Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 941948 Details for
Bug 1147201
selinux is preventing munin-update from running
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
journalctl --since $(date -d '5mins ago' +%T) |grep avc:
journalctl-munin.txt (text/plain), 10.36 KB, created by
d. johnson
on 2014-09-28 05:16:14 UTC
(
hide
)
Description:
journalctl --since $(date -d '5mins ago' +%T) |grep avc:
Filename:
MIME Type:
Creator:
d. johnson
Created:
2014-09-28 05:16:14 UTC
Size:
10.36 KB
patch
obsolete
>Sep 28 00:05:01 baldr.local.lan kernel: audit: type=1400 audit(1411880701.919:163): avc: denied { read } for pid=30230 comm="open_inodes" name="inode-nr" dev="proc" ino=18563 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file permissive=1 >Sep 28 00:05:01 baldr.local.lan kernel: audit: type=1400 audit(1411880701.919:164): avc: denied { open } for pid=30230 comm="open_inodes" path="/proc/sys/fs/inode-nr" dev="proc" ino=18563 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file permissive=1 >Sep 28 00:05:01 baldr.local.lan kernel: audit: type=1400 audit(1411880701.921:165): avc: denied { getattr } for pid=30230 comm="awk" path="/proc/sys/fs/inode-nr" dev="proc" ino=18563 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file permissive=1 >Sep 28 00:05:01 baldr.local.lan kernel: audit: type=1400 audit(1411880701.921:166): avc: denied { ioctl } for pid=30230 comm="awk" path="/proc/sys/fs/inode-nr" dev="proc" ino=18563 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:sysctl_fs_t:s0 tclass=file permissive=1 >Sep 28 00:05:04 baldr.local.lan kernel: audit: type=1400 audit(1411880704.828:167): avc: denied { read } for pid=30608 comm="fw_packets" name="snmp" dev="proc" ino=4026532016 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 >Sep 28 00:05:04 baldr.local.lan kernel: audit: type=1400 audit(1411880704.828:168): avc: denied { open } for pid=30608 comm="fw_packets" path="/proc/30608/net/snmp" dev="proc" ino=4026532016 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 >Sep 28 00:05:04 baldr.local.lan kernel: audit: type=1400 audit(1411880704.828:169): avc: denied { ioctl } for pid=30608 comm="fw_packets" path="/proc/30608/net/snmp" dev="proc" ino=4026532016 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 >Sep 28 00:05:04 baldr.local.lan kernel: audit: type=1400 audit(1411880704.828:170): avc: denied { getattr } for pid=30608 comm="fw_packets" path="/proc/30608/net/snmp" dev="proc" ino=4026532016 scontext=system_u:system_r:unconfined_munin_plugin_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 >Sep 28 00:06:23 baldr.local.lan dbus-daemon[471]: dbus[471]: avc: received policyload notice (seqno=2) >Sep 28 00:06:23 baldr.local.lan dbus[471]: avc: received policyload notice (seqno=2) >Sep 28 00:06:23 baldr.local.lan kernel: audit: type=1400 audit(1411880783.714:172): avc: denied { rlimitinh } for pid=31135 comm="setfiles" scontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:setfiles_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:06:23 baldr.local.lan kernel: audit: type=1400 audit(1411880783.714:173): avc: denied { siginh } for pid=31135 comm="setfiles" scontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:setfiles_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:06:23 baldr.local.lan kernel: audit: type=1400 audit(1411880783.714:174): avc: denied { noatsecure } for pid=31135 comm="setfiles" scontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:setfiles_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:06:25 baldr.local.lan kernel: audit: type=1400 audit(1411880785.313:175): avc: denied { rlimitinh } for pid=31140 comm="sh" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process permissive=1 >Sep 28 00:06:25 baldr.local.lan kernel: audit: type=1400 audit(1411880785.313:176): avc: denied { siginh } for pid=31140 comm="sh" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process permissive=1 >Sep 28 00:06:25 baldr.local.lan kernel: audit: type=1400 audit(1411880785.313:177): avc: denied { noatsecure } for pid=31140 comm="sh" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process permissive=1 >Sep 28 00:06:25 baldr.local.lan kernel: audit: type=1400 audit(1411880785.368:178): avc: denied { read } for pid=31141 comm="x2golistsession" name="shadow" dev="sda2" ino=657662 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1 >Sep 28 00:06:25 baldr.local.lan kernel: audit: type=1400 audit(1411880785.368:179): avc: denied { open } for pid=31141 comm="x2golistsession" path="/etc/shadow" dev="sda2" ino=657662 