1135510
: 936551