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.959:180): avc: denied { rlimitinh } for pid=32857 comm="unix_chkpwd" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.959:181): avc: denied { siginh } for pid=32857 comm="unix_chkpwd" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.959:182): avc: denied { noatsecure } for pid=32857 comm="unix_chkpwd" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1107 audit(1411881001.966:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=2) >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.978:184): avc: denied { rlimitinh } for pid=32858 comm="sh" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:system_cronjob_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.978:185): avc: denied { siginh } for pid=32858 comm="sh" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:system_cronjob_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.978:186): avc: denied { noatsecure } for pid=32858 comm="sh" scontext=system_u:system_r:crond_t:s0-s0:c0.c1023 tcontext=system_u:system_r:system_cronjob_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.981:187): avc: denied { rlimitinh } for pid=32858 comm="sa1" scontext=system_u:system_r:system_cronjob_t:s0-s0:c0.c1023 tcontext=system_u:system_r:sysstat_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.981:188): avc: denied { siginh } for pid=32858 comm="sa1" scontext=system_u:system_r:system_cronjob_t:s0-s0:c0.c1023 tcontext=system_u:system_r:sysstat_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:01 baldr.local.lan kernel: audit: type=1400 audit(1411881001.981:189): avc: denied { noatsecure } for pid=32858 comm="sa1" scontext=system_u:system_r:system_cronjob_t:s0-s0:c0.c1023 tcontext=system_u:system_r:sysstat_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:10:09 baldr.local.lan kernel: audit: type=1400 audit(1411881009.436:217): avc: denied { rlimitinh } for pid=33383 comm="sh" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process permissive=1 >Sep 28 00:10:09 baldr.local.lan kernel: audit: type=1400 audit(1411881009.436:218): avc: denied { siginh } for pid=33383 comm="sh" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process permissive=1 >Sep 28 00:10:09 baldr.local.lan kernel: audit: type=1400 audit(1411881009.436:219): avc: denied { noatsecure } for pid=33383 comm="sh" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=process permissive=1 >Sep 28 00:10:19 baldr.local.lan kernel: audit: type=1400 audit(1411881019.964:220): avc: denied { read } for pid=33429 comm="x2golistsession" name="shadow" dev="sda2" ino=657662 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1 >Sep 28 00:10:19 baldr.local.lan kernel: audit: type=1400 audit(1411881019.964:221): avc: denied { open } for pid=33429 comm="x2golistsession" path="/etc/shadow" dev="sda2" ino=657662 scontext=system_u:system_r:initrc_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1 >Sep 28 00:14:44 baldr.local.lan kernel: audit: type=1400 audit(1411881284.907:222): avc: denied { rlimitinh } for pid=34635 comm="semodule" scontext=staff_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:14:44 baldr.local.lan kernel: audit: type=1400 audit(1411881284.907:223): avc: denied { siginh } for pid=34635 comm="semodule" scontext=staff_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:14:44 baldr.local.lan kernel: audit: type=1400 audit(1411881284.907:224): avc: denied { noatsecure } for pid=34635 comm="semodule" scontext=staff_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:14:53 baldr.local.lan kernel: audit: type=1400 audit(1411881293.620:225): avc: denied { rlimitinh } for pid=34672 comm="load_policy" scontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:load_policy_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:14:53 baldr.local.lan kernel: audit: type=1400 audit(1411881293.620:226): avc: denied { siginh } for pid=34672 comm="load_policy" scontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:load_policy_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:14:53 baldr.local.lan kernel: audit: type=1400 audit(1411881293.620:227): avc: denied { noatsecure } for pid=34672 comm="load_policy" scontext=staff_u:sysadm_r:semanage_t:s0-s0:c0.c1023 tcontext=staff_u:sysadm_r:load_policy_t:s0-s0:c0.c1023 tclass=process permissive=1 >Sep 28 00:14:54 baldr.local.lan dbus-daemon[471]: dbus[471]: avc: received policyload notice (seqno=3) >Sep 28 00:14:54 baldr.local.lan dbus[471]: avc: received policyload notice (seqno=3)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1147201
: 941